共查询到20条相似文献,搜索用时 828 毫秒
1.
Nita H. Shah Hardik N. Soni Jyoti Gupta 《International journal of systems science》2014,45(8):1723-1727
In a recent paper, Begum et al. (2012, International Journal of Systems Science, 43, 903–910) established pricing and replenishment policy for an inventory system with price-sensitive demand rate, time-proportional deterioration rate which follows three parameters, Weibull distribution and no shortages. In their model formulation, it is observed that the retailer's stock level reaches zero before the deterioration occurs. Consequently, the model resulted in traditional inventory model with price sensitive demand rate and no shortages. Hence, the main purpose of this note is to modify and present complete model formulation for Begum et al. (2012). The proposed model is validated by a numerical example and the sensitivity analysis of parameters is carried out. 相似文献
2.
Shoude Li 《International journal of systems science》2014,45(11):2390-2401
Using the well-known Arrow and Karlin (1958) dynamic production–inventory model and the model with tradable emission permits which was presented by Dobos (2005, 2007), we develop a model of the production–inventory system with deteriorating items and tradable emission permits. The objective of this paper is to apply the optimal control theory to solve the production–inventory problem with deteriorating items and tradable emission permits, and derive the optimal inventory level and the optimal production rate that minimise the total cost. The results are discussed with a numerical example and a sensitivity analysis of the optimal solution with respect to the parameters of the production–inventory system is carried out. 相似文献
3.
This paper presents further results on the robust control method for qubit systems in Dong et al. (2013). Based on the properties of an antisymmetric system, an alternative method is presented to analyse and exclude singularity intervals in the proof of partial original results. For the case of amplitude damping decoherence, a larger sampling period is presented when the upper bound of the probability of failure is small enough. For the case of phase damping decoherence, a larger sampling period is given when the lower bound of the target coherence is large enough. Furthermore, we provide improved sampling periods for amplitude damping decoherence and phase damping decoherence without the above prior constraints. 相似文献
4.
5.
Leap et al. (2016) reduced the time complexity of the Bauer-Millward (2007) ciphertext-only attack on the Hill cipher from 𝒪(Ln) to 𝒪(Ln?1), where L is the length of the alphabet, and n is the block size. This article presents an attack that reduces the complexity to 𝒪(Ln?1?s), 0?≤?s?≤?n???1. The practical limitation on the size of s is the memory available on the computer being used for the attack. Specifically, the computer must be able to hold Ls integer arrays of length N, where N is the number of blocks of ciphertext. The key idea is not to iterate over potential rows of the decryption matrix, but to iterate over randomly chosen characters in the plaintext. This attack also admits a straightforward parallel implementation on multiple processors to further decrease the run time of the attack. 相似文献
6.
This paper extends the results of Zhang et.al. (1997) for linear periodically time-varying control to general linear time-varying (LTV) control. It is shown that linear time-invariant (LTI) control provides strictly better control performance than linear strictly time-varying control if l2 disturbance rejection of LTI plants is considered. The analysis is carried out in the frequency domain. This approach provides not only new results on disturbance rejection of LTV control but also some new insight into the properties of general LTV systems. 相似文献
7.
P. Bognár Cs. Ferencz Sz. Pásztor G. Molnár G. Timár D. Hamar 《International journal of remote sensing》2013,34(17):4759-4767
We have developed an advanced version of our yield estimation method [Ferencz et al., 2004, Crop yield estimation by satellite remote sensing. International Journal of Remote Sensing, 25, pp. 4113–4149], that is able to provide reliable forecasts for corn and wheat, several weeks before the harvest. The forecasting method is based on the data of the Advanced Very High Resolution Radiometer (AVHRR) instruments of the National Oceanic and Atmospheric Administration's (NOAA) Polar Orbiting Environmental Satellites (POES). The method was applied to Hungary between the years 1996 and 2000. The forecasted yield values are all within 5% reliability with respect to the actual yield data produced by classic (non-satellite based) methods and provided by the Hungarian Statistical Office, with the exception of 1997, where the absolute error is about 8%. 相似文献
8.
9.
