文献2:Knowledge brokering on emissions modelling in Strategic Environmental (2)
油气田燃料天然气组分特征对实测碳排放因子的影响
油气田燃料天然气组分特征对实测碳排放因子的影响廉军豹付玥张鑫袁良庆刘宏彬李世熙谭小红(大庆油田设计院有限公司)摘要:通过实测碳排放因子计算公式理论分析及油气田典型燃料天然气实例分析,探索燃料天然气组分特征对实测碳排放因子的影响。
结果表明:各生产系统使用的油气田燃料天然气含碳原子数量较多的组分含量越多,实测含碳量碳排放因子及实测低位发热量碳排放因子越大,含碳原子数量较少的组分或H 2、O 2、N 2、He 不含碳的组分含量越多,实测含碳量碳排放因子及实测低位发热量碳排放因子越小;除实测方法系统性差异外,一定含量的CO 2,是导致油气田燃料天然气实测低位发热量碳排放因子与实测含碳量碳排放因子之间存在显著差异的重要原因;各类燃料天然气碳排放因子存在普遍性差异,干气的实测碳排放因子明显比湿气的小。
上述结论将为油气田燃料天然气碳排放核算提供技术支持。
关键词:油气田;燃料天然气;碳排放因子;组分特征;实测DOI :10.3969/j.issn.2095-1493.2023.11.016The influences of fuel natural gas composition characteristics on measured carbon emission factors in oil and gas fieldLIAN Junbao,FU Yue,ZHANG Xin,YUAN Liangqing,LIU Hongbin,LI Shixi,TAN Xiaohong Daqing Oilfield Design Institute Co .,Ltd .Abstract:The influences of fuel natural gas composition characteristics on measured carbon emission factors are explored through the theory analysis of measured carbon emission factors formula and the cas-es analysis of typical fuel natural gas in oil and gas field.The results show that the higher the content of components with more carbon atoms in the natural gas used as fuel of each production system in oil and gas fields,the greater the carbon emission factor from measured carbon content and that from measured low calorific value.The higher the content of components with less carbon atoms or components with-out carbon such as H 2,O 2,N 2,He in natural gas used as fuel in oil and gas fields,the smaller the car-bon emission factor from measured carbon content and that from measured low calorific value.What's more,in addition to systematic differences between measurement methods,a certain amount of CO 2is an important reason for the significant difference between the carbon emission factor from measured carbon content and that from measured low calorific value of natural gas used in oil and gas fields.In addition,there are universal differences in various carbon emission factors of fuel natural gases in oil and gas fields,and the measured carbon emission factors of dry gas are significantly smaller than those of wet gas.Most importantly,the above conclusions will be provided technical support for the carbon emis-sion accounting for fuel natural gas in oil and gas fields .Keywords:oil and gas field;fuel natural gas;carbon emission factor;composition characteristics;measurement第一作者简介:廉军豹,高级工程师,硕士研究生,2010年毕业于中国地质大学(武汉)(应用化学专业),从事油气田碳资产研发技术研(碳控楼),163712。
教育游戏化:将课堂变成一场协同冒险游戏——以Classcraft为例
28 |
PUBLISHING REFERENCE
海外市场
“对战”形式完成教学评测。学生按时完成任务可 以获得奖励,并用来升级角色的经验值(Experience Points,XP)——这将使其角色提高战斗水平并学 习新的技能。如果一个学生违反了课堂纪律,就会 失去生命值,甚至最终导致角色在“对战”中失败。 如果学生获得经验值点数,对相应角色及其团队都 有益处;相反,如果一个学生失去了生命值点数, 其团队的其他成员角色也会受到伤害,并且大家必 须完成各种额外任务。无论如何,学生们需要共同 努力才能使团队获得成功。一般而言,没有学生愿 意自己的不当行为损害团队利益,导致他人失败。 游戏团队中,学生还可以帮助彼此成长。例如,如 果学生的虚拟角色是一名战士,而队友因为上课迟 到面临生命值点数降低,则该学生可以通过完成额 外的学习任务来挽救队友。学生知道他们在课堂上 的行为会影响整个团队的进度、这会激励他们强化 课堂上的积极行为和团队合作,提升课堂学习效率。 Classcraft 每个月都会发布新的故事情节和场景供教 育工作者选择,帮助提升学生的课堂参与感 [19]。除 了在预制故事中添加课程任务外,Classcraft 还允许 教师自己编写课程,通过上传不同的学习任务来教 授不同的科目。根据在课堂活动中收集的数据,教 师还可以查看学生的行为并进行分析。
是以游戏软件为基础的学习,教育游戏(Educational Games)的设
计与开发是当前研究的主流方向。教育游戏模糊了学习与游戏、正式 学习与非正式学习的边界 [13];但是有别于教育游戏的软件性质(见表
1),教育游戏化是一套解决方案,服务于教育情境中的各类问题,
如激发学习者动机和兴趣、引导学习者面对学业失败、激发其学校生
研究表明,随着游戏在当代文化中的地位日益 提高,其在教育中能够扮演的角色也越来越多样化。 Classcraft 作为受到游戏启发开发的教育解决方案, 它对于学习的积极作用和游戏非常相似。
LED研究热点与前沿的知识图谱分析―――基于SCIE中三种代表刊(精)
LED 研究最活跃的国家。 从领域 H 指数来看,美国也 是 LED 领域研究成果最具有影响力的国家,其次是日 本。 中国无论是从载文量来看,还是从领域 H 指数来
看,都位居第五位。
表 3 高产国家和地区载文分布
排序 1 2 3 4 5 6 7 8 9 10 11 12
国家或地区 美国 USA 台湾 Taiwan 韩国 South Korea 日本 Japan 中国 Peoples R China 英国 UK 德国 Germany 加拿大 Canada 意大利 Italy 法国 France 新加坡 Singapore 瑞士 Switzerland
大洲 发文量 中心度 领域 H 指数
美洲 284 0. 59
8
亚洲 226 0. 37
5
亚洲 151 0. 26
5
亚洲 146 0. 25
6
亚洲 125 0. 21
4
欧洲 94 0. 28
4
欧洲 78 0. 20
3
美洲 30 0. 00
2
欧洲 29 0. 02
2
欧洲 25 0. 04
1
亚洲 21 0. 06
载文量 700 255 216 197 186
表 2 LED 领域前 5 种高被引期刊分布
排 序
期刊名称
被引 频次
IF
5年 期 IF
EF
1 APPLIED PHYSICS LETTERS
2049 3. 841 3. 863 0. 71882
2
IEEE PHOTONICS TERS
TECHNOLOGY
led研究热点与前沿的知识图谱分析基于scie中三种代表刊吴学雁艾丹祥张延林广东工业大学管理学院广州510520摘要选取webofscience平台上scie数据库中收录的led领域的3种国际代表性期刊19992011年间的论文为研究对象利用信息可视化软件citespace对引文数据和主题词数据进行分析和处理生成了led领域的共被引网络知识图谱和共现混合网络知识图谱
范德堡多晶硅热导率的测试结构
材料与工艺范德堡多晶硅热导率的测试结构Ξ戚丽娜 许高斌 黄庆安(东南大学M E M S教育部重点实验室,南京,210096)2003209219收稿,2003211227收改稿摘要:在O.M.Pau l等研究的范德堡热导率测试结构的基础上,提出了一种改进结构,利用一组测试结构来测得多晶硅薄膜的热导率。
在十字型结构中一个含有多晶硅薄膜,而另一个不含有多晶硅薄膜,根据建立的热学模型,可以获取多晶硅薄膜的热导率。
用有限元分析软件AN SYS进行了模拟分析,分析表明模拟值与实验值能较好地吻合,且辐射散热是基本可以忽略的,从而验证了模型建立的正确性,说明该方法能够实现对多晶硅薄膜的测量,且具有较高的测试精确度。
关键词:范德堡测试结构;热导率;多晶硅薄膜;热响应;十字型中图分类号:TN402;TN405 文献标识码:A 文章编号:100023819(2005)042569205Van D er Pauw Test Structure of the Thermal Conductiv ity ofPolysilicon Th i n F il m sQ I L ina XU Gaob in HU AN G Q ing’an(K ey L abora tory of M EM S of M in istry of E d uca tion,S ou theast U n iversity,N anj ing,210096,CH N)Abstract:A m icrom ach ined therm al V an D er Pauw test structu re is i m p roved.Tw o structu res to m easu re conductivity of po lysilicon th in fil m s are u sed.O ne cro ss2shap ed layers con sists of po lysilicon th in fil m s.T he o ther cro ss2shap ed layers has no po lysilicon th in fil m s. M ak ing u se of the difference betw een the structu res,conductivity of po lysilicon th in fil m can be m easu red.T herm al fin ite elem en t si m u lati on s show that the radiative heat lo ss from the structu re has a negligib le effect on the ex tracted k value.F in ite elem en t softw are AN SYS is u sed to verify the structu re design.Key words:Van D er Pauw test structure;conductiv ity;polysil icon f il m;ther ma l respon se;Greek crossEEACC:2575F;84601 引 言在M E M S和集成电路中,热学效应都是相当重要的,许多传感器也利用热传输来感知其他的物理量。
隐式知识的知识管理研究
隐式知识的知识管理研究一、引言知识管理在当今社会已经成为了一个非常热门的研究领域。
在企业内部,知识管理可以提高企业的竞争力和创新能力;在学术界,知识管理可以帮助学者更好地获取、整理和利用知识资源。
然而,知识管理最大的困难在于,很多知识难以被形式化、编码和共享,这就是所谓的隐式知识。
本文旨在探讨隐式知识的知识管理研究,并提出一些解决方案。
二、隐式知识的定义隐式知识(tacit knowledge)指的是那些难以被明确表述、教授和分享的知识,通常包括个人经验、技能、判断力和直觉。
与之相对的是显式知识(explicit knowledge),即容易被书面表述、编码和传递的知识,通常包括图书、数据库、知识库等。
隐式知识的特点是高度个性化、路径依赖性和上下文依赖性,因此难以被通用化、组织化和管理化。
三、隐式知识的管理挑战由于隐式知识难以被形式化和共享,因此知识管理过程中会遇到一些挑战:1. 难以识别和获取:由于隐式知识往往是个人经验和技能,因此难以被抽象成符号、标准或程序,又由于个人隐式知识的私密性、保密性和意愿性,难以被外部人员所获取。
2. 难以共享和转移:由于隐式知识是与个人紧密关联的,又因为传统的知识管理方法主要关注知识的形式化和标准化,难以将个人的隐式知识转化为显式知识,并且在组织内部传播共享。
3. 难以评估和激励:由于隐式知识往往是通过实践和经验积累得来的,难以直接量化和评估,在绩效考核、激励机制和培训计划制定中难以被充分考虑。
四、隐式知识的管理策略针对以上难题,我们可以采用一些常见的管理策略来解决:1. 社会化学习:建立一个支持知识自由流动的社交网络平台,通过社交平台上的问答交流、经验分享、问题解决等途径来促进隐式知识的沉淀,识别和共享。
2. 知识协同:建立一个以项目或任务为中心的协作平台,让相关人员在完成项目或任务的过程中共享实践、沉淀经验、共同创新。
3. 培训和教育:提供针对性的培训和教育机会,让员工通过模仿、传承和专业训练等方式逐步掌握隐式知识,将其转化为显式知识并用于实践。
Knowledge Engineering-Principles And Methods
Knowledge Engineering:Principles and MethodsRudi Studer1, V. Richard Benjamins2, and Dieter Fensel11Institute AIFB, University of Karlsruhe, 76128 Karlsruhe, Germany{studer, fensel}@aifb.uni-karlsruhe.dehttp://www.aifb.uni-karlsruhe.de2Artificial Intelligence Research Institute (IIIA),Spanish Council for Scientific Research (CSIC), Campus UAB,08193 Bellaterra, Barcelona, Spainrichard@iiia.csic.es, http://www.iiia.csic.es/~richard2Dept. of Social Science Informatics (SWI),richard@swi.psy.uva.nl, http://www.swi.psy.uva.nl/usr/richard/home.htmlAbstractThis paper gives an overview about the development of the field of Knowledge Engineering over the last 15 years. We discuss the paradigm shift from a transfer view to a modeling view and describe two approaches which considerably shaped research in Knowledge Engineering: Role-limiting Methods and Generic Tasks. To illustrate various concepts and methods which evolved in the last years we describe three modeling frameworks: CommonKADS, MIKE, and PROTÉGÉ-II. This description is supplemented by discussing some important methodological developments in more detail: specification languages for knowledge-based systems, problem-solving methods, and ontologies. We conclude with outlining the relationship of Knowledge Engineering to Software Engineering, Information Integration and Knowledge Management.Key WordsKnowledge Engineering, Knowledge Acquisition, Problem-Solving Method, Ontology, Information Integration1IntroductionIn earlier days research in Artificial Intelligence (AI) was focused on the development offormalisms, inference mechanisms and tools to operationalize Knowledge-based Systems (KBS). Typically, the development efforts were restricted to the realization of small KBSs in order to study the feasibility of the different approaches.Though these studies offered rather promising results, the transfer of this technology into commercial use in order to build large KBSs failed in many cases. The situation was directly comparable to a similar situation in the construction of traditional software systems, called …software crisis“ in the late sixties: the means to develop small academic prototypes did not scale up to the design and maintenance of large, long living commercial systems. In the same way as the software crisis resulted in the establishment of the discipline Software Engineering the unsatisfactory situation in constructing KBSs made clear the need for more methodological approaches.So the goal of the new discipline Knowledge Engineering (KE) is similar to that of Software Engineering: turning the process of constructing KBSs from an art into an engineering discipline. This requires the analysis of the building and maintenance process itself and the development of appropriate methods, languages, and tools specialized for developing KBSs. Subsequently, we will first give an overview of some important historical developments in KE: special emphasis will be put on the paradigm shift from the so-called transfer approach to the so-called modeling approach. This paradigm shift is sometimes also considered as the transfer from first generation expert systems to second generation expert systems [43]. Based on this discussion Section 2 will be concluded by describing two prominent developments in the late eighties:Role-limiting Methods [99] and Generic Tasks [36]. In Section 3 we will present some modeling frameworks which have been developed in recent years: CommonKADS [129], MIKE [6], and PROTÈGÈ-II [123]. Section 4 gives a short overview of specification languages for KBSs. Problem-solving methods have been a major research topic in KE for the last decade. Basic characteristics of (libraries of) problem-solving methods are described in Section 5. Ontologies, which gained a lot of importance during the last years are discussed in Section 6. The paper concludes with a discussion of current developments in KE and their relationships to other disciplines.In KE much effort has also been put in developing methods and supporting tools for knowledge elicitation (compare [48]). E.g. in the VITAL approach [130] a collection of elicitation tools, like e.g. repertory grids (see [65], [83]), are offered for supporting the elicitation of domain knowledge (compare also [49]). However, a discussion of the various elicitation methods is beyond the scope of this paper.2Historical Roots2.1Basic NotionsIn this section we will first discuss some main principles which characterize the development of KE from the very beginning.Knowledge Engineering as a Transfer Process…This transfer and transformation of problem-solving expertise from a knowledge source to a program is the heart of the expert-system development process.” [81]In the early eighties the development of a KBS has been seen as a transfer process of humanknowledge into an implemented knowledge base. This transfer was based on the assumption that the knowledge which is required by the KBS already exists and just has to be collected and implemented. Most often, the required knowledge was obtained by interviewing experts on how they solve specific tasks [108]. Typically, this knowledge was implemented in some kind of production rules which were executed by an associated rule interpreter. However, a careful analysis of the various rule knowledge bases showed that the rather simple representation formalism of production rules did not support an adequate representation of different types of knowledge [38]: e.g. in the MYCIN knowledge base [44] strategic knowledge about the order in which goals should be achieved (e.g. “consider common causes of a disease first“) is mixed up with domain specific knowledge about for example causes for a specific disease. This mixture of knowledge types, together with the lack of adequate justifications of the different rules, makes the maintenance of such knowledge bases very difficult and time consuming. Therefore, this transfer approach was only feasible for the development of small prototypical systems, but it failed to produce large, reliable and maintainable knowledge bases.Furthermore, it was recognized that the assumption of the transfer approach, that is that knowledge acquisition is the collection of already existing knowledge elements, was wrong due to the important role of tacit knowledge for an expert’s problem-solving capabilities. These deficiencies resulted in a paradigm shift from the transfer approach to the modeling approach.Knowledge Engineering as a Modeling ProcessNowadays there exists an overall consensus that the process of building a KBS may be seen as a modeling activity. Building a KBS means building a computer model with the aim of realizing problem-solving capabilities comparable to a domain expert. It is not intended to create a cognitive adequate model, i.e. to simulate the cognitive processes of an expert in general, but to create a model which offers similar results in problem-solving for problems in the area of concern. While the expert may consciously articulate some parts of his or her knowledge, he or she will not be aware of a significant part of this knowledge since it is hidden in his or her skills. This knowledge is not directly accessible, but has to be built up and structured during the knowledge acquisition phase. Therefore this knowledge acquisition process is no longer seen as a transfer of knowledge into an appropriate computer representation, but as a model construction process ([41], [106]).This modeling view of the building process of a KBS has the following consequences:•Like every model, such a model is only an approximation of the reality. In principle, the modeling process is infinite, because it is an incessant activity with the aim of approximating the intended behaviour.