期刊文献+
共找到80篇文章
< 1 2 4 >
每页显示 20 50 100
Research of intelligence data mining based on commanding decision-making 被引量:1
1
作者 Liu Jingxue Fei Qi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期275-280,共6页
In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military i... In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed. 展开更多
关键词 Intelligence requirement Intelligence database Database maintenance Data mining arithmetic Intelligence processing.
下载PDF
Task Decomposition Technique's Deduction and Application of Product Developing Process in Concurrent Engineering 被引量:1
2
作者 朱全敏 Xiong Guangleng +1 位作者 Zhang Hong Gu Chenglin 《High Technology Letters》 EI CAS 2003年第1期77-81,共5页
Task decomposition is a kind of powerful technique increasingly being used within industry as a pathway for achieving product's developing success. In this paper, topology's concept in modern mathematics is us... Task decomposition is a kind of powerful technique increasingly being used within industry as a pathway for achieving product's developing success. In this paper, topology's concept in modern mathematics is used for task decomposition technique's deduction in product developing process. It puts forward the views of resolvability, measurability and connectivity of tasks and their practical principles. Combined with an example of developing the typical mechanical product, it explains the implementing method of task decomposition in Concurrent Engineering (CE). 展开更多
关键词 并行工程 产品发展过程 任务分解技术 拓扑空间
下载PDF
Preparation of Lead-based Perovskite Structure Ferroelectric Thin Films by Sol-Gel Method and the Properties of the Films
3
作者 Meidong, L. Enpei, H. +3 位作者 Peiying, W. Yunhua, R. Yike, Z. Churong, L. 《High Technology Letters》 EI CAS 1995年第1期95-101,共7页
Polycrystalline PZT,PLT and PbTiO ferroelectric thin films,highly oriented PbTiOferroelectric thin films and epitaxial growth PZT,PLT ferroelectric thin films with per-ovskite-type structure were prepared by the sol-g... Polycrystalline PZT,PLT and PbTiO ferroelectric thin films,highly oriented PbTiOferroelectric thin films and epitaxial growth PZT,PLT ferroelectric thin films with per-ovskite-type structure were prepared by the sol-gel method.Ferroelectric properties of theceramic thin films were confirmed by P-E hysteresis loops.The pyroelectric and opticalproperties were also measured. 展开更多
关键词 SOL-GEL FERROELECTRIC PYROELECTRIC Thin film High ORIENTATION EPITAXIAL growth
下载PDF
Model and algorithm of flow interception problem with multi-type of flows
4
作者 Hu Dandan Yang Chao Yang Jun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期755-761,共7页
To study simultaneous location of different kinds of facilities, a new model of flow interception problem with multi-type of flows is proposed, with the consideration of multi-purpose flows and the influence of facili... To study simultaneous location of different kinds of facilities, a new model of flow interception problem with multi-type of flows is proposed, with the consideration of multi-purpose flows and the influence of facilities on each other. To be more practical, the objective is to maximize the benefits from flow-by customers instead of maximizing flows in the past. Since this problem is NP-hard and there is no optimal solution for large network, greedy and improved greedy heuristic algorithms are proposed. A computational example is presented to show that the optimal location decisions are proved to be strongly dependent on the influence coefficients and average profits by one customer and different types of facilities are almost co-located. Finally the results of sensitivity analysis are reported. 展开更多
关键词 LOCATION flow interception greedy heuristic MULTI-PURPOSE influence coefficient
下载PDF
Research of recognizing intelligence based on commanding decision-making
5
作者 Liu Jingxue Fei Qi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期775-780,共6页
In commanding decision-making, the commander usually needs to know a lot of situations(intelligence) on the adversary. Because of the military intelligence with opposability, it is inevitable that intelligence perso... In commanding decision-making, the commander usually needs to know a lot of situations(intelligence) on the adversary. Because of the military intelligence with opposability, it is inevitable that intelligence personnel take some deceptive information released by the rival as intelligence data in the process of intelligence gathering. Since the failure of intelligence is likely to lead to a serious aftereffect, the recognition of intelligence is a very important problem. An elementary research on recognizing military intelligence and puts forward a systematic processing method are made. First, the types and characteristics of military intelligence are briefly discussed, a research thought of recognizing military intelligence by means of recognizing military hypotheses are presented. Next, the reasoning mode and framework for recognizing military hypotheses are presented from the angle of psychology of intelligence analysis and non-monotonic reasoning. Then, a model for recognizing military hypothesis is built on the basis of fuzzy judgement information given by intelligence analysts. A calculative example shows that the model has the characteristics of simple calculation and good maneuverability. Last, the methods that selecting the most likely hypothesis from the survival hypotheses via final recognition are discussed. 展开更多
关键词 psychology of intelligence analysis non-monotonic reasoning fuzzy judgement recognizing model D-S theory LOWA operator.
