An integrated approach is proposed to investigate the fuzzy multi-attribute decision-making (MADM) problems, where subjective preferences are expressed by a pairwise comparison matrix on the relative weights of attr...An integrated approach is proposed to investigate the fuzzy multi-attribute decision-making (MADM) problems, where subjective preferences are expressed by a pairwise comparison matrix on the relative weights of attributes and objective information is expressed by a decision matrix. An eigenvector method integrated the subjective fuzzy preference matrix and objective information is proposed. Two linear programming models based on subjective and objective information are introduced to assess the relative importance weights of attributes in an MADM problem. The simple additive weighting method is utilized to aggregate the decision information, and then all the alternatives are ranked. Finally, a numerical example is given to show the feasibility and effectiveness of the method. The result shows that it is easier than other methods of integrating subjective and objective information.展开更多
In this paper, we present a fuzzy linguistic scale, which is characterized by triangular fuzzy numbers on [1/9, 9], for the comparison between two alternatives, and introduce a possibility degree formula for comparing...In this paper, we present a fuzzy linguistic scale, which is characterized by triangular fuzzy numbers on [1/9, 9], for the comparison between two alternatives, and introduce a possibility degree formula for comparing triangular fuzzy numbers. We utilize the fuzzy linguistic scale to construct a linguistic preference matrix, and propose a fuzzy induced ordered weighted geometric averaging (FIOWGA) operator to aggregate linguistic preference information. A method based on the fuzzy linguistic scale and FIOWGA operator for decision-making problems is presented. Finally, an illustrative example is given to verify the developed method and to demonstrate its feasibility and effectiveness.展开更多
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con...Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme.展开更多
Locating the mineral processing plant near a mine is the most important parameter that affects the whole process.Many factors,and their preferences,should be considered in this stage.The factors include economical,geo...Locating the mineral processing plant near a mine is the most important parameter that affects the whole process.Many factors,and their preferences,should be considered in this stage.The factors include economical,geological,technical,environmental and tectonic parameters.A multi-criteria decision making method is necessary to rank the alternatives.In this paper we describe how plant location is selected by using the Analytic Hierarchy Process(AHP).This method,with eight criteria,was used to select a location for the mineral processing plant at the Sangan iron ore mine(phase 1).Three alternatives for the processing plant were evaluated.The main criteria were distance from the mine,access to heavy machinery transport,the amount of excavation required for grading,bed mixture capacity,belt conveyor length,distance from the tailing dam,distance from the waste dumps and surface water diversion requirements.Finally,the alternatives were ranked and the best location was proposed.展开更多
Regularization method is an effective method for solving ill\|posed equation. In this paper the unbiased estimation formula of unit weight standard deviation in the regularization solution is derived and the formula i...Regularization method is an effective method for solving ill\|posed equation. In this paper the unbiased estimation formula of unit weight standard deviation in the regularization solution is derived and the formula is verified with numerical case of 1 000 sample data by use of the typical ill\|posed equation, i.e. the Fredholm integration equation of the first kind.展开更多
Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emer...Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emerged applications (e. g. Peer-to-Peer) using dynamic port numbers, masquerading techniques and encryption to avoid detection. This paper presents a machine learning (ML) based traffic classifica- tion scheme, which offers solutions to a variety of network activities and provides a platform of performance evaluation for the classifiers. The impact of dataset size, feature selection, number of application types and ML algorithm selection on classification performance is analyzed and demonstrated by the following experiments: (1) The genetic algorithm based feature selection can dramatically reduce the cost without diminishing classification accuracy. (2) The chosen ML algorithms can achieve high classification accuracy. Particularly, REPTree and C4.5 outperform the other ML algorithms when computational complexity and accuracy are both taken into account. (3) Larger dataset and fewer application types would result in better classification accuracy. Finally, early detection with only several initial packets is proposed for real-time network activity and it is proved to be feasible according to the preliminary results.展开更多
The work of translators are not always perfect, however, many of them will inevitably contain elements of misunderstanding. Of course, most of those misunderstandings are by the reason of misapprehending the correct m...The work of translators are not always perfect, however, many of them will inevitably contain elements of misunderstanding. Of course, most of those misunderstandings are by the reason of misapprehending the correct meaning of words, especially in the field of non-literary tanslation. My purpose is rather to show translators -- and, by extension, others who are learning English -- how to recognize the accurate message of words in a first draft and how to revise them so as to eliminate those incorrect translated texts.展开更多
In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intell...In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.展开更多
