期刊文献+
共找到134篇文章
< 1 2 7 >
每页显示 20 50 100
Trustworthiness Evaluation for Permissioned Blockchain-Enabled Applications
1
作者 Shi-Cho Cha Chuang-Ming Shiung +3 位作者 Wen-Wei Li Chun-Neng Peng Yi-Hsuan Hung Kuo-Hui Yeh 《Computers, Materials & Continua》 SCIE EI 2022年第11期2731-2755,共25页
As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations,related stakeholders need a means to assess the trustworthiness of the applications involved within.It... As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations,related stakeholders need a means to assess the trustworthiness of the applications involved within.It is extremely important to consider the potential impact brought by the Blockchain technology in terms of security and privacy.Therefore,this study proposes a rigorous security risk management framework for permissioned blockchain-enabled applications.The framework divides itself into different implementation domains,i.e.,organization security,application security,consensus mechanism security,node management and network security,host security and perimeter security,and simultaneously provides guidelines to control the security risks of permissioned blockchain applications with respect to these security domains.In addition,a case study,including a security testing and risk evaluation on each stack of a specific organization,is demonstrated as an implementation instruction of our proposed risk management framework.According to the best of our knowledge,this study is one of the pioneer researches that provide a means to evaluate the security risks of permissioned blockchain applications from a holistic point of view.If users can trust the applications that adopted this framework,this study can contribute to the adoption of permissioned blockchain-enabled technologies.Furthermore,application providers can use the framework to perform gap analysis on their existing systems and controls and understand the risks of their applications. 展开更多
关键词 permissioned blockchain blockchain security blockchain risk evaluation
下载PDF
A Review of Consensus Protocols in Permissioned Blockchains
2
作者 Nenad Zoran Tomić 《Journal of Computer Science Research》 2021年第2期19-26,共8页
Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the sys... Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the system itself.The subjects of the paper are consensus protocols in permissioned blockchains.The objective of this paper is to identify functional advantages and disadvantages of observed protocol.The analysis covers a total of six consensus protocols for permissioned blockchains.The following characteristics were compared:security,trust among participants,throughput and scalability.The results show that no protocol shows absolute dominance in all aspects of the comparison.Paxos and Raft are intended for systems in which there is no suspicion of unreliable users,but only the problem of a temporary shutdown.Practical Byzantine Fault Tolerance is intended for systems with a small number of nodes.Federated Byzantine Fault Tolerance shows better scalability and is more suitable for large systems,but can withstand a smaller number of malicious nodes.Proof-of-authority can withstand the largest number of malicious nodes without interfering with the functioning of the system.When choosing a consensus protocol for a blockchain application,one should take into account priority characteristics. 展开更多
关键词 permissioned blockchain Consensus protocols Byzantine Fault Tolerance Crash fault tolerance
下载PDF
Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
3
作者 Rahul Gupta Kapil Sharma R.K.Garg 《Computers, Materials & Continua》 SCIE EI 2024年第3期4283-4301,共19页
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and... The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature. 展开更多
关键词 ANDROID MALWARE android security hybrid analysis permission and system call pairs
下载PDF
Research on Multi-Blockchain Electronic Archives Sharing Model
4
作者 Fang Yu Wenbin Bi +4 位作者 Ning Cao Jun Luo Diantang An Liqiang Ding Russell Higgs 《Computers, Materials & Continua》 SCIE EI 2023年第9期3921-3931,共11页
The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contr... The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption.Aiming at the problem of dynamic permission management in common access control methods,a new access control method based on smart contract under blockchain is proposed,which improves the intelligence level under blockchain technology.Firstly,the Internet attribute access control model based on smart contract is established.For the dynamic access of heterogeneous devices,the management contract,permission judgment contract and access control contract are designed;Secondly,the access object credit evaluation algorithm based on particle swarm optimization radial basis function(PSO-RBF)neural network is used to dynamically generate the access node credit threshold combined with the access policy,so as to realize the intelligent access right management method.Finally,combined with the abovemodels and algorithms,the workflow of electronic archives sharing and utilization model of multi blockchain is constructed.The experimental results show that the timeconsuming of the process increases linearly with the number of continuous access to electronic archives blocks,and the secure access control of sharing and utilization is feasible,secure and effective. 展开更多