•The modeling process is a cyclic process. New observations may lead to a refinement, modification, or completion of the already built-up model. On the other side, the model may guide the further acquisition of knowledge.•The modeling process is dependent on the subjective interpretations of the knowledge engineer. Therefore this process is typically faulty and an evaluation of the model with respect to reality is indispensable for the creation of an adequate model. According to this feedback loop, the model must therefore be revisable in every stage of the modeling process.Problem Solving MethodsIn [39] Clancey reported on the analysis of a set of first generation expert systems developed to solve different tasks. Though they were realized using different representation formalisms (e.g. production rules, frames, LISP), he discovered a common problem solving behaviour.Clancey was able to abstract this common behaviour to a generic inference pattern called Heuristic Classification , which describes the problem-solving behaviour of these systems on an abstract level, the so called Knowledge Level [113]. This knowledge level allows to describe reasoning in terms of goals to be achieved, actions necessary to achieve these goals and knowledge needed to perform these actions. A knowledge-level description of a problem-solving process abstracts from details concerned with the implementation of the reasoning process and results in the notion of a Problem-Solving Method (PSM).A PSM may be characterized as follows (compare [20]):• A PSM specifies which inference actions have to be carried out for solving a given task.• A PSM determines the sequence in which these actions have to be activated.•In addition, so-called knowledge roles determine which role the domain knowledge plays in each inference action. These knowledge roles define a domain independent generic terminology.When considering the PSM Heuristic Classification in some more detail (Figure 1) we can identify the three basic inference actions abstract ,heuristic match , and refine . Furthermore,four knowledge roles are defined:observables ,abstract observables ,solution abstractions ,and solutions . It is important to see that such a description of a PSM is given in a generic way.Thus the reuse of such a PSM in different domains is made possible. When considering a medical domain, an observable like …410 C“ may be abstracted to …high temperature“ by the inference action abstract . This abstracted observable may be matched to a solution abstraction, e.g. …infection“, and finally the solution abstraction may be hierarchically refined to a solution, e.g. the disease …influenca“.In the meantime various PSMs have been identified, like e.g.Cover-and-Differentiate for solving diagnostic tasks [99] or Propose-and-Revise [100] for parametric design tasks.PSMs may be exploited in the knowledge engineering process in different ways:Fig. 1 The Problem-Solving Method Heuristic Classificationroleinference action•PSMs contain inference actions which need specific knowledge in order to perform their task. For instance,Heuristic Classification needs a hierarchically structured model of observables and solutions for the inference actions abstract and refine, respectively.So a PSM may be used as a guideline to acquire static domain knowledge.• A PSM allows to describe the main rationale of the reasoning process of a KBS which supports the validation of the KBS, because the expert is able to understand the problem solving process. In addition, this abstract description may be used during the problem-solving process itself for explanation facilities.•Since PSMs may be reused for developing different KBSs, a library of PSMs can be exploited for constructing KBSs from reusable components.The concept of PSMs has strongly stimulated research in KE and thus has influenced many approaches in this area. A more detailed discussion of PSMs is given in Section 5.2.2Specific ApproachesDuring the eighties two main approaches evolved which had significant influence on the development of modeling approaches in KE: Role-Limiting Methods and Generic Tasks. Role-Limiting MethodsRole-Limiting Methods (RLM) ([99], [102]) have been one of the first attempts to support the development of KBSs by exploiting the notion of a reusable problem-solving method. The RLM approach may be characterized as a shell approach. Such a shell comes with an implementation of a specific PSM and thus can only be used to solve a type of tasks for which the PSM is appropriate. The given PSM also defines the generic roles that knowledge can play during the problem-solving process and it completely fixes the knowledge representation for the roles such that the expert only has to instantiate the generic concepts and relationships, which are defined by these roles.Let us consider as an example the PSM Heuristic Classification (see Figure 1). A RLM based on Heuristic Classification offers a role observables to the expert. Using that role the expert (i) has to specify which domain specific concept corresponds to that role, e.g. …patient data”(see Figure 4), and (ii) has to provide domain instances for that concept, e.g. concrete facts about patients. It is important to see that the kind of knowledge, which is used by the RLM, is predefined. Therefore, the acquisition of the required domain specific instances may be supported by (graphical) interfaces which are custom-tailored for the given PSM.In the following we will discuss one RLM in some more detail: SALT ([100], [102]) which is used for solving constructive tasks.Then we will outline a generalization of RLMs to so-called Configurable RLMs.SALT is a RLM for building KBSs which use the PSM Propose-and-Revise. Thus KBSs may be constructed for solving specific types of design tasks, e.g. parametric design tasks. The basic inference actions that Propose-and-Revise is composed of, may be characterized as follows:•extend a partial design by proposing a value for a design parameter not yet computed,•determine whether all computed parameters fulfil the relevant constraints, and•apply fixes to remove constraint violations.In essence three generic roles may be identified for Propose-and-Revise ([100]):•…design-extensions” refer to knowledge for proposing a new value for a design parameter,•…constraints” provide knowledge restricting the admissible values for parameters, and •…fixes” make potential remedies available for specific constraint violations.From this characterization of the PSM Propose-and-Revise, one can easily see that the PSM is described in generic, domain-independent terms. Thus the PSM may be used for solving design tasks in different domains by specifying the required domain knowledge for the different predefined generic knowledge roles.E.g. when SALT was used for building the VT-system [101], a KBS for configuring elevators, the domain expert used the form-oriented user interface of SALT for entering domain specific design extensions (see Figure 2). That is, the generic terminology of the knowledge roles, which is defined by object and relation types, is instantiated with VT specific instances.1Name:CAR-JAMB-RETURN2Precondition:DOOR-OPENING = CENTER3Procedure:CALCULATION4Formula:[PLATFORM-WIDTH -OPENING-WIDTH] / 25Justification:CENTER-OPENING DOORS LOOKBEST WHEN CENTERED ONPLATFORM.(the value of the design parameter CAR-JUMB-RETURN iscalculated according to the formula - in case the preconditionis fulfilled; the justification gives a description why thisparameter value is preferred over other values (example takenfrom [100]))Fig. 2 Design Extension Knowledge for VTOn the one hand, the predefined knowledge roles and thus the predefined structure of the knowledge base may be used as a guideline for the knowledge acquisition process: it is clearly specified what kind of knowledge has to be provided by the domain expert. On the other hand, in most real-life situations the problem arises of how to determine whether a specific task may be solved by a given RLM. Such task analysis is still a crucial problem, since up to now there does not exist a well-defined collection of features for characterizing a domain task in a way which would allow a straightforward mapping to appropriate RLMs. Moreover, RLMs have a fixed structure and do not provide a good basis when a particular task can only be solved by a combination of several PSMs.In order to overcome this inflexibility of RLMs, the concept of configurable RLMs has been proposed.Configurable Role-Limiting Methods (CRLMs) as discussed in [121] exploit the idea that a complex PSM may be decomposed into several subtasks where each of these subtasks may be solved by different methods (see Section 5). In [121], various PSMs for solving classification tasks, like Heuristic Classification or Set-covering Classification, have been analysed with respect to common subtasks. This analysis resulted in the identification ofshared subtasks like …data abstraction” or …hypothesis generation and test”. Within the CRLM framework a predefined set of different methods are offered for solving each of these subtasks. Thus a PSM may be configured by selecting a method for each of the identified subtasks. In that way the CRLM approach provides means for configuring the shell for different types of tasks. It should be noted that each method offered for solving a specific subtask, has to meet the knowledge role specifications that are predetermined for the CRLM shell, i.e. the CRLM shell comes with a fixed scheme of knowledge types. As a consequence, the introduction of a new method into the shell typically involves the modification and/or extension of the current scheme of knowledge types [121]. Having a fixed scheme of knowledge types and predefined communication paths between the various components is an important restriction distinguishing the CRLM framework from more flexible configuration approaches such as CommonKADS (see Section 3).It should be clear that the introduction of such flexibility into the RLM approach removes one of its disadvantages while still exploiting the advantage of having a fixed scheme of knowledge types, which build the basis for generating effective knowledge-acquisition tools. On the other hand, configuring a CRLM shell increases the burden for the system developer since he has to have the knowledge and the ability to configure the system in the right way. Generic Task and Task StructuresIn the early eighties the analysis and construction of various KBSs for diagnostic and design tasks evolved gradually into the notion of a Generic Task (GT) [36]. GTs like Hierarchical Classification or State Abstraction are building blocks which can be reused for the construction of different KBSs.The basic idea of GTs may be characterized as follows (see [36]):• A GT is associated with a generic description of its input and output.• A GT comes with a fixed scheme of knowledge types specifying the structure of domain knowledge needed to solve a task.• A GT includes a fixed problem-solving strategy specifying the inference steps the strategy is composed of and the sequence in which these steps have to be carried out. The GT approach is based on the strong interaction problem hypothesis which states that the structure and representation of domain knowledge is completely determined by its use [33]. Therefore, a GT comes with both, a fixed problem-solving strategy and a fixed collection of knowledge structures.Since a GT fixes the type of knowledge which is needed to solve the associated task, a GT provides a task specific vocabulary which can be exploited to guide the knowledge acquisition process. Furthermore, by offering an executable shell for a GT, called a task specific architecture, the implementation of a specific KBS could be considered as the instantiation of the predefined knowledge types by domain specific terms (compare [34]). On a rather pragmatic basis several GTs have been identified including Hierarchical Classification,Abductive Assembly and Hypothesis Matching. This initial collection of GTs was considered as a starting point for building up an extended collection covering a wide range of relevant tasks.However, when analyzed in more detail two main disadvantages of the GT approach have been identified (see [37]):•The notion of task is conflated with the notion of the PSM used to solve the task, sinceeach GT included a predetermined problem-solving strategy.