With the aid of computerized symbolic computation and Riccati equation rational expansion approach, some new and more general rational formal solutions to (2+1)-dimensional Toda system are obtained. The method used...With the aid of computerized symbolic computation and Riccati equation rational expansion approach, some new and more general rational formal solutions to (2+1)-dimensional Toda system are obtained. The method used here can also be applied to solve other nonlinear differential-difference equation or equations.展开更多
A prevalent kind of failure of rock slopes is toppling instability.In secondary toppling failures,these instabilities are stimulated through some external factors.A type of secondary toppling failure is"slide-toe...A prevalent kind of failure of rock slopes is toppling instability.In secondary toppling failures,these instabilities are stimulated through some external factors.A type of secondary toppling failure is"slide-toe-toppling failure".In this instability,the upper and toe parts of the slope have the potential of sliding and toppling failures,respectively.This failure has been investigated by an analytical method and experimental tests.In the present study,at first,the literature review of toppling failure is presented.Then a simple theoretical solution is suggested for evaluating this failure.The recommended method is compared with the approach of AMINI et al through a typical example and three physical models.The results indicate that the proposed method is in good agreement with the results of AMINI et al’s approach and experimental models.Therefore,this suggested methodology can be applied to examining the stability of slide-toe-toppling failure.展开更多
Ventilation characteristic parameters are the base of ventilation network solution; however, they are apt to be affected by operating errors, reading errors, airflow stability, and other factors, and it is difficult t...Ventilation characteristic parameters are the base of ventilation network solution; however, they are apt to be affected by operating errors, reading errors, airflow stability, and other factors, and it is difficult to obtain accurate results. In order to check the ventilation characteristic parameters of mines more accurately, the integrated method of circuit and path is adopted to overcome the drawbacks caused by the traditional path method or circuit method in the digital debugging process of ventilation system, which can improve the large local error or the inconsistency between the airflow direction and the actual situation caused by inaccuracy of the ventilation characteristic parameters or checking in the ventilation network solution. The results show that this method can effectively reduce the local error and prevent the pseudo-airflow reversal phenomenon; in addition, the solution results are consistent with the actual situation of mines, and the effect is obvious.展开更多
In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to hi...In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to high volume data feeds that are common in large Tier-1 ISP networks and providing rich, timely information on observed attacks. It is a software solution that is designed to run on off-the-shelf hardware platforms and incorporates a scalable data processing architecture along with lightweight analysis algorithms that make it suitable for deployment in large networks. RTFF also makes use of state of the art machine learning algorithms to construct attack models that can be used to detect as well as predict attacks.展开更多
The development and evolution of Microsoft Office and Microsoft Windows shells are based in general on the special methodology of software creation and implementation such as macros, subroutine, custom commands, and s...The development and evolution of Microsoft Office and Microsoft Windows shells are based in general on the special methodology of software creation and implementation such as macros, subroutine, custom commands, and specialized features. Microsoft Office for Mac has for long been criticized for its lack of support of Unicode and BiDi languages, notably Arabic and Hebrew. This has not changed in the Office 2008 version. Microsoft Office 2010 (also called Office 2010 and Office 14) is the current version of the Microsoft Office productivity suite for Microsoft Windows, and the successor to Microsoft Office 2007. With Office 2010, users are in control, getting things done and producing amazing results however and wherever they work best. Ms Office 2010 is the last version of Microsoft Office with support for Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 due to Office 2013 requiring Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, or Windows RT. Adaptive hardware (Ugurdag, 2006) reflects the capability of a system to maintain or improve its performance in the context of internal or external changes. Adaptation at hardware levels increases the system capabilities beyond what is possible with software-only solutions. Algorithms, techniques, and their implementation in hardware are developed over a diverse variety of applications. The methodology of the On-Off-Line adaptable processors (Todoroi & Micusha, 2012) support development of adaptable software and hardware. Automatic creation of the Off-Line adaptable processors are proved. Development of the On-Line and On-Off-Line adaptable processors based on Off-Line processing creation method is proposed (Todoroi, Micu^a, & Todoroi, 2009; Todoroi, 2008a, 2008b)展开更多
