With in-depth development of the Internet of Things(IoT)in various industries,the informatization process of various industries has also entered the fast lane.This article aims to solve the supply chain process proble...With in-depth development of the Internet of Things(IoT)in various industries,the informatization process of various industries has also entered the fast lane.This article aims to solve the supply chain process problem in e-commerce,focusing on the specific application of Internet of Things technology in e-commerce.Warehousing logistics is an important link in today’s e-commerce transactions.This article proposes a distributed analysis method for RFID-based e-commerce warehousing process optimization and an e-commerce supply chain management process based on Internet of Things technology.This article first introduces the advantages and disadvantages of shared IoT identification technology and the IoT resource sharing platform based on the three-layer abstract data model and representational state transfer(REST)style.Combining actual IoT applications and the characteristics of an existing platform,a REST-based IoT resource sharing platform is proposed.Combined with actual projects,a REST-based IoT resource sharing platform was built,and key technology experiments were conducted for verification.Finally,optimizing the e-commerce supply chain management process under Internet of Things technology and explaining the advantages of optimized e-commerce supply chain management are discussed.Research on this subject provides a theoretical basis for the application of the Internet of Things in e-commerce and has practical significance and practical value for managing service capabilities and service levels in e-commerce.展开更多
Template identification technology (TIT) is designed for the scenarios where a batch of disarmed nuclear weapons or components would be dismantled to observe a nuclear disarmament treaty. The core function played by...Template identification technology (TIT) is designed for the scenarios where a batch of disarmed nuclear weapons or components would be dismantled to observe a nuclear disarmament treaty. The core function played by the TIT is to make a judgment on whether the verified item belongs to a certain kind of nuclear weapons or component (NW/NC) or to which kind the verified item belongs. This paper analyses the functions played by the TIT in the process of NW/NC dismantlement, and proposes that two phases would be followed when applying the TIT: firstly to establish NW/NC templates with a sample of size n drawn from a certain kind of disarmament NW; secondly to authenticate NW/NC by means of the TIT. This paper also expatiates some terms related to the concept of the TIT and investigates on the development status of NW/NC TIT based on radiation signatures. The study concludes that the design of template structure is crucial to the establishment of an effective TIT and that starting from different research angles and aiming at the same goal of classification different template structures and corresponding template identification methods can be built up to meet specific identification requirements.展开更多
The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteris...The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed.展开更多
In order to construct a resource-saving and environment- friendly society, the advantages of radio frequency identification (RFID) were considered. And it put forward the idea of introducing RFID in the recycling ac...In order to construct a resource-saving and environment- friendly society, the advantages of radio frequency identification (RFID) were considered. And it put forward the idea of introducing RFID in the recycling activities of waste products. Taking into account such elements as the technical level of RFID, cost saving from remanufacturing and the cost of RFID tags, both centralized and decentralized supply chain models with different participants in waste product collection were created, in order to determine the optimal pricing strategy and RFID technical level. In the end, sensitivity analyses were conducted to analyze the impacts of scaling parameter for additional increased recovery rate with RFED on pricing and RFID technology level, and impacts of cost saving on the profits of participants in different remanufacturing closed-loop supply chain models.展开更多
Objective To propose a method for identifying cooperation partners and technology opportunities based on technological similarity and technological capability analysis at the critical moment for the survival of small ...Objective To propose a method for identifying cooperation partners and technology opportunities based on technological similarity and technological capability analysis at the critical moment for the survival of small and medium-sized vaccine companies.This method can provide a direction for small and medium-sized enterprises that lack human and financial resources to make full use of its existing technologies.Methods Data analysis was carried out based on patent data.First,through cosine similarity and patent index evaluation,companies with high technological similarity and strong technological capabilities were selected as the target of cooperation.Then evaluation index system of technological development potential was built from three dimensions:technological competitiveness,technological creativity,and potential for industrialization.AHP-CRITIC method was used to determine the comprehensive development potential of each technology.Finally,technology opportunities based on K-means and text mining were identified.Results and Conclusion This method can help small and medium vaccine companies in China to identify technological opportunities and provide directions for product development.展开更多