•The complexity of the proposed GTs was very different, i.e. it remained open what the appropriate level of granularity for the building blocks should be.Based on this insight into the disadvantages of the notion of a GT, the so-called Task Structure approach was proposed [37]. The Task Structure approach makes a clear distinction between a task, which is used to refer to a type of problem, and a method, which is a way to accomplish a task. In that way a task structure may be defined as follows (see Figure 3): a task is associated with a set of alternative methods suitable for solving the task. Each method may be decomposed into several subtasks. The decomposition structure is refined to a level where elementary subtasks are introduced which can directly be solved by using available knowledge.As we will see in the following sections, the basic notion of task and (problem-solving)method, and their embedding into a task-method-decomposition structure are concepts which are nowadays shared among most of the knowledge engineering methodologies.3Modeling FrameworksIn this section we will describe three modeling frameworks which address various aspects of model-based KE approaches: CommonKADS [129] is prominent for having defined the structure of the Expertise Model, MIKE [6] puts emphasis on a formal and executable specification of the Expertise Model as the result of the knowledge acquisition phase, and PROTÉGÉ-II [51] exploits the notion of ontologies.It should be clear that there exist further approaches which are well known in the KE community, like e.g VITAL [130], Commet [136], and EXPECT [72]. However, a discussion of all these approaches is beyond the scope of this paper.Fig. 3 Sample Task Structure for DiagnosisTaskProblem-Solving MethodSubtasksProblem-Solving MethodTask / Subtasks3.1The CommonKADS ApproachA prominent knowledge engineering approach is KADS[128] and its further development to CommonKADS [129]. A basic characteristic of KADS is the construction of a collection of models, where each model captures specific aspects of the KBS to be developed as well as of its environment. In CommonKADS the Organization Model, the Task Model, the Agent Model, the Communication Model, the Expertise Model and the Design Model are distinguished. Whereas the first four models aim at modeling the organizational environment the KBS will operate in, as well as the tasks that are performed in the organization, the expertise and design model describe (non-)functional aspects of the KBS under development. Subsequently, we will briefly discuss each of these models and then provide a detailed description of the Expertise Model:•Within the Organization Model the organizational structure is described together with a specification of the functions which are performed by each organizational unit.Furthermore, the deficiencies of the current business processes, as well as opportunities to improve these processes by introducing KBSs, are identified.•The Task Model provides a hierarchical description of the tasks which are performed in the organizational unit in which the KBS will be installed. This includes a specification of which agents are assigned to the different tasks.•The Agent Model specifies the capabilities of each agent involved in the execution of the tasks at hand. In general, an agent can be a human or some kind of software system, e.g.a KBS.•Within the Communication Model the various interactions between the different agents are specified. Among others, it specifies which type of information is exchanged between the agents and which agent is initiating the interaction.A major contribution of the KADS approach is its proposal for structuring the Expertise Model, which distinguishes three different types of knowledge required to solve a particular task. Basically, the three different types correspond to a static view, a functional view and a dynamic view of the KBS to be built (see in Figure 4 respectively “domain layer“, “inference layer“ and “task layer“):•Domain layer : At the domain layer all the domain specific knowledge is modeled which is needed to solve the task at hand. This includes a conceptualization of the domain in a domain ontology (see Section 6), and a declarative theory of the required domain knowledge. One objective for structuring the domain layer is to model it as reusable as possible for solving different tasks.•Inference layer : At the inference layer the reasoning process of the KBS is specified by exploiting the notion of a PSM. The inference layer describes the inference actions the generic PSM is composed of as well as the roles , which are played by the domain knowledge within the PSM. The dependencies between inference actions and roles are specified in what is called an inference structure. Furthermore, the notion of roles provides a domain independent view on the domain knowledge. In Figure 4 (middle part) we see the inference structure for the PSM Heuristic Classification . Among others we can see that …patient data” plays the role of …observables” within the inference structure of Heuristic Classification .•Task layer : The task layer provides a decomposition of tasks into subtasks and inference actions including a goal specification for each task, and a specification of how theseFig. 4 Expertise Model for medical diagnosis (simplified CML notation)goals are achieved. The task layer also provides means for specifying the control over the subtasks and inference actions, which are defined at the inference layer.Two types of languages are offered to describe an Expertise Model: CML (Conceptual Modeling Language) [127], which is a semi-formal language with a graphical notation, and (ML)2 [79], which is a formal specification language based on first order predicate logic, meta-logic and dynamic logic (see Section 4). Whereas CML is oriented towards providing a communication basis between the knowledge engineer and the domain expert, (ML)2 is oriented towards formalizing the Expertise Model.The clear separation of the domain specific knowledge from the generic description of the PSM at the inference and task layer enables in principle two kinds of reuse: on the one hand, a domain layer description may be reused for solving different tasks by different PSMs, on the other hand, a given PSM may be reused in a different domain by defining a new view to another domain layer. This reuse approach is a weakening of the strong interaction problem hypothesis [33] which was addressed in the GT approach (see Section 2). In [129] the notion of a relative interaction hypothesis is defined to indicate that some kind of dependency exists between the structure of the domain knowledge and the type of task which should be solved. To achieve a flexible adaptation of the domain layer to a new task environment, the notion of layered ontologies is proposed:Task and PSM ontologies may be defined as viewpoints on an underlying domain ontology.Within CommonKADS a library of reusable and configurable components, which can be used to build up an Expertise Model, has been defined [29]. A more detailed discussion of PSM libraries is given in Section 5.In essence, the Expertise Model and the Communication Model capture the functional requirements for the target system. Based on these requirements the Design Model is developed, which specifies among others the system architecture and the computational mechanisms for realizing the inference actions. KADS aims at achieving a structure-preserving design, i.e. the structure of the Design Model should reflect the structure of the Expertise Model as much as possible [129].All the development activities, which result in a stepwise construction of the different models, are embedded in a cyclic and risk-driven life cycle model similar to Boehm’s spiral model [21].The basic structure of the expertise model has some similarities with the data, functional, and control view of a system as known from software engineering. However, a major difference may be seen between an inference layer and a typical data-flow diagram (compare [155]): Whereas an inference layer is specified in generic terms and provides - via roles and domain views - a flexible connection to the data described at the domain layer, a data-flow diagram is completely specified in domain specific terms. Moreover, the data dictionary does not correspond to the domain layer, since the domain layer may provide a complete model of the domain at hand which is only partially used by the inference layer, whereas the data dictionary is describing exactly those data which are used to specify the data flow within the data flow diagram (see also [54]).3.2The MIKE ApproachThe MIKE approach (Model-based and Incremental Knowledge Engineering) (cf. [6], [7])。
在深度神经网络中利用激活稀疏性[发明专利]
专利名称:在深度神经网络中利用激活稀疏性
专利类型:发明专利
发明人:R·希尔,A·兰博,M·戈德法布,A·安萨里,C·洛特申请号:CN201980062020.2
申请日:20190927
公开号:CN112740236A
公开日:
20210430
专利内容由知识产权出版社提供
摘要:描述了一种在深度神经网络中利用激活稀疏性的方法。
该方法包括检索激活张量和权重张量,其中该激活张量是稀疏激活张量。
该方法还包括生成包含该激活张量的非零激活的经压缩激活张量,其中该经压缩激活张量具有比该激活张量少的列。
该方法进一步包括对该经压缩激活张量和该权重张量进行处理以生成输出张量。
申请人:高通股份有限公司
地址:美国加利福尼亚州
国籍:US
代理机构:上海专利商标事务所有限公司
更多信息请下载全文后查看。
国际教育大数据研究的热点、前沿和趋势基于WOS数据库的量化分析
国际教育大数据研究的热点、前沿和趋势基于WOS数据库的量化分析一、本文概述Overview of this article随着信息技术的飞速发展和全球教育交流的日益密切,国际教育大数据研究已经成为教育领域的重要议题。
本文旨在通过量化分析的方法,基于WOS(Web of Science)数据库,深入探讨国际教育大数据研究的热点、前沿和趋势。
我们将从文献计量学角度出发,分析近年来国际教育大数据研究领域的论文发表情况、关键词共现网络、研究主题演变等方面,以期为全球教育大数据研究提供科学的参考和启示。
With the rapid development of information technology and the increasingly close global educational exchanges, international education big data research has become an important topic in the field of education. This article aims to explore the hotspots, frontiers, and trends in international education big data research through quantitative analysis based on the WOS (Web of Science) database. We will analyze thepublication status, keyword co-occurrence networks, and research topic evolution of international education big data research in recent years from the perspective of bibliometrics, in order to provide scientific reference and inspiration for global education big data research.我们将对WOS数据库中关于国际教育大数据研究的论文进行梳理和统计,分析论文的发表数量、引用情况、作者分布等,揭示该领域的研究现状和发展趋势。
知识溢出一个文献综述
知识溢出一个文献综述摘要:本文对知识溢出领域的相关文献进行了综合性评述,概括了知识溢出领域的主要研究内容、方法及其成果。
本文旨在为读者提供一个关于知识溢出领域的全面概述,并指出现有研究的不足之处以及未来研究的发展方向。
关键词:知识溢出,信息获取,数据挖掘,机器学习,教育科研引言:随着信息技术的迅猛发展,人们对于信息的需求与日俱增。
在这样的背景下,知识溢出成为一个热门的研究领域。
知识溢出是指一个实体在信息交流过程中,无意识地传递其所拥有的知识给另一个实体,从而使得知识得到更广泛的传播和利用。
本文对知识溢出领域的相关文献进行综合性评述,通过梳理相关研究内容和方法,旨在为后续研究提供参考和借鉴。
主体部分:1、知识溢出的概念和原理知识溢出是一个复杂的现象,其涉及的领域广泛,包括经济学、管理学、社会学等。
不同学科对于知识溢出的定义有所差异,但总体上可以将其理解为知识在个体之间、组织之间以及不同领域之间的转移和传播。
这种转移和传播不仅能够提高信息利用效率,还能够促进知识的创新和发展。
2、知识溢出在信息获取和利用中的作用在信息获取和利用方面,知识溢出具有显著的作用。
知识溢出可以促进信息传播,提高信息获取的速度和广度。
同时,知识溢出还可以降低信息获取成本,使得更多的个体能够获得所需的知识。
此外,知识溢出还可以促进信息筛选和过滤,使得人们能够更加高效地获取高质量的信息。
3基于知识溢出的数据挖掘和机器学习随着大数据时代的到来,基于知识溢出的数据挖掘和机器学习成为了一个重要的研究方向。
通过数据挖掘和机器学习技术,可以有效地从海量的数据中提取有用的知识,并将其应用于实际问题解决中。
例如,在医疗领域,基于知识溢出的数据挖掘和机器学习技术可以帮助医生进行疾病诊断和治疗方案的制定;在商业领域,这些技术可以帮助企业进行市场趋势分析、消费者行为预测等。
4知识溢出在教育和科研中的应用在教育和科研领域,知识溢出也具有广泛的应用价值。
基于复杂网络理论的大型换热网络节点重要性评价
2017年第36卷第5期 CHEMICAL INDUSTRY AND ENGINEERING PROGRESS·1581·化 工 进展基于复杂网络理论的大型换热网络节点重要性评价王政1,孙锦程1,刘晓强1,姜英1,贾小平2,王芳2(1青岛科技大学化工学院,山东 青岛 266042;2青岛科技大学环境与安全工程学院,山东 青岛 266042) 摘要:鉴于换热网络大型化和流股间复杂关系,使得换热网络换热器节点重要性的研究显得越来越重要,对其控制和安全运行的工程实践方面具有指导意义。
本文以大型换热网络为研究对象,将换热器抽象为节点,换热器之间的干扰传递抽象为边,构造网络拓扑结构。
在复杂网络理论的基础上,提出了评价大型换热网络节点重要性的策略和模型。
首先,从网络的点度中心性、中间中心性、接近中心性和特征向量中心性等网络拓扑结构属性出发,依据多属性决策方法对网络节点重要性进行综合评价;其次,考虑换热网络的方向性,基于PageRank 算法对该网络进行节点重要性评价研究。
综合两个算法的计算结果得出最终结论。
案例分析表明:该研究方法是有效的,可从不同的角度全面评价换热网络的节点重要性,丰富了换热器节点重要性评价的相关理论。
关键词:换热网络;复杂网络;节点重要性;多属性决策;PageRank 算法中图分类号:X92 文献标志码:A 文章编号:1000–6613(2017)05–1581–08 DOI :10.16085/j.issn.1000-6613.2017.05.004Evaluation of the node importance for large heat exchanger networkbased on complex network theoryWANG Zheng 1,SUN Jincheng 1,LIU Xiaoqiang 1,JIANG Ying 1,JIA Xiaoping 2,WANG Fang 2(1College of Chemical Engineering ,Qingdao University of Science and Technology ,Qingdao 266042,Shandong ,China ;2College of Environment and Safety Engineering ,Qingdao University of Science and Technology ,Qingdao266042,Shandong ,China )Abstract :Because of the complexity of large-scale heat exchanger network ,it is important to investigate the importance of heat exchanger nodes in heat exchanger network. It can provide guidance for the control and safe operation of heat exchanger networks ,as well as engineering practices. In this paper ,the network topology structure of large-scale heat exchanger network was constructed by treating heat exchangers as nodes and treating the transfer of interference between heat exchangers as edges. Based on the complex network theory ,the strategies and models for evaluating the node importance of the heat exchanger network were proposed. Firstly ,the importance of nodes were evaluated by the multi-attribute decision method based on the degree centrality, betweenness ,closeness and eigenvector centralities. Next ,considering the direction of case heat exchanger network ,PageRank algorithm was used to evaluate the importance of nodes. Considering the results from these two algorithms ,the final results were obtained. The case analysis showed that the strategy is effective and it can evaluate the node importance from different views ,which will enrich the node importance evaluation theory for heat exchanger network.Key words :heat exchanger network ;complex network ;node importance ;multi-attribute decision ;PageRank algorithm第一作者及联系人:王政(1968—),男,博士,副教授,硕士生导师,主要研究过程系统工程。
谷歌学术十一篇文章
