文档库 最新最全的文档下载
当前位置:文档库 › Advances in decision graphs

Advances in decision graphs

Advances in decision graphs
Advances in decision graphs

Advances in Decision Graphs

Thomas D.Nielsen and Finn V.Jensen

Aalborg University,

Department of Computer Science,

Research Unit of Decisions Support Systems,

Fredrik Bajers Vej7E,

9220Aalborg?,Denmark

Abstract.Frameworks for handling decision problems have been subject to many advances in the last years,both w.r.t.representation languages,solution algorithms and methods for analyzing decision problems.In this paper we outline some of the recent advances by taking outset in the in?uence diagram framework.In partic-ular,we shall focus on advances in representation languages and exact solution algorithms for decision problems with a single decision maker.Moreover,we give a brief outline of recent contributions to methods for performing sensitivity analysis in in?uence diagrams.

1Introduction

Decision graphs refer to a general class of models for representing decision problems.These types of models can be characterized by two components: i)a graphical structure,and ii)numerical information in the form of proba-bilities for representing uncertainty and utilities for representing preferences. The developments in this area were initiated by von Neumann and Mor-genstern(1944)who proposed the decision tree framework,see also(Rai?a 1968).A decision tree provides a direct representation of a decision prob-lem by modeling all decision scenarios explicitly.Although such an explicit representation has its advantage for some decision problems,it is also one of the main weaknesses:the size of the decision tree grows exponentially in the number of variables.This shortcoming motivated the development of the in?uence diagram framework(Howard and Matheson1981),which provides a compact representation of symmetric decision problems with a single decision maker.Initially,these models were solved by converting the in?uence diagram into a corresponding decision tree representation,such that existing decision tree algorithms could be used to solve the decision problem.Unfortunately, this solution technique also su?ers from the complexity problem mentioned above.As an alternative,Shachter(1986)proposed a solution method that works directly on the in?uence diagram model,i.e.,it does not require a sec-ondary structure.With the introduction of this solution algorithm,the use of in?uence diagrams found a more widespread interest and since then there have been several advances in the development of new representation lan-guages(which relax some of the assumptions underlying in?uence diagrams) as well as new methods for solving and analyzing decision problems.

2Thomas D.Nielsen and Finn V.Jensen

In this paper we outline some of these recent advances.Obviously,we are not able to cover the entire area and,in particular,we shall restrict our attention to frameworks for representing decision problems involving a sin-gle decision maker.Note that representation languages and solution methods for decision problems with several decision makers(usually considered in a game setting)have also been proposed,see e.g.(Koller and Milch2001). Moreover,we only deal with frameworks for handling discrete variables al-though in?uence diagrams with mixed variables have also been considered, see e.g.(Madsen and Jensen2003).Additionally,we will focus on exact so-lution algorithms for these models;for an overview of approximate solution methods,the interested reader is referred to(Charnes and Shenoy2002)and the references within.

Finally,we outline a few advances in methods for analyzing decision prob-lems.More speci?cally,we shall consider methods for performing sensitivity analysis in in?uence diagrams although the general task of model analysis also covers other areas such as value of information analysis,see e.g.(Dittmer and Jensen1997;Shachter1999).

2In?uence diagrams

The in?uence diagram(ID)framework(Howard and Matheson1981)serves as an e?cient modeling tool for symmetric decision problems with several decisions and a single decision maker.An in?uence diagram can be seen as a Bayesian network(BN)augmented with decision nodes and value nodes, where value nodes have no descendants.Thus,an in?uence diagram is a directed acyclic graph G=(U,E),where the nodes U can be partitioned into three disjoint subsets;chance nodes U C,decision nodes U D and value nodes U V.In the remainder of this paper we will use the concept of node and variable interchangeably if this does not introduce any inconsistency.We will also assume that no barren nodes are speci?ed by the in?uence diagram since they have no impact on the decisions(Shachter1986);a chance node or a decision node is said to be barren if it has no children,or if all its descendants are barren.Furthermore,in an in?uence diagram we have a total ordering of the decision nodes indicating the order in which the decisions are made(the ordering of the decision nodes is traditionally represented by a directed path which includes all decision nodes).

With each chance variable and decision variable X we associate a?-nite state space sp(X),which denotes the set of possible outcomes/decision options for X.For a set U of chance variables and decision variables we de?ne the state space as sp(U )=×{sp(X)|X∈U },where A×B de-notes the Cartesian product of A and B.The uncertainty associated with each chance variable C is represented by a conditional probability potential P(C|pa(C)):sp({C}∪pa(C))→[0;1],where pa(C)denotes the parents of C

Advances in Decision Graphs3 in the in?uence diagram.The domain of a conditional probability potential φC=P(C|pa(C))is denoted dom(φC)={C}∪pa(C).

The decision maker’s preferences is described by a multi-attribute util-ity potential,and in the remainder of this paper we shall assume that this utility potential is linearly-additive with equal weights,see e.g.(Tatman and Shachter1990);the set of value nodes U V de?nes the set of utility potentials which appear as additive components in the multi-attribute utility potential.1 Each utility potential indicates the local utility for a given con?guration of the variables in its domain.The domain of a utility potentialψV is denoted dom(ψV)=pa(V),where V is the value node associated withψV.Analo-gously to the concepts of variable and node we shall sometimes use the terms value node and utility potential interchangeably.

A realization of an in?uence diagram I is an attachment of potentials to the appropriate variables in I,i.e.,a realization is a set{P(C|pa(C))|C∈U C}∪{ψV(pa(V))|V∈U V}.So,a realization speci?es the quantitative part of the model whereas the in?uence diagram constitutes the qualitative part.

The arcs in an in?uence diagram can be partitioned into three disjoint subsets,corresponding to the type of node they go into.Arcs into value nodes represent functional dependencies by indicating the domain of the associated utility potential.Arcs into chance nodes,termed dependency arcs,represent probabilistic dependencies,whereas arcs into decision nodes,termed infor-mational arcs,imply information precedence;if there is an arc from a node X to a decision node D,then the state of X is known when decision D is made.

Let U C be the set of chance variables and let U D={D1,D2,...,D n}be the set of decision variables.Assuming that the decision variables are ordered by index,the set of informational arcs induces a partitioning of U C into a collection of disjoint subsets C0,C1,...,C n.The set C j denotes the chance variables observed between decision D j and D j+1.Thus the variables in C j occur as immediate predecessors of D j+1.This induces a partial order?on U C∪U D,i.e.,C0?D1?C1?···?D n?C n.

The set of variables known to the decision maker when deciding on D j is called the informational predecessors of D j and is denoted pred(D j).By assuming that the decision maker remembers all previous observations and decisions,we have pred(D i)?pred(D j)(for D i?D j)and in particular, pred(D j)is the variables that occur before D j under?.This property is known as no-forgetting and from this we can assume that an in?uence diagram does not contain any no-forgetting arcs,i.e.,pa(D i)∩pa(D j)=?if D i=D j. Example1(The reactor problem).An electric utility?rm is considering build-ing a reactor,and must decide(B)whether to build an advanced reactor(a), a conventional reactor(c)or no reactor at all(n).If an advanced reactor(A)

4Thomas D.Nielsen and Finn V.Jensen

is built,the pro?t is larger than for a conventional reactor(C)assuming that no accidents occur.However,past experience indicates that an advanced re-actor is more probable of having accidents than a conventional reactor.If the ?rm builds a conventional reactor,the pro?ts are$8B if it is a success(cs) or-$4B if there is a failure(cf).On the other hand,the pro?ts of building an advanced reactor are$12B if it is a success(as),-$6B if there is a limited accident(al)and-$10B if there is a major accident(am).

Before deciding on what reactor to build,the?rm has the option of having a test(T)performed on the components of the advanced reactor.The results (R)of the test(T=t)can be classi?ed as either bad(b),good(g)or excellent (e);the cost of performing the test is$1B.If the test results are bad,the nuclear regulatory commission will not allow an advanced reactor to be built.

An in?uence diagram representation of the reactor problem can be seen in Fig.1.Note that neither the state spaces nor the realization have been speci?ed.

Fig.1.An in?uence diagram representation of the reactor problem.

When evaluating an in?uence diagram we identify a strategy for the deci-sions involved;a strategy can be seen as a prescription of responses to earlier observations and decisions.The evaluation is usually performed according to the maximum expected utility principle,which states that we should always choose an alternative that maximizes the expected utility.

De?nition1.Let I be an in?uence diagram and let U D denote the decision variables in I.A strategy is a set of functions?={δD|D∈U D},whereδD is a policy given by:

δD:sp(pred(D))→sp(D).

A strategy that maximizes the expected utility is termed an optimal strategy, and each policy in an optimal strategy is termed an optimal policy.

Advances in Decision Graphs 5

In general,the optimal policy for a decision variable D k is given by:2

δD k (C 0,D 1,...,D k ?1,C k ?1)=(2)

arg max D k C k P (C k |C 0,D 1,...,C k ?1,D k )ρD k +1,where ρD k +1= V ∈U V ψV if k =n ;otherwise ρD k +1is the maximum ex-pected utility potential for decision D k +1:

ρD k +1(C 0,D 1,...,D k ,C k )=max D k +1 C k +1

P (C k +1|C 0,D 1,...,C k ,D k +1)ρD k +2.As the domain of a policy function grows exponentially with the number of variables in the past,it is important to weed out variables irrelevant for the decision.

De?nition 2.Let I be an in?uence diagram and let D be a decision variable in I .The variable X ∈pred(D )is said to be required for D if there exists a realization of I ,a con?guration ˉy over dom(δD )\{X },and two states x 1and x 2of X s.t.δD (x 1,ˉy )=δD (x 2,ˉy ).

A way of determining the variables required for D would be to analyze δD .However,then we would not have avoided the computational problem.Instead,methods for structural analysis of relevance have been constructed,see e.g.(Shachter 1999;Nielsen and Jensen 1999;Lauritzen and Nilsson 2001).Common for these methods is that they start o?by determining the required past for the last decision D .When this is done,D is replaced by a chance variable with D ’s required past as parents,and the methods then recursively work their way backwards in the temporal order.

To analyze relevance for the last decision D ,let U be a utility node which is a descendant of D .A variable X ∈pred(D )is then required for D ,if X is not d-separated from U given pred(D )\{X }.3This is illustrated in Fig.2a,which is used for analyzing the required past for D 2;the analysis for D 1is performed on the network in Fig.2b.

