Technological innovations have revolutionized the educational technology into various dimensions. Educational processes without educational technology have no value in this modern world. In education domain, the educa...Technological innovations have revolutionized the educational technology into various dimensions. Educational processes without educational technology have no value in this modern world. In education domain, the educational software has simplified the processes in greater extend. A implemented while developing such educational software. In particu proper lar, the development methodology has to be software developed to enrich these education processes should follow a development strategy to motivate the end users to utilize the hypermedia potentials. The software development life cycle (SDLC) has different phases in designing such educationa technology and assists the end users to benefit from the modern technology. This study identifies the various factors to be considered at each phase of the SDLC while developing educational software. Also, this study proposes some suggestions to be followed in ESDLC with respect to educational processes perspectives. The core idea of this study is to identify the various issues in implementing such educational software in day to day teaching and learning processes.展开更多
Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).T...Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications.展开更多
A carefully planned software development process helps in maintaining the quality of the software.In today’s scenario the primitive software development models have been replaced by the Agile based models like SCRUM,...A carefully planned software development process helps in maintaining the quality of the software.In today’s scenario the primitive software development models have been replaced by the Agile based models like SCRUM,KANBAN,LEAN,etc.Although,every framework has its own boon,the reason for widespread acceptance of the agile-based approach is its evolutionary nature that permits change in the path of software development.The development process occurs in iterative and incremental cycles called sprints.In SCRUM,which is one of the most widely used agile-based software development modeling framework;the sprint length is fixed throughout the process wherein;it is usually taken to be 1–4 weeks.But in practical application,the sprint length should be altered intuitively as per the requirement.To overcome this limitation,in this paper,a methodical work has been presented that determines the optimal sprint length based on two varied and yet connected attributes;the cost incurred and the work intensity required.The approach defines the number of tasks performed in each sprint along with the corresponding cost incurred in performing those tasks.Multi-attribute utility theory(MAUT),a multi-criterion decision making approach,has been utilized to find the required trade-off between two attributes under consideration.The proposed modeling framework has been validated using real life data set.With the use of the model,the optimal sprint for each sprint could be evaluated which was much shorter than the original length.Thus,the results obtained validate the proposal of a dynamic sprint length that can be determined before the start of each sprint.The structure would help in cost as well as time savings for a firm.展开更多
The evaluation system of R&D project beforehand, in the course and afterwards embodies the principle and standard of the cycle economy, which can not only avoid the negative effects caused, by the utilization of the ...The evaluation system of R&D project beforehand, in the course and afterwards embodies the principle and standard of the cycle economy, which can not only avoid the negative effects caused, by the utilization of the achievements of R&D project in the industry but also point out the direction and criterion of R&D activities for the enterprises, which also provides the "model" that can be used for reference for maintaining the durable competitiveness of the enterprises.展开更多
This paper introduces the high-speed electrical multiple unit (EMO) life cycle, including the design, manufacturing, testing, and maintenance stages. It also presents the train control and monitoring system (TCMS)...This paper introduces the high-speed electrical multiple unit (EMO) life cycle, including the design, manufacturing, testing, and maintenance stages. It also presents the train control and monitoring system (TCMS) software development platform, the TCMS testing and verification bench, the EMU driving simulation platform, and the EMU remote data transmittal and maintenance platform. All these platforms and benches combined together make up the EMU life cycle cost (LCC) system. Each platform facilitates EMU LCC management and is an important part of the system.展开更多
Low-impact development (LID) technologies, such as bioretention areas, rooftop rainwater harvesting, a_nd xeris_caping can co_ntrol stormwater runoff, supply non-potable water, and landscape open space.TillS study e...Low-impact development (LID) technologies, such as bioretention areas, rooftop rainwater harvesting, a_nd xeris_caping can co_ntrol stormwater runoff, supply non-potable water, and landscape open space.TillS study examines a hybrid system (HS) that combines LID technologies with a centralized water system to lessen the burden on a conventional system (CS). CS is defined as the stormwater collection and water supply infrastructure, and the conventional landscaping choices in the City of Atlanta. The study scope is limited to five single-family residential zones (SFZs), classified R-1 through R-5, and four multi-family residential zones (MFZs), classified RG-2 through RG-5. Population density increases from 0.4 (R-1) to 62.2 (RG-5) persons per 1,000 m2. We performed a life cycle assessment (LCA) comparison of CS and HS using TRACI 2.1 to simulate impacts on the ecosystem, human health, and natural resources. We quantified the impact of freshwater consumption using the freshwater ecosystem impact (FEI) indicator. Test results indicate that HS has a higher LCA single score than CS in zones with a low population density; however, the difference becomes negligible as population density increases. Incorporating LID in SFZs and MFZs can reduce potable water use by an average of 50%. and 25%,respectively.; however, water savings are negligible in zones with high population density (i.e., RG-5) due to the diminished surface area per capitaavailable for LID technoogies. The results demonstrate that LID technologies effectively reduce outdoor water demand and therefore would be a good choice to decrease the water consumption impact in the City of Atlanta.展开更多