1.“Deep Learning-based Approaches for Image Classification” - This articleexplores various deep learning techniques such as convolutional neuralnetworks (CNNs) and recurrent neural networks (RNNs) used for imageclassification tasks. It discusses the advantages and limitations of these approaches, and provides insights into the state-of-the-art techniques in thisfield.2.“Blockchain Technology: A Comprehensive Review” - This comprehensive review article discusses the fundamental concepts and components of blockchain technology. It covers topics such as decentralization, consensus mechanisms, smart contracts, and security considerations. The article also provides an overview of various applications of blockchain technology across different industries.3.“The Role of Artificial Intelligence in Healthcare” - This article examines the impact of artificial intelligence (AI) on healthcare. It discusses how AI algorithms can be used for medical image analysis, disease diagnosis, drug discovery, and personalized medicine. The article also addresses the potential challenges and ethical considerations associated with the adoption of AI in healthcare.4.“Internet of Things (IoT) Security and Privacy: A Survey” - This survey article provides an overview of security and privacy challenges in IoT systems. It discusses various attack vectors, vulnerabilities, and countermeasures for securing IoT devices and networks. The article also highlights the importance of implementing privacy protection mechanisms in IoT applications.5.“Machine Learning Techniques for Predictive Maintenance” - This article explores the application of machine learning techniques for predictive maintenance in industrial systems. It discusses how algorithms such as support vector machines (SVMs), random forests, and deep learning models can be used to detect anomalies, predict failures, and optimize maintenance schedules. The article also outlines the potential benefits and challenges of implementing predictive maintenance strategies.6.“Natural Language Processing for Sentiment Analysis” - This article focuses on natural language processing (NLP) techniques used for sentiment analysis. It discusses the various stages involved in sentiment analysis, from text pre-processing to feature extraction and classification. The article also highlights the challenges associated with sentiment analysis, such as handling sarcasm and irony in text.7.“Data Mining Techniques for Customer Segmentation” - This article explores different data mining techniques used for customer segmentation in marketing. It discusses clustering algorithms, association rule mining, and classification models that can be used to segment customers based on theirpreferences, behavior, and demographics. The article also discusses the potential benefits of customer segmentation for targeted marketing campaigns.8.“Big Data Analytics in Financial Services” - This article discusses the role of big data analytics in the financial services industry. It explores how financial institutions can leverage big data technologies and techniques to improve risk management, fraud detection, customer profiling, and trading strategies. The article also highlights the challenges associated with analyzing large volumes of financial data.9.“Augmented Reality: Applications and Challenges” - This article provides an overview of augmented reality (AR) technology and its applications in various domains. It discusses the challenges associated with AR, such as tracking accuracy, user interface design, and hardware limitations. The article also highlights the potential impact of AR on industries like gaming, education, and healthcare.10.“Data Privacy in Cloud Computing: Challenges and Solutions” - This article examines the privacy issues associated with cloud computing and proposes solutions to mitigate them. It discusses privacy-preserving data mining techniques, homomorphic encryption, and secure multi-party computation protocols. The article also highlights the importance of privacy policies and regulatory frameworks in ensuring data privacy in the cloud environment.11.“Advances in Robotics: From Ind ustrial Automation to Human-Robot Collaboration” - This article explores the recent advancements in robotics, from industrial automation to human-robot collaboration. It discusses the integration of artificial intelligence and machine learning algorithms in robotics, enabling robots to perform complex tasks and interact with humans more effectively. The article also discusses the potential impact of robots in various industries, including healthcare, manufacturing, and transportation.。
二次量子化英文文献
二次量子化英文文献An Introduction to Second Quantization in Quantum Mechanics.Abstract: This article delves into the concept of second quantization, a fundamental tool in quantum field theory and many-body physics. We discuss its historical development, mathematical formalism, and applications in modern physics.1. Introduction.Quantum mechanics, since its inception in the early20th century, has revolutionized our understanding of matter and energy at the atomic and subatomic scales. One of the key concepts in quantum theory is quantization, the process of assigning discrete values to physical observables such as energy and momentum. While first quantization focuses on the quantization of individual particles, second quantization extends this principle tosystems of particles, allowing for a more comprehensive description of quantum phenomena.2. Historical Development.The concept of second quantization emerged in the late 1920s and early 1930s, primarily through the works of Paul Dirac, Werner Heisenberg, and others. It was a natural extension of the first quantization formalism, which had been successful in explaining the behavior of individual atoms and molecules. Second quantization provided a unified framework for describing both bosons and fermions, two distinct types of particles that exhibit different quantum statistical behaviors.3. Mathematical Formalism.In second quantization, particles are treated as excitations of an underlying quantum field. This approach introduces a new set of mathematical objects called field operators, which act on a Fock space – a generalization of the Hilbert space used in first quantization. Fock spaceaccounts for the possibility of having multiple particles in the same quantum state.The field operators, such as the creation and annihilation operators, allow us to represent particle creation and destruction processes quantum mechanically. These operators satisfy certain commutation or anticommutation relations depending on whether the particles are bosons or fermions.4. Applications of Second Quantization.Second quantization is particularly useful in studying systems with many particles, such as solids, gases, and quantum fields. It provides a convenient way to describe interactions between particles and the emergence of collective phenomena like superconductivity and superfluidity.In quantum field theory, second quantization serves as the starting point for perturbative expansions, allowing physicists to calculate the probabilities of particleinteractions and scattering processes. The theory has also found applications in particle physics, cosmology, and condensed matter physics.5. Conclusion.Second quantization represents a significant milestone in the development of quantum theory. It not only extends the principles of quantization to systems of particles but also provides a unified mathematical framework for describing a wide range of quantum phenomena. The impact of second quantization on modern physics is profound, and its applications continue to expand as we delve deeper into the quantum realm.This article has provided an overview of second quantization, its historical development, mathematical formalism, and applications in modern physics. The readeris encouraged to explore further the rich and fascinating world of quantum mechanics and quantum field theory.。
产业集群中本地知识溢出_LKS_问题的西方文献综述
2008年第1期 科技管理研究Science and Technol ogyM anage ment Research 2008No 11收稿日期:2007-04-26,修回日期:2007-07-17基金项目:国家自然科学基金资助项目(70673010);南京信息工程大学校科研基金资助项目文章编号:1000-7695(2008)01-0242-03产业集群中本地知识溢出(LKS )问题的西方文献综述吴先华1,2,蔡正平1,郭 际1(11南京信息工程大学,江苏南京 210044;21东南大学集团经济与产业组织研究中心,江苏南京210096)摘要:产业集群中的知识溢出问题是目前产业集群研究中的前沿问题。
相关的西方文献主要研究了:集群中是否存在本地化的知识溢出(LKS )现象,本地知识溢出(LKS )对集群创新是否具有积极作用。
对于后者,文献更多侧重于对发达国家的集群进行研究。
许多学者认为,发展中国家集群的创新驱动力是国际技术转移,而非本地知识溢出(LKS )。
最后,本文还对本地知识溢出(LKS )的计量方法作了概述。
关键词:产业集群;本地知识溢出(LKS );创新;综述中图分类号:F06219∶F06213 文献标识码:A 较早在文献中谈到集群中的知识问题的应属M arshell 。
早在1890年,Marshell (1890)就指出产业集群的正外部性有三个方面:一是信息和知识的溢出;二是当地的专业化的资源供给;三是训练有素的劳动力。
这实际上暗含了集群内部有知识溢出的效应。
1990年代以来,随着知识经济的兴起,人们越来越强调知识对于集群的重要性。
许多学者认为,产业集群的竞争力的提高更多依赖于“本地化知识”和“集体学习”,而不是外部的规模经济和自然优势[1]。
人们普遍认为,在今天知识经济的背景下,集群竞争力的关键动力是本地化的知识创造、分享、创新和学习过程。
因此,集群中的本地知识溢出现象日益受到人们的重视。
《企业并购的动因和绩效研究国内外文献综述及理论基础6100字》
企业并购的动因和绩效研究国内外文献综述及理论基础目录企业并购的动因和绩效研究国内外文献综述 (1)1.2国内外文献综述 (1)1.2.1国外文献综述 (1)1.2.2国内文献综述 (2)第二章企业并购动因理论及企业并购相关概念 (4)2.1 并购的含义及分类 (4)2.1.1 并购的含义 (4)2.1.2并购的分类 (4)2.2 企业并购的动因理论 (5)2.2.1 协同效应理论 (5)2.2.2 多元化理论 (5)2.2.3委托代理理论 (6)2.2.4市场势力理论 (6)2.2.5价值低估理论 (6)2.2.6 估值套利理论 (6)2.3 企业并购绩效评价方法 (7)2.3.1 事件研究法 (7)2.3.2 财务指标法 (7)2.3.3 非财务指标分析法 (7)参考文献 (7)1.2国内外文献综述1.2.1国外文献综述(1)企业并购动因的国外文献综述在国外,并购活动很早之前就开始进行了。
但是经过研究,学者们发现企业并购动因的影响因素多种多样,难以归纳成一个确定概念。
就算是一家企业,在不同时间进行并购的目的也是有差异的。
Halil Kiymazh和TarunK.Mukherjee(2000)[1]通过对并购公司进行问卷调查,结果显示大部分公司为获得正的协同效应,增加股东利益而选择并购。
Kode,Ford等(2003)[2]认为企业发起并购也可能是想降低风险。
由于并购后被并购方的投资机会及融资由外转内,企业的融资成本风险会减小。
而Capron(1999)[3]通过研究得到了另一种结论,他们认为企业并购的动因在于取长补短,进而提高企业价值,也使企业在市场中的份额及地位提高。
Heaton(2002)[4]使用了一个简单模型,分析指出:当公司的决策者过于自信,会认为资本市场对本公司的股价低估了,或者高估项目的收益。
在情况一下,当必须用发行股票来进行融资,决策者会放弃净现值为正的投资项目。
在情况二下,会导致决策者其投资于净现值为负的项目。
最新 金融专业参考文献-精品
金融专业参考文献注明了被引理论、观点、方法、数据的来源,反映了论文的真实科学依据。
以下是lw54小编为您整理的金融专业参考文献,希望能提供帮助。
篇一:参考文献[1] 唐海燕. 进出口贸易与经济增长:作用机制与风险度量[J]. 华东师范大学学报(社会科学版). 2008年06期[2] 周帅,于淼,杨宜勇. 我国价格传导机制的实证分析[J]. 中国物价. 2008年09期[3] 沈学桢,黄帅. 美国经济下行变动对我国港口(对美)净出口的影响[J]. 港口科技. 2008年07期[4] 陈丹丹,任保平. 需求冲击与通货膨胀——基于中国的经验研究[J]. 当代财经. 2008年06期[5] 林剑平. 中国历次通货膨胀的原因与启示——基于货币因素和体制因素的双向视角[J]. 世界经济情况. 2008年06期[6] 温浩. 论贸易对中国通货膨胀的影响[J]. 金融发展研究. 2008年05期[7] 周望军,葛建营,王小宁,侯守礼. 价格传导问题综述及量化分析[J]. 北京交通大学学报(社会科学版). 2008年02期[8] 薛迎春. 中国货币市场失衡与国际储备波动联系——基于1994年~2004年的实证分析[J]. 上海经济研究. 2007年10期[9] 程国平,方苏立. 关于我国边际消费倾向的探讨[J]. 商业时代. 2007年26期[10] 魏杰. 探求流动性过剩的化解之道[J]. 中国金融. 2007年17期[11] 熊仁宇. 成本推动型通胀考验央行调控智慧[N]. 21世纪经济报道. 2008 (013)篇二:参考文献:[1]袁申国,陈平,刘兰凤,. 汇率制度、金融加速器和经济波动[J]. 经济研究,2011,(1).[2]黄志刚,. 货币政策与贸易不平衡的调整[J]. 经济研究,2011,(3).[3]George J. Gilboy,钟宁桦,. 度量:购买力平价的适当应用[J]. 经济研究,2010,(1).[4]万晓莉,霍德明,陈斌开,. 中国货币需求长期是否稳定?[J]. 经济研究,2010,(1).[5]裘骏峰,. 投机资本流入、升值预期和最优升值路径[J]. 经济研究,2010,(2).[6]张屹山,孔灵柱,. 基于权力范式的汇率决定研究[J]. 经济研究,2010,(3).[7]李成,王彬,马文涛,. 资产价格、汇率波动与最优利率规则[J]. 经济研究,2010,(3).[8]刘尧成,周继忠,徐晓萍,. 人民币汇率变动对我国贸易差额的动态影响[J]. 经济研究,2010,(5).[9]黄志刚,陈晓杰,. 人民币汇率波动弹性空间评估[J]. 经济研究,2010,(5).[10]路继业,杜两省,. 货币政策可信性与汇率制度选择:基于新的分析[J]. 经济研究,2010,(8).[11]卞世博,贾德奎,. 后金融危机背景下的中国经济运行风险管理——第四届中国立信风险管理论坛综述[J]. 经济研究,2010,(12).[12]赵志君,陈增敬,. 大国模型与人民币对美元汇率的评估[J]. 经济研究,2009,(3).[13]伍戈,. 中国的货币需求与资产替代:1994—2008[J]. 经济研究,2009,(3).[14]王晋斌,李南,. 中国汇率传递效应的实证分析[J]. 经济研究,2009,(4).[15]张瀛,. 汇率制度、经济开放度与中国需求政策的有效性[J]. 经济研究,2008,(3).[16]中国经济增长与宏观稳定课题组,张平,刘霞辉,张晓晶,汪红驹,. 外部冲击与中国的通货膨胀[J]. 经济研究,2008,(5).[17]唐翔,. “富人社区效应”还是巴拉萨-萨缪尔森效应?——一个基于外生收入的实际汇率理论[J]. 经济研究,2008,(5).[18]龚刚,高坚,何学中,. 汇率制度与货币政策——发展中国家和小国经济的思考[J]. 经济研究,2008,(6).[19]管汉晖,. 浮动本位兑换、双重汇率与中国经济:1870—1900[J]. 经济研究,2008,(8).[20]施建淮,傅雄广,许伟,. 人民币汇率变动对我国价格水平的传递[J]. 经济研究,2008,(7).篇三:参考文献:[1] 方毅,桂鹏. 亚太地区股票市场的联动程度—基于次级贷冲击的研究[J]世界经济研究,2010(8).27-30[2] BarabásiA L, Albert R. Emergence of scaling in random networks[J].Science, 1999(286). 509-512[3] Kim H J.Kim I M.Scale-free network in stock market[J].J KorPhys Soc,2002,40(6):105-108.[4] Newman M E J.The structure and function of complexnetworks[J].SIAM Review,2003(3).167-256[5] Jukka-Pekka Onnela, Jari Saram?ki, Kimmo Kaski. A comparative study of social network models: Network evolution models and nodal attribute models[J]. Social Networks:2009(4)13-16[6] 汪小帆,李翔,陈关荣.复杂网络理论及其应用[M].北京:清华大学出版社,2006(1).9-14.[7] 任卓明,刘建国,邵凤,胡兆龙,郭强. 复杂网络中最小K-核节点的传播能力分析,[J].物报:2011(7).90-93[8] 韩定定,复杂网络的拓扑、动力学行为及其实证研究,华东师范大学无线电物理博士论文[C],2007[9] Simutis R, MasteikaS.Intelligent stock trading systems using fuzzy-neural networks andevolutionary programming methods[J].Self Formation Theory And Applications.2004(97)59-63[10] Xiao fan Liu, Chi k. Tse.AComplex Network Perspective of World Stock Markets:synchronization and volatility,[J].International Journal of Bifurcation and Chaos:2012(6).62-66[11] Ram Babu Roy, Uttam Kumar Sarkar. Capturing Early Warning Signal for Financial Crisis from the Dynamics of Stock MarketNetworks: Evidence from North American and Asian StockMarkets[J].Journal of Indian Institute of ManagementCalcutta:2009(8).57-59[12] 李耀华,姚洪兴.金融危机下股票市场网络的结构特性研究[J].信息工程学院学报,2010(1).23-26[13] Benjamin M. Tabak, Thiago R. Serra, Daniel O. Cajueiro. Topological properties of stockmarket networks:The case of Brazil[J]. Physica ,2010(389).3240-3249[14] Chi K.Tse,JingLiu,Francis C, M. Lau. A network perspective of stock market[J].Journal ofEmpirica Finance.2010,4(17).659-667[15] 闵志锋.上海证券市场的复杂网络特性分析 [J].东北大学学报 (自然科学版).2007 (7).1053-1056[16] 黄玮强,姚爽,中国股票关联网络拓扑性质与聚类结构分析[J],管理科学:2008(3).92-95[17] 高雅纯,魏宗文,汪秉宏.Dynamic Evolution of Financial Network and Its Relation to Economic Crises,[J].WorldScientific:2013(2).142-141[18] 陈守东,韩广哲,荆伟.主要股票市场指数与我国股票市场指数间的协整分析,[J].数量经济技术经济研究:2003(5).35-37[19] 文圭炫,洪正孝.太平洋地区国家的联动性,[J].商务管理研究:2003(2).111-113[20] RosylinMohd.Yusof&M.ShabriAbd.Majid,Who moves the Malaysian stock market-the U.S.or Japan[J],International Journal of Business,2006(8)367-406[21]Terence,Tai-Leung Chong,Ying-Chiu Wong,Isabel,Kit-Ming Yan,Internationallinkagesof the Japanese stock market,Japan and the World Economy,2007(20)773-786[22] 周珺. 我国大陆股票市场与周边主要股票市场的联动分析[J]企业经济,2007(1).77-79[23] Woo-Sung Jung ,SeungbyungChae, Jae-Suk Yang,Hie-Tae Moon. Characteristics of the Korean stock marketcorrelations,[J]. Elsevier Science:2008(2).90-93[24] Sunil Kumar, NiveditaDeo. Correlation and network analysisof global financial indices,[J]. American PhysicalSociety:2012(8).21-23篇四:参考文献[1] Michael Grahama,JarnoKiviahob,JussiNikkinenb, Mohammed Omranc. Global and regional co-movement of the MENA stockmarkets,[J]. Journal of Economics and Business:2013(1). 165-167[2] 高莹,靳莉莉.沪深300指数与世界主要股票指数的关联性分析[J].金融管理,2008(2). 3-8.