首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.

Railway signalling system is a safety-critical system to ensure railway safety and its development cost is huge. It is of great economic value to apply the generic signalling systems in different environments through configuration of different application data. In this paper, a new method to configure the application data completely and accurately is illustrated; in particular, a technique called automatic generation technology is introduced to automatically configure the functional logic of safety-critical systems, i.e. computer-based interlocking (CBI) system and automatic train protection (ATP) system. All of the application data are collected from the workflow among various departments through the enterprise system (ES). Some application data are represented by models employing automatic generation technology, and the functional logic is then obtained through analysis using these models. A configuration platform based on the ES is developed in which both the efficiency and accuracy of the application data configuration are significantly improved. In addition, it is capable of reducing human errors to a maximal extent.  相似文献   

2.
本文首先对第二届“百篇优秀管理案例”评选活动概况进行了综述,然后通过对三篇高质量的管理案例进行深度解析,探讨案例使用说明中理论分析部分的撰写方式。借鉴案例分析方法,笔者发现高质量的案例使用说明具有以下特征:阐述理论数量得当;理论选取能够恰到好处地解释正文中的现实问题;理论之间具有一定的逻辑条理性,既环环相扣,又易于理解,使成熟的管理理论与现实问题之间能够很好地契合。最后,本文针对以上发现给出提高管理案例质量的一些建议。  相似文献   

3.
We describe and employ a Bayesian posterior simulator for fitting a high-dimensional system of ordinal or count outcome equations. The model is then applied to describe the multiple site recreation demands of individual agents, and we argue that our approach provides advantages relative to existing methods commonly applied in this area. In particular, our model flexibly adjusts to match observed frequencies in trip outcomes, permits a flexible correlation pattern among the sites visited by individuals, and the posterior simulator for fitting this model is relatively easy to implement in practice. We also describe how the posterior simulations produced from the model can be used to conduct a variety of counterfactual experiments, including predicting behavioral changes and describing welfare implications resulting from shifts in exogenous demographic and site characteristics. We illustrate our method using data from the Iowa Lakes Project by modeling the visitation patterns of individuals to a set of twenty-nine large Iowa lakes. Consistent with previous findings in the literature, we see strong evidence that own and cross-price effects on trip demand are negative and positive, respectively, that higher income increases the likelihood of visiting most sites, and that a commonly used indicator of water quality, Secchi transparency, is positively correlated with the number of trips taken. In addition, the correlation structure among the errors reveals a complex pattern in which unobserved factors affecting trip demand are generally (though not strictly) positively correlated across sites. The flexibility and richness with which we are able to characterize the demand system provides a solid platform for counterfactual analysis, where we find significant behavioral and welfare effects from changes in site availability, water quality, and travel costs.  相似文献   

4.
Cyber-physical system (CPS) is an emerging area, which cannot work efficiently without proper software handling of the data and business logic. Software and middleware is the soul of the CPS. The software development of CPS is a critical issue because of its complicity in a large scale realistic system. Furthermore, object-oriented approach (OOA) is often used to develop CPS software, which needs some improvements according to the characteristics of CPS. To develop software in a CPS environment, a new systematic approach is proposed in this paper. It comes from practice, and has been evolved from software companies. It consists of (A) Requirement analysis in event-oriented way, (B) architecture design in data-oriented way, (C) detailed design and coding in object-oriented way and (D) testing in event-oriented way. It is a new approach based on OOA; the difference when compared with OOA is that the proposed approach has different emphases and measures in every stage. It is more accord with the characteristics of event-driven CPS. In CPS software development, one should focus on the events more than the functions or objects. A case study of a smart home system is designed to reveal the effectiveness of the approach. It shows that the approach is also easy to be operated in the practice owing to some simplifications. The running result illustrates the validity of this approach.  相似文献   

5.
曹霞 《企业技术开发》2012,(1):41-42,44
可编程程序控制器(PLC)如今已广泛运用于电器控制中。可编程程序控制器除了可以按事先编好的程序进行不同的逻辑控制,还具有自动诊断、随意编程、体积小、通用性好、可靠性高等特点。所以,可编程程序控制器正在逐步取代继电器-接触器控制系统。  相似文献   

6.
付宁 《价值工程》2014,(36):90-91
本文根据无功调节的9区控制原理,结合模糊控制思想,设计了基于11区控制理论的电网AVC模糊控制系统,该系统可以减少无功调节设备频繁调节,避免调节过程产生的振荡区域。仿真结果表明,该电网AVC模糊控制系统具有减少调节设备动作次数,控制曲线平滑的优点,完全满足电力系统可靠性、实时性的要求。  相似文献   