Requirement gathering for software development project is the most crucial stage and thus requirement engineering (RE) occupies the chief position in the software development. Countless techniques concerning the RE pr...Requirement gathering for software development project is the most crucial stage and thus requirement engineering (RE) occupies the chief position in the software development. Countless techniques concerning the RE processes exist to make sure the requirements are coherent, compact and complete in all respects. In this way different aspects of RE are dissected and detailed upon. A comparison of RE in Agile and RE in Waterfall is expatiated and on the basis of the literature survey the overall Agile RE process is accumulated. Agile being a technique produces high quality software in relatively less time as compared to the conventional waterfall methodology. The paramount objective of this study is to take lessons from RE that Agile method may consider, if quality being the cardinal concern. The study is patterned on the survey of the previous research reported in the coexisting literature and the practices which are being pursued in the area.展开更多
Exposure to some toxic compounds causes structural and behavioral anomalies associated with the neurons in the later stage of life.Those toxic compounds are termed as a neurotoxicant,which can be a physical factor,a t...Exposure to some toxic compounds causes structural and behavioral anomalies associated with the neurons in the later stage of life.Those toxic compounds are termed as a neurotoxicant,which can be a physical factor,a toxin,an infection,radiation,or maybe a drug.The incongruities caused due to a neurotoxicant further depend on the toxicity of the compound.More importantly,the neurotoxicity of the compound is associated with the concentration and the time point of exposure.The neurodevelopmental defect appears depending on the toxicity of the compound.A neurodevelopmental defect may be associated with a delay in developmental time,defective growth,structural abnormality of many organs,including sensory organs,behavioral abnormalities,or death in the fetus stage.Numerous model organisms are employed to assess the effect of neurotoxicants.The current review summarizes several methods used to check the effect of neurotoxicant and their effect using the model organism Drosophila melanogaster.展开更多
At present,hundreds of cloud vendors in the global market provide various services based on a customer’s requirements.All cloud vendors are not the same in terms of the number of services,infrastructure availability,...At present,hundreds of cloud vendors in the global market provide various services based on a customer’s requirements.All cloud vendors are not the same in terms of the number of services,infrastructure availability,security strategies,cost per customer,and reputation in the market.Thus,software developers and organizations face a dilemma when choosing a suitable cloud vendor for their developmental activities.Thus,there is a need to evaluate various cloud service providers(CSPs)and platforms before choosing a suitable vendor.Already existing solutions are either based on simulation tools as per the requirements or evaluated concerning the quality of service attributes.However,they require more time to collect data,simulate and evaluate the vendor.The proposed work compares various CSPs in terms of major metrics,such as establishment,services,infrastructure,tools,pricing models,market share,etc.,based on the comparison,parameter ranking,and weightage allocated.Furthermore,the parameters are categorized depending on the priority level.The weighted average is calculated for each CSP,after which the values are sorted in descending order.The experimental results show the unbiased selection of CSPs based on the chosen parameters.The proposed parameter-ranking priority level weightage(PRPLW)algorithm simplifies the selection of the best-suited cloud vendor in accordance with the requirements of software development.展开更多
Cyber-physical systems are being confronted with an ever-increasing number of security threats from the complicated interactions and fusions between cyberspace and physical space.Integrating security-related activitie...Cyber-physical systems are being confronted with an ever-increasing number of security threats from the complicated interactions and fusions between cyberspace and physical space.Integrating security-related activities into the early phases of the development life cycle is a monolithic and cost-effective solution for the development of security-critical cyber-physical systems.These activities often incorporate security mechanisms from different realms.We present a fine-grained design flow paradigm for security-critical and software-intensive cyber-physical systems.We provide a comprehensive survey on the domain-specific architectures,countermeasure techniques and security standards involved in the development life cycle of security-critical cyber-physical systems,and adapt these elements to the newly designed flow paradigm.Finally,we provide prospectives and future directions for improving the usability and security level of this design flow paradigm.展开更多