[3] Hwahsin Cheng, John L. Glascock. Stock Market LinkagesBefore and After the AsianFinancial Crisis: Evidence from Three Greater ChinaEconomic Area Stock Markets and the US,[J]. Pacific Basin Financial Markets and Policies:2006(2).125-127[4] Ma.BelindaS.Mandigma.Stock market linkages and the global financial crisis,[J].Journal of University of SantoTomas:2009(8).278-280[5] Ugur Ergun. How does Turkish stock market respond to the externalshocks Pre- and post- crises analyses,[J]. African Journalof Business Management:2012(2).34-37[6] 赵勇. 金融危机背景下中美欧股票市场联动性研究[C]上海社会科学院,2012(5).76-79[7] 洪天国. 欧洲股票市场与中国股票市场之间的波动溢出效应研究[C]江西财经大学,2013(1).29-34[8] 金融市场稳定性的判别与度量[C]山西大学,2012(2).192-196[9] 陈守东,陈雷,刘艳武.中国沪深股票市场收益率及波动性相关分析,[J].:2003(7).230-235[10] 刘存绪.论中国股票市场的国际化,[J].资本市场:2000(4).30-32篇五:参考文献[1] 母宇.中国股票市场与全球主要股票市场联动性研究,[C].西南民族大学:2011.[2] 于会鹏.中国股票市场板块及其与国外主要市场间的联动性实证研究,[C].理工大学:2009[3] 陈志宁.中外股票市场的联动分析,[C].农业大学:2009.[4] 汪波.股票市场波动性网络及其应用[C]华南理工,2012[5] 徐晓萍. 金融危机下证券网络的复杂性特征研究[C]华东师范大学,2013[6] 陈俊华.中国股票市场网络模型动态研究[C]浙江工业大学,2012[7] 兰旺森,赵国浩. 应用复杂网络研究板块内股票的强相关性,[J].中山大学学报:2010(6).20-23[8] 李耀华,姚洪兴.股票市场网络的稳定性研究,[M].江苏省系统工程学会第十一届学会:2012.[9] 陈花.基于复杂网络的股票之间有向相关性研究,[C].北京邮电大学:2012.[10] 陈辉煌,高岩,基于复杂网络理论的证券市场网抗毁性分析[J],金融理论与实:2008(6)154-156[11] 万阳松,陈忠基. 加权股票网络模型[J].复杂系统与复杂性科学,2005,1(5) :21-27[12] 李平,汪秉宏.证券指数的网络动力学模型[J].系统工程,2006,24(3):73-77[13] TianQiu, Bo Zheng,Guang Chen. Financial networks withstatic anddynamic thresholds,[J]. New Journal ofPhysics:2010(12).136-138[14] Nicola Cetorelli, Stavros Peristiani. Prestigious stock exchanges: A network analysis of international financial centers,[J]. Journal of Banking & Finance:2013(37).21-24[15] Ram Babu Roy, Uttam Kumar Sarkar. Identifying influential stock indices from global stockmarkets: A social network analysis approach,[J].Procedia Computer Science:2011(5).10-13[16] Xiao fan Liu, Chi k. Tse.A Complex Network Perspective to Volatility in Stock Markets [J]. International Symposium on Nonlinear Theory and its Applications:2010(9).12-15[17] Simutis R, MasteikaS.Intelligent stock trading systemsusing fuzzy-neural networks andevolutionary programming methods[J]. Self Formation Theory And Applications.2004,(97).59-63[18] Dong-Ming Song, Michele Tumminello, Wei-Xing Zhou,Rosario N. Mantegna. Evolution of worldwide stock markets,correlation structure and correlation basedgraphs,[J].PACS:2011(3).90-92[19] Xiangyun Gao, Haizhong An, Weiqiong Zhong. Features of the Correlation Structure of Price Indices,[J]. PLOS ONE:2013(4).34-36[20] MarekGa??zka. Characteristics of the Polish Stock Market correlations,[J]. International Review of Financial Analysis:2011(1-5).[21] 杨治辉,贾寒梅.股票收益率相关性的网络结构分析,[M].中国控制学会:2011.[22] 周艳波,蔡世民,周佩玲.金融市场的无标度特征研究,[J].中国科学技术大学学报:2009(8).19-22[23] Barabasia L, Albert R, Jeong H. Mean-field theory for scale-freerandom networks[J].Physica A, 1999( 272).173-187[24] 李辉,赵海,徐久强,李博,李鹏,王家亮. 基于k-核的大规模软件核心框架结构抽取与度量,[J].东北大学学报:2010(11).345-347[25] 李辉,赵海.基于k-核的大规模软件宏观拓扑结构层次性研究,[J].电子学报:2010(6).134-136[26] 李备友,刘思峰. 网络化市场结构下证券市场传闻的扩散规律研究,[J].华东经济管理:2012(12).90-92篇六:参考文献[1]刘思华.生态经济学原理[M].北京:人民出版社.2006[2]叶耀丹.马克思主义生态自然观对中国生态文明建设的启示[D].成都:成都理工大学.2012[3]陆畅.我国生态文明建设中的政府职能与责任研究[D].长春:东北师范大学.2012[4]俞可平.科学发展观与生态文明[M].上海:华东师范大学出版社.2007:18[5]朴光诛等.环境法与环境执法[M].北京:中国环境科学出版社.2004:23[6]罗能生.非正式制度与中国经济改革和发展[M].北京:中国财政经济出版社.2002: 19[7]党国英.制度、环境与人类文明一关于环境文明的观察与思考[N].新京报.2005-2-13[8]张婷婷.生态文明建设的科技需求及政策研究[D].锦州:渤海大学.2012[9]秦书生.生态文明视野中的绿色技术[J].科技与经济.2010(3): 82-85[10]陈池波.论生态经济的持续协调发展[J].长江大学学报(社会科学版)2004(1):97-102[11]张首先.与生态文明[J].理论与现代化.2010(1): 23-26[12]黄光宇.陈勇.生态城市理论与规划设计方法[M].北京:科学出版社.2002[13]张首先.生态文明研究[D].成都:西南交通大学.2010[14]马仁忠.地理环境对种族、民族特征的影响[J].宿州学院学报.2002(4):[15]冒佩华.王宝珠.市场制度与生态逻辑[J].教学与研究.2014(8):37-43.[16]方世南.王建润.李安林.以生态文明的理念建设循环社会[J].马克思主义研究.2009(3):64-68[17]齐力.梅林海.环境管理正式制度与非正式制度研究[J].生态经济.2008(12):129-131.[18]张瑞.生态文明的制度维度探析[D].沈阳:东北大学.2009[19]吴瑾菁.祝黄河.“五位一体”视域下的生态文明建设[J].马克思主义与现实.2013(1):157-162.[20]郭军华.幸学俊.中国城市化与生态足迹的动态计量分析[J].华东交通大学学报.2009 (5) : 131-134.篇七:参考文献[1]雷切尔·卡逊.寂静的春天[M].长春:吉林人民出版社.2004[2]顾朝林.中国城市地理[M].北京:商务印书馆.1999[3]邹农检.中国农村城市化研究[M].南宁:广西出版社.1998[4]史作民.陈涛.城市化及其对城市生态环境影响研究进展[J].生态学杂志.1996 (1) : 35-41[5]刘耀彬.陈斐.周杰文.城市化进程中的生态环境响应度模型及其应用[J].干旱区地理.2008 (1) : 122-128[6]徐中民.张志强.程国栋.甘肃省1998年生态足迹计算与分析[J].地理学报.2000(5): 607-616[7]沈建法.城市化与人口管理[M].北京:科学出版社.1999[8]张志强.徐中民.程国栋.生态足迹的概念及计算模型[J].生态经济.2000(10) : 8-10[9]张恒义.刘卫东.林育欣.等.基于改进生态足迹模型的浙江省域生态足迹分析[J].生态学报.2009(5):2738-2748[10]贺成龙.吴建华.刘文莉.改进投入产出法在生态足迹中的应用[J].资源科学.2008 (12) : 1933-1939,2008 (2) : 261-266篇八:参考文献[1]陈凌.应丽芬.代际传承:家族企业继任管理和创新〔J〕.管理世界.2003 ( 6): 89-9[2]伯纳德‘萨拉尼着.陈新平、王瑞泽、陈宝明、周宗华译.税收经济学〔M〕.北京:中国人民大学出版社.2009:143-144.[3]彼德·德鲁克.大变革时代的管理〔M〕.上海:上海译文出版社.1999版.[4]陈凌.信息特征、交易成本和家族式组织〔J〕.经济研究.1998(7):27-33.[5]Alan.S.BIinder. Toward an Economic Theory of Income Distribution〔 C〕.Cambridge, MA: MITPress, 1974,123:137-139.[6]Adam.Smith. The Wealth of Nations ( 1776 )〔M〕.Chicago: University of Chicago Press,1976(reprint): 391.[7]Barro Bobert.Are Government Bonds Net Wealth? 〔 J〕Journal of PoliticalEconomy,1974,82(6):1095-1117.[8]Carsrud,A.L.Meanderings of a resurrected psychologist or lessons learned in creating a program〔J〕.Entrepreneurship Theory & Practice,1994,19(1):39-48.[9]Douglas. Holtz-Eakin, David Joulfaian & Harvey.S.Rosen. The Carnegie Conjecture:SomeEmpirical Evidence〔J〕.Quarterly Journal of Economics, 1993,(108):413-435.[10]ler. the Economics of the Estate Tax〔R〕Joint Economic Committee Study,December1998.[11]Galio.M.A&Sveeii.J. Internationalizing the familybusiness:facilitating and restraining factorsCJlFamily Business Review,1991,4(2):181-190.[12]James.B.Davies. The Relative Importance of Inheritance and Other Factors on EconomicInequality〔J〕. Quarterly Journal of Economics31982,Vol.97,No.3:495.[13]Lansberg.I.S.Managing human resources in family finns:the problem of institutional overlap〔J〕.Organizational Dynamics,1983,summer:39-46.。
本体信息检索情境下相关性理论研究_郝斌
正是该项研究的复杂性和前瞻性 , 决定了其研 究具有较大价值 , 因此 , 本文试图对这一问题作一个 探讨性研究 。作为研究基础 , 本文首先论证了相关 性理论和本体理论 ;针对本体信息检索在不同表现 形式下对相关性影响进行具体分析和对比研究 ;最 后为结语与展望 。
67
2007 年第 6 期 图书 · 情报 · 知识
通过以上分析 , 我们可以看出 , 本体的应用能够 在信息源端和用户端提高相关性 , 但是仍然还有很 大不足 。 在信息源端 , 该类型系统中本体是最简单 意义上的本体 , 本体间概念间只有最基本的联系且 不具备推理能力 , 因此揭示语义知识联系的能力极 其有限 。 同时 , 本体中概念匹配的对象是文档关键 词和摘要 , 是对二次信息源进行加工 , 而不是针对原 始文献进行的直接分析 , 因此 , 关键词和摘要的质量 对检索相关性的提高程度有较大影响 。 另一方面 , 有时候文档隐含的真实内容并没有在关键词和摘要
IEEE参考文献格式
•Creating a reference list or bibliographyA numbered list of references must be provided at the end of thepaper. The list should be arranged in the order of citation in the text of the assignment or essay, not in alphabetical order. List only one reference per reference number. Footnotes or otherinformation that are not part of the referencing format should not be included in the reference list.The following examples demonstrate the format for a variety of types of references. Included are some examples of citing electronic documents. Such items come in many forms, so only some examples have been listed here.Print DocumentsBooksNote: Every (important) word in the title of a book or conference must be capitalised. Only the first word of a subtitle should be capitalised. Capitalise the "v" in Volume for a book title.Punctuation goes inside the quotation marks.Standard formatSingle author[1] W.-K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth,1993, pp. 123-135.[2] S. M. Hemmington, Soft Science. Saskatoon: University ofSaskatchewan Press, 1997.Edited work[3] D. Sarunyagate, Ed., Lasers. New York: McGraw-Hill, 1996.Later edition[4] K. Schwalbe, Information Technology Project Management, 3rd ed.Boston: Course Technology, 2004.[5] M. N. DeMers, Fundamentals of Geographic Information Systems,3rd ed. New York : John Wiley, 2005.More than one author[6] T. Jordan and P. A. Taylor, Hacktivism and Cyberwars: Rebelswith a cause? London: Routledge, 2004.[7] U. J. Gelinas, Jr., S. G. Sutton, and J. Fedorowicz, Businessprocesses and information technology. Cincinnati:South-Western/Thomson Learning, 2004.Three or more authorsNote: The names of all authors should be given in the references unless the number of authors is greater than six. If there are more than six authors, you may use et al. after the name of the first author.[8] R. Hayes, G. Pisano, D. Upton, and S. Wheelwright, Operations,Strategy, and Technology: Pursuing the competitive edge.Hoboken, NJ : Wiley, 2005.Series[9] M. Bell, et al., Universities Online: A survey of onlineeducation and services in Australia, Occasional Paper Series 02-A. Canberra: Department of Education, Science andTraining, 2002.Corporate author (ie: a company or organisation)[10] World Bank, Information and Communication Technologies: AWorld Bank group strategy. Washington, DC : World Bank, 2002.Conference (complete conference proceedings)[11] T. J. van Weert and R. K. Munro, Eds., Informatics and theDigital Society: Social, ethical and cognitive issues: IFIP TC3/WG3.1&3.2 Open Conference on Social, Ethical andCognitive Issues of Informatics and ICT, July 22-26, 2002, Dortmund, Germany. Boston: Kluwer Academic, 2003.Government publication[12] Australia. Attorney-Generals Department. Digital AgendaReview, 4 Vols. Canberra: Attorney- General's Department,2003.Manual[13] Bell Telephone Laboratories Technical Staff, TransmissionSystem for Communications, Bell Telephone Laboratories,1995.Catalogue[14] Catalog No. MWM-1, Microwave Components, M. W. Microwave Corp.,Brooklyn, NY.Application notes[15] Hewlett-Packard, Appl. Note 935, pp. 25-29.Note:Titles of unpublished works are not italicised or capitalised. Capitalise only the first word of a paper or thesis.Technical report[16] K. E. Elliott and C.M. Greene, "A local adaptive protocol,"Argonne National Laboratory, Argonne, France, Tech. Rep.916-1010-BB, 1997.Patent / Standard[17] K. Kimura and A. Lipeles, "Fuzzy controller component, " U.S. Patent 14,860,040, December 14, 1996.Papers presented at conferences (unpublished)[18] H. A. Nimr, "Defuzzification of the outputs of fuzzycontrollers," presented at 5th International Conference onFuzzy Systems, Cairo, Egypt, 1996.Thesis or dissertation[19] H. Zhang, "Delay-insensitive networks," M.S. thesis,University of Waterloo, Waterloo, ON, Canada, 1997.[20] M. W. Dixon, "Application of neural networks to solve therouting problem in communication networks," Ph.D.dissertation, Murdoch University, Murdoch, WA, Australia, 1999.Parts of a BookNote: These examples are for chapters or parts of edited works in which the chapters or parts have individual title and author/s, but are included in collections or textbooks edited by others. If the editors of a work are also the authors of all of the included chapters then it should be cited as a whole book using the examples given above (Books).Capitalise only the first word of a paper or book chapter.Single chapter from an edited work[1] A. Rezi and M. Allam, "Techniques in array processing by meansof transformations, " in Control and Dynamic Systems, Vol.69, Multidemsional Systems, C. T. Leondes, Ed. San Diego: Academic Press, 1995, pp. 133-180.[2] G. O. Young, "Synthetic structure of industrial plastics," inPlastics, 2nd ed., vol. 3, J. Peters, Ed. New York:McGraw-Hill, 1964, pp. 15-64.Conference or seminar paper (one paper from a published conference proceedings)[3] N. Osifchin and G. Vau, "Power considerations for themodernization of telecommunications in Central and Eastern European and former Soviet Union (CEE/FSU) countries," in Second International Telecommunications Energy SpecialConference, 1997, pp. 9-16.[4] S. Al Kuran, "The prospects for GaAs MESFET technology in dc-acvoltage conversion," in Proceedings of the Fourth AnnualPortable Design Conference, 1997, pp. 137-142.Article in an encyclopaedia, signed[5] O. B. R. Strimpel, "Computer graphics," in McGraw-HillEncyclopedia of Science and Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 1997, pp. 279-283.Study Guides and Unit ReadersNote: You should not cite from Unit Readers, Study Guides, or lecture notes, but where possible you should go to the original source of the information. If you do need to cite articles from the Unit Reader, treat the Reader articles as if they were book or journal articles. In the reference list or bibliography use the bibliographical details as quoted in the Reader and refer to the page numbers from the Reader, not the original page numbers (unless you have independently consulted the original).[6] L. Vertelney, M. Arent, and H. Lieberman, "Two disciplines insearch of an interface: Reflections on a design problem," in The Art of Human-Computer Interface Design, B. Laurel, Ed.Reading, MA: Addison-Wesley, 1990. Reprinted inHuman-Computer Interaction (ICT 235) Readings and Lecture Notes, Vol. 1. Murdoch: Murdoch University, 2005, pp. 32-37. Journal ArticlesNote: Capitalise only the first word of an article title, except for proper nouns or acronyms. Every (important) word in the title of a journal must be capitalised. Do not capitalise the "v" in volume for a journal article.You must either spell out the entire name of each journal that you reference or use accepted abbreviations. You must consistently do one or the other. Staff at the Reference Desk can suggest sources of accepted journal abbreviations.You may spell out words such as volume or December, but you must either spell out all such occurrences or abbreviate all. You do not need to abbreviate March, April, May, June or July.To indicate a page range use pp. 111-222. If you refer to only one page, use only p. 111.Standard formatJournal articles[1] E. P. Wigner, "Theory of traveling wave optical laser," Phys.Rev., vol. 134, pp. A635-A646, Dec. 1965.[2] J. U. Duncombe, "Infrared navigation - Part I: An assessmentof feasability," IEEE Trans. Electron. Devices, vol. ED-11, pp. 34-39, Jan. 1959.[3] G. Liu, K. Y. Lee, and H. F. Jordan, "TDM and TWDM de Bruijnnetworks and shufflenets for optical communications," IEEE Trans. Comp., vol. 46, pp. 695-701, June 1997.OR[4] J. R. Beveridge and E. M. Riseman, "How easy is matching 2D linemodels using local search?" IEEE Transactions on PatternAnalysis and Machine Intelligence, vol. 19, pp. 564-579, June 1997.