As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand respons...As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand response.However,there is a growing risk of privacy disclosure with the wide installation of smart meters,for they transmit readings and sensitive data simultaneously.To guarantee the confidentiality of the sensitive information and authenticity of smart meter readings,we proposed a privacy-preserving scheme based on digital watermarking and elliptic-curve cryptography(ECC)asymmetric encryption.The sensitive data are encrypted using the public key and are hidden in the collected readings using digital watermark.Only the authorized user can extract watermark and can decrypt the confidential data using its private key.The proposed method realizes secure end-to-end confidentiality of the sensitive information.It has faster computing speed and can verify the data source and ensure the authenticity of readings.The example results show that the proposed method has little influence on the original data and unauthorized access cannot be completed within a reasonable time.On embedded hardware,the processing speed of the proposed method is better than the existing methods.展开更多
The development of the internet can have a huge impact on industries from the mode of operation and strategic direction. As the "core" of enterprises, the financial industry has undergone great changes also, and the...The development of the internet can have a huge impact on industries from the mode of operation and strategic direction. As the "core" of enterprises, the financial industry has undergone great changes also, and the mode of traditional accounting in manual has been replaced by a computerized accounting. A computer can do all the financial work from accounting to reporting. Efficient and convenient accounting work allows financial personnel have more energy and time in enterprise management and decision-making, and the core of financial work has shifted to management. Therefore, more and more enterprises realize management accounting's value and importance. Management accounting includes information collection, analysis, storage and transfer, as well as data processing and analysis, making information system essential. Thus, management accounting information system will be an indispensable tool for enterprise value management. In the study, based on management accounting information, application of management accounting information in mid and large-size enterprises in China was reviewed to analyze existing problems and propose countermeasures with consideration of financial cloud model and business intelligence.展开更多
The performance of a sonar system is closely related to the marine environment and the target characteristics. When dealing with the echoes of a traditional active sonar system, the sonar designers often do not take i...The performance of a sonar system is closely related to the marine environment and the target characteristics. When dealing with the echoes of a traditional active sonar system, the sonar designers often do not take into account the influence of the environmental information and prior knowledge perceived by sonar receivers, making it difficult to obtain desired processing results. Based on the basic principle and key technology of sonar, this paper proposed a cognition-based intelligent sonar system in theory--cognitive sonar. Cognitive sonar is capable of jointly optimizing the transmission waveform and receiver according to the changes of environment so that its detection and identification performance can be significantly improved.展开更多
With the popularization of the Intemet, permeation of sensor networks, emergence of big data, increase in size of the information community, and interlinking and fusion of data and information throughout human society...With the popularization of the Intemet, permeation of sensor networks, emergence of big data, increase in size of the information community, and interlinking and fusion of data and information throughout human society, physical space, and cyberspace, the information environment related to the current development of artificial intelligence (AI) has profoundly changed. AI faces important adjustments, and scientific foundations are confronted with new breakthroughs, as AI enters a new stage: AI 2.0. This paper briefly reviews the 60-year developmental history of AI, analyzes the external environment promoting the formation of AI 2.0 along with changes in goals, and describes both the beginning of the technology and the core idea behind AI 2.0 development. Furthermore, based on combined social demands and the information environment that exists in relation to Chinese development, suggestions on the develoDment of Al 2.0 are given.展开更多
With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expec...With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.展开更多
Objectives Gerontechnology has great potential in promoting older adults’well-being.With the accelerated aging process,gerontechnology has a promising market prospect.However,most technological developers and healthc...Objectives Gerontechnology has great potential in promoting older adults’well-being.With the accelerated aging process,gerontechnology has a promising market prospect.However,most technological developers and healthcare professionals attached importance to products’effectiveness,and ignored older adults’demands and user experience,which reduced older adults'adoption intention of gerontechnology use.The inclusion of older adults in the design process of technologies is essential to maximize the effect.This study explored older adults’demands for a self-developed intelligent medication administration system and proposed optimization schemes,thus providing reference to developing geriatric-friendly technologies and products.Methods A cross-sectional survey was conducted to explore older adults’technological demands for the self-developed intelligent