7.
Acquisition Strategy and Dominant Logic in an Engineering Firm   总被引:2,自引:0,他引:2  
This paper presents a dynamic model of acquisition strategy and applies it to the case history of a large engineering firm. The paper uses the notion of 'dominant logic' first put forward by Prahalad and Bettis (1986) to explain how the firm's acquisition strategy and management approach evolved. It is suggested that the core activities and history of the firm led to the development of a management approach that emphasized individual autonomy and development, ad hoc structural arrangements, a short-term focus, and flexibility and opportunism. These characteristics persisted over time and tended to inhibit both commitment to intended strategies and extension of core competencies. At the same time, this logic encouraged opportunistic acquisitions which snowballed into a major new strategic thrust. It is concluded: (a) the firm's 'dominant logic' rooted in core activities and in the history of a firm can be used to explain its acquisition management behaviour; (b) the more malleable elements of a dominant logic can be somewhat extended under the thrust of key managers, but permanent change will not occur as long as these shifts conflict with more immutable elements; (c) in a process of growth by acquisition, a firm will tend to preserve its unique dominant logic until the inconsistencies it creates are revealed in a crisis or series of crises. One mode of adjustment may then be to operate under more than one dominant logic to accommodate the firm's heterogeneity.  相似文献   

8.
‘Customer requirements’ (CRs) management plays an important role in enterprise systems (ESs) by processing customer-focused information. Quality function deployment (QFD) is one of the main CRs analysis methods. Because CR weights are crucial for the input of QFD, we developed a method for determining CR weights based on trapezoidal fuzzy membership function (TFMF) and 2-tuple linguistic representation (TLR). To improve the accuracy of CR weights, we propose to apply TFMF to describe CR weights so that they can be appropriately represented. Because the fuzzy logic is not capable of aggregating information without loss, TLR model is adopted as well. We first describe the basic concepts of TFMF and TLR and then introduce an approach to compute CR weights. Finally, an example is provided to explain and verify the proposed method.  相似文献   

9.
Reference models play an important role in the knowledge management of the various complex collaboration domains (such as supply chain networks). However, they often show a lack of semantic precision and, they are sometimes incomplete. In this article, we present an approach to overcome semantic inconsistencies and incompleteness of the Supply Chain Operations Reference (SCOR) model and hence improve its usefulness and expand the application domain. First, we describe a literal web ontology language (OWL) specification of SCOR concepts (and related tools) built with the intention to preserve the original approach in the classification of process reference model entities, and hence enable the effectiveness of usage in original contexts. Next, we demonstrate the system for its exploitation, in specific – tools for SCOR framework browsing and rapid supply chain process configuration. Then, we describe the SCOR-Full ontology, its relations with relevant domain ontology and show how it can be exploited for improvement of SCOR ontological framework competence. Finally, we elaborate the potential impact of the presented approach, to interoperability of systems in supply chain networks.  相似文献   

10.
文章提出了一种可以描述故障后系统稳定程度的灵敏度指标,根据系统稳定性逐渐恶化指标趋于零的特点,计算了系统部分参数的临界值;根据稳定指标与故障切除时间在一定范围内的良好线性关系,估算了系统故障临界切除时间;并在单机无穷大系统与10机典型新英格兰系统下进行验证,证明了该方法的正确性。  相似文献   

11.
文章提出了一种可以描述故障后系统稳定程度的灵敏度指标,根据系统稳定性逐渐恶化指标趋于零的特点,计算了系统部分参数的临界值;根据稳定指标与故障切除时间在一定范围内的良好线性关系,估算了系统故障临界切除时间;并在单机无穷大系统与10机典型新英格兰系统下进行验证,证明了该方法的正确性。  相似文献   

12.
Innovation policy has emerged as a new field of economic policy during the last few decades. This paper explores the rationales for national innovation policies, as laid out in the existing literature on the subject, and considers what the lessons and challenges for theory and practice in this area are. Innovation policy attempts to influence innovation activity, often with the purpose of increasing economic growth. But it can also have more specific aims such as preventing unwarranted climate change, improving national health, and so on. The increasing attention given to innovation policy at the national level from the 1990s onwards went hand in hand with the development of a new, systemic understanding of innovation, which in a better way than before accounted for the ‘stylised facts’ of innovation activity as identified by empirical work. The system approach, as the paper shows, came to have a significant influence on the subsequent policy discourse. Drawing on recent advances in innovation-systems theory, a synthetic framework for the analysis of innovation policy is developed and used to highlight issues of particular relevance for the conduct of innovation policy and future scholarly work in this area.  相似文献   

