首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 828 毫秒
1.
In a recent paper, Begum et al. (2012 Begum, R., Sahoo, R.R., and Sahu, S.K. (2012), ‘A Replenishment Policy for Items with Price-Dependent Demand, Time-Proportional Deterioration and no Shortages’, International Journal of Systems Science, 43, 903910.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar], International Journal of Systems Science, 43, 903–910) established pricing and replenishment policy for an inventory system with price-sensitive demand rate, time-proportional deterioration rate which follows three parameters, Weibull distribution and no shortages. In their model formulation, it is observed that the retailer's stock level reaches zero before the deterioration occurs. Consequently, the model resulted in traditional inventory model with price sensitive demand rate and no shortages. Hence, the main purpose of this note is to modify and present complete model formulation for Begum et al. (2012) Begum, R., Sahoo, R.R., and Sahu, S.K. (2012), ‘A Replenishment Policy for Items with Price-Dependent Demand, Time-Proportional Deterioration and no Shortages’, International Journal of Systems Science, 43, 903910.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]. The proposed model is validated by a numerical example and the sensitivity analysis of parameters is carried out.  相似文献   

2.
Using the well-known Arrow and Karlin (1958) Arrow, K.J., and Karlin, S. (1958), ‘Production over Time with Increasing Marginal Costs’, in Studies in the Mathematical Theory of Inventory and Production, eds. K.J. Arrow and S. Karlin, Stanford: Stanford University Press, pp. 6169. [Google Scholar] dynamic production–inventory model and the model with tradable emission permits which was presented by Dobos (2005 Dobos, I. (2005), ‘The Effects of Emission Trading on Production and Inventories in the Arrow–Karlin Model’, International Journal of Production Economics, 93–94, 301308.[Crossref], [Web of Science ®] [Google Scholar], 2007) Dobos I. (2007), ‘Tradable Emission Permits and Production-inventory Strategies of the Firm’, International Journal of Production Economics, 108, 329333.[Crossref], [Web of Science ®] [Google Scholar], we develop a model of the production–inventory system with deteriorating items and tradable emission permits. The objective of this paper is to apply the optimal control theory to solve the production–inventory problem with deteriorating items and tradable emission permits, and derive the optimal inventory level and the optimal production rate that minimise the total cost. The results are discussed with a numerical example and a sensitivity analysis of the optimal solution with respect to the parameters of the production–inventory system is carried out.  相似文献   

3.
This paper presents further results on the robust control method for qubit systems in Dong et al. (2013) Dong, D., Petersen, I.R., &; Rabitz, H. (2013). Sampled-data design for robust control of a single qubit. IEEE Transactions on Automatic Control, 58, 26542659.[Crossref], [Web of Science ®] [Google Scholar]. Based on the properties of an antisymmetric system, an alternative method is presented to analyse and exclude singularity intervals in the proof of partial original results. For the case of amplitude damping decoherence, a larger sampling period is presented when the upper bound of the probability of failure is small enough. For the case of phase damping decoherence, a larger sampling period is given when the lower bound of the target coherence is large enough. Furthermore, we provide improved sampling periods for amplitude damping decoherence and phase damping decoherence without the above prior constraints.  相似文献   

4.
5.
Leap et al. (2016 Leap, T., T. McDevitt, K. Novak, and N. Siermine. 2016. Further improvements to the Bauer-Millward attack on the Hill cipher. Cryptologia 40:116.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) reduced the time complexity of the Bauer-Millward (2007 Bauer, C., and K. Millward. 2007. Cracking matrix encryption row by row. Cryptologia 31(1):7683.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) ciphertext-only attack on the Hill cipher from 𝒪(Ln) to 𝒪(Ln?1), where L is the length of the alphabet, and n is the block size. This article presents an attack that reduces the complexity to 𝒪(Ln?1?s), 0?≤?s?≤?n???1. The practical limitation on the size of s is the memory available on the computer being used for the attack. Specifically, the computer must be able to hold Ls integer arrays of length N, where N is the number of blocks of ciphertext. The key idea is not to iterate over potential rows of the decryption matrix, but to iterate over randomly chosen characters in the plaintext. This attack also admits a straightforward parallel implementation on multiple processors to further decrease the run time of the attack.  相似文献   