Finally,observe that Equation 2conveys that in order to determine an op-timal policy for a decision variable,we have to perform a series of alternating max-marginalizations and sum-marginalizations to eliminate the variables.The order in which the variables are eliminated must respect the partial or-der induced by the in?uence diagram.Thus we de?ne a legal elimination ordering as a bijection α:U C ∪U D ?{1,2,...,|U C ∪U D |},where X ?Y

6Thomas D.Nielsen and Finn V.Jensen

Fig.2.Figure a:D1is not required for D2because D1is d-separated from U2and U3given pred(D2)\{D1}.Figure b:The in?uence diagram used for analyzing the required past for D1(A is required for D1due to U2and U3).

impliesα(X)<α(Y).Note that a legal elimination ordering is not necessar-ily unique,since the chance variables in the sets C j can be commuted.Even so,any two legal elimination orderings result in the same optimal strategy since the decision variables are totally ordered and sum-operations commute; the total ordering of the decision variables ensures that the relative elim-ination order for any pair of variables of opposite type is invariant under the legal elimination orderings(this is needed since a max-operation and a sum-operation do not commute in general).

3Modeling decision problems

3.1Non-sequential decision scenarios

Consider the classical situation:we would like to buy a used car,but only if the car is in a satisfactory state.We cannot observe the state C directly but we can get information I by just looking at the car and we may-or may not-put an e?ort into additional tests T A and T B before we decide to buy the car(we assume that the tests may be performed in any order). Although this decision problem can be represented as an in?uence diagram, the representation is awkward(see Fig.3a).Instead,we may wish to represent the decision problem more directly.This is done in Fig.3b which is also called a partial in?uence diagram(PID).

In general,a partial in?uence diagram is like an in?uence diagram,but without the requirement of a linear ordering of the decisions(and observa-tions).For instance,the partial order of observations and decisions induced by the PID in Fig.3b is given by I?T A?O A?Buy and I?T B?O B?Buy.

As the temporal order is only partially speci?ed,the question is whether it matters,i.e.,whether the PID is well-de?ned.That is,will the expected utility of an optimal strategy be a?ected by the order in which the observations and decisions are taken.This means that we would in principle need to investigate all linear orders extending the partial order(such linear orders are called admissible).As there is nothing gained by delaying a(cost free)observation,

Advances in Decision Graphs7

Fig.3.Figure(a)shows an in?uence diagram representing two tests and a buy option.The test nodes have three options,t A,t B and no?test.The O nodes have?ve states,pos A,pos B,neg A,neg B,no?test.The arc O1→O2indicates that repeating a test will give identical results.Figure(b)gives a more direct representation of the test and buy example by not specifying a temporal ordering of T A and T B.

we introduce the convention that an observation is performed whenever it can be done.We say that an observation is free when all its preceding decisions have been made,and we say that the last of these decisions releases the observation.In Fig.3b,the decision T A releases O A,and T B releases O B. De?nition3.Let

De?nition4.A PID I is well-de?ned if for any realization of I it holds that any admissible in?uence diagram over I yields the same expected utility for an optimal strategy.

Theorem1.(Nielsen and Jensen1999)Let I be a PID.Then i)and ii)are equivalent.

i)Let<1and<2be any two strictly admissible orders,and let D be any

decision variable.Then the set of chance variables in the required past of

D in<1is identical to the set of chance variables in the required past of

D in<2.

ii)I is well-de?ned.

To investigate whether a PID is well-de?ned it is su?cient to investigate all admissible in?uence diagrams.Furthermore,as two neighboring decisions (and observations)can be permuted without a?ecting the expected utility, we need not care about such permutations in the ordering.

8Thomas D.Nielsen and Finn V.Jensen

For example,to investigate the PID in Fig.3b we should investigate the two strictly admissible orders illustrated in Fig.4.As the test nodes have di?erent required pasts in the two orders,the PID is not well-de?ned.

Fig.4.A directed graph representing the possible admissible orders of the graph in Fig.3b.

If a PID is not well-de?ned,the system may return it to the modeler requesting further speci?cation.This request may be followed by indications of how the partial order may be extended,for instance according to the number of?ll-ins making the PID well-de?ned,see(Nielsen2002).

3.2Unconstrained in?uence diagrams

An ill-de?ned PID may also be considered as an optimization problem:what strategy with respect to the order of decisions and observations should be followed in order to maximize the expected utility?Notice that in this case, the answer is not a single strictly admissible order.

For example,consider the following story.The beautiful princess in the kingdom Lovania has a wooer.It is rather convenient for the king as he considers retirement.Furthermore,in case he starts a war with the neighbor king,he needs a good general.As customary,the king shall confront the wooer with three tasks.One of the tasks(T1)shall be either to kill a unicorn or a dragon.Another task(T2)will be to spend a night in the royal tomb or in the haunted castle tower.The third type of task(T3)is to swim across the river or to climb the highest mountain in the kingdom.

The king can decide to retire(Rt)or to start a war(Wr)at any time. However,he cannot start a war after retirement,and he cannot give his daughter to the wooer before he has been confronted with all three tasks.

To represent this type of decision problem we extend the language of PIDs so that chance nodes which may be observed are speci?ed directly.We call them observables(depicted by double circles),and the language is called unconstrained in?uence diagrams(UIDs).A UID for the kings problem is given in Fig.5.

As the next step in a strategy(decision or observation variable)may be dependent on the past,a strategy for a UID is not one unique strictly admissible order together with policies for the decision variables.It is rather a DAG over decision nodes and observables.The set of strictly admissible

Advances in Decision Graphs

9

orders is organized in a so-called normal form S-DAG:a directed acyclic graph where each path from source to sink is a strictly admissible order,and where all strictly admissible orders are represented.

A normal form S-DAG may represent any optimal strategy for the cor-responding S-DAG.Jensen and Vomlelov′a(2002)give a precise de?nition of normal form S-DAGs together with an algorithm for constructing them.A normal form S-DAG for the kings problem can be seen in Fig.6,and Fig.4 shows a normal form S-DAG for a UID corresponding to the PID in Fig.3b.

3.3Limited memory in?uence diagrams

The frameworks presented in the previous sections all rely on the no-forgetting assumption,i.e.,at any point in time the decision maker remembers all pre-vious observations and decisions.Unfortunately,this assumption may not always be valid,and,more importantly,it may make the computational com-plexity impractical as the required past for a decision may become intractably large.A way to restrict the size of the required past is to use information blocking.That is,by introducing variables which,when observed,d-separates some of the past from the present decision(Jensen2001).Alternatively,we can explicitly pinpoint which variables are remembered when taking a par-ticular decision,thereby dropping the no-forgetting assumption.The latter approach is pursued in the limited memory in?uence diagrams(LIMIDs)by Lauritzen and Nilsson(2001),where informational arcs are used to indicated which variables are known when taking a certain decision.

Example2(The North sea?shing problem).Every year,the European Union undertakes very delicate political and biological negotiations to determine a volume of?shing for most kinds of?sh in the North sea.Oversimpli?ed,you can say that each year we have a test for the volume of?sh,and based on this

10Thomas D.Nielsen and Finn V.

Jensen

Fig.

6.

A

normal form S-DAG for

the kings problem.

Advances in Decision Graphs11 test the volume of allowable catch is decided;this decision also has an impact on the volume of?sh for next year.A LIMID representation for a three year strategy is illustrated in Fig.7,where we only remember the last decision and observation(these two variables are therefore also the only variables in the policy for a given decision variable).

Fig.7.A LIMID representation of the North sea?shing problem,where only the last decision and observation are remembered.

Alternatively,by representing the North sea?shing problem using an in-?uence diagram with the no-forgetting assumption,we?nd that the required past for decision F V i constitute the entire past for that decision.Hence,the policies grows exponentially large;this analysis can be performed using the method described in Section2.

3.4Asymmetric decision problems

The frameworks described above have mainly been developed for representing symmetric decision problems with a single decision maker.However,another important type of decision problem is the class of so-called asymmetric deci-sion problems;these decision problems cannot be represented e?ciently using e.g.in?uence diagrams or valuation networks(Shenoy1992).There is cur-rently no complete consensus about the de?nition of an asymmetric decision problem although most authors agree that a decision problem is asymmetric if the number of scenarios is less than the cardinality of the Cartesian prod-uct of the state spaces of all chance and decision variables,see e.g.(Qi et al. 1994;Bielza and Shenoy1999;Shenoy2000;Nielsen and Jensen2000).For example,the decision problem described in Example1is asymmetric as can be seen by unfolding the in?uence diagram into a decision tree.

Various frameworks have been proposed as alternatives to the in?uence diagram when dealing with asymmetric decision problems.Covaliu and Oliver (1995)extend the in?uence diagram with another diagram,called a sequential decision diagram,see Fig.8.The sequential decision diagram is used for describing the asymmetric structure of the problem,as complementary to the in?uence diagram which is used for specifying the probability model;the functional and numerical information from these two diagrams are combined in a so-called formulation table similar to that of Kirkwood(1993).

12Thomas D.Nielsen and Finn V.Jensen

Fig.8.A sequential decision diagram representation of the reactor problem.

Smith et al.(1993)introduce the notion of distribution trees within the framework of in?uence diagrams,see Fig.9.The use of distribution trees allows the possible outcomes of an observation to be speci?ed,as well as the legitimate decision options for a decision variable,see also(Qi et al.1994).

Fig.9.The distribution tree for Result.

However,as the distribution trees are not part of the in?uence diagram, the structure of the decision problem cannot be deduced directly from the graphical structure.Moreover,the sequence of decisions and observations is predetermined,i.e.,previous observations and decisions cannot in?uence the temporal order of future observations and decisions.Finally,distribution trees have a tendency of creating large conditionals during the evaluation,since they encode both numeric information and information about asymmetry. To overcome this problem,Shenoy(2000)presents the asymmetric valuation network as an extension of the valuation network for modeling symmetric de-cision problems.The asymmetric valuation network uses so-called indicator functions to encode asymmetry,thereby separating it from the numeric in-formation(see Fig.10).However,asymmetry is still not represented directly in the model and,as in(Smith et al.1993),the sequence of observations and decisions is predetermined.Further details and comparisons of these methods can be found in(Bielza and Shenoy1999).