medication administration system,and data were analyzed based on the Kano model.A self-made questionnaire was administered from July 2020 to October 2020 after participants used this system for two weeks.The study was registered with the Chinese Clinical Trial Registry(ChiCTR2000040644).Results A total of 354 older adults participated in the survey.Four items,namely larger font size,simpler operation process,scheduled medication reminders and reliable hardware,were classified as must-be attributes;three items,namely searching drug instructions through WeChat,more sensitive system and longer battery life,as attractive attributes;one item,viewing disease-related information through WeChat,as the one-dimensional attribute;and the rest were indifferent attributes,including simple and beautiful displays,blocking advertisements automatically,providing user privacy protection protocol,viewing personal medical information only by logged-in users,recording all the medications,ordering medications through WeChat.The satisfaction values were between 0.24 and 0.69,and dissatisfaction values were between 0.06 and 0.94.Conclusion This study suggested that older adults had personalized technology demands.Including their technological demands and desire may assist in decreasing the digital divide and promoting the satisfaction of e-health and/or m-health.Based on older adults’demands,our study proposed optimization schemes of the intelligent medication administration system,which may help developers design geriatric-friendly intelligent products and nurses to perform older adults-centered and efficient medication management.展开更多
The authors discuss the concept of meta information which is the description of information system or its subsystems, and proposes algorithms for meta information generation. Meta information can be generated in pa...The authors discuss the concept of meta information which is the description of information system or its subsystems, and proposes algorithms for meta information generation. Meta information can be generated in parallel mode and network computation can be used to accelerate meta information generation. Most existing rough set methods assume information system to be centralized and cannot be applied directly in distributed information system. Data integration, which is costly, is necessary for such existing methods. However, meta information integration will eliminate the need of data integration in many cases, since many rough set operations can be done straightforward based on meta information, and many existing methods can be modified based on meta information.展开更多
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and...Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.展开更多
Along with the popularization of artificial intelligence and information technology, the development of automobile industry have been closely combined with information technology, environmental protection and energy s...Along with the popularization of artificial intelligence and information technology, the development of automobile industry have been closely combined with information technology, environmental protection and energy saving ideas, promotion and application of electronic control technology, which development cycle becoming shorter and shorter. In this paper, through the analysis of the present application situation and development trend of the automobile electronic technology at present, in order to provide a theoretical reference for the future development of the automobile electronic control technology.展开更多
Extraction of traffic information from image or video sequence is a hot research topic in intelligenttransportation system and computer vision. A real-time traffic information extraction method based on com-pressed vi...Extraction of traffic information from image or video sequence is a hot research topic in intelligenttransportation system and computer vision. A real-time traffic information extraction method based on com-pressed video with interframe motion vectors for speed, density and flow detection, has been proposed for ex-traction of traffic information under fixed camera setting and well-defined environment. The motion vectors arefirst separated from the compressed video streams, and then filtered to eliminate incorrect and noisy vectors u-sing the well-defined environmental knowledge. By applying the projective transform and using the filtered mo-tion vectors, speed can be calculated from motion vector statistics, density can be estimated using the motionvector occupancy, and flow can be detected using the combination of speed and density. The embodiment of aprototype system for sky camera traffic monitoring using the MPEG video has been implemented, and experi-mental results proved the effectiveness of the method proposed.展开更多
With ever-increasing market competition and advances in technology, more and more countries are prioritizing advanced manufacturing technology as their top priority for economic growth. Germany announced the Industry ...With ever-increasing market competition and advances in technology, more and more countries are prioritizing advanced manufacturing technology as their top priority for economic growth. Germany announced the Industry 4.0 strategy in 2013. The US government launched the Advanced Manufacturing Partnership (AMP) in 2011 and the National Network for Manufacturing Innovation (NNMI) in 2014. Most recently, the Manufacturing USA initiative was officially rolled out to further "leverage existing resources... to nurture manufacturing innovation and accelerate commercialization" by fostering close collaboration between industry, academia, and government partners. In 2015, the Chinese government officially published a 10- year plan and roadmap toward manufacturing: Made in China 2025. In all these national initiatives, the core technology development and implementation is in the area of advanced manufacturing systems. A new manufacturing paradigm is emerging, which can be characterized by two unique features: integrated manufacturing and intelligent manufacturing. This trend is in line with the progress of industrial revolutions, in which higher efficiency in production systems is being continuously pursued. To this end, 10 major technologies can be identified for the new manufacturing paradigm. This paper describes the rationales and needs for integrated and intelligent manufacturing (i2M) systems. Related technologies from different fields are also described. In particular, key technological enablers, such as the Intemet of Things and Services (IoTS), cyber-physical systems (CPSs), and cloud computing are discussed. Challenges are addressed with applica- tions that are based on commercially available platforms such as General Electric (GE)'s Predix and PTC's ThingWorx.展开更多
