期刊文献+
共找到2,612篇文章
< 1 2 131 >
每页显示 20 50 100
基于voting集成的智能电能表故障多分类方法
1
作者 肖宇 黄瑞 +3 位作者 刘谋海 刘小平 袁明 高云鹏 《电测与仪表》 北大核心 2024年第7期197-203,共7页
为提升智能电能表故障准确分类能力,助力维护人员迅速排除故障,提出基于投票法voting集成的智能电能表故障多分类方法。针对实际智能电能表故障数据进行编码预处理,基于皮尔逊系数法筛选智能电能表故障分类关键影响因素,结合合成少数类... 为提升智能电能表故障准确分类能力,助力维护人员迅速排除故障,提出基于投票法voting集成的智能电能表故障多分类方法。针对实际智能电能表故障数据进行编码预处理,基于皮尔逊系数法筛选智能电能表故障分类关键影响因素,结合合成少数类过采样技术(synthetic minority oversampling technique, SMOTE)算法解决数据类别不平衡问题,由此建立模型所需数据集,再通过投票法进行模型融合,结合粒子群PSO(particle swarm optimization)确定各基模型的权重,据此构建基于极限梯度提升树(extreme gradient boosting trees, XGBT)、K近邻(k-nearest neighbor, KNN)和朴素贝叶斯(naive bayes, NB)模型的智能电能表故障多分类方法。实测实验结果表明:所提出方法能有效实现智能电能表的故障快速准确分类,与现有方法相比,在智能电能表的故障分类精确率、召回率及F1-Score均有明显提升。 展开更多
关键词 智能电能表 故障分类 voting集成 粒子群寻优 多分类
下载PDF
Density Clustering Algorithm Based on KD-Tree and Voting Rules
2
作者 Hui Du Zhiyuan Hu +1 位作者 Depeng Lu Jingrui Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期3239-3259,共21页
Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets withuneven density. Additionally, they incur substantial computational costs when applied to high-dimensional... Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets withuneven density. Additionally, they incur substantial computational costs when applied to high-dimensional datadue to calculating similarity matrices. To alleviate these issues, we employ the KD-Tree to partition the dataset andcompute the K-nearest neighbors (KNN) density for each point, thereby avoiding the computation of similaritymatrices. Moreover, we apply the rules of voting elections, treating each data point as a voter and casting a votefor the point with the highest density among its KNN. By utilizing the vote counts of each point, we develop thestrategy for classifying noise points and potential cluster centers, allowing the algorithm to identify clusters withuneven density and complex shapes. Additionally, we define the concept of “adhesive points” between two clustersto merge adjacent clusters that have similar densities. This process helps us identify the optimal number of clustersautomatically. Experimental results indicate that our algorithm not only improves the efficiency of clustering butalso increases its accuracy. 展开更多
关键词 Density peaks clustering KD-TREE K-nearest neighbors voting rules
下载PDF
A Framework for e-Voting System Based on Blockchain and Distributed Ledger Technologies
3
作者 Shahid Hussain Danwar Javed Ahmed Mahar Aneela Kiran 《Computers, Materials & Continua》 SCIE EI 2022年第7期417-440,共24页