Nielsen and Jensen(2000)propose another framework(called asymmetric in?uence diagrams)which extends the in?uence diagram representation by introducing guards at the graphical level:guards on arcs and nodes specify

Advances in Decision Graphs 13

Fig.10.An asymmetric valuation network representation of the reactor problem.The triangles ρ,αand χare probability valuation,whereas δ1and δ2are indicator valuations.Observe that information precedence is encoded by the directed paths involving chance and decision nodes.

conditions for when the associated arcs and nodes are part of the decision problem.Moreover,restrictive functions (associated with decision variables)are introduced to allow the state space of a decision variable to depend on variables in its past;the domain of a restrictive function is indicated by dashed arcs into the associated decision node (see Fig.11).Having guards associated with informational arcs

also supports the speci?cation of decision problems where the temporal order of a set of variables depends on previous observations and decisions.

Fig.11.An asymmetric in?uence diagram representation of the reactor problem.The domain of the restrictive function associated with Buy is speci?ed by the dashed arc.

The use of guards has also been pursued by Demirer and Shenoy (2001)who propose a framework,called sequential valuation networks ,which is a combination of the sequential decision diagram and the asymmetric valuation network.Basically,this framework takes outset in the sequential decision diagram and augments this representation with valuation functions as found in the asymmetric valuation network.

Although several frameworks have been proposed for modeling asymmet-ric decision problems,there is currently no complete speci?cation and com-

14Thomas D.Nielsen and Finn V.Jensen

parison of their strengths and weaknesses.4Additionally,the expressive power of the frameworks is not clear,i.e.,what types of decision problems can be modeled in the various frameworks without introducing redundant informa-tion such as arti?cial states or duplicated variables.

4Evaluating decision problems

4.1Lazy evaluation of(partial)in?uence diagrams

An in?uence diagram is solved through dynamic programming using Equa-tion2.That is,we start by determining an optimal policy for the last decision, and then move backwards in the temporal order to determine a policy for the other decisions.When a policy for the last decision is found,the utility func-tions are substituted by a utility function representing the expected utility of an optimal choice for that decision.

This procedure has been translated to a variable elimination procedure, where variables are eliminated in reverse admissible order(Shenoy1992; Jensen et al.1994;Cowell1994;Ndilikilikesha1994).Taking advantage of lazy propagation,the elimination procedure is described as follows(Mad-sen and Jensen1999):The method keeps two sets of potentials:Φ,a set of probability potentials;Ψ,a set of utility potentials.When a variable X is eliminated,the potential sets are modi?ed in the following way:5

1.SetΦX:={φ∈Φ|X∈dom(φ)}andΨX:={ψ∈Ψ|X∈dom(ψ)}.

2.If X is a chance variable,then

φX:= X ΦX andψX:= X ΦX( ΨX).

If X is a decision variable,then

φX:=max X ΦX andψX:=max X ΦX( ΨX).

3.LetΦ:=(Φ\ΦX)∪{φX}andΨ:=(Ψ\ΨX)∪{ψX

4Note that a comparison of sequential decision diagrams,asymmetric valuation networks and extended in?uence diagrams can be found in(Bielza and Shenoy 1999).

5Note that the operation max XΦX simply corresponds to removing X from the domain ofΦX sinceΦX is a constant function over X.

Advances in Decision Graphs15 4.2Evaluation of unconstrained in?uence diagrams

When a normal form S-DAG for a UID has been established,it is solved in almost the same manner as in?uence diagrams.That is,variables are eliminated in reverse temporal order.

When a branching point is met,the elimination is branched out,and you work with particular potential sets for each branch.When paths meet they have to meet in a chance variable,and the variable immediately after must be a decision variable in all branches.So,assume that two branches meet in A from D1and D2,respectively.Now,the sets of probability po-tentials are the same(they represent sum-marginalizations of the same vari-ables in various orders),but the utility potentials may be di?erent.The uni-?ed utility potentials are determined through maximization.For simplicity, let U1(B,A)and U2(B,A)be the potentials.Then the potential for A is max(U1(B,A),U2(B,A)).

4.3Evaluation of LIMIDs

The evaluation of a LIMID is based on an iterative improvement of the poli-cies for the decision variables,and is closely connected to the method of policy iteration for Markov decision processes.

As a starting point,the decision variables are assigned random policies, i.e.,policies which specify probability distributions over the state spaces of the associated decision variables given their parents;recall that the variables known to the decision maker when deciding on a decision D are the parents of the corresponding node.If a random policy speci?es a unique alternative for each con?guration of pa(D),then the policy is called a pure policy;a pure policy corresponds to the traditional notion of a policy if pa(D)contains the variables being required for D in the corresponding ID representation.

Given the initial policies of the decision variables,the LIMID is converted into a junction tree.However,as opposed to the construction of a strong junction tree,informational arcs are not removed before moralization and the triangulation need not respect any partial or total ordering of the nodes. The junction tree is then initialized by associating each probability potential and utility potential to a clique which can accommodate it.Afterwards all potentials assigned to a clique are combined thereby following the approach of Jensen et al.(1994).Note that in the“lazy”version of the algorithm the latter step should not have been performed.

Based on the initialized junction tree structure,the evaluation algorithm proceeds by iteratively improving the policy for each decision variable.This is performed by making a collect propagation(in the usual fashion)to the clique containing the decision variable in question.The current policy is then substituted by another policy which maximizes the expected utility for that decision;the algorithm converges after having updated the policy for each

16Thomas D.Nielsen and Finn V.Jensen

decision variable.Obviously,this method only provides an approximate solu-tion,and for lower and upper bounds of the expected utility of the approxi-mation the reader is referred to(Nilsson and H¨o hle2001).

4.4Evaluation of asymmetric decision problems

Existing methods for solving asymmetric decision problems can roughly be characterized based on how asymmetry is represented in the associated frame-works.

For those frameworks which use secondary structures to represent asym-metry,such as distribution trees and indicator functions,the solution algo-rithms incorporate the information about asymmetry into the solution algo-rithm.That is,information about asymmetry is directly combined with the numerical information during the solution phase,see e.g.(Smith,Holtzman, and Matheson1993)and(Shenoy2000).For example,the algorithm for solv-ing asymmetric valuation networks,known as the fusion algorithm,works simultaneously on all three sets of valuations de?ned in the model:utility valuations V,probability valuationsΓand indicator valuationsΥ.Similarly to standard evaluation algorithms for in?uence diagrams,the fusion algo-rithm marginalizes out the variables in reverse temporal order by combining all relevant valuations.However,the fusion algorithm only works on the ef-fective state spaces of the variables,i.e.,the legitimate state con?gurations as de?ned by the indicator valuations.For instance,the combination of two probability valuationsρ1andρ2is de?ned as:

(ρ1?ρ2)(ˉx)=(ρ2?ρ1)(ˉx)=ρ1 ˉx↓dom(ρ1) ρ2 ˉx↓dom(ρ2) , whereˉx is in the e?ective state space of the variables in the domain of both inρ1andρ2.

To specify the fusion algorithm w.r.t.a variable X we denote by V X,ΓX andΥX the utility,probability and indicator valuations including X in their domain.The fusion operation Fus X(V∪Γ∪Υ)w.r.t.the valuations V∪Γ∪Υis then de?ned di?erently depending on the type of variable X.If X is a chance variable,then:6

Fus X(V∪Γ∪Υ)= v? ρ

6Note that the projection notation,i.e.↓,refers to the standard marginalization of a variable except that we only work with the e?ective state space.

Advances in Decision Graphs17 If X is a decision variable,then:

Fus X(V∪Γ∪Υ)= v↓(dom(V X)\{X}) ∪ (ρ?ζX)↓(dom(V X∪ΓX∪ΥX)\{X})

∪{V\V X}∪{Υ\ΥX}∪{Γ\ΓX},

(6) whereζX is the indicator valuation representing the optimal policy for X.

Note that Shenoy(2000)also derives cases where the fusion algorithm can be optimized based on the speci?c valuations involved.

Alternatively,in the frameworks where asymmetry is represented explic-itly in the graphical structure,the solution algorithms use this information to construct a secondary structure for solving the model.The secondary structure is used to decompose(or unfold)the original asymmetric deci-sion problem into a collection of symmetric subproblems that can be solved independently;the actual decomposition is performed by traversing in the temporal order and iteratively instantiating the variables which“produce”asymmetry.For instance,in the asymmetric in?uence diagram we instantiate the variables which appear in the domain of either a guard or a restrictive function.The resulting subproblems can then be organized in a tree structure (see Fig.12)having the property that a solution to the original decision prob-lem can be found be combining the solutions from the“smaller”symmetric decision

problems.

R=g,e

Fig.12.The?gure illustrates the decomposition tree for the reactor problem de-picted in Figure11.Note that decomposing w.r.t.R produces subproblems which are structurally identical but di?er in the state space of the decision variable B.

18Thomas D.Nielsen and Finn V.Jensen

Obviously,both types of frameworks have their advantages and disad-vantages.For example,the asymmetric valuation network relies on arti?cial states to represent asymmetry.From a computational perspective this has the undesirable e?ect that we in general work with larger valuations during the solution phase,as compared to e.g.the sequential valuation networks or asymmetric in?uence diagram.On the other hand,when e.g.evaluating an asymmetric in?uence diagram,the calculations are performed according to its decomposition tree.This implies that the same calculations may be required in di?erent subproblems,i.e.,we may perform redundant calculations.Obvi-ously,this problem does not occur when evaluating an asymmetric valuation network using the fusion algorithm.One way around this problem could be to maintain a cache of previous calculations e.g.a hash table indexed with the calculated potentials,see also(Cano et al.2000).

5Model Analysis

5.1Sensitivity analysis in in?uence diagrams

When solving an in?uence diagram the aim is to determine an optimal policy for each decision involved.These policies(as well as the maximum expected utility of the in?uence diagram)are sensitive to variations in both the utilities and the probabilities.Unfortunately,it is usually the case that these values are di?cult to elicit and subject to second-order uncertainty.7This makes it desirable to be able to determine how robust the solution is to variations in both the utilities and the probabilities,see also(Poh and Horvitz1993).Based on such an analysis,the modeler may focus his/her attention on parameter values for which the solution is particularly sensitive(a situation known as one-way sensitivity analysis).Another important type of analysis concerns the joint variation of a set of parameters(n-way sensitivity analysis).This type of analysis yields little information about the individual parameters,but provides general insight into the overall robustness of the model.

