Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy...Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.展开更多
In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify ...In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify the efficiency of the proposed structure by solving the associate field distribution.The application of optimal single-relay selection method shows that full diversity gain with low complexity can be achieved.In this paper,the proposed technique using smart relays combines the aforementioned two methods to attain the benefits of both methods by achieving the highest coding and diversity gain and enhances the overall network performance in terms of bit error rate(BER).Moreover,we analytically prove the advantage of using the proposed technique.In our simulations,it can be shown that the proposed technique outperforms the best known state-of-the-art single relay selection technique.Furthermore,the BER expressions obtained from the theoretical analysis are perfectly matched to those obtained from the conducted simulations.展开更多
In large mines,single fan is usually not enough to ventilate all the working areas.Single mine-fan approach cannot be directly applied to multiple-fan networks because the present of multiple pressures and air quantit...In large mines,single fan is usually not enough to ventilate all the working areas.Single mine-fan approach cannot be directly applied to multiple-fan networks because the present of multiple pressures and air quantities associated with each fan in the network.Accordingly,each fan in a multiple-fan system has its own mine characteristic curve,or a subsystem curve.Under some consideration,the conventional concept of a mine characteristic curve of a single-fan system can be directly extended to that of a particular fan within a multiple-fan system.In this paper the mutual effect of the fans on each other and their effect on the stability of the ventilation network were investigated by Hardy Cross algorithm combined with a switching-parameters technique.To show the validity and reliability of this algorithm,the stability of the ventilation system of Abu-Tartur Mine(one of the largest underground mine in Egypt)has been studied.展开更多
Background:Supply chain finance(SCF)is a series of financial solutions provided by financial institutions to suppliers and customers facing demands on their working capital.As a systematic arrangement,SCF utilizes the...Background:Supply chain finance(SCF)is a series of financial solutions provided by financial institutions to suppliers and customers facing demands on their working capital.As a systematic arrangement,SCF utilizes the authenticity of the trade between(SMEs)and their“counterparties”,which are usually the leading enterprises in their supply chains.Because in these arrangements the leading enterprises are the guarantors for the SMEs,the credit levels of such counterparties are becoming important factors of concern to financial institutions’risk management(i.e.,commercial banks offering SCF services).Thus,these institutions need to assess the credit risks of the SMEs from a view of the supply chain,rather than only assessing an SME’s repayment ability.The aim of this paper is to research credit risk assessment models for SCF.Methods:We establish an index system for credit risk assessment,adopting a view of the supply chain that considers the leading enterprise’s credit status and the relationships developed in the supply chain.Furthermore,We conducted two credit risk assessment models based on support vector machine(SVM)technique and BP neural network respectly.Results:(1)The SCF credit risk assessment index system designed in this paper,which contained supply chain leading enterprise’s credit status and cooperative relationships between SMEs and leading enterprises,can help banks to raise their accuracy on predicting a small and medium enterprise whether default or not.Therefore,more SMEs can obtain loans from banks through SCF.(2)The SCF credit risk assessment model based on SVM is of good generalization ability and robustness,which is more effective than BP neural network assessment model.Hence,Banks can raise the accuracy of credit risk assessment on SMEs by applying the SVM model,which can alleviate credit rationing on SMEs.Conclusions:(1)The SCF credit risk assessment index system can solve the problem of banks incorrectly labeling a creditworthy enterprise as a default enterprise,and thereby improve the credit rating status in the process of SME financing.(2)By analyzing and comparing the empirical results,we find that the SVM assessment model,on evaluating the SME credit risk,is more effective than the BP neural network assessment model.This new assessment model based on SVM can raise the accuracy of classification between good credit and bad credit SMEs.(3)Therefore,the SCF credit risk assessment index system and the assessment model based on SVM,is the optimal combination for commercial banks to use to evaluate SMEs’credit risk.展开更多