Election allows the voter of a country to select the most suitable group of candidates to run the government.Election in Pakistan is simply paper-based method but some certain political and socio-economic issues turn ... Election allows the voter of a country to select the most suitable group of candidates to run the government.Election in Pakistan is simply paper-based method but some certain political and socio-economic issues turn that simple process in complicated and disputes once.Solutions of such problems are consisting of many methods including the e-voting system.The e-voting system facilitates the voters to cast their votes by electronic means with very easy and convenient way.This also allows maintaining the security and secrecy of the voter along with election process.Electronic voting reduces the human-involvement throughout the process from start to the end.Such system is not established yet in Pakistan.Hence,every election is disputed always.In this paper we proposed the framework of an e-voting system and simulation with the use of blockchain ledger technology.The proposed framework owns the capacity to deal with ballots in Pakistan.The novelty of the framework is that the e-voting system is linked to National Database and Registration Authority(NADRA)database which assures voter’s validation.The fundamental requirements were kept in consideration during the performance evaluation of the system.The results are processed and depicted specially with reference to the number of voters and voting stations,real time of vote casting,network bandwidth and controlling principles.The results support the decision makers and guide them in the foundation and customization of an e-voting system in Pakistan. 展开更多
关键词 Simulation modeling e-voting system blockchain technology distributed ledger
下载PDF
Development of a General-Purpose E-Voting Server
4
作者 De Su Yuichi Goto Jingde Cheng 《Journal of Computer and Communications》 2014年第2期97-100,共4页
Voting is a general and indispensable method, and widely used to express a choice or preference, to elect a person, or to choose an opinion by ballot in education, enterprise, medicine, and government.?Until now, vari... Voting is a general and indispensable method, and widely used to express a choice or preference, to elect a person, or to choose an opinion by ballot in education, enterprise, medicine, and government.?Until now, various E-voting schemes are proposed in the world but they are different from each other. There is no system that can provide users with E-voting services anytime and anywhere such that one can use E-voting servers without even thinking about them.?Therefore, an E-voting system for general-purpose is demanded. To support any kinds of vote, we divide voting system into components, and make different assembly of those components for different kinds of voting. 展开更多
关键词 COMPONENT e-voting
下载PDF
Securing a Scalable E-Voting System Using the RSA Algorithm: The Case of a Group Voting Process in a Tertiary School
5
作者 Stephen Gbenga Fashoto Michael Adeyeye +1 位作者 Faith-Michael Emeka Uzoka Fatima Hamza Usthman 《Computer Technology and Application》 2016年第1期11-27,共17页
