期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
大学基层学术组织的二维模型及其应用 被引量:15
1
作者 叶飞祝 《中国高教研究》 CSSCI 北大核心 2010年第2期59-61,共3页
由于大学社会责任的二元性决定了大学本身的学科集合与大学所面对的问题集合的二元性,也决定了大学里既要有基于学科的基层学术组织,又要有面向问题的基层学术组织。笔者提出一种二维的大学基层学术组织结构模型,用于描述两类基层学术... 由于大学社会责任的二元性决定了大学本身的学科集合与大学所面对的问题集合的二元性,也决定了大学里既要有基于学科的基层学术组织,又要有面向问题的基层学术组织。笔者提出一种二维的大学基层学术组织结构模型,用于描述两类基层学术组织虚实结合,纵横交错,形成二维的网格结构。研究表明在这样的结构模型中基层学术组织可以将其学科领域的专门化和所面对问题的综合性统一起来。 展开更多
关键词 大学社会责任:大学基层学术组织:二维结构模型
原文传递
基于数据挖掘的基层央行内审模型研究
2
作者 潘德宝 《金融经济(下半月)》 2014年第4期169-170,共2页
近年来,人民银行各项业务信息化水平不断提高,推广使用了大量业务系统,积累了海量数据,但传统内部审计手段难以有效揭示海量数据背后隐藏的舞弊信息,本文将数据挖掘技术引入基层央行内部审计工作,构建基于数据挖掘的基层央行内审模型,... 近年来,人民银行各项业务信息化水平不断提高,推广使用了大量业务系统,积累了海量数据,但传统内部审计手段难以有效揭示海量数据背后隐藏的舞弊信息,本文将数据挖掘技术引入基层央行内部审计工作,构建基于数据挖掘的基层央行内审模型,以改进传统内部审计方法,适应信息化快速发展需求。 展开更多
关键词 数据挖掘基层央行内审模型
在线阅读 下载PDF
数字化转型背景下基层领导胜任力模型构建研究——以山东烟台烟草有限公司为例 被引量:1
3
作者 王欣兰 周丽 张世平 《内蒙古科技与经济》 2023年第24期35-39,共5页
文章以山东烟台烟草有限公司为例,构建了包含党政素养、思维能力和工作能力3个维度的基层领导胜任力模型,为山东烟台烟草有限公司提高基层管理效率、增强数字化管理能力指明了路径。
关键词 数字化转型 基层领导胜任力模型 山东烟台烟草有限公司
在线阅读 下载PDF
基于“层级模型”的大学英语思辨能力培养对策研究 被引量:1
4
作者 陈晓 《英语广场(学术研究)》 2022年第12期39-42,共4页
随着当今社会对复合型、高素质人才的需求激增,思辨能力的培养日益受到重视。然而,经调查研究发现大多大学生缺乏思辨性阅读能力和自主学习能力。本文基于文秋芳等“基层模型”,建议应用“互联网+”的教学手段,辅助教师搭建英语教学支架... 随着当今社会对复合型、高素质人才的需求激增,思辨能力的培养日益受到重视。然而,经调查研究发现大多大学生缺乏思辨性阅读能力和自主学习能力。本文基于文秋芳等“基层模型”,建议应用“互联网+”的教学手段,辅助教师搭建英语教学支架,建立“质疑共解”的教学模式,并开展多元化评价体系,引导学生进行自主学习,逐步提高学生的大学英语思辨能力。 展开更多
关键词 基层模型 大学英语 思辨能力 自主学习
在线阅读 下载PDF
Xinhe Mine water inrush risk assessment based on quantification theoretical models 被引量:1
5
作者 LI Hui JING Guo-xun +1 位作者 CAI Zheng-Iong OU Jian-chun 《Journal of Coal Science & Engineering(China)》 2010年第4期386-388,共3页
Taking the Xinhe mine's structure, mine pressure, structural fissure, fault andfault displacement, the distance between fault and water inrush point, thickness of block,water pressure those geological factors whic... Taking the Xinhe mine's structure, mine pressure, structural fissure, fault andfault displacement, the distance between fault and water inrush point, thickness of block,water pressure those geological factors which influenced the water inrush as the independentvariable, based on these data of water inrush point and water uninrush point, usingthe method of quantification theory(Ⅰ,Ⅱ), it would quantitatively disposes the qualitativevariable, applied to calculation to evaluate the risk of Xinhe's water inrush. 展开更多
关键词 water inrush ASSESSMENT PREDICTION quantification theoretical MODEL
在线阅读 下载PDF
Vertical vibration of a floating pile in a saturated viscoelastic soil layer overlaying bedrock 被引量:3
6
作者 崔春义 张石平 +1 位作者 杨刚 李晓飞 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第1期220-232,共13页
An axisymmetrical analytical solution is developed to investigate the vertical time-harmonic vibration of a floating pile in a saturated viscoelastic soil layer overlaying bedrock. The soil is described by porous medi... An axisymmetrical analytical solution is developed to investigate the vertical time-harmonic vibration of a floating pile in a saturated viscoelastic soil layer overlaying bedrock. The soil is described by porous medium model established by Boer, while the pile is described by a beam vibration theory. By using separation theory of differential operator and variables to solve the dynamic governing equations for the soil, the fundamental solutions for the soil reactions on side and bottom of the pile are obtained. The dynamic impedance of the pile head is then derived by solving the vibration equation for the pile according to the compatibility condition between the pile and the soil. The proposed model is validated by comparing special cases of our model with the existing results. Numerical examples are presented to analyze the vibration characteristics of the pile. 展开更多
关键词 floating pile vertical vibration saturated viscoelastic soil Boer's porous medium model separation theory
在线阅读 下载PDF
Unsaturated Creep Behaviors of Weak Intercalated Soils in Soft Rock of Badong Formation 被引量:4
7
作者 ZHU Yan-Bo YU Hong-Ming 《Journal of Mountain Science》 SCIE CSCD 2015年第6期1460-1470,共11页
The cutting slopes in soft rock of redbed appeared in Yichang-Badong highway often suffer from the instability along weak intercalations, so the creep behaviors of weak intercalated soils are crucially important for t... The cutting slopes in soft rock of redbed appeared in Yichang-Badong highway often suffer from the instability along weak intercalations, so the creep behaviors of weak intercalated soils are crucially important for the stability of cutting slopes. Because the deformation of weak intercalated soils is significantly affected by water content due to the strong water sensitivity, it is necessary to study the influence of matric suction on the creep behaviors of weak intercalated soils. In order to find out the unsaturated creep characters of weak intercalated soils, a GDS unsaturated triaxial apparatus was used. Then the triaxial creep experiments on weak intercalated soil samples under varying matric suction were conducted to obtain the unsaturated creep curves. The results show that the weak intercalated