Regional lightning protection is a complete theoretical system,mainly including:lightning interception technology(LIPT),lightning strong electromagnetic pulse high-energy absorption technology(MSPD),and regional light...Regional lightning protection is a complete theoretical system,mainly including:lightning interception technology(LIPT),lightning strong electromagnetic pulse high-energy absorption technology(MSPD),and regional lightning activity law analysis technology(RLLA).Lightning interception technology uses dispersive waveguide resonant cavity technology to achieve the functions of 46.55 m longer than upward leader of ordinary lightning rod,significantly reducing lightning strike point current by 40%,optimizing space electromagnetic field environment,and effectively intercepting overhead and side lightning strikes,and overcome the limitations of traditional lightning rod.The lightning strong electromagnetic pulse high-energy absorption technology uses distributed parameter balance technology,special disconnector for short circuit current,and parity pairing technology to achieve stronger surge absorption capacity than traditional single pulse SPD and international advanced technical indicators such as timely breaking under power frequency short circuit current,and good energy and time coordination.The analysis technology of regional lightning activity laws accurately identifies lightning strike points through comprehensive analysis of regional lightning activity laws,physical parameters of ion clouds,and the impact on ground electric fields.The three core technology systems complement each other,achieving all-round protection against direct lightning strike and lightning electromagnetic pulse.Several projects achieved zero lightning damage,effectively ensuring the safety of buildings and electronic and electrical equipment in the protected area.展开更多
Radio frequency identification (RFID) shall be a revolutionary technological innovation in recent years. Various solutions employing RFID technology have proved their functionality already in such industries as phar...Radio frequency identification (RFID) shall be a revolutionary technological innovation in recent years. Various solutions employing RFID technology have proved their functionality already in such industries as pharmaceuticals, express parcel carrying, and automotive manufacturing, and the increased efficiency and effectiveness has provided a good payback for the investments. But, up to now, fewer researches concentrate on applying REID to heavy-machinery manufacturing enterprises, which are a typical kind of enterprises in discrete manufacturing industry. The main objective of this case study is to extend our understanding of the potential for RFID to delivery of the heavy-machinery manufacturing enterprise, which involves one specific supply chain. A trial to automate the verification activities of delivery is designed and performed. Results show that the stops currently designed into the processes can be eliminated by employing RFID technology and that RFID should be a revolutionary technology as it redesigns the existing processes, eliminate some current inefficiency, improve the accuracy of delivering the products, increases information sharing between supply chain members.展开更多
In this study, we first define ecological technologies and the need for identification technology, and we then examine all the present methods of identification technology: Delphi method, Technology Road Mapping Meth...In this study, we first define ecological technologies and the need for identification technology, and we then examine all the present methods of identification technology: Delphi method, Technology Road Mapping Method, Analytic Hierarchy Process, Patentometric method and the text mining method. Among these methods, the combination of Delphi + Analytic Hierarchy Process incorporates ecological technologies into social and economic systems for a systematic identification, and is able to build an index system for an identification model of ecological technologies, identifying technical features, technical level and performance, and economic, social and ecological benefits. Patentometric method presents an objective perspective for identification, based on the characteristics and the internal development logic of ecological technologies. We find that the Delphi + Analytic Hierarchy Process and Patentometric method are the best choices for identification of ecological technologies, because both combine the advantages of qualitative and quantitative identification.展开更多
The proteome of the Arabidopsis flower has not been extensively studied previously. Here, we report a proteomic analysis of the wild type Arabidopsis flower. Using both two-dimensional electrophoresis/mass spectromet...The proteome of the Arabidopsis flower has not been extensively studied previously. Here, we report a proteomic analysis of the wild type Arabidopsis flower. Using both two-dimensional electrophoresis/mass spectrometry (2-DGEIMS) and multi-dimensional protein identification technology (MudPIT) approaches, we identified 2 446 proteins. Although a single experiment or analysis uncovered only a subset of the proteins we identified, a combination of multiple experiments and analyses facilitated the detection of a greater number of proteins. When proteins are grouped according to RNA expression levels revealed by microarray experiments, we found that proteins encoded by genes with relatively high levels of expression were detected with greater frequencies. On the other hand, at the level of the individual gene/protein, there was not a good correlation between protein spot intensity and microarray values. We also obtained strong evidence for post-translational modification from 2-DGE and MudPIT data. We detected proteins that are annotated to function in protein synthesis, folding, modification, and degradation, as well as the presence of regulatory proteins such as transcription factors and protein kinases. Finally, sequence and evolutionary analysis of genes for active methyl group metabolisms suggests that these genes are highly conserved. Our results allow the formulation of hypotheses regarding post-translational regulation of proteins in the flower, providing new understanding about Arabidopsis flower development and physiology.展开更多
