期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
The Profound Revelation of Human Social Relations and the Profound Realization of Information Right of Citizens——The social significance of network technique advancement in the perspective of “Entity Cube”
1
作者 GAO GANG 《The Journal of Human Rights》 2010年第4期9-12,共4页
The R&D group of relationship searching in Microsoft Asia Research Institute explains "Entity Cube" launched in 2008 as follows:
关键词 The social significance of network technique advancement in the perspective of The Profound Revelation of Human Social Relations and the Profound Realization of Information Right of Citizens Entity Cube
下载PDF
Seismic Prospecting Techniques in Network of Rivers
2
《China Oil & Gas》 CAS 1998年第1期52-52,共1页
关键词 Seismic Prospecting techniques in network of Rivers
下载PDF
Stability of multiple fans in mine ventilation networks 被引量:6
3
作者 El-Nagdy K.A. 《International Journal of Mining Science and Technology》 SCIE EI 2013年第4期558-560,共3页
In large mines,single fan is usually not enough to ventilate all the working areas.Single mine-fan approach cannot be directly applied to multiple-fan networks because the present of multiple pressures and air quantit... In large mines,single fan is usually not enough to ventilate all the working areas.Single mine-fan approach cannot be directly applied to multiple-fan networks because the present of multiple pressures and air quantities associated with each fan in the network.Accordingly,each fan in a multiple-fan system has its own mine characteristic curve,or a subsystem curve.Under some consideration,the conventional concept of a mine characteristic curve of a single-fan system can be directly extended to that of a particular fan within a multiple-fan system.In this paper the mutual effect of the fans on each other and their effect on the stability of the ventilation network were investigated by Hardy Cross algorithm combined with a switching-parameters technique.To show the validity and reliability of this algorithm,the stability of the ventilation system of Abu-Tartur Mine(one of the largest underground mine in Egypt)has been studied. 展开更多
关键词 Mine ventilation Multiple fan ventilated network Hardy Cross algorithm Switching parameters technique Abu-Tartur Mine
下载PDF
A Novel Beamforming Emulating Photonic Nanojets for Wireless Relay Networks
4
作者 Samer Alabed Ibrahim Mahariq +1 位作者 Mohammad Salman Mustafa Kuzuoglu 《Computers, Materials & Continua》 SCIE EI 2021年第10期575-588,共14页
In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify ... In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify the efficiency of the proposed structure by solving the associate field distribution.The application of optimal single-relay selection method shows that full diversity gain with low complexity can be achieved.In this paper,the proposed technique using smart relays combines the aforementioned two methods to attain the benefits of both methods by achieving the highest coding and diversity gain and enhances the overall network performance in terms of bit error rate(BER).Moreover,we analytically prove the advantage of using the proposed technique.In our simulations,it can be shown that the proposed technique outperforms the best known state-of-the-art single relay selection technique.Furthermore,the BER expressions obtained from the theoretical analysis are perfectly matched to those obtained from the conducted simulations. 展开更多
关键词 Wireless relay networks cooperative diversity techniques relay selection network beamforming techniques
下载PDF
A credit risk assessment model based on SVM for small and medium enterprises in supply chain finance 被引量:19
5
作者 Lang Zhang Haiqing Hu Dan Zhang 《Financial Innovation》 2015年第1期208-228,共21页
Background:Supply chain finance(SCF)is a series of financial solutions provided by financial institutions to suppliers and customers facing demands on their working capital.As a systematic arrangement,SCF utilizes the... Background:Supply chain finance(SCF)is a series of financial solutions provided by financial institutions to suppliers and customers facing demands on their working capital.As a systematic arrangement,SCF utilizes the authenticity of the trade between(SMEs)and their“counterparties”,which are usually the leading enterprises in their supply chains.Because in these arrangements the leading enterprises are the guarantors for the SMEs,the credit levels of such counterparties are becoming important factors of concern to financial institutions’risk management(i.e.,commercial banks offering SCF services).Thus,these institutions need to assess the credit risks of the SMEs from a view of the supply chain,rather than only assessing an SME’s repayment ability.The aim of this paper is to research credit risk assessment models for SCF.Methods:We establish an index system for credit risk assessment,adopting a view of the supply chain that considers the leading enterprise’s credit status and the relationships developed in the supply chain.Furthermore,We conducted two credit risk assessment models based on support vector machine(SVM)technique and BP neural network respectly.Results:(1)The SCF credit risk assessment index system designed in this paper,which contained supply chain leading enterprise’s credit status and cooperative relationships between SMEs and leading enterprises,can help banks to raise their accuracy on predicting a small and medium enterprise whether default or not.Therefore,more SMEs can obtain loans from banks through SCF.