E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth ... E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth of computer technologies and advances in cryptographic techniques, E-voting is now an applicable alternative for many non-governmental elections. However, security demands are paramount to electoral process in political arena. It was revealed that researchers show little interest in robustness of E-voting system compared to other E-voting requirements [1]. This paper shows that RSA (Ron Rivest, Adi Shamir and Leonard Adleman) cryptography algorithm can be incorporated into E-voting process as a whole. The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes. The performance of the cryptography algorithm is tested on a university E-voting system over a public network. The E-voting process is initiated by a server system that other computer nodes are connected to. The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number. The system performs consistently and reliably which in return gives good level of confidence of votes count. 展开更多
关键词 CRYPTOGRAPHY RSA algorithm e-voting paper ballot
下载PDF
E-voting system using cloud-based hybrid blockchain technology
6
作者 Beulah Jayakumari S Lilly Sheeba +4 位作者 Maya Eapen Jani Anbarasi Vinayakumar Ravi A.Suganya Malathy Jawahar 《Journal of Safety Science and Resilience》 EI CSCD 2024年第1期102-109,共8页
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election processes.During pandemic situations,citizens tend to develop panic about ... With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election processes.During pandemic situations,citizens tend to develop panic about mass gatherings,which may influence the decrease in the number of votes.This urges a reliable,flexible,transparent,secure,and cost-effective voting system.The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system,and it is carried out in three phases:the registration phase,vote casting phase and vote counting phase.A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases.Using smart contracts,third-party interventions are eliminated,and the transactions are secured in the blockchain network.Finally,to provide accurate voting results,the practical Byzantine fault tolerance(PBFT)consensus mechanism is adopted to ensure that the vote has not been modified or corrupted.Hence,the overall performance of the proposed system is significantly better than that of the existing system.Further performance was analyzed based on authentication delay,vote alteration,response time,and latency. 展开更多
关键词 e-voting CLOUD Blockchain Smart contract Consensus mechanism
原文传递
Ensemble Voting-Based Anomaly Detection for a Smart Grid Communication Infrastructure 被引量:1
7
作者 Hend Alshede Laila Nassef +1 位作者 Nahed Alowidi Etimad Fadel 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3257-3278,共22页