6.
This paper extends the results of Zhang et.al. (1997 Zhang, C., Zhang, J. and Furuta, K. 1997. Performance analysis of discrete periodically time varying controllers. Automatica, 33: 619634. [Crossref] [Google Scholar]) for linear periodically time-varying control to general linear time-varying (LTV) control. It is shown that linear time-invariant (LTI) control provides strictly better control performance than linear strictly time-varying control if l2 disturbance rejection of LTI plants is considered. The analysis is carried out in the frequency domain. This approach provides not only new results on disturbance rejection of LTV control but also some new insight into the properties of general LTV systems.  相似文献   

7.
We have developed an advanced version of our yield estimation method [Ferencz et al., 2004 Cs, Ferencz, Bognár, P., Lichtenberger, J., Hamar, D., Gy, Tarcsai, Timár, G., Molnár, G., Sz, Pásztor, Steinbach, P., Székely, B., Ferencz, O.E. and Ferencz-Árkos, I. 2004. Crop yield estimation by satellite remote sensing. International Journal of Remote Sensing, 25: 41134149.  [Google Scholar], Crop yield estimation by satellite remote sensing. International Journal of Remote Sensing, 25, pp. 4113–4149], that is able to provide reliable forecasts for corn and wheat, several weeks before the harvest. The forecasting method is based on the data of the Advanced Very High Resolution Radiometer (AVHRR) instruments of the National Oceanic and Atmospheric Administration's (NOAA) Polar Orbiting Environmental Satellites (POES). The method was applied to Hungary between the years 1996 and 2000. The forecasted yield values are all within 5% reliability with respect to the actual yield data produced by classic (non-satellite based) methods and provided by the Hungarian Statistical Office, with the exception of 1997, where the absolute error is about 8%.  相似文献   

8.
9.
This article uses principal component analysis (PCA) to determine the spatial pattern of total electron content (TEC) anomalies in the ionosphere corresponding to China's Wenchuan Earthquake of 12 May 2008 UTC (Mw?=?7.9). PCA is applied to global ionospheric maps (GIMs) with transforms conducted for the time period from 08:00 to 10:00 UT on 9 May 2008. The GIMs are subdivided into 100 smaller maps (36° longitude and 18° latitude). The smaller maps (71?×?71 pixels) form the transform matrices of corresponding dimensions (2?×?1) through image processing. The transform allows for extreme principal eigenvalues to be assigned to the seismo-ionospheric signature described by Zhao et al. [2008 Zhao, B., Yu, T., Wang, M., Wan, W., Lei, J., Liu, L. and Ning, B. 2008. Is an unusual large enhancement of ionospheric electron density linked with the 2008 great Wenchuan earthquake?. Journal of Geophysical Research, 113: A11304 doi:doi: 10.1029/2008JA013613[Crossref], [Web of Science ®] [Google Scholar], Is an unusual large enhancement of ionospheric electron density linked with the 2008 great Wenchuan earthquake? Journal of Geophysical Research, 113, A11304, doi: 10.1029/2008JA013613.]. Results show that the range of the TEC anomaly declines with height; however, the anomaly becomes more localized and intense at higher altitudes (250–300 km), giving the anomaly the spatial pattern of a downward-facing trumpet.  相似文献   

