期刊文献+
共找到628篇文章
< 1 2 32 >
每页显示 20 50 100
Could Military Commanders’ Good LeadershipInfluence Subordinates’ Smartphone Overdependence? A Serial Mediation Analysis
1
作者 Seungju Hyun Xyle Ku +3 位作者 Sungrok Kang Yoonyoung Choi Jaewon Ko Hyunyup Lee 《International Journal of Mental Health Promotion》 2023年第11期1187-1195,共9页
Owing to the ubiquitous use of smartphones by soldiers, military researchers have an increasing interest in potentially problematicside effects such as smartphone overdependence. This raises a question regarding the p... Owing to the ubiquitous use of smartphones by soldiers, military researchers have an increasing interest in potentially problematicside effects such as smartphone overdependence. This raises a question regarding the psychological mechanisms underlying thepotentially self-damaging use of smartphones. Here, we address this question by analyzing how heterogeneity in commander’sgood leadership explains subordinate soldiers’ differences in self-control and smartphone use. Specifically, we found thatsubordinate soldiers who thought their commander's leadership was good were self-regulated, less dependent on smartphones,less stressed, and finally had good mental health. This result indicates that commander’s good leadership can be used toestimate whether subordinate soldiers exert control over their impulses and use their smartphones properly. Thus, the currentfindings help to identify external factors that lead to a better understanding of problematic smartphone use and can potentiallyhelp to design appropriate preventive mechanisms or interventions that target commander’s good leadership. 展开更多
关键词 Military commander LEADERSHIP smartphone overdependence SOLDIER mental health
下载PDF
A framework of force of information influence and application for C4KISR system
2
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
下载PDF
Command filtered integrated estimation guidance and control for strapdown missiles with circular field of view
3
作者 Wei Wang Jiaqi Liu +2 位作者 Shiyao Lin Baokui Geng Zhongjiao Shi 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第5期211-221,共11页
In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated... In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated estimation guidance and control nonlinear model with limited actuator deflection angle is established considering the seeker's FOV constraint.The boundary time-varying integral barrier Lyapunov function(IBLF)is employed in backstepping design to constrain the body line-of-sight(BLOS)in IEGC system to fit a circular FOV.Then,the nonlinear adaptive controller is designed to estimate the changing aerodynamic parameters.The generalized extended state observer(GESO)is designed to estimate the acceleration of the maneuvering targets and the unmatched time-varying disturbances for improving tracking accuracy.Furthermore,the command filters are used to solve the"differential expansion"problem during the backstepping design.The Lyapunov theory is used to prove the stability of the overall closed-loop IEGC system.Finally,the simulation results validate the integrated system's effectiveness,achieving high accuracy strikes against maneuvering targets. 展开更多