In this review, we highlight the latest development of multi-channel microfluidic chip-mass spectrometry(chip-MS) in cell analysis and metabolite detection. Following a brief introduction about history and developme...In this review, we highlight the latest development of multi-channel microfluidic chip-mass spectrometry(chip-MS) in cell analysis and metabolite detection. Following a brief introduction about history and development of multi-channel microchip and MS combination, we will elaborate the key issues of constructing chip-MS platform interface. Then exciting progresses made in this field should be reviewed with well exemplified works, including chip-MS technology for cell introduction, pretreatment of cell secretions and cell metabolite analysis. We will also describe the development of integrated total analysis systems proposed by our group. We hope this brief review will inspire interested readers and provide knowledge about chip-MS platform in the bioanalysis field, particularly in cell analysis and metabolite identifying applications.展开更多
Inventory inaccuracy has great influence on the supply chain performance and it has attracted much attention of large numbers of researchers. This paper mainly studies the robust multi-period inventory inaccuracy prob...Inventory inaccuracy has great influence on the supply chain performance and it has attracted much attention of large numbers of researchers. This paper mainly studies the robust multi-period inventory inaccuracy problem by attaching radio frequency identification(RFID) technology. In particular, the typical retailer-supplier flexible commitment(RSFC) problem is considered to cope with the uncertain environment. After modeling, robust optimization(RO) and the affinely adjustable robust counterpart(AARC) methodology are applied to solve the model. Finally, this paper uses a numerical example for the analysis of how RFID technology can be exploited in supply chain, and the effect of demand uncertainty on the systems. The results highlight the importance of inventory availability related rates and variable uncertainty in determining the profitability of RFID adoption, which can provide managerial guidelines to supply chain firms.展开更多
文摘With in-depth development of the Internet of Things(IoT)in various industries,the informatization process of various industries has also entered the fast lane.This article aims to solve the supply chain process problem in e-commerce,focusing on the specific application of Internet of Things technology in e-commerce.Warehousing logistics is an important link in today’s e-commerce transactions.This article proposes a distributed analysis method for RFID-based e-commerce warehousing process optimization and an e-commerce supply chain management process based on Internet of Things technology.This article first introduces the advantages and disadvantages of shared IoT identification technology and the IoT resource sharing platform based on the three-layer abstract data model and representational state transfer(REST)style.Combining actual IoT applications and the characteristics of an existing platform,a REST-based IoT resource sharing platform is proposed.Combined with actual projects,a REST-based IoT resource sharing platform was built,and key technology experiments were conducted for verification.Finally,optimizing the e-commerce supply chain management process under Internet of Things technology and explaining the advantages of optimized e-commerce supply chain management are discussed.Research on this subject provides a theoretical basis for the application of the Internet of Things in e-commerce and has practical significance and practical value for managing service capabilities and service levels in e-commerce.
文摘Template identification technology (TIT) is designed for the scenarios where a batch of disarmed nuclear weapons or components would be dismantled to observe a nuclear disarmament treaty. The core function played by the TIT is to make a judgment on whether the verified item belongs to a certain kind of nuclear weapons or component (NW/NC) or to which kind the verified item belongs. This paper analyses the functions played by the TIT in the process of NW/NC dismantlement, and proposes that two phases would be followed when applying the TIT: firstly to establish NW/NC templates with a sample of size n drawn from a certain kind of disarmament NW; secondly to authenticate NW/NC by means of the TIT. This paper also expatiates some terms related to the concept of the TIT and investigates on the development status of NW/NC TIT based on radiation signatures. The study concludes that the design of template structure is crucial to the establishment of an effective TIT and that starting from different research angles and aiming at the same goal of classification different template structures and corresponding template identification methods can be built up to meet specific identification requirements.