In what follows we make a distinction between value sensitivity and deci-sion sensitivity when referring to sensitivity analysis.Value sensitivity con-cerns variations in the maximum expected utility when changing a set of parameters,and decision sensitivity refers to changes in the optimal strat-egy.

Analysis of decision sensitivity can furthermore be characterized as either threshold proximity or probabilistic sensitivity analysis.Threshold proximity uses a distance measure to determine the values a parameter(or a set of pa-rameters)can be assigned without changing the optimal strategy found w.r.t. the initial values of the parameters.Probabilistic sensitivity analysis assigns

Advances in Decision Graphs19 a probability distribution to each parameter under investigation.Hence,the analysis is based on the probability of obtaining a di?erent optimal strategy rather than determining the admissible domain in which the parameters can be varied,see e.g.(Doubilet et al.1985).

A method based on value sensitivity has been proposed in(Felli and Hazen1998).This method uses the expected value of perfect information as a sensitivity indicator,and similar to probabilistic sensitivity analysis it requires that a probability distribution is assigned to each parameter under investigation.More precisely,letˉt be the uncertain parameters,and let?0 be the optimal strategy found w.r.t.the initial values of the parameters. Ifρ?andρ?0denote the expected utilities of the in?uence diagram under the strategies?and?0,respectively,then the expected value of perfect information(denoted by EV P I(ˉt))is given by:

[ρ?(ˉt)]?ρ?0(ˉt)].

EV P I(ˉt)=Eˉt[max

?

This expectation can be very di?cult to evaluate.Hence simulations are usu-ally applied.A detailed description and comparison of the methods outlined above,can be found in(Felli and Hazen1998)and(Felli and Hazen1999).

A drawback of employing sensitivity analysis based on probability distri-butions over the uncertain parameters is the elicitation of these distributions. Given that the decision maker has a(partial)preference ordering over the outcomes,the uncertain utility parameters are not independent.I.e.,we work with joint probability distributions over the utility parameters.8This makes it di?cult to elicit these distributions,in particular,when the utilities have no straightforward interpretation.Parameter dependence also has an impact on the computational complexity.Even when the parameters are assumed to be independent,the calculations can be rather cumbersome,and Monte Carlo methods are usually applied to sample values for the parameters.For instance, when applying the method based on the expected value of perfect informa-tion we need to compute di?i=[max?[ρ?(ˉt i)]?ρ?0(ˉt i)],for each generated sampleˉt i;the expectation is then approximated by EV P I(ˉt)≈1

8Analogously to the standard assumptions within the learning community,see e.g.(Cooper and Herskovits1991),it is usually assumed that the probability parameters are independent.

20Thomas D.Nielsen and Finn V.Jensen

the decision variables in reverse temporal order.For each decision variable, a set of linear constraints is computed which in turn forms the basis for the analysis;as all constraints are linear,n-way sensitivity analysis comes free of charge after one-way sensitivity analysis has been performed.More-over,when working with uncertain utility parameters the time complexity of the algorithms is roughly linear in the number of uncertain parameters (the basic unit of computation is one propagation);unfortunately,in case of n-way sensitivity analysis w.r.t.probability parameters the time complexity is exponential in the number of uncertain parameters.

Finally,it should be noted that decision sensitivity has recently been sub-ject to criticism on the ground that it tends to overestimate the sensitivity of a model(di?erent strategies may yield almost the same expected utility),see e.g.(Felli and Hazen1999).On the other hand,one may argue that if a pa-rameter induces signi?cant changes in the expected utility without in?uencing the optimal strategy,then the model is also insensitive to the parameter.To overcome the problem of overestimating model sensitivity,one may perform the decision analysis iteratively.That is,after decision sensitivity has been analyzed we can calculate the expected utility of the optimal strategy,? ,in-duced by changing the parameters.If the expected utility is not signi?cantly di?erent from the expected utility of the initial strategy,then the analysis is repeated and the strategy is allowed to change accordingly(i.e.,? is disre-garded).Thus,by analyzing decision sensitivity iteratively,we may avoid the problem of overestimating the sensitivity of the model.

软件公司市场部的工作职责

软件公司市场部的工作职责 进入IT行业,更准确的说是进入ERP行业,很真切的感受到行业的不同对市场部岗位设置要求的不同。 传统营销理论谈的是:4P,price价格、product产品、place渠道、promotion促销,市场部的主要工作职责可能也是围绕这些方面。但ERP软件公司很不同,比如:product:一套软件产品的生命周期通常在3-5年,软件的开发、需求确定等往往由技术部门主导,虽然有的大公司设有产品经理(理论上说也属于市场范畴),但大部分中小软件企业的市场部不包括产品开发该职能。Price:目前随着ERP市场竞争的激烈,随着客户成熟度的提高,目前一套ERP产品的售价往往取决与客户的议价能力、预算范围及竞争压力。在此方面,市场部起到的作用也不是非常大。Place:如果软件厂商没有设置代理商,市场部也没有用武之地了。Promotion:ERP产品面对的客户都是企业组织,属于组织购买行为,不是普通的广告、促销就能打动的了的。 那么软件公司是不是就没有必要设置市场部了? 当然不是,而是在ERP行业,市场部的职责不同于其他行业。 对ERP等软件公司而言,最重要的是品牌建设及销售促进。软件公司的市场部,更应该以4C理论为指导:customer needs,cost,communication,convience。 细化一下,软件公司市场部的主要工作职责可以分为一下几类: 1、市场调研:关注行业动态,了解目标市场发展趋势及技术趋势等。 2、竞争者分析:对竞争对手历史、技术实力、成功失败案例、商务政策等要有一个基本的认识和了解。分为几个层次:知道竞争对手是谁;知道竞争对手做了什么;知道竞争对手未来会做什么;影响竞争对手策略。 3、品牌建设与推广。包括媒体宣传、网络营销、参加行业展会论坛等。 4、市场活动的策划与组织。 5、公关关系的维护,包括政府、协会、媒体等。 6、合作伙伴关系维护。 7、客户关系维护。软件公司更多的是关系影响,塑造标杆客户等非常重要。

月经的时间是什么时候

如对您有帮助,可购买打赏,谢谢 月经的时间是什么时候 导语:月经的人每个女性来说,是正常女性应该每个月都要来的生理期,那么在生理期的时候,女性朋友们有没有好好的照顾自己呢,对于生理期的理解, 月经的人每个女性来说,是正常女性应该每个月都要来的生理期,那么在生理期的时候,女性朋友们有没有好好的照顾自己呢,对于生理期的理解,不知道大家有没有很好的正确的认识呢,对于月经的时间来说大家知道到底是什么时候吗?正常的月经时间是什么样的呢?下面我们就来一起学习一下关于月经的时间。 出血(即经血来潮)的第一天称为月经周期的开始,两次月经第一天的间隔时间称为一个月经周期,一般为28~30天,和农历一个月的时间差不多。周期长短因人而异,偶而提前或延后不超过7天仍可视为正常,即月经周期不应少于21天,也不能超过35天。妊娠及哺乳期月经会停止。 女人月经期一般是几天?经期是指经血来潮的持续时间。正常月经持续2~7天,一般为4~5天。经量是指经期排出的血量。月经量的多少很难统计,临床上常用每日换多少次月经垫粗略估计量的多少。有人测定正常人月经血量约为10~58ml,个别妇女月经量可超过100ml。有人认为每月失血量多于80ml即为病理状态。一般月经第2~3天的出血量最多。由于个人的体质、年龄、气候、地区和生活条件的不同,经量有时略有增减,均属正常生理范畴。 经色是指月经血的颜色。月经血一般呈暗红色,开始色较浅,以后逐渐加深,最后又转为淡红色而干净。除血液外,尚含有子宫内膜碎片、子宫颈粘液及阴道上皮细胞。月经血的主要特点是不凝固,但在正常情况下偶尔也有一些小凝块。 生活中的小知识分享,对您有帮助可购买打赏

上海交通大学医学院附属瑞金医院放射科简介

上海交通大学医学院附属瑞金医院放射科简介 瑞金医院放射科目前为影像医学与核医学专业硕士、博士及博士后培养点,上海市住院医师规范化培训考核基地。科室现有高级职称人员18名,博士生导师2名,硕士生导师4名,在读博士研究生和硕士研究生20余名,每年招收进修医师25-30名。拥有多层螺旋CT 4台,磁共振检查仪3台,平板DSA设备3台及数字胃肠机、数字平板钼靶机、DR、CR等大型医疗设备。放射科已有完整的PACS和RIS系统,放射科的数字化建设已走在全国的前列。每年承办国家级继续教育学习班3-4项,主持国际多中心研究多项。近年来成功地主办、协办了多次大型国际性及区域性会议。科室与比利时、法国、美国等相关大学医院建立了多项合作交流项目,每年接待国外来访学者多批,并每年排除进修人员多名。2006年同比利时自由大学医院共同举办了中比神经影像研讨会,在上海、北京、杭州三地举行,受到了相当的好评。科室具有较强的师资队伍,在法文、英文教学方面具有特色,目前承担了上海市教委的影像学精品课程项目。 放射专业逐步形成了骨关节疾病、内分泌疾病、消化道和胰腺疾病、乳腺疾病、颅神经病变等方面的传统诊疗特色,开展了众多具有国际先进水平的特色项目:各类肿瘤或肿瘤样病变CT导引下的穿刺病理活检术;全身范围的多层CTA 检查;面肌痉挛和三叉神经痛的磁共振诊断;磁共振功能成像对脑认知的研究;乳腺癌影像学早期诊断;肾上腺病变的介入性治疗;肾动脉球囊扩张或内支架成形术治疗肾血管性高血压;CT引导下经皮治疗腰突症所致的坐骨神经根炎;半导体激光对原发及转移性肿瘤的姑息治疗;半导体激光治疗骨样骨瘤等。学科目前承担国家自然科学基金1项、上海市重大课题项目4项、市科委、市教委、市卫生局等基金及其它各类基金近20项;近年来获上海市科学技术进步“三等奖”2项、上海市医学科技奖“三等奖”2项。 联系导师简介 陈克敏,男,1951年1月出生,教授、主任医师 放射科主任,1976年毕业于上海第二医学院医学系,长期从事放射诊断和介入治疗的临床、教学和研究工作。目前担任中华医学会放射学分会委员、中国医学影像技术研究协会放射学分会副主任委员、上海放射学会副主任委员、国家