Jyh-Woei Lin 《International journal of remote sensing》2013,34(21):6423-6435
This article uses principal component analysis (PCA) to determine the spatial pattern of total electron content (TEC) anomalies in the ionosphere corresponding to China's Wenchuan Earthquake of 12 May 2008 UTC (Mw?=?7.9). PCA is applied to global ionospheric maps (GIMs) with transforms conducted for the time period from 08:00 to 10:00 UT on 9 May 2008. The GIMs are subdivided into 100 smaller maps (36° longitude and 18° latitude). The smaller maps (71?×?71 pixels) form the transform matrices of corresponding dimensions (2?×?1) through image processing. The transform allows for extreme principal eigenvalues to be assigned to the seismo-ionospheric signature described by Zhao et al. [2008, Is an unusual large enhancement of ionospheric electron density linked with the 2008 great Wenchuan earthquake? Journal of Geophysical Research, 113, A11304, doi: 10.1029/2008JA013613.]. Results show that the range of the TEC anomaly declines with height; however, the anomaly becomes more localized and intense at higher altitudes (250–300 km), giving the anomaly the spatial pattern of a downward-facing trumpet. 相似文献
10.
Menghua Wang 《International journal of remote sensing》2013,34(24):5651-5663
The Rayleigh scattering radiance at the top of the atmosphere (TOA) depends on the surface atmospheric pressure. In processing the Coastal Zone Color Scanner (CZCS) imagery, Gordon et al. (Applied Optics, 27, 862–871, 1988) developed a simple formula to account for the Rayleigh radiance changes with the variation of the surface atmospheric pressure. For the atmospheric pressure changes within ±3%, the accuracy of the Gordon et al. (1988) formula in computing the Rayleigh radiance is usually within 0.4%, 0.3%, 0.15% and 0.05% for the wavelengths 412, 443, 555 and 865 nm, respectively. This could result in up to ~3% uncertainty in the derived water‐leaving radiance at the blue wavelengths for very clear atmospheres. To improve the performance, a refinement to the Gordon et al. (1988) formula is developed based on the radiative transfer simulations. The refined scheme can produce Rayleigh radiance with an uncertainty within 0.1% (often within 0.05%) at the blue, while uncertainty is within 0.05% for the green to near‐infrared wavelengths. The refined algorithm has been implemented in the Sea‐viewing Wide Field‐of‐view Sensor (SeaWiFS) data processing system. Results from the SeaWiFS data show the improved ocean colour products in the southern oceans where consistently low atmospheric pressures are usually observed. This could also significantly improve the performance of the Rayleigh radiance computations over the high altitude lakes. In addition, with the refined algorithm, the same Rayleigh radiance tables can be possibly used for the various ocean colour satellite sensors in which there are slightly different sensor spectral band characterizations. 相似文献
11.
Jeanne Koudogbo Jacinthe Giroux Sophie René de Cotret 《Canadian Journal of Science, Mathematics, & Technology Education》2013,13(3):199-218
RÉSUMÉLa numération a fait l'objet d'études importantes, notamment au Québec, durant les années 1980–2000. Les études ont révélé sa complexité ainsi que les difficultés que posent à la fois son enseignement et son apprentissage. La présente étude s'inscrit dans le prolongement d'une suite d'études didactiques sur ces difficultés. Plus précisément, elle investigue les connaissances d'élèves québécois de 3e année primaire sur la numération de position et les compare à celles d'une recherche phare menée par Bednarz et Dufour-Janvier dont les résultats ont fait l'objet de plusieurs publications (1982, 1984a, 1984b, 1988). Les résultats de notre étude montrent que si 30 ans ont passé depuis la recherche de Bednarz et Dufour-Janvier, peu de changements sont observés dans les conduites mathématiques des élèves en numération. Quelques hypothèses, relatives à la fois aux contraintes d'enseignement et aux difficultés spécifiques d'appropriation de la numération sont, au terme de l'article, formulées pour expliquer ces résultats. 相似文献
12.