基金This work was funded by the National Natural Science Foundation of China under Grant60473090.
文摘The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed.
基金National Natural Science Foundation of China(No.71301038)
文摘In order to construct a resource-saving and environment- friendly society, the advantages of radio frequency identification (RFID) were considered. And it put forward the idea of introducing RFID in the recycling activities of waste products. Taking into account such elements as the technical level of RFID, cost saving from remanufacturing and the cost of RFID tags, both centralized and decentralized supply chain models with different participants in waste product collection were created, in order to determine the optimal pricing strategy and RFID technical level. In the end, sensitivity analyses were conducted to analyze the impacts of scaling parameter for additional increased recovery rate with RFED on pricing and RFID technology level, and impacts of cost saving on the profits of participants in different remanufacturing closed-loop supply chain models.
基金Source of the project:Research Topic on Science and Technology Plan Project of Liaoning Province[2017401021]:“Transformation and Protection of Scientific and Technological Achievements”.
文摘Objective To propose a method for identifying cooperation partners and technology opportunities based on technological similarity and technological capability analysis at the critical moment for the survival of small and medium-sized vaccine companies.This method can provide a direction for small and medium-sized enterprises that lack human and financial resources to make full use of its existing technologies.Methods Data analysis was carried out based on patent data.First,through cosine similarity and patent index evaluation,companies with high technological similarity and strong technological capabilities were selected as the target of cooperation.Then evaluation index system of technological development potential was built from three dimensions:technological competitiveness,technological creativity,and potential for industrialization.AHP-CRITIC method was used to determine the comprehensive development potential of each technology.Finally,technology opportunities based on K-means and text mining were identified.Results and Conclusion This method can help small and medium vaccine companies in China to identify technological opportunities and provide directions for product development.
基金Supported by Lightning Multi-pulse Intelligent Monitoring System Optimization Technology Project of Guangdong Yuedian Dianbai Hot Water Wind Farm(SFC/DBW-Z-FW-23-006).
文摘Regional lightning protection is a complete theoretical system,mainly including:lightning interception technology(LIPT),lightning strong electromagnetic pulse high-energy absorption technology(MSPD),and regional lightning activity law analysis technology(RLLA).Lightning interception technology uses dispersive waveguide resonant cavity technology to achieve the functions of 46.55 m longer than upward leader of ordinary lightning rod,significantly reducing lightning strike point current by 40%,optimizing space electromagnetic field environment,and effectively intercepting overhead and side lightning strikes,and overcome the limitations of traditional lightning rod.The lightning strong electromagnetic pulse high-energy absorption technology uses distributed parameter balance technology,special disconnector for short circuit current,and parity pairing technology to achieve stronger surge absorption capacity than traditional single pulse SPD and international advanced technical indicators such as timely breaking under power frequency short circuit current,and good energy and time coordination.The analysis technology of regional lightning activity laws accurately identifies lightning strike points through comprehensive analysis of regional lightning activity laws,physical parameters of ion clouds,and the impact on ground electric fields.The three core technology systems complement each other,achieving all-round protection against direct lightning strike and lightning electromagnetic pulse.Several projects achieved zero lightning damage,effectively ensuring the safety of buildings and electronic and electrical equipment in the protected area.
文摘Radio frequency identification (RFID) shall be a revolutionary technological innovation in recent years. Various solutions employing RFID technology have proved their functionality already in such industries as pharmaceuticals, express parcel carrying, and automotive manufacturing, and the increased efficiency and effectiveness has provided a good payback for the investments. But, up to now, fewer researches concentrate on applying REID to heavy-machinery manufacturing enterprises, which are a typical kind of enterprises in discrete manufacturing industry. The main objective of this case study is to extend our understanding of the potential for RFID to delivery of the heavy-machinery manufacturing enterprise, which involves one specific supply chain. A trial to automate the verification activities of delivery is designed and performed. Results show that the stops currently designed into the processes can be eliminated by employing RFID technology and that RFID should be a revolutionary technology as it redesigns the existing processes, eliminate some current inefficiency, improve the accuracy of delivering the products, increases information sharing between supply chain members.