软件公司各岗位职责

岗位:项目经理 主要职责: 1、计划: a)项目范围、项目质量、项目时间、项目成本的确认。 b)项目过程/活动的标准化、规范化。 c)根据项目范围、质量、时间与成本的综合因素的考虑,进行项目的总体规划与阶段计划。 d)各项计划得到上级领导、客户方及项目组成员认可。 2、组织: a)组织项目所需的各项资源。 b)设置项目组中的各种角色,并分配好各角色的责任与权限。 c)定制项目组内外的沟通计划。(必要时可按配置管理要求写项目策划目录中的《项目沟通计划》) d)安排组内需求分析师、客户联系人等角色与客户的沟通与交流。 e)处理项目组与其它项目干系人之间的关系。 f)处理项目组内各角色之间的关系、处理项目组内各成员之间的关系。 g)安排客户培训工作。 3、领导: a)保证项目组目标明确且理解一致。 b)创建项目组的开发环境及氛围,在项目范围内保证项目组成员不受项目其它方面的影响。 c)提升项目组士气,加强项目组凝聚力。 d)合理安排项目组各成员的工作,使各成员工作都能达到一定的饱满度。 e)制定项目组需要的招聘或培训人员的计划。 f)定期组织项目组成员进行相关技术培训以及与项目相关的行业培训等。 g)及时发现项目组中出现的问题。 h)及时处理项目组中出现的问题。 4、控制 a)保证项目在预算成本范围内按规定的质量和进度达到项目目标。 b)在项目生命周期的各个阶段,跟踪、检查项目组成员的工作质量; c)定期向领导汇报项目工作进度以及项目开发过程中的难题。 d)对项目进行配置管理与规划。 e)控制项目组各成员的工作进度,即时了解项目组成员的工作情况,并能快速的解决项目组成员所碰到的难题。 f)不定期组织项目组成员进行项目以外的短期活动,以培养团队精神。 结语: 项目经理是在整个项目开发过程中项目组内对所有非技术性重要事情做出最终决定的人。 岗位:系统架构师(技术总监) 主要功能及职责:

软件部岗位职责说明书

更多资料请访问.(.....) 软件部经理岗位职责 职位名称:软件部经理 所属部门:软件部 直属上级:技术总监 职位概要:负责软件工程项目的具体实施、自有产品及基础技术的开发。 工作内容:管理、组建公司开发团队,参与公司相关政策的制定;拟定和执行本部门年度、月度目标、工作计划及总结;设计、开发、维护、管理软件产品。 一、直接职责 1、拟定本部门年度、月度目标、工作计划及总结; 2、负责本部门的成本控制工作以及本部门员工的绩效考评及监督、管理工作; 3、参与技术业务制定流程及与其他部门的协调工作; 4、领导技术团队并组织实施年度工作计划,完成年度任务目标; 5、负责管理公司的整体核心技术,组织制定和实施重大技术决策和技术方案; 6、负责协调项目开发或实施的各个环节,把握项目的整体进度; 7、指导、审核项目总体技术方案,对各项目结果进行最终质量评估; 8、会同项目经理共同审核项目组内部测试计划,并组织项目组负责软件项目的后期维护工作; 9、针对部门的发展计划,向公司提供部门员工的培训要求,抓好部门员工的专业培训工作; 10、本部门的发展规划,组织审定部门各项技术标准,编制、完善软件开发流程; 11、负责与其他部门之间的沟通与协作,满足和协调公司各相关部门提出的系统更新、新产品等技术需求; 12、关注国内外软件市场的发展动向、最新技术及信息,组织内部技术交流。一三、配合市场部门开展工作,向市场部门提供必要的技术支持。

14、需求调研中,配合项目经理进行需求调研工作,并对生成的需求调研报告进行审核评定。 一五、明确文档编写种类及格式,对项目组需要生成的文档进行质量、数量和时间控制,并组织召开评审会; 16、制度本部门人员短期和长期需求计划,并配合行政部的人员招聘工作; 二、管理职责 1、抓好本部门项目组总结分析报告工作,定期进行项目分析、总结经验、找出存在的问题,提出改进工作的意见和建议,并组织本部门员工学习,为公司领导决策提供专题分析报告或综合分析资料; 2、开展公司的市场经营和客户服务工作,组织开展市场调查、经营分析,掌握竞争对手动态,及时组织竞争方案的制定和实施,确保公司在市场竞争中的主动; 3、组织实施公司机构和人员的调整设置、绩效考核及二级薪酬分配,提出员工的招聘和使用计划,保证公司内部考核、薪酬分配制度的合理完善及人力资源的有效配置,推进公司目标的实现。提供项目的设计方案,协助公司顺利接下项目; 4、参与工程项目的洽谈、制定和审核工作,对公司所签合同有关软件技术合同部分中工期、技术方案、软件合同额等方面提供技术支持; 5、推进公司企业文化建设,掌握员工主要思想动态,倡导队伍的创新和团队精神,提升公司核心竞争能力; 6、规范部门内部管理,提高员工整体技术水平,把握技术发展方向,使得技术发展方向与主流技术合拍; 7、定期组织部门人员培训,组建一个高效、有朝气、技术过硬的开发团队; 三、工作权限 1、对本部职责范围内的工作有指导、协调、监督管理的权力; 2、下属人员的工作态度,工作岗位等考核权、指导权、分配权; 3、所属人员的违纪、违规纠正权及事实处理权或处理申报权; 4、对本部门项目资金使用的额度内审核权; 5、对软件部人员及公司其他相关人员的技术培训提出指导建议权; 四、管辖范围 软件部所工作及总经理授权范畴。 五、工作标准(或要求) 1、严格遵守公司的各项管理制度,认真履行工作职责,行使公司给予的管理权力,软件部统一对外出口为软件部经理; 2、有效、合理的部署全部门的工作安排; 3、及时掌握客户的需求,针对项目方案做出分析; 4、对软件的整体设计以及调研进行审核及补救; 5、调动部门员工的工作热情,使部门形成良好风气; 6、处理部门突发事件,组织人员及时处置; 六、入职要求 1、计算机及其相关专业,大本以上学历。 2、4年以上软件开发经验及2年研发团队管理经验,有独立带领技术团队开发软件产品的成功案例; 3、精通各类型数据库,并能熟练编写数据库存储过程,触发器,熟悉、模式的项目开发; 4、有制造业项目经验,如仓库管理、车间管理、等;

慕课 离散数学 电子科技大学 课后习题十 答案

作业参考答案——10-特殊图 1.(a)(c)(d)是欧拉图,(a)(b)(c)(d)(e)可以一笔画,(a)(b)(c)(d)(e)(f)(g)是 哈密顿图。 2.根据给定条件建立一个无向图G=,其中: V={a,b,c,d,e,f,g} E={(u,v)|u,v∈V,且u和v有共同语言} 从而图G如下图所示。 a b c d e f g 将这7个人围圆桌排位,使得每个人都能与他两边的人交谈,就是在图G 中找哈密顿回路,经观察上图可得到两条可能的哈密顿回路,即两种方案:abdfgeca和acbdfgea。 3.证明(法一):根据已知条件,每个结点的度数均为n,则任何两个不相邻 的结点v i,v j的度数之和为2n,而图中总共有2n个结点,即deg(v i)+ deg(v j)?2n,满足哈密顿图的充分条件,从而图中存在一条哈密顿回路,当然,这就说明图G是连通图。 证明(法二):用反证法,假设G不是连通图,设H是G的一个连通分支,由于图G是简单图且每个结点的度数为n,则子图H与G-H中均至少有n+1个结点。所以G的结点数大于等于2n+2,这与G中结点数为2n矛盾。所以假设不成立,从而G是连通图。 4.将n位男士和n位女士分别用结点表示,若某位男士认识某位女士,则在 代表他们的结点之间连一条线,得到一个偶图G,假设它的互补结点子集V1、V2分别表示n位男士和n位女士,由题意可知V1中的每个结点度 1

数至少为2,而V2中的每个结点度数至多为2,从而它满足t条件t=1,因此存在从V1到V2的匹配,故可分配。 5.此平面图具有五个面,如下图所示。 a b c d e f g r1r2 r3 r4 r5 ?r1,边界为abca,D(r1)=3; ?r2,边界为acga,D(r2)=3; ?r3,边界为cegc,D(r3)=3; ?r4,边界为cdec,D(r4)=3; ?r5,边界为abcdefega,D(r5)=8;无限面 6.设该连通简单平面图的面数为r,由欧拉公式可得,6?12+r=2,所以 r=8,其8个面分别设为r1,r2,r3,r4,r5,r6,r7,r8。因是简单图,故每个面至少由3条边围成。只要有一个面是由多于3条边所围成的,那就有所有面的次数之和 8∑ i=1 D(r i)>3×8=24。但是,已知所有面的次数之和等于边数的两倍,即2×12=24。因此每个面只能由3条边围成。 2

上海交通大学医学院附属瑞金医院北院

上海交通大学医学院附属瑞金医院北院 2018年度决算

目录 第一部分上海交通大学医学院附属瑞金医院北院概况 一、主要职能 二、机构设置 第二部分上海交通大学医学院附属瑞金医院北院2018年度决算表 一、收入支出决算总表 二、收入决算表 三、支出决算表 四、财政拨款收入支出决算总表 五、一般公共预算财政拨款支出决算表 六、一般公共预算财政拨款基本支出决算表 七、一般公共预算财政拨款“三公”经费及机关运行经费支出决算表 八、政府性基金预算财政拨款支出决算表 九、资产负债情况表 第三部分上海交通大学医学院附属瑞金医院北院2018年度决算情况说明 第四部分名词解释

