期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
建立健全企业双重预防机制的方法研究 被引量:1
1
作者 段伟明 胡新春 +1 位作者 张琦 王江 《工业安全与环保》 2024年第1期80-84,共5页
分析了企业在建设双重预防机制时存在的问题,有针对性地从组织机构、风险分级管理、隐患排查治理和信息化建设方面给出建立健全双重预防机制的方法和措施,可帮助企业更加准确、规范地建立健全和完善双重预防机制,为其全面提升安全绩效... 分析了企业在建设双重预防机制时存在的问题,有针对性地从组织机构、风险分级管理、隐患排查治理和信息化建设方面给出建立健全双重预防机制的方法和措施,可帮助企业更加准确、规范地建立健全和完善双重预防机制,为其全面提升安全绩效和确保安全生产提供技术支撑。 展开更多
关键词 双重预防机制 组织机构风险分级管控 隐患排查治理 信息化建设
下载PDF
微机控制系列课程的改革与实践
2
作者 王萍 《教学研究》 2002年第1期78-79,共2页
阐述了微机控制系列重点课程建设的改革思路,结合实际介绍了教学内容、教学方法、教材建设和实验室建设以及师资队伍建设等方面的做法。通过改革与实践,培养了学生计算机综合应用能力和科研思维方法。
关键词 实验室建设 师资建设 教学质量 课程设置 微机控制 重点课程建设 改革 科研思维 教学内容 教学方法 教材建设
下载PDF
On Dynamics and Nash Equilibriums of Networked Games 被引量:1
3
作者 Daizhan Cheng Tingting Xu +1 位作者 Fenghua He Hongsheng Qi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2014年第1期10-18,共9页
Networked noncooperative games are investigated,where each player(or agent) plays with all other players in its neighborhood. Assume the evolution is based on the fact that each player uses its neighbors current infor... Networked noncooperative games are investigated,where each player(or agent) plays with all other players in its neighborhood. Assume the evolution is based on the fact that each player uses its neighbors current information to decide its next strategy. By using sub-neighborhood, the dynamics of the evolution is obtained. Then a method for calculating Nash equilibriums from mixed strategies of multi-players is proposed.The relationship between local Nash equilibriums based on individual neighborhoods and global Nash equilibriums of overall network is revealed. Then a technique is proposed to construct Nash equilibriums of an evolutionary game from its one step static Nash equilibriums. The basic tool of this approach is the semi-tensor product of matrices, which converts strategies into logical matrices and payoffs into pseudo-Boolean functions, then networked evolutionary games become discrete time dynamic systems. 展开更多
关键词 NETWORKED NON-COOPERATIVE game local infor-mation sub-neighborhood fundamental EVOLUTIONARY equation NASH equilibrium
下载PDF
Green Networking Based Energy Efficient Communications 被引量:2
4
作者 Wang Wennai Mi Zhengkun Wang Bin 《China Communications》 SCIE CSCD 2012年第2期22-30,共9页
The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduc... The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduction to network virtualization techniques is given then and a virtual node embedding approach is provided.Finally,three kinds of enhanced green networking schemes by network virtualization are proposed,that is enhancement to sever virtualization,resource consolidation and Adaptive Link Rate(ALR).Examples are included to show the virtue of network virtualization to green networking in terms of energy efficient communications. 展开更多
关键词 energy efficient communications greennetworking network virtualization green of infor-mation and Communications Technology (ICT)
下载PDF
RDF(S) repository privacy protection via inference control
5
作者 薛金蓉 郑军 安秋生 《Journal of Beijing Institute of Technology》 EI CAS 2014年第4期495-501,共7页
The privacy protection of resource description framework (schema) (RDF(S) ) repository is an emerging topic in database security area. In this paper, entailment rules are investigated based on RDF(S) repositor... The privacy protection of resource description framework (schema) (RDF(S) ) repository is an emerging topic in database security area. In this paper, entailment rules are investigated based on RDF(S) repository firstly. Then, an idea that uses reasoning closure to judge whether the privacy disclosure caused by inference is existed is proposed. Furthermore, the definitions of impli- cation conditions and information measure of triple statements which gains data hiding algorithm with combining proposition logic reasoning theory are introduced. Meanwhile, a conversion method from conjunctive normal form to disjunctive normal form based minimal hitting sets of set cluster is aiso proposed. Finally, the experimental results show that our algorithm can prevent privacy disclosure of RDF(S) repository effectively. 展开更多
关键词 resource description framework (RDF) reasoning closure privacy disclosure infor-mation measure entailment rule minimal hitting set
下载PDF
Cross-modal learning using privileged information for long-tailed image classification
6
作者 Xiangxian Li Yuze Zheng +3 位作者 Haokai Ma Zhuang Qi Xiangxu Meng Lei Meng 《Computational Visual Media》 SCIE EI CSCD 2024年第5期981-992,共12页
The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-taile... The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-tailed image classification by rebalancing data,optimizing weights,and augmenting information.However,these methods often struggle to balance the performance between dominant and minority classes because of inadequate representation learning of the latter.To address these problems,we introduce descriptional words into images as cross-modal privileged information and propose a cross-modal enhanced method for long-tailed image classification,referred to as CMLTNet.CMLTNet improves the learning of intraclass similarity of tail-class representations by cross-modal alignment and captures the difference between the head and tail classes in semantic space by cross-modal inference.After fusing the above information,CMLTNet achieved an overall performance that was better than those of benchmark long-tailed and cross-modal learning methods on the long-tailed cross-modal datasets,NUS-WIDE and VireoFood-172.The effectiveness of the proposed modules was further studied through ablation experiments.In a case study of feature distribution,the proposed model was better in learning representations of tail classes,and in the experiments on model attention,CMLTNet has the potential to help learn some rare concepts in the tail class through mapping to the semantic space. 展开更多
关键词 long-tailed classification cross-modal learning representation learning privileged infor-mation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部