10.
The Rayleigh scattering radiance at the top of the atmosphere (TOA) depends on the surface atmospheric pressure. In processing the Coastal Zone Color Scanner (CZCS) imagery, Gordon et al. (Applied Optics, 27, 862–871, 1988 Gordon, H. R., Brown, J. W. and Evans, R. H. 1988. Exact Rayleigh scattering calculations for use with the Nimbus‐7 Coastal Zone Color Scanner.. Applied Optics, 27: pp. 862871. [Crossref] [Google Scholar]) developed a simple formula to account for the Rayleigh radiance changes with the variation of the surface atmospheric pressure. For the atmospheric pressure changes within ±3%, the accuracy of the Gordon et al. (1988 Gordon, H. R., Brown, J. W. and Evans, R. H. 1988. Exact Rayleigh scattering calculations for use with the Nimbus‐7 Coastal Zone Color Scanner.. Applied Optics, 27: pp. 862871. [Crossref] [Google Scholar]) formula in computing the Rayleigh radiance is usually within 0.4%, 0.3%, 0.15% and 0.05% for the wavelengths 412, 443, 555 and 865 nm, respectively. This could result in up to ~3% uncertainty in the derived water‐leaving radiance at the blue wavelengths for very clear atmospheres. To improve the performance, a refinement to the Gordon et al. (1988 Gordon, H. R., Brown, J. W. and Evans, R. H. 1988. Exact Rayleigh scattering calculations for use with the Nimbus‐7 Coastal Zone Color Scanner.. Applied Optics, 27: pp. 862871. [Crossref] [Google Scholar]) formula is developed based on the radiative transfer simulations. The refined scheme can produce Rayleigh radiance with an uncertainty within 0.1% (often within 0.05%) at the blue, while uncertainty is within 0.05% for the green to near‐infrared wavelengths. The refined algorithm has been implemented in the Sea‐viewing Wide Field‐of‐view Sensor (SeaWiFS) data processing system. Results from the SeaWiFS data show the improved ocean colour products in the southern oceans where consistently low atmospheric pressures are usually observed. This could also significantly improve the performance of the Rayleigh radiance computations over the high altitude lakes. In addition, with the refined algorithm, the same Rayleigh radiance tables can be possibly used for the various ocean colour satellite sensors in which there are slightly different sensor spectral band characterizations.  相似文献   

11.
RÉSUMÉ

La numération a fait l'objet d'études importantes, notamment au Québec, durant les années 1980–2000. Les études ont révélé sa complexité ainsi que les difficultés que posent à la fois son enseignement et son apprentissage. La présente étude s'inscrit dans le prolongement d'une suite d'études didactiques sur ces difficultés. Plus précisément, elle investigue les connaissances d'élèves québécois de 3e année primaire sur la numération de position et les compare à celles d'une recherche phare menée par Bednarz et Dufour-Janvier dont les résultats ont fait l'objet de plusieurs publications (1982 Bednarz, N. et Dufour-Janvier, B. (1982). The understanding of numeration in primary school. Educational Studies in Mathematics, 13, 3357. [Google Scholar], 1984a Bednarz, N. et Dufour-Janvier, B. (1984a). La numération: les difficultés suscitées par son apprentissage ; une stratégie didactique cherchant à favoriser une meilleure compréhension. Grand N, 33, 531. [Google Scholar], 1984b Bednarz, N. et Dufour-Janvier, B. (1984b). La numération: une stratégie didactique cherchant à favoriser une meilleure compréhension. Grand N, 34, 117. [Google Scholar], 1988 Bednarz, N. et Dufour-Janvier, B. (1988). A constructivist approach to numeration in primary school: Results of a three year intervention with the same group of children. Educational Studies in Mathematics, 19, 299331. [Google Scholar]). Les résultats de notre étude montrent que si 30 ans ont passé depuis la recherche de Bednarz et Dufour-Janvier, peu de changements sont observés dans les conduites mathématiques des élèves en numération. Quelques hypothèses, relatives à la fois aux contraintes d'enseignement et aux difficultés spécifiques d'appropriation de la numération sont, au terme de l'article, formulées pour expliquer ces résultats.  相似文献   