下载PDF
Analysis and optimization of delays in networked control systems
6
作者 谢林柏 方华京 郑英 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第3期654-659,664,共7页
The minimization problem of time delays in networked control system (NCS) is concered, which is a hot area of such research field. First, some analysis and comments on time-delayed NCS model listed in previous work ... The minimization problem of time delays in networked control system (NCS) is concered, which is a hot area of such research field. First, some analysis and comments on time-delayed NCS model listed in previous work are given. Then, time delay minimization problem based on average behavior of network queuing delay is presented. Under fixed routing scheme and certain optimization performance indexes, the delay minimization problem is translated into convex optimization problem. And the solution of the delay minimization problems is attained through optimized allocation of flow rates among network links. 展开更多
关键词 networked control system time delays convex optimization subgradient method.
下载PDF
DIMPLE IMPERFECTION SENSITIVITY OF SUBMARINE PIPELINES UNDER COMBINED EXTERNAL PRESSURE AND AXIAL LOAD
7
作者 Huang, Yuying Yue, Dongyi 《China Ocean Engineering》 SCIE EI 1989年第4期499-507,共9页
Based on the Karman-Donnell shell equations, a two-timing perturbation technique together with Fourier series expansion is used to solve an imperfection sensitivity problem of submarine pipelines with dimple shaped in... Based on the Karman-Donnell shell equations, a two-timing perturbation technique together with Fourier series expansion is used to solve an imperfection sensitivity problem of submarine pipelines with dimple shaped initial deflection under external pressure combined with axial load. The relationship between limit load and initial postbuckling coefficient as well as imperfection parameter is obtained. It shows that these submarine pipelines are imperfection-sensitive to a dimple shaped imperfection over a large range of a geometrical parameter and that the effect of the dimple shaped imperfection on limit load depends only upon its linear buckling mode component of the corresponding Fourier series expansion. 展开更多
关键词 Mathematical Techniques Sensitivity Analysis
下载PDF
Antitumor Effects of the Fibroblasts Transfected TNF-α Gene and its Mutants
8
作者 LI Qingfen(李清芬) +12 位作者 LI Li (李莉) LI Zhuoya(李卓娅) GONG Feili(龚非力) FENG Wei(冯玮) JIANG Xiaodan(姜晓丹) XIONG Ping(熊平) 《Journal of Huazhong University of Science and Technology(Medical Sciences)》 SCIE CAS 2002年第2期92-95,共4页
Summary: To compare the anti-tumor effects of transmembrane TNF-α (TM-TNF) and secreted TNF-α (S-TNF) in vivo, mouse fibroblasts NIH3T3 were transfected separately with three types of retrovirus containing wild type... Summary: To compare the anti-tumor effects of transmembrane TNF-α (TM-TNF) and secreted TNF-α (S-TNF) in vivo, mouse fibroblasts NIH3T3 were transfected separately with three types of retrovirus containing wild type TNF-α (Wt-TNF), TM-TNF mutant (TM-TNFm), S-TNF mutant (S-TNFm). Southern blot, RT-PCR, FACS and bioassay were used to investigate TNF-α gene integration, expression and its biological activity. It was found that both fixed cells and supernatant of NIH3T3/Wt-TNF, the fixed cells of NIH3T3/TM-TNFm and the supernatant of NIH3T3/S-TNFm could express high level of TNF-α or its mutants and effectively kill H22 in vitro. The transfected NIH3T3 were separately injected into the mice at the sites of H22 tumor cell inoculation according to a ratio of 5∶1 or 1∶1 (effector/target cells, E/T) after the third day of H22 challenge, respectively. At the E/T=5∶1, the NIH3T3/TM-TNFm induced the highest tumor regression, while NIH3T3/S-TNFm exerted the strongest tumor depressing effect at the E/T=1∶1 in vivo. No obvious side effects were noted throughout the course of treatment. The results suggest that both TM-TNF and S-TNF could cause tumor regression. The anti-tumor effect of TM-TNF would be more powerful and safe than that of S-TNF at the proper E/T ratio. 展开更多