第一部分上海交通大学医学院附属瑞金医院北院概况 一、主要职能 上海交通大学医学院附属瑞金医院北院是“郊区新建三级 综合医院项目”(“5+3+1”工程)的重要组成部分之一,位于嘉 定新城,于2009 年12月奠基,2012 年12月17日开始试运营。全院占地面积210亩,建筑面积72,000平方米,核定床位600张,核定编制800人,医院目前现有职工(含瑞金派驻及退 休回聘)903人,其中研究生学历272人,中高级职称320人,已开放临床医技科室41个,其中血液科、内分泌科、普外科等 多个瑞金母院固有的优势、重点学科在新院得到了有效的延伸 与发展。 瑞金医院北院的发展将本着“落户嘉定、服务周边”,改善 区域居民对优质医疗资源可及性的建设目标,继续朝着符合公 立医院综合改革总体思想和目标,紧密结合瑞金医院母院,有 所侧重,有所互补,捆绑错位发展;积极融合嘉定,与二级医 院和社区形成三级服务网络,更好地发挥在疑难复杂病例、危 急重症救治等方面的综合服务能力,切实为老百姓带来优质的 医疗服务。 二、机构设置

女人月经提前是什么原因

女人月经提前是什么原因 女人月经提前是什么原因 1、内分泌失调引起的月经提前: 有些女性在生活中压力过大,精神较为紧张,引起神经内分泌功能失调,主要是下丘脑-垂体-卵巢轴的功能不稳定或是有缺陷,从而导致月经提前或月经不调。 2、素体阳气盛引起的月经提前: 素体阳气盛,或过量食用辛辣食物和补品,或情志抑郁,或久病失血较多的人,都容易血热。血得热则枉行,流速也加快,从而导致月经提前。 3、器质病变或药物引起的月经提前: 女性的生殖器官局部的炎症、肿瘤及发育异常、营养不良,颅内疾患,其他内分泌功能失调如甲状腺等都是引起月经提前的原因。 月经提前是怎么回事? 月经提前是月经不调的一个症状。中医认为,月经能否正常来潮,与肝、脾、肾以及冲任二脉关系最大。而导致月经提前的原因,主要和内分泌失调与血热、气虚等因素有关。 中医的角度讲,月经是“天癸”所产生的。古代有“女人二七而天癸至,七七而天癸竭”的说法,讲的是女性到了14岁左右的年龄,会出现月经初次来潮,到了49岁左右,则会停经,这是

一个自然的生理过程。所谓的“天癸”是一个复杂的概念。中医认为天癸是由先天肾气所产生的,它让男女具有生殖能力,并影响人体的生长发育。事实上,这与现代西医所讲的激素是相类似的。中医认为月经是女性生长发育过程中的一个自然现象。月经该到的时候到,该走的时候走,才是顺应自然之道。月经不调,不期而至、不按时而至等都破坏身体平衡,是一种病理现象。 在中医妇科理论中,月经不调的主因为外感六淫、内伤七情、生活所伤、体质因素等。体质禀赋于父母,但受后天环境、饮食、精神、心理、性格、情绪等因素影响大。因此,体质因素导致月经不调,也越来越受到人们的重视。 女人月经提前怎么调理 针挑法:在督脉的阳关穴至腰俞穴之间任意挑选一点,用消毒针挑破表皮0.2-0.3厘米、深约0.1-0.15厘米。自上而下连挑三针,间隔0.1厘米。 敷脐法:生地、地骨皮各12克,丹皮、黄柏、青蒿各10克,研成粉,取少量醋调成厚糊状敷于脐孔上,胶布固定。每日换1次。 敷穴法:蓖麻子仁10克,捣烂如泥,敷于头顶百会穴。见干燥后即更换。 烟熏法:用艾条熏隐白穴,每次20分钟,每日2次。本法最好在月经多前即熏。

山西大学商务学院管理学院科研简报

山西大学商务学院管理学院 科 研 简 报 (2013第9期) 写在前面: 2013年12月10日,管理学院邀请学院科研处王兴超老师对科研团队成员进行了“科研调查方法与数据分析”的指导,王兴超老师结合多篇高水平学术论文就调查问卷的获得、统计软件的选择和应用进行了深入分析,团队成员受益良多,之后,管理学院教师中展开了对科研调查方法和数据分析的进一步研究热潮,本期选择了管理学院李强老师推荐的一篇原载于《调研世界》(2013年10期)、由国家统计局统计科学研究所孙娜娜撰写的短文“回归分析方法你用对了吗”,既供大家借鉴、思考,也希望能对管理学院全体教师有所启发。同时,非常感谢李强老师对管理学院科研管理工作的支持与帮助! 2013年12月 回归分析方法你用对了吗 国家统计局统计科学研究所 孙娜娜 在一家调查公司工作的朋友曾经问过我一个问题,让我至今记忆犹新。他说,他们当时正在给一家公司做汽车销售满意度方面的调查,通过调查得到大概20多个变量的满意度得分,想通过建立统计模型确定各个满意度的权重。他们公司的做法是:根据这些数据建立多元线性回归模型,将各变量的回归系数作为权重。但是在建立模型过程中遇到如下问题:变量之间存在严重的多重共线性,导致许多变量系数,与实际不符,可是这些数据是公司花了几千万元获得的,又不能删除,能使用什么方法对模型进行调整,使其符合实际呢。面对这位朋友的疑问,我一言难尽。 谈及统计方法,大多数学过统计或经济的人首先想到的应该就是线性回归分析。回归分析,是用来研究一个变量(被解释变量)对另一个或多个变量(解释变量)的依赖关系,通过建立模型,寻找数据内部规律,可通过给定的解释变量预

(岗位职责)软件公司各岗位描述

(岗位职责)软件公司各岗 位描述

软件公司岗位说明书 版本号V2010 岗位说明 岗位:项目经理 主要职责: 1、计划: a)项目范围、项目质量、项目时间、项目成本的确认。 b)项目过程/活动的标准化、规范化。 c)根据项目范围、质量、时间和成本的综合因素的考虑,进行项目的总体规划和阶段计划。 d)各项计划得到上级领导、客户方及项目组成员认可。 2、组织: a)组织项目所需的各项资源。 b)设置项目组中的各种角色,且分配好各角色的责任和权限。 c)定制项目组内外的沟通计划。(必要时可按配置管理要求写项目策划目录中的《项目沟通计划》) d)安排组内需求分析师、客户联系人等角色和客户的沟通和交流。 e)处理项目组和其它项目干系人之间的关系。 f)处理项目组内各角色之间的关系、处理项目组内各成员之间的关系。

g)安排客户培训工作。 3、领导: a)保证项目组目标明确且理解壹致。 b)创建项目组的开发环境及氛围,于项目范围内保证项目组成员不受项目其它方面的影响。 c)提升项目组士气,加强项目组凝聚力。 d)合理安排项目组各成员的工作,使各成员工作均能达到壹定的饱满度。 e)制定项目组需要的招聘或培训人员的计划。 f)定期组织项目组成员进行关联技术培训以及和项目关联的行业培训等。 g)及时发现项目组中出现的问题。 h)及时处理项目组中出现的问题。 4、控制 a)保证项目于预算成本范围内按规定的质量和进度达到项目目标。 b)于项目生命周期的各个阶段,跟踪、检查项目组成员的工作质量; c)定期向领导汇报项目工作进度以及项目开发过程中的难题。 d)对项目进行配置管理和规划。 e)控制项目组各成员的工作进度,即时了解项目组成员的工作情况,且能快速的解决项目组成员所碰到的难题。 f)不定期组织项目组成员进行项目以外的短期活动,以培养团队精神。 结语:项目经理是于整个项目开发过程中项目组内对所有非技术性重要事情做出最终决定的人。

女孩初潮时间一般是几天

如对您有帮助,可购买打赏,谢谢 女孩初潮时间一般是几天 导语:对于女孩而言,月经初潮后就是少女了,正式的进入了青春期,卵巢健康发育,第二性征开始显现。月经初潮一般是4~5天,青春期卵巢发育功能不 对于女孩而言,月经初潮后就是少女了,正式的进入了青春期,卵巢健康发育,第二性征开始显现。月经初潮一般是4~5天,青春期卵巢发育功能不完善,体内各个系统在成长阶段,没有稳定成熟,所以来过初潮后,下次再来就很难预料。而且会受到许多外界因素的干扰如体质、情绪、饮食等,出现月经紊乱的现象。不过不需要过分担心,在经期做好私部卫生,合理饮食,经过自我调节,就可以过度到正常的月经了。 女孩的第1次月经称为月经初潮(Menarche)。大多数女孩的初潮年龄为12-14岁。出现初潮之前,女孩的乳房已经开始发育,身高突然增长,也有的已经长出了阴毛或腋毛。一般地,初潮常常是不排卵月经,初潮后数月至1年才有排卵。 一般经过4~5天,子宫内膜大部分脱落完毕,在女性激素的作用下,又重新长出一层子宫内膜,并逐渐增厚,这时月经也就干净了。 在月经初潮时,卵巢重量仅为成熟时的40%。以后卵巢继续发育长大。由于卵巢的功能和调节机能不稳定,在月经初潮后的半年到一年时间内,月经不一定按规律每月来潮,初潮后,有的隔几个月、半年甚至一年才第二次来潮,这不是病理现象,以后会逐月按时来潮。每次月经出血持续5天左右,为月经期。 月经是女性的正常生理现象,对于初次来潮的女孩,都会经历不适和恐慌,然而月经的到了说明了身体的成熟,生理的转变,是非常重要的时刻,应该做好足够的自我保健,保养好身体。 预防疾病常识分享,对您有帮助可购买打赏

上海各大医院排名及专治各科

综合排名: 综合排名比得主要是综合医院,专科医院就不参与了,这当中也包括三甲中医院,因为现在三甲中医院也是科室齐全,只不过多了个“中”字而已 1,复旦大学附属上海华山医院 上海人心中的永远的金字招牌,无论关于上海哪家医院排第一的理论到底有多多,最起码,华山医院这上海第一在上海人心中是肯定的!再看,《2007年全国医院排名》华山医院全国第三,上海第一;2009年全年门急诊量279万,全国第二,仅次于解放军总医院的300万;2009年出院人数4.7万,少于瑞金医院的5.5万,上海第二,综上,华山医院上海第一无可厚非。中国科学院院士一人,中国工程院院士两人,上海第一家接受JCI评审的综合医院,10个国家重点科室上海第一,全国仅次于协和医院......华山医院上海第一,想必应该如此2,上海交大附属瑞金医院 《2007年全国排名》全国第五,上海第二,2009年全员出院人次上海第一,中国科学院院士人,中国工程院院士2人,瑞金的实力无需多说,和华山不相上下。 3,复旦大学附属上海中山医院 虽然《2007年全国医院排名》把仁济医院排在全国第八,上海第三,但拥有中国科学院院士,工程院院士各1人,还有那么多重点专科的中山医院......够了,不多说。 争议就从第四名开始了