关键词 Integrated estimation guidance and control Circular field-of-view Time-varying integral barrier Lyapunov function Command filtered backstepping control Nonlinear adaptive control Extended state observer
下载PDF
Short-term train arrival delay prediction:a data-driven approach
4
作者 Qingyun Fu Shuxin Ding +3 位作者 Tao Zhang Rongsheng Wang Ping Hu Cunlai Pu 《Railway Sciences》 2024年第4期514-529,共16页
Purpose-To optimize train operations,dispatchers currently rely on experience for quick adjustments when delays occur.However,delay predictions often involve imprecise shifts based on known delay times.Real-time and a... Purpose-To optimize train operations,dispatchers currently rely on experience for quick adjustments when delays occur.However,delay predictions often involve imprecise shifts based on known delay times.Real-time and accurate train delay predictions,facilitated by data-driven neural network models,can significantly reduce dispatcher stress and improve adjustment plans.Leveraging current train operation data,these models enable swift and precise predictions,addressing challenges posed by train delays in high-speed rail networks during unforeseen events.Design/methodology/approach-This paper proposes CBLA-net,a neural network architecture for predicting late arrival times.It combines CNN,Bi-LSTM,and attention mechanisms to extract features,handle time series data,and enhance information utilization.Trained on operational data from the Beijing-Tianjin line,it predicts the late arrival time of a target train at the next station using multidimensional input data from the target and preceding trains.Findings-This study evaluates our model’s predictive performance using two data approaches:one considering full data and another focusing only on late arrivals.Results show precise and rapid predictions.Training with full data achieves aMAEof approximately 0.54 minutes and a RMSEof 0.65 minutes,surpassing the model trained solely on delay data(MAE:is about 1.02 min,RMSE:is about 1.52 min).Despite superior overall performance with full data,the model excels at predicting delays exceeding 15 minutes when trained exclusively on late arrivals.For enhanced adaptability to real-world train operations,training with full data is recommended.Originality/value-This paper introduces a novel neural network model,CBLA-net,for predicting train delay times.It innovatively compares and analyzes the model’s performance using both full data and delay data formats.Additionally,the evaluation of the network’s predictive capabilities considers different scenarios,providing a comprehensive demonstration of the model’s predictive performance. 展开更多
关键词 Train delay prediction Intelligent dispatching command Deep learning Convolutional neural network Long short-term memory Attention mechanism
下载PDF
Tactics of Persuasion in Cicero’s Letters during the War of Mutina with the Military Commanders
5
作者 Duan Hongyu 《World History Studies》 2019年第2期1-22,共22页