Advanced Metering Infrastructure(AMI)is the metering network of the smart grid that enables bidirectional communications between each consumer’s premises and the provider’s control center.The massive amount of data ... Advanced Metering Infrastructure(AMI)is the metering network of the smart grid that enables bidirectional communications between each consumer’s premises and the provider’s control center.The massive amount of data collected supports the real-time decision-making required for diverse applications.The communication infrastructure relies on different network types,including the Internet.This makes the infrastructure vulnerable to various attacks,which could compromise security or have devastating effects.However,traditional machine learning solutions cannot adapt to the increasing complexity and diversity of attacks.The objective of this paper is to develop an Anomaly Detection System(ADS)based on deep learning using the CIC-IDS2017 dataset.However,this dataset is highly imbalanced;thus,a two-step sampling technique:random under-sampling and the Synthetic Minority Oversampling Technique(SMOTE),is proposed to balance the dataset.The proposed system utilizes a multiple hidden layer Auto-encoder(AE)for feature extraction and dimensional reduction.In addition,an ensemble voting based on both Random Forest(RF)and Convolu-tional Neural Network(CNN)is developed to classify the multiclass attack cate-gories.The proposed system is evaluated and compared with six different state-of-the-art machine learning and deep learning algorithms:Random Forest(RF),Light Gradient Boosting Machine(LightGBM),eXtreme Gradient Boosting(XGboost),Convolutional Neural Network(CNN),Long Short-Term Memory(LSTM),and bidirectional LSTM(biLSTM).Experimental results show that the proposed model enhances the detection for each attack class compared with the other machine learning and deep learning models with overall accuracy(98.29%),precision(99%),recall(98%),F_(1) score(98%),and the UNDetection rate(UND)(8%). 展开更多
关键词 Advanced metering infrastructure smart grid cyberattack ensemble voting anomaly detection system CICIDS2017
下载PDF
基于Voting机制的IMA-BP不平衡数据分类算法 被引量:2
8
作者 黄富幸 韩文花 《科学技术与工程》 北大核心 2023年第27期11698-11705,共8页
针对传统分类模型在实际应用中对提取到的不平衡数据特征进行分类时分类结果精度低的问题,提出使用蜉蝣算法(mayfly algorithm,MA)优化的反向传播(back propogation,BP)神经网络分类模型。同时为了提升算法前期全局搜索能力和后期局部... 针对传统分类模型在实际应用中对提取到的不平衡数据特征进行分类时分类结果精度低的问题,提出使用蜉蝣算法(mayfly algorithm,MA)优化的反向传播(back propogation,BP)神经网络分类模型。同时为了提升算法前期全局搜索能力和后期局部搜索能力,引入阻尼比系数和非线性惯性权重因子,构建出改进蜉蝣算法(improved mayfly algorithm,IMA)优化的BP神经网络(IMA-BP)分类器。根据该分类器分类具有随机的特点,引入集成学习中的投票(Voting)机制,将IMA-BP作为弱分类器,将各弱分类器的分类结果通过软投票方法融合,构成了一个Voting机制的IMA-BP分类模型。为验证分类模型的性能,使用UCI数据库中的数据集将该模型与其他的模型进行比较,结果表明Voting机制的IMA-BP分类模型对4个数据集的分类准确率分别为88.67%、96.67%、91.25%、93.52%,都要高于其他模型,说明该分类模型具有较好准确性和可行性,对一些分类任务具有较强的指导作用和应用价值。 展开更多
关键词 神经网络 蜉蝣算法 阻尼比系数 非线性惯性权重因子 投票机制
下载PDF
基于Voting和Stacking集成算法的岩爆倾向性预测
9
作者 王凯 李子彬 《化工矿物与加工》 CAS 2023年第10期56-61,共6页