12.
We study the problem of how much error is introduced in approximating the dynamics of a large vehicular platoon by using a partial differential equation, as was done in Barooah, Mehta, and Hespanha [Barooah, P., Mehta, P.G., and Hespanha, J.P. (2009 Barooah, P, Mehta, PG and Hespanha, JP. 2009. Mistuning-based Decentralised Control of Vehicular Platoons for Improved Closed Loop Stability. IEEE Transactions on Automatic Control, 54: 21002113. [Crossref], [Web of Science ®] [Google Scholar]), ‘Mistuning-based Decentralised Control of Vehicular Platoons for Improved Closed Loop Stability’, IEEE Transactions on Automatic Control, 54, 2100–2113], Hao, Barooah, and Mehta [Hao, H., Barooah, P., and Mehta, P.G. (2011), ‘Stability Margin Scaling Laws of Distributed Formation Control as a Function of Network Structure’, IEEE Transactions on Automatic Control, 56, 923–929]. In particular, we examine the difference between the stability margins of the coupled-ordinary differential equations (ODE) model and its partial differential equation (PDE) approximation, which we call the approximation error. The stability margin is defined as the absolute value of the real part of the least stable pole. The PDE model has proved useful in the design of distributed control schemes (Barooah et al. 2009 Barooah, P, Mehta, PG and Hespanha, JP. 2009. Mistuning-based Decentralised Control of Vehicular Platoons for Improved Closed Loop Stability. IEEE Transactions on Automatic Control, 54: 21002113. [Crossref], [Web of Science ®] [Google Scholar]; Hao et al. 2011 Hao, H, Barooah, P and Mehta, PG. 2011. Stability Margin Scaling Laws of Distributed Formation Control as a Function of Network Structure. IEEE Transactions on Automatic Control, 56: 923929. [Crossref], [Web of Science ®] [Google Scholar]); it provides insight into the effect of gains of local controllers on the closed-loop stability margin that is lacking in the coupled-ODE model. Here we show that the ratio of the approximation error to the stability margin is O(1/N), where N is the number of vehicles. Thus, the PDE model is an accurate approximation of the coupled-ODE model when N is large. Numerical computations are provided to corroborate the analysis.  相似文献   

13.
This article examines visitor interactions with and through a physical/digital installation designed for an open-air museum that displays historic buildings and ways of life from the past. The installation was designed following the “Assembly” design scheme proposed by Fraser et al. (2003 Fraser, M., Stanton, D., Hui Ng, K., Benford, S., O’Malley, C., Bowers, J., … Hindmarsh, J. (2003). Assembling history: Achieving coherent experiences with diverse technologies. Proceedings of ECSCW 2005, 179198. Norwell, MA: Kluwer. [Google Scholar]), and centered around five principles for the design of interactive experiences. We discuss how the Assembly framework was adapted and applied to our work on the installation called Reminisce, and we then present qualitative data gathered through the shadowing and naturalistic observations of small groups of visitors using Reminisce during their exploration of the museum. Through these data excerpts, we illustrate how interaction occurred among visitors and with the assembly. We reflect on the guiding principles of the adapted Assembly framework and on their usefulness for the design of place-specific interactional opportunities in heritage settings. Results from the empirical study show that the adapted Assembly principles provide HCI (human–computer interaction) researchers and designers with ways in which to flexibly support collocated interactions at heritage sites across artifacts and locations in ways that both complement and enrich the physical setting of the visit and its character.  相似文献   

14.
Abstract

GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and digital signature. Mendel et al. (2008 Mendel, F., N. Pramstaller, C. Rechberger, M. Kontak, and J. Szmidt. 2008. Cryptanalysis of the GOST hash function, Advances in Cryptology – CRYPTO 2008, vol. 5157, 162–178. [Google Scholar]) and Courtois and Mourouzis (2011 Courtois, N., and T. Mourouzis. 2011. Black-box collision attacks on the compression function of the GOST hash function. SECRYPT. Proceedings of the International Conference on Security and Cryptography, 325332, IEEE. [Google Scholar]) found attacks on the compression function of the GOST-R structure that were basically weaknesses of the GOST-R block cipher (GOST 28147–89, 1989 GOST 28147-89. 1989. Systems of the information treatment, cryptographic security, algorithms of the cryptographic transformation (in Russian). [Google Scholar]). Hence in 2012, it was updated to GOST-R 34.11-2012, which replaced the older one for all its applications from January 2013. GOST-R 34.11-2012 is based on a modified Merkle-Damgård construction. Here we present a modified version of GOST-R 34.11-2012 (Modified GOST-R (MGR) hash). The design of the MGR hash is based on wide-pipe construction, which is also a modified Merkle-Damgård construction. MGR is much more secure as well as three times faster than GOST-R 34.11-2012. Advanced Encryption Standard (AES)-like block ciphers have been used in designing the compression function of MGR because AES is one of the most efficient and secure block ciphers and has been evaluated for more than 14?years. A detailed statistical analysis with a few other attacks on MGR is incorporated into this paper.  相似文献   

