期刊文献+
共找到25,742篇文章
< 1 2 250 >
每页显示 20 50 100
Security Policy Management Process within Six Sigma Framework
1
作者 Vijay Anand Jafar Saniie Erdal Oruklu 《Journal of Information Security》 2012年第1期49-58,共10页
This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models... This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management. 展开更多
关键词 SECURITY management SECURITY Process policy THREAT SIX SIGMA
下载PDF
Mapping Climate Services for Disaster Risk Management: A Systematic Review and Research Gaps from a Policy Process Perspective
2
作者 Aboubacar Issaka Ousman Gaoh Wolfram Laube +1 位作者 Georges Abbevi Abbey Moussa Waongo 《American Journal of Climate Change》 2024年第2期314-360,共47页
Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains... Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains, particularly agriculture, to maximize their potential, it is crucial to identify emerging priority areas and existing research gaps for future research agendas. As a contribution to this effort, this paper employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to review the state-of-the-art in the field of climate services for disaster risk management. A comprehensive search across five literature databases combined with a snowball search method using ResearchRabbit was conducted and yielded 242 peer-reviewed articles, book sections, and reports over 2013-2023 after the screening process. The analysis revealed flood, drought, and food insecurity as major climate-related disasters addressed in the reviewed literature. Major climate services addressed included early warning systems, (sub)seasonal forecasts and impact-based warnings. Grounded in the policy processes’ theoretical perspective, the main focus identified and discussed three prevailing policy-oriented priority areas: 1) development of climate services, 2) use-adoption-uptake, and 3) evaluation of climate services. In response to the limitations of the prevalent supply-driven and top-down approach to climate services promotion, co-production emerges as a cross-cutting critical aspect of the identified priority areas. Despite the extensive research in the field, more attention is needed, particularly pronounced in the science-policy interface perspective, which in practice bridges scientific knowledge and policy decisions for effective policy processes. This perspective offers a valuable analytical lens as an entry point for further investigation. Hence, future research agendas would generate insightful evidence by scrutinizing this critical aspect given its importance to institutions and climate services capacity, to better understand intricate facets of the development and the integration of climate services into disaster risk management. 展开更多
关键词 Climate Services Disaster Risk management policy Process Science-policy Interface Institutional Analysis
下载PDF
Application Research of Computer Network Technology in Mining Railway Transport Management System 被引量:2
3
作者 余静 王振军 才庆祥 《Journal of China University of Mining and Technology》 2002年第1期57-60,共4页
This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development conditi... This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given. 展开更多
关键词 mining railway transport management computer network SECURITY reliability
下载PDF
Sustainability policy considerations for ecosystem management in Central and Eastern Europe 被引量:2
4
作者 Fikret Berkes 《Ecosystem Health and Sustainability》 SCIE 2016年第8期16-21,共6页
Here I discuss Central and Eastern European(CEE)countries as a region undergoing rapid change,resulting from the collapse of the Soviet Union and admission of some of the states into the European Union.These events br... Here I discuss Central and Eastern European(CEE)countries as a region undergoing rapid change,resulting from the collapse of the Soviet Union and admission of some of the states into the European Union.These events brought changes in governance and ecosystem management,triggering impacts on land use and biodiversity.What are some of the policy options toward sustainability in the face of these political,governance,and socioeconomic changes?Some policy considerations for ecosystem management and sustainability include taking a social-ecological systems approach to integrate biophysical subsystems and social subsystems;paying attention to institutions relevant to shared resources(commons)management;and using resilience theory to study change and guidance for governance.Documented experience in CEE seems to indicate shortcomings for both the centralized state management option and the purely market-driven option for ecosystem management.If so,a“smart mix”of state regulations,market incentives,and self-governance using local commons institutions may be the most promising policy option to foster ecosystem stewardship at multiple levels from local to international. 展开更多
关键词 BIODIVERSITY Central and Eastern Europe commons institutions governance land use policy options resilience social-ecological systems Special Feature:Ecosystem management in Transition in Central and Eastern Europe
原文传递
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
5
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
下载PDF
A Self-Attention Based Dynamic Resource Management for Satellite-Terrestrial Networks
6
作者 Lin Tianhao Luo Zhiyong 《China Communications》 SCIE CSCD 2024年第4期136-150,共15页
The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power suppor... The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks. 展开更多
关键词 mobile edge computing resource management satellite-terrestrial networks self-attention
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
7
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
AI-Driven Learning Management Systems:Modern Developments, Challenges and Future Trends during theAge of ChatGPT
8
作者 Sameer Qazi Muhammad Bilal Kadri +4 位作者 Muhammad Naveed Bilal AKhawaja Sohaib Zia Khan Muhammad Mansoor Alam Mazliham Mohd Su’ud 《Computers, Materials & Continua》 SCIE EI 2024年第8期3289-3314,共26页
COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of en... COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of entire nations had shifted to online education during this time.Many shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of LMSs.This paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user experience.The AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based chatbots.Session layer enhancements are also required,such as AI-based online proctoring and user authentication using Biometrics.These extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of AI-algorithms.It also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics. 展开更多