This paper study and solve the design and manufacture of baby care car, its unique function is the baby carriage can be used as a baby bed, when necessary, it can also become a nursing car, sensor in the vehicle can b...This paper study and solve the design and manufacture of baby care car, its unique function is the baby carriage can be used as a baby bed, when necessary, it can also become a nursing car, sensor in the vehicle can be real-time detected whether the baby bed wetting and induction time will give parents information feedback; the humidity sensing probe controlled by single chip microcomputer and with the bottle clamp flexible connecting rod, can realize the baby auxiliary nurse; remote wireless commtmication system can allow parents to monitor children' s state. The design of intelligent baby carriage, to enhance the technological content of products, promote the innovation of design China bassinet production, has the important practical significance to seize the smart baby car market.展开更多
The developments in the field of Information and Communication Technology (ICT) in the country has rapidly happen after year 2009 .Government has developed many programs and initiations to develop ICT in the country...The developments in the field of Information and Communication Technology (ICT) in the country has rapidly happen after year 2009 .Government has developed many programs and initiations to develop ICT in the country after three decades of war was ended up. As a result disabled community can make many opportunities to use the ICT and at the same time create a gap, which is commonly referred to as Disability Digital Divide. The purpose of this study was to examine empirically the current status of adoption of ICT and in turn the digital divide resulting from which in the disability community in Sri Lanka and the factors affecting this behavior. A questionnaire and Interviewed based survey (n = 107) was carried out to collect the data from the disabled people who used ICT in the Colombo, Gampaha, and Kaluthara district. An empirical model was developed to show the relationship between the level of adoption of 10 basic, intermediate, and advanced ICT facilities and a number of factors to reflect the WWW, Smart phones, and Computer usage aspects of disabled community. Based on the Innovatiotr---Diffusion Theory, the status of Digital Divide of a disabled community was specified by means of an Index. The results show that this community did not become innovators or early-adopters of ICT by adopting WWW or computer related technologies but was mostly confined to the smart phone related facilities. The results from this study highlight that the income of a disabled person, awareness about the information and technology, interest of new technology usage, social and cultural background of a person, use of English language in day-to-day life give a significant impact on the adoption oflCT by the disabled community.展开更多
This study evaluates the extent of voluntary disclosure in the annual reports of non-financial companies listed at the Amman Stock Exchange (ASE) for the year 2006. The study adopts the disclosure index suggested by...This study evaluates the extent of voluntary disclosure in the annual reports of non-financial companies listed at the Amman Stock Exchange (ASE) for the year 2006. The study adopts the disclosure index suggested by Haddad, AI-Shattarat & Nobanee (2009) and evaluates the voluntary disclosure for the Jordanian companies for the year 2006 at three levels: the first provides a description and analysis of the overall voluntary disclosure; the second covers the extent to which each individual item of information is disclosed; the third covers the type of information (e.g., financial information, historical information, management discussion). The results of the study reveal that there was a considerable variation in the disclosure of the index items and also among the listed companies. On average, a company disclosed about 28.95% of the items applicable to it, and only six out of the 53 companies received disclosure scores greater than 50%. It was also found that 50 items out of 62 items included in the index had a disclosure below 50%, and 10 items had disclosure of less than 10%. With respect to the evaluation of different types of information, the analyses indicated that the category of the background information, the category of financial ratios and the category of management discussions were better disclosed in corporate annual reports than the other types of information.展开更多
A smart Human Interface (HCI) replacing conventional mouse interface is proposed. The interface is able to control and command action with only hand. Four finger motions (left click, right dick, hold, drag) are u...A smart Human Interface (HCI) replacing conventional mouse interface is proposed. The interface is able to control and command action with only hand. Four finger motions (left click, right dick, hold, drag) are used to command the interface. Also the authors materialiae cursor movement control using image processing The measure what they use for inference is entropy of Electromyogram (EMG) signal, Gaussian modeling and likelihood estimation. In image processing for cursor control, they use color recognition to get the center point of finger tip from marker, and map the point onto cursor. Accuracy of finger movement inference is over 95% and cursor control works naturally without delay. They materlalize whole system to check its performance and utility.展开更多