关键词 Sharing and utilization of electronic archives dynamic permission management PSO-RBF neural network credit evaluation
下载PDF
Investigation of Android Malware Using Deep Learning Approach
5
作者 V.Joseph Raymond R.Jeberson Retna Raj 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2413-2429,共17页
In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many mor... In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more applications.The android stack is more vulnerable compared to other mobile plat-forms like IOS,Windows,or Blackberry because of the open-source platform.In the Existing system,malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware.The attackers target the victim with various attacks like adware,backdoor,spyware,ransomware,and zero-day exploits and create threat hunts on the day-to-day basics.In the existing approach,there are various tradi-tional machine learning classifiers for building a decision support system with limitations such as low detection rate and less feature selection.The important contents taken for building model from android applications like Intent Filter,Per-mission Signature,API Calls,and System commands are taken from the manifestfile.The function parameters of various machine and deep learning classifiers like Nave Bayes,k-Nearest Neighbors(k-NN),Support Vector Machine(SVM),Ada Boost,and Multi-Layer Perceptron(MLP)are done for effective results.In our pro-posed work,we have used an unsupervised learning multilayer perceptron with multiple target labels and built a model with a better accuracy rate compared to logistic regression,and rank the best features for detection of applications and clas-sify as malicious or benign can be used as threat model by online antivirus scanners. 展开更多
关键词 Android application permissions multilayer perception relief scoring
下载PDF
Assessing the Occurrence of Heavy Metals in Edible Fruits Grown around Mine Tailings Dam in Kitwe
6
作者 Hildah Musole Chiyangi Ngoy Mwanabute +1 位作者 Elisha Ncube Jhonnah Mundike 《Journal of Environmental Protection》 CAS 2023年第2期83-95,共13页
Mining activities in the Copperbelt province of Zambia have been of great environmental concern, despite recorded improvements in the socio-economic sector. Heavy metal contamination of soils resulting from depositing... Mining activities in the Copperbelt province of Zambia have been of great environmental concern, despite recorded improvements in the socio-economic sector. Heavy metal contamination of soils resulting from depositing mine tailings and rock waste has posed possible health risks for communities nearer such facilities. The current study was conducted around residential homes surrounding Kitwe slimes (TD25). This work investigated levels of Co, Cu, Fe, Mn and Pb in the soils, and avocado and lemons fruits, growing near TD25. Heavy metals were analyzed using Atomic Absorption Spectrophotometer. The work further assessed the estimated daily intake (EDI) associated with potential health risks to humans. In the soil, concentration levels of heavy metals showed a trend in the order: Fe > Cu > Mn > Co > Pb. Heavy metal contents in avocado and lemon fruits at 200 and 400 m away from TD25, all had p-values < 0.05. The distances from the suspect source (TD25) to where the fruit trees were grown, had no influence on their concentration in the fruit samples. Fruit sample results showed that Fe had the highest EDI of 0.22 mg·kg<sup>-1</sup> (avocado) and 0.14 mg·kg<sup>-1</sup> (lemon), though both results were far below the FAO/WHO standard range (12.5 - 19.6 mg·kg<sup>-1</sup>). For both fruits, Co and Pb results were negligible. The concentration of the five heavy metals in avocado and lemon fruits grown around Kitwe slimes did not pose any health risks to the consumers. 展开更多
关键词 AVOCADO Concentration LEMON Mining Permissible Limits
下载PDF
Android Permission机制的实现与安全分析 被引量:6
7
作者 张中文 雷灵光 王跃武 《信息网络安全》 2012年第8期3-6,共4页
Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permis... Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permission机制漏洞。应用程序利用该漏洞可以绕过权限管理,主动提升应用程序的访问权限,为后续攻击提供支持。同时文章也对Permission机制其它方面的安全特性进行了分析。 展开更多
关键词 ANDROID系统 PERMISSION 安全 漏洞
下载PDF
一种增强的Android安全机制模型 被引量:9
8
作者 陈伟鹤 邱道龙 《无线通信技术》 2014年第1期37-41,共5页
随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Plo... 随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Ploy安装程序之前先对应用程序和权限进行分析检测,然后将检测分析后的权限呈现给用户。实验结果表明在造成一定性能损失的情况下,新的框架可以有效减少用户所需设置的权限。 展开更多
关键词 ANDROID ANDROID PERMISSION 安全 策略模型
下载PDF
Android操作系统的安全机制研究 被引量:2
9
作者 朱长江 杨一平 《电脑知识与技术》 2013年第9期5628-5629,共2页
Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Li... Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Linux内核方面及Android自身权限机制方面存在的安全隐患。 展开更多