关键词 Learning management systems chatbots ChatGPT online education Internet of Things(IoT) artificial intelligence(AI) convolutional neural networks natural language processing
下载PDF
CifNet Network Multi-Well Data Management System 被引量:11
9
作者 LiNing Mingchao CuiJian WangJianqiang WangCaizhi 《Applied Geophysics》 SCIE CSCD 2004年第2期129-131,共3页
The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing ... The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3,ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented. 展开更多
关键词 MULTI-WELL network data management CifNet
下载PDF
A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks 被引量:7
10
作者 Alanoud Alhussain Heba Kurdi Lina Altoaimy 《Computers, Materials & Continua》 SCIE EI 2019年第6期805-815,共11页
Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.... Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems. 展开更多
关键词 Trust management neural networks peer to peer machine learning edge devices
下载PDF
A Utility-Based Buffer Management Policy for Improving Data Dissemination in Opportunistic Networks 被引量:5
11
作者 Jiansheng Yao Chunguang Ma +2 位作者 Haitao Yu Yanling Liu Qi Yuan 《China Communications》 SCIE CSCD 2017年第7期118-126,共9页
In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management str... In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management strategy(UBM) for data dissemination in opportunistic networks. In UBM, we first design a method of computing the utility values of caching messages according to the interest of nodes and the delivery probability of messages, and then propose an overall buffer management policy based on the utility. UBM driven by receivers completely implements not only caching policies, passive and proactive dropping policies, but also scheduling policies of senders. Simulation results show that, compared with some classical dropping strategies, UBM can obtain higher delivery ratio and lower delay latency by using smaller network cost. 展开更多
关键词 opportunistic networks data dissemination buffer management strategy utility-based
下载PDF
A Parking Management System Based on Wireless Sensor Network 被引量:3
12
作者 BI Yan-Zhong SUN Li-Min +2 位作者 ZHU Hong-Song YAN Ting-Xin LUO Zheng-Jun 《自动化学报》 EI CSCD 北大核心 2006年第6期968-977,共10页
This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink... This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink node and a management station. All the nodes exchange information with each other through wireless communication. The prototype of the parking management system has been implemented and the preliminary test results show that the performance of the system can satisfy the requirements of the application. 展开更多
关键词 Wireless sensor network APPLICATION parking management parking guidance
下载PDF
Application Research and Implementation of the CORBA-Based Web Distributed Network Management System 被引量:3
13
作者 WANGFeng SHIBing-xin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期699-705,共7页
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite... The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering. 展开更多
关键词 distributed Web network management CORBA JAVA
下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
14
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
下载PDF
Systemic risk management and investment analysis with financial network analytics:research opportunities and challenges 被引量:3
15
作者 Daning Hu Gerhard Schwabe Xiao Li 《Financial Innovation》 2015年第1期2-10,共9页
Recent economic crises like the 2008 financial tsunami has demonstrated a critical need for better understanding of the topologies and various economic,social,and technical mechanisms of the increasingly interconnecte... Recent economic crises like the 2008 financial tsunami has demonstrated a critical need for better understanding of the topologies and various economic,social,and technical mechanisms of the increasingly interconnected global financial system.Such a system largely relies on the interconnectedness of various financial entities such as banks,firms,and investors through complex financial relationships such as interbank payment networks,investment relations,or supply chains.A network-based perspective or approach is needed to study various financial networks in order to improve or extend financial theories,as well as develop business applications.Moreover,with the advance of big data related technologies,and the availability of huge amounts of financial and economic network data,advanced computing technologies and data analytics that can comprehend such big data are also needed.We referred this approach as financial network analytics.We suggest that it will enable stakeholders better understand the network dynamics within the interconnected global financial system and help designing financial policies such as managing and monitoring banking systemic risk,as well as developing intelligent business applications like banking advisory systems.In this paper,we review the existing research about financial network analytics and then discuss its main research challenges from the economic,social,and technological perspectives. 展开更多
关键词 Financial network analytics Risk management Investment analysis
下载PDF
Policy-based Softswitch System Management 被引量:1
16
作者 LIYa-bo SUSen CHENJun-liang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第2期19-25,共7页
This paper presents the design and implementation of the policy management layer of the softswitch system, which is currently under development in our lab. The distinguish key feature of our policy management subsyste... This paper presents the design and implementation of the policy management layer of the softswitch system, which is currently under development in our lab. The distinguish key feature of our policy management subsystem is that the Parlay policy management architecture and the specific technical requirements of softswitch system management are closely incorporated. In this way, not only network providers but also authorized 3rd party application providers and application developers can develop services and applications to manage the access and use of network resources on a per user or application basis to best support established business objectives. The material presented in this document is heavily based on the work of Parlay policy management and IETF policy framework working group. 展开更多
关键词 policy-based network management PCIM SOFTSWITCH next generation network
原文传递