As one of the most important urban lifeline systems,a water distribution system can be damaged under a strong earthquake,and the damage cannot easily be located,especially immediately after the event.This often causes...As one of the most important urban lifeline systems,a water distribution system can be damaged under a strong earthquake,and the damage cannot easily be located,especially immediately after the event.This often causes tremendous difficulties to post-earthquake emergency response and recovery activities.This paper proposes a methodology to locate seismic damage to a water distribution system by monitoring water head online at some nodes in the water distribution system.An artificial neural network-based inverse analysis method is developed to estimate the water head variations at all nodes that are not monitored based on the water head variations at the nodes that are monitored.The methodology provides a quick,effective,and practical way to locate seismic damage to a water distribution system.展开更多
Objective: To explore the core acupoints and combination rules of auricular acupoint therapy for simple obesity, and to further analyze the characteristics of the prescription of auricular acupoint therapy for simple...Objective: To explore the core acupoints and combination rules of auricular acupoint therapy for simple obesity, and to further analyze the characteristics of the prescription of auricular acupoint therapy for simple obesity.Methods: Relevant clinical study literature in recent 30 years in PubMed, China Biology Medicine disc(CBM), China National Knowledge Infrastructure(CNKI), Wan Fang Database. VIP Database and TCM Online Database was retrieved, and eligible articles were selected in order to build a prescription database of auricular acupoint therapy for simple obesity. On the basis of complex network techniques, the core acupoints and combination rules of auricular acupoint therapy for simple obesity were analyzed, and the characteristics of auricular acupoint therapy for simple obesity were analyzed comprehensively.Results: There were 46 network nodes of auricular acupoint. The top 16 core acupoints for auricular acupoint therapy for simple obesity included Nèifēnmì(内分泌CO18), Pí(脾CO13), Wèi(胃CO4), Sānjiāo(三焦CO17), Jīdiǎn(饥点).Shénmén(神门TF4). Dàcháng(大肠CO7). Pízhìxià(皮质下AT4). Fèi(肺CO14). Shèn(肾CO10). Jiāogǎn(交感AH6 a), Kǒu(口CO1),Gān(肝CO12). Xiǎocháng(小肠CO6) and Nǎo(脑). The combination of auricular acupoints was mainly based on the main indications of acupoints. The analysis of auricular acupoints combination indicated that the combination of CO4 with CO18 was applied most frequently, which was followed by the combinations of CO13 with CO18 and CO13 with C04. According to the analysis of auricular acupoint stimulation methods, ear point taping and pressing with Wángbùliúxíng(王不留行,Semen Vaccariae) seeds was used frequently, which was followed by magnetic beads taping and pressing and pyonex therapy. Auricular acupoint therapy combined with acupuncture for simple obesity was used most commonly, which was followed by auricular acupoint therapy combined with catgut embedment in acupoint and simple auricular acupoint therapy.Conclusion: In this study, the core acupoints and combinations of auricular acupoint therapy for simple obesity were explored effectively, and the pressing materials and major combined intervention methods were summarized and analyzed, thus providing references and treatment thoughts in terms of the point and prescription selection of auricular acupoint therapy for simple obesity.展开更多
A buffer sharing scheme need to meet many competing objectives like robustness to changes in traffic conditions, fairness, efficiency, implementation simplicity, etc. Of the existing techniques, Push Out (PO) is optim...A buffer sharing scheme need to meet many competing objectives like robustness to changes in traffic conditions, fairness, efficiency, implementation simplicity, etc. Of the existing techniques, Push Out (PO) is optimum in terms of overall cell loss performance, but its delay performance is worse than that of all other methods for the multiple space priority. Another scheme named Dynamic Threshold (DT) is robust and adaptive which has good delay performance. A hybrid technique named Dynamic Threshold wi...展开更多
This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme....This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme. The assembly mechanism, which is fit well to multi-class burst assembly, not only matches with IP QoS mechanism based on packet classification, and also utilizes fairly and efficiently assembly capacity. Based on token-bucket model and burst segment selective discard (BSSD), the offset-time scheme can smooth the traffic to support OBS QoS. The simulation results show that the technique can improve the performance in terms of packet loss probability (PLP).展开更多
This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test eq...This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test equipment, we have used principal and subordinate structures, and interconnected the host computer and the front-end machine via Ethernet. The front-end machine is based on the ARM7 (advanced reduced instruction set computing (RISC) machine) technique, the processor of which runs an embedded operating system, namely, uClinux OS. We have analyzed the system telecommunication, human-machine interface circuit, transmitter mandrel interface circuit, receiver mandrel interface circuit, and board-level test interface circuit. The software used in the system consists of the embedded front-computer software and the host application software. We have explained in detail the flow chart of the boot loader in the embedded front-computer software. The host application software is composed of four application subroutines, which match with the functional modules of the system hardware. A net communication program based on the server^client mode is implemented by means of socket programming and multi-thread programming. Test results indicate that the data transmission rate of the system is higher than 1 MB/s, which completely meets the current requirements of the data transmission rate between the tool system and the wireline telemetry device. Application of the debugging system, which includes multiple level test methods, shows that the proposed system can fully meet the test requirements of MPAL at various levels.展开更多