15.
Abstract

This research compared the cognitive demand levels of mathematical tasks engaged in during classroom instruction to paired mathematical tasks assigned for homework. The research took place in an eighth-grade classroom over the course of one school year. In total, the cognitive demand levels of 66 mathematical tasks were evaluated using the IQA Academic Rigor: Mathematics Rubric for the Potential of the Task (Boston & Smith, 2009 Boston, M. D. and Smith, M. S. 2009. Transforming secondary mathematics teaching: Increasing the cognitive demands of instructional tasks used in teachers’ classrooms. Journal for Research in Mathematics Education, 40(2): 119156. [Web of Science ®] [Google Scholar]). Results from this research showed that approximately two thirds of the time the mathematical tasks assigned for homework differed in levels from the tasks used during classroom instruction. Implications for student learning, classroom instruction, homework, and further research are discussed.  相似文献   

16.
In manufacturing industries, the lifetime of an item is usually characterised by a random variable X and considered to be satisfactory if X exceeds a given lower lifetime limit L. The probability of a satisfactory item is then ηL := P(XL), called conforming rate. In industrial companies, however, the lifetime performance index, proposed by Montgomery and denoted by CL, is widely used as a process capability index instead of the conforming rate. Assuming a parametric model for the random variable X, we show that there is a connection between the conforming rate and the lifetime performance index. Consequently, the statistical inferences about ηL and CL are equivalent. Hence, we restrict ourselves to statistical inference for CL based on generalised order statistics, which contains several ordered data models such as usual order statistics, progressively Type-II censored data and records. Various point and interval estimators for the parameter CL are obtained and optimal critical regions for the hypothesis testing problems concerning CL are proposed. Finally, two real data-sets on the lifetimes of insulating fluid and ball bearings, due to Nelson (1982) Nelson, W. (1982), Applied Life Data Analysis, New York: John Wiley &; Sons.[Crossref] [Google Scholar] and Caroni (2002) Caroni, C. (2002), ‘The correct “ball bearings” data’, Lifetime Data Analysis, 8, 395399.[Crossref], [PubMed], [Web of Science ®] [Google Scholar], respectively, and a simulated sample are analysed.  相似文献   

17.
ABSTRACT

Image hiding methods embed a secret image into a host image. The resultant stego-image does not attract the interceptors that would not detect the differences between the host image and the stego-image. To exploit the great developments in the area of image compression and to improve the quality of stego-image, this paper proposes a new method to embed the secret image into the host image. Basically, the secret image is compressed and then embedded into host image. The embedding method is based on the Optimal Pixel Adjustment Process (OPAP) and genetic algorithm. In the paper we addressed the important issues to build such systems. The experimental results showed that the proposed method can improve the quality from 60% to 80% when compared with the simple Least Significant Bit (LSB) replacement methods. Adding to that, the mean square error of the stego-image is much lower compared with other methods (Chan & Cheng, 2004 Chan, C.K. and Cheng, L.M. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3): 469474. [Crossref], [Web of Science ®] [Google Scholar]; Chang, Hsiao, & Chan, 2003 Chang, C.C., Hsiao, J.Y. and Chan, C.S. 2003. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36(7): 15831595. [Crossref], [Web of Science ®] [Google Scholar]; Thien & Lin, 2003 Thien, C.C. and Lin, J.C. 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition, 36(12): 28752881. [Crossref], [Web of Science ®] [Google Scholar]; Tseng, Chan, Ho, & Chu, 208; Wang, Lin, & Lin, 2001 Wang, R.Z., Lin, C.F. and Lin, J.C. 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3): 671683. [Crossref], [Web of Science ®] [Google Scholar]). Also, the proposed technique improves capacity. In other words, we can embed a secret image with size 450?×?450 inside a hosting image with size 512?×?512.  相似文献   