A Scalable Policy and SNMP Based Network Management Framework 被引量:2
17
作者 刘素平 丁永生 《Journal of Donghua University(English Edition)》 EI CAS 2009年第2期143-146,共4页
Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems mana... Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems management.However,cross-vendor hardware compatibility is one of the limitations in policy-based management.Devices existing in current network mostly support SNMP rather than Common Open Policy Service(COPS)protocol.By analyzing traditional network management and policy-based network management,a scalable network management framework is proposed.It is combined with Internet Engineering Task Force(IETF)framework for policy-based management and SNMP-based network management.By interpreting and translating policy decision to SNMP message,policy can be executed in traditional SNMP-based device. 展开更多
关键词 policy-based management SNMP Common Open policy Service policy in f ormation base
下载PDF
Review of China's policy and management system for the paid use of sea area Feng 被引量:1
18
作者 Feng Li Zenglei Xi Xiangbo Liang 《Chinese Journal of Population,Resources and Environment》 2019年第1期58-66,共9页
As a carrier to develop various marine resources, sea area is regulated as a kind of important resources through legislation by many coastal countries with a management system for the paid use of sea area. Since the e... As a carrier to develop various marine resources, sea area is regulated as a kind of important resources through legislation by many coastal countries with a management system for the paid use of sea area. Since the early 1990s, China has begun to implement the paid use and formed an institutional system comprised of three levels after developing it for more than two decades. From 2002 to 2015, the Chinese Government transferred the use right of sea area of 33,910 km2 by paid use and levied a total of 75.89 billion CNY (11.328 billion US dollars) of sea area use payment. Apart from this, the Government has gained rich experience in operating and managing the compensable use of sea area. After retrospectively analyzing the development history of paid use of China’s sea area, the research presents an institutional structure and the implementation of the management system for the paid use of sea area and the main problems therein. On this basis, management policies and feasible policy suggestions are proposed. Research results from this study can provide available references for other developing countries and emerging economies to apply and improve native management system for the paid use of sea area. 展开更多
关键词 PAID USE SEA area policy management system China
下载PDF
Construction of Network Management Information System of Agricultural Products Supply Chain Based on 3PLs 被引量:3
19
作者 GAO Shu-jin,YANG Qing-xian College of Economics and Management,Sichuan Agricultural University,Ya’an 625014,China 《Asian Agricultural Research》 2010年第10期57-59,64,共4页
The necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed,showing that 3PLs can improve the overall competitive advantage of agricultural supply chain.3PLs chan... The necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed,showing that 3PLs can improve the overall competitive advantage of agricultural supply chain.3PLs changes the homogeneity management into specialized management of logistics service and achieves the alliance of the subjects at different nodes of agricultural products supply chain.Network management information system structure of agricultural products supply chain based on 3PLs is constructed,including the four layers (the network communication layer,the hardware and software environment layer,the database layer,and the application layer) and 7 function modules (centralized control,transportation process management,material and vehicle scheduling,customer relationship,storage management,customer inquiry,and financial management).Framework for the network management information system of agricultural products supply chain based on 3PLs is put forward.The management of 3PLs mainly includes purchasing management,supplier relationship management,planning management,customer relationship management,storage management and distribution management.Thus,a management system of internal and external integrated agricultural enterprises is obtained.The network management information system of agricultural products supply chain based on 3PLs has realized the effective sharing of enterprise information of agricultural products supply chain at different nodes,establishing a long-term partnership revolving around the 3PLs core enterprise,as well as a supply chain with stable relationship based on the supply chain network system,so as to improve the circulation efficiency of agricultural products,and to explore the sales market for agricultural products. 展开更多
关键词 3PLs(third PARTY logistics) AGRICULTURAL PRODUCTS
下载PDF
Development of Trees Management System Using Radial Basis Function Neural Network for Rain Forecast 被引量:1
20
作者 Hasnul Auzani Khairusy Syakirin Has-Yun Farah Aniza Mohd Nazri 《Computational Water, Energy, and Environmental Engineering》 2022年第1期1-10,共10页
Agriculture and farming are mainly dependent on weather especially in Malaysia as it received heavy rainfall throughout the years. An efficient crop or tree management system with a weather forecast needed for suitabl... Agriculture and farming are mainly dependent on weather especially in Malaysia as it received heavy rainfall throughout the years. An efficient crop or tree management system with a weather forecast needed for suitable planning of farming operation. Radial Basis Function Neural Network (RBFNN) algorithm was used in this study to predict rainfall and the main focus of this study is to analyze the factor that affect</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">s</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> the performance of neural model. This study found that the model works better the more hidden nodes and the optimum learning rate is 0.01 with the RMSE 49% and the percentage accuracy is 57%. Besides that, it is found that the meteorology data also affect the model performance. Future research can be conducted to improve the rainfall forecast of this study and improv</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">e</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> the tree management system. 展开更多
关键词 Tree management Radial Basis Function Rain Prediction Artificial Neural network
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部