期刊文献+
共找到3,253篇文章
< 1 2 163 >
每页显示 20 50 100
Rapid and Flexible User-Defined Low-Level Hybridization for Metaheuristics Algorithm in Software Framework
1
作者 S. Masrom Siti Z. Z. Abidin N. Omar 《Journal of Software Engineering and Applications》 2012年第11期873-882,共10页
The metaheuristics algorithm is increasingly important in solving many kinds of real-life optimization problems but the implementation involves programming difficulties. As a result, many researchers have relied on so... The metaheuristics algorithm is increasingly important in solving many kinds of real-life optimization problems but the implementation involves programming difficulties. As a result, many researchers have relied on software framework to accelerate the development life cycle. However, the available software frameworks were mostly designed for rapid development rather than flexible programming. Therefore, in order to extend software functions, this approach involves modifying software libraries which requires the programmers to have in-depth understanding about the internal working structure of software and the programming language. Besides, it has restricted programmers for implementing flexible user-defined low-level hybridization. This paper presents the concepts and formal definition of metaheuristics and its low-level hybridization. In addition, the weaknesses of current programming approaches supported by available software frameworks for metaheuristics are discussed. Responding to the deficiencies, this paper introduces a rapid and flexible software framework with scripting language environment. This approach is more flexible for programmers to create a variety of user-defined low-level hybridization rather than bounded with built-in metaheuristics strategy in software libraries. 展开更多
关键词 SOFTWARE Framework SCRIPTING LANGUAGE Metaheuristics Low-Level HYBRIDIZATION user-defined Strategy
在线阅读 下载PDF
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
2
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
Modified Neural Network Used for Host Utilization Predication in Cloud Computing Environment
3
作者 Arif Ullah Siti Fatimah Abdul Razak +1 位作者 Sumendra Yogarayan Md Shohel Sayeed 《Computers, Materials & Continua》 2025年第3期5185-5204,共20页
Networking,storage,and hardware are just a few of the virtual computing resources that the infrastruc-ture service model offers,depending on what the client needs.One essential aspect of cloud computing that improves ... Networking,storage,and hardware are just a few of the virtual computing resources that the infrastruc-ture service model offers,depending on what the client needs.One essential aspect of cloud computing that improves resource allocation techniques is host load prediction.This difficulty means that hardware resource allocation in cloud computing still results in hosting initialization issues,which add several minutes to response times.To solve this issue and accurately predict cloud capacity,cloud data centers use prediction algorithms.This permits dynamic cloud scalability while maintaining superior service quality.For host prediction,we therefore present a hybrid convolutional neural network long with short-term memory model in this work.First,the suggested hybrid model is input is subjected to the vector auto regression technique.The data in many variables that,prior to analysis,has been filtered to eliminate linear interdependencies.After that,the persisting data are processed and sent into the convolutional neural network layer,which gathers intricate details about the utilization of each virtual machine and central processing unit.The next step involves the use of extended short-term memory,which is suitable for representing the temporal information of irregular trends in time series components.The key to the entire process is that we used the most appropriate activation function for this type of model a scaled polynomial constant unit.Cloud systems require accurate prediction due to the increasing degrees of unpredictability in data centers.Because of this,two actual load traces were used in this study’s assessment of the performance.An example of the load trace is in the typical dispersed system.In comparison to CNN,VAR-GRU,VAR-MLP,ARIMA-LSTM,and other models,the experiment results demonstrate that our suggested approach offers state-of-the-art performance with higher accuracy in both datasets. 展开更多
