网络唤醒(Wake-on-LAN)是IBM的创新专利技术。带有网络唤醒功能的IBM IntelliStation工作站,在被LANClient Control Manager或Net Finity等网络管理软件激活之后,在电源供给正常条件下可随时启动并执行各种预设的系统维护任务,从而为联...网络唤醒(Wake-on-LAN)是IBM的创新专利技术。带有网络唤醒功能的IBM IntelliStation工作站,在被LANClient Control Manager或Net Finity等网络管理软件激活之后,在电源供给正常条件下可随时启动并执行各种预设的系统维护任务,从而为联网的IntelliStation用户提供了极大的方便和灵活性。IBM IntelliStation工作站的网络唤醒部件包括:可随时为网络适配器提供5V备用电源的辅助电源接口,保证IntelliStation随时准备远程开机;展开更多
In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provide...In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provides the integrated environment and more functions for many subsystems of ECAD and engine designers. So it improves the design efficiency.展开更多
Courier services develop fast as e-commerce advances but challenged by the problem of "the last kilometer". The research analyzed problems of courier ser- vices in universities or colleges with a case study of unive...Courier services develop fast as e-commerce advances but challenged by the problem of "the last kilometer". The research analyzed problems of courier ser- vices in universities or colleges with a case study of universities in Tianjin and pro- posed suggestions on intelligent courier services.展开更多
Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference be...Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.展开更多
Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequen...Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.展开更多
There is tremendous growth in the use of Geographic Information Systems(GIS), Global Positioning Systems (GPS), Remote Sensing, Satellite Communication, andModeling & Simulation techniques.These tools and techniqu...There is tremendous growth in the use of Geographic Information Systems(GIS), Global Positioning Systems (GPS), Remote Sensing, Satellite Communication, andModeling & Simulation techniques.These tools and techniques helps significantly in characterizinginfrastructure, risk area and disaster zones, planning and implementation ofhazards reduction measures etc.Communication satellites becomes vital for providingemergency communication and timely relief measures.Integration of space technologyinputs into natural disaster monitoring and mitigation mechanisms is critical for hazard reduction.This paper mainly focused on all the issues described above.Major emphasis hadbeen given to the recent developments in information & communication technology enabledtools and their applications in mining industries for safe mining operations with increasedproductivity.展开更多
This paper explores the rapid growth of four internet-based corporations and critiques the extent to which the Internet has developed from being simply a powerful tool and enabler of industry innovation to achieving s...This paper explores the rapid growth of four internet-based corporations and critiques the extent to which the Internet has developed from being simply a powerful tool and enabler of industry innovation to achieving status as a fully-fledged technology-based business ecosystem. The need to develop new management theories, tools, and techniques to compete with the "Gang of Four" (Amazon, Apple, Google, and Facebook) is also discussed in some depth as well as providing a critique of traditional models/strategic approaches and more recent theories. This is considered to be an important area of research because as a new class of Internet company emerges, incumbent firms in traditional industries will need to know how to prepare for the new challenges that face them.展开更多
A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric veh...A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric vehicles and local energy storage will be widely deployed. Internet technology will be utilized to transform the power grid into an energysharing inter-grid. To prepare for the future, a smart grid with intelligent periphery, or smart GRIP, is proposed. The building blocks of GRIP architecture are called clusters and include an energy-management system (EMS)-controlled transmission grid in the core and distribution grids, micro-grids, and smart buildings and homes on the periphery; all of which are hierarchically structured. The layered architecture of GRIP allows a seamless transition from the present to the future and plug-and-play interoperability. The basic functions of a cluster consist of (1) dispatch, (2) smoothing, and (3) mitigation. A risk-limiting dispatch methodology is presented; a new device, called the electric spring, is developed for smoothing out fluctuations in periphery clusters; and means to mitigate failures are discussed.展开更多
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me...Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.展开更多
文摘In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provides the integrated environment and more functions for many subsystems of ECAD and engine designers. So it improves the design efficiency.
基金Supported by Tianjin Agricultural University of National Grand Program in 2015(201510061020)~~
文摘Courier services develop fast as e-commerce advances but challenged by the problem of "the last kilometer". The research analyzed problems of courier ser- vices in universities or colleges with a case study of universities in Tianjin and pro- posed suggestions on intelligent courier services.
基金Project 2002CB412705 supported by the Major State Basic Research Development Program (973) of China
文摘Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management.
基金Project(2009BADB9B09)supported by the National Key Technologies R&D Program of China
文摘Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.
文摘There is tremendous growth in the use of Geographic Information Systems(GIS), Global Positioning Systems (GPS), Remote Sensing, Satellite Communication, andModeling & Simulation techniques.These tools and techniques helps significantly in characterizinginfrastructure, risk area and disaster zones, planning and implementation ofhazards reduction measures etc.Communication satellites becomes vital for providingemergency communication and timely relief measures.Integration of space technologyinputs into natural disaster monitoring and mitigation mechanisms is critical for hazard reduction.This paper mainly focused on all the issues described above.Major emphasis hadbeen given to the recent developments in information & communication technology enabledtools and their applications in mining industries for safe mining operations with increasedproductivity.
文摘This paper explores the rapid growth of four internet-based corporations and critiques the extent to which the Internet has developed from being simply a powerful tool and enabler of industry innovation to achieving status as a fully-fledged technology-based business ecosystem. The need to develop new management theories, tools, and techniques to compete with the "Gang of Four" (Amazon, Apple, Google, and Facebook) is also discussed in some depth as well as providing a critique of traditional models/strategic approaches and more recent theories. This is considered to be an important area of research because as a new class of Internet company emerges, incumbent firms in traditional industries will need to know how to prepare for the new challenges that face them.
基金sponsored by National Key Basic Research Program of China (973 Program) (2012CB215102) for WuUS National Science Foundation Award (1135872) for VaraiyaHong Kong RGC Theme-based Research Project (T23-701/14-N) for Hui
文摘A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric vehicles and local energy storage will be widely deployed. Internet technology will be utilized to transform the power grid into an energysharing inter-grid. To prepare for the future, a smart grid with intelligent periphery, or smart GRIP, is proposed. The building blocks of GRIP architecture are called clusters and include an energy-management system (EMS)-controlled transmission grid in the core and distribution grids, micro-grids, and smart buildings and homes on the periphery; all of which are hierarchically structured. The layered architecture of GRIP allows a seamless transition from the present to the future and plug-and-play interoperability. The basic functions of a cluster consist of (1) dispatch, (2) smoothing, and (3) mitigation. A risk-limiting dispatch methodology is presented; a new device, called the electric spring, is developed for smoothing out fluctuations in periphery clusters; and means to mitigate failures are discussed.
文摘Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.