期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
意、法、希共“交枪”问题的比较研究
1
作者 陈成发 《北方论丛》 CSSCI 1989年第4期80-86,共7页
长期以来,人们对意、法,希共“交枪”问题的研究,多半集中在一个党一个党的个别研究上,而没有把三个党的“交枪”问题放在一起,进行比较研究,这不能不说是一个遗憾。我们认为只有把三个党的“交枪”问题放在一起进行比较研究,才... 长期以来,人们对意、法,希共“交枪”问题的研究,多半集中在一个党一个党的个别研究上,而没有把三个党的“交枪”问题放在一起,进行比较研究,这不能不说是一个遗憾。我们认为只有把三个党的“交枪”问题放在一起进行比较研究,才会对“交枪”问题能有一个正确的认识,才会更准确地判断孰是孰非。对于探讨资本主义发展不同程度国家的夺权方式也会有所帮助。 展开更多
关键词 比较研究 "枪"问题 夺权方式 政治
在线阅读 下载PDF
基于高速网络控制的阈交方法 被引量:3
2
作者 刘嘉焜 柳湘月 +1 位作者 王旭 舒炎泰 《电子学报》 EI CAS CSCD 北大核心 2003年第11期1705-1708,共4页
在高速网络控制与带宽分配研究中 ,网络业务量预报是一个重要的问题 .本文给出了一个新方法 ,通过对高速网络业务超阈值数据采用方差分析的方法构造了一个阈值的能量函数 ,为阈值的选取提供了一定的依据 .最后运用阈交理论 ,通过对网络... 在高速网络控制与带宽分配研究中 ,网络业务量预报是一个重要的问题 .本文给出了一个新方法 ,通过对高速网络业务超阈值数据采用方差分析的方法构造了一个阈值的能量函数 ,为阈值的选取提供了一定的依据 .最后运用阈交理论 ,通过对网络业务到达数据对阈值穿越强度的计算来考察已选阈值的有效性 . 展开更多
关键词 网络业务 交问题 阈值 穿越强度
在线阅读 下载PDF
网格计算机上的凸多边形交算法
3
作者 杨波 齐进兴 《电子科技》 1996年第3期13-17,共5页
文中给出了二维网格结构的计算机上求平面上两个凸多边形交的一个算法。
关键词 网格计算机 算法 凸多边形 交问题 计算几何
在线阅读 下载PDF
Transportation problem: A special case for linear programing problems in mining engineering 被引量:2
4
作者 Ali Mahrous A.M. Sik Yang Hyung 《International Journal of Mining Science and Technology》 SCIE EI 2012年第3期371-377,共7页
In real world applications the supply, the demand and the transportation cost per unit of the quantities in a transportation problem are hardly specified precisely because of the changing economic and environmental co... In real world applications the supply, the demand and the transportation cost per unit of the quantities in a transportation problem are hardly specified precisely because of the changing economic and environmental conditions. It is also important that the time required for transportation should be minimum. In this paper a method has been proposed for the minimization of transportation costs. Supply and transportation costs per unit of the quantities are also determined. The present study was carried out to evaluate the quality of gravel to know its suitability for aggregate (raw material for concrete and road). The samples of gravel were analyzed for petrographic, physical, mechanical and chemical properties. Samples were categorized as quartzite group and carbonate group according to ASTM standard 295. Among these, samples of quartzite group were found dominant. The petrography examination of gravels which was carried out constituted of opal, tridymite, chalcedony, crystobalite and alkali carbonates rocks. Those minerals react with alkalis in cement leading to expansion and cracking of concrete. Other components such as sulfides, sulfates, halites, iron oxides, clay minerals and anhydrites are examined, which might be present as coating and impurities. The present study indicated that all samples are suitable for concrete making and obtain the optimum solution for transporting these materials from quarries to cities with minimum cost according to Egyptian Code. 展开更多
关键词 Linear programingTransportation problemAggregatesGravel
在线阅读 下载PDF
Reconfiguration of Spacecraft Cluster Based on Distributed Local Information
5
作者 YU Binggu WANG Shuquan 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第4期704-712,共9页
The reconstruction of spacecraft cluster based on local information and distributed strategy is investigated.Each spacecraft is an intelligent individual that can detect information within a limited range and can dete... The reconstruction of spacecraft cluster based on local information and distributed strategy is investigated.Each spacecraft is an intelligent individual that can detect information within a limited range and can determine its behavior based on surrounding information.The objective of the cluster is to achieve the formation reconstruction with minimum fuel consumption.Based on the principle of dual pulse rendezvous maneuver,three target selection strategies are designed for collision avoidance.Strategy-1 determines the target point’s attribution according to the target’s distance when the target point conflicts and uses a unit pulse to avoid a collision.Strategy-2 changes the collision avoidance behavior.When two spacecraft meet more than once,the strategy switches the target points of the two spacecraft.In Strategy-3,the spacecraft closer to the target has higher priority in target allocation.Strategy-3 also switches the target points when two spacecraft encounter more than once.The three strategies for a given position,different completion times,and random position are compared.Numerical simulations show that all three strategies can accomplish the spacecraft cluster's reconfiguration under the specified requirements.Strategy-3 is better than Strategy-1 in all simulation cases in the sense of less fuel consumption with different completion times and given location,and it is more effective than Strategy-2 in most of the completion time.With a random initial position and given time,Strategy-3 is better than Strategy-1 in about 70%of the cases and more stable. 展开更多
关键词 spacecraft cluster formation reconstruction relative Lambert problem two-impulse rendezvous distributed maneuver
在线阅读 下载PDF
Cryptanalysis of a Cryptosystem with Non- Commutative Platform Groups 被引量:1
6
作者 Jinhui Liu Jianwei Jia +3 位作者 Huanguo Zhang Rongwei Yu Yong Yu Wangqing Wu 《China Communications》 SCIE CSCD 2018年第2期67-73,共7页
A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryp... A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryption scheme. We propose an algebraic key-recovery attack in the polynomial computational complexity. Furthermore, we peel off the encryption and decryption process and propose attack methods for solving the conjugator search problem over the given non-abelian group. Finally, we provide corresponding practical attack examples to illustrate the attack methods in our cryptanalysis, and provide some improved suggestions. 展开更多
关键词 CRYPTANALYSIS post-quantum com-putational cryptography conjugator searchproblem computational complexity
在线阅读 下载PDF
A Privilege Separation Method for Security Commercial Transactions 被引量:1
7
作者 Chen Yasha Hu Jun +1 位作者 Sun Yu Gai Xinmao 《China Communications》 SCIE CSCD 2010年第6期94-99,共6页
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared. 展开更多
关键词 privilege separation fraud management security commercial transactions formal method
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部