关键词 tumor gene therapy transmembrane TNF-α retroviral vector
下载PDF
A rabies virus-based toolkit for efficient retrograde labeling and monosynaptic tracing 被引量:1
9
作者 Kun-Zhang Lin Lei Li +5 位作者 Wen-Yu Ma Xin Yang Zeng-Peng Han Neng-Song Luo Jie Wang Fu-Qiang Xu 《Neural Regeneration Research》 SCIE CAS CSCD 2023年第8期1827-1833,共7页
Analyzing the structure and function of the brain's neural network is critical for identifying the working principles of the brain and the mechanisms of brain diseases.Recombinant rabies viral vectors allow for th... Analyzing the structure and function of the brain's neural network is critical for identifying the working principles of the brain and the mechanisms of brain diseases.Recombinant rabies viral vectors allow for the retrograde labeling of projection neurons and cell type-specific trans-monosynaptic tracing,making these vectors powerful candidates for the dissection of synaptic inputs.Although several attenuated rabies viral vectors have been developed,their application in studies of functional networks is hindered by the long preparation cycle and low yield of these vectors.To overcome these limitations,we developed an improved production system for the rapid rescue and preparation of a high-titer CVS-N2c-ΔG virus.Our results showed that the new CVS-N2c-ΔG-based toolkit performed remarkably:(1)N2cG-coated CVS-N2c-ΔG allowed for efficient retrograde access to projection neurons that were unaddressed by rAAV9-Retro,and the efficiency was six times higher than that of rAAV9-Retro;(2)the trans-monosynaptic efficiency of oG-mediated CVS-N2c-ΔG was 2–3 times higher than that of oG-mediated SAD-B19-ΔG;(3)CVS-N2c-ΔG could delivery modified genes for neural activity monitoring,and the time window during which this was maintained was 3 weeks;and(4)CVS-N2c-ΔG could express sufficient recombinases for efficient transgene recombination.These findings demonstrate that new CVS-N2c-ΔG-based toolkit may serve as a versatile tool for structural and functional studies of neural circuits. 展开更多
关键词 functional studies neural activity neural circuits projection neurons rAAV9-Retro rabies virus recombination retrograde labeling synaptic inputs trans-monosynaptic tracing
下载PDF
Heuristic algorithm for RCPSP with the objective of minimizing activities' cost 被引量:5
10
作者 Liu Zhenyuan Wang Hongwei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期96-102,共7页
Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the re... Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the resource constraints that is a critical sub-problem in partner selection of construction supply chain management because the capacities of the renewable resources supplied by the partners will effect on the project scheduling. Its mathematic model is presented firstly, and analysis on the characteristic of the problem shows that the objective function is non-regular and the problem is NP-complete following which the basic idea for solution is clarified. Based on a definition of preposing activity cost matrix, a heuristic algorithm is brought forward. Analyses on the complexity of the heuristics and the result of numerical studies show that the heuristic algorithm is feasible and relatively effective. 展开更多
关键词 systems engineering resource-constrained project scheduling problem activities' cost preposing activity cost matrix heuristic algorithm.