(2)The SCF credit risk assessment model based on SVM is of good generalization ability and robustness,which is more effective than BP neural network assessment model.Hence,Banks can raise the accuracy of credit risk assessment on SMEs by applying the SVM model,which can alleviate credit rationing on SMEs.Conclusions:(1)The SCF credit risk assessment index system can solve the problem of banks incorrectly labeling a creditworthy enterprise as a default enterprise,and thereby improve the credit rating status in the process of SME financing.(2)By analyzing and comparing the empirical results,we find that the SVM assessment model,on evaluating the SME credit risk,is more effective than the BP neural network assessment model.This new assessment model based on SVM can raise the accuracy of classification between good credit and bad credit SMEs.(3)Therefore,the SCF credit risk assessment index system and the assessment model based on SVM,is the optimal combination for commercial banks to use to evaluate SMEs’credit risk. 展开更多
关键词 SCF SMES Credit risk assessment SVM BP Neural network technique
下载PDF
Online location of seismic damage to a water distribution system 被引量:4
6
作者 梁建文 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2003年第2期181-187,共7页
As one of the most important urban lifeline systems,a water distribution system can be damaged under a strong earthquake,and the damage cannot easily be located,especially immediately after the event.This often causes... As one of the most important urban lifeline systems,a water distribution system can be damaged under a strong earthquake,and the damage cannot easily be located,especially immediately after the event.This often causes tremendous difficulties to post-earthquake emergency response and recovery activities.This paper proposes a methodology to locate seismic damage to a water distribution system by monitoring water head online at some nodes in the water distribution system.An artificial neural network-based inverse analysis method is developed to estimate the water head variations at all nodes that are not monitored based on the water head variations at the nodes that are monitored.The methodology provides a quick,effective,and practical way to locate seismic damage to a water distribution system. 展开更多
关键词 water distribution system seismic damage BREAK LOCATION extent of damage ONLINE artificial neural network technique
下载PDF
On the QoS for ATM Networks Using a New Buffer Utilization Technique 被引量:1
7
作者 Md. Julius Hossain Md. Nurul Huda 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期705-706,共2页
A buffer sharing scheme need to meet many competing objectives like robustness to changes in traffic conditions, fairness, efficiency, implementation simplicity, etc. Of the existing techniques, Push Out (PO) is optim... A buffer sharing scheme need to meet many competing objectives like robustness to changes in traffic conditions, fairness, efficiency, implementation simplicity, etc. Of the existing techniques, Push Out (PO) is optimum in terms of overall cell loss performance, but its delay performance is worse than that of all other methods for the multiple space priority. Another scheme named Dynamic Threshold (DT) is robust and adaptive which has good delay performance. A hybrid technique named Dynamic Threshold wi... 展开更多
关键词 ATM in on for On the QoS for ATM networks Using a New Buffer Utilization technique
原文传递
A new burst assembly technique for supporting QoS in optical burst switching networks 被引量:2
8
作者 阳小龙 党明瑞 +1 位作者 毛幼菊 李乐民 《Chinese Optics Letters》 SCIE EI CAS CSCD 2003年第5期266-268,共3页
This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme.... This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme. The assembly mechanism, which is fit well to multi-class burst assembly, not only matches with IP QoS mechanism based on packet classification, and also utilizes fairly and efficiently assembly capacity. Based on token-bucket model and burst segment selective discard (BSSD), the offset-time scheme can smooth the traffic to support OBS QoS. The simulation results show that the technique can improve the performance in terms of packet loss probability (PLP). 展开更多
关键词 QOS IT as A new burst assembly technique for supporting QoS in optical burst switching networks PLP in for
原文传递
An ARM-based debugging system for multipole array acoustic logging tools
9
作者 Lu Junqiang Ju Xiaodong Men Baiyong 《Petroleum Science》 SCIE CAS CSCD 2014年第4期508-518,共11页
This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test eq... This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test equipment, we have used principal and subordinate structures, and interconnected the host computer and the front-end machine via Ethernet. The front-end machine is based on the ARM7 (advanced reduced instruction set computing (RISC) machine) technique, the processor of which runs an embedded operating system, namely, uClinux OS. We have analyzed the system telecommunication, human-machine interface circuit, transmitter mandrel interface circuit, receiver mandrel interface circuit, and board-level test interface circuit. The software used in the system consists of the embedded front-computer software and the host application software. We have explained in detail the flow chart of the boot loader in the embedded front-computer software. The host application software is composed of four application subroutines, which match with the functional modules of the system hardware. A net communication program based on the server^client mode is implemented by means of socket programming and multi-thread programming. Test results indicate that the data transmission rate of the system is higher than 1 MB/s, which completely meets the current requirements of the data transmission rate between the tool system and the wireline telemetry device. Application of the debugging system, which includes multiple level test methods, shows that the proposed system can fully meet the test requirements of MPAL at various levels. 展开更多
