In this talk we will consider two approaches in dealing with the risk of supplier bankruptcy. In the first model, we study the effects of supply disruption risk in a supply chain where one buyer deals with competing risky suppliers who may default during their production lead-times.
标签: approaches bankruptcy the consider
上传时间: 2014-08-04
上传用户:lanjisu111
用c8051做的usb鼠标(HID类)Firmware works with the Silicon Labs IDE v1.71 or later and the Keil C51 tool chain. Project and code modifications will be necessary for use with different tool chains.
标签: the Firmware Silicon c8051
上传时间: 2016-03-14
上传用户:asdfasdfd
Hybrid Monte Carlo sampling.SAMPLES = HMC(F, X, OPTIONS, GRADF) uses a hybrid Monte Carlo algorithm to sample from the distribution P ~ EXP(-F), where F is the first argument to HMC. The Markov chain starts at the point X, and the function GRADF is the gradient of the `energy function F.
标签: Carlo Monte algorithm sampling
上传时间: 2013-12-02
上传用户:jkhjkh1982
Sequential Monte Carlo without Likelihoods 粒子滤波不用似然函数的情况下 本文摘要:Recent new methods in Bayesian simulation have provided ways of evaluating posterior distributions in the presence of analytically or computationally intractable likelihood functions. Despite representing a substantial methodological advance, existing methods based on rejection sampling or Markov chain Monte Carlo can be highly inefficient, and accordingly require far more iterations than may be practical to implement. Here we propose a sequential Monte Carlo sampler that convincingly overcomes these inefficiencies. We demonstrate its implementation through an epidemiological study of the transmission rate of tuberculosis.
标签: Likelihoods Sequential Bayesian without
上传时间: 2016-05-26
上传用户:离殇
A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain mode1 based on ontology semantic measurement is used to identi. ing which active session a request should belong to.The corn— petitive method is applied to determine the end of the sessions. Compared with other algorithms,more successfu1 sessions are additionally detected by semantic outlier analysis.
标签: usage partitioning presented semantic
上传时间: 2016-08-06
上传用户:gxrui1991
Realizing an MP3 player with the LPC2148, using libmad and EFSL This Application Note describes how to integrate the libmad MPEG 1/2 layer 3 library and the Embedded File System Library EFSL in a LPC2148 device to realize MP3 player. The Keil MCB2140 board is used to test the application and the Rowley CrossStudio for ARM has been chosen as a reference tool-chain.
标签: Application Realizing describes player
上传时间: 2016-09-05
上传用户:moerwang
描述该如何设计JTAG,尤其讲了JTAG chain的设计,对于产品需要产业化的硬件工程师来说很重要!
上传时间: 2016-11-10
上传用户:zsjzc
learning English The following appeared in a memorandum written by the vice president of Nature s Way, a chain of stores selling health food and other health-related products. "Previous experience has shown that our stores are most profitable in areas where residents are highly concerned with leading healthy lives. We should therefore build our next new store in Plainsville, which has many such residents. Plainsville merchants report that sales of running shoes and exercise clothing are at all-time highs. The local health club, which nearly closed five years ago due to lack of business, has more members than ever, and the weight training and aerobics classes are always full. We can even anticipate a new generation of customers: Plainsville s schoolchildren are required to participate in a fitness for life program, which emphasizes the benefits of regular exercise at an early age.
标签: memorandum following president learning
上传时间: 2017-03-06
上传用户:youth25
This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola. It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert batch file. This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine. Tool chain ---------- FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM -> MPASM FUZZY.ASM -> INTEL HEX Fuzzy input registers --------------------- current_ins 1..8 x 8-bit raw inputs Fuzzy inference function ------------------------ FuzzyEngine Fuzzy output registers ---------------------- cog_outs 1..8 x 8-bit raw outputs
标签: fuzzy development implements PIC-based
上传时间: 2014-01-18
上传用户:caozhizhi
Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device connected to any of the repeaters in the chain will have a throughput that is limited by the weakest link between the two nodes in the chain from which the connection originates to where the connection ends
标签: wireless range extenders repeaters
上传时间: 2014-01-02
上传用户:zhangyigenius