The environmental implications of cultured meat are profound. An anticipatory life cycle assessment of cultured meat published in 2011 suggested it could have a smaller impact than agricultural meat in all categories ...The environmental implications of cultured meat are profound. An anticipatory life cycle assessment of cultured meat published in 2011 suggested it could have a smaller impact than agricultural meat in all categories except energy consumption. As with most technologies, cultured meat will almost certainly be accompanied by unintended consequences as well as unforeseen costs and benefits that accrue disproportionately to different stakeholders. Uncertainty associated with new engineered products cannot be completely eliminated prior to introduction, but ongoing environmental assessments of the technologies as they advance can serve to reduce unforeseen risks. Given the pace at which tissue engineering is advancing, systemic assessments of the technology will be pivotal in mitigating unintended environmental consequences.展开更多
Fast growing IPTV services have become a major concern in China’s information industry. However,the IPTV service model has not been perfected yet after long-time trial made in a couple of Chinese cities. Selecting op...Fast growing IPTV services have become a major concern in China’s information industry. However,the IPTV service model has not been perfected yet after long-time trial made in a couple of Chinese cities. Selecting optimum technologies for IPTV is difficult to solve in the short term. So far most trial IPTV services in China are designed to provide a small number of local viewers with television and recorded programs. Accordingly,the technology used for the available IPTV services can hardly become a paradigm for future IPTV technology development. Therefore,with the ultimate goal of constructing a countrywide IPTV service network that can meet the requirements of commercial operation,it is necessary to conduct research into the design of countrywide IPTV network architecture,improvement of the bearer network,selection of video encoding technology,terminal structure,building of the Content Distribution Network (CDN),establishment of the open Digital Rights Management (DRM) platform,and construction of Media Asset Management (MAM) system.展开更多
Viewing investment projects in new technologies as real options, this paper studies the effects ofendogenous competition and asymmetric information on the strategic exercise of real options. We firstdevelop a multi-pe...Viewing investment projects in new technologies as real options, this paper studies the effects ofendogenous competition and asymmetric information on the strategic exercise of real options. We firstdevelop a multi-period, game-theoretic model and show how competition leads to early exercise andaggressive investment behaviors and how competition erodes option values. We then relax the typicalfull-information assumption found in the literature and allow information asymmetry to exist acrossfirms. Our model shows, in contrast to the literature that payoff is independent of the ordering ofexercise, that the sequential exercise of real options may generate both informational and payoffexternalities. We also find some surpising but interesting results such as having more information isnot necessarily better.展开更多
The explosive growth of data traffic due to ubiquitous smart devices has accelerated the evolution of mobile communication from 4G to 5G. To achieve an extremely high performance, 5G mobile communication system is fac...The explosive growth of data traffic due to ubiquitous smart devices has accelerated the evolution of mobile communication from 4G to 5G. To achieve an extremely high performance, 5G mobile communication system is facing challenges in the design of new network architectures, new radio access techniques, and new transmission waveforms. Motivated by this observation, FITEE organizes this special issue on 5G Wireless Communication Systems and Technologies, to advance the studies of this field.展开更多
Virtual simulation technology has become one of the most popular technologies in the field of engineering education after the multimedia information technology in recent years.This paper,based on the comprehensive int...Virtual simulation technology has become one of the most popular technologies in the field of engineering education after the multimedia information technology in recent years.This paper,based on the comprehensive integrated simulation and verification module of UG NX software,describes and discusses a novel virtual simulation system teaching(VSST)for numerically controlled machining to support the student engineering training to achieve the theoretical knowledge and practical techniques in numerically controlled machining.The findings of a study designed to evaluate the impact of VSST for the development of numerically controlled machining course are presented here.In addition,analysis of the follow-up surveys indicates that the VSST method enables to provide the concrete experience of interaction between the students and the simulation environment and to further stimulate students’interest in learning,so that the students who used VSST achieve significantly higher results than their co-workers.展开更多
This paper describes the analysis and design of an assistive device for elderly people under development at the EgyptJapan University of Science and Technology(E-JUST) named E-JUST assistive device(EJAD).Several e...This paper describes the analysis and design of an assistive device for elderly people under development at the EgyptJapan University of Science and Technology(E-JUST) named E-JUST assistive device(EJAD).Several experiments were carried out using a motion capture system(VICON) and inertial sensors to identify the human posture during the sit-to-stand motion.The EJAD uses only two inertial measurement units(IMUs) fused through an adaptive neuro-fuzzy inference systems(ANFIS) algorithm to imitate the real motion of the caregiver.The EJAD consists of two main parts,a robot arm and an active walker.The robot arm is a 2-degree-of-freedom(2-DOF) planar manipulator.In addition,a back support with a passive joint is used to support the patient s back.The IMUs on the leg and trunk of the patient are used to compensate for and adapt to the EJAD system motion depending on the obtained patient posture.The ANFIS algorithm is used to train the fuzzy system that converts the IMUs signals to the right posture of the patient.A control scheme is proposed to control the system motion based on practical measurements taken from the experiments.A computer simulation showed a relatively good performance of the EJAD in assisting the patient.展开更多
