首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper concerns the construction of a quadrilateral finite element whose interpolation space admits of rational fractions for basis functions of “Wachspress type” [1, 2]. The construction of this finite element, which is in a way the “rational” equivalent of the ADINI finite element[3, 4], is founded on a method analogous to the one used for Serendip degree-two finite element construction in[2]. The study of interpolation error is dealt with in a paper by Apprato, Arcangeli and Gout in this journal “Rational interpolation of Wachspress error estimates”.  相似文献   

2.
This paper compares the use of four “fast” capacity planning techniques to estimate requirements in a critical health care facility, a surgical intensive care unit (SICU). Each of the techniques is described, models applicable to the SICU facility are developed and indices which estimate performance are calculated. The crucial issue addressed is estimation of the relative level of service that a facility design will afford patients. Results indicate relative utility of the techniques in facility planning.  相似文献   

3.
Computer integrated manufacturing (CIM) is creating unexpected problems for a growing number of manufacturing companies. Manufacturers are finding it especially difficult to attract programmers who are both willing and able to develop the highly complex software that integrates existing accounting, sales, production, engineering, and quality control information subsystems. Consequently, many companies abdicate their responsibility for manufacturing information systems and seek third party support ranging from consulting assistance to a total takeover of the company's information resources and operations. Companies that “give away” their internal information system capabilities to third parties will ultimately lose control of their enterprise information, a danger to be avoided. Off-the-shelf software for desktop computers has become sufficiently powerful to help solve a major portion of this serious problem. We hypothesize that manufacturing engineers (and others) can be trained to use packaged software to leverage their company's systems programming capabilities. In effect they would become “paraprogrammers” who would help design, develop, and maintain manufacturing information systems. This new type of professional would not require a computer science or similar educational background, but could be trained to satisfy many specialized programming needs in a manner similar to how paramedics and paralegals are trained and used in the medical and legal professions, respectively. This paper reports on the early stages of research to determine whether or not product design engineers can use a desktop relational database management system and its various command languages to develop a master bill of material information system (BOMIS). The purpose of the research is to evaluate the amount of programming complexity reduction and increased operational effectiveness that can be achieved through paraprogramming by manufacturing engineers.  相似文献   

4.
By manipulating the imaginary part of the complex-analytic quadratic equation, we obtain, by iteration, a set that we call the “burning ship” because of its appearance. It is an analogue to the Mandelbrot set (M-set). Its nonanalytic “quasi”-Julia sets yield surprizing graphical shapes.  相似文献   

5.
THE PREVAILING WISDOM, AND a common “best practice,” of knowledge management (KM) is that a primary determinant of success in getting people to submit their most valuable personal knowledge to a repository is the existence of a “knowledge culture” in the organization.  相似文献   

6.
It is shown that in first-order linear-time temporal logic, validity questions can be translated into validity questions of formulas not containing “next” or “until” operators. The translation can be performed in linear time.  相似文献   

7.
In this paper we analyze a fundamental issue which directly impacts the scalability of current theoretical neural network models to applicative embodiments, in both software as well as hardware. This pertains to the inherent and unavoidable concurrent asynchronicity of emerging fine-grained computational ensembles and the consequent chaotic manifestations in the absence of proper conditioning. The latter concern is particularly significant since the computational inertia of neural networks in general and our dynamical learning formalisms manifests itself substantially, only in massively parallel hardward—optical, VLSI or opto-electronic. We introduce a mathematical framework for systematically reconditioning additive-type models and derive a neuro-operator, based on the chaotic relaxation paradigm whose resulting dynamics are neither “concurrently” synchronous nor “sequentially” asynchronous. Necessary and sufficient conditions guaranteeing concurrent asynchronous convergence are established in terms of contracting operators. Lyapunov exponents are also computed to characterize the network dynamics and to ensure that throughput-limiting “emergent computational chaos” behavior in models reconditioned with concurrently asynchronous algorithms was eliminated.  相似文献   

8.
This paper is about the study of interpolation error for the Hermite rational “Wachspress type” third degree finite element that is constructed in[1]. We obtain results analogous with those of the “corresponding” ADINI (polynomial) finite element.  相似文献   

9.
The Inner Graphic Formula Method (IGF) which was originally conceived by Professor Ishiketa and further developed by him and his associates was used to investigate the motivation of new company employees.