下载PDF
Preparation of Electrically Conductive Filler for Anisotropic Conductive Adhesive 被引量:3
11
作者 华丽 安兵 +3 位作者 吴懿平 吴丰顺 王佳 何敬强 《上海交通大学学报》 EI CAS CSCD 北大核心 2007年第S2期127-130,138,共5页
The preparation process of electrically conductive filler for anisotropic conductive adhesive was performed and discussed.The spherical filler contains tri-layer structures: resin core,Ni-P intermediate coating layer,... The preparation process of electrically conductive filler for anisotropic conductive adhesive was performed and discussed.The spherical filler contains tri-layer structures: resin core,Ni-P intermediate coating layer,Au outer coating layer.The 4 μm resin spherical cores were synthesized by monodispersion polymerization method.Then they were contributed to electrical conductivity by electrolessly plating Ni-P layer and gold layer.These particles have good corrosion resistance,high stability,and enough mechanical strength.When mixed with thermosetting epoxy resin to produce anisotropic conductive adhesive(ACA),it can realize a good conductive bonding between bumps on dies and pads on substrates.This environmentally friendly conductive material offers numerous advantages over conventional solder technology and is an ideal substitute for the lead-contained solder in electronics packaging. 展开更多
关键词 anisotropic CONDUCTIVE adhesive(ACA) monodispersion POLYMERIZATION MICROSPHERE ELECTROLESS PLATING
下载PDF
Ranking environmental projects model based on multicriteria decision-making and the weight sensitivity analysis 被引量:5
12
作者 Jiang Yan Tian Dagang Pan Yue 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期534-539,共6页
With the fast growth of Chinese economic, more and more capital will be invested in environmental projects. How to select the environmental investment projects (alternatives) for obtaining the best environmental qua... With the fast growth of Chinese economic, more and more capital will be invested in environmental projects. How to select the environmental investment projects (alternatives) for obtaining the best environmental quality and economic benefits is an important problem for the decision makers. The purpose of this paper is to develop a decision-making model to rank a finite number of alternatives with several and sometimes conflicting criteria. A model for ranking the projects of municipal sewage treatment plants is proposed by using exports' information and the data of the real projects. And, the ranking result is given based on the PROMETHEE method. Furthermore, by means of the concept of the weight stability intervals (WSI), the sensitivity of the ranking results to the size of criteria values and the change of weights value of criteria are discussed. The result shows that some criteria, such as “proportion of benefit to project cost”, will influence the ranking result of alternatives very strong while others not. The influence are not only from the value of criterion but also from the changing the weight of criterion. So, some criteria such as “proportion of benefit to project cost” are key critera for ranking the projects. Decision makers must be cautious to them. 展开更多
关键词 multicriteria decision-making ranking environmental projects model PROMETHEE method sensitivity analysis weight stability intervals.
下载PDF
Small sample Bayesian analyses in assessment of weapon performance 被引量:6
13
作者 Li Qingmin Wang Hongwei Liu Jun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期545-550,共6页
Abundant test data are required in assessment of weapon performance. When weapon test data are insufficient, Bayesian analyses in small sample circumstance should be considered and the test data should be provided by ... Abundant test data are required in assessment of weapon performance. When weapon test data are insufficient, Bayesian analyses in small sample circumstance should be considered and the test data should be provided by simulations. The several Bayesian approaches are discussed and some limitations are founded. An improvement is put forward after limitations of Bayesian approaches available are analyzed and the improved approach is applied to assessment of some new weapon performance. 展开更多
关键词 Bayesian approach small sample confidence.
下载PDF
Leader-following coordination of multi-agent systems with information feedback 被引量:3
14
作者 Wang Dongmei Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期823-828,共6页
Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader us... Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader uses the feedback information from followers to the leader to modify its motion. The advantage of this control scheme is that it reduces the tracking errors and improves the robustness of the team cohesion to followers' faults. The results of simulation are provided to illustrate that information feedback can improve the performance of the system. 展开更多
关键词 multi-agent system leader-following flocking control information feedback.
下载PDF
EXPECTED DISCOUNTED PENALTY FUNCTION OF ERLANG(2) RISK MODEL WITH CONSTANT INTEREST 被引量:3
15
作者 Nie Gaoqin Liu Cihua Xu Lixia 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2006年第3期243-251,共9页
The purpose of this paper is to consider the expected value of a discounted penalty due at ruin in the Erlang(2) risk process under constant interest force. An integro-differential equation satisfied by the expected... The purpose of this paper is to consider the expected value of a discounted penalty due at ruin in the Erlang(2) risk process under constant interest force. An integro-differential equation satisfied by the expected value and a second-order differential equation for the Laplace transform of the expected value are derived. In addition, the paper will present the recursive algorithm for the joint distribution of the surplus immediately before ruin and the deficit at ruin. Finally, by the differential equation, the defective renewal equation and the explicit expression for the expected value are given in the interest-free case. 展开更多
关键词 expected discounted penalty function Erlang(2) process Laplace transform interest rate integro-differential equation defective renewal equation.