18.
Work on how consumers evaluate electronic service quality is both topical and important due to the well-accepted criticality of electronic channels in selling products and services. However, most of the relevant research on electronic research quality is preoccupied with the website Internet context and most of the studies are single-country studies, inhibiting conclusions of generalizibility. Theoretically rooted in the Nordic Model of perceived service quality, this exploratory study uses an e-service quality scale to measure mobile Internet service quality in different national settings. Consistent with the available e-service quality literature, results indicate that e-service quality is a second-order factor, with three reflective first-order dimensions: efficiency, outcome, and customer care. Most important, cross-validation investigations using samples drawn from Korean, Hong Kong, and Japanese mobile Internet user populations, support the factorial structure invariance of the construct. Following Cheung and Reynolds's (2002) Cheung, G. W. and Rensvold, R. B. 2002. Evaluating goodness-of-fit indexes for testing measurement invariance. Structural Equation Modeling, 9: 233255. [Taylor &; Francis Online], [Web of Science ®] [Google Scholar] suggestions, factor means differences between the three countries contributing to the scarce cross-national electronic service quality literature are tentatively examined. These initial empirical findings imply that although consumers in different countries use the same dimensions to evaluate mobile Internet services, importance weightings assigned on these dimension are probably not the same.  相似文献   

19.
This article takes stock of the current state of research on knowledge processes in virtual teams (VTs) and consolidates the extent research findings. Virtual teams, on the one hand, constitute important organisational entities that facilitate the integration of diverse and distributed knowledge resources. On the other hand, collaborating in a virtual environment creates particular challenges for the knowledge processes. The article seeks to consolidate the diverse evidence on knowledge processes in VTs with a specific focus on identifying the factors that influence the effectiveness of these knowledge processes. The article draws on the four basic knowledge processes outlined by Alavi and Leidner (2001 Alavi, M.Leidner, D.E., 2001. Review: knowledge management and knowledge management systems: conceptual foundations and research issues. MIS Quarterly, 25 (1), 107136. doi: 10.2307/3250961[Crossref], [Web of Science ®] [Google Scholar]) (i.e. creation, transferring, storage/retrieval and application) to frame the investigation and discuss the extent research. The consolidation of the existing research findings allows us to recognise the gaps in the understanding of knowledge processes in VTs and identify the important avenues for future research.  相似文献   

20.
The concept of context honeypot for privacy violation, based on relational databases, was introduced (S.K. Gupta, Damor, Goyal, A. Gupta, & Sabharwal, 2008 Gupta, S.K., Damor, R.G.S., Goyal, V., Gupta, A. and Sabharwal, S. 2008. Context honeypot: A framework for anticipatory privacy violation. Proceedings of the 1st ICETET, : 813818. doi: 10.1109/ICETET.2008.26 [Google Scholar]). Its aim is to confirm or reject the suspicion cast on a user through external stimuli. Its various characteristics such as luring, opaqueness and confirmation of suspicion have not yet been explored. Here, we focus on one of its important characteristics, opaqueness; that is, it should remain invisible to attackers. This paper discusses ways to quantify effectiveness of a context honeypot system in upholding its opaqueness property to suspected attacker. We conducted an experiment by generating a context honeypot system with known suspected attackers and then quantified its effectiveness through the proposed methods. The results obtained validate the methods proposed by us as an effective tool to quantify the effectiveness of the context honeypot in maintaining its opaqueness property.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号