This study proposesan over all framework for applying wireless manufacturing(WM)technologies in a smart factory and establishes a smart factory data computing and information using system (dc-IUS). Several plug-and-pl...This study proposesan over all framework for applying wireless manufacturing(WM)technologies in a smart factory and establishes a smart factory data computing and information using system (dc-IUS). Several plug-and-play (PnP) application modules of the dc-IUS are presented in the fields of machining process and quality control,material flow and inventory control,and factory resource tracking. Different schemes are discussed about how and where to apply these functions. Then some running examples are studied to demonstrate the feasibility and reliability of dc-IUS. At last,the challenges of applying WM are discussed and a conclusion is given.展开更多
基金Project(SGZJHZ00HLJS2000871)supported by the State Grid Science and Technology Project,China。
文摘As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand response.However,there is a growing risk of privacy disclosure with the wide installation of smart meters,for they transmit readings and sensitive data simultaneously.To guarantee the confidentiality of the sensitive information and authenticity of smart meter readings,we proposed a privacy-preserving scheme based on digital watermarking and elliptic-curve cryptography(ECC)asymmetric encryption.The sensitive data are encrypted using the public key and are hidden in the collected readings using digital watermark.Only the authorized user can extract watermark and can decrypt the confidential data using its private key.The proposed method realizes secure end-to-end confidentiality of the sensitive information.It has faster computing speed and can verify the data source and ensure the authenticity of readings.The example results show that the proposed method has little influence on the original data and unauthorized access cannot be completed within a reasonable time.On embedded hardware,the processing speed of the proposed method is better than the existing methods.
基金Supported by Education Reform,Innovation and Guidance Program for Teachers in Universities of Tian Jin Agricultural University(20170405)~~
文摘The development of the internet can have a huge impact on industries from the mode of operation and strategic direction. As the "core" of enterprises, the financial industry has undergone great changes also, and the mode of traditional accounting in manual has been replaced by a computerized accounting. A computer can do all the financial work from accounting to reporting. Efficient and convenient accounting work allows financial personnel have more energy and time in enterprise management and decision-making, and the core of financial work has shifted to management. Therefore, more and more enterprises realize management accounting's value and importance. Management accounting includes information collection, analysis, storage and transfer, as well as data processing and analysis, making information system essential. Thus, management accounting information system will be an indispensable tool for enterprise value management. In the study, based on management accounting information, application of management accounting information in mid and large-size enterprises in China was reviewed to analyze existing problems and propose countermeasures with consideration of financial cloud model and business intelligence.
基金Supported by Research Foundation of Shaanxi Province Returned Overseas Students No.SLZ2008006
文摘The performance of a sonar system is closely related to the marine environment and the target characteristics. When dealing with the echoes of a traditional active sonar system, the sonar designers often do not take into account the influence of the environmental information and prior knowledge perceived by sonar receivers, making it difficult to obtain desired processing results. Based on the basic principle and key technology of sonar, this paper proposed a cognition-based intelligent sonar system in theory--cognitive sonar. Cognitive sonar is capable of jointly optimizing the transmission waveform and receiver according to the changes of environment so that its detection and identification performance can be significantly improved.
文摘With the popularization of the Intemet, permeation of sensor networks, emergence of big data, increase in size of the information community, and interlinking and fusion of data and information throughout human society, physical space, and cyberspace, the information environment related to the current development of artificial intelligence (AI) has profoundly changed. AI faces important adjustments, and scientific foundations are confronted with new breakthroughs, as AI enters a new stage: AI 2.0. This paper briefly reviews the 60-year developmental history of AI, analyzes the external environment promoting the formation of AI 2.0 along with changes in goals, and describes both the beginning of the technology and the core idea behind AI 2.0 development. Furthermore, based on combined social demands and the information environment that exists in relation to Chinese development, suggestions on the develoDment of Al 2.0 are given.
基金supported by China Fundamental Research Funds for the Central University under Grant No.BUPT 2009RC1022
文摘With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.
基金Funding was provided by Chongqing Health Commission,and Chongqing Science and Technology Bureau(grant number 2020MSXM077).