[5] I. S. Qamber, "Flow graph development method," MicroelectronicsReliability, vol. 33, no. 9, pp. 1387-1395, Dec. 1993.[6] E. H. Miller, "A note on reflector arrays," IEEE Transactionson Antennas and Propagation, to be published.Electronic documentsNote:When you cite an electronic source try to describe it in the same way you would describe a similar printed publication. If possible, give sufficient information for your readers to retrieve the source themselves.If only the first page number is given, a plus sign indicates following pages, eg. 26+. If page numbers are not given, use paragraph or other section numbers if you need to be specific. An electronic source may not always contain clear author or publisher details.The access information will usually be just the URL of the source. As well as a publication/revision date (if there is one), the date of access is included since an electronic source may change between the time you cite it and the time it is accessed by a reader.E-BooksStandard format[1] L. Bass, P. Clements, and R. Kazman. Software Architecture inPractice, 2nd ed. Reading, MA: Addison Wesley, 2003. [E-book] Available: Safari e-book.[2] T. Eckes, The Developmental Social Psychology of Gender. MahwahNJ: Lawrence Erlbaum, 2000. [E-book] Available: netLibrary e-book.Article in online encyclopaedia[3] D. Ince, "Acoustic coupler," in A Dictionary of the Internet.Oxford: Oxford University Press, 2001. [Online]. Available: Oxford Reference Online, .[Accessed: May 24, 2005].[4] W. D. Nance, "Management information system," in The BlackwellEncyclopedic Dictionary of Management Information Systems,G.B. Davis, Ed. Malden MA: Blackwell, 1999, pp. 138-144.[E-book]. Available: NetLibrary e-book.E-JournalsStandard formatJournal article abstract accessed from online database[1] M. T. Kimour and D. Meslati, "Deriving objects from use casesin real-time embedded systems," Information and SoftwareTechnology, vol. 47, no. 8, p. 533, June 2005. [Abstract].Available: ProQuest, /proquest/.[Accessed May 12, 2005].Note: Abstract citations are only included in a reference list if the abstract is substantial or if the full-text of the article could not be accessed.Journal article from online full-text databaseNote: When including the internet address of articles retrieved from searches in full-text databases, please use the Recommended URLs for Full-text Databases, which are the URLs for the main entrance to the service and are easier to reproduce.[2] H. K. Edwards and V. Sridhar, "Analysis of software requirementsengineering exercises in a global virtual team setup,"Journal of Global Information Management, vol. 13, no. 2, p.21+, April-June 2005. [Online]. Available: Academic OneFile, . [Accessed May 31, 2005].[3] A. Holub, "Is software engineering an oxymoron?" SoftwareDevelopment Times, p. 28+, March 2005. [Online]. Available: ProQuest, . [Accessed May 23, 2005].Journal article in a scholarly journal (published free of charge on the internet)[4] A. Altun, "Understanding hypertext in the context of readingon the web: Language learners' experience," Current Issues in Education, vol. 6, no. 12, July 2003. [Online]. Available: /volume6/number12/. [Accessed Dec. 2, 2004].Journal article in electronic journal subscription[5] P. H. C. Eilers and J. J. Goeman, "Enhancing scatterplots withsmoothed densities," Bioinformatics, vol. 20, no. 5, pp.623-628, March 2004. [Online]. Available:. [Accessed Sept. 18, 2004].Newspaper article from online database[6] J. Riley, "Call for new look at skilled migrants," TheAustralian, p. 35, May 31, 2005. Available: Factiva,. [Accessed May 31, 2005].Newspaper article from the Internet[7] C. Wilson-Clark, "Computers ranked as key literacy," The WestAustralian, para. 3, March 29, 2004. [Online]. Available:.au. [Accessed Sept. 18, 2004].Internet DocumentsStandard formatProfessional Internet site[1] European Telecommunications Standards Institute, 揇igitalVideo Broadcasting (DVB): Implementation guidelines for DVBterrestrial services; transmission aspects,?EuropeanTelecommunications Standards Institute, ETSI TR-101-190,1997. [Online]. Available: . [Accessed:Aug. 17, 1998].Personal Internet site[2] G. Sussman, "Home page - Dr. Gerald Sussman," July 2002.[Online]. Available:/faculty/Sussman/sussmanpage.htm[Accessed: Sept. 12, 2004].General Internet site[3] J. Geralds, "Sega Ends Production of Dreamcast," ,para. 2, Jan. 31, 2001. [Online]. Available:/news/1116995. [Accessed: Sept. 12,2004].Internet document, no author given[4] 揂憀ayman抯?explanation of Ultra Narrow Band technology,?Oct.3, 2003. [Online]. Available:/Layman.pdf. [Accessed: Dec. 3, 2003].Non-Book FormatsPodcasts[1] W. Brown and K. Brodie, Presenters, and P. George, Producer, 揊rom Lake Baikal to the Halfway Mark, Yekaterinburg? Peking to Paris: Episode 3, Jun. 4, 2007. [Podcast television programme]. Sydney: ABC Television. Available:.au/tv/pekingtoparis/podcast/pekingtoparis.xm l. [Accessed Feb. 4, 2008].[2] S. Gary, Presenter, 揃lack Hole Death Ray? StarStuff, Dec. 23, 2007. [Podcast radio programme]. Sydney: ABC News Radio. Available: .au/newsradio/podcast/STARSTUFF.xml. [Accessed Feb. 4, 2008].Other FormatsMicroform[3] W. D. Scott & Co, Information Technology in Australia:Capacities and opportunities: A report to the Department ofScience and Technology. [Microform]. W. D. Scott & CompanyPty. Ltd. in association with Arthur D. Little Inc. Canberra:Department of Science and Technology, 1984.Computer game[4] The Hobbit: The prelude to the Lord of the Rings. [CD-ROM].United Kingdom: Vivendi Universal Games, 2003.Software[5] Thomson ISI, EndNote 7. [CD-ROM]. Berkeley, Ca.: ISIResearchSoft, 2003.Video recording[6] C. Rogers, Writer and Director, Grrls in IT. [Videorecording].Bendigo, Vic. : Video Education Australasia, 1999.A reference list: what should it look like?The reference list should appear at the end of your paper. Begin the list on a new page. The title References should be either left justified or centered on the page. The entries should appear as one numerical sequence in the order that the material is cited in the text of your assignment.Note: The hanging indent for each reference makes the numerical sequence more obvious.[1] A. Rezi and M. Allam, "Techniques in array processing by meansof transformations, " in Control and Dynamic Systems, Vol.69, Multidemsional Systems, C. T. Leondes, Ed. San Diego: Academic Press, 1995, pp. 133-180.[2] G. O. Young, "Synthetic structure of industrial plastics," inPlastics, 2nd ed., vol. 3, J. Peters, Ed. New York:McGraw-Hill, 1964, pp. 15-64.[3] S. M. Hemmington, Soft Science. Saskatoon: University ofSaskatchewan Press, 1997.[4] N. Osifchin and G. Vau, "Power considerations for themodernization of telecommunications in Central and Eastern European and former Soviet Union (CEE/FSU) countries," in Second International Telecommunications Energy SpecialConference, 1997, pp. 9-16.[5] D. Sarunyagate, Ed., Lasers. New York: McGraw-Hill, 1996.[8] O. B. R. Strimpel, "Computer graphics," in McGraw-HillEncyclopedia of Science and Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 1997, pp. 279-283.[9] K. Schwalbe, Information Technology Project Management, 3rd ed.Boston: Course Technology, 2004.[10] M. N. DeMers, Fundamentals of Geographic Information Systems,3rd ed. New York: John Wiley, 2005.[11] L. Vertelney, M. Arent, and H. Lieberman, "Two disciplines insearch of an interface: Reflections on a design problem," in The Art of Human-Computer Interface Design, B. Laurel, Ed.Reading, MA: Addison-Wesley, 1990. Reprinted inHuman-Computer Interaction (ICT 235) Readings and Lecture Notes, Vol. 1. Murdoch: Murdoch University, 2005, pp. 32-37.[12] E. P. Wigner, "Theory of traveling wave optical laser,"Physical Review, vol.134, pp. A635-A646, Dec. 1965.[13] J. U. Duncombe, "Infrared navigation - Part I: An assessmentof feasibility," IEEE Transactions on Electron Devices, vol.ED-11, pp. 34-39, Jan. 1959.[14] M. Bell, et al., Universities Online: A survey of onlineeducation and services in Australia, Occasional Paper Series 02-A. Canberra: Department of Education, Science andTraining, 2002.[15] T. J. van Weert and R. K. Munro, Eds., Informatics and theDigital Society: Social, ethical and cognitive issues: IFIP TC3/WG3.1&3.2 Open Conference on Social, Ethical andCognitive Issues of Informatics and ICT, July 22-26, 2002, Dortmund, Germany. Boston: Kluwer Academic, 2003.[16] I. S. Qamber, "Flow graph development method,"Microelectronics Reliability, vol. 33, no. 9, pp. 1387-1395, Dec. 1993.[17] Australia. Attorney-Generals Department. Digital AgendaReview, 4 Vols. Canberra: Attorney- General's Department, 2003.[18] C. Rogers, Writer and Director, Grrls in IT. [Videorecording].Bendigo, Vic.: Video Education Australasia, 1999.[19] L. Bass, P. Clements, and R. Kazman. Software Architecture inPractice, 2nd ed. Reading, MA: Addison Wesley, 2003. [E-book] Available: Safari e-book.[20] D. Ince, "Acoustic coupler," in A Dictionary of the Internet.Oxford: Oxford University Press, 2001. [Online]. Available: Oxford Reference Online, .[Accessed: May 24, 2005].[21] H. K. Edwards and V. Sridhar, "Analysis of softwarerequirements engineering exercises in a global virtual team setup," Journal of Global Information Management, vol. 13, no. 2, p. 21+, April-June 2005. [Online]. Available: AcademicOneFile, . [Accessed May 31,2005].[22] A. Holub, "Is software engineering an oxymoron?" SoftwareDevelopment Times, p. 28+, March 2005. [Online]. Available: ProQuest, . [Accessed May 23, 2005].[23] H. Zhang, "Delay-insensitive networks," M.S. thesis,University of Waterloo, Waterloo, ON, Canada, 1997.[24] P. H. C. Eilers and J. J. Goeman, "Enhancing scatterplots withsmoothed densities," Bioinformatics, vol. 20, no. 5, pp.623-628, March 2004. [Online]. Available:. [Accessed Sept. 18, 2004].[25] J. Riley, "Call for new look at skilled migrants," TheAustralian, p. 35, May 31, 2005. Available: Factiva,. [Accessed May 31, 2005].[26] European Telecommunications Standards Institute, 揇igitalVideo Broadcasting (DVB): Implementation guidelines for DVB terrestrial services; transmission aspects,?EuropeanTelecommunications Standards Institute, ETSI TR-101-190,1997. [Online]. Available: . [Accessed: Aug. 17, 1998].[27] J. Geralds, "Sega Ends Production of Dreamcast," ,para. 2, Jan. 31, 2001. [Online]. Available:/news/1116995. [Accessed Sept. 12,2004].[28] W. D. Scott & Co, Information Technology in Australia:Capacities and opportunities: A report to the Department of Science and Technology. [Microform]. W. D. Scott & Company Pty. Ltd. in association with Arthur D. Little Inc. Canberra: Department of Science and Technology, 1984.AbbreviationsStandard abbreviations may be used in your citations. A list of appropriate abbreviations can be found below:。
国家标准《文后参考文献著录规则》(GB7714-87)
国家标准《文后参考文献著录规则》(GB7714-87)、《科学技术期刊编排格式》(GB/T3179-92)以及《中国学术期刊(光盘版)检索与评价数据规范》,并采用顺序编码标注制。
1.引用的文献在文内标注格式对论文所引用的文献,要按它们在文中出现的先后,在文献的著者或成果叙述文字的右上角用方括号标注序号,或者作为语句的组成部分。
例如:·1981年日本仅给出了扁平车轮冲击钢轨的垂直冲击速度公式[1],……·薛杜普等[2]指出棉酚从体内排泄缓慢。
·文献[2]指出,棉酚从体内排泄缓慢。
·定理的证明见文献[3]。
引用多篇文献或同一著者多篇文献时,只需将各篇文献的序号在方括号内全部列出,各序号间用“,”分开;如遇连续序号,可用“~”连接,略去中间序号。
例如:·早期的研究结果[2,4,6-9]表明,……2.文后参考文献著录格式及示例(1)书或专著[序号]著者.书名[M].版本(第1版不标注).出版地:出版者,出版年.引文所在的起始或起止页码.[1]翟婉明.车辆-轨道耦合动力学[M].北京:中国铁道出版社,1997.74—80.[2]纳霍德金M Д牵引电机设计[M]李忠武,樊俊杰,李铁元译.北京:中国铁道出版社,1983.21-25.[3]Eisson H N.Immunology:an introduction to molecular and cellular principles of the immune respones[M].5th ed. New York:Harper and Row,1974.3-6.(2)期刊(连续出版物)[序号]著者.题(篇)名[J].刊名,出版年,卷号(期号):引文所在的起始或起止页码.[1]史峰,李致中.铁路车流路径的优选算法[J].铁道学报,1993,15(3):70.[2]You C H, Lee K Y,Chey R F, et al. Electrogastrographic study of patients with unexplained nausea, bloating and vomiting[J]. Gastroenterology,1980,79:311-314.(3)会议录、论文集、论文汇编中的析出文献[序号]析出文献著者.题(篇)名[A].见(英文用In):原文献著者.论文集名[C].出版地:出版者,出版年.引文所在起始或起止页码.[1]张玉心.重载货车高摩擦系数合成闸瓦的研制和应用[A].见:中国铁道学会编译.国际重载运输协会制动专题讨论会论文集[C].北京:中国铁道学会,1988.242.[2]Hunninghaks G W,Gadek J B,Szapiel S V ,et al.The human alveolar macrophage[A].In:Harris C C ed.Cultured human cells and issues in biomedical research[C].New York:Academic Press,1980.54-56.(4)学位论文[序号]著者.题(篇)名[D].保存地点:保存单位,年份.引文所在起始或起止页码.[1]党建武.神经网络方法求解组合优化问题的研究[D].成都:西南交通大学,1996.20-25.(5)专利文献[序号]专利所有者.题名[P].专利国别:专利号,出版日期.[1]曾德超.常速高速通用优化犁[P].中国专利:85203720.1,1986-11-13.(6)技术标准[序号]标准编号(标准顺序号-发布年),标准名称[S].[1]GBJ111-87,铁路工程抗震设计规范[S].(7)报纸[序号]主要责任者.文献题名[N].报纸名,年-月-日(版次).[1]李四光.中国地震的特点[N].人民日报,1988-08-02(4).(8)科学技术报告[序号]著者.报告题名[R].出版地:出版者,出版年.页码.[1]朱家荷,韩调.铁路区间通过能力计算方法的研究[R].北京:铁道部科学研究院运输及经济研究所,1989.34.(9)电子文献[序号]主要责任者.电子文献题名[电子文献及载体类型标识].电子文献的出处或可获得地址,发表或更新日期/引用日期(任选).[1]王明亮.关于中国学术期刊标准化数据库系统工程的进展[EB/OL]./pub/wml.txt/980810-2.html,1998-08-16/1998-10-04.[2]万锦坤.中国大学学报论文文载(1983-1993).英文版[DB/CD].北京:中国大百科全书出版社,1996.(10)其他未定义类型的文献[序号]主要责任者.文献题名[Z].出版地:出版者,出版年.1参考文献著录项目a.主要责任者(专著作者、论文集主编、学位申报人、专利申请人、报告撰写人、期刊文章作者、析出文章作者)。
知识图谱论文素材
知识图谱论文素材虽然您已经给出了题目“知识图谱论文素材”,但是根据您的要求,我需要自行判断应该使用什么格式来写,所以我将按照论文的格式来撰写这篇文章。
知识图谱论文素材摘要:知识图谱作为一种重要的人工智能技术应用,正逐渐受到越来越多研究者的关注。
本文通过收集与知识图谱相关的文献资料,并进行整理与分析,旨在提供有关知识图谱的论文素材,以促进学术界对知识图谱的研究与应用。
1. 简介在当今的信息爆炸时代,人们可以轻松地获取到大量的数据和信息。
然而,这些数据和信息往往是孤立的,难以互相联系,给人们的实际应用带来了一定的困扰。
知识图谱的出现为解决这一问题提供了新的思路。
知识图谱通过将数据进行结构化并通过关系连接,可以形成一个大规模的语义网络,为人们的推理、关联和发现提供了有力的支持。
2. 知识图谱的起源与发展2.1 知识图谱的概念来源知识图谱的概念最早由Tim Berners-Lee在2001年提出,他将其定义为“一种描述事物之间关系的方式”。
随着语义网和人工智能领域的快速发展,知识图谱逐渐引起了学术界和工业界的广泛兴趣与重视。
2.2 知识图谱的发展历程知识图谱的发展经历了几个重要的阶段。
最早的阶段是数据集成和联接的努力,之后出现了RDF、OWL等语义网技术的提出与应用。
进入21世纪后,大规模知识图谱的构建与应用成为研究热点。
目前,知识图谱正逐渐向领域知识图谱、跨领域知识图谱以及全球知识图谱发展。
3. 知识图谱的构建与应用3.1 知识图谱的构建知识图谱的构建包括数据源收集、数据预处理与清洗、实体识别与链接、关系抽取与建模等多个环节。
具体的构建过程需要根据不同的任务和应用进行定制和优化。
3.2 知识图谱的应用知识图谱的应用涵盖了多个领域,包括问答系统、智能搜索、知识推理、智能推荐等。