Cicero tried to take advantage of the War of Mutina in spring 44 BC,to vilify Mark Antony who,in his view,was the mortal foe to the res publica libera.In order to achieve his aim,Cicero used his letter-exchange with t... Cicero tried to take advantage of the War of Mutina in spring 44 BC,to vilify Mark Antony who,in his view,was the mortal foe to the res publica libera.In order to achieve his aim,Cicero used his letter-exchange with the military commanders in North and West Italy as well as in Africa to exert his infl uence and assure their alliance against Antony.Cicero employed various tactics in his letters to persuade and integrate those commanders into his framework.Those tactics functioned for some time during the war but failed eventually.Due to the formidable alliance of the Caesarian party and the still scattered powers of the Republicans,Cicero’s maneuver to remove Antony only by means of political advocacy failed. 展开更多
关键词 TACTICS PERSUASION CICERO LETTERS Military commanders War of Mutina
原文传递
Key technologies and applications of intelligent dispatching command for high-speed railway in China 被引量:1
6
作者 Shuxin Ding Tao Zhang +2 位作者 Kai Sheng Yuanyuan Chen Zhiming Yuan 《Railway Sciences》 2023年第3期336-346,共11页
Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new... Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods. 展开更多
关键词 High-speed railway Intelligent dispatching command Intelligent centralized traffic control Key technologies and application
下载PDF
Java事件处理机制中设计模式的分析 被引量:5
7
作者 宋淼 袁兆山 +1 位作者 陈刚 刘奎 《合肥工业大学学报(自然科学版)》 CAS CSCD 2004年第11期1383-1386,共4页
设计模式是具有良好扩展性、健壮性及重用性的软件设计方案,是软件技术的重要研究课题。Java是一门跨平台的语言,适用于开发客户机/服务器式的应用程序。由于Java的跨平台性,使它也适合大型的多主机系统软件开发;同时Java也是一种面向... 设计模式是具有良好扩展性、健壮性及重用性的软件设计方案,是软件技术的重要研究课题。Java是一门跨平台的语言,适用于开发客户机/服务器式的应用程序。由于Java的跨平台性,使它也适合大型的多主机系统软件开发;同时Java也是一种面向对象的语言,在其中体现了许多设计模式的思想。文章介绍了设计模式的概念及Java事件处理机制,并通过对JavaAWT类库的详细分析,从Java的事件处理机制中提取出3种主要的设计模式。 展开更多
关键词 OBSERVER模式 COMMAND模式 DEFAULT ADAPTER模式 事件监听器
下载PDF
面向对象的软件设计模式在配电GIS中的应用 被引量:5
8
作者 肖志峰 龚健雅 +1 位作者 王艳东 翟晓芳 《测绘信息与工程》 2005年第3期3-5,共3页
阐述了一个配电GIS系统的框架体系结构,描述了AbstractFactory模式、Observer模式、Composite模式、Adapter模式、ChainResponsibility模式、Command模式在其开发设计中的运用。
关键词 软件设计模式 面向对象 COMPOSITE模式 配电 OBSERVER模式 COMMAND 应用 GIS系统 体系结构 开发设计
下载PDF
设计模式在电子商务中的应用 被引量:5
9
作者 李杰 李建华 胡韧 《计算机工程》 CAS CSCD 北大核心 2003年第8期100-102,139,共4页
设计模式描述了简单的、可重用的软件解决方案的核心。该文深入探讨了3种典型软件设计模式(MVC,COMMAND,FACADE)在电子商务上的应用,针对电子商务的特点结合这些模式将典型的MVC模式改进为MVCC模式并进一步改进为MVCFC模式,从而构建... 设计模式描述了简单的、可重用的软件解决方案的核心。该文深入探讨了3种典型软件设计模式(MVC,COMMAND,FACADE)在电子商务上的应用,针对电子商务的特点结合这些模式将典型的MVC模式改进为MVCC模式并进一步改进为MVCFC模式,从而构建层次分明、结构清晰、重用性好的电子商务系统。 展开更多
关键词 设计模式 电子商务 软件重用 MODEL-VIEW-CONTROLLER COMMAND FACADE
下载PDF
基于AHP的威胁评估与排序模型研究 被引量:31
10
作者 唐雪松 郭立红 陈长喜 《微计算机信息》 北大核心 2006年第09X期35-38,共4页
层次分析法(AnalyticHierarchyProcess,简称AHP)把一个复杂问题表示为有序的递阶层次结构,通过定性判断和定量计算,将经验判断给予量化,对决策方案进行排序,是一种定性分析与定量分析相结合的决策分析方法,适用于多准则决策问题。通过... 层次分析法(AnalyticHierarchyProcess,简称AHP)把一个复杂问题表示为有序的递阶层次结构,通过定性判断和定量计算,将经验判断给予量化,对决策方案进行排序,是一种定性分析与定量分析相结合的决策分析方法,适用于多准则决策问题。通过仿真实验用AHP根据威胁程度的大小对敌空袭目标进行排序,介绍了威胁评估和排序的求解过程,以此提供敌空袭目标对我保卫目标或区域所构成的威胁等级。该方法有效地解决了对敌空中目标威胁评估与排序问题。 展开更多
关键词 层次分析法 威胁评估 威胁排序 COMMAND CONTROL COMMUNICATION & INTELLIGENCE
下载PDF
基于TCL的电路板原理图自动审查平台建设 被引量:2
11
作者 田野 赵保华 屈玉贵 《电子与信息学报》 EI CSCD 北大核心 2005年第1期158-160,共3页