下载PDF
Stochastic stabilization analysis of networked control systems 被引量:4
16
作者 Ma Changlin Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期137-141,共5页
Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the m... Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the mathematical model of such a system is established. A stochastic stabilization condition for the system is given. The maximum delay can be derived from the stabilization condition. 展开更多
关键词 Networked control system Asymptotically stable Maximum delay
下载PDF
Research on fault-tolerant control of networked control systems based on information scheduling 被引量:4
17
作者 Huo Zhihong Zhang Zhixue Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第5期1024-1028,共5页
A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced... A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced, and robust fault-tolerant control problem of networked control systems with noise disturbance under actuator failures is studied. The parametric expression of the controller under actuator failures is given. Furthermore, the result is analyzed by simulation tests, which not only satisfies the networked control systems stability, but also decreases the data information number in network channel and makes full use of the network resources. 展开更多
关键词 networked control systems fault-tolerant control information scheduling linear matrix inequality.
下载PDF
Energy-efficient and security-optimized AES hardware design for ubiquitous computing 被引量:2
18
作者 Chen Yicheng Zou Xuecheng Liu Zhenglin Han Yu Zheng Zhaoxia 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期652-658,共7页
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H... Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost. 展开更多
关键词 encryption and decryption power analysis model inhomogeneous S-Boxes ubiquitous computing advanced encryption standard.
下载PDF
A Practical Approach of Developing Mathematical Model for All Speed Governors 被引量:3
19
作者 王永生 Dennis N.Assanis 张煜盛 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第2期175-181,共7页
The paper introduced a special approach for diesel’s all-speed-governor modeling, which, in some cases, could solve the knotty problem frequently met in computer simulation of diesel propulsion system or diesel gener... The paper introduced a special approach for diesel’s all-speed-governor modeling, which, in some cases, could solve the knotty problem frequently met in computer simulation of diesel propulsion system or diesel generating set. Suppose that it is hard to get a control-oriented governor mathematical model when the general approaches, the analytical approach or the experimental approach, are applied, and that an open-loop step response of the diesel engine and its system is available by means of computer simulation, the critical three parameters of a governor mathematical model, the proportional gain K_p, integral time constant K_i, and derivative time constant K_d, can be determined by use of PID tuning method which are widely applied in industrial process control. This paper discussed the train of thought of the approach, precondition, procedure, several modifications of the classical PID model, and some points for attention. A couple of case studies were given to demonstrate the effectiveness of this approach. 展开更多
关键词 PID 计算机模拟 数学模型 柴油机 调速器
下载PDF
Direction-of-arrival estimation based on direct data domain (D3) method 被引量:2
20
作者 Chen Hui Huang Benxiong +1 位作者 Wang Yongliang Hou Yaoqiong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期512-518,共7页
A direction-of-arrival (DOA) estimation algorithm based on direct data domain (D3) approach is presented. This method can accuracy estimate DOA using one snapshot modified data, called the temporal and spatial two... A direction-of-arrival (DOA) estimation algorithm based on direct data domain (D3) approach is presented. This method can accuracy estimate DOA using one snapshot modified data, called the temporal and spatial two-dimensional vector reconstruction (TSR) method. The key idea is to apply the D3 approach which can extract the signal of given frequency but null out other frequency signals in temporal domain. Then the spatial vector reconstruction processing is used to estimate the angle of the spatial coherent signal source based on extract signal data. Compared with the common temporal and spatial processing approach, the TSR method has a lower computational load, higher real-time performance, robustness and angular accuracy of DOA. The proposed algorithm can be directly applied to the phased array radar of coherent pulses. Simulation results demonstrate the performance of the proposed technique. 展开更多
关键词 direction-of-arrival estimation space-time two-dimensional DOA direct data domain de-correlation.
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部