In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for...In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for product data sharing of manufacturing enterprises in geographically dispersed, heterogeneous system platform. In order to integrate enterprise level product data management (PDM) system and shop floor level distributed numerical control (DNC) system, based on the description of Web services technology, a Web-services-based integration approach is presented for facilitating seamless sharing of product data between PDM and DNC systems in a networked manufacturing environment. In order to verify the validity of the proposed approach, an example-based integration development has been implemented with Java 2 Software Development Kit and Java Web Services Developer Pack in Windows 2000 Professional environment.展开更多
Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer, and maybe results in the breach of confidentiality. In this ...Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer, and maybe results in the breach of confidentiality. In this paper, we address issues related to hiding information in self-similar network, which is proved to be similar with modern communication network. And a statistical hiding algorithm is proposed for traffic padding. The figures and the comparison of Hurst Parameters before and after traffic padding, show the effective performance of the algorithm.展开更多
This study investigated a water supply recovery problem involving municipal water service piping. The problem consisted in recovering full service after network failure, in order to rapidly satisfy all urgent citywide...This study investigated a water supply recovery problem involving municipal water service piping. The problem consisted in recovering full service after network failure, in order to rapidly satisfy all urgent citywide demands. The optimal recovery solution was achieved through the application of so-called network design problems (NDPs), which are a form of combinatorial optimization problem. However, a conventional NDP is not suitable for addressing urgent situations because (1) it does not utilize the non-failure arcs in the network, and (2) it is solely concerned with stable costs such as flow costs. Therefore, to adapt the technique to such urgent situations, the conventional NDP is here modified to deal with the specified water supply problem. In addition, a numerical illustration using the Sendai water network is presented.展开更多
This paper briefly introduces the concept and the development of technology of the Internet of things, systematically elaborated the key technology of RFID, sensors, smart chip and wireless transmission network in pro...This paper briefly introduces the concept and the development of technology of the Internet of things, systematically elaborated the key technology of RFID, sensors, smart chip and wireless transmission network in process of construction for library management system, and put forward library management system based on the Intemet of things. The paper design architecture scheme for the system in accordance with the reader' s habit, management staff and the library functions. The purpose of the article expound the concept of intelligent library, provides the strategy guide for intelligent library development system based on the Interact of things.展开更多
In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applicati...In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.展开更多
Through the analysis of the feasibility of using network technology and network technology in supply chain management system, the paper puts forward the design framework of supply chain management system based on the ...Through the analysis of the feasibility of using network technology and network technology in supply chain management system, the paper puts forward the design framework of supply chain management system based on the lntemet of things, describes the key technology of the system. The application of Intemet of things in the supply chain management system, that will realize the effective management of the whole supply chain; enhance the competitiveness of enterprises and the whole supply chain.展开更多
The filter-rods were supplied through compressed air conveyed to cigarette-maker by transmitter in my factory. Usually, each maker has two feed-pipes, it adopts fixed and one-to-one fashion, with the flexible manufact...The filter-rods were supplied through compressed air conveyed to cigarette-maker by transmitter in my factory. Usually, each maker has two feed-pipes, it adopts fixed and one-to-one fashion, with the flexible manufacturing system extending, and it's original fashion unable to satisfy the needs of a wide range of cigarette brands already, so it cry for a viable and reliable substitute. This paper creatively bring forward the optimized fashion of duct net about filter-rods based on topology structure, it adopts Freud's algorithm and improved-separated algorithm in order to achieve the optimized route, it has a apparent effect to improve the transport stability and reduce the transport time of filter- rods.展开更多
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluat...The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security展开更多
Supported by the development of computer network technology, multi-media technology and database technology, file information digitalization as a new morphology of file emerges. This new kind of file morphology could ...Supported by the development of computer network technology, multi-media technology and database technology, file information digitalization as a new morphology of file emerges. This new kind of file morphology could exercise a long-term saving of file resources and efficiently utilize it. File management is the most important part of university information management. However, as various universities are different in their specific practice, file digital construction is different in construction manner and content.展开更多
As an essential lifeline engineering system,water distribution network should provide enough water to maintain people's life after earthquake in addition to working under daily operation.However,the design of wate...As an essential lifeline engineering system,water distribution network should provide enough water to maintain people's life after earthquake in addition to working under daily operation.However,the design of water distribution network usually ignores the influence of earthquake,resulting in water stoppage in large area during many recent strong earthquakes.This study introduced a seismic design approach of water distribution network,i.e.,topology optimization design.With network topology as the optimization goal and seismic reliability as the constraint,a topology optimization model for designing water distribution network under earthquake is established.Meanwhile,two element investment importance indexes,a pipeline investment importance index and a diameter investment importance index,are introduced to evaluate the importance of pipelines in water distribution network.Then,four combinational optimization algorithms,a genetic algorithm,a simulated annealing genetic algorithm,an ant colony algorithm and a particle swarm algorithm,are introduced to solve this optimization model.Moreover,these optimization algorithms are used to optimize a network with 19 nodes and 27 pipelines.The optimization results of these algorithms are compared with each other.展开更多
基金Project supported by the National Nature Science Foundation, China (Grant No60574054)Program for NewCentury Excellent Talents in University (2006) the Shanghai Science and Technology Climb Action Foundation( Grant No06DZ11202)
文摘In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for product data sharing of manufacturing enterprises in geographically dispersed, heterogeneous system platform. In order to integrate enterprise level product data management (PDM) system and shop floor level distributed numerical control (DNC) system, based on the description of Web services technology, a Web-services-based integration approach is presented for facilitating seamless sharing of product data between PDM and DNC systems in a networked manufacturing environment. In order to verify the validity of the proposed approach, an example-based integration development has been implemented with Java 2 Software Development Kit and Java Web Services Developer Pack in Windows 2000 Professional environment.