关键词 Cloud computing DATACENTER virtual machine(VM) predicATION algorithm
在线阅读 下载PDF
Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
4
作者 Yan Cao Zhizhuang Zhou Yan Zhuang 《Computers, Materials & Continua》 2025年第7期1545-1565,共21页
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w... Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments. 展开更多
关键词 Dynamic symbolic execution opaque predicates code obfuscation
在线阅读 下载PDF
Utility of inflammatory markers as predictors of recurrence in gastrointestinal stromal tumors:Insights from a nomogram-based approach
5
作者 Chris B Lamprecht Tyler Kashuv Brandon Lucke-Wold 《World Journal of Gastrointestinal Oncology》 2025年第9期385-390,共6页
Gastrointestinal stromal tumors(GISTs),the most prevalent mesenchymal tumors,often have poor outcomes due to high recurrence rates.However,the specific risk factors for GISTs,particularly those concerning the innate i... Gastrointestinal stromal tumors(GISTs),the most prevalent mesenchymal tumors,often have poor outcomes due to high recurrence rates.However,the specific risk factors for GISTs,particularly those concerning the innate immune-inflammatory response,remain poorly understood.This editorial highlights key prognostic factors that impact GIST progression and prognosis,while discussing the findings of a recent study that investigated the prognostic value of systemic inflammatory markers:systemic immune-inflammation index,neutrophil/lym-phocyte ratio,platelet/lymphocyte ratio,and monocyte/lymphocyte ratio,on recurrence-free survival in GIST patients.This editorial examines strategies to enhance the clinical applicability of the nomogram developed in the study,ensuring its effectiveness for robust implementation.Future directions outlined in the editorial stress the importance of integrating molecular insights,including KIT and PDGFRA mutations,tumor staging,and mitotic rates to refine predictive models.The editorial also underscores the value of multi-center studies to enhance the generalizability and clinical relevance of these approaches.By bridging inflammatory biomarkers with genetic and clinicopathologic factors,a more comprehensive understanding of GIST pathophysiology can be developed,paving the way for improved management strategies and patient outcomes.This perspective serves as a call to action for continued research into the interplay between genetic mutations,inflammatory marker modulation,and GIST progression,aiming to expand the scope of personalized oncology through a deeper understanding of GIST progression. 展开更多
关键词 Gastrointestinal stromal tumor Recurrence prediction Nomogram predicative modeling Inflammatory markers Tumor risk factors
暂未订购
Prediction of compressive strength of cement mortars with fly ash and activated coal gangue 被引量:6
6
作者 周双喜 陈益民 张文生 《Journal of Southeast University(English Edition)》 EI CAS 2006年第4期549-552,共4页
The pozzolanic activity of coal gangue, which is calcining at 500 to 1 000 ℃, differs distinctly. The simplex-centroid design with upper and lower bounds of component proportion is adopted to study the compressive st... The pozzolanic activity of coal gangue, which is calcining at 500 to 1 000 ℃, differs distinctly. The simplex-centroid design with upper and lower bounds of component proportion is adopted to study the compressive strength of mortars made with ternary blends of cement, activated coal gangue and fly ash. Based on the results of a minimum of seven design points, three special cubic polynomial models are used to establish the strength predicating equations at different ages for mortars. Five experimental checkpoints were also designed to verify the precision of the equations. The most frequent errors of the predicted values are within 3%. A simple and practical way is provided for determining the optimal proportion of two admixtures when they are used in concrete. 展开更多
关键词 thermal activated coal gangue simplex-centroid design predicating equation compressive strength
在线阅读 下载PDF
Joint multivariate statistical model and its applications to synthetic earthquake predic-tion 被引量:14
7
作者 韩天锡 蒋淳 +2 位作者 魏雪丽 韩梅 冯德益 《地震学报》 CSCD 北大核心 2004年第5期523-528,625,共6页
针对目前地震综合预报中的一些问题,利用近30年来迅速发展的多元统计分析中主成分分析、判别分析组成多元统计组合模型,在众多的地震预报指标(预报因子)中采用信息最大化方法,选择对中期预测信息累积贡献率大于90%地震预报指标,分... 针对目前地震综合预报中的一些问题,利用近30年来迅速发展的多元统计分析中主成分分析、判别分析组成多元统计组合模型,在众多的地震预报指标(预报因子)中采用信息最大化方法,选择对中期预测信息累积贡献率大于90%地震预报指标,分别进行相关分析、预测、检验,最终应用马氏距离判别作外推综合预报;并以华北地区(30°~42°N,108°125°E)为例进行模型的应用检验,初步研究已取得了较好的效果. 展开更多
关键词 多元统计组合模型 主成分分析 判别分析 地震综合预报
在线阅读 下载PDF
基于不同测试终点的设施菜地土壤Cd与新污染物复合污染毒性阈值及预测模型
8
作者 刘佳晓 王萌 +5 位作者 孙晓艺 俞磊 王静 周如烟 秦璐瑶 陈世宝 《中国环境科学》 北大核心 2026年第1期416-428,共13页
采用小白菜生长、赤子爱胜蚓生长和土壤微生物基质诱导呼吸(SIR)为毒性测试终点,对我国6种不同性质设施菜地土壤中Cd与四环素和吡虫啉单一及复合污染的毒性阈值(EC_(x))进行测定,并构建了污染物毒性与土壤主要影响因子间的量化关系及预... 采用小白菜生长、赤子爱胜蚓生长和土壤微生物基质诱导呼吸(SIR)为毒性测试终点,对我国6种不同性质设施菜地土壤中Cd与四环素和吡虫啉单一及复合污染的毒性阈值(EC_(x))进行测定,并构建了污染物毒性与土壤主要影响因子间的量化关系及预测模型.结果表明:不同性质设施菜地土壤中污染物对不同测试终点的毒性剂量-效应关系呈现出明显的S型曲线,以小白菜为例,Cd的毒性阈值EC_(10)为0.6~8.5,EC_(50)为4.3~14.7mg/kg;Cd与四环素复合污染的毒性阈值EC_(10)为0.1~2.2mg/kg,EC_(50)为1.2~6.9mg/kg;Cd与吡虫啉复合污染的毒性阈值EC_(10)为0.1~3.7mg/kg,EC_(50)为1.4~10.0mg/kg;污染物毒性阈值在不同测试终点间呈较大差异,如Cd和四环素毒性阈值由大到小顺序依次为小白菜>蚯蚓>微生物,复合污染条件下的毒性阈值小于单一污染;小白菜生长对土壤污染物表现出低剂量刺激效应,最大刺激效应为103%~110%;pH值是影响和预测土壤中污染物毒性阈值的主控因子,基于土壤pH值、CEC、OC含量的归趋化预测模型可有效预测设施菜地土壤中Cd与新污染物复合污染的生态风险毒性阈值. 展开更多
关键词 Cd 复合污染 剂量-效应 低剂量毒物 刺激效应
在线阅读 下载PDF
英藏“谓语”比较与英文教学中Predicate一词藏译略考
9
作者 阿努 赤列德吉 《海外英语》 2016年第3期177-178,共2页
我区实施"藏汉英三语"教育可谓喜忧参半,拉萨等城市虽取得显著成效,而偏远农牧区的藏族学生却因作为英文课堂媒介语的汉语基础薄弱,英文学习效果欠佳。因此,英藏双语的直接对比研究的缺乏,是导致农牧区英文教育处境艰难的重... 我区实施"藏汉英三语"教育可谓喜忧参半,拉萨等城市虽取得显著成效,而偏远农牧区的藏族学生却因作为英文课堂媒介语的汉语基础薄弱,英文学习效果欠佳。因此,英藏双语的直接对比研究的缺乏,是导致农牧区英文教育处境艰难的重要原因。该文以英文教学为主体,旨在通过对英藏基础句法中"Predicate"一词的直接对比和语法术语的藏译探讨,望能解决农牧区藏族学生英文教学中的理解困扰。 展开更多
关键词 英藏 谓语 比较 教学 predicATE 藏译
在线阅读 下载PDF
康德的存在论题论证
10
作者 胡好 《中山大学学报(社会科学版)》 北大核心 2026年第1期173-184,共12页
康德对存在论题给出三个强有力的论证。一是“外在性”论证,由于存在断定了外在于概念的现实对象,实在谓词只断定概念之中的属性,因而存在与实在谓词不同。二是“一样多”论证,即现实物比可能物多一个存在,而它们是同一物,因此存在不是... 康德对存在论题给出三个强有力的论证。一是“外在性”论证,由于存在断定了外在于概念的现实对象,实在谓词只断定概念之中的属性,因而存在与实在谓词不同。二是“一样多”论证,即现实物比可能物多一个存在,而它们是同一物,因此存在不是事物的任何一种属性,否则现实物会由于多出一个属性而与可能物不同。三是“可能不存在”论证,假定存在是实在谓词,则最高实在存在者既在观念中、又在现实中必然存在,但这个存在者在现实中却可能不存在,所以存在不是实在谓词。最高实在的存在者之所以在现实中可能不存在,是因为观念和现实(或思维和存在)之间有一道鸿沟。存在论题的论证不只是一项技术性工作,更对康德重建形而上学有重要意义。 展开更多
关键词 存在 实在谓词 外在性 归谬法
在线阅读 下载PDF
基于分段函数的不透明谓词
11
作者 陈沈杰 王智昊 吴彪 《电子科技》 2026年第2期45-53,共9页
作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号... 作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号执行技术以及混淆后程序控制流较简单问题,文中提出了一种基于分段函数的不透明谓词。攻击动态符号执行存在的缺陷,利用分段函数使引入的变量收敛于设定值,以此构造不透明谓词,隐藏程序真实控制流。基于LLVM(Low Level Virtual Machine)框架实现了所提混淆系统,并进行了实验检测。实验结果表明,所提混淆方法有效增加了程序控制流的复杂度,能够抵御动态符号执行技术。相较于现有混淆系统,所提方法使程序的可维护度平均下降23.8%,具有更高的混淆强度。 展开更多
关键词 代码混淆系统 不透明谓词 虚假控制流 符号执行 静态分析 LLVM 逆向工程 控制流图
在线阅读 下载PDF
英语谓语(Predicate)的概念功能
12
作者 桂永霞 《宜春学院学报》 2013年第4期136-138,共3页
将谓语定义为"限定成分+谓体"。谓语动词具有概念功能、人际功能和语篇功能。本文只讨论谓语动词的概念功能。谓语动词的概念功能体现在及物性系统,语态和归一度三个方面。谓语是及物性系统的三要素之一,并且及物系统的六个... 将谓语定义为"限定成分+谓体"。谓语动词具有概念功能、人际功能和语篇功能。本文只讨论谓语动词的概念功能。谓语动词的概念功能体现在及物性系统,语态和归一度三个方面。谓语是及物性系统的三要素之一,并且及物系统的六个过程是按照动词的种类来划分的;语态是由动词过程与哪一个参与者首先发生关系来决定的;归一度即肯定或否定的判断,是由谓语(限定成分)加否定副词(not)构成的。 展开更多
关键词 英语 谓语 概念功能
在线阅读 下载PDF
Theory of Approximate Reasoning in Two-Valued Predicate Logic Based on the Quasi-truth Degrees 被引量:2
13
作者 秦晓燕 刘军 +2 位作者 徐扬 陈树伟 刘熠 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期23-27,共5页
Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the ... Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the quasi-truth degrees of first-order formulae is discussed, and it is proved that there is no isolated point in the logic metric space (F, ρ ). Thus the pseudo-metric between first-order formulae is well defined to develop the study about approximate reasoning in the logic metric space (F, ρ ). Then, three different types of approximate reasoning patterns are proposed, and their equivalence under some condition is proved. This work aims at filling in the blanks of approximate reasoning in quantitative predicate logic. 展开更多
关键词 approximate reasoning PSEUDO-METRIC quasi-truth degree predicate logic
在线阅读 下载PDF
Predication of Fhhh potential in PTA wastewater treatment 被引量:1
14
作者 CHENGShu-pei SHILei ZHANGXu-xiang YANJun DINGZhong-hai HAOChun-bo 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2004年第1期1-4,共4页
Ebis is the intelligent environmental biotechnological informatics software developed for judging the effectiveness of the microorganism strain in the industrial wastewater treatment system(IWTS) at the optimal status... Ebis is the intelligent environmental biotechnological informatics software developed for judging the effectiveness of the microorganism strain in the industrial wastewater treatment system(IWTS) at the optimal status. The parameter, as the objective function for the judgment, is the minimum reactor volume( V _ min ) calculated by Ebis for microorganism required in wastewater treatment. The rationality and the universality of Ebis were demonstrated in the domestic sewage treatment system(DSTS) with the data published in USA and China at first,then Fhhh strain's potential for treating the purified terephthalic acid(PTA) was proved. It suggests that Ebis would be useful and universal for predicating the technique effectiveness in both DSTS and IWTS. 展开更多
关键词 SOFTWARE STRAIN POTENTIAL predicATION purified terephthalic acid wastewater
在线阅读 下载PDF
Predicate Oriented Pattern Analysis for Biomedical Knowledge Discovery 被引量:2
15
作者 Feichen Shen Hongfang Liu +2 位作者 Sunghwan Sohn David W. Larson Yugyung Lee 《Intelligent Information Management》 2016年第3期66-85,共20页
In the current biomedical data movement, numerous efforts have been made to convert and normalize a large number of traditional structured and unstructured data (e.g., EHRs, reports) to semi-structured data (e.g., RDF... In the current biomedical data movement, numerous efforts have been made to convert and normalize a large number of traditional structured and unstructured data (e.g., EHRs, reports) to semi-structured data (e.g., RDF, OWL). With the increasing number of semi-structured data coming into the biomedical community, data integration and knowledge discovery from heterogeneous domains become important research problem. In the application level, detection of related concepts among medical ontologies is an important goal of life science research. It is more crucial to figure out how different concepts are related within a single ontology or across multiple ontologies by analysing predicates in different knowledge bases. However, the world today is one of information explosion, and it is extremely difficult for biomedical researchers to find existing or potential predicates to perform linking among cross domain concepts without any support from schema pattern analysis. Therefore, there is a need for a mechanism to do predicate oriented pattern analysis to partition heterogeneous ontologies into closer small topics and do query generation to discover cross domain knowledge from each topic. In this paper, we present such a model that predicates oriented pattern analysis based on their close relationship and generates a similarity matrix. Based on this similarity matrix, we apply an innovated unsupervised learning algorithm to partition large data sets into smaller and closer topics and generate meaningful queries to fully discover knowledge over a set of interlinked data sources. We have implemented a prototype system named BmQGen and evaluate the proposed model with colorectal surgical cohort from the Mayo Clinic. 展开更多
关键词 Biomedical Knowledge Discovery Pattern Analysis predicATE Query Generation
在线阅读 下载PDF
Predication of plasma concentration of remifentanil based on Elman neural network 被引量:1
16
作者 汤井田 曹扬 +1 位作者 肖嘉莹 郭曲练 《Journal of Central South University》 SCIE EI CAS 2013年第11期3187-3192,共6页
Due to the nature of ultra-short-acting opioid remifentanil of high time-varying,complex compartment model and low-accuracy of plasma concentration prediction,the traditional estimation method of population pharmacoki... Due to the nature of ultra-short-acting opioid remifentanil of high time-varying,complex compartment model and low-accuracy of plasma concentration prediction,the traditional estimation method of population pharmacokinetics parameters,nonlinear mixed effects model(NONMEM),has the abuses of tedious work and plenty of man-made jamming factors.The Elman feedback neural network was built.The relationships between the patients’plasma concentration of remifentanil and time,patient’age,gender,lean body mass,height,body surface area,sampling time,total dose,and injection rate through network training were obtained to predict the plasma concentration of remifentanil,and after that,it was compared with the results of NONMEM algorithm.In conclusion,the average error of Elman network is 6.34%,while that of NONMEM is 18.99%.The absolute average error of Elman network is 27.07%,while that of NONMEM is 38.09%.The experimental results indicate that Elman neural network could predict the plasma concentration of remifentanil rapidly and stably,with high accuracy and low error.For the characteristics of simple principle and fast computing speed,this method is suitable to data analysis of short-acting anesthesia drug population pharmacokinetic and pharmacodynamics. 展开更多
关键词 Elman neural network REMIFENTANIL plasma concentration predication model
暂未订购
Viscosity profile prediction of a heavy crude oil during lifting in two deep artesian wells 被引量:1
17
作者 Yibo Li Hao Gao +4 位作者 Wanfen Pu Bing Wei Yafei Chen Dong Li Qiang Luo 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2017年第7期976-982,共7页
It has been known that the productivity of artesian wells is strongly dependent on the rheological properties of crude oils. This work targets two deep artesian wells(>5000 m) that are producing heavy crude oil. Th... It has been known that the productivity of artesian wells is strongly dependent on the rheological properties of crude oils. This work targets two deep artesian wells(>5000 m) that are producing heavy crude oil. The impacts of well conditions including temperature, pressure and shear rate, on the crude oil rheology were comprehensively investigated and correlated using several empirical rheological models. The experimental data indicate that this heavy oil is very sensitive to temperature as result of microstructure change caused by hydrogen bonding. The rheological behavior of the heavy oil is also significantly impacted by the imposed pressure, i.e., the viscosity flow activation energy(Eμ) gently increases with the increasing pressure. The viscosity–shear rate data are well fitted to the power law model at low temperature. However, due to the transition of fluid feature at high temperature(Newtonian fluid), the measured viscosity was found to slightly deviate from the fitting data. Combining the evaluated correlations, the viscosity profile of the heavy crude oil in these two deep artesian wells as a function of well depth was predicted using the oilfield producing data. 展开更多
关键词 Heavy oil Rheological properties Empirical correlation Viscosity profile predication Lifting process Artesian well
在线阅读 下载PDF
Prediction and Control of Wrinkle and Fracture for Stamping Regular Polygonal Box 被引量:7
18
作者 LEI Jun-xiang 《Journal of Iron and Steel Research International》 SCIE EI CAS CSCD 2004年第5期44-49,共6页