关键词 ANDROID 安全机制 PERMISSION
下载PDF
Blockchain Management in Smart Grid 被引量:1
10
作者 Mila Ilieva-Obretenova 《Management Studies》 2021年第4期280-288,共9页
Power Supply and Smart Grid represent specific business,which must be managed by permissioned(private)blockchain.Despite its disadvantages-time consuming,expensive,and losing from network effect-the permissioned block... Power Supply and Smart Grid represent specific business,which must be managed by permissioned(private)blockchain.Despite its disadvantages-time consuming,expensive,and losing from network effect-the permissioned blockchain offers balance,guarantees stability,and provides physical limitations for usage of validating nodes only in the network.The management of permissioned blockchain is necessary for tracing the processes in it.The author has represented the moment following topics:the idea for applying blockchain in business environment,blockchain technology-as a linked list with a new key on each step,node structure and information models for node management with a large granularity,detail models for node management with accent on configuration and performance and managed objects classes for installation of blockchain network with accent on security and performance,models for blockchain network management and five scenarios for blockchain transactions management.The paper represents a stage of project Blockchain in Smart Grid:describing of Managed Objects classes for functional areas of blockchain life cycle:Provision,Configuration,Maintenance,Security(developed),Accounting,Performance,and Subscriber control.The author uses the life cycle of telecommunications networks as a reference.The models are designed for user interface developers,university professors,and students. 展开更多
关键词 power supply smart grid permissioned(private)blockchain network effect validating nodes
下载PDF
Hyperledger Fabric Blockchain: Secure and Efficient Solution for Electronic Health Records
11
作者 Mueen Uddin M.S.Memon +4 位作者 Irfana Memon Imtiaz Ali Jamshed Memon Maha Abdelhaq Raed Alsaqour 《Computers, Materials & Continua》 SCIE EI 2021年第8期2377-2397,共21页
Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare ind... Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally.However,the existing EHR systems mostly lack in providing appropriate security,entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures.Objective:To solve this delicate problem,we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems.Methodology:In our EHR blockchain system,Peer nodes from various organizations(stakeholders)create a ledger network,where channels are created to enable secure and private communication between different stakeholders on the ledger network.Individual patients and other stakeholders are identified and registered on the network by unique digital certificates issued by membership service provider(MSP)component of the fabric architecture.Results:We created and implemented different Chaincodes to handle the business logic for executing separate EHR transactions on the network.The proposed fabric architecture provides a secure,transparent and immutable mechanism to store,share and exchange EHRs in a peer-to-peer network of different healthcare stakeholders.It ensures interoperability,scalability and availability in adapting the existing EHRs for strengthening and providing an effective and secure method to integrate and manage patient records among medical institutions in the healthcare ecosystem. 展开更多
关键词 Electronic health records blockchain hyperledger fabric patient data privacy private permissioned blockchain healthcare ecosystem
下载PDF
浅谈司法公证材料的英译
12
作者 周永秀 毕研韬 《语言教育》 2002年第3期35-36,共2页
司法公证翻译因关系到当事人在境内外的权利和义务而应格外严谨准确。笔者近年来受有关部门及当事人的委托承担了部分公证材料的翻译,从各国签证官和国外机构获得了大量有益的信息反馈,现不揣冒昧从文体特征。
关键词 机构名称 信息反馈 语法方面 thereafter translated 语义模糊 大学外国语 WISDOM PERMISSION 发证日期
下载PDF
一类SCO OpenServer 5中远程访问故障的分析和处理
13
作者 黄宁 李岚 《江西科学》 2007年第1期79-80,85,共3页
提出一类SCO OpenServer 5中远程访问常见的问题,分析其原因,提出解决方法,找到了解决这类问题的关键。
关键词 远程访问 对等用户 Rcmd Rlogin PERMISSION Denied
下载PDF
基于权限管理的Android应用行为检测 被引量:8
14
作者 刘智伟 孙其博 《信息网络安全》 2014年第6期72-77,共6页
随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用A... 随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用Android系统Permission机制的动态检查模式实现应用运行时行为的检测。Android应用通过<user-permission>申请所需权限,在运行过程中需要调用对应的API或者访问系统数据时,会发生系统权限检查,从而实现对应用行为的监控。相对在应用层进行应用行为的监控要更简洁有效,通过在框架层的定制更好地实现了对应用行为的监控,同时带给系统的损耗更小。 展开更多
关键词 应用行为 Permission机制 权限动态检查
下载PDF
基于API和Permission的Android恶意软件静态检测方法研究 被引量:2
15
作者 杨鸣坤 罗锦光 +1 位作者 欧跃发 慕德俊 《计算机应用与软件》 北大核心 2020年第4期53-58,104,共7页
当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态... 当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态反编译,提取其中的静态信息;对静态信息中的API和Permission进行统计学分析,得到API和Permission在恶意APK和正常APK中的使用率;根据它们的使用率确定基准API和Permission集合,将每一个APK转换成可参与计算的关于API和Permission的特征向量;利用改进的k-NN分类器,对待检测的APK进行分类判定。实验结果表明,该方法可以有效地对APK进行恶意分类。 展开更多
关键词 ANDROID 恶意软件 静态检测 PERMISSION 机器学习
下载PDF
POLLUTION TREND IN THE TUMEN RIVER AND ITS INFLUENCE ON REGIONAL DEVELOPMENT 被引量:1
16