关键词 Acoustic logging tool debug system advanced RISC machines embedded technique network interconnection
下载PDF
Negative weights in network time model
10
作者 Zoltan A.VATTAI Levente MALYUSZ 《Frontiers of Engineering Management》 2022年第2期268-280,共13页
Time does not go backward.A negative duration,such as“time period”at first sight is difficult to interpret.Previous network techniques(CPM/PERT/PDM)did not support negative parameters and/or loops(potentially necess... Time does not go backward.A negative duration,such as“time period”at first sight is difficult to interpret.Previous network techniques(CPM/PERT/PDM)did not support negative parameters and/or loops(potentially necessitating recursive calculations)in the model because of the limited computing and data storage capabilities of early computers.Monsieur Roy and John Fondahl implicitly introduced negative weights into network techniques to represent activities with fixed or estimated durations(MPM/PDM).Subsequently,the introduction of negative lead and/or lag times by software developers(IBM)apparently overcome the limitation of not allowing negative time parameters in time model.Referring to general digraph(Event on Node)representation where activities are represented by pairs of nodes and pairwise relative time restrictions are represented by weighted arrows,we can release most restraints in constructing the graph structure(incorporating the dynamic model of the inner logic of time plan),and a surprisingly flexible and handy network model can be developed that provides all the advantages of the above-mentioned techniques.This paper aims to review the theoretical possibilities and technical interpretations(and use)of negative weights in network time models and discuss approximately 20 types of time-based restrictions among the activities of construction projects.We focus on pure relative time models,without considering other restrictions(such as calendar data,time-cost trade-off,resource allocation or other constraints). 展开更多
关键词 graph technique network technique construction management SCHEDULING
原文传递
Joint Design of Clustering and In-cluster Data Route for Heterogeneous Wireless Sensor Networks 被引量:1
11
作者 Liang Xue Ying Liu +2 位作者 Zhi-Qun Gu Zhi-Hua Li Xin-Ping Guan 《International Journal of Automation and computing》 EI CSCD 2017年第6期637-649,共13页
A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in ... A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in a coordinated way. Employing clustering techniques in such networks can achieve balanced energy consumption of member nodes and prolong the network lifetimes.In classical clustering techniques, clustering and in-cluster data routes are usually separated into independent operations. Although separate considerations of these two issues simplify the system design, it is often the non-optimal lifetime expectancy for wireless sensor networks. This paper proposes an integral framework that integrates these two correlated items in an interactive entirety. For that,we develop the clustering problems using nonlinear programming. Evolution process of clustering is provided in simulations. Results show that our joint-design proposal reaches the near optimal match between member nodes and cluster heads. 展开更多
关键词 Heterogeneous wireless sensor networks clustering technique in-cluster data routes integral framework network lifetimes
原文传递
A New Network Planning Method Based on the Connection Number a+bi of SPA
12
作者 HUANG De\|cai\+1,\ ZHAO Ke\|qin\+2,\ ZHANG Ping\+1 1.College of Information Engineering , Zhejiang University of Technology Hangzhou 310014, China 2.Zhejiang Gold Machine Works, Zhuji 311811, China 《Systems Science and Systems Engineering》 CSCD 2000年第3期324-331,共8页
The connection number a+bi is a new kind of number in the Set Pair Analysis (SPA) theory. This paper applies it to network planning technique and considers the expressing, processing and controlling methods of the... The connection number a+bi is a new kind of number in the Set Pair Analysis (SPA) theory. This paper applies it to network planning technique and considers the expressing, processing and controlling methods of the synthetically uncertainties of the time limit caused by Fuzzy, random and indeterminate known factors by the connection number for a large\|scale project. The results illustrate that the new network planning and controlling method based on the connection number a+bi can provide more useful information such as primary critical paths, secondary critical paths and third critical paths etc. The new method is mroe flexible than the traditional method, and is more suitable to the practical application of project. 展开更多
关键词 Set Pair Analysis connection number a+bi network planning technique UNCERTAINTY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部