通过建立丰富的实体间关系和属性,知识图谱可以为这些应用提供有力的支撑,提高对用户需求的理解和满足。
4. 知识图谱的挑战与未来发展4.1 知识图谱的挑战知识图谱在构建过程中面临着数据质量、数据稀缺和知识更新等挑战。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Knowledge brokering on emissions modelling in Strategic Environmental Assessment of Estonian energy policy with special reference to the LEAP modelPiret Kuldna a ,⁎,Kaja Peterson a ,Reeli Kuhi-Thalfeldt a ,ba Stockholm Environment Institute Tallinn Centre,Lai 34,Tallinn 10133,Estonia bTallinn University of Technology,Ehitajate tee 5,Tallinn 19086,Estoniaa b s t r a c ta r t i c l e i n f o Article history:Received 22December 2014Received in revised form 4June 2015Accepted 4June 2015Available online 11June 2015Keywords:Strategic Environmental Assessment Knowledge brokering LEAPEnergy policyStrategic Environmental Assessment (SEA)serves as a platform for bringing together researchers,policy devel-opers and other stakeholders to evaluate and communicate signi ficant environmental and socio-economic effects of policies,plans and programmes.Quantitative computer models can facilitate knowledge exchange between various parties that strive to use scienti fic findings to guide policy-making decisions.The process of facilitating knowledge generation and exchange,i.e.knowledge brokerage,has been increasingly explored,but there is not much evidence in the literature on how knowledge brokerage activities are used in full cycles of SEAs which employ quantitative models.We report on the SEA process of the national energy plan with re flections on where and how the Long-range Energy Alternatives Planning (LEAP)model was used for knowledge broker-age on emissions modelling between researchers and policy developers.Our main suggestion is that applying a quantitative model not only in ex ante ,but also ex post scenario modelling and associated impact assessment can facilitate systematic and inspiring knowledge exchange process on a policy problem and capacity building of par-ticipating actors.©2015Elsevier Inc.All rights reserved.1.IntroductionSEA is a type of impact assessment to integrate environmental con-cerns into strategic decision-making with the aim to promote sustain-able development.In a decision-making process,impact assessments can serve various and simultaneous functions:information generation,debate and deliberation,attitude shifting and complexity structuring (Hugéet al.,2011).Farrell et al.(2001)also emphasise the communica-tive role of assessment processes as bridges between science and policy.In the energy sector,where impact assessment deals with complex technical and structural issues,uncertainties and multiple impacts,quantitative models are widely used as planning and analysis tools for addressing these challenges.While modelling itself is not driving the policy,nor deciding the political feasibility of targets,quantitative models can offer structured insight into areas of uncertainty (Strachan et al.,2009;Mundaca et al.,2010),help understand the interactions and promote discussion (Jebaraj and Iniyan,2006)and support various approaches to future studies (Finnveden et al.,2003).Van Daalen et al.(2002)have summarised four contributions of quantitative models to the environmental policy-making life cycle:1)eye-opener,2)visualiserof alternative future scenarios,3)vehicle for inspiring political consen-sus,and 4)assistant in identifying concrete policy decisions and poten-tial policy outcomes.However,the use of models in policy development is not always self-evident.Brugnach et al.(2007)suggest that both the modelling and the policy-making communities should contribute to the integration of modelling information into policy formulation.For modellers,this involves promoting models as tools of communication,learning and exploration,and for policy-makers,this suggests a need to view modelling as a tool for informing the public and scienti fic com-munity in an uncertain world.SEAs can serve as platforms for enhancing such knowledge ex-change,where information is not simply transferred from researchers to decision-makers,but developed and co-produced interactively with actors involved (Sheate and Partidário,2010;Fazey et al.,2012).Assess-ments are also more likely to in fluence decision-making if the decision-makers are sharing and acquiring not just information but knowledge (information that has been processed through learning)(Sheate and Partidário,2010).Similarly,model generated output alone may not be enough for decision-making.However,knowledge exchange is often conducted on an ad-hoc basis,based on ‘what seems to work ’(Reed et al.,2014).In impact assessments,Partidário and Sheate (2013)sug-gest not simply hope that the process of facilitating knowledge genera-tion and exchange,i.e.knowledge brokerage,will happen,but explicitly design it in order to support constructive and collaborative planningEnvironmental Impact Assessment Review 54(2015)55–60⁎Corresponding author.E-mail address:piret.kuldna@seit.ee (P.Kuldna)./10.1016/j.eiar.2015.06.0010195-9255/©2015Elsevier Inc.All rightsreserved.Contents lists available at ScienceDirectEnvironmental Impact Assessment Reviewj o u r n a l h o me p a g e :ww w.e l s e v i e r.c o m /l o c a t e /e i a rprocesses and ultimately more sustainable outcomes.At the same time impact assessors need to adopt aflexible,adaptive and learning ap-proach themselves too,as the decision-making processes are often long and unpredictable(Kørnøv and Thissen,2000).This is supported by Runhaar and Driessen(2007)who argue that SEA studies will obvi-ously have a greater impact when they areflexible and tailored to the actual evolvement of policy processes,rather than adhering to strict, standardised and detailed procedures.Likewise,knowledge brokering activities in SEA should also depend on the needs and expectations of actors involved.Knowledge brokering has been categorised in several ways.For example,Ward et al.(2009)identify three models of knowledge brokering:knowledge management,linkage and exchange,and capaci-ty building,which represent common roles performed by knowledge brokers.In environmental modelling,Krueger et al.(2012)highlight the convening,communicating,mediating and translating roles of knowledge brokers.Turnhout et al.(2013)differentiate three knowl-edge brokering repertoires:supplying,bridging and facilitating,illus-trating the relation between knowledge production and use.Michaels (2009)specifies six knowledge brokering strategies to environmental policy problems and settings and based on her work,Jones et al. (2013)set out six functions of knowledge intermediaries.These strate-gies/functions are listed in order of increasing intensity of relationship building and commitment of resources:•informing(disseminating research results to policy developers,limit-ed exchange between the producers and users of the knowledge);•consulting/linking(advising on problems delineated by parties seeking counsel,linking policy developers with the expertise needed for a par-ticular policy area);•matchmaking(bringing together individuals who can contribute to policy-making and who would not otherwise meet,e.g.from another discipline or with different types of knowledge);•engaging(involving other parties in discussions that are framed by one party,to provide knowledge on an as-needed basis);•collaborating(parties jointly frame the process and negotiate the sub-stance of issues,may need significant resources of time and money);•building adaptive capacity(parties jointly direct interactions and dis-cussions of problems with multiple dimensions in which learning is considered,to improve the ability of parties in handling multiple and emerging issues).Depending on the decision-making issue,all or some of these strat-egies may be appropriate at different points of the policy cycle.For in-stance,Jacobson et al.(2005)have shown that consulting can be an effective strategy for interactive knowledge transfer to enhance the use of research-based knowledge in decision-making.Sheate and Partidário(2010)demonstrate the role of engagement and capacity building in strategic planning and assessment.In order to distinguish between different knowledge brokerage strategies related to environmental policy problems,we take the typol-ogy of Michaels(2009)as a starting point and examine the knowledge exchange process on emissions modelling between researchers and pol-icy developers in the national energy plan SEA.In our study the model is LEAP(Long-range Energy Alternatives Planning model)which is a soft-ware tool for energy-environment policy analysis and impact predic-tion,developed at the Stockholm Environment Institute(Heaps,2008; ).LEAP can be used for both demand and supply side energy modelling,including for building and comparing scenarios to meet the energy demand in all sectors of an economy and account for energy and non-energy sector greenhouse gas(GHG) emission sources and sinks.The literature shows that most of the LEAP-model applications have been at the national level,primarily driv-en by policy requirements:for developing low-carbon economies, future sustainable energy and climate policies,and renewable energy development scenarios or to reduce CO2emissions(e.g.,Tao et al., 2011;Yophy et al.,2011;Roinioti et al.,2012;Özer et al.,2013;Park et al.,2013).At the city level LEAP has been applied for urban energy saving and emissions reductions(e.g.,Lin et al.,2010)and globally for developing forward-looking assessments of energy challenges (Nilsson et al.,2012).In Estonia,the LEAP model has been used for the national level ex ante SEA of Energy Plan2020and in ex post scenario modelling and associated impact assessment for the preparation of En-ergy Plan2030+.The paper is structured as follows.Section2describes the knowledge needs in the context of Estonian energy policy and knowledge generation with LEAP in the national energy plan. Section3describes the study methodology.In Sections4and5,the study results are presented and discussed,respectively.Thefinal section draws conclusions based on the studyfindings.2.Test case contextThe knowledge needs for formulating a national development plan for the energy sector(hereinafter:national energy plan)primarily in-clude information on available resources and policy measures needed to meet European Union(EU)and national climate and energy policy targets and to ensure energy rmation on environmental, economic and social impacts of energy policy measures as well as im-pact assessment procedural knowledge is also essential.In Estonia,the energy sector is dominated by one primary energy source:oil shale. As a domestic fossil fuel,oil shale provides for approximately70%of the country's total primary energy supply.Although oil shale increases energy security of Estonia(the country's overall level of energy import dependence is approximately15%),the energy sector is Estonia's most environmentally impactful sector.The majority of the country's GHG emissions come from oil shale extraction and combustion,which are the main drivers behind the national economy's high carbon intensity values(OECD/IEA,2013).The national energy plan is the highest-level strategic document on the Estonian energy sector which elaborates on development visions and objectives and describes measures for achiev-ing them.As such,the document formulates national energy policy,and its targets and measures have to be reflected down to the lower level development plans that implement this policy.The authority responsi-ble for national energy plan preparation is the Ministry of Economic Af-fairs and Communications(MoEAC,hereinafter:policy developers).The first Estonian energy sector national development plan was approved by the Estonian Parliament in1998and has now been reviewed three times,combined with SEA according to the EU Directive SEA Directive 2001/42/EC.The second and third authors of the current paper together with other energy experts(hereinafter:researchers)from the SEI Tallinn Centre(SEIT,a non-governmental research institute)carried out the SEA for Energy Plan2020upon being selected by the MoEAC through public procurement.The guidelines for SEA on the website of the Minis-try of the Environment do not outline specific requirements on SEA tool choice or application(Ministry of the Environment,2009).However, there has been a certain history of the use of quantitative models in SEAs for national energy plans since Energy Plan2020(Table1).2.1.The use of LEAP model in the SEA of the national energy planIn the Energy Plan2020,the application of LEAP–a new model for Estonian national energy planning–was proposed by the SEA re-searchers who had the LEAP modelling expertise.In particular,we pro-posed to model the most important emissions of energy sector and to find out which electricity and heat production scenarios have the lowest level of carbon dioxide(CO2)and sulphur dioxide(SO2).Since LEAP is a scenario-based modelling system,it was possible to work closely with the policy developers responsible for the preparation of the national en-ergy plan throughout the development of alternative scenarios.Issues regarding how detailed the model should be,what sectors should be modelled,and which parameters and input data to use were negotiated56P.Kuldna et al./Environmental Impact Assessment Review54(2015)55–60with them.The alternative scenarios in Energy Plan2020were policy scenarios which are appropriate to use if the future can be affected through strategic action(Finnveden et al.,2003).The policy changes of scenarios were characterised by different shares of fuels for electricity and heat generation and respective production capacities,based on the national targets in the energy sector.The alternative scenarios for