The Hospital Assessment Tool (HAT) is an assessment technique that provides technical support to the healthcare industry for accessing solid waste generation, selecting products, and work practices to eliminate or r...The Hospital Assessment Tool (HAT) is an assessment technique that provides technical support to the healthcare industry for accessing solid waste generation, selecting products, and work practices to eliminate or reduce environmental hazards and solid waste, and to maintain quality patient care. Since 2007, this tool has been applied as part of an innovative partnership between the Lucas County Solid Waste Management District and College of Engineering of the University of Toledo. The purpose of this paper is to provide a complete overview and framework of this program and the HAT so that other institutions may learn from it and adopt similar concepts to help reduce solid waste generation and improve economic conditions in their regions. A focus of this paper is a discussion of a case study that details the process and results of an assessment conducted at a large hospital in Northwest, Ohio, USA. Also, included in this paper is a discussion of the project's background, a comparison to similar project's between colleges and government agencies, and results and benefits of the program, and an overview of the opportunities and barriers to this type of research. The project demonstrates that through a cooperative effort and a creative alliance, businesses, governments, universities, and industries can work together to improve environmental quality, reduce waste, and improve profitability. The project also educates college students through practical, real-world environmental work experience and trains them to become future environmental leaders展开更多
The paper presents researches on increasing the energetic & economic efficiency of the photovoltaic (PV) conversion by designing and optimizing a dual-axis tracking mechanism that simultaneously changes the positio...The paper presents researches on increasing the energetic & economic efficiency of the photovoltaic (PV) conversion by designing and optimizing a dual-axis tracking mechanism that simultaneously changes the position of the modules using two motor sources. The driving source for the daily motion is a rotary motor, while the elevation motion is performed with a linear actuator. The main task in optimizing the tracking mechanism is to maximize the energetic gain by increasing the solar input and minimizing the energy consumption for tracking. The design strategy aims to identify the optimum angular field for the daily motion, as well as the optimum actuating time in the step-by-step motion. The study is made by developing the virtual prototype of the tracking mechanism, in the mechatronic concept. The virtual prototyping platform includes the following software solutions: CATIA (Computer Aided Tri-Dimensional Interface Application)--to create the solid model, which contains information about the mass & inertia properties of the parts, ADAMS (Automatic Dynamic Analysis of Mechanical Systems)/View--to model the mechanical structure of the solar tracker, and EASY5 & ADAMS/Controls-for the control system design.展开更多
Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. Th...Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. This study takes an inter-disciplinary approach and draws on research from economics and management to create a model of irrational escalation and a model of rational escalation. The forces that contribute to irrational escalation include the responsibility of the same manager for both the project selection and project continuation decisions that create proneness to self-justification, the potential for negative framing of decision options due to large sunk costs, the proximity of project completion and the presence of organizational inertia. Identifying these irrational escalation factors helps design appropriate de-escalation techniques. The rational escalation model draws on the real option theory and the bandit process theory to identify conditions when project continuation is justified by the value of information and the value of flexibility that the firm receives from continuing the project.展开更多
This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, ...This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system.展开更多
文摘An integrated approach is proposed to investigate the fuzzy multi-attribute decision-making (MADM) problems, where subjective preferences are expressed by a pairwise comparison matrix on the relative weights of attributes and objective information is expressed by a decision matrix. An eigenvector method integrated the subjective fuzzy preference matrix and objective information is proposed. Two linear programming models based on subjective and objective information are introduced to assess the relative importance weights of attributes in an MADM problem. The simple additive weighting method is utilized to aggregate the decision information, and then all the alternatives are ranked. Finally, a numerical example is given to show the feasibility and effectiveness of the method. The result shows that it is easier than other methods of integrating subjective and objective information.
基金The National Natural Science Foundation of China(79970093) the Ph.D. Dissertation Foundation of Southeast University- NARI-Relays Electric Co. Ltd.
文摘In this paper, we present a fuzzy linguistic scale, which is characterized by triangular fuzzy numbers on [1/9, 9], for the comparison between two alternatives, and introduce a possibility degree formula for comparing triangular fuzzy numbers. We utilize the fuzzy linguistic scale to construct a linguistic preference matrix, and propose a fuzzy induced ordered weighted geometric averaging (FIOWGA) operator to aggregate linguistic preference information. A method based on the fuzzy linguistic scale and FIOWGA operator for decision-making problems is presented. Finally, an illustrative example is given to verify the developed method and to demonstrate its feasibility and effectiveness.
基金This work was supported in part by the National Natural Science Foundation of China under Grant No.61170217,61272469,61303212,61332019,and Grant No.U1135004,and by the Fundamental Research Founds for National University,China University of Geosciences
文摘Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme.
