首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Many expert systems operate in dynamic environments where various pertinent environmental variables and conditions vary with the passage of time. These environmental variables and conditions may affect both the set of conditions applied to input variables of expert systems and the set of recommendations provided by expert systems. For this reason, expert systems developed according to dynamic structure will generate timely recommendations. To incorporate dynamic characteristics into the structure of expert systems, it is necessary to develop expert systems as adaptive systems. This paper intends to integrate concepts of learning and adaptiveness into expert system technology.

Expert systems used to assist loan officers in improving the decision-making process of commercial loans are typical examples of expert systems that operate in dynamic environments. This paper illustrates that the quality of information provided to loan officers by expert systems may be improved when expert systems are designed as adaptive expert systems.  相似文献   


2.
In practice, the lifetimes of unrepairable systems contain both randomness and fuzziness. So it is appropriate to assume the lifetimes of systems to be fuzzy random variables. In this paper, the definitions of reliability and mean time to failure (MTTF) of unrepairable systems with fuzzy random lifetimes are given, respectively. Then basic mathematical models of unrepairable systems with fuzzy random lifetimes are established. Furthermore, the reliability and MTTF of series systems, parallel systems, series-parallel systems, parallel-series systems, and cold standby systems are discussed, respectively. Finally, some numerical examples are presented to illustrate how to calculate the reliability and MTTF of unrepairable systems with fuzzy random lifetimes.  相似文献   

3.
双线性系统可控性综述   总被引:2,自引:2,他引:0  
铁林  蔡开元  林岩 《自动化学报》2011,37(9):1040-1049
双线性系统是一类特殊的非线性系统,广泛存在于现实世界中,如工程、经济、生物、生态等领域,被认为是最接近于线性系统的非线性系统.对双线性系统的研究已历经了近半个世纪. 作为系统最基本的属性,双线性系统可控性的研究一直以来是热点和难点.本文分别对连续双线性系统可控性和离散双线性系统可控性进行讨论, 综述了双线性系统可控性的研究.特别地,报告了近来对离散双线性系统可控性研究的新成果.最后,例举了一些可控的双线性系统例子.  相似文献   

4.
线性时变广义系统的能控性与能观性问题   总被引:2,自引:0,他引:2  
张雪峰  张庆灵 《自动化学报》2009,35(9):1249-1253
讨论了线性时变系统和线性时变广义系统的两个基本问题, 得到了两种判定时变系统能控性与能观性的必要条件, 该判定条件只依赖于系统矩阵A(t)和输入矩阵B(t), 不必计算系统的系统状态转移矩阵, 使得判别时变系统能控性与能观性易于实现. 说明了本文结论是线性定常系统相应结论的自然扩展. 对进一步深入研究时变系统和时变广义系统具有实际启发作用.  相似文献   

5.
应用广义Lorenz标准型研究了包括广义Lorenz系统、双曲型广义Lorenz系统以及Liu-Liu-Liu-Liu系统在内的类广义Lorenz系统的广义同步化问题.利用映射将一大类三阶二次混沌系统变换为广义Lorenz标准型,设计控制器使变换后的系统达到完全同步,进而使变换前的系统实现广义同步.将该方法分别用于拓扑等价和不等价的两个系统,通过数值仿真,发现结果和理论分析相符,从而表明了该方法的有效性.  相似文献   

6.
计算机系统被应用于各种重要领域,这些系统的失效可能会带来重大灾难.不同应用领域的系统对于可信性具有不同的要求,如何建立高质量的可信计算机系统,是这些领域共同面临的巨大挑战.近年来,具有严格数学基础的形式化方法已经被公认为开发高可靠软硬件系统的有效方法.目标是对形式化方法在不同系统的应用进行不同维度的分类,以更好地支撑可信软硬件系统的设计.首先从系统的特征出发,考虑6种系统特征:顺序系统、反应式系统、并发与通信系统、实时系统、概率随机系统以及混成系统.同时,这些系统又运行在众多应用场景,分别具有各自的需求.考虑4种应用场景:硬件系统、通信协议、信息流以及人工智能系统.对于以上的每个类别,介绍和总结其形式建模、性质描述以及验证方法与工具.这将允许形式化方法的使用者对不同的系统和应用场景,能够更准确地选择恰当的建模、验证技术与工具,帮助设计人员开发更加可靠的系统.  相似文献   