We study the problem of how much error is introduced in approximating the dynamics of a large vehicular platoon by using a partial differential equation, as was done in Barooah, Mehta, and Hespanha [Barooah, P., Mehta, P.G., and Hespanha, J.P. (2009), ‘Mistuning-based Decentralised Control of Vehicular Platoons for Improved Closed Loop Stability’, IEEE Transactions on Automatic Control, 54, 2100–2113], Hao, Barooah, and Mehta [Hao, H., Barooah, P., and Mehta, P.G. (2011), ‘Stability Margin Scaling Laws of Distributed Formation Control as a Function of Network Structure’, IEEE Transactions on Automatic Control, 56, 923–929]. In particular, we examine the difference between the stability margins of the coupled-ordinary differential equations (ODE) model and its partial differential equation (PDE) approximation, which we call the approximation error. The stability margin is defined as the absolute value of the real part of the least stable pole. The PDE model has proved useful in the design of distributed control schemes (Barooah et al. 2009; Hao et al. 2011); it provides insight into the effect of gains of local controllers on the closed-loop stability margin that is lacking in the coupled-ODE model. Here we show that the ratio of the approximation error to the stability margin is O(1/N), where N is the number of vehicles. Thus, the PDE model is an accurate approximation of the coupled-ODE model when N is large. Numerical computations are provided to corroborate the analysis. 相似文献
13.
This article examines visitor interactions with and through a physical/digital installation designed for an open-air museum that displays historic buildings and ways of life from the past. The installation was designed following the “Assembly” design scheme proposed by Fraser et al. (2003), and centered around five principles for the design of interactive experiences. We discuss how the Assembly framework was adapted and applied to our work on the installation called Reminisce, and we then present qualitative data gathered through the shadowing and naturalistic observations of small groups of visitors using Reminisce during their exploration of the museum. Through these data excerpts, we illustrate how interaction occurred among visitors and with the assembly. We reflect on the guiding principles of the adapted Assembly framework and on their usefulness for the design of place-specific interactional opportunities in heritage settings. Results from the empirical study show that the adapted Assembly principles provide HCI (human–computer interaction) researchers and designers with ways in which to flexibly support collocated interactions at heritage sites across artifacts and locations in ways that both complement and enrich the physical setting of the visit and its character. 相似文献
14.
AbstractGOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and digital signature. Mendel et al. (2008) and Courtois and Mourouzis (2011) found attacks on the compression function of the GOST-R structure that were basically weaknesses of the GOST-R block cipher (GOST 28147–89, 1989). Hence in 2012, it was updated to GOST-R 34.11-2012, which replaced the older one for all its applications from January 2013. GOST-R 34.11-2012 is based on a modified Merkle-Damgård construction. Here we present a modified version of GOST-R 34.11-2012 (Modified GOST-R (MGR) hash). The design of the MGR hash is based on wide-pipe construction, which is also a modified Merkle-Damgård construction. MGR is much more secure as well as three times faster than GOST-R 34.11-2012. Advanced Encryption Standard (AES)-like block ciphers have been used in designing the compression function of MGR because AES is one of the most efficient and secure block ciphers and has been evaluated for more than 14?years. A detailed statistical analysis with a few other attacks on MGR is incorporated into this paper. 相似文献
15.
Donna Kotsopoulos Joanne Lee Duane Heide 《Canadian Journal of Science, Mathematics, & Technology Education》2013,13(4):348-364
Abstract This research compared the cognitive demand levels of mathematical tasks engaged in during classroom instruction to paired mathematical tasks assigned for homework. The research took place in an eighth-grade classroom over the course of one school year. In total, the cognitive demand levels of 66 mathematical tasks were evaluated using the IQA Academic Rigor: Mathematics Rubric for the Potential of the Task (Boston & Smith, 2009). Results from this research showed that approximately two thirds of the time the mathematical tasks assigned for homework differed in levels from the tasks used during classroom instruction. Implications for student learning, classroom instruction, homework, and further research are discussed. 相似文献
16.
In manufacturing industries, the lifetime of an item is usually characterised by a random variable X and considered to be satisfactory if X exceeds a given lower lifetime limit L. The probability of a satisfactory item is then ηL := P(X ≥ L), called conforming rate. In industrial companies, however, the lifetime performance index, proposed by Montgomery and denoted by CL, is widely used as a process capability index instead of the conforming rate. Assuming a parametric model for the random variable X, we show that there is a connection between the conforming rate and the lifetime performance index. Consequently, the statistical inferences about ηL and CL are equivalent. Hence, we restrict ourselves to statistical inference for CL based on generalised order statistics, which contains several ordered data models such as usual order statistics, progressively Type-II censored data and records. Various point and interval estimators for the parameter CL are obtained and optimal critical regions for the hypothesis testing problems concerning CL are proposed. Finally, two real data-sets on the lifetimes of insulating fluid and ball bearings, due to Nelson (1982) and Caroni (2002), respectively, and a simulated sample are analysed. 相似文献
17.