该文提出了一种用TCL语言作为审查脚本语言构造原理图审查系统的系统框架。在该系统中,利用TCL语言的扩展性,制定了一套应用于原理图通用数据结构的TCL扩展命令,并在此基础上构建原理图规则库和自动审查执行器,实现了原理图的自动审查。
关键词 TCL(Tool COMMAND Language) 电路板原理图设计 通用数据结构 自动审查
下载PDF
基于GCL语言的测试用例生成方法 被引量:1
12
作者 丁佐华 JeffSanders +2 位作者 江明月 张娜 蒲戈光 《计算机学报》 EI CSCD 北大核心 2014年第12期2492-2504,共13页
提出一种基于GCL语言生成程序测试用例的形式化方法.程序的语义为测试用例的生成提供了基本框架,而由Hoare等人提供的规则保证了用例的正确性.作者的这种方法可被认为是一种严格的,自动生成测试用例的方法.这种方法的优点在于:所获得的... 提出一种基于GCL语言生成程序测试用例的形式化方法.程序的语义为测试用例的生成提供了基本框架,而由Hoare等人提供的规则保证了用例的正确性.作者的这种方法可被认为是一种严格的,自动生成测试用例的方法.这种方法的优点在于:所获得的测试用例都是可行的,在测试用例生成过程中可以避免状态爆炸问题,而且该方法可以延拓到任何目标语言.据此开发了一个基于Haskell语言的原型工具来支持作者的方法. 展开更多
关键词 测试用例 Guarded—Command—Language 执行树 条件计算 软件测试
下载PDF
两种设计模式及其在公众监督系统中的应用 被引量:3
13
作者 尚鲜连 陈静 《计算机与现代化》 2008年第7期40-42,共3页
设计模式描述了简单、可复用的软件解决方案的核心。本文对电子政务中公众监督系统的现状进行了研究,深入探讨了设计模式中State模式与Command模式的原理。针对公众监督系统设计中可复用性差和难以维护与扩展的不足,结合这些模式提出了... 设计模式描述了简单、可复用的软件解决方案的核心。本文对电子政务中公众监督系统的现状进行了研究,深入探讨了设计模式中State模式与Command模式的原理。针对公众监督系统设计中可复用性差和难以维护与扩展的不足,结合这些模式提出了一种将State模式与Command模式相结合的设计思路,并将该组合模式应用于公众监督系统的设计中,从而构建层次分明、结构清晰、重用性好的公众监督系统。 展开更多
关键词 设计模式 STATE模式 COMMAND模式 公众监督系统
下载PDF
在J2EE架构中数据对象的设计与实现 被引量:1
14
作者 王纲 周国红 +2 位作者 付长青 杨燕萍 王奭 《河北科技师范学院学报》 CAS 2007年第3期54-58,共5页
从数据流角度出发,基于MVC模式设计要求,对数据对象在不同层之间的传输和转换问题进行了深入分析,设计出基于对象化数据在不同层之间的实现思路,基于网络传输和跨平台性考虑,提出了VO和XAO的解决方案,并采用了COMMAND模式进行设计实现。
关键词 J2EE平台 数据传输和转换 COMMAND模式
下载PDF
基于反射的Command模式实现Undo/Redo 被引量:2
15
作者 张兴亮 《计算机应用》 CSCD 北大核心 2010年第A01期233-234,共2页
针对经典Command模式在实现Undo/Redo功能时的两个缺陷,提出了基于反射的Command模式实现Undo/Redo的设计思路和实现方法,给出了该方法的数据模型,说明了事务处理的过程。
关键词 反射 COMMAND模式 设计模式 UNDO/REDO
下载PDF
VB6.0中利用ADO对象实现数据库编程 被引量:8
16
作者 陈虹颐 何春 《甘肃科技》 2007年第4期53-55,100,共4页
ADO(ActiveX Data Object)是建立在OLE DB技术上的数据对象,使用ADO能对各种类型数据库进行灵活而高效地访问。本文主要介绍了ADO的三个核心对象Connection,Recordset和Command,并用这三个对象进行了编程示例和分析。
关键词 ADO CONNECTION RECORDSET Command数据库 编程
下载PDF
广灭灵(Command)防除大豆田杂草试验 被引量:1
17
作者 张文凤 何庸 《杂草科学》 1989年第1期10-13,共4页
广灭灵通用名为Fenoxan,化学名为2—(2—氯苯)甲基—4,4—二甲基—3—异(口恶)唑烷酮。系美国FMC公司近年开发的一种选择性除草剂。受农业部农药检定所委托,1986~1988年我所进行了广灭灵防除大豆杂草的试验。现将结果报告如下。一、材... 广灭灵通用名为Fenoxan,化学名为2—(2—氯苯)甲基—4,4—二甲基—3—异(口恶)唑烷酮。系美国FMC公司近年开发的一种选择性除草剂。受农业部农药检定所委托,1986~1988年我所进行了广灭灵防除大豆杂草的试验。现将结果报告如下。一、材料与方法 (一)供试药剂:72%广灭灵乳油;48%氟乐灵乳油(意大利产);70%赛克津可湿粉(西德拜耳公司产)。 (二)试验处理: 1.播前处理: 展开更多
关键词 广灭灵 COMMAND 杂草防除 大豆田 氟乐灵乳油 选择性除草剂 除草效果 播前处理 下茬作物 防除效果
下载PDF
基于设计模式的一种MVC框架的实现 被引量:10
18
作者 姚新文 王晓明 《计算机时代》 2005年第6期21-22,共2页
框架和设计模式是面向对象程序设计中的两个非常重要的概念。本文简单介绍了MVC框架和Observer、Command两种设计模式的基础理论。提出了一种基于这两种设计模式的构建MVC框架的方法,详述了它在Java语言环境下具体的实现过程,并用UML图... 框架和设计模式是面向对象程序设计中的两个非常重要的概念。本文简单介绍了MVC框架和Observer、Command两种设计模式的基础理论。提出了一种基于这两种设计模式的构建MVC框架的方法,详述了它在Java语言环境下具体的实现过程,并用UML图表示了所建立的MVC框架的基本结构。 展开更多
关键词 设计模式 MVC 框架 面向对象程序设计 OBSERVER COMMAND 基础理论 实现过程 语言环境 Java 本结构 图表示 UML
下载PDF
浅谈在ASP中调用SQL Server存储过程 被引量:3
19
作者 郭琳 《四川职业技术学院学报》 2006年第4期120-122,共3页
介绍使用存储过程的优点,以及在ASP中如何通过ADO对象的connection对象的execute方法调用带输入参数的存储过程和用command对象的execute方法调用带输入参数和输出参数的存储过程.
关键词 存储过程 ASP ADO CONNECTION COMMAND
下载PDF
VB中使用ADO对象模型编程访问数据库 被引量:3
20
作者 樊继 《牡丹江师范学院学报(自然科学版)》 2006年第4期13-14,共2页
介绍了使用ADO访问数据库的方法,通过简单的实例示范介绍如何使用ADO访问数据库,并对ADO可编程的对象集合进行了分析.
关键词 数据库访问方式 ADO CONNECTION对象 Command对象 RECORDSET对象
下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部