岩爆是矿山深部开采中常见的地质灾害,准确预测岩爆可降低矿山生产安全风险。将机器学习应用于岩爆预测是切实可行的,但仅用一种方法或将几种方法简单结合对于提高岩爆预测的准确性或泛化性作用十分有限。基于此,将最大切向应力、应力... 岩爆是矿山深部开采中常见的地质灾害,准确预测岩爆可降低矿山生产安全风险。将机器学习应用于岩爆预测是切实可行的,但仅用一种方法或将几种方法简单结合对于提高岩爆预测的准确性或泛化性作用十分有限。基于此,将最大切向应力、应力集中系数、脆性系数、弹性能量指数等作为指标,利用231组有效岩爆数据,基于Voting和Stacking集成算法,融合精确率较高的6种基础分类器(LR、RF、SVM、DT、KNN、GNB),建立了4个集成分类器V 1、V 2、S 1和S 2。根据预测结果的混淆矩阵计算了精确率、准确率、召回率及F 1分数,对各分类器性能进行了评估,结果表明:基础分类器中SVM、RF对Ⅰ级、Ⅱ级样本较敏感,KNN对Ⅲ级、Ⅳ级样本更敏感;RF、SVM整体预测效果最好,精确率分别为0.93、0.94;集成分类器相对于基础分类器性能均有不同程度的提升,但受性能较差的基础分类器及投票机制影响,Voting集成分类器整体性能弱于Stacking集成分类器;4个集成分类器中S 1性能提升最显著,预测效果最佳,精确率、准确率、召回率、F 1分数分别为0.95、0.97、0.96、0.95;将基于Stacking算法构建的集成分类器S 1应用于秦岭隧道的岩爆预测,预测结果与工程现场实际一致,验证了其可靠性。 展开更多
关键词 岩爆预测 voting集成算法 Stacking集成算法 机器学习 分类器 混淆矩阵
下载PDF
Novel traveling quantum anonymous voting scheme via GHZ states
10
作者 赵文浩 姜敏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期97-102,共6页
Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle... Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security. 展开更多
关键词 quantum anonymous voting quantum secure communication GHZ states verifiability PRIVACY
下载PDF
Maximizing Influence in Temporal Social Networks:A Node Feature-Aware Voting Algorithm
11
作者 Wenlong Zhu Yu Miao +2 位作者 Shuangshuang Yang Zuozheng Lian Lianhe Cui 《Computers, Materials & Continua》 SCIE EI 2023年第12期3095-3117,共23页
Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes.However,most exi... Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes.However,most existing studies on the IM problem focus on static social network features,while neglecting the features of temporal social networks.To bridge this gap,we focus on node features reflected by their historical interaction behavior in temporal social networks,i.e.,interaction attributes and self-similarity,and incorporate them into the influence maximization algorithm and information propagation model.Firstly,we propose a node feature-aware voting algorithm,called ISVoteRank,for seed nodes selection.Specifically,before voting,the algorithm sets the initial voting ability of nodes in a personalized manner by combining their features.During the voting process,voting weights are set based on the interaction strength between nodes,allowing nodes to vote at different extents and subsequently weakening their voting ability accordingly.The process concludes by selecting the top k nodes with the highest voting scores as seeds,avoiding the inefficiency of iterative seed selection in traditional voting-based algorithms.Secondly,we extend the Independent Cascade(IC)model and propose the Dynamic Independent Cascade(DIC)model,which aims to capture the dynamic features in the information propagation process by combining node features.Finally,experiments demonstrate that the ISVoteRank algorithm has been improved in both effectiveness and efficiency compared to baseline methods,and the influence spread through the DIC model is improved compared to the IC model. 展开更多
关键词 Temporal social networks influence maximization voting strategy interactive properties SELF-SIMILARITY
下载PDF
Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
12