Japanese companies traditionally recruit new employees from senior classes and notify successful candidates of their intention to employ them around the first of January. Since graduation is in March, April first is, then, the first day of work for almost all of these graduates in their new companies.

The investigation period for this study covers the eleven months from January until the middle of November, and therefore includes the three month period after notification but prior to actual work, from January first until March thirty-first, and the first eight month of actual work, from April first to the middle of November. The subjects fell, naturally, into two groups; a “Blue Collar” group and a “White Collar” group.

This paper deals with the motivation of these newly employed workers in general and, specifically, with the difference in motivational tendencies between “Blue Collar” and “White Collar” workers. As expected analysis showed that clear motivational differences appeared.

Motivation in the white collar workers tended to raise after an initial downturn, while a general downward trend was detected for the blue collar workers. White collar worker's attitudes toward themselves and toward their work seemed to change for the better as a result of having the chance to become introspective while plotting the graph and writing the anecdotal responses needed to complete the investigative sheet for this study.  相似文献   


10.
We show that the negative feedback interconnection of two causal, stable, linear time-invariant systems, with a “mixed” small gain and passivity property, is guaranteed to be finite-gain stable. This “mixed” small gain and passivity property refers to the characteristic that, at a particular frequency, systems in the feedback interconnection are either both “input and output strictly passive”; or both have “gain less than one”; or are both “input and output strictly passive” and simultaneously both have “gain less than one”. The “mixed” small gain and passivity property is described mathematically using the notion of dissipativity of systems, and finite-gain stability of the interconnection is proven via a stability result for dissipative interconnected systems.  相似文献   

11.
The goal of this paper is to offer a framework for classification of images and video according to their “type”, or “style”––a problem which is hard to define, but easy to illustrate; for example, identifying an artist by the style of his/her painting, or determining the activity in a video sequence. The paper offers a simple classification paradigm based on local properties of spatial or spatio-temporal blocks. The learning and classification are based on the naive Bayes classifier. A few experimental results are presented.  相似文献   

12.
This paper presents a case of introducing new technology to a single stage in a maintenance operation composed of sequence of stages. The process - Thermal tile replacement - is a low volume, high value operation. A method for data collection at each stage, to estimate the variability in process quality, cost and duration is presented. The method involves: Identifying key product features, accuracy measure for each, rate of product rejection by feature and the associated probability density functions at each stage. The method relates accuracy variability by feature, “effect” to the contributing stage in the process “cause”. Simulation is used to justify the introduction of a new technology and to predict the percentage of product conformity in a “before” and “after” scenarios for the implementation of the new technology. The simulation model enables the quantification of technology impact on the product quality, overall productivity and the associated cost savings.  相似文献   

13.
This article examines how healthcare professionals experience an Electronic Patient Record (EPR) adoption process. Based on a case study from two surgical wards in Danish hospitals, we analyze the healthcare professionals' conceptions of the technology, how it relates to their professional roles, and aspects of the implementation process from a “sensemaking” perspective.  相似文献   

14.
The threat of cyber attacks motivates the need to monitor Internet traffic data for potentially abnormal behavior. Due to the enormous volumes of such data, statistical process monitoring tools, such as those traditionally used on data in the product manufacturing arena, are inadequate. “Exotic” data may indicate a potential attack; detecting such data requires a characterization of “typical” data. We devise some new graphical displays, including a “skyline plot,” that permit ready visual identification of unusual Internet traffic patterns in “streaming” data, and use appropriate statistical measures to help identify potential cyberattacks. These methods are illustrated on a moderate-sized data set (135,605 records) collected at George Mason University.  相似文献   