基金National Key Research and Development Program(2016YFC0503703)
文摘In this study, we first define ecological technologies and the need for identification technology, and we then examine all the present methods of identification technology: Delphi method, Technology Road Mapping Method, Analytic Hierarchy Process, Patentometric method and the text mining method. Among these methods, the combination of Delphi + Analytic Hierarchy Process incorporates ecological technologies into social and economic systems for a systematic identification, and is able to build an index system for an identification model of ecological technologies, identifying technical features, technical level and performance, and economic, social and ecological benefits. Patentometric method presents an objective perspective for identification, based on the characteristics and the internal development logic of ecological technologies. We find that the Delphi + Analytic Hierarchy Process and Patentometric method are the best choices for identification of ecological technologies, because both combine the advantages of qualitative and quantitative identification.
基金Supported by a Grant from the US Department of Energy (DE-FG02-02ER15332) to H. Maby funds from the Huck Institutes of the Life Sciences and the Biology Department at the Pennsylvania State University
文摘The proteome of the Arabidopsis flower has not been extensively studied previously. Here, we report a proteomic analysis of the wild type Arabidopsis flower. Using both two-dimensional electrophoresis/mass spectrometry (2-DGEIMS) and multi-dimensional protein identification technology (MudPIT) approaches, we identified 2 446 proteins. Although a single experiment or analysis uncovered only a subset of the proteins we identified, a combination of multiple experiments and analyses facilitated the detection of a greater number of proteins. When proteins are grouped according to RNA expression levels revealed by microarray experiments, we found that proteins encoded by genes with relatively high levels of expression were detected with greater frequencies. On the other hand, at the level of the individual gene/protein, there was not a good correlation between protein spot intensity and microarray values. We also obtained strong evidence for post-translational modification from 2-DGE and MudPIT data. We detected proteins that are annotated to function in protein synthesis, folding, modification, and degradation, as well as the presence of regulatory proteins such as transcription factors and protein kinases. Finally, sequence and evolutionary analysis of genes for active methyl group metabolisms suggests that these genes are highly conserved. Our results allow the formulation of hypotheses regarding post-translational regulation of proteins in the flower, providing new understanding about Arabidopsis flower development and physiology.
基金supported by National Natural Science Foundation of China (Nos. 81373373, 21435002, 21621003)
文摘In this review, we highlight the latest development of multi-channel microfluidic chip-mass spectrometry(chip-MS) in cell analysis and metabolite detection. Following a brief introduction about history and development of multi-channel microchip and MS combination, we will elaborate the key issues of constructing chip-MS platform interface. Then exciting progresses made in this field should be reviewed with well exemplified works, including chip-MS technology for cell introduction, pretreatment of cell secretions and cell metabolite analysis. We will also describe the development of integrated total analysis systems proposed by our group. We hope this brief review will inspire interested readers and provide knowledge about chip-MS platform in the bioanalysis field, particularly in cell analysis and metabolite identifying applications.
基金supported by the National Science Foundation of China(71171022)Industrial Project Foundation of Guizhou ProvinceChina(GY[2013]3012)
文摘Inventory inaccuracy has great influence on the supply chain performance and it has attracted much attention of large numbers of researchers. This paper mainly studies the robust multi-period inventory inaccuracy problem by attaching radio frequency identification(RFID) technology. In particular, the typical retailer-supplier flexible commitment(RSFC) problem is considered to cope with the uncertain environment. After modeling, robust optimization(RO) and the affinely adjustable robust counterpart(AARC) methodology are applied to solve the model. Finally, this paper uses a numerical example for the analysis of how RFID technology can be exploited in supply chain, and the effect of demand uncertainty on the systems. The results highlight the importance of inventory availability related rates and variable uncertainty in determining the profitability of RFID adoption, which can provide managerial guidelines to supply chain firms.