文摘Objectives Gerontechnology has great potential in promoting older adults’well-being.With the accelerated aging process,gerontechnology has a promising market prospect.However,most technological developers and healthcare professionals attached importance to products’effectiveness,and ignored older adults’demands and user experience,which reduced older adults'adoption intention of gerontechnology use.The inclusion of older adults in the design process of technologies is essential to maximize the effect.This study explored older adults’demands for a self-developed intelligent medication administration system and proposed optimization schemes,thus providing reference to developing geriatric-friendly technologies and products.Methods A cross-sectional survey was conducted to explore older adults’technological demands for the self-developed intelligent medication administration system,and data were analyzed based on the Kano model.A self-made questionnaire was administered from July 2020 to October 2020 after participants used this system for two weeks.The study was registered with the Chinese Clinical Trial Registry(ChiCTR2000040644).Results A total of 354 older adults participated in the survey.Four items,namely larger font size,simpler operation process,scheduled medication reminders and reliable hardware,were classified as must-be attributes;three items,namely searching drug instructions through WeChat,more sensitive system and longer battery life,as attractive attributes;one item,viewing disease-related information through WeChat,as the one-dimensional attribute;and the rest were indifferent attributes,including simple and beautiful displays,blocking advertisements automatically,providing user privacy protection protocol,viewing personal medical information only by logged-in users,recording all the medications,ordering medications through WeChat.The satisfaction values were between 0.24 and 0.69,and dissatisfaction values were between 0.06 and 0.94.Conclusion This study suggested that older adults had personalized technology demands.Including their technological demands and desire may assist in decreasing the digital divide and promoting the satisfaction of e-health and/or m-health.Based on older adults’demands,our study proposed optimization schemes of the intelligent medication administration system,which may help developers design geriatric-friendly intelligent products and nurses to perform older adults-centered and efficient medication management.
文摘The authors discuss the concept of meta information which is the description of information system or its subsystems, and proposes algorithms for meta information generation. Meta information can be generated in parallel mode and network computation can be used to accelerate meta information generation. Most existing rough set methods assume information system to be centralized and cannot be applied directly in distributed information system. Data integration, which is costly, is necessary for such existing methods. However, meta information integration will eliminate the need of data integration in many cases, since many rough set operations can be done straightforward based on meta information, and many existing methods can be modified based on meta information.
基金supported by the National High Technology Research and Development Program(863)of China(No.2015AA016101)the National Natural Science Fund(No.61300184)Beijing Nova Program(No.Z151100000315078)
文摘Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.
文摘Along with the popularization of artificial intelligence and information technology, the development of automobile industry have been closely combined with information technology, environmental protection and energy saving ideas, promotion and application of electronic control technology, which development cycle becoming shorter and shorter. In this paper, through the analysis of the present application situation and development trend of the automobile electronic technology at present, in order to provide a theoretical reference for the future development of the automobile electronic control technology.
文摘Extraction of traffic information from image or video sequence is a hot research topic in intelligenttransportation system and computer vision. A real-time traffic information extraction method based on com-pressed video with interframe motion vectors for speed, density and flow detection, has been proposed for ex-traction of traffic information under fixed camera setting and well-defined environment. The motion vectors arefirst separated from the compressed video streams, and then filtered to eliminate incorrect and noisy vectors u-sing the well-defined environmental knowledge. By applying the projective transform and using the filtered mo-tion vectors, speed can be calculated from motion vector statistics, density can be estimated using the motionvector occupancy, and flow can be detected using the combination of speed and density. The embodiment of aprototype system for sky camera traffic monitoring using the MPEG video has been implemented, and experi-mental results proved the effectiveness of the method proposed.
文摘With ever-increasing market competition and advances in technology, more and more countries are prioritizing advanced manufacturing technology as their top priority for economic growth. Germany announced the Industry 4.0 strategy in 2013. The US government launched the Advanced Manufacturing Partnership (AMP) in 2011 and the National Network for Manufacturing Innovation (NNMI) in 2014. Most recently, the Manufacturing USA initiative was officially rolled out to further "leverage existing resources... to nurture manufacturing innovation and accelerate commercialization" by fostering close collaboration between industry, academia, and government partners. In 2015, the Chinese government officially published a 10- year plan and roadmap toward manufacturing: Made in China 2025. In all these national initiatives, the core technology development and implementation is in the area of advanced manufacturing systems. A new manufacturing paradigm is emerging, which can be characterized by two unique features: integrated manufacturing and intelligent manufacturing. This trend is in line with the progress of industrial revolutions, in which higher efficiency in production systems is being continuously pursued. To this end, 10 major technologies can be identified for the new manufacturing paradigm. This paper describes the rationales and needs for integrated and intelligent manufacturing (i2M) systems. Related technologies from different fields are also described. In particular, key technological enablers, such as the Intemet of Things and Services (IoTS), cyber-physical systems (CPSs), and cloud computing are discussed. Challenges are addressed with applica- tions that are based on commercially available platforms such as General Electric (GE)'s Predix and PTC's ThingWorx.