Information technology(IT)developments of large magnitude organize as collections of multiple projects into a single program,especially under dynamic conditions of market uncertainty that frequently change requirement...Information technology(IT)developments of large magnitude organize as collections of multiple projects into a single program,especially under dynamic conditions of market uncertainty that frequently change requirements or solutions midstream.Successful completion of an IT development program requires that the multiple teams work effec-tively together as well as independently in response to changes by relying on the differ-entiation of talent and knowledge available to the program manager.We consider and empirically support a model derived from principles in the multi-team systems(MTS)literature to determine the influence of differentiation among the IT program in the sharing of knowledge and information.The relationship from differentiation to program success is mediated by knowledge and information sharing,showing how to manage change through the dissemination of information and knowledge.Uncertainty of the market positively moderates the relation from differentiation among projects to infor-mation sharing.These findings contribute to the literature by empirically validating that MTS frameworks are exceptionally well suited for dealing with complex environments in the context of IT development.展开更多
Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in ...Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in educational institutions,determining the security level for a single IT system has been well developed.However,it is still dificult to evaluate the information security level of the entire educational institution consid-ering multiple IT systems,because there might be too many different IT systems in one institution,educational institutions can be very different,and there is no standard model or method to provide a just ifable information security evaluation among different educational inst itutions considering their differences.In light of these difi-culties,a security evaluation model of educational institutions'IT systems(SEMEIS)is proposed in this work to facilitate the information security management for the educat ional institutions.Firstly,a simplified educational industry information system security level protection rating(EIISSLPR)with a new weight redistribution strategy for a single IT systern is proposed by choosing important evaluation questions from EIISSLPR and redistributing the weights of these questions.Then for the entire educational institution,analytic hierarchy process(AHP)is used to redistribute the weights of multiple IT systems at different security levels.considering the risk of pos-sible network security vulnerabilities,a risk index is forulated by weighting different factors,normalized by a utility function,and calculated with the real data collected from the institutions under the evaluation.Finally,the information security performance of educational institutions is obtained as the final score from SEMEIS.The results show that SEMEIS can evaluate the security level of the educat ion institutions practically and provide an efficient and effective management tool for the information security management.展开更多
The 2012 IEEE Multi-Conference on Systems and Control (MSC 2012) will take place in Dubrovnik Palace Hotel, Dubrovnik, Croatia, on October 3 - 5, 2012. MSC 2012 includes two international con- ferences sponsored and...The 2012 IEEE Multi-Conference on Systems and Control (MSC 2012) will take place in Dubrovnik Palace Hotel, Dubrovnik, Croatia, on October 3 - 5, 2012. MSC 2012 includes two international con- ferences sponsored and promoted by the IEEE Control Systems Society:展开更多
基金possible by the generous financial support of the Lincoln Center for Applied Ethics at Arizona State University and the Graduate College at Arizona State University, USA
文摘The environmental implications of cultured meat are profound. An anticipatory life cycle assessment of cultured meat published in 2011 suggested it could have a smaller impact than agricultural meat in all categories except energy consumption. As with most technologies, cultured meat will almost certainly be accompanied by unintended consequences as well as unforeseen costs and benefits that accrue disproportionately to different stakeholders. Uncertainty associated with new engineered products cannot be completely eliminated prior to introduction, but ongoing environmental assessments of the technologies as they advance can serve to reduce unforeseen risks. Given the pace at which tissue engineering is advancing, systemic assessments of the technology will be pivotal in mitigating unintended environmental consequences.
文摘Fast growing IPTV services have become a major concern in China’s information industry. However,the IPTV service model has not been perfected yet after long-time trial made in a couple of Chinese cities. Selecting optimum technologies for IPTV is difficult to solve in the short term. So far most trial IPTV services in China are designed to provide a small number of local viewers with television and recorded programs. Accordingly,the technology used for the available IPTV services can hardly become a paradigm for future IPTV technology development. Therefore,with the ultimate goal of constructing a countrywide IPTV service network that can meet the requirements of commercial operation,it is necessary to conduct research into the design of countrywide IPTV network architecture,improvement of the bearer network,selection of video encoding technology,terminal structure,building of the Content Distribution Network (CDN),establishment of the open Digital Rights Management (DRM) platform,and construction of Media Asset Management (MAM) system.
文摘Viewing investment projects in new technologies as real options, this paper studies the effects ofendogenous competition and asymmetric information on the strategic exercise of real options. We firstdevelop a multi-period, game-theoretic model and show how competition leads to early exercise andaggressive investment behaviors and how competition erodes option values. We then relax the typicalfull-information assumption found in the literature and allow information asymmetry to exist acrossfirms. Our model shows, in contrast to the literature that payoff is independent of the ordering ofexercise, that the sequential exercise of real options may generate both informational and payoffexternalities. We also find some surpising but interesting results such as having more information isnot necessarily better.
