期刊文献+
共找到175篇文章
< 1 2 9 >
每页显示 20 50 100
Standardization of nasal airway structure model of Chinese Han nationality for characterization of nasal formulation spatial deposition atlases
1
作者 Zeru Li Huipeng Xu +8 位作者 Siwen Wang Qin Nie Bingqian Jia Jiawen Su Guanghong Xu Rui Yang Zhigang Wang Jiwen Zhang Li Wu 《Acta Pharmaceutica Sinica B》 2025年第12期6698-6713,共16页
The deposition characteristics of nasal formulations directly determine the efficacy of the drugs,whilst the complexity of human nasal airway structure encumbers quantitative evaluation of nasal spatial deposition.Mal... The deposition characteristics of nasal formulations directly determine the efficacy of the drugs,whilst the complexity of human nasal airway structure encumbers quantitative evaluation of nasal spatial deposition.Male and female standard nasal airway structure models were calculated from computed tomography data of 128 Chinese Han nationality using statistical shape model.The deposition evaluation devices were further designed,and an imaging method was then employed to obtain drug deposition information.Furthermore,drug spatial deposition atlases were proposed by UV unwrapping,a mathematical mapping procedure flattening three-dimensional(3D)information to two-dimension bidirectionally,to achieve quantification of drug deposition fractions in the regions of interest.Moreover,the feasibility and universality of this method were verified by correlating it with the chemical quantitative results and computational fluid dynamic simulation of drug deposition of mometasone furoate nasal spray and hydroxypropyl methylcellulose nasal powder,respectively.Finally,the unique drug spatial deposition atlases of these two formulations in the male and female evaluation devices were generated,respectively.In summary,the standard nasal airway structure models of the Chinese Han nationality and the drug spatial deposition atlases provide scientific tools for the formulation optimization and quality control of nasal formulations. 展开更多
关键词 Chinese Han nationality Statistical shape model Standard nasal airway structure model Spatial deposition atlas Deposition fraction Nasal formulation Nasal spray Nasal powder
原文传递
Neutrino Telescopes Provide a New Probe on New Physics beyond Standard Model
2
《Bulletin of the Chinese Academy of Sciences》 2025年第3期139-139,共1页
Scientists have been searching for possible new particles beyond the standard model(SM),the theory that has predicted the building bricks that have constituted the known matter world today,including the Higgs-“the l... Scientists have been searching for possible new particles beyond the standard model(SM),the theory that has predicted the building bricks that have constituted the known matter world today,including the Higgs-“the last”SM particle. 展开更多
关键词 standard model PARTICLES building bricks higgs boson new particles neutrino telescopes new physics
在线阅读 下载PDF
3D Quantum Gravity, Localization and Particles beyond Standard Model
3
作者 Risto Raitio 《Journal of High Energy Physics, Gravitation and Cosmology》 2025年第1期96-109,共14页
We review a 3d quantum gravity model, which incorporates massive spinning fields into the Euclidean path integral in a Chern-Simons formulation. Fundamental matter as defined in our previous preon model is recapped. B... We review a 3d quantum gravity model, which incorporates massive spinning fields into the Euclidean path integral in a Chern-Simons formulation. Fundamental matter as defined in our previous preon model is recapped. Both quantum gravity and the particle model are shown to be derivable from the supersymmetric 3d Chern-Simons action. Forces-Matter unification is achieved. 展开更多
关键词 Chern-Simons Theory Quantum Gravity Composite Particles Beyond Standard model
在线阅读 下载PDF
Design and transition characteristics of a standard model for hypersonic boundary layer transition research 被引量:9
4
作者 Shenshen Liu Xianxu Yuan +5 位作者 Zhiyong Liu Qiang Yang Guohua Tu Xi Chen Yewei Gui Jianqiang Chen 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2021年第11期1637-1647,I0002,共12页
To understand fundamental problems in hypersonic laminar-turbulent boundary layer transition for three-dimensional complex vehicles,a new standard model with typical lifting-body features has been proposed,named as hy... To understand fundamental problems in hypersonic laminar-turbulent boundary layer transition for three-dimensional complex vehicles,a new standard model with typical lifting-body features has been proposed,named as hypersonic transition research vehicle(HyTRV).The configuration of HyTRV is fully analytical,and details of the design process are discussed in this study.The transition characteristics for HyTRV are investigated using three combined methods,i.e.,theoretical analyses,numerical simulations,and wind tunnel experiments.Results show that the fully analytic parameterization design of HyTRV can satisfy the model simplification requirements from both numerical simulations and wind tunnel experiments.Meanwhile,the flow field of HyTRV reveals typical transition mechanisms in six relatively separated regions,including the streamwise vortex instability,crossflow instability,secondary instability,and attachment-line instability.Therefore,the proposed HyTRV model is valuable for fundamental researches in hypersonic boundary layer transition. 展开更多
关键词 Hypersonic boundary layer Transition research Standard model design HyTRV
原文传递
Attribute-Based Re-Encryption Scheme in the Standard Model 被引量:4
5
作者 GUO Shanqing ZENG Yingpei +1 位作者 WEI Juan XU Qiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期621-625,共5页
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde... In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme. 展开更多
关键词 ATTRIBUTE-BASED re-encryption scheme standard model network storage
在线阅读 下载PDF
Development of a new cerebral ischemia reperfusion model of Mongolian gerbils and standardized evaluation system 被引量:3
6
作者 Ying Wu Caijiao Hu +9 位作者 Zhihui Li Feiyang Li Jianyi Lv Meng Guo Xin Liu Changlong Li Xueyun Huo Zhenwen Chen Lifeng Yang Xiaoyan Du 《Animal Models and Experimental Medicine》 CAS CSCD 2024年第1期48-55,共8页
Background:The Mongolian gerbil is an excellent laboratory animal for preparing the cerebral ischemia model due to its inherent deficiency in the circle of Willis.However,the low incidence and unpredictability of symp... Background:The Mongolian gerbil is an excellent laboratory animal for preparing the cerebral ischemia model due to its inherent deficiency in the circle of Willis.However,the low incidence and unpredictability of symptoms are caused by numerous complex variant types of the circle.Additionally,the lack of an evaluation system for the cer-ebral ischemia/reperfusion(I/R)model of gerbils has shackled the application of this model.Methods:We created a symptom-oriented principle and detailed neurobehavioral scoring criteria.At different time points of reperfusion,we analyzed the alteration in locomotion by rotarod test and grip force score,infarct volume by triphenyltetrazo-lium chloride(TTC)staining,neuron loss using Nissl staining,and histological charac-teristics using hematoxylin-eosin(H&E)straining.Results:With a successful model rate of 56%,32 of the 57 gerbils operated by our method harbored typical features of cerebral I/R injury,and the mortality rate in the male gerbils was significantly higher than that in the female gerbils.The suc-cessfully prepared I/R gerbils demonstrated a significant reduction in motility and grip strength at 1 day after reperfusion;formed obvious infarction;exhibited typi-cal pathological features,such as tissue edema,neuronal atrophy and death,and vacuolated structures;and were partially recovered with the extension of reperfu-sion time.Conclusion:This study developed a new method for the unilateral common carotid artery ligation I/R model of gerbil and established a standardized evaluation system for this model,which could provide a new cerebral I/R model of gerbils with more practical applications. 展开更多
关键词 ISCHEMIA/REPERFUSION Mongolian gerbil standardized model system unilateral carotid occlusion
暂未订购
Cryptanalysis and Improvement of a New Certificateless Signature Scheme in the Standard Model 被引量:2
7
作者 Chenhuang Wu Hui Huang +1 位作者 Kun Zhou Chunxiang Xu 《China Communications》 SCIE CSCD 2021年第1期151-160,共10页
Digital signature,as an important cryptographic primitive,has been widely used in many application scenarios,such as e-commerce,authentication,cloud computing,and so on.Certificateless Public Key Cryptography(PKC)can ... Digital signature,as an important cryptographic primitive,has been widely used in many application scenarios,such as e-commerce,authentication,cloud computing,and so on.Certificateless Public Key Cryptography(PKC)can get rid of the certificate management problem in the traditional Public Key Infrastructure(PKI)and eliminate the key-escrow problem in the identity-based PKC.Lately,a new Certificateless Signature(CLS)scheme has been proposed by Kyung-Ah Shim(IEEE SYSTEMS JOURNAL,2018,13(2)),which claimed to achieve provable security in the standard model.Unfortunately,we present a concrete attack to demonstrate that the scheme cannot defend against the Type I adversary.In this type of attack,the adversary can replace the public key of the signer,and then he plays the role of the signer to forge a legal certificateless signature on any message.Furthermore,we give an improved CLS scheme to resist such an attack.In terms of the efficiency and the signature length,the improved CLS is preferable to the original scheme and some recently proposed CLS schemes in the case of precomputation. 展开更多
关键词 CERTIFICATELESS SIGNATURE standard model ATTACK
在线阅读 下载PDF
Efficient Hierarchical Identity Based Signature Scheme in the Standard Model 被引量:2
8
作者 REN Yanli GU Dawu 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期665-669,共5页
Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public... Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction. 展开更多
关键词 HIERARCHICAL identity based standard model
原文传递
Directed Proxy Signature in the Standard Model 被引量:1
9
作者 明洋 王育民 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第6期663-671,共9页
A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or ... A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or if necessary,any third party can verify the signature with the help of the signer or the designated verifier.Directed signature schemes are widely used in situations where the receiver's privacy should be protected.Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.In this paper,we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature.Then,we formalize its security model and present a concrete scheme in the standard model.Finally,we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,and invisible under the decisional Diffie-Hellman assumption. 展开更多
关键词 directed signature proxy signature bilinear pairings standard model
原文传递
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model 被引量:1
10
作者 孙瑾 胡予濮 张乐友 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第6期672-676,共5页
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chos... To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained simultaneously.The reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable assumption.So the security level is improved,and it is suitable for higher security environment. 展开更多
关键词 the standard model provably secure broadcast encryption the chosen ciphertext security the self-adaptive chosen identity security
原文传递
Asymptotic analysis on weakly forced vibration of axially moving viscoelastic beam constituted by standard linear solid model 被引量:1
11
作者 王波 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2012年第6期817-828,共12页
The weakly forced vibration of an axially moving viscoelastic beam is inves- tigated. The viscoelastic material of the beam is constituted by the standard linear solid model with the material time derivative involved.... The weakly forced vibration of an axially moving viscoelastic beam is inves- tigated. The viscoelastic material of the beam is constituted by the standard linear solid model with the material time derivative involved. The nonlinear equations governing the transverse vibration are derived from the dynamical, constitutive, and geometrical relations. The method of multiple scales is used to determine the steady-state response. The modulation equation is derived from the solvability condition of eliminating secular terms. Closed-form expressions of the amplitude and existence condition of nontrivial steady-state response are derived from the modulation equation. The stability of non- trivial steady-state response is examined via the Routh-Hurwitz criterion. 展开更多
关键词 axially moving beam weakly forced vibration standard linear solid model method of multiple scales steady-state response
在线阅读 下载PDF
Stability analysis of discrete-time BAM neural networks based on standard neural network models 被引量:1
12
作者 张森林 刘妹琴 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第7期689-696,共8页
To facilitate stability analysis of discrete-time bidirectional associative memory (BAM) neural networks, they were converted into novel neural network models, termed standard neural network models (SNNMs), which inte... To facilitate stability analysis of discrete-time bidirectional associative memory (BAM) neural networks, they were converted into novel neural network models, termed standard neural network models (SNNMs), which interconnect linear dynamic systems and bounded static nonlinear operators. By combining a number of different Lyapunov functionals with S-procedure, some useful criteria of global asymptotic stability and global exponential stability of the equilibrium points of SNNMs were derived. These stability conditions were formulated as linear matrix inequalities (LMIs). So global stability of the discrete-time BAM neural networks could be analyzed by using the stability results of the SNNMs. Compared to the existing stability analysis methods, the proposed approach is easy to implement, less conservative, and is applicable to other recurrent neural networks. 展开更多
关键词 Standard neural network model (SNNM) Bidirectional associative memory (BAM) Linear matrix inequality (LMI) STABILITY Generalized eigenvalue problem (GEVP)
在线阅读 下载PDF
Semi-Harmonic Scaling Enables Calculation of Masses of Elementary Particles of the Standard Model 被引量:1
13
作者 Hans J.H.Geesink Dirk K.F.Meijer 《Journal of Modern Physics》 2018年第5期925-947,共23页
The underlying rules for a natural system describing cellular automata are simple, but produce highly complex behavior. A mathematical basis for the spectra of discrete coherent and non-coherent electromagnetic (EM) f... The underlying rules for a natural system describing cellular automata are simple, but produce highly complex behavior. A mathematical basis for the spectra of discrete coherent and non-coherent electromagnetic (EM) frequencies was derived, in which the algorithm exhibits an information distribution according to ratios of 2:3 in 1:2 at a semi-harmonic manner. This generalized music (GM) model shows that energy both in elementary particles and animate systems is semi-harmonic, quantized and discrete. A support for an ontological basis of the Standard Model was found, and indicates that the GM-model underlies the quantum field theory of subatomic particles. The present theory combines quantum mechanics and classical periodic systems, obeys to locality and solves the “hidden variable theory of Bohm”. The discovered pattern of electromagnetic field eigenvalues, within a broad range of discrete frequencies, points at a de Broglie/Bohm type of causal interpretation of quantum mechanics, implying an integral resonant pilot-wave/particle modality. The model has been substantiated by a meta-analysis of measured discrete energies of: 37 different Elementary Particles, 45 different EPR-measurements, zero-point energies of elements and about 450 electromagnetic wave frequencies of cells with a mean accuracy of 0.58%. It has been shown that the GM-scale is frequency-locked with zero-point oscillations, and thereby evidently implies involvement of entanglement. 展开更多
关键词 Algorithm Elementary Particles Coherent Wave Pattern Electromagnetic Fields Solitons Harmonics Cellular Automata Quantum Mechanics Standard model Einstein-Podolsky-Rosen BOHM Frohlich PYTHAGORAS
在线阅读 下载PDF
Quantum Mechanics and General Relativity Identify Standard Model Particles as Black Holes 被引量:1
14
作者 T. R. Mongan 《Journal of Modern Physics》 2022年第6期992-1000,共9页
The Standard Model of particle physics does not account for charged fermion mass values and neutrino mass, or explain why only three particles are in each charge state 0, -e/3, 2e/3, and -e. These issues are addressed... The Standard Model of particle physics does not account for charged fermion mass values and neutrino mass, or explain why only three particles are in each charge state 0, -e/3, 2e/3, and -e. These issues are addressed by treating Standard Model particles with mass m as spheres with diameter equal to their Compton wavelength l =&#295;/mc, where &#295;is Planck’s constant and c the speed of light, and any charge in diametrically opposed pairs ±ne/6 with n = 1, 2, or 3 at the axis of rotation on the sphere surface. Particles are ground state solutions of quantized Friedmann equations from general relativity, with differing internal gravitational constants. Energy distribution within particles identifies Standard Model particles with spheres containing central black holes with mass m, and particle spin resulting from black hole angular momentum. In each charge state, energy distribution within particles satisfies a cubic equation in l, allowing only three particles in the charge state and requiring neutrino mass. Cosmic vacuum energy density is a lower limit on energy density of systems in the universe, and setting electron neutrino average energy density equal to cosmic vacuum energy density predicts neutrino masses consistent with experiment. Relations between charged fermion wavelength solutions to cubic equations in different charge states determine charged fermion masses relative to electron mass as a consequence of charge neutrality of the universe. An appendix shows assigning charge ±e/6 to bits of information on the event horizon available for holographic description of physics in the observable universe accounts for dominance of matter over anti-matter. The analysis explains why only three Standard Models are in each charge state and predicts neutrino masses based on cosmic vacuum energy density as a lower bound on neutrino energy density. 展开更多
关键词 Standard model Particles Black Holes From Internal Gravity Neutrino Mass Prediction
在线阅读 下载PDF
Neutral Higgs Boson Pair Production in Standard Model with the Fourth GenerationQuarks at LHC
15
作者 SUNHao MAWen-Gan ZHOUYa-Jin SUNYan-Bin ZHANGRen-You HOUHong-Sheng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2004年第1期73-78,共6页
We investigated the neutral Higgs boson pair production at the CERN Large Hadron Collider (LHC) in the SM with four families. We found that the gluon-gluon fusion mode is the most dominant one in producing neutral Hig... We investigated the neutral Higgs boson pair production at the CERN Large Hadron Collider (LHC) in the SM with four families. We found that the gluon-gluon fusion mode is the most dominant one in producing neutral Higgs boson pair at the LHC, and it can be used to probe the trilinear Higgs coupling. If the heavy quarks of the fourth generation really exist within the SM, they can manifest their effect on the cross section of the Higgs pair production process at the LHC. Our numerical results show that there will be neutral Higgs boson pair production events per year if the next generation heavy quarks really exist, while there will be only events produced per year if there are only three families in the SM. 展开更多
关键词 standard model four generations neutral Higgs boson pair production hadron collider
在线阅读 下载PDF
Single Production of Heavy Top Quark from Three-Site Higgsless Model
16
作者 岳崇兴 王丽红 闻佳 《Chinese Physics Letters》 SCIE CAS CSCD 2008年第5期1613-1616,共4页
We consider single production of the heavy top quark T predicted by the three-site Higgsless model in future high energy collider experiments, such as the high energy linear e+ e- collider (ILC), the linear-ring ty... We consider single production of the heavy top quark T predicted by the three-site Higgsless model in future high energy collider experiments, such as the high energy linear e+ e- collider (ILC), the linear-ring type ep collider (THERA), and the CERN Large Hadron Collider (LHC). Our numerical results show that the possible signals of the heavy top quark T might be detected via the subproeess qb → q'T at the LHC. 展开更多
关键词 YANG-MILLS THEORY STANDARD model UNITARITY
原文传递
The Top-Charm Associated Production Within the R-Parity Violating Supersymmetric Model in Photon-Proton Collisions
17
作者 HOUHong-sheng MAWen-Gan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2002年第3期337-346,共10页
The top-charm associated production with the effects from both B- and L-violating interactions in TeV scale photon-proton collisions is investigated in the framework of minimal supersymmetric standard model. Within t... The top-charm associated production with the effects from both B- and L-violating interactions in TeV scale photon-proton collisions is investigated in the framework of minimal supersymmetric standard model. Within the bounds on the relevant R-parity violating couplings, the total cross section will reach the order of 10 fb in some parts of the parameter space. 展开更多
关键词 R-parity violation minimal supersymmetric standard model flavor changing neutral current
在线阅读 下载PDF
Rare Decay B_c → D_s *μ^+ μ^- in a Family Non-Universal Z′ Model
18
作者 吕林霞 张国芳 +1 位作者 王帅伟 张志清 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第2期187-192,共6页
Using the form factors calculated in the three-point QCD sum rules, we calculate the new physics contri- butions to the physical observables of Bc→D;μ+ μ- decay in a family non-universal Z' model. Under the consi... Using the form factors calculated in the three-point QCD sum rules, we calculate the new physics contri- butions to the physical observables of Bc→D;μ+ μ- decay in a family non-universal Z' model. Under the consideration of three cases of the new physics parameters, we find that: (a) the Z' boson can provide large contributions to the differential decay rates; (b) the forward-backward asymmetry (FBA) can be increased by about 47%, 38%, and 110% at most in S1, S2, and extreme limR values (ELV), respectively. In addition, the zero crossing can be shifted in all the cases; (c) when s 〉 0.08, the value Of PL can be changed from -1 in the Standard Model (SM) to -0.5 in S1, -0.6 in S2, and 0 in extreme limit values, respectively; (d) the new physics corrections to PT will decrease the SM prediction about 25% for the cases of S1 and S2, 100% for the case of ELV. 展开更多
关键词 rare decay standard model a family non-universal Z' model
原文传递
Perturbative Power Counting,Lowest-Index Operators and Their Renormalization in Standard Model Effective Field Theory
19
作者 Yi Liao Xiao-Dong Ma 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第3期285-290,共6页
We study two aspects of higher dimensional operators in standard model effective field theory.We first introduce a perturbative power counting rule for the entries in the anomalous dimension matrix of operators with e... We study two aspects of higher dimensional operators in standard model effective field theory.We first introduce a perturbative power counting rule for the entries in the anomalous dimension matrix of operators with equal mass dimension.The power counting is determined by the number of loops and the difference of the indices of the two operators involved,which in turn is defined by assuming that all terms in the standard model Lagrangian have an equal perturbative power.Then we show that the operators with the lowest index are unique at each mass dimension d,i.e.,(H^(†)H)^(d/2)for even d≥4,and(L^(T)εH)C(L^(T)εH)^(T)(H^(†)H)^((d-5)/2)for odd d≥5.Here H,L are the Higgs and lepton doublet,andε,C the antisymmetric matrix of rank two and the charge conjugation matrix,respectively.The renormalization group running of these operators can be studied separately from other operators of equal mass dimension at the leading order in power counting.We compute their anomalous dimensions at one loop for general d and find that they are enhanced quadratically in d due to combinatorics.We also make connections with classification of operators in terms of their holomorphic and anti-holomorphic weights. 展开更多
关键词 standard model effective field theory renormalization group running power counting
原文传递
Research of database-based modeling for mining management system
20
作者 武海峰 金智新 白希军 《Journal of Coal Science & Engineering(China)》 2005年第1期98-101,共4页
Put forward the method to construct the simulation model automatically with database-based automatic modeling(DBAM) for mining system. Designed the standard simulation model linked with some open cut Pautomobile dispa... Put forward the method to construct the simulation model automatically with database-based automatic modeling(DBAM) for mining system. Designed the standard simulation model linked with some open cut Pautomobile dispatch system. Analyzed and finded out the law among them, and designed model maker to realize the automatic pro- gramming of the new model program. 展开更多
关键词 automatic modeling DBAM standard model model maker
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部