文摘Locating the mineral processing plant near a mine is the most important parameter that affects the whole process.Many factors,and their preferences,should be considered in this stage.The factors include economical,geological,technical,environmental and tectonic parameters.A multi-criteria decision making method is necessary to rank the alternatives.In this paper we describe how plant location is selected by using the Analytic Hierarchy Process(AHP).This method,with eight criteria,was used to select a location for the mineral processing plant at the Sangan iron ore mine(phase 1).Three alternatives for the processing plant were evaluated.The main criteria were distance from the mine,access to heavy machinery transport,the amount of excavation required for grading,bed mixture capacity,belt conveyor length,distance from the tailing dam,distance from the waste dumps and surface water diversion requirements.Finally,the alternatives were ranked and the best location was proposed.
文摘Regularization method is an effective method for solving ill\|posed equation. In this paper the unbiased estimation formula of unit weight standard deviation in the regularization solution is derived and the formula is verified with numerical case of 1 000 sample data by use of the typical ill\|posed equation, i.e. the Fredholm integration equation of the first kind.
基金Supported by the National High Technology Research and Development Programme of China (No. 2005AA121620, 2006AA01Z232)the Zhejiang Provincial Natural Science Foundation of China (No. Y1080935 )the Research Innovation Program for Graduate Students in Jiangsu Province (No. CX07B_ 110zF)
文摘Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emerged applications (e. g. Peer-to-Peer) using dynamic port numbers, masquerading techniques and encryption to avoid detection. This paper presents a machine learning (ML) based traffic classifica- tion scheme, which offers solutions to a variety of network activities and provides a platform of performance evaluation for the classifiers. The impact of dataset size, feature selection, number of application types and ML algorithm selection on classification performance is analyzed and demonstrated by the following experiments: (1) The genetic algorithm based feature selection can dramatically reduce the cost without diminishing classification accuracy. (2) The chosen ML algorithms can achieve high classification accuracy. Particularly, REPTree and C4.5 outperform the other ML algorithms when computational complexity and accuracy are both taken into account. (3) Larger dataset and fewer application types would result in better classification accuracy. Finally, early detection with only several initial packets is proposed for real-time network activity and it is proved to be feasible according to the preliminary results.
文摘The work of translators are not always perfect, however, many of them will inevitably contain elements of misunderstanding. Of course, most of those misunderstandings are by the reason of misapprehending the correct meaning of words, especially in the field of non-literary tanslation. My purpose is rather to show translators -- and, by extension, others who are learning English -- how to recognize the accurate message of words in a first draft and how to revise them so as to eliminate those incorrect translated texts.
基金supported in part by the National Natural Science Foundation of China under Grants No. 61101113,No. 61072088,No.61201198the Beijing Natural Science Foundation under Grants No. 4132007,No. 4132015,No. 4132019the Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20111103120017
文摘In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.
基金The project supported by National Natural Science Foundation of China and the Natural Science Foundation of Shandong Province.
文摘With the aid of computerized symbolic computation and Riccati equation rational expansion approach, some new and more general rational formal solutions to (2+1)-dimensional Toda system are obtained. The method used here can also be applied to solve other nonlinear differential-difference equation or equations.
文摘A prevalent kind of failure of rock slopes is toppling instability.In secondary toppling failures,these instabilities are stimulated through some external factors.A type of secondary toppling failure is"slide-toe-toppling failure".In this instability,the upper and toe parts of the slope have the potential of sliding and toppling failures,respectively.This failure has been investigated by an analytical method and experimental tests.In the present study,at first,the literature review of toppling failure is presented.Then a simple theoretical solution is suggested for evaluating this failure.The recommended method is compared with the approach of AMINI et al through a typical example and three physical models.The results indicate that the proposed method is in good agreement with the results of AMINI et al’s approach and experimental models.Therefore,this suggested methodology can be applied to examining the stability of slide-toe-toppling failure.
基金Supported by the National Natural Science Foundation of China (61772159)
文摘Ventilation characteristic parameters are the base of ventilation network solution; however, they are apt to be affected by operating errors, reading errors, airflow stability, and other factors, and it is difficult to obtain accurate results. In order to check the ventilation characteristic parameters of mines more accurately, the integrated method of circuit and path is adopted to overcome the drawbacks caused by the traditional path method or circuit method in the digital debugging process of ventilation system, which can improve the large local error or the inconsistency between the airflow direction and the actual situation caused by inaccuracy of the ventilation characteristic parameters or checking in the ventilation network solution. The results show that this method can effectively reduce the local error and prevent the pseudo-airflow reversal phenomenon; in addition, the solution results are consistent with the actual situation of mines, and the effect is obvious.