作者 田卫 俞穆清 +1 位作者 王国平 郭传新 《Chinese Geographical Science》 SCIE CSCD 1999年第2期50-54,共5页
1INTRODUCTIONSeverewaterpolutionandwaterresourcesshortageshavebecometwokeyobstructionstorealizesustainable... 1INTRODUCTIONSeverewaterpolutionandwaterresourcesshortageshavebecometwokeyobstructionstorealizesustainableutilizationofwate... 展开更多
关键词 water POLLUTION environmental capacity permissible AMOUNT of WASTEWATER DISCHARGE the Tumen RIVER
下载PDF
Is glial heme oxygenase-1 suppression in neurodegenerative disorders permissive for neural repair? 被引量:2
17
作者 Hyman M. Schipper 《Neural Regeneration Research》 SCIE CAS CSCD 2015年第2期208-210,共3页
'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, ... 'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues. 展开更多
关键词 GENE HO Is glial heme oxygenase-1 suppression in neurodegenerative disorders permissive for neural repair GFAP
下载PDF
Irrigation erosion of irrigated soils in the foothills of southern Kazakhstan 被引量:1
18
作者 Abdulla S SAPAROV Enadiy K МIRZAKEEV +2 位作者 Tatyana M SHARYPOVA Galymzhan A SAPAROV Jilili ABUDUWAILI 《Journal of Arid Land》 SCIE CSCD 2013年第2期166-171,共6页
Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and t... Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and then the soils of the upper, middle and lower sections of the slopes at the experimental site were studied. Based on field investigations, authors studied the water resistance of aggregates of gray-brown soils and light gray soils before and after irrigation and qualitative indicators of changes in physical and chemical properties of structured soils in irrigation were de- termined by conventional methods of soil research. The results indicated that the changes in the physical properties of soils by using polymeric compounds created a fundamentally new opportunity to control water erosion of soils. 展开更多
关键词 irrigation erosion furrow irrigation structure-forming polymers deformation of furrows permissible water speed aggregate water stability
下载PDF
Defluoridation of Water by a Biomass: <i>Tinospora cordifolia</i> 被引量:1
19
作者 Piyush Kant Pandey Madhurima Pandey Rekha Sharma 《Journal of Environmental Protection》 2012年第7期610-616,共7页
This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to redu... This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to reduce fluoride to permissible limit 1.5 mg/L as prescribed by WHO. The efficiency of the sorption process was investigated under different experimental parameters such as pH 7, standing time 120 min and biomass doses 7.0 g with 5 mg/L concentration of fluoride. Neutral pH was identified as the optimum condition of the medium and 120 minutes was the best contact time for maximum fluoride adsorption. The experimental data was found good fitting to Langmuir and Freundlich isotherm models. In interference study tolerable effect was found with 50 mg/L concentration of co-ions, whereas increasing the concentration of co-ions retarded the fluoride removal capacity in some extent. FT-IR spectrum analysis showed fluoride binding in the different frequency ranges of the biomass. Eventually, this plant biomass is recommended as a suitable and low cost adsorbent to reduce fluoride into standard permissible limit. 展开更多
关键词 SEQUESTRATION DEFLUORIDATION BIOSORPTION FT-IR Spectrum Permissible
下载PDF
An Ordering Policy for Deteriorating Items with Time-Dependent Quadratic Demand and Salvage Value under Permissible Delay in Payment 被引量:1
20
作者 Trailokyanath Singh Madan Mohan Muduly +2 位作者 Chittaranjan Mallick Rahul Kumar Gupta Hadibandhu Pattanayak 《American Journal of Operations Research》 2019年第5期201-218,共18页
The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in th... The article deals with an economic order quantity (EOQ) inventory model for deteriorating items in which the supplier provides the purchaser a permissible delay in payment. This is so when deterioration of units in the inventory is subject to constant deterioration rate, demand rate is quadratic function of time and salvage value is associated with the deteriorated units. Shortages in the system are not allowed to occur. A mathematical formulation is developed when the supplier offers a permissible delay period to the customers under two circumstances: 1) when delay period is less than the cycle of time;and 2) when delay period is greater than the cycle of time. The method is suitable for the items like state-of-the-art aircrafts, super computers, laptops, android mobiles, seasonal items and machines and their spare parts. A solution procedure algorithm is given for finding the optimal order quantity which minimizes the total cost of an inventory system. The article includes numerical examples to support the effectiveness of the developed model. Finally, sensitivity analysis on some parameters on optimal solution is provided. 展开更多
关键词 Constant Deterioration RATE Deteriorating Items Economic Order Quantity Permissible Delay in PAYMENT SALVAGE Value TIME-DEPENDENT QUADRATIC DEMAND RATE
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部