The aim of this study was to develop an adequate mathematical model for long-term forecasting of technological progress and economic growth in the digital age (2020-2050). In addition, the task was to develop a model ...The aim of this study was to develop an adequate mathematical model for long-term forecasting of technological progress and economic growth in the digital age (2020-2050). In addition, the task was to develop a model for forecast calculations of labor productivity in the symbiosis of “man + intelligent machine”, where an intelligent machine (IM) is understood as a computer or robot equipped with elements of artificial intelligence (AI), as well as in the digital economy as a whole. In the course of the study, it was shown that in order to implement its goals the Schumpeter-Kondratiev innovation and cycle theory on forming long waves (LW) of economic development influenced by a powerful cluster of economic technologies engendered by industrial revolutions is most appropriate for a long-term forecasting of technological progress and economic growth. The Solow neoclassical model of economic growth, synchronized with LW, gives the opportunity to forecast economic dynamics of technologically advanced countries with a greater precision up to 30 years, the time which correlates with the continuation of LW. In the information and digital age, the key role among the main factors of growth (capital, labour and technological progress) is played by the latter. The authors have developed an information model which allows for forecasting technological progress basing on growth rates of endogenous technological information in economics. The main regimes of producing technological information, corresponding to the eras of information and digital economies, are given in the article, as well as the Lagrangians that engender them. The model is verified on the example of the 5<sup>th</sup> information LW for the US economy (1982-2018) and it has had highly accurate approximation for both technological progress and economic growth. A number of new results were obtained using the developed information models for forecasting technological progress. The forecasting trajectory of economic growth of developed countries (on the example of the USA) on the upward stage of the 6<sup>th</sup> LW (2018-2042), engendered by the digital technologies of the 4<sup>th</sup> Industrial Revolution is given. It is also demonstrated that the symbiosis of human and intelligent machine (IM) is the driving force in the digital economy, where man plays the leading role organizing effective and efficient mutual work. Authors suggest a mathematical model for calculating labour productivity in the digital economy, where the symbiosis of “human + IM” is widely used. The calculations carried out with the help of the model show: 1) the symbiosis of “human + IM” from the very beginning lets to realize the possibilities of increasing work performance in the economy with the help of digital technologies;2) the largest labour productivity is achieved in the symbiosis of “human + IM”, where man labour prevails, and the lowest labour productivity is seen where the largest part of the work is performed by IM;3) developed countries may achieve labour productivity of 3% per year by the mid-2020s, which has all the chances to stay up to the 2040s.展开更多
Urban water-related problems associated with rapid urbanization, including waterlogging, water pollution, the ecological degradation of water, and water shortages, have caused global concerns in recent years. In 2013,...Urban water-related problems associated with rapid urbanization, including waterlogging, water pollution, the ecological degradation of water, and water shortages, have caused global concerns in recent years. In 2013, in order to mitigate increasingly severe urban water-related problems, China set forth a new strategy for integrated urban water management(IUWM) called the "Sponge City". This is the first holistic IUWM strategy implemented in a developing country that is still undergoing rapid urbanization, and holds promise for application in other developing countries. This paper aims to comprehensively summarize the sponge city. First, this paper reviews prior studies and policies on urban water management in China as important background for the sponge city proposal. Then, the connotations, goals, and features of the sponge city are summarized and discussed.Finally, the challenges, research needs, and development directions pertinent to the sponge city are discussed based on investigations and studies conducted by the authors. The sponge city in China has a short history—given this, there are many issues that should be examined with regard to the stepwise implementation of the Sponge City Programme(SCP). Accordingly, the authors perceive this study as only the beginning of abundant studies on the sponge city.展开更多
文摘Technological innovations have revolutionized the educational technology into various dimensions. Educational processes without educational technology have no value in this modern world. In education domain, the educational software has simplified the processes in greater extend. A implemented while developing such educational software. In particu proper lar, the development methodology has to be software developed to enrich these education processes should follow a development strategy to motivate the end users to utilize the hypermedia potentials. The software development life cycle (SDLC) has different phases in designing such educationa technology and assists the end users to benefit from the modern technology. This study identifies the various factors to be considered at each phase of the SDLC while developing educational software. Also, this study proposes some suggestions to be followed in ESDLC with respect to educational processes perspectives. The core idea of this study is to identify the various issues in implementing such educational software in day to day teaching and learning processes.