elec-tricity and heat production werefirst drafted by the researchers during the SEA scoping stage and then specified in the impact assessment stage based on information gained from the policy developers.The scenarios were analysed according to the implications of different futures,on the basis of environmental,social and economic criteria proposed by both the researchers and policy developers,ing the backcasting approach(Robinson,2003).Out of the total26criteria,the LEAP model was used to develop projections for CO2and SO2emissions of the scenarios(two criteria),EcoSense model for calculating the full costs of electricity production technologies(1criterion)and qualitative multi-criteria analyses for assessing the impact of the scenarios against the rest24criteria(SEI Tallinn,2009).During the emissions modelling stages,the main role of the policy developers was to provide informa-tion on the planned energy supply and demand data,verify modelling assumptions and the set of scenarios.For data visualisation and communication in LEAP,one can present and share model assumptions and results through Excel,Word and PowerPoint.In Energy Plan2020,the LEAP model was used to visualise scenarios and to compare emissions values.The results were presented by the researchers in working meetings with the policy developers,in legally mandated public consultations of the SEA and at a series of public energy forums organised by the MoEAC that introduced national energy plan scenarios and implementation measures to a wider public.In the communication process,the main role of the policy developers was to assist in the interpretation of the quantitative modelling results of the emission scenarios.2.2.Energy Plan2030+In the autumn of2012,MoEAC and Estonian Development Fund (EDF)(hereinafter together or separately referred to as policy devel-opers)launched the updating of Energy Plan2020.The new plan,Energy Plan2030+,addresses a longer time horizon and wider scope issues than its predecessors.Its overall aim is to ensure energy supply in accor-dance with European Union climate and energy policy objectives while improving the state of the environment and long-term competitiveness of Estonia.The plan establishes strategic objectives for power engineer-ing,heat production,transportation,housing and domestic fuel produc-tion until2030and with an outlook to2050.Based on analyses and modelling results,Estonia's preferred energy supply scenario is selected in the plan(MoEAC,2015).Thus,at the initiation of the process,the pol-icy planning addressed a problem that can be characterised as a moder-ately structured policy problem(Hisschemöller and Hoppe,1995; Turnhout et al.,2007;Runhaar and Driessen,2007):there was an agree-ment of necessity for a new energy plan and a broad policy goal was set, but the means to reach the goal most effectively and efficiently were un-certain.Along with updating the plan,ex post evaluation of the imple-mentation of the previous national energy plan was carried out.While the need for mid-term and/or ex post evaluation of a sectoral develop-ment plan is stipulated in government regulations(Government of the Republic,2007),no explicit legal requirements specify that sectoral de-velopment plan impacts arising from implementation must be assessed during this process.The ex ante SEA of Energy Plan2030+was conduct-ed by the EDF(a state-run public institution),who coordinated together with the MoEAC the preparation of the national energy plan.As the LEAP model was applied to the impact assessment of the previous na-tional energy plan,the policy developers also considered it a candidate tool for the SEA of the new plan.In summary,knowledge exchange process between SEA experts, modellers and policy developers can evolve at any modelling stage within SEA,such as:1)while deciding on modelling objectives and scope at the SEA scoping stage,2)during model design and quantitative modelling(as scenarios are built and while model inputs are deter-mined)and3)in ex post evaluation and modelling(Table2).3.MethodologyIn order to reflect on where and how a knowledge brokerage ap-proach was applied to the emissions modelling process in the SEA and in the preparation of the new energy plan,we use Michaels' (2009)framework of strategies which has specifically been devel-oped for responding to environmental policy problems or settings (described in the Introduction).Our focus is on expert knowledge of researchers and policy developers,excluding knowledge generat-ed from other stakeholder and public participation.The study was divided into two parts:1)Analysis of SEA process for Energy Plan2020and ex post identifica-tion of knowledge brokerage strategies that the authors applied dur-ing the SEA.The analysis was based on information from the secondTable1Estonian national energy plans and main tools used in SEAs.Title of the national energy plan Year ofparliamentaryapprovalMain tools used in the SEANational Long-TermDevelopment Plan for theFuel and Energy Sector until2005and vision until20181998[No SEA was applied]National Long-Term Development Plan for the Fuel and Energy Sector until 2015,including SEA 2004Qualitative assessmentmatrices(Fischer,2007)—scoring of impact significanceNational Development Plan for the Energy Sector until2020 (Energy Plan2020), including SEA 2009LEAP(Heaps,2008)—modelling of CO2and SO2emissions in energy supplyand consumption scenariosEcoSense(Schleisner,2000;Finnveden et al.,2003)—calculation of full costs(including both productionand external costs)ofelectricity productionscenariosQualitative assessmentmatrices—scoring of impactsignificanceNational Development Plan for the Energy Sector until 2030,with outlook to2050 (Energy Plan2030+), including SEA Scheduled forapproval in thefirst half of2015AirViro(SMHI,2010)—modelling of air emissionsSimaPro(PRé,2013)—modelling of impacts onhealth,ecosystems,resourceuse and climate changeIndicator sets(de Ridder et al.,2007)—measuring changes inimpactTable2Main stages of knowledge exchange process between SEA experts,modellers and policydevelopers,on the example of national energy plan and application of LEAP.Stage of policyplanningStage of SEA Stage of modellingInitiation Scoping Deciding on modellingobjectives and scopeDevelopment of draftpolicy documentImpact assessment Model design,quantitativemodelling andcommunication of resultsMid-term and/or expost evaluation ofpolicy documentMid-term and/or ex postevaluation of impacts(SEA follow-up)Ex post modelling57 P.Kuldna et al./Environmental Impact Assessment Review54(2015)55–60and third authors of the paper(who were respectively the main SEA expert and the LEAP modeller of the ex ante SEA),and on the ex ante SEA report(SEI Tallinn,2009).2)Ex post scenario modelling and preparation for the SEA of EnergyPlan2030+.Ex post modelling was the re-assessment of LEAP pro-jections made for Energy Plan2020in order tofind out to what ex-tent LEAP model results had realised and to identify possible reasons for deviation.It was guided by research and initiated by the authors without a formal government mandate,thus not being part of the of-ficial SEA process.Although in the ex ante SEA report for Energy Plan 2020,ex post modelling was not directly proposed as a form of mon-itoring,the updating of the national energy plan was known to be started soon,and thus it was an appropriate time to follow up on the SEA modelling outcomes.The additional aim of ex post modelling was to interact with the policy developers for continuing the use of LEAP in updating the energy plan and associated SEA(collaborating strategy of knowledge brokerage).The policy developers,in turn, were interested in identifying the most suitable model(s)for conducting an impact assessment of the new national energy plan.In order to discuss the ex post modellingfindings and offer opportu-nity for policy learning,a workshop was arranged by the researchers.Besides collaborating strategy,we did not elaborate any other knowledge brokerage strategy in advance to be employed in the process,but according to Michaels's(2009)framework,it could be anticipated that elements of other strategies can also be adopted.Michaels(2009)suggests for fundamental decision-making which involves opportunities to rethink how to approach a policy domain, collaborating as the primary brokering strategy,and for addressing moderately structured problems capacity building strategy.Develop-ment of the national energy plan can be characterised as belonging to both of these problem and decision-making types.4.ResultsWe identifiedfive primary strategies and their combinations which we used for brokering modelling knowledge between the researchers and policy developers in the development of Energy Plan2020and in the preparation of Energy Plan2030+(Table3).In Energy Plan2020, these strategies were identified upon reflection after the SEA process. In ex post modelling of Energy Plan2020and in the preparation of Ener-gy Plan2030+one strategy was chosen beforehand and others speci-fied in the course of action.The most frequently used knowledge brokerage strategies with re-gard to modelling in the national energy planning process were consult-ing and collaborating.Both approaches were applied formally(as an expert work in the SEA,in the working groups and Advisory Board of Energy Plan2030+)as well as informally(initiated by the researchers). Consultations were also part of the formal SEA process.The researchers brought in knowledge about modelling and environmental impact of power and heat generation while the policy developers contributed with knowledge on available and future energy production capacities and technology.High-involvement strategies,collaborating and engag-ing,were adopted by the researchers when an agreement with the pol-icy developers was sought on issues such as modelling objectives or model design and scenarios.For example,in order to discuss and agree on the ex ante and ex post modelling objectives,face-to-face com-munication and meetings with the policy developers were organised. Engaging strategy refers to the involvement of policy developers in the ex post modelling workshop,which was set up and moderated by the re-searchers.At this workshop,the researchers presented the ex post modelling results which demonstrated higher actual CO2and SO2emis-sions levels than those modelled in the ex ante SEA.The reasons for this were mainly related with larger scale electricity export than expected and with the postponement of the shutdown of old oil-shale production units.After the presentation,the policy developers were given an op-portunity to interpret the modellingfindings and discuss how the out-come can be used for the national energy plan renewal.The policy developers also described their overall expectations towards modelling of energy sector impacts,such as integration of regional energy market trends and impacts into the model and analysing the effects of policy measures on energy consumption.Informing strategy was appropriate to apply at the end of ex ante SEA process,when major changes to the modelling were no longer neces-sary.However,communication with the policy developers at this stage was still two-way and consequently yielded information for both sides,in particular with regard to interpretation of modelling re-sults and uncertainties.Capacity building was our main strategy in learn-ing from ex post modelling,since in the national energy policy such a re-assessment of emissions scenarios with the same model and comparing the forecast with present situation was carried out for thefirst time. Consulting and collaborating strategies were again employed when the researchers were invited to participate in Advisory Board and thematic working groups for Energy Plan2030+,during which the potential util-ity of LEAP model was discussed several times,initiated both by the re-searchers and the policy developers.Matchmaking was the only strategyTable3Knowledge brokerage(KB)strategies,examples and outcomes in relation to LEAP during the national energy plan process.National energy plan Primary KBstrategies inrelation toLEAPExamples of application of KB strategies SEA cycle stage OutcomesEnergy Plan 2020ConsultingandcollaboratingInteractions with policy developers for settingmodelling objectives and building scenarios in LEAPScoping and impactassessmentAgreement to project CO2and SO2emissions in electricity andheat production scenariosInforming Visualisation of emissions scenarios at workingmeetings and public energy forums.Impact assessment Approval of modelling results and the SEA reportDescribing modelling process,assumptions,uncertainties and outcomes in the SEA report.Ex post modelling Collaborating Interaction with policy developers for clarifyinginformation needs and setting ex post modellingobjectivesEx post(follow-up)evaluation of thenational energy planAgreement to extend the modelling time period from2030until2040and to use revised statistical data on CO2and SO2emissions for the past time periodEngaging Workshop with policy developers to discuss modellingoutcomes of electricity scenarios and modelling needsfor the new energy planAgreement to conduct ex post modelling also for heat scenariosCapacitybuildingLearning from ex post scenario modelling Joint understanding of external factors and uncertainties thatare difficult to predict in long-term emission scenariosEnergy Plan 2030+ConsultingandcollaboratingDiscussions in working groups and Advisory Board onmodelling needs and LEAP possibilitiesScoping Intention to use LEAP for the analyses of scenarios;however,the intention did not realise58P.Kuldna et al./Environmental Impact Assessment Review54(2015)55–60。