A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in ...A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in a coordinated way. Employing clustering techniques in such networks can achieve balanced energy consumption of member nodes and prolong the network lifetimes.In classical clustering techniques, clustering and in-cluster data routes are usually separated into independent operations. Although separate considerations of these two issues simplify the system design, it is often the non-optimal lifetime expectancy for wireless sensor networks. This paper proposes an integral framework that integrates these two correlated items in an interactive entirety. For that,we develop the clustering problems using nonlinear programming. Evolution process of clustering is provided in simulations. Results show that our joint-design proposal reaches the near optimal match between member nodes and cluster heads.展开更多
The connection number a+bi is a new kind of number in the Set Pair Analysis (SPA) theory. This paper applies it to network planning technique and considers the expressing, processing and controlling methods of the...The connection number a+bi is a new kind of number in the Set Pair Analysis (SPA) theory. This paper applies it to network planning technique and considers the expressing, processing and controlling methods of the synthetically uncertainties of the time limit caused by Fuzzy, random and indeterminate known factors by the connection number for a large\|scale project. The results illustrate that the new network planning and controlling method based on the connection number a+bi can provide more useful information such as primary critical paths, secondary critical paths and third critical paths etc. The new method is mroe flexible than the traditional method, and is more suitable to the practical application of project.展开更多
Time does not go backward.A negative duration,such as“time period”at first sight is difficult to interpret.Previous network techniques(CPM/PERT/PDM)did not support negative parameters and/or loops(potentially necess...Time does not go backward.A negative duration,such as“time period”at first sight is difficult to interpret.Previous network techniques(CPM/PERT/PDM)did not support negative parameters and/or loops(potentially necessitating recursive calculations)in the model because of the limited computing and data storage capabilities of early computers.Monsieur Roy and John Fondahl implicitly introduced negative weights into network techniques to represent activities with fixed or estimated durations(MPM/PDM).Subsequently,the introduction of negative lead and/or lag times by software developers(IBM)apparently overcome the limitation of not allowing negative time parameters in time model.Referring to general digraph(Event on Node)representation where activities are represented by pairs of nodes and pairwise relative time restrictions are represented by weighted arrows,we can release most restraints in constructing the graph structure(incorporating the dynamic model of the inner logic of time plan),and a surprisingly flexible and handy network model can be developed that provides all the advantages of the above-mentioned techniques.This paper aims to review the theoretical possibilities and technical interpretations(and use)of negative weights in network time models and discuss approximately 20 types of time-based restrictions among the activities of construction projects.We focus on pure relative time models,without considering other restrictions(such as calendar data,time-cost trade-off,resource allocation or other constraints).展开更多
基金partly supported by the University of Malaya Impact Oriented Interdisci-plinary Research Grant under Grant IIRG008(A,B,C)-19IISS.
文摘Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.
基金This work was supported by College of Engineering and Technology,the American University of the Middle East,Kuwait.Homepage:https://www.aum.edu.kw.
文摘In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify the efficiency of the proposed structure by solving the associate field distribution.The application of optimal single-relay selection method shows that full diversity gain with low complexity can be achieved.In this paper,the proposed technique using smart relays combines the aforementioned two methods to attain the benefits of both methods by achieving the highest coding and diversity gain and enhances the overall network performance in terms of bit error rate(BER).Moreover,we analytically prove the advantage of using the proposed technique.In our simulations,it can be shown that the proposed technique outperforms the best known state-of-the-art single relay selection technique.Furthermore,the BER expressions obtained from the theoretical analysis are perfectly matched to those obtained from the conducted simulations.