15.
The purpose of this paper is to give an exposition of material dealing with constructive logics, typed λ-calculi, and linear logic. The emergence in the past ten years of a coherent field of research often named “logic and computation” has had two major (and related) effects: firstly, it has rocked vigorously the world of mathematical logic; secondly, it has created a new computer science discipline, which spans a range of subjects from what is traditionally called the theory of computation, to programming language design. Remarkably, this new body of work relies heavily on some “old” concepts found in mathematical logic, like natural deduction, sequent calculus, and λ-calculus (but often viewed in a different light), and also on some newer concepts. Thus, it may be quite a challenge to become initiated to this new body of work (but the situation is improving, and there are now some excellent texts on this subject matter). This paper attempts to provide a coherent and hopefully “gentle” initiation to this new body of work. We have attempted to cover the basic material on natural deduction, sequent calculus, and typed λ-calculus, but also to provide an introduction to Girard's linear logic, one of the most exciting developments in logic these past six years. The first part of these notes gives an exposition of the background material (with some exceptions, such as “contraction-free” systems for intuitionistic propositional logic and the Girard translation of classical logic into intuitionistic logic, which is new). The second part is devoted to more current topics such as linear logic, proof nets, the geometry of interaction, and unified systems of logic (LU).  相似文献   

16.
《Information Systems》1989,14(6):443-453
Using a fuzzy-logic-based calculus of linguistically quantified propositions we present FQUERY III+, a new, more “human-friendly” and easier-to-use implementation of a querying scheme proposed originally by Kacprzyk and Zio kowski to handle imprecise queries including a linguistic quantifier as, e.g. find all records in which most (almost all, much more than 75%, … or any other linguistic quantifier) of the important attributes (out of a specified set) are as desired (e.g. equal to five, more than 10, large, more or less equal to 15, etc.). FQUERY III+ is an “add-on” to Ashton-Tate's dBase III Plus.  相似文献   

17.
This note corrects two errors that occurred during the typesetting of our paper “Axiomatisations of functional dependencies in the presence of records, lists, sets and multisets”, which appeared in Hartmann et al. [Axiomatisations of functional dependencies in the presence of records, lists, sets and multisets, Theoret. Comput. Sci. 353(2) (2006) 167–196].  相似文献   

18.
Rush Hour is a children's game that consists of a grid board, several cars that are restricted to move either vertically or horizontally (but not both), a special target car, and a single exit on the perimeter of the grid. The goal of the game is to find a sequence of legal moves that allows the target car to exit the grid. We consider a slightly generalized version of the game that uses an n×n grid and assume that we can place the single exit and target car at any location we choose on initialization of the game.

In this work, we show that deciding if the target car can legally exit the grid is PSPACE-complete. Our constructive proof uses a lazy form of dual-rail reversible logic such that movement of “output” cars can only occur if logical combinations of “input” cars can also move. Emulating this logic only requires three types of devices (two switches and one crossover); thus, our proof technique can be easily generalized to other games and planning problems in which the same three primitive devices can be constructed.  相似文献   


19.
This study considers those questions posed by students during e-mail “tutorials” to elicit information from “guest lecturers” and the use of that information by students in their essays. The “tutorials” were conducted for students in the U.K. by a “guest lecturer” in France. The “guest lecturer” was accredited as a tutor on the module for which the students were enrolled, and participated in the module by the provision of lecture notes prior to the e-mail tutorials. Data for the study, drawn from a comparative education assignment set for undergraduate students enrolled on the module, comprised surveys of students' perceived IT capabilities and attitudes towards IT, analyses of students' questions and analyses of students' essays. The findings of the study indicate (1) that tutees tend to pose questions to elicit information or clarification rather than to elicit the viewpoint or opinions of the “guest lecturer” and (2) that two-thirds of tutees' essays cited information elicited from the “guest lecturer”.  相似文献   

20.
A new simple method (“line patterning technique”) using only standard office equipment is described whereby clearly defined, electrically conducting patterns of graphite can be deposited on polymer (plastic) or paper substrates. The properties of the conductive patterns have been characterized by electrical conductivity and SEM measurements. Sensors were constructed by using interdigitated patterns of graphite deposited on plastic and paper, and coated with a thin film of conducting electronic polymer, e.g. polyaniline emeraldine salt.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号