文摘This paper study and solve the design and manufacture of baby care car, its unique function is the baby carriage can be used as a baby bed, when necessary, it can also become a nursing car, sensor in the vehicle can be real-time detected whether the baby bed wetting and induction time will give parents information feedback; the humidity sensing probe controlled by single chip microcomputer and with the bottle clamp flexible connecting rod, can realize the baby auxiliary nurse; remote wireless commtmication system can allow parents to monitor children' s state. The design of intelligent baby carriage, to enhance the technological content of products, promote the innovation of design China bassinet production, has the important practical significance to seize the smart baby car market.
文摘The developments in the field of Information and Communication Technology (ICT) in the country has rapidly happen after year 2009 .Government has developed many programs and initiations to develop ICT in the country after three decades of war was ended up. As a result disabled community can make many opportunities to use the ICT and at the same time create a gap, which is commonly referred to as Disability Digital Divide. The purpose of this study was to examine empirically the current status of adoption of ICT and in turn the digital divide resulting from which in the disability community in Sri Lanka and the factors affecting this behavior. A questionnaire and Interviewed based survey (n = 107) was carried out to collect the data from the disabled people who used ICT in the Colombo, Gampaha, and Kaluthara district. An empirical model was developed to show the relationship between the level of adoption of 10 basic, intermediate, and advanced ICT facilities and a number of factors to reflect the WWW, Smart phones, and Computer usage aspects of disabled community. Based on the Innovatiotr---Diffusion Theory, the status of Digital Divide of a disabled community was specified by means of an Index. The results show that this community did not become innovators or early-adopters of ICT by adopting WWW or computer related technologies but was mostly confined to the smart phone related facilities. The results from this study highlight that the income of a disabled person, awareness about the information and technology, interest of new technology usage, social and cultural background of a person, use of English language in day-to-day life give a significant impact on the adoption oflCT by the disabled community.
文摘This study evaluates the extent of voluntary disclosure in the annual reports of non-financial companies listed at the Amman Stock Exchange (ASE) for the year 2006. The study adopts the disclosure index suggested by Haddad, AI-Shattarat & Nobanee (2009) and evaluates the voluntary disclosure for the Jordanian companies for the year 2006 at three levels: the first provides a description and analysis of the overall voluntary disclosure; the second covers the extent to which each individual item of information is disclosed; the third covers the type of information (e.g., financial information, historical information, management discussion). The results of the study reveal that there was a considerable variation in the disclosure of the index items and also among the listed companies. On average, a company disclosed about 28.95% of the items applicable to it, and only six out of the 53 companies received disclosure scores greater than 50%. It was also found that 50 items out of 62 items included in the index had a disclosure below 50%, and 10 items had disclosure of less than 10%. With respect to the evaluation of different types of information, the analyses indicated that the category of the background information, the category of financial ratios and the category of management discussions were better disclosed in corporate annual reports than the other types of information.
基金supported by the MKE(The Ministry of Knowledge Economy),Koreathe ITRC(Information Technology Research Center)support program supervised by the NIPA(National IT Industry Promotion Agency)(NIPA-2010-C1090-1021-0010)
文摘A smart Human Interface (HCI) replacing conventional mouse interface is proposed. The interface is able to control and command action with only hand. Four finger motions (left click, right dick, hold, drag) are used to command the interface. Also the authors materialiae cursor movement control using image processing The measure what they use for inference is entropy of Electromyogram (EMG) signal, Gaussian modeling and likelihood estimation. In image processing for cursor control, they use color recognition to get the center point of finger tip from marker, and map the point onto cursor. Accuracy of finger movement inference is over 95% and cursor control works naturally without delay. They materlalize whole system to check its performance and utility.
基金National Natural Science Foundation of China(No.50875204)National Basic Research "973" Project(No.2011CB706805)
文摘This study proposesan over all framework for applying wireless manufacturing(WM)technologies in a smart factory and establishes a smart factory data computing and information using system (dc-IUS). Several plug-and-play (PnP) application modules of the dc-IUS are presented in the fields of machining process and quality control,material flow and inventory control,and factory resource tracking. Different schemes are discussed about how and where to apply these functions. Then some running examples are studied to demonstrate the feasibility and reliability of dc-IUS. At last,the challenges of applying WM are discussed and a conclusion is given.