Based on the deformation characteristic of regular polygonal box stamped parts and the superfluous triangle material wrinkle model,the criterion of regular polygonal box stamped parts without wrinkle was deduced and u... Based on the deformation characteristic of regular polygonal box stamped parts and the superfluous triangle material wrinkle model,the criterion of regular polygonal box stamped parts without wrinkle was deduced and used to predict and control the wrinkle limit.According to the fracture model,the criterion of regular polygonal box stamped parts without fracture was deduced and used to predict and control the fracture limit.Combining the criterion for stamping without wrinkle with that without fracture,the stamping criterion of regular polygonal box stamped parts was obtained to predict and control the stamping limit.Taken the stainless steel0Cr18Ni9(SUS304)sheet and the square box stamped part as examples,the limit diagram was given to predict and control the wrinkle,fracture and stamping limits.It is suitable for the deep drawing without flange,the deep drawing and stretching combined forming with flange and the rigid punch stretching of plane blank.The limit deep-drawing coefficient and the minimum deep-drawing coefficient can be determined,and the appropriate BHF(blank holder force)and the deep-drawing force can be chosen.These provide a reference for the technology planning,the die and mold design and the equipment determination,and a new criterion evaluating sheet stamping formability,which predicts and controls the stamping process,can be applied to the deep drawing under constant or variable BHF conditions. 展开更多
关键词 regular polygonal box stamped part WRINKLE FRACTURE stamping criterion predic-tion control
在线阅读 下载PDF
A Contrastive Analysis of Subject and Predicate in English and Chinese
19
作者 张晰 《海外英语》 2013年第15期263-264,275,共3页
Respectively belonging to different language families,English and Chinese naturally have many differences in morphology and syntax.This paper intends to give a contrastive analysis of subject and predicate in English ... Respectively belonging to different language families,English and Chinese naturally have many differences in morphology and syntax.This paper intends to give a contrastive analysis of subject and predicate in English and Chinese,focusing on differences of subject and predicate usages in the two languages,and the problems they cause for Chinese students in English learning and translation. 展开更多
关键词 ENGLISH CHINESE SUBJECT predicATE DIFFERENCES
在线阅读 下载PDF
Functionality Semantics of Predicate Data Flow Diagram
20
作者 高晓雷 缪淮扣 刘玲 《Journal of Shanghai University(English Edition)》 CAS 2004年第3期309-316,共8页
SOZL (structured methodology + object-oriented methodology + Z language) is a language that attempts to integrate structured method, object-oriented method and formal method. The core of this language is predicate dat... SOZL (structured methodology + object-oriented methodology + Z language) is a language that attempts to integrate structured method, object-oriented method and formal method. The core of this language is predicate data flow diagram (PDFD). In order to eliminate the ambiguity of predicate data flow diagrams and their associated textual specifications, a formalization of the syntax and semantics of predicate data flow diagrams is necessary. In this paper we use Z notation to define an abstract syntax and the related structural constraints for the PDFD notation, and provide it with an axiomatic semantics based on the concept of data availability and functionality of predicate operation. Finally, an example is given to establish functionality consistent decomposition on hierarchical PDFD (HPDFD). 展开更多
关键词 predicate data flow diagram (PDFD) predicate operation (PO) hierarchical predicate data flow diagram (HPDFD) AVAILABILITY functionality semantics.
在线阅读 下载PDF
上一页 1 2 163 下一页 到第
使用帮助 返回顶部