文摘In large mines,single fan is usually not enough to ventilate all the working areas.Single mine-fan approach cannot be directly applied to multiple-fan networks because the present of multiple pressures and air quantities associated with each fan in the network.Accordingly,each fan in a multiple-fan system has its own mine characteristic curve,or a subsystem curve.Under some consideration,the conventional concept of a mine characteristic curve of a single-fan system can be directly extended to that of a particular fan within a multiple-fan system.In this paper the mutual effect of the fans on each other and their effect on the stability of the ventilation network were investigated by Hardy Cross algorithm combined with a switching-parameters technique.To show the validity and reliability of this algorithm,the stability of the ventilation system of Abu-Tartur Mine(one of the largest underground mine in Egypt)has been studied.
基金sponsored by NSFC project(71372173、70972053)National Soft Science Research Project(2014GXS4D153)+6 种基金Specialized Research Fund of Ministry of Education for the Doctoral Project(20126118110017)Shaanxi Soft Science Research Project(2012KRZ13、2014KRM28-2、2013KRM08、2011KRM16)Shaanxi Social Science Funds projects(12D231,13D217)Xi’an Soft Science Research Program(SF1225-2)Shaanxi Department of Education Research Project(11JK0175)Shaanxi Department of Education Research Project(15JK1547)XAUT Teachers Scientific Research Foundation(107-211414).
文摘Background:Supply chain finance(SCF)is a series of financial solutions provided by financial institutions to suppliers and customers facing demands on their working capital.As a systematic arrangement,SCF utilizes the authenticity of the trade between(SMEs)and their“counterparties”,which are usually the leading enterprises in their supply chains.Because in these arrangements the leading enterprises are the guarantors for the SMEs,the credit levels of such counterparties are becoming important factors of concern to financial institutions’risk management(i.e.,commercial banks offering SCF services).Thus,these institutions need to assess the credit risks of the SMEs from a view of the supply chain,rather than only assessing an SME’s repayment ability.The aim of this paper is to research credit risk assessment models for SCF.Methods:We establish an index system for credit risk assessment,adopting a view of the supply chain that considers the leading enterprise’s credit status and the relationships developed in the supply chain.Furthermore,We conducted two credit risk assessment models based on support vector machine(SVM)technique and BP neural network respectly.Results:(1)The SCF credit risk assessment index system designed in this paper,which contained supply chain leading enterprise’s credit status and cooperative relationships between SMEs and leading enterprises,can help banks to raise their accuracy on predicting a small and medium enterprise whether default or not.Therefore,more SMEs can obtain loans from banks through SCF.(2)The SCF credit risk assessment model based on SVM is of good generalization ability and robustness,which is more effective than BP neural network assessment model.Hence,Banks can raise the accuracy of credit risk assessment on SMEs by applying the SVM model,which can alleviate credit rationing on SMEs.Conclusions:(1)The SCF credit risk assessment index system can solve the problem of banks incorrectly labeling a creditworthy enterprise as a default enterprise,and thereby improve the credit rating status in the process of SME financing.(2)By analyzing and comparing the empirical results,we find that the SVM assessment model,on evaluating the SME credit risk,is more effective than the BP neural network assessment model.This new assessment model based on SVM can raise the accuracy of classification between good credit and bad credit SMEs.(3)Therefore,the SCF credit risk assessment index system and the assessment model based on SVM,is the optimal combination for commercial banks to use to evaluate SMEs’credit risk.
基金National Natural Science Foundation of China under Grant No.59878032
文摘As one of the most important urban lifeline systems,a water distribution system can be damaged under a strong earthquake,and the damage cannot easily be located,especially immediately after the event.This often causes tremendous difficulties to post-earthquake emergency response and recovery activities.This paper proposes a methodology to locate seismic damage to a water distribution system by monitoring water head online at some nodes in the water distribution system.An artificial neural network-based inverse analysis method is developed to estimate the water head variations at all nodes that are not monitored based on the water head variations at the nodes that are monitored.The methodology provides a quick,effective,and practical way to locate seismic damage to a water distribution system.