7.
Much of the success of science in explaining, predicting and controlling natural systems can be attributed to the well understood methods that exist for producing and testing theory in the natural sciences. The successful development of social systems science is similarly likely to depend on the elucidation of methods of inquiry suitable to the systems of its concern. Unfortunately the successful methods employed by natural scientists cannot be simply taken over and used in social systems science. Systems scientists who attempt this, risk operating with wholly inappropriate tools when dealing with social systems. Alternative methods of inquiry have been developed in the “soft” systems tradition which are more appropriate for use in relation to one large class of social systems. However, there are many social systems for which even these soft systems approaches are inappropriate. For such social systems there is a need for a more radical and critical approach to producing and verifying social systems science. This paper seeks to demonstrate the need for a critical approach in relation to one class of social systems and shows how only this kind of approach can take account of the special characteristics of this category of social system.  相似文献   

8.
Modeling and Identification of Multirate Systems   总被引:1,自引:0,他引:1  
Multirate systems are abundant in industry; for example, many soft-sensor design problems are related to modeling, parameter identification, or state estimation involving multirate systems. The study of multirate systems goes back to the early 1950s, and has become an active research area in systems and control. This paper briefly surveys the history of development in the area of multirate systems, and introduces some basic concepts and latest results on multirate systems, including a polynomial transformation technique and the lifting technique as tools for handling multirate systems, lifted state space models, parameter identification of dual-rate systems, how to determine fast single-rate models from dual-rate models and directly from dual-rate data, and a hierarchical identification method for general multirate systems. Finally, some further research topics for multirate systems are given.  相似文献   

9.
The properties of general systems, so-called disconnectedness, connectedness, and hereditary disconnectedness, are studied. The construction of star sets plays an important role in the study of the following topics: structures of (hereditary) disconnecied systems; equivalent conditions of (hereditary) disconnected systems; equivalent conditions of disconnectedness of quotient systems. Conditions, under which disconnectedness of factor systems can be lifted up to product systems and cartesian product systems, and conditions under which disconnectedness of product systems (cartesian product systems) can predict the disconnectedness of factor systems, are given.  相似文献   

10.
研究非线性奇异系统的受控不变分布问题.讨论了非线性奇异系统的受控不变分布算法与该系统经过状态反馈转化为正常非线性系统的受控不变分布算法的关系.得到了在一定条件下,正则非线性奇异系统的受控不变分布算法与该系统经过状态反馈转化为正常非线性系统的受控不变分布算法的一致性.并给出一个例子说明本文的结果.  相似文献   

11.
Summary This article presents a review of the state of the art of techniques on computational stochastic structural dynamics applying the finite elements. Linear systems under random excitations, quasi-linear systems, nonlinear systems excited by stochastic disturbances, and spatially stochastic nonlinear systems are included. For spatially stochastic linear and nonlinear systems under stochastic and deterministic excitations, alternative approaches, proposed by the author, to the so-called stochastic finite element method are introduced. The introduced approaches are free from the limitations of the: (a) normal mode analysis for linear and quasi-linear systems, (b) normal mode with statistical linearization for nonlinear systems, and (c) perturbation approximation techniques for spatially stochastic systems. The introduced approaches for nonlinear systems are applicable to systems undergoing large deformations of finite strains and finite rotations. Selected computed results are included to demonstrate their simplicity and efficiency.  相似文献   

12.
The Kalman duality between the reachability and observability of finite-dimensional linear systems is generalized to adjoint systems (in the sense of Arbib-Manes). The theory includes previous results on infinite-dimensional linear systems and linear systems over rings, and yields new results for classes of nonlinear systems such as bilinear and polynomial systems.  相似文献   

13.
Consensus recovery is one of the most important topics of multi-agent systems subjected to failures, but there are few literatures considering this theme. In this article, two disastrous failures are introduced and corresponding recovery programs are proposed to investigate the consensus recovery of multi-agent systems. The failures of multi-agent systems mainly refer to the failures to the agents and links. The cut-agent and cut-link are presented to better understand the disastrous failures of multi-agent systems, and they are the most important components of multi-agent systems. When the cut-agent and cut-link are removed from the systems, the multi-agent systems will become disconnected, and the neighbour agents of cut-agent are used to recover the consensus of multi-agent systems in this article. For different failures, the different measures are taken to restore the connectivity of multi-agent systems, so as to recover the consensus of multi-agent systems. Under the proposed recovery strategies, the convergence speed of achieving consensus of the resulting networks is considered as the main target. Moreover, there is a trade-off between the convergence speed and robustness of the resulting networks.  相似文献   