基金Sponsored by the Program for New Excellent Talents in University(Grant No.NZCT2004-0332)
文摘Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer, and maybe results in the breach of confidentiality. In this paper, we address issues related to hiding information in self-similar network, which is proved to be similar with modern communication network. And a statistical hiding algorithm is proposed for traffic padding. The figures and the comparison of Hurst Parameters before and after traffic padding, show the effective performance of the algorithm.
文摘This study investigated a water supply recovery problem involving municipal water service piping. The problem consisted in recovering full service after network failure, in order to rapidly satisfy all urgent citywide demands. The optimal recovery solution was achieved through the application of so-called network design problems (NDPs), which are a form of combinatorial optimization problem. However, a conventional NDP is not suitable for addressing urgent situations because (1) it does not utilize the non-failure arcs in the network, and (2) it is solely concerned with stable costs such as flow costs. Therefore, to adapt the technique to such urgent situations, the conventional NDP is here modified to deal with the specified water supply problem. In addition, a numerical illustration using the Sendai water network is presented.
文摘This paper briefly introduces the concept and the development of technology of the Internet of things, systematically elaborated the key technology of RFID, sensors, smart chip and wireless transmission network in process of construction for library management system, and put forward library management system based on the Intemet of things. The paper design architecture scheme for the system in accordance with the reader' s habit, management staff and the library functions. The purpose of the article expound the concept of intelligent library, provides the strategy guide for intelligent library development system based on the Interact of things.
基金This work is supported by the following projects: National Natural Science Foundation of China grant 60772136, 111 Development Program of China NO.B08038, National Science & Technology Pillar Program of China NO.2008BAH22B03 and NO. 2007BAH08B01.
文摘In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.
文摘Through the analysis of the feasibility of using network technology and network technology in supply chain management system, the paper puts forward the design framework of supply chain management system based on the lntemet of things, describes the key technology of the system. The application of Intemet of things in the supply chain management system, that will realize the effective management of the whole supply chain; enhance the competitiveness of enterprises and the whole supply chain.
文摘The filter-rods were supplied through compressed air conveyed to cigarette-maker by transmitter in my factory. Usually, each maker has two feed-pipes, it adopts fixed and one-to-one fashion, with the flexible manufacturing system extending, and it's original fashion unable to satisfy the needs of a wide range of cigarette brands already, so it cry for a viable and reliable substitute. This paper creatively bring forward the optimized fashion of duct net about filter-rods based on topology structure, it adopts Freud's algorithm and improved-separated algorithm in order to achieve the optimized route, it has a apparent effect to improve the transport stability and reduce the transport time of filter- rods.
文摘The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security
文摘Supported by the development of computer network technology, multi-media technology and database technology, file information digitalization as a new morphology of file emerges. This new kind of file morphology could exercise a long-term saving of file resources and efficiently utilize it. File management is the most important part of university information management. However, as various universities are different in their specific practice, file digital construction is different in construction manner and content.
基金supported by the Ministry of Science and Technology of China (Grant No. SLDRCE09-B-12)the Natural Science Funds for Young Scholars of China (Grant No.50808144)
文摘As an essential lifeline engineering system,water distribution network should provide enough water to maintain people's life after earthquake in addition to working under daily operation.However,the design of water distribution network usually ignores the influence of earthquake,resulting in water stoppage in large area during many recent strong earthquakes.This study introduced a seismic design approach of water distribution network,i.e.,topology optimization design.With network topology as the optimization goal and seismic reliability as the constraint,a topology optimization model for designing water distribution network under earthquake is established.Meanwhile,two element investment importance indexes,a pipeline investment importance index and a diameter investment importance index,are introduced to evaluate the importance of pipelines in water distribution network.Then,four combinational optimization algorithms,a genetic algorithm,a simulated annealing genetic algorithm,an ant colony algorithm and a particle swarm algorithm,are introduced to solve this optimization model.Moreover,these optimization algorithms are used to optimize a network with 19 nodes and 27 pipelines.The optimization results of these algorithms are compared with each other.