基金Supported by special program of scientific research in Traditional Chinese Medicine in 2015(201507003)National Natural Science Foundation of China(81674081)~~
文摘Objective: To explore the core acupoints and combination rules of auricular acupoint therapy for simple obesity, and to further analyze the characteristics of the prescription of auricular acupoint therapy for simple obesity.Methods: Relevant clinical study literature in recent 30 years in PubMed, China Biology Medicine disc(CBM), China National Knowledge Infrastructure(CNKI), Wan Fang Database. VIP Database and TCM Online Database was retrieved, and eligible articles were selected in order to build a prescription database of auricular acupoint therapy for simple obesity. On the basis of complex network techniques, the core acupoints and combination rules of auricular acupoint therapy for simple obesity were analyzed, and the characteristics of auricular acupoint therapy for simple obesity were analyzed comprehensively.Results: There were 46 network nodes of auricular acupoint. The top 16 core acupoints for auricular acupoint therapy for simple obesity included Nèifēnmì(内分泌CO18), Pí(脾CO13), Wèi(胃CO4), Sānjiāo(三焦CO17), Jīdiǎn(饥点).Shénmén(神门TF4). Dàcháng(大肠CO7). Pízhìxià(皮质下AT4). Fèi(肺CO14). Shèn(肾CO10). Jiāogǎn(交感AH6 a), Kǒu(口CO1),Gān(肝CO12). Xiǎocháng(小肠CO6) and Nǎo(脑). The combination of auricular acupoints was mainly based on the main indications of acupoints. The analysis of auricular acupoints combination indicated that the combination of CO4 with CO18 was applied most frequently, which was followed by the combinations of CO13 with CO18 and CO13 with C04. According to the analysis of auricular acupoint stimulation methods, ear point taping and pressing with Wángbùliúxíng(王不留行,Semen Vaccariae) seeds was used frequently, which was followed by magnetic beads taping and pressing and pyonex therapy. Auricular acupoint therapy combined with acupuncture for simple obesity was used most commonly, which was followed by auricular acupoint therapy combined with catgut embedment in acupoint and simple auricular acupoint therapy.Conclusion: In this study, the core acupoints and combinations of auricular acupoint therapy for simple obesity were explored effectively, and the pressing materials and major combined intervention methods were summarized and analyzed, thus providing references and treatment thoughts in terms of the point and prescription selection of auricular acupoint therapy for simple obesity.
文摘A buffer sharing scheme need to meet many competing objectives like robustness to changes in traffic conditions, fairness, efficiency, implementation simplicity, etc. Of the existing techniques, Push Out (PO) is optimum in terms of overall cell loss performance, but its delay performance is worse than that of all other methods for the multiple space priority. Another scheme named Dynamic Threshold (DT) is robust and adaptive which has good delay performance. A hybrid technique named Dynamic Threshold wi...
基金This work was supported by National Hi-Tech Research and Development Program of China (863 Program) under contract No. 2002AA122021.
文摘This letter proposes a new burst assembly technique for supporting QoS in optical burst switching (OBS) networks. It consists of the adaptive-threshold burst assembly mechanism and QoS-based random offset-time scheme. The assembly mechanism, which is fit well to multi-class burst assembly, not only matches with IP QoS mechanism based on packet classification, and also utilizes fairly and efficiently assembly capacity. Based on token-bucket model and burst segment selective discard (BSSD), the offset-time scheme can smooth the traffic to support OBS QoS. The simulation results show that the technique can improve the performance in terms of packet loss probability (PLP).