文摘Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications.
文摘A carefully planned software development process helps in maintaining the quality of the software.In today’s scenario the primitive software development models have been replaced by the Agile based models like SCRUM,KANBAN,LEAN,etc.Although,every framework has its own boon,the reason for widespread acceptance of the agile-based approach is its evolutionary nature that permits change in the path of software development.The development process occurs in iterative and incremental cycles called sprints.In SCRUM,which is one of the most widely used agile-based software development modeling framework;the sprint length is fixed throughout the process wherein;it is usually taken to be 1–4 weeks.But in practical application,the sprint length should be altered intuitively as per the requirement.To overcome this limitation,in this paper,a methodical work has been presented that determines the optimal sprint length based on two varied and yet connected attributes;the cost incurred and the work intensity required.The approach defines the number of tasks performed in each sprint along with the corresponding cost incurred in performing those tasks.Multi-attribute utility theory(MAUT),a multi-criterion decision making approach,has been utilized to find the required trade-off between two attributes under consideration.The proposed modeling framework has been validated using real life data set.With the use of the model,the optimal sprint for each sprint could be evaluated which was much shorter than the original length.Thus,the results obtained validate the proposal of a dynamic sprint length that can be determined before the start of each sprint.The structure would help in cost as well as time savings for a firm.
文摘The evaluation system of R&D project beforehand, in the course and afterwards embodies the principle and standard of the cycle economy, which can not only avoid the negative effects caused, by the utilization of the achievements of R&D project in the industry but also point out the direction and criterion of R&D activities for the enterprises, which also provides the "model" that can be used for reference for maintaining the durable competitiveness of the enterprises.
文摘This paper introduces the high-speed electrical multiple unit (EMO) life cycle, including the design, manufacturing, testing, and maintenance stages. It also presents the train control and monitoring system (TCMS) software development platform, the TCMS testing and verification bench, the EMU driving simulation platform, and the EMU remote data transmittal and maintenance platform. All these platforms and benches combined together make up the EMU life cycle cost (LCC) system. Each platform facilitates EMU LCC management and is an important part of the system.
基金Acknowledgements This research was sponsored by the Brook Byers Institute for Sustainable Systems, Hightower Chair, and the Georgia Research Alliance at the Georgia Institute of Technology. This work was also supported by a grant for "Resilient Interdependent Infrastructure Processes and Systems (RIPS) Type 2: Participatory Modeling of Complex Urban Infrastructure Systems (Model Urban SysTems)," (#0836046) from National Science Foundation, Division of Emerging Frontiers in Research and Innovations (EFRI). The authors also acknowledge the support of Crittenden and Associates.