13.
In recent years, information systems in telecommunication enterprises have been characterised by boundary expansion and increase of departmental-level applications. These changes increase the complexity of security evaluation and pose new challenges to enterprises' information security. Taking into account the behaviour characters of system users, we put forward a system security evaluation approach based on access paths. This approach can help evaluators and users find out potential security risks without figuring out the boundary of systems explicitly. It has no special requirements for system scale and can be used in the evaluation of enterprise-level and departmental-level systems. This paper also presents the formal definition of access path and related evaluation rules.  相似文献   

14.
张义和 《价值工程》2013,(35):118-119
水泥混凝土路面病害严重且无论采用何种养护方法已经无法保证路面的使用性能时,可以采用冲压机械对旧水泥路面板进行冲击破碎并进行压实,从而形成嵌锁稳固的新路面底基层或基层,以达到旧水泥混凝土路面的再生利用,本文对旧水泥混凝土路面采用的冲压技术施工工艺进行了介绍。  相似文献   

15.
信用信息系统设计的经济学分析   总被引:2,自引:0,他引:2  
应用信息经济学理论,研究信用关系作为一种委托一代理契约关系模型的经济学本质,分析信用信息系统对于减少信息不对称条件下市场交易中的“逆向选择”和“道德风险”的监督保障功能,确立信用信息系统设计中的关键要素和应对策略。  相似文献   

16.
改革开放以来,我国农民工的住房问题是一个历久弥新的话题。农民工的住房制度嵌入于多元化制度场域中,其背后隐含着国家逻辑、政府逻辑、市场逻辑和生存逻辑,并且这四种逻辑相互交织和互动,最终导致农民工面临着住房制度化困境。因此,需要加强住房制度的顶层设计,并构建新的制度逻辑,达成农民工住房的多重制度逻辑间的动态平衡。  相似文献   

17.
The rapid development of the internet has brought huge benefits and social impacts; however, internet security has also become a great problem for users, since traditional approaches to packet classification cannot achieve satisfactory detection performance due to their low accuracy and efficiency. In this paper, a new stateful packet inspection method is introduced, which can be embedded in the network gateway and used by a streaming application detection system. This new detection method leverages the inexact automaton approach, using part of the header field and part of the application layer data of a packet. Based on this approach, an advanced detection system is proposed for streaming applications. The workflow of the system involves two stages: the training stage and the detection stage. In the training stage, the system initially captures characteristic patterns from a set of application packet flows. After this training is completed, the detection stage allows the user to detect the target application by capturing new application flows. This new detection approach is also evaluated using experimental analysis; the results of this analysis show that this new approach not only simplifies the management of the state detection system, but also improves the accuracy of data flow detection, making it feasible for real-world network applications.  相似文献   

18.
I present a new approach to the study of causality in social theory using linguistic fuzzy logic as a framework. This approach differs from conventional analysis of causality on two fronts. First, all variables are considered to possess two degrees of freedom (or variation): a linguistic nuance value, which corresponds to what we conventionally refer to as interval or categorical value, and a linguistic truth value, which measures our confidence level in this nuance value. Second, combining this double fuzzification of variables with linguistic fuzzy logic I propose new tools for studying fuzzy causality. The linguistic fuzzy logic approach is illustrated through a re-examination of Skocpol’s (1979, States and social revolutions: a comparative analysis of France, Russia, and China. Cambridge University Press, Cambridge) theory of social revolution.  相似文献   

19.
王明 《价值工程》2014,(31):30-31
本文通过回顾我国电力系统继电保护技术发展的历程,概述继电保护技术的成就,以此提出继电保护技术新的要求与新发展趋势,即继电保护计算机化、网络化、智能化、保护、控制、测量、数据通信一体化。  相似文献   

20.
李明  王政 《价值工程》2012,31(34):94-95
本文通过对PLC和变频器在煤矿生产中的应用,从系统组成、控制功能、保护功能、性能特点等方面进行了分析,从中体现了这种控制系统与传统继电器-接触器控制系统的比较,在可靠性、技术指标、安全性、经济性等方面的优越性,从而坚定了使用者推广新技术应用的信心和决心。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号