In many compames, cost management models are abandoned due to their complexity and because of this, the academic literature has experienced a downturn in publications regarding cost management. This paper deepens the ...In many compames, cost management models are abandoned due to their complexity and because of this, the academic literature has experienced a downturn in publications regarding cost management. This paper deepens the understanding regarding the practical usability of cost management models for purchasing decisions, and provides a framework for determining a desired complexity of cost management in different purchasing environments. The complexity is defined along three dimensions identified in literature and the different purchasing environments stem from an adaptation of Kraljic's (1983) matrix.展开更多
With the deepened transformation of China's power system, the stability and reliability of power utilization have been dramatically improved, but meter reading data acquisition does not keep pace with the times. With...With the deepened transformation of China's power system, the stability and reliability of power utilization have been dramatically improved, but meter reading data acquisition does not keep pace with the times. With the continuous maturity of low-voltage power line communication (PLC), this leads us to see hopes of using PLC technology to realize remote meter reading. In this paper, based on current PLC technology and combining domestic and foreign successful cases, a beneficial exploration and research is conducted from the composition and establishment of software and the design of software and protocol.展开更多
Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared da...Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared data becomes important. Watermarking is emerging to be a very effective tool for imposing ownership rights on various digital data formats. Watermarking of such datasets may bring distortions in the data. Consequently, the extracted knowledge may be inaccurate. These distortions are controlled by the usability constraints, which in turn limit the available bandwidth for watermarking. Large bandwidth ensures robustness; however, it may degrade the quality of the data. Such a situation can be resolved by optimizing the available bandwidth subject to the usability constraints. Optimization techniques, particularly bioinspired techniques, have become a preferred choice for solving such issues during the past few years. In this paper, we investigate the usability of various optimization schemes for identifying the maximum available bandwidth to achieve two objectives:(1) preserving the knowledge stored in the data;(2) maximizing the available bandwidth subject to the usability constraints to achieve maximum robustness. The first objective is achieved with a usability constraint model, which ensures that the knowledge is not compromised as a result of watermark embedding. The second objective is achieved by finding the maximum bandwidth subject to the usability constraints specified in the first objective. The performance of optimization schemes is evaluated using different metrics.展开更多
文摘In many compames, cost management models are abandoned due to their complexity and because of this, the academic literature has experienced a downturn in publications regarding cost management. This paper deepens the understanding regarding the practical usability of cost management models for purchasing decisions, and provides a framework for determining a desired complexity of cost management in different purchasing environments. The complexity is defined along three dimensions identified in literature and the different purchasing environments stem from an adaptation of Kraljic's (1983) matrix.
文摘With the deepened transformation of China's power system, the stability and reliability of power utilization have been dramatically improved, but meter reading data acquisition does not keep pace with the times. With the continuous maturity of low-voltage power line communication (PLC), this leads us to see hopes of using PLC technology to realize remote meter reading. In this paper, based on current PLC technology and combining domestic and foreign successful cases, a beneficial exploration and research is conducted from the composition and establishment of software and the design of software and protocol.
文摘Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared data becomes important. Watermarking is emerging to be a very effective tool for imposing ownership rights on various digital data formats. Watermarking of such datasets may bring distortions in the data. Consequently, the extracted knowledge may be inaccurate. These distortions are controlled by the usability constraints, which in turn limit the available bandwidth for watermarking. Large bandwidth ensures robustness; however, it may degrade the quality of the data. Such a situation can be resolved by optimizing the available bandwidth subject to the usability constraints. Optimization techniques, particularly bioinspired techniques, have become a preferred choice for solving such issues during the past few years. In this paper, we investigate the usability of various optimization schemes for identifying the maximum available bandwidth to achieve two objectives:(1) preserving the knowledge stored in the data;(2) maximizing the available bandwidth subject to the usability constraints to achieve maximum robustness. The first objective is achieved with a usability constraint model, which ensures that the knowledge is not compromised as a result of watermark embedding. The second objective is achieved by finding the maximum bandwidth subject to the usability constraints specified in the first objective. The performance of optimization schemes is evaluated using different metrics.