《Information Security Journal: A Global Perspective》2013,22(5):256-268
ABSTRACT Image hiding methods embed a secret image into a host image. The resultant stego-image does not attract the interceptors that would not detect the differences between the host image and the stego-image. To exploit the great developments in the area of image compression and to improve the quality of stego-image, this paper proposes a new method to embed the secret image into the host image. Basically, the secret image is compressed and then embedded into host image. The embedding method is based on the Optimal Pixel Adjustment Process (OPAP) and genetic algorithm. In the paper we addressed the important issues to build such systems. The experimental results showed that the proposed method can improve the quality from 60% to 80% when compared with the simple Least Significant Bit (LSB) replacement methods. Adding to that, the mean square error of the stego-image is much lower compared with other methods (Chan & Cheng, 2004; Chang, Hsiao, & Chan, 2003; Thien & Lin, 2003; Tseng, Chan, Ho, & Chu, 208; Wang, Lin, & Lin, 2001). Also, the proposed technique improves capacity. In other words, we can embed a secret image with size 450?×?450 inside a hosting image with size 512?×?512. 相似文献
18.
AsbjØRn F⊘lstad 《International journal of human-computer interaction》2013,29(3):217-245
Work on how consumers evaluate electronic service quality is both topical and important due to the well-accepted criticality of electronic channels in selling products and services. However, most of the relevant research on electronic research quality is preoccupied with the website Internet context and most of the studies are single-country studies, inhibiting conclusions of generalizibility. Theoretically rooted in the Nordic Model of perceived service quality, this exploratory study uses an e-service quality scale to measure mobile Internet service quality in different national settings. Consistent with the available e-service quality literature, results indicate that e-service quality is a second-order factor, with three reflective first-order dimensions: efficiency, outcome, and customer care. Most important, cross-validation investigations using samples drawn from Korean, Hong Kong, and Japanese mobile Internet user populations, support the factorial structure invariance of the construct. Following Cheung and Reynolds's (2002) suggestions, factor means differences between the three countries contributing to the scarce cross-national electronic service quality literature are tentatively examined. These initial empirical findings imply that although consumers in different countries use the same dimensions to evaluate mobile Internet services, importance weightings assigned on these dimension are probably not the same. 相似文献
19.
This article takes stock of the current state of research on knowledge processes in virtual teams (VTs) and consolidates the extent research findings. Virtual teams, on the one hand, constitute important organisational entities that facilitate the integration of diverse and distributed knowledge resources. On the other hand, collaborating in a virtual environment creates particular challenges for the knowledge processes. The article seeks to consolidate the diverse evidence on knowledge processes in VTs with a specific focus on identifying the factors that influence the effectiveness of these knowledge processes. The article draws on the four basic knowledge processes outlined by Alavi and Leidner (2001) (i.e. creation, transferring, storage/retrieval and application) to frame the investigation and discuss the extent research. The consolidation of the existing research findings allows us to recognise the gaps in the understanding of knowledge processes in VTs and identify the important avenues for future research. 相似文献
20.
《Information Security Journal: A Global Perspective》2013,22(3):142-152
The concept of context honeypot for privacy violation, based on relational databases, was introduced (S.K. Gupta, Damor, Goyal, A. Gupta, & Sabharwal, 2008). Its aim is to confirm or reject the suspicion cast on a user through external stimuli. Its various characteristics such as luring, opaqueness and confirmation of suspicion have not yet been explored. Here, we focus on one of its important characteristics, opaqueness; that is, it should remain invisible to attackers. This paper discusses ways to quantify effectiveness of a context honeypot system in upholding its opaqueness property to suspected attacker. We conducted an experiment by generating a context honeypot system with known suspected attackers and then quantified its effectiveness through the proposed methods. The results obtained validate the methods proposed by us as an effective tool to quantify the effectiveness of the context honeypot in maintaining its opaqueness property. 相似文献