soils have obvious creep behaviors, and the creep strain is in nonlinear relationship with stress and time. When the matric suction is constant, a larger deviator stress will lead to a larger creep strain; When the deviator stress is constant, a smaller matric suction will lead to a larger creep strain. Based on the Mesri creep model, an improved creep model for weak intercalated soils under varying matric suction was established, in which the relationship of stress-strain was expressed with a hyperbolic function, and the relationship of strain-time was expressed with power functions in stages. Then an unsaturated creep model including stress-matric suction-strain-time for weak intercalated soils was established based on the power function relationship between matric suction and Ed(a parameter of the improved creep model). The comparison of the calculated values of creep model and the experimental values shows that the creep behaviors of weak intercalated soils can be predicted by the unsaturated creep model by and large. 展开更多
关键词 Badong formation Weak intercalated soils Unsaturated creep behaviors Soil triaxial apparatus Creep model
在线阅读 下载PDF
Longitudinal dynamic response of pile in layered soil based on virtual soil pile model 被引量:9
8
作者 吴文兵 王奎华 +1 位作者 马少俊 CHIN Jian Leo 《Journal of Central South University》 SCIE EI CAS 2012年第7期1999-2007,共9页
Taking the effect of finite soil layers below pile end into account,the longitudinal dynamic response of pile undergoing dynamic loading in layered soil was theoretically investigated.Firstly,finite soil layers below ... Taking the effect of finite soil layers below pile end into account,the longitudinal dynamic response of pile undergoing dynamic loading in layered soil was theoretically investigated.Firstly,finite soil layers below pile end are modeled as virtual soil pile whose cross-section area is the same as that of the pile and the soil layers surrounding the pile are described by the plane strain model.Then,by virtue of Laplace transform and impedance function transfer method,the analytical solution of longitudinal dynamic response at the pile head in frequency domain is yielded.Also,the semi-analytical solution in time domain undergoing half-cycle sine pulse at the pile head is obtained by means of inverse Laplace transform.Based on these solutions,a parametric study is conducted to analyze emphatically the effects of parameters of soil below pile end on velocity admittance and reflected wave signals at the pile head.Additionally,a comparison with other models with different supporting conditions from soil below pile end is performed to verify the model presented. 展开更多
关键词 soil-pile dynamic interaction virtual soil pile layered soil longitudinal vibration velocity admittance reflected wavesignal
在线阅读 下载PDF
System failure analysis based on DEMATEL–ISM and FMECA 被引量:2
9
作者 申桂香 孙曙光 +3 位作者 张英芝 王志琼 陈炳锟 马闯 《Journal of Central South University》 SCIE EI CAS 2014年第12期4518-4525,共8页
A new method of system failure analysis was proposed. First, considering the relationships between the failure subsystems,the decision making trial and evaluation laboratory(DEMATEL) method was used to calculate the d... A new method of system failure analysis was proposed. First, considering the relationships between the failure subsystems,the decision making trial and evaluation laboratory(DEMATEL) method was used to calculate the degree of correlation between the failure subsystems, analyze the combined effect of related failures, and obtain the degree of correlation by using the directed graph and matrix operations. Then, the interpretative structural modeling(ISM) method was combined to intuitively show the logical relationship of many failure subsystems and their influences on each other by using multilevel hierarchical structure model and obtaining the critical subsystems. Finally, failure mode effects and criticality analysis(FMECA) was used to perform a qualitative hazard analysis of critical subsystems, determine the critical failure mode, and clarify the direction of reliability improvement.Through an example, the result demonstrates that the proposed method can be efficiently applied to system failure analysis problems. 展开更多
关键词 system failure analysis related failure decision making and evaluation laboratory-interpretative structural modeling(DEMATEL-ISM) failure mode effects and criticality analysis(FMECA)
在线阅读 下载PDF
A Multi-Level Authorization Based Tenant Separation Mechanism in Cloud Computing Environment
10
作者 Wei Ma Zhen Han +1 位作者 Xiaoyong Li Jiqiang Liu 《China Communications》 SCIE CSCD 2016年第5期162-171,共10页
Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated ... Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated from each other with the constraint of security policies. Learning from the notion of trusted cloud computing and trustworthiness in cloud, in this paper, a multi-level authorization separation model is formally described, and a series of rules are proposed to summarize the separation property of this model. The correctness of the rules is proved. Furthermore, based on this model, a tenant separation mechanism is deployed in a real world mixed-critical information system. Performance benchmarks have shown the availability and efficiency of this mechanism. 展开更多
