[1] LIU H. Research on the conflict of conceptual design based on knowledge [J]. Science & Technology Progress and Policy, 2013, 30(17): 123-127. (刘慧敏.基于知识的概念设计冲突解决方法研究[J].科技进步与对策,2013,30(17):123-127.) [2] SLIMANI K, FERREIRA D S, MEDINI C, et al. Conflict mitigation in collaborative design [J]. International Journal of Production Research, 2006, 44(9):1681-1702. [3] CHEN X W, NOF S Y. Conflict and error prevention and detection in complex networks [J]. Automatica, 2012, 48(5): 770-778. [4] PIERRE A Y. A CSP approach for the network of product life cycle constraints consistency in a collaborative design context [J]. Engineering Applications of Artificial Intelligence, 2009, 22(6): 961-970. [5] MENG X, YI H, NI Z, et al. Research on technologies of constraint-based conflict detection in collaborative design [J]. Computer Integrated Manufacturing Systems, 2004, 10(11): 1426-1432. (孟秀丽,易红,倪中华,等.基于约束的协同设计冲突检测技术研究[J].计算机集成制造系统,2004,10(11):1426-1432.) [6] HU X, WANG J, XU Z. Constraint network modeling and conflict detection in vertical collaboration design [J]. Mechanical & Electrical Engineering Magazine, 2009, 26(5): 44-47. (胡小平,王姣,徐招辉.纵向协同设计中约束网络建模和冲突检测技术研究[J].机电工程,2009,26(5):44-47.) [7] ZHONG H, WACHS J P, NOF S Y. Telerobot-enabled HUB-CI model for collaborative lifecycle management of design and prototyping[J]. Computers in Industry, 2014, 65(4): 550-562. [8] CARREIRA P, RESENDES S, SANTOS A C. Towards automatic conflict detection in home and building automation systems [J]. Pervasive and Mobile Computing, 2014, 12: 37-57. [9] ZHAO H, TIAN L, TONG B. Constraint-based conflict detection and negotiation in collaborative design [J]. Computer Integrated Manufacturing Systems, 2002, 8(11):896~900. (赵慧设,田凌,童秉枢.协同设计中基于约束的冲突检测与协商技术[J].计算机集成制造系统,2002,8(11):896-900.) [10] WANG D, JIN W. Conflict detection algorithm in collaborative design[J]. Journal of Computer Applications, 2007, 27(3): 650-652. (汪大勇,金炜东.协同设计中的并行冲突检测算法[J].计算机应用,2007,27(3):650-652.) [11] XIONG Y, FAN W, XIONG G. Research and realization of distributed conflict detection system[J]. Computer Engineering, 2009, 35(20): 23-24. (熊英,范文慧,熊光楞.分布式冲突检测系统的研究与实现[J].计算机工程,2009,35(20):23-24.) [12] LUC J. Interval constraint propagation with application to bounded-error estimation [J]. Automatica, 2000, 36(10): 1547-1552. [13] KLEIN M. Supporting conflict resolution in cooperative design systems [J]. IEEE Transactions on Systems, Man and Cybernetics, 1991, 21(6): 1379-1390. [14] HU Q, FAN J, ZHANG X. Application of BP neural network in oil content prediction [J]. Journal of Computer Applications, 2014, 34(2): 186-189. (胡启华,范晶晶,张新.应用BP神经网络预测油页岩含油率[J].计算机应用,2014,34(2):186-189.) [15] CHUN J, KIM M, JUNG H, et al. Shape optimization of electromagnetic devices using immune algorithm [J]. IEEE Transactions on Magnetics, 1997, 33(2): 1876-1879. [16] WANG Z, MIAO D, DU Z. Modified particle filter algorithm for mobile robot simultaneous localization and mapping [C]//ITIC 2009: Proceedings of the 2009 International Technology and Innovation Conference. Piscataway: IEEE, 2009: 1-5. [17] XU D, YAP F, HAN X, et al. Identification of spring-force factors of suspension systems using progressive neural network on a validated computer model [J]. Inverse Problems in Engineering, 2003, 11(1): 55-74. [18] FU D, WANG Q. XML digital signature application in workflow system [J]. Journal of Computer Applications, 2011, 31(3): 808-811. (傅德胜,王强.XML数字签名在工作流系统中的应用[J].计算机应用,2011,31(3):808-811.) |