基金supported by National Science Foundation of China (61102102, 11134011, 11204380 and 11374371)Major National Science and Technology Projects (2011ZX05020-002)+2 种基金PetroChina Innovation Foundation (2014D-5006-0307)Science and Technology Project of CNPC (2014A-3912 and 2011B-4001)the Foundation of China University of Petroleum (KYJJ2012-05-07)
文摘This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test equipment, we have used principal and subordinate structures, and interconnected the host computer and the front-end machine via Ethernet. The front-end machine is based on the ARM7 (advanced reduced instruction set computing (RISC) machine) technique, the processor of which runs an embedded operating system, namely, uClinux OS. We have analyzed the system telecommunication, human-machine interface circuit, transmitter mandrel interface circuit, receiver mandrel interface circuit, and board-level test interface circuit. The software used in the system consists of the embedded front-computer software and the host application software. We have explained in detail the flow chart of the boot loader in the embedded front-computer software. The host application software is composed of four application subroutines, which match with the functional modules of the system hardware. A net communication program based on the server^client mode is implemented by means of socket programming and multi-thread programming. Test results indicate that the data transmission rate of the system is higher than 1 MB/s, which completely meets the current requirements of the data transmission rate between the tool system and the wireline telemetry device. Application of the debugging system, which includes multiple level test methods, shows that the proposed system can fully meet the test requirements of MPAL at various levels.
基金supported by National Natural Science Foundation of China(Nos.61304131 and 61402147)Grant of China Scholarship Council(No.201608130174)+2 种基金Natural Science Foundation of Hebei Province(Nos.F2016402054 and F2014402075)the Scientific Research Plan Projects of Hebei Education Department(Nos.BJ2014019,ZD2015087 and QN2015046)the Research Program of Talent Cultivation Project in Hebei Province(No.A2016002023)
文摘A heterogeneous wireless sensor network comprises a number of inexpensive energy constrained wireless sensor nodes which collect data from the sensing environment and transmit them toward the improved cluster head in a coordinated way. Employing clustering techniques in such networks can achieve balanced energy consumption of member nodes and prolong the network lifetimes.In classical clustering techniques, clustering and in-cluster data routes are usually separated into independent operations. Although separate considerations of these two issues simplify the system design, it is often the non-optimal lifetime expectancy for wireless sensor networks. This paper proposes an integral framework that integrates these two correlated items in an interactive entirety. For that,we develop the clustering problems using nonlinear programming. Evolution process of clustering is provided in simulations. Results show that our joint-design proposal reaches the near optimal match between member nodes and cluster heads.
文摘The connection number a+bi is a new kind of number in the Set Pair Analysis (SPA) theory. This paper applies it to network planning technique and considers the expressing, processing and controlling methods of the synthetically uncertainties of the time limit caused by Fuzzy, random and indeterminate known factors by the connection number for a large\|scale project. The results illustrate that the new network planning and controlling method based on the connection number a+bi can provide more useful information such as primary critical paths, secondary critical paths and third critical paths etc. The new method is mroe flexible than the traditional method, and is more suitable to the practical application of project.
基金This work was supported by the Hungarian National Research,Development and Innovation Fund(TUDFO/51757/2019-ITM,Thematic Excellence Program).Open access flinding provided by Budapest University of Technology and Economics.
文摘Time does not go backward.A negative duration,such as“time period”at first sight is difficult to interpret.Previous network techniques(CPM/PERT/PDM)did not support negative parameters and/or loops(potentially necessitating recursive calculations)in the model because of the limited computing and data storage capabilities of early computers.Monsieur Roy and John Fondahl implicitly introduced negative weights into network techniques to represent activities with fixed or estimated durations(MPM/PDM).Subsequently,the introduction of negative lead and/or lag times by software developers(IBM)apparently overcome the limitation of not allowing negative time parameters in time model.Referring to general digraph(Event on Node)representation where activities are represented by pairs of nodes and pairwise relative time restrictions are represented by weighted arrows,we can release most restraints in constructing the graph structure(incorporating the dynamic model of the inner logic of time plan),and a surprisingly flexible and handy network model can be developed that provides all the advantages of the above-mentioned techniques.This paper aims to review the theoretical possibilities and technical interpretations(and use)of negative weights in network time models and discuss approximately 20 types of time-based restrictions among the activities of construction projects.We focus on pure relative time models,without considering other restrictions(such as calendar data,time-cost trade-off,resource allocation or other constraints).