关键词 separation cloud computing multi-level authorization model security model
在线阅读 下载PDF
Research on failure scenarios of domes based on form vulnerability 被引量:15
11
作者 YE JiHong LIU WenZheng PAN Rui 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第11期2834-2853,共20页
In this paper, form vulnerability theory was applied to the analysis of the failure mechanisms of single-layer latticed spherical shells subjected to seismic excitations. Three 1/10 scale testing models were designed ... In this paper, form vulnerability theory was applied to the analysis of the failure mechanisms of single-layer latticed spherical shells subjected to seismic excitations. Three 1/10 scale testing models were designed with characteristics as follows: Model 1 possesses overall uniform stiffness and is expected to collapse in the strength failure mode as some members become plastic; Model 2 possesses six man-made weak parts located on six radial main rib zones and is expected to collapse in the dynamic in- stability mode with all members still in the elastic stage; Model 3 strengthens the six weak zones of Model 2, and therefore, its stiffness is uniform. Model 3 is proposed to collapse in the strength failure mode when the members are still in the elastic stage By increasing the peak ground accelerations of seismic waves gradually, the shaking table tests were carried out until all three models collapsed (or locally collapsed). On the basis of form vulnerability theory, topological hierarchy models of the test models were established through a clustering process, and various failure scenarios, including overall collapse scenarios and partial collapse scenarios, were identified by unzipping corresponding hierarchical models. By comparison of the failure scenarios based on theoretical analysis and experiments, it was found that vulnerability theory could effectively reflect the weak- ness zones in topological relations of the structures from the perspective of internal causes. The intemal mechanisms of the distinct failure characteristics of reticulated shells subjected to seismic excitations were also revealed in this process. The well-formedness of structural clusters, Q, is closely related to the collapse modes, i.e., uniform changes of Q indicate a uniform distribution of overall structural stiffness, which indicates that strength failure is likely to happen; conversely, non-uniform changes of Q indicate that weak zones exist in the structure, and dynamic instability is likely to occur. 展开更多
关键词 single-layer latticed spherical shell form vulnerabifity collapse mode failure mechanism shaking table test
原文传递
Incident-based traffic congestion control strategy 被引量:4
12
作者 ZHANG AoMuHan GAO ZiYou REN HuaLing 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第5期1338-1344,共7页
Traffic incident happens frequently in urban traffic network and it affects normal operation of traffic system seriously so that study on incident-based congestion control strategies is very important. This study addr... Traffic incident happens frequently in urban traffic network and it affects normal operation of traffic system seriously so that study on incident-based congestion control strategies is very important. This study addresses the problem of the temporary vehicle movement bans design under incident-based traffic congestion situation. A bi-level programming model is proposed to formulate this problem. The upper level problem is to minimize the total travel cost in the view of traffic management agencies, and the lower level problem is to present travelers’ dynamic route choice behavior under temporary vehicle movement bans using the simulation of cell transmission model, then a genetic algorithm is employed to solve the proposed bi-level programming model. Computational results show that the temporary vehicle movement bans measure is able to alleviate the traffic network incident-based congestion effectively and improve system performance of traffic network. 展开更多
关键词 vehicle movement bans design bi-level program genetic algorithm cell transmission model
原文传递
Efficient hierarchical identity based encryption scheme in the standard model over lattices 被引量:2
13
作者 Feng-he WANG Chun-xiao WANG Zhen-hua LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第8期781-791,共11页
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q b... Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and(n, m, q)are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is(2dm^2+ mn + m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry's encryption scheme, by which m^2 bits of plaintext are encrypted into m^2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks. 展开更多
关键词 Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with errors problem GAUSSIAN
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部