文摘Low-impact development (LID) technologies, such as bioretention areas, rooftop rainwater harvesting, a_nd xeris_caping can co_ntrol stormwater runoff, supply non-potable water, and landscape open space.TillS study examines a hybrid system (HS) that combines LID technologies with a centralized water system to lessen the burden on a conventional system (CS). CS is defined as the stormwater collection and water supply infrastructure, and the conventional landscaping choices in the City of Atlanta. The study scope is limited to five single-family residential zones (SFZs), classified R-1 through R-5, and four multi-family residential zones (MFZs), classified RG-2 through RG-5. Population density increases from 0.4 (R-1) to 62.2 (RG-5) persons per 1,000 m2. We performed a life cycle assessment (LCA) comparison of CS and HS using TRACI 2.1 to simulate impacts on the ecosystem, human health, and natural resources. We quantified the impact of freshwater consumption using the freshwater ecosystem impact (FEI) indicator. Test results indicate that HS has a higher LCA single score than CS in zones with a low population density; however, the difference becomes negligible as population density increases. Incorporating LID in SFZs and MFZs can reduce potable water use by an average of 50%. and 25%,respectively.; however, water savings are negligible in zones with high population density (i.e., RG-5) due to the diminished surface area per capitaavailable for LID technoogies. The results demonstrate that LID technologies effectively reduce outdoor water demand and therefore would be a good choice to decrease the water consumption impact in the City of Atlanta.
文摘Requirement gathering for software development project is the most crucial stage and thus requirement engineering (RE) occupies the chief position in the software development. Countless techniques concerning the RE processes exist to make sure the requirements are coherent, compact and complete in all respects. In this way different aspects of RE are dissected and detailed upon. A comparison of RE in Agile and RE in Waterfall is expatiated and on the basis of the literature survey the overall Agile RE process is accumulated. Agile being a technique produces high quality software in relatively less time as compared to the conventional waterfall methodology. The paramount objective of this study is to take lessons from RE that Agile method may consider, if quality being the cardinal concern. The study is patterned on the survey of the previous research reported in the coexisting literature and the practices which are being pursued in the area.
基金MM Lab is supported by SERB/EMR/2017/003054,BT/PR21857/NNT/28/1238/2017Odisha DBT 3325/ST(BIO)-02/2017.
文摘Exposure to some toxic compounds causes structural and behavioral anomalies associated with the neurons in the later stage of life.Those toxic compounds are termed as a neurotoxicant,which can be a physical factor,a toxin,an infection,radiation,or maybe a drug.The incongruities caused due to a neurotoxicant further depend on the toxicity of the compound.More importantly,the neurotoxicity of the compound is associated with the concentration and the time point of exposure.The neurodevelopmental defect appears depending on the toxicity of the compound.A neurodevelopmental defect may be associated with a delay in developmental time,defective growth,structural abnormality of many organs,including sensory organs,behavioral abnormalities,or death in the fetus stage.Numerous model organisms are employed to assess the effect of neurotoxicants.The current review summarizes several methods used to check the effect of neurotoxicant and their effect using the model organism Drosophila melanogaster.
文摘At present,hundreds of cloud vendors in the global market provide various services based on a customer’s requirements.All cloud vendors are not the same in terms of the number of services,infrastructure availability,security strategies,cost per customer,and reputation in the market.Thus,software developers and organizations face a dilemma when choosing a suitable cloud vendor for their developmental activities.Thus,there is a need to evaluate various cloud service providers(CSPs)and platforms before choosing a suitable vendor.Already existing solutions are either based on simulation tools as per the requirements or evaluated concerning the quality of service attributes.However,they require more time to collect data,simulate and evaluate the vendor.The proposed work compares various CSPs in terms of major metrics,such as establishment,services,infrastructure,tools,pricing models,market share,etc.,based on the comparison,parameter ranking,and weightage allocated.Furthermore,the parameters are categorized depending on the priority level.The weighted average is calculated for each CSP,after which the values are sorted in descending order.The experimental results show the unbiased selection of CSPs based on the chosen parameters.The proposed parameter-ranking priority level weightage(PRPLW)algorithm simplifies the selection of the best-suited cloud vendor in accordance with the requirements of software development.
基金This work is supported by the National Natural Science Foundation of China(Nos.61303033,61303221)the National High Technology Research and Development Program of China(863 Program)(No.2015AA017203)+2 种基金the Natural Science Basis Research Plan in Shaanxi Province of China(No.2016JM6034)China 111 Project(No.B16037)the Special Research Foundation of MIIT(No.MJ-2014-S-37).