作者 Doaa Sami Khafaga Faten Khalid Karim +5 位作者 Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim 《Computers, Materials & Continua》 SCIE EI 2023年第2期3183-3198,共16页
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human life.Open attacks and unauthorized access are possible with these IoT devices,which exchange ... Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human life.Open attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote access.These attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are subpar.This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization.The employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA optimizer.The proposed voting classifier categorizes the network intrusions robustly and efficiently.To assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack categorization.The dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and significance.The achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection. 展开更多
关键词 voting classifier whale optimization algorithm dipper throated optimization intrusion detection internet-of-things
下载PDF
水利工程质量监督全过程全方位定量评价模型构建 被引量:2
13
作者 栾清华 王月 +2 位作者 李阳 裴梦桐 李彦苍 《南水北调与水利科技(中英文)》 CAS CSCD 北大核心 2024年第1期148-157,共10页
为促进我国水利工程质量监督管理工作运行的高效化,确保工程监督的有效性和权威性,基于AHP(analytic hierarchy process)原理,针对水利部督查小组的现场检查情况,依据水利部下达的相关文件,结合负分制和一票否决制,将定性问题定量化,构... 为促进我国水利工程质量监督管理工作运行的高效化,确保工程监督的有效性和权威性,基于AHP(analytic hierarchy process)原理,针对水利部督查小组的现场检查情况,依据水利部下达的相关文件,结合负分制和一票否决制,将定性问题定量化,构建一套涉及水利工程建设、运行、管理全过程全方位的质量监督管理评价模型,共包含7层2112个指标。在综合试错的基础上,计算得出不同层级和不同指标的权重,然后选用该模型分析评价2020年7个省份受督查水利工程项目的质量管理与安全生产管理监督数据,间接说明模型的实用性和易操作性。评价结果表明:7个省份均在合格以上,整体质量管理情况较好,但得分差异显著,其中最高得分90.6、最低得分65.6,相差25分;不同类型管理评价结果显示,安全生产管理得分普遍高于质量管理得分;各参建单位评价结果显示,建设单位和勘察设计单位的情况最优、评分基本达到满分,而质量检测单位和施工单位得分最低、需重点加强相关监管。评价结果为水利工程监督管理工作提供了科学的数据支撑,构建的评价模型也为水利工程质量监督定量化提供了易实操的普适性工具。 展开更多
关键词 水利工程 质量管理评价 层次分析法 负分制 一票否决
下载PDF
基于香农熵代表性特征和投票机制的三维模型分类
14
作者 高雪瑶 闫少康 张春祥 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第4期1438-1447,共10页
目前基于视图的3维模型分类方法存在单视图视觉信息不充分、多视图信息冗余的问题,且同等对待所有视图会忽略不同投影视角之间的差异性。针对上述问题,该文提出一种基于香农熵代表性特征和投票机制的3维模型分类方法。首先,通过在3维模... 目前基于视图的3维模型分类方法存在单视图视觉信息不充分、多视图信息冗余的问题,且同等对待所有视图会忽略不同投影视角之间的差异性。针对上述问题,该文提出一种基于香农熵代表性特征和投票机制的3维模型分类方法。首先,通过在3维模型周围均匀设置多个视角组来获取表征模型的多组视图集。为了有效提取视图深层特征,在特征提取网络中引入通道注意力机制;然后,针对Softmax函数输出的视图判别性特征,使用香农熵来选择代表性特征,从而避免多视图特征冗余;最后,基于多个视角组的代表性特征利用投票机制来完成3维模型分类。实验表明:该方法在3维模型数据集ModelNet10上的分类准确率达到96.48%,分类性能突出。 展开更多
关键词 3维模型分类 注意力机制 香农熵代表性特征 投票机制
下载PDF
乡村振兴背景下绿色金融发展路径研究——以吉林省为例
15
作者 鲁雪岩 陈岩 +1 位作者 任全民 王宏伟 《吉林金融研究》 2024年第7期72-74,共3页
绿色转型、乡村振兴作为党和国家提出重大发展战略,两者有很多契合点,为深入分析绿色金融对乡村振兴的支持作用,进一步找准绿色金融支持乡村振兴的着力点,本文梳理了吉林省绿色金融支持乡村振兴的优秀做法,对2018-2022年来绿色金融支持... 绿色转型、乡村振兴作为党和国家提出重大发展战略,两者有很多契合点,为深入分析绿色金融对乡村振兴的支持作用,进一步找准绿色金融支持乡村振兴的着力点,本文梳理了吉林省绿色金融支持乡村振兴的优秀做法,对2018-2022年来绿色金融支持乡村振兴成效进行了实证分析,验证了绿色金融对乡村振兴的正向促进作用,并根据国内外绿色金融支持乡村振兴发展经验提出了相应政策建议。 展开更多
关键词 绿色金融 乡村振兴 林业碳票 面板数据模型
下载PDF
物有所值视角下工程招投标评定分离定标办法
16
作者 祁神军 陈晶晶 +1 位作者 汪丫 詹朝曦 《华侨大学学报(自然科学版)》 CAS 2024年第1期22-28,共7页