文摘In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to high volume data feeds that are common in large Tier-1 ISP networks and providing rich, timely information on observed attacks. It is a software solution that is designed to run on off-the-shelf hardware platforms and incorporates a scalable data processing architecture along with lightweight analysis algorithms that make it suitable for deployment in large networks. RTFF also makes use of state of the art machine learning algorithms to construct attack models that can be used to detect as well as predict attacks.
文摘The development and evolution of Microsoft Office and Microsoft Windows shells are based in general on the special methodology of software creation and implementation such as macros, subroutine, custom commands, and specialized features. Microsoft Office for Mac has for long been criticized for its lack of support of Unicode and BiDi languages, notably Arabic and Hebrew. This has not changed in the Office 2008 version. Microsoft Office 2010 (also called Office 2010 and Office 14) is the current version of the Microsoft Office productivity suite for Microsoft Windows, and the successor to Microsoft Office 2007. With Office 2010, users are in control, getting things done and producing amazing results however and wherever they work best. Ms Office 2010 is the last version of Microsoft Office with support for Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 due to Office 2013 requiring Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, or Windows RT. Adaptive hardware (Ugurdag, 2006) reflects the capability of a system to maintain or improve its performance in the context of internal or external changes. Adaptation at hardware levels increases the system capabilities beyond what is possible with software-only solutions. Algorithms, techniques, and their implementation in hardware are developed over a diverse variety of applications. The methodology of the On-Off-Line adaptable processors (Todoroi & Micusha, 2012) support development of adaptable software and hardware. Automatic creation of the Off-Line adaptable processors are proved. Development of the On-Line and On-Off-Line adaptable processors based on Off-Line processing creation method is proposed (Todoroi, Micu^a, & Todoroi, 2009; Todoroi, 2008a, 2008b)
文摘The Hospital Assessment Tool (HAT) is an assessment technique that provides technical support to the healthcare industry for accessing solid waste generation, selecting products, and work practices to eliminate or reduce environmental hazards and solid waste, and to maintain quality patient care. Since 2007, this tool has been applied as part of an innovative partnership between the Lucas County Solid Waste Management District and College of Engineering of the University of Toledo. The purpose of this paper is to provide a complete overview and framework of this program and the HAT so that other institutions may learn from it and adopt similar concepts to help reduce solid waste generation and improve economic conditions in their regions. A focus of this paper is a discussion of a case study that details the process and results of an assessment conducted at a large hospital in Northwest, Ohio, USA. Also, included in this paper is a discussion of the project's background, a comparison to similar project's between colleges and government agencies, and results and benefits of the program, and an overview of the opportunities and barriers to this type of research. The project demonstrates that through a cooperative effort and a creative alliance, businesses, governments, universities, and industries can work together to improve environmental quality, reduce waste, and improve profitability. The project also educates college students through practical, real-world environmental work experience and trains them to become future environmental leaders
文摘The paper presents researches on increasing the energetic & economic efficiency of the photovoltaic (PV) conversion by designing and optimizing a dual-axis tracking mechanism that simultaneously changes the position of the modules using two motor sources. The driving source for the daily motion is a rotary motor, while the elevation motion is performed with a linear actuator. The main task in optimizing the tracking mechanism is to maximize the energetic gain by increasing the solar input and minimizing the energy consumption for tracking. The design strategy aims to identify the optimum angular field for the daily motion, as well as the optimum actuating time in the step-by-step motion. The study is made by developing the virtual prototype of the tracking mechanism, in the mechatronic concept. The virtual prototyping platform includes the following software solutions: CATIA (Computer Aided Tri-Dimensional Interface Application)--to create the solid model, which contains information about the mass & inertia properties of the parts, ADAMS (Automatic Dynamic Analysis of Mechanical Systems)/View--to model the mechanical structure of the solar tracker, and EASY5 & ADAMS/Controls-for the control system design.
文摘Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. This study takes an inter-disciplinary approach and draws on research from economics and management to create a model of irrational escalation and a model of rational escalation. The forces that contribute to irrational escalation include the responsibility of the same manager for both the project selection and project continuation decisions that create proneness to self-justification, the potential for negative framing of decision options due to large sunk costs, the proximity of project completion and the presence of organizational inertia. Identifying these irrational escalation factors helps design appropriate de-escalation techniques. The rational escalation model draws on the real option theory and the bandit process theory to identify conditions when project continuation is justified by the value of information and the value of flexibility that the firm receives from continuing the project.
文摘This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system.