14.
Ubiquitous recommender systems combine characteristics from ubiquitous systems and recommender systems in order to provide personalized recommendations to users in ubiquitous environments. Although not a new research area, ubiquitous recommender systems research has not yet been reviewed and classified in terms of ubiquitous research and recommender systems research, in order to deeply comprehend its nature, characteristics, relevant issues and challenges. It is our belief that ubiquitous recommenders can nowadays take advantage of the progress mobile phone technology has made in identifying items around, as well as utilize the faster wireless connections and the endless capabilities of modern mobile devices in order to provide users with more personalized and context-aware recommendations on location to aid them with their task at hand. This work focuses on ubiquitous recommender systems, while a brief analysis of the two fundamental areas from which they emerged, ubiquitous computing and recommender systems research is also conducted. Related work is provided, followed by a classification schema and a discussion about the correlation of ubiquitous recommenders with classic ubiquitous systems and recommender systems: similarities inevitably exist, however their fundamental differences are crucial. The paper concludes by proposing UbiCARS: a new class of ubiquitous recommender systems that will combine characteristics from ubiquitous systems and context-aware recommender systems in order to utilize multidimensional context modeling techniques not previously met in ubiquitous recommender systems.  相似文献   

15.
对于大部分中小企业,为了保证生产系统所存放数据的安全,通常使用RAID5和备份两种技术.提出了一种新型的RAID5加速重构模型,该模型具有以下优点:1)能够灵活整合生产系统和备份系统;2)充分利用备份系统的资源,加速生产系统内RAID5数据重构;3)改善生产系统服务质量;4)提高生产系统的可靠性和可用性.  相似文献   

16.
李文军  周晓聪  李师贤 《软件学报》2001,12(10):1555-1561
优先关系是并发系统控制的重要手段,常用于解决并发系统设计中的冲突问题.在有界P/T系统的基础上提出一种动态优先系统,并分别给出它们的交错语义与真并发语义.动态优先系统既可以作为并发与分布式系统的建模工具,也可以作为定义程序设计语言中优先算子的语义基础.最后,基于动态优先系统的概念,为Occam语言扩充了一种动态优先选择算子.  相似文献   

17.
This article describes a comparative study of four operating systems for IBM-PC compatible microcomputers. The assessment concentrated on the suitability of the operating systems for use in real-time applications, and on their use as development environments for real-time systems. The study evaluated the predictability and the performance of the operating systems in several areas critical in real-time systems by using comparative benchmarks. In addition, a small-scale simulation of a process control system was developed for each of the systems. The operating systems that were studied were UNIX, OS/2, QNX and FlexOS. These operating systems represent a broad spectrum of systems from general purpose operating systems to small, specialized real-time operating systems. The details of the evaluation process are given and a summary of the results is presented.  相似文献   

18.
《Computer Networks》1999,31(8):805-822
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in general, as it is difficult to provide provably secure information systems and maintain them in such a secure state for their entire lifetime and for every utilization. Sometimes, legacy or operational constraints do not even allow a fully secure information system to be realized at all. Therefore, the task of intrusion-detection systems is to monitor the usage of such systems and to detect the apparition of insecure states. They detect attempts and active misuse by legitimate users of the information systems or external parties to abuse their privileges or exploit security vulnerabilities. In this paper, we introduce a taxonomy of intrusion-detection systems that highlights the various aspects of this area. This taxonomy defines families of intrusion-detection systems according to their properties. It is illustrated by numerous examples from past and current projects.  相似文献   

19.
The systems view is presented as a complement to the more traditional scientific approach to help reduce and mitigate risk in high risk systems. Implications for this systemic approach are described, principally in the areas of control and information. Most generally, we investigate how high risk systems use information to maintain control, and how IT systems should be designed to support this activity. Two variations in the systems view – the objective and constructive – are distilled and compared, and for each, the implications for crisis IT systems design are discussed. The limitations of the two variations of the systems view are presented, as is a brief annotated bibliography for further reading about the systems view.  相似文献   

20.
Abstract

Expert systems are becoming more prevalent in financial and business applications. With venture capital pouring into the expert systems area, there is greater interest in expert systems by commercial firms. Companies are either building in-house expert systems capabilities or contracting out to expert system developers to construct expert systems for business applications. This paper presents much of the work being done in developing expert systems in business and discusses fertile areas for constructing more business expert systems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号