文摘The explosive growth of data traffic due to ubiquitous smart devices has accelerated the evolution of mobile communication from 4G to 5G. To achieve an extremely high performance, 5G mobile communication system is facing challenges in the design of new network architectures, new radio access techniques, and new transmission waveforms. Motivated by this observation, FITEE organizes this special issue on 5G Wireless Communication Systems and Technologies, to advance the studies of this field.
基金the support from Zhejiang Education Science Planning Project(Grant No.2015SCG356)Zhejiang Public Project of Science and Technology Department(Grant No.2016C31044)Zhejiang Province Soft Science Research Project(Grant No.2016C35040).
文摘Virtual simulation technology has become one of the most popular technologies in the field of engineering education after the multimedia information technology in recent years.This paper,based on the comprehensive integrated simulation and verification module of UG NX software,describes and discusses a novel virtual simulation system teaching(VSST)for numerically controlled machining to support the student engineering training to achieve the theoretical knowledge and practical techniques in numerically controlled machining.The findings of a study designed to evaluate the impact of VSST for the development of numerically controlled machining course are presented here.In addition,analysis of the follow-up surveys indicates that the VSST method enables to provide the concrete experience of interaction between the students and the simulation environment and to further stimulate students’interest in learning,so that the students who used VSST achieve significantly higher results than their co-workers.
基金supported in part by a scholarship provided by the Mission DepartmentMinistry of Higher Education of the Government of Egypt
文摘This paper describes the analysis and design of an assistive device for elderly people under development at the EgyptJapan University of Science and Technology(E-JUST) named E-JUST assistive device(EJAD).Several experiments were carried out using a motion capture system(VICON) and inertial sensors to identify the human posture during the sit-to-stand motion.The EJAD uses only two inertial measurement units(IMUs) fused through an adaptive neuro-fuzzy inference systems(ANFIS) algorithm to imitate the real motion of the caregiver.The EJAD consists of two main parts,a robot arm and an active walker.The robot arm is a 2-degree-of-freedom(2-DOF) planar manipulator.In addition,a back support with a passive joint is used to support the patient s back.The IMUs on the leg and trunk of the patient are used to compensate for and adapt to the EJAD system motion depending on the obtained patient posture.The ANFIS algorithm is used to train the fuzzy system that converts the IMUs signals to the right posture of the patient.A control scheme is proposed to control the system motion based on practical measurements taken from the experiments.A computer simulation showed a relatively good performance of the EJAD in assisting the patient.
文摘Information technology(IT)developments of large magnitude organize as collections of multiple projects into a single program,especially under dynamic conditions of market uncertainty that frequently change requirements or solutions midstream.Successful completion of an IT development program requires that the multiple teams work effec-tively together as well as independently in response to changes by relying on the differ-entiation of talent and knowledge available to the program manager.We consider and empirically support a model derived from principles in the multi-team systems(MTS)literature to determine the influence of differentiation among the IT program in the sharing of knowledge and information.The relationship from differentiation to program success is mediated by knowledge and information sharing,showing how to manage change through the dissemination of information and knowledge.Uncertainty of the market positively moderates the relation from differentiation among projects to infor-mation sharing.These findings contribute to the literature by empirically validating that MTS frameworks are exceptionally well suited for dealing with complex environments in the context of IT development.
基金the Science and Technology Innovation Program of Shanghai Science and Technology Commit-tee(No.19511103500)。
文摘Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in educational institutions,determining the security level for a single IT system has been well developed.However,it is still dificult to evaluate the information security level of the entire educational institution consid-ering multiple IT systems,because there might be too many different IT systems in one institution,educational institutions can be very different,and there is no standard model or method to provide a just ifable information security evaluation among different educational inst itutions considering their differences.In light of these difi-culties,a security evaluation model of educational institutions'IT systems(SEMEIS)is proposed in this work to facilitate the information security management for the educat ional institutions.Firstly,a simplified educational industry information system security level protection rating(EIISSLPR)with a new weight redistribution strategy for a single IT systern is proposed by choosing important evaluation questions from EIISSLPR and redistributing the weights of these questions.Then for the entire educational institution,analytic hierarchy process(AHP)is used to redistribute the weights of multiple IT systems at different security levels.considering the risk of pos-sible network security vulnerabilities,a risk index is forulated by weighting different factors,normalized by a utility function,and calculated with the real data collected from the institutions under the evaluation.Finally,the information security performance of educational institutions is obtained as the final score from SEMEIS.The results show that SEMEIS can evaluate the security level of the educat ion institutions practically and provide an efficient and effective management tool for the information security management.
文摘The 2012 IEEE Multi-Conference on Systems and Control (MSC 2012) will take place in Dubrovnik Palace Hotel, Dubrovnik, Croatia, on October 3 - 5, 2012. MSC 2012 includes two international con- ferences sponsored and promoted by the IEEE Control Systems Society: