首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   0篇
公路运输   2篇
综合类   3篇
铁路运输   1篇
综合运输   2篇
  2018年   1篇
  2016年   2篇
  2013年   1篇
  2008年   1篇
  2006年   2篇
  2004年   1篇
排序方式: 共有8条查询结果,搜索用时 15 毫秒
1
1.
汽车系统单元化集成设计中相似性与复杂性   总被引:5,自引:2,他引:5  
周美立 《汽车工程》2004,26(6):735-738
基于相似性科学和相似系统理论,研究了汽车系统中单元特征相似性分析方法,汽车系统相似性度量方法,相似单元设计和单元化系统集成设计中的相似性与差异性变化引起的复杂性。提出了以系统相似性度序列变化和差异性,集成设计系列化、多样化、个性化汽车产品系统新的理论方法。  相似文献   
2.
Information and communications technologies (ICT) and future and emerging technologies (FET) are expected to revolutionize transportation in the next generation. Travelers’ behavioral adaptation is a key to their success. We discuss the notion of managing traffic congestion by enhancing cooperation in road networks enabled with ICT and FET. Cooperation is an emergent social state related to the dynamics and complexity of road traffic and reinforced learning. Game theory and research in behavioral economics show that cooperation can be leveraged to efficiently solve social dilemmas similar to traffic congestion. We review the applicability of behavioral economics and game theory concepts to route, mode and departure time choice problems. Beyond advancing theory, research on cooperation in the context of transportation is still in its infancy. We discuss state-of-the-art methodologies and their weaknesses and review the unexplored opportunities inherent in game-based methodologies. A behavioral-technological research agenda for FET is also discussed.  相似文献   
3.
Mobile ad hoc networks create additional challenges for implementing the group key establishment due to resource constraints on nodes and dynamic changes on topology. The nodes in mobile ad hoc networks are usually low power devices that run on battery power. As a result, the costs of the node resources should be minimized when constructing a group key agreement protocol so that the battery life could be prolonged. To achieve this goal, in this paper we propose a security efficient group key agreement protocol based on Burmester-Desmedt (BD) scheme and layer-cluster group model, referred to as LCKM-BD, which is appropriate for large mobile ad hoc networks. In the layer-cluster group model, BD scheme is employed to establish group key, which can not only meet security demands of mobile ad hoc networks but also improve executing performance. Finally, the proposed protocol LCKM-BD are compared with BD, TGDH (tree-based group Diffe-Hellman), and GDH (group Diffie-Hellman) group key agreement protocols. The analysis results show that our protocol can significantly decrease both the computational overhead and communication costs with respect to these comparable protocols.  相似文献   
4.
A sector is a component airspace whose operation is allocated to an air traffic controller. The operation complexity of a sector plays a critical role in the current Air Traffic Management system, e.g. it determines the workload volume of air traffic controllers and serves as a reliable index for airspace configuration and traffic flow management. Therefore, accurately evaluating the sector operation complexity is a problem of paramount importance in both practice and research. Due to numerous interacting factors, traditional methods based on only one single complexity indicator fail to accurately reflect the true complexity, especially when these factors are nonlinearly correlated. In light of these, the attempt to use machine learning models to mine the complex factor-complexity relationship has prevailed recently. The performance of these models however relies heavily on sufficient samples. The high cost of collecting ample data often results in a small training set, adversely impacting on the performance that these machine learning models can achieve. To overcome this problem, this paper for the first time proposes a new sector operation complexity evaluation framework based on knowledge transfer specifically for small-training-sample environment. The proposed framework is able to effectively mine knowledge hidden within the samples of the target sector, i.e. the sector undergoes evaluation, as well as other sectors, i.e. non-target sectors. Moreover, the framework can properly handle the integration between the knowledge derived from different sectors. Extensive experiments on real data of 6 sectors in China illustrate that our proposed framework can achieve promising performance on complexity evaluation when only a small training set of the target sector is available.  相似文献   
5.
分治法是一种常用的问题求解方法,可以简化问题规模,降低计算复杂度。飞行管理问题实质上属于搜索问题,利用常规方法解决时间耗费大,而利用分治法可以得到很好的解决。  相似文献   
6.
为了提高联锁系统结构的效能,提出一种执行-监控的联锁结构。与同构、异构二取二结构相比,该结构在保证系统功能的前提下,通过降低软件复杂度的方法提升结构的可靠性,仿真对比实验结果表明,执行-监控软件的复杂度最低,仅为0.550,证明执行-监控结构的有效性。  相似文献   
7.
In this paper, we initiate the study of identifying when and how a security attack detection problem can have a scalable solution. We use tools from Communication Complexity to prove that the common formulations of many well-known intrusion detection problems require per-flow state. Our theory exposes assumptions that need to be changed to provide scalable solutions to these problems; we conclude with some systems techniques to circumvent these lower bounds.  相似文献   
8.
当今时代,文化产业已成为人类社会经济发展的重要支柱,被称为21世纪的"朝阳产业"。文化产业的发展有着自身的特点和规律,对其本身性质的若干重要问题的认识和把握,将直接关系到文化产业能否健康顺利地发展。本文从文化产业的概念出发,通过对其复杂性的追根溯源,非线性的发展方式,以及对文化产业的后现代性提出可持续性与整体性的思维,探讨了文化产业自身具有的复杂性。对文化产业自身性质的研究,或许会更加认清文化产业未来发展的方向。  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号