直接抽签定标法、票决定标法及票决低价定标法等定标办法均没有综合考虑定标候选人报价和综合得分,择优竞价性相对较差.基于物有所值(VFM)理论创新性地提出了票决指数法。对我国评定分离办法试点情况进行梳理,基于VFM理论构建票决指数... 直接抽签定标法、票决定标法及票决低价定标法等定标办法均没有综合考虑定标候选人报价和综合得分,择优竞价性相对较差.基于物有所值(VFM)理论创新性地提出了票决指数法。对我国评定分离办法试点情况进行梳理,基于VFM理论构建票决指数法的初步模型和最合适区域模型,对比分析票决指数法与其他票决办法。结果表明:票决指数法是一种科学有效的评定分离定标办法,可为招标人更科学择优竞价定标提供一定的理论指导。 展开更多
关键词 工程招标 物有所值(VFM) 评定分离 定标办法 票决指数法 择优竞价
下载PDF
股东会电子化中股东平等原则的规范构造
17
作者 陈景善 《南京师大学报(社会科学版)》 北大核心 2024年第4期98-109,共12页
出席股东会是股东行使自身权利、治理公司事务的基本路径。委托代理人出席或书面表决等方式系原《公司法》认可的股东现场出席股东会的合法替代方式,但这两种方式均存在不足。鉴于实践效果上电子化表决在提升参与度和确保表决真实性方... 出席股东会是股东行使自身权利、治理公司事务的基本路径。委托代理人出席或书面表决等方式系原《公司法》认可的股东现场出席股东会的合法替代方式,但这两种方式均存在不足。鉴于实践效果上电子化表决在提升参与度和确保表决真实性方面起到了积极作用,新《公司法》明确规定公司可以通过电子通信方式召开电子股东会,进一步提高了股东参与度并克服了传统的两类替代方式的弊端。该规定是对实践中已广泛采用的股东会组织方式合法性的确认。然而,新《公司法》等现行法律法规并未充分考虑到电子股东会制度可能引发的股东知情权行权差异和潜在的股东不平等问题,也并未对上述问题以及电子股东会可能发生的程序瑕疵、系统障碍作出针对性的预防和救济规制。实施电子股东会的公司应当保障不同参与方式的股东均可以充分行使权利,制定电子股东会决策程序瑕疵、出现系统故障时的预防和救济措施,以全面有效发挥股东会应有的功能。 展开更多
关键词 电子股东会 股东平等 股东知情权 电子表决权
下载PDF
基于互信息与萤火虫算法的网络入侵特征选择
18
作者 王新胜 杨锐 《计算机应用与软件》 北大核心 2024年第4期306-312,320,共8页
为减少网络入侵检测数据中的冗余特征,提出一种结合互信息和萤火虫算法的特征选择方法。针对互信息不能精确计算特征间冗余度,提出类内特征冗余互信息特征选择方法。针对萤火虫算法步长因子固定易使算法陷入局部最优等问题,提出自适应... 为减少网络入侵检测数据中的冗余特征,提出一种结合互信息和萤火虫算法的特征选择方法。针对互信息不能精确计算特征间冗余度,提出类内特征冗余互信息特征选择方法。针对萤火虫算法步长因子固定易使算法陷入局部最优等问题,提出自适应步长萤火虫算法特征选择。以上方法分别选取特征子集后利用投票策略选取最优子集,对该子集基于C4.5和贝叶斯网络分类器分类。实验结果表明,使用10个特征检测能有效提高入侵检测率、误报率和F-measure,同时还缩短训练和检测时间。此外,与现有的几种方法相比,该方法在准确率、检测率和F-measure都获得不错效果。 展开更多
关键词 网络入侵检测 特征选择 投票策略 互信息 萤火虫算法
下载PDF
考虑样本多样性的转辙机故障诊断决策模型
19
作者 李建国 刘琦 《北京交通大学学报》 CAS CSCD 北大核心 2024年第2期165-175,共11页
为解决现有研究未充分考虑诊断模型在不同转辙机数据样本条件下的适用性,且单一诊断方法难以满足故障诊断精度与决策要求的问题,提出一种考虑样本多样性的故障诊断决策模型.首先,从ZYJ7电液转辙机8种故障模式和正常模式所对应的油压曲... 为解决现有研究未充分考虑诊断模型在不同转辙机数据样本条件下的适用性,且单一诊断方法难以满足故障诊断精度与决策要求的问题,提出一种考虑样本多样性的故障诊断决策模型.首先,从ZYJ7电液转辙机8种故障模式和正常模式所对应的油压曲线中分别提取时域、频域、时频域特征量,采用基于核函数的主成分分析法对3个域内的特征量分别降维,得到每个域的特征矩阵,进而构成不同类型的数据样本.然后,基于PSO-KNN、SA-PSO-PNN、PSO-SVM算法构建决策模型.当样本是一般数据样本时,决策模型采用3种算法分别做同一域数据分类,并对同一域各算法诊断结果进行三取二表决,分别得到每一域诊断结果;当样本是大数据样本、不均衡数据样本时,决策模型根据不同样本特点采用3种算法中的推荐算法得到每一域诊断结果.最后,利用决策模型对各域诊断结果进行三取二表决得到最终诊断结果 .仿真结果表明:与单一诊断算法相比,决策模型在大数据样本下,平均准确率提升1.01%;在不均衡数据样本条件下,决策模型的平均准确率提升12.82%;在一般数据样本下,决策模型平均准确率提升6.18%.决策模型通过结合多域的多维特征与各算法特点提高了诊断精度,为集成学习在转辙机故障诊断领域应用提供了一种思路. 展开更多
关键词 故障诊断 算法决策 ZYJ7电液转辙机 两次表决 集成学习
下载PDF
越南2023年回顾与2024年展望
20
作者 聂慧慧 《东南亚纵横》 2024年第2期79-91,共13页
政治方面,2023年越南政治上妥善应对高层政局变动,选举产生新一任国家主席和两位副总理。对党、政、国会各级官员开展信任测评工作,以总结过去的工作成效、为下一步官员选任工作提供依据。成立五个工作小组、启动越共十四大筹备工作。... 政治方面,2023年越南政治上妥善应对高层政局变动,选举产生新一任国家主席和两位副总理。对党、政、国会各级官员开展信任测评工作,以总结过去的工作成效、为下一步官员选任工作提供依据。成立五个工作小组、启动越共十四大筹备工作。经济方面,着力克服工业领域增速严重放缓、服务业增速未达预期、国际需求疲软导致进出口双下降等困难,有效维护宏观经济稳定、吸引外资额创历史新高,全年经济增速为5.05%,未能达成国会提出的增长目标,也成为2011年后经济增速第三低的年度。外交方面,越南走出大量外交官受纪律处分的阴霾,分别与中国建成具有战略意义的命运共同体,与美国、日本建成全面战略伙伴关系,取得诸多“具有历史性的成就”。展望2024年,越南将启动党政换届工作,总结施政经验、讨论未来发展方向。外交上继续深化伙伴关系,谋求在多边组织中发挥更大作用。在出口和消费均有望增长的情况下,2024年越南经济增速有望提升,但外资流入可能放缓,越南基础设施建设薄弱等固有桎梏仍待克服。 展开更多
关键词 越南 信任测评 干部选任 经济放缓 中越命运共同体
下载PDF
上一页 1 2 131 下一页 到第
使用帮助 返回顶部