以下都是我个人意见: 4,上海交大附属仁济医院 5,第二军医大附属长海医院 6,上海交大附属新华医院 7,第二军医大附属长征医院 8,上海中医药大学附属曙光医院 9,上海中医药大学附属龙华医院 10,同济大学附属上海同济医院 分科排名(分科排名就不列举前10了,有名的我就写上,也算是指导大家去上海就医的选择吧) 内科: 神经内科:1,复旦大学附属上海华山医院;2,复旦大学附属上海中山医院;3,复旦大学附属儿科医院 心内科:1,复旦大学附属上海中山医院;2,复旦大学附属上海新华医院;3,复旦大学附属上海华山医院 消化内科:1,上海交大附属仁济医院;2,复旦大学附属上海中山医院;3,上海交大附属瑞金医院 呼吸内科:1,上海交大附属新华医院;2,第二军医大附属长海医院;3,同济大学附属上海同济医院 内分泌科:1,上海交大附属瑞金医院;2,上海交大附属仁济医院;3,同济大学附属上海同济医院

2020年山西大学商务学院招聘辅导员试题及答案

2020年山西大学商务学院招聘辅导员试题及答案 注意事项 1、请用钢笔、圆珠笔或签字在答题卡相应位置填写姓名、准考证号,并用2B铅笔在答题卡指定位置填涂准考证号。 2、本试卷均为选择题,请用2B铅笔在答题卡上作答,在题本上作答一律无效。 一、单项选择题(在下列每题四个选项中只有一个是最符合题意的,将其选出并把它的标号写在题后的括号内。错选、多选或未选均不得分。) 1、认知心理学把理解问题看作是在头脑中形成()的过程。 A、问题结构 B、问题线索 C、问题内容 D、问题空间 【答案】D 2、人们在谈论现在的孩子比过去的聪明,这说明儿童心理特征的()。 A、延续性 B、多变性 C、稳定性 D、可变性 【答案】D 3、德育工作的出发点是()。 A、德育内容 B、德育目标 C、德育过程 D、德育原则 【答案】B 4、()是教师备课和上课的主要依据。 A、教学大纲 B、教科书 C、参考书 D、教学进度计划 【答案】B 5、艾宾浩斯的遗忘曲线表明,遗忘过程在学习后()内进展最快。 A、31天

C、1天 D、20分钟 【答案】D 6、形状知觉的关键期是出生后到()。 A、四岁左右 B、二岁左右 C、六岁左右 D、五岁左右 【答案】B 7、提出“捧着一颗心来,不带半根草去”的是著名的教育家()。 A、陈立奇 B、陶行知 C、晏阳初 D、梁启超 【答案】B 8、学生认识的主要任务是()。 A、获得直接经验 B、进行科学实验 C、进行社会实践 D、学习间接经验 【答案】D 9、“君子之教,喻也”体现了教学的启发式原则,这一句话出自()。 A、《中庸》 B、《大学》 C、《论语》 D、《学记》 【答案】D 10、通过摆事实、讲道理,使幼儿明辨是非的教育方法是()。 A、情感陶冶法 B、说理教育法 C、品德评价法 D、实际锻炼法

软件公司岗位说明书

软件公司岗位说明 书

软件公司岗位说明书 版本号 V

岗位说明 岗位:项目经理 主要职责: 1、计划: a)项目范围、项目质量、项目时间、项目成本的确认。 b)项目过程/活动的标准化、规范化。 c)根据项目范围、质量、时间与成本的综合因素的考虑,进行项目的总体规划与阶段计划。 d)各项计划得到上级领导、客户方及项目组成员认可。 2、组织: a)组织项目所需的各项资源。 b)设置项目组中的各种角色,并分配好各角色的责任与权限。 c)定制项目组内外的沟通计划。(必要时可按配置管理要求写项目策划目录中的<项目沟通计划>) d)安排组内需求分析师、客户联系人等角色与客户的沟通与交流。 e)处理项目组与其它项目干系人之间的关系。 f)处理项目组内各角色之间的关系、处理项目组内各成员之间的关系。 g)安排客户培训工作。

3、领导: a)保证项目组目标明确且理解一致。 b)创立项目组的开发环境及氛围,在项目范围内保证项目组成员不受项目其它方面的影响。 c)提升项目组士气,加强项目组凝聚力。 d)合理安排项目组各成员的工作,使各成员工作都能达到一定的饱满度。 e)制定项目组需要的招聘或培训人员的计划。 f)定期组织项目组成员进行相关技术培训以及与项目相关的行业培训等。 g)及时发现项目组中出现的问题。 h)及时处理项目组中出现的问题。 4、控制 a)保证项目在预算成本范围内按规定的质量和进度达到项目目标。 b)在项目生命周期的各个阶段,跟踪、检查项目组成员的工作质量; c)定期向领导汇报项目工作进度以及项目开发过程中的难题。 d)对项目进行配置管理与规划。 e)控制项目组各成员的工作进度,即时了解项目组成员的工作情况,并能快速的解决项目组成员所碰到的难题。

正常女性的月经周期

正常女性的月经周期为28天左右,如果月经来潮周期总是提前7天以上,甚至1个月内两次来潮者,则称为“月经先期”,亦称“经期提前”或“经早”。如仅超前3-5天,且无其他明显症状,属正常范围。偶尔超前一次,也不算经期提前。 “红色风暴”的成因: 中医认为,月经能否正常来潮,与肝、脾、肾以及冲任二脉关系最大。而导致月经提前的原因,主要与以下两种因素关系最为密切。 因素一:血热 素体阳气盛,或过量食用辛辣食物和补品,或情志抑郁,或久病失血较多的人,都容易血热。血得热则枉行,流速也加快,以致经期提前。《丹溪心法》说:“经水不及期而来者,血热也。”血热又有实热、虚热,肝郁化热之别。 因素二:气虚 饮食失节或劳累过度的人最易损伤脾气。脾是血的“管理者”,“管理者”孱弱,“被管理者”难免乘机“兴风做浪”,导致月经提前来潮。如《景岳全书妇人规》云:“若脉证无火,而经早不及期者,乃心脾气虚,不能固摄而然。” 遏制“红色风暴”的中医之道: 对月经提前的治疗,国医国药比现代医学疗效更为确切。祖国医学认为,月经提前的治疗原则,重在调经以治本,一般而言,如先病而后月经提前,当先治病,病去则经自调;若因经不调而后生病者,当先调经,经调则病自除。 “红色风暴”之实热型: 信号:月经提前,量多,颜色深红或紫红,质地黏稠,心胸烦闷,面红口干,尿黄便秘,舌红苔黄。 治宜清热凉血,方用清经汤加减。 方例:丹皮10克,地骨皮10克,生地15克,白芍15克,青蒿12克,黄柏10克。 若口干口渴较重者,则加元参、知母清热生津;若经血量多且数日不减者,加黄连、炒栀子、侧柏炭、阿胶等清热止血。 药膳: 藕柏饮取生藕节300克,侧柏叶100克,捣烂取汁,加冰糖适量,用温开水冲服,每日两次,经前连服3-5天。 地黄粥鲜生地洗净切片,煮浓汁滤出,粳米粥加蜜(或冰糖)适量,入地黄汁100毫升,调匀,每日服两次,每次250毫升左右,经前连服4-6天。 大蓟速溶饮鲜大蓟2500克,洗净切碎,加水适量,中火煮1小时,去渣,以文火浓缩。停火待温,入白糖500克,搅拌均匀,冷却晾干。每次10克,沸水冲服,每日3次,经前服用。 食疗: 取干芹菜500克,加水1000毫升,煎取500毫升汁液,可常服,疗效显著。 取丝瓜籽50克,刺菜30克,水煎,加白糖适量内服。 取干芹菜50克,金针菜15克,加水300毫升,煎取200毫升汁液,月经前每天服1剂,连服5-7天。“红色风暴”之虚热型: 信号:经期提前,量少,颜色红,质地黏稠,手足心热,两颧潮红,舌红少苔。 治疗******以养阴清热为主,方用两地汤。 方例:生地15克,玄参10克,白芍15克,麦冬10克,地骨皮10克,阿胶10克(烊化)。 若午后潮热者,加青蒿、鳖甲。 药膏: 两地膏(两地汤改型) 取生地、地骨皮各30克,玄参、麦冬、白芍各15克,加水煎取浓汁300毫升。阿胶30克,加水60毫升烊化,对入药汁内,再加白蜜40毫升,放文火上调匀。每次服20毫升,每日3次。冬地膏天冬、麦冬、生地各250克,水煎去渣,加蜜适量收膏,每次服10毫升,每天3次,经前3-5天

山西大学商务学院管理学院学年论文实施细则

山西大学商务学院管理学院 学年论文实施细则 为了进一步培养学生的科学态度和书面表达能力,使学生具备初步的科学研究能力,掌握科学方法,根据《人才培养方案》的要求,特制定学年论文的实施细则。 一、学年论文的工作程序 (一)学年论文的选题 在教师指导下,按照本专业的培养目标和专业方向,从本专业的基础理论、学术问题或从科技、生产、教学和社会生活的实际问题中选定。坚持教师提供题目和学生自主选题相结合的原则,支持学生选做有创新特色的课题。 (二)指导教师对学生论文进行指导、评定,给出论文成绩。 (三)管理学院存档并汇总学年论文成绩,按照要求上报教务处。 二、学年论文的指导 (一)指导教师的确定 学年论文选派治学严谨、认真负责、具有一定科研能力的专职教师担任,鼓励青年教师通过独立指导学年论文提高水平; (二)论文指导教师应履行的职责 1.根据专业教学要求指导学生选题。 2.向学生讲清选题意义、任务,提出明确要求,介绍主要参考文献、资料目录。 3.指导学生拟定学年论文提要。 4.对所指导论文提出评阅意见,写出评语,填写《学年论文成绩评审表》。 三、学年论文的要求 (一)总体要求 学年论文主要是围绕本专业课程而开展的综合训练。学生可根据自己的兴趣在所学专业领域内选择题目,必须在毕业前完成1篇学年论文,且成绩达到合格水平。否则,不得参加毕业论文的撰写与答辩。 (二)具体撰写要求