文摘Cyber-physical systems are being confronted with an ever-increasing number of security threats from the complicated interactions and fusions between cyberspace and physical space.Integrating security-related activities into the early phases of the development life cycle is a monolithic and cost-effective solution for the development of security-critical cyber-physical systems.These activities often incorporate security mechanisms from different realms.We present a fine-grained design flow paradigm for security-critical and software-intensive cyber-physical systems.We provide a comprehensive survey on the domain-specific architectures,countermeasure techniques and security standards involved in the development life cycle of security-critical cyber-physical systems,and adapt these elements to the newly designed flow paradigm.Finally,we provide prospectives and future directions for improving the usability and security level of this design flow paradigm.
文摘The aim of this study was to develop an adequate mathematical model for long-term forecasting of technological progress and economic growth in the digital age (2020-2050). In addition, the task was to develop a model for forecast calculations of labor productivity in the symbiosis of “man + intelligent machine”, where an intelligent machine (IM) is understood as a computer or robot equipped with elements of artificial intelligence (AI), as well as in the digital economy as a whole. In the course of the study, it was shown that in order to implement its goals the Schumpeter-Kondratiev innovation and cycle theory on forming long waves (LW) of economic development influenced by a powerful cluster of economic technologies engendered by industrial revolutions is most appropriate for a long-term forecasting of technological progress and economic growth. The Solow neoclassical model of economic growth, synchronized with LW, gives the opportunity to forecast economic dynamics of technologically advanced countries with a greater precision up to 30 years, the time which correlates with the continuation of LW. In the information and digital age, the key role among the main factors of growth (capital, labour and technological progress) is played by the latter. The authors have developed an information model which allows for forecasting technological progress basing on growth rates of endogenous technological information in economics. The main regimes of producing technological information, corresponding to the eras of information and digital economies, are given in the article, as well as the Lagrangians that engender them. The model is verified on the example of the 5<sup>th</sup> information LW for the US economy (1982-2018) and it has had highly accurate approximation for both technological progress and economic growth. A number of new results were obtained using the developed information models for forecasting technological progress. The forecasting trajectory of economic growth of developed countries (on the example of the USA) on the upward stage of the 6<sup>th</sup> LW (2018-2042), engendered by the digital technologies of the 4<sup>th</sup> Industrial Revolution is given. It is also demonstrated that the symbiosis of human and intelligent machine (IM) is the driving force in the digital economy, where man plays the leading role organizing effective and efficient mutual work. Authors suggest a mathematical model for calculating labour productivity in the digital economy, where the symbiosis of “human + IM” is widely used. The calculations carried out with the help of the model show: 1) the symbiosis of “human + IM” from the very beginning lets to realize the possibilities of increasing work performance in the economy with the help of digital technologies;2) the largest labour productivity is achieved in the symbiosis of “human + IM”, where man labour prevails, and the lowest labour productivity is seen where the largest part of the work is performed by IM;3) developed countries may achieve labour productivity of 3% per year by the mid-2020s, which has all the chances to stay up to the 2040s.
基金supported by the National Key Research and Development Program of China(Grant No.2016YFC0401401)the National Natural Science Foundation of China(Grant Nos.51522907&51739011)supported by the Research Fund of the State Key Laboratory of Simulation and Regulation of Water Cycle in River Basin,China Institute of Water Resources and Hydropower Research(Grant No.2017ZY02)
文摘Urban water-related problems associated with rapid urbanization, including waterlogging, water pollution, the ecological degradation of water, and water shortages, have caused global concerns in recent years. In 2013, in order to mitigate increasingly severe urban water-related problems, China set forth a new strategy for integrated urban water management(IUWM) called the "Sponge City". This is the first holistic IUWM strategy implemented in a developing country that is still undergoing rapid urbanization, and holds promise for application in other developing countries. This paper aims to comprehensively summarize the sponge city. First, this paper reviews prior studies and policies on urban water management in China as important background for the sponge city proposal. Then, the connotations, goals, and features of the sponge city are summarized and discussed.Finally, the challenges, research needs, and development directions pertinent to the sponge city are discussed based on investigations and studies conducted by the authors. The sponge city in China has a short history—given this, there are many issues that should be examined with regard to the stepwise implementation of the Sponge City Programme(SCP). Accordingly, the authors perceive this study as only the beginning of abundant studies on the sponge city.