学年论文每篇不少于3000字,学年论文一律按照学院要求的格式采用A4纸双面打印,学年论文的各个组成部分按下述顺序排列: (1)封面; (2)目录; (3)正文(包括中文内容摘要和关键词); (4)参考文献; (5)学年论文成绩评审表。 学年论文各部分的具体格式范式见附表二。其中:(1)-(4)项内容按照顺序装订,(5)由指导教师评定成绩、等级与评语后夹在论文中,不与论文一起装订。 四、成绩评定 1、学年论文成绩实行优、良、中、差四级制和百分制双轨计分法,成绩均四舍五入保留整数。每个专业的学年论文优秀率不大于20%,成绩必须符合正态分布。 2、每篇学年论文由指导教师写出评语,给出论文成绩与等级。 3、学年论文成绩及格以上者(含及格)取得2学分。论文成绩不及格者必须重作,及格后方可获得学分。 五、组织与时间安排 1、管理学院主管领导负责学年论文工作计划的制定、指导教师的配备、组织选题、成绩考核、存档等工作。 2、在第5学期期末组织学年论文的撰写安排,第6学期按照学院教务处规定录入成绩,上报、存档。 六、评分标准 优秀(85分-100分): 1. 写作态度认真,按期圆满完成学年论文。 2.论文观点明确,语言表达流畅,论证充分全面,逻辑严密,结构层次清楚。 3.论文整体水平高,有独立分析问题、解决问题的能力。 4. 书写工整,格式及标点规范。

女人停经的正常年龄

巢之安牌知本天韵胶囊本产品不能替代药物使用 女人停经的正常年龄 一般女性正常绝经年龄应该在53~55岁。过早停经将会导致卵巢早衰萎缩,激素分泌功能下降,女性的衰老速度也会急剧加快。所以,拥有健康而有活力的卵巢是女性保持年轻态的关键所在。 一般从卵巢功能衰退至月经停止,月经变化的情况有三种: (1)稀发月经:月经周期间隔时间长,由正常20~30天变为2~3个月或更长的时间行经一次。经量可正常或较前减少,间隔时间逐渐延长到4~5个月或半年才行经一次,以后则完全停止。 (2)月经周期紊乱:从正常的月经周期变为不定期的阴道出血,有时经期延长或变为持续性阴道出血,淋漓不断达1~2个月不止;也可发生大量阴道出血,病人可发生贫血,面色萎黄,全身乏力,心慌,气短。严重者血红蛋白可明显降低。有的反复出血,一般经1~2年,月经即完全停止。绝经前月经周期紊乱是最常

巢之安牌知本天韵胶囊本产品不能替代药物使用见的。据报道,有人对282例绝经前妇女进行观察,发现其中181例有月经周期紊乱表现,占63.8%。 (3)突然绝经:少数妇女过去月经周期及经期一直正常,现在突然绝经;也有的周期正常,仅有几次月经量逐渐减少,以后月经突然停止。据报道对282例自然绝经妇女进行观察,发现其中40例突然绝经,占14.1%。因此,多数为前两种表现。 养成良好的生活习惯: 勤加运动,每天进行1-2小时的有氧运动;不熬夜、早睡早起给身体以及卵巢有一个良好的休息保养时间;远离烟酒,现代生活节奏的加快很多女性也会选择抽烟喝酒来释放压力,但是烟酒对女性身体的伤害是巨大的,包括对月经的伤害,吸烟者和偶尔吸烟者一般比非吸烟者早2年绝经。 注意饮食营养均衡,膳食要搭配好,不能过于追求苗条的身材而过度减肥,过度减肥对身体的伤害也是极大的;要保持乐观的心态,保持好的心情。 巢之安知本天韵胶囊是滋养卵巢延缓衰老的营养性蓝帽子产品,配方创新新型复合卵巢营养素(即IFS),“新型复合卵巢营养素IFS”,与卵巢具有极强

软件研发部岗位职责

软件研发部岗位职责-标准化文件发布号:(9456-EUATWK-MWUB-WUNN-INNUL-DDQTY-KII

技术部门岗位职责 2 软件研发部 部门职责 1.应用软件开发方向规划; 2.应用软件开发工具选购; 3.软件系统整体方案规划; 4.应用软件系统开发设计; 5.软件系统测试规划实施; 6.应用软件系统项目评审; 7.应用软件项目疑难问题处理; 8.应用软件疑难故障分析处理; 9.软件人力资源组织/考评; 10.应用软件开发团队组织; 11.应用软件工程师集训学习; 12.应用软件体系框架设计与定制; 13.应用软件技术积累与探索; 14.应用软件开发技术规范编制; 15.应用软件的技术资料管理; 16.应用软件知识产权等相关文档编制; 17.应用软件的鉴定、认证; 18.应用软件的质量体系认证。 部门经理职责 1.全面负责软件研发部日常管理工作; 2.规范软件体系设计,监督相应的设计开发过程; 3.负责建立软件系统资源库,实现资源重用; 4.负责软件研发团队建设和技术人员的招聘、培养与考评; 5.制定和落实部门项目研发开发计划,总体掌握研发进度。 6.确定软件部技术研究方向,组织人员对关键技术进行攻关和积累; 7.指导/评审/公司项目软件部分的开发活动; 8.解决公司产品线中相关的技术难题,提供技术支持; 9.统筹协调软件研发部与其它部门的关系; 10.负责相关技术资料的整理; 11.负责相关知识产权等技术文档编制; 12.完成公司交办的其它工作。

部门副经理职责 1.协助经理完成日常管理工作; 2.完成分管的方面技术工作; 3.经理不在时,代经理处理部门事务; 4.按计划推进自己负责项目的实施; 5.参与指导/评审/公司项目应用软件部分的开发活动; 6.协助经理进行团队建设、人员培养和考评; 7.负责相关技术领域的技术积累和整理; 8.解决公司产品线中相关的技术难题; 9.负责相关技术资料的整理; 10.负责相关知识产权等技术文档编制; 11.融会贯通上下级之间的协作、交流和沟通; 12.负责公司或部门交办的其它工作。 工程师职责 网络系统软件工程师 1.基本的计算机应用能力、英文阅读能力和知识产权能力; 2.常用的计算机操作系统、通用编程语言和数据库基础; 3.常用数据库设计、维护、管理基础; 4.简单前端界面设计基础:JS/AS/CSS+DIV; 5.常见网络系统软件体系架构:C/S、B/S; 6.网络系统应用软件的方案与实施规划; 7.C/C++网络系统软件编制设计/测试/调试/发布; 8.Java-J2EE-SSH/SSI网络系统软件编制设计/测试/调试/发布; 9.C#/F#网络系统软件编制设计/测试/调试/发布; 10.常见车-地有线/无线网络传输协议及其软件实现; 11.相关技术资料的整理与技术文档写作能力; 12.完成临时交办的其它技术任务。 前端界面设计工程师 1.基本的计算机应用能力、英文阅读能力和知识产权能力; 2.常用的计算机操作系统、通用编程语言和数据库基础; 3.车-地信号设备、运行图与信息管理知识基础; 4.脚本语言基础:JS、AS、CSS+DIV、Ajax、Json/XML等; 5.美工工具基础:Photoshop、Flash、3D-Max等; 6.图形图像处理基础:过滤、增强、渲染、突出、钝化等; 7.网页动态用户界面的方案和实施规划; 8.网页动态用户界面的开发、编程、测试; 9.网页动态用户界面的分析、提取与转变能力; 10.网络流媒体音视频播放及其软件开发; 11.相关技术资料的整理与技术文档写作能力; 12.完成临时交办的其它技术任务。

山西大学商务学院学生学费收缴管理办法

山西大学商务学院学生学费收缴管理办法 一、我院是按新机制和新模式举办的一所高等学校,学费是学院办学经费的主要来源。为保证教学科研经费正常使用,促进学院教育事业健康发展,根据《中华人民共和国高等教育法》、《普通高等学校学生管理规定》和学院实际情况特制定本办法。 二、高等教育是非义务教育,学生应当按国家规定缴纳学费及有关费用。 三、学院必须按照政府物价部门批准的收费项目和收费标准向学生收取学费。学费标准实行“老生老办法,新生新办法”。学费由学院财会处统一收取,统一开具财政部门监制的票据。 四、学费按学年度收取。每学年开学两周内为学生缴费期,学生必须在学院规定的时间内将学费及其他有关费用交到财会处,凭交费票据到各系部注册。财会处要建立学生学费台帐,随时给学生提供查询、对帐服务,每学期要为各系及有关部门提供两次学生交、欠费名单。 五、教育和督促学生按时、足额缴纳学费是财会处、教务处、学工部和各系部的重要工作职责。学费收缴实行系责任制,和各系经费挂钩,以各系部为单位,学生综合实际缴费率达到98%是基本工作要求,因学生家庭困难等特殊原因,允许有2%范围内缓交。缓交期限不超过一个学期。 六、学院积极鼓励和资助经济困难学生顺利完成学业。由于国家政策原因,原则上学院不受理第三批本科学生的困难申请,其经济困难的学生应积极自筹,学院通过校内助学贷款、奖学金、困难补助和勤工助学等形式予以帮助。对于缓交学费的学生,要由本人提出申请,学生家庭地方政府证明,班主任签字,所在系部书记审查提出意见,由主管教学副院长批准。减免学费者须经院长批准。 七、学生应自觉履行按时足额缴纳学费的义务。对无故不能按时缴费的学生按以下规定办理: 1、各系部不准办理学籍注册,不准参加学院组织的各种考试,如强行参加考试成绩无效,缴纳学费以后可以参加重修。此项工作责任者为教务处和各系部负责注册的人员及教学干事。 2、督促学生按时交纳学费是系部学生管理人员的一项重要工作职责,并作为聘评职级的条件之一。对无故不交学费的学生不得列入入党培养对象,取消各种评优、评奖资格,不得享受学院困难补助,勤工助学等补助。辅导员应向欠缴学费的学生家长转达学院的有关规定,协商解决办法,仍坚持不交费的学生应劝其离校。此项工作责任者为学工部和各系部辅导员。 3、学生在毕业离校前未交清学费,缓发毕业证和学位证,不予办理派遣手续,不予办理户口迁移,此项工作的责任者为教务处、就业指导中心和保卫处。 4、各系部要将因特殊困难经批准缓交费学生名单,在开学后一个月内报财会处、

相关文档
相关文档 最新文档