This article brings a discussion about using the Cost Deployment methodology for technological innovation in the World Class Manufacturing (WCM) systems at Fiat Group Automobiles Production System (FAPS). It aims to s...This article brings a discussion about using the Cost Deployment methodology for technological innovation in the World Class Manufacturing (WCM) systems at Fiat Group Automobiles Production System (FAPS). It aims to show how this tool acts in the technical pillars of the WCM, and its proper use as an alternative to innovate in production processes, achieving a drastic reduction in wastes and cost optimization during specific activities in production systems. The Cost Deployment builds a distinctive transversal method of WCM which helps to promote and provide extremely effectiveness in the activation of more specific methods that have been tried successfully in the Japanese manufacturing improvements. It also allows to link the operational performances, usually measured with indicators such as efficiency, providing number of defects, hours of desaturation. The used methodology was based on a literature review about the proposed topic. It ends up finding that the Cost Deployment tool is one of the most sophisticated technological innovations existing for the production systems of the World Class Manufacturing.展开更多
To address the problem of building linear barrier coverage with the location restriction, an optimization method for deploying multistatic radars is proposed, where the location restriction splits the deployment line ...To address the problem of building linear barrier coverage with the location restriction, an optimization method for deploying multistatic radars is proposed, where the location restriction splits the deployment line into two segments. By proving the characteristics of deployment patterns, an optimal deployment sequence consisting of multiple deployment patterns is proposed and exploited to cover each segment. The types and numbers of deployment patterns are determined by an algorithm that combines the integer linear programming(ILP)and exhaustive method(EM). In addition, to reduce the computation amount, a formula is introduced to calculate the upper threshold of receivers’ number in a deployment pattern. Furthermore, since the objective function is non-convex and non-analytic, the overall model is divided into two layers concerning two suboptimization problems. Subsequently, another algorithm that integrates the segments and layers is proposed to determine the deployment parameters, such as the minimum cost, parameters of the optimal deployment sequence, and the location of the split point. Simulation results demonstrate that the proposed method can effectively determine the optimal deployment parameters under the location restriction.展开更多
This paper proposes an optimal deployment method of heterogeneous multistatic radars to construct arc barrier coverage with location restrictions.This method analyzes and proves the properties of different deployment ...This paper proposes an optimal deployment method of heterogeneous multistatic radars to construct arc barrier coverage with location restrictions.This method analyzes and proves the properties of different deployment patterns in the optimal deployment sequence.Based on these properties and considering location restrictions,it introduces an optimization model of arc barrier coverage and aims to minimize the total deployment cost of heterogeneous multistatic radars.To overcome the non-convexity of the model and the non-analytical nature of the objective function,an algorithm combining integer line programming and the cuckoo search algorithm(CSA)is proposed.The proposed algorithm can determine the number of receivers and transmitters in each optimal deployment squence to minimize the total placement cost.Simulations are conducted in different conditions to verify the effectiveness of the proposed method.展开更多
Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and thei...Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and their employees have hired the enterprise cloud services, and put much important information in the cloud gradually. Cloud service systems have become the main targets of malicious attacks. However, the cloud computing technologies are still not perfect, and the management and maintenance of enterprise cloud services are more complex compared to traditional network services of cloud computing. So, enterprise cloud services are more likely to encounter some security problems, and the influenced scale of these security problems is broad. But there are few researches on the security of enterprise cloud services. In this paper, we analyze the software as a service(Saa S) enterprise cloud services and introduce the research status of security problems in cloud computing environment. Combining with the analysis of the characteristics and application architecture of Saa S enterprise cloud services, we propose the security problems analysis model, the analysis system architecture and the relational model. Our researches can support further research of the automatic generation of solutions and guide the deployment of security policies of Saa S enterprise cloud services.展开更多
文摘This article brings a discussion about using the Cost Deployment methodology for technological innovation in the World Class Manufacturing (WCM) systems at Fiat Group Automobiles Production System (FAPS). It aims to show how this tool acts in the technical pillars of the WCM, and its proper use as an alternative to innovate in production processes, achieving a drastic reduction in wastes and cost optimization during specific activities in production systems. The Cost Deployment builds a distinctive transversal method of WCM which helps to promote and provide extremely effectiveness in the activation of more specific methods that have been tried successfully in the Japanese manufacturing improvements. It also allows to link the operational performances, usually measured with indicators such as efficiency, providing number of defects, hours of desaturation. The used methodology was based on a literature review about the proposed topic. It ends up finding that the Cost Deployment tool is one of the most sophisticated technological innovations existing for the production systems of the World Class Manufacturing.
基金supported by the National Natural Science Foundation of China (61971470)。
文摘To address the problem of building linear barrier coverage with the location restriction, an optimization method for deploying multistatic radars is proposed, where the location restriction splits the deployment line into two segments. By proving the characteristics of deployment patterns, an optimal deployment sequence consisting of multiple deployment patterns is proposed and exploited to cover each segment. The types and numbers of deployment patterns are determined by an algorithm that combines the integer linear programming(ILP)and exhaustive method(EM). In addition, to reduce the computation amount, a formula is introduced to calculate the upper threshold of receivers’ number in a deployment pattern. Furthermore, since the objective function is non-convex and non-analytic, the overall model is divided into two layers concerning two suboptimization problems. Subsequently, another algorithm that integrates the segments and layers is proposed to determine the deployment parameters, such as the minimum cost, parameters of the optimal deployment sequence, and the location of the split point. Simulation results demonstrate that the proposed method can effectively determine the optimal deployment parameters under the location restriction.
基金supported by the National Natural Science Foundation of China(61971470).
文摘This paper proposes an optimal deployment method of heterogeneous multistatic radars to construct arc barrier coverage with location restrictions.This method analyzes and proves the properties of different deployment patterns in the optimal deployment sequence.Based on these properties and considering location restrictions,it introduces an optimization model of arc barrier coverage and aims to minimize the total deployment cost of heterogeneous multistatic radars.To overcome the non-convexity of the model and the non-analytical nature of the objective function,an algorithm combining integer line programming and the cuckoo search algorithm(CSA)is proposed.The proposed algorithm can determine the number of receivers and transmitters in each optimal deployment squence to minimize the total placement cost.Simulations are conducted in different conditions to verify the effectiveness of the proposed method.
基金supported by National Natural Science Foundation of China(Nos.61300049,61502197 and 61503044)the Specialized Research Fund for the Doctoral Program of Higher Education of China(No.20120061120059)+2 种基金the China Postdoctoral Science Foundation(No.2011M500612)the Key Program for Science and Technology Development of Jilin Province of China(No.20130206052GX)the Natural Science Research Foundation of Jilin Province of China(Nos.20140520069JH,20150101054JC and 20150520058JH)
文摘Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and their employees have hired the enterprise cloud services, and put much important information in the cloud gradually. Cloud service systems have become the main targets of malicious attacks. However, the cloud computing technologies are still not perfect, and the management and maintenance of enterprise cloud services are more complex compared to traditional network services of cloud computing. So, enterprise cloud services are more likely to encounter some security problems, and the influenced scale of these security problems is broad. But there are few researches on the security of enterprise cloud services. In this paper, we analyze the software as a service(Saa S) enterprise cloud services and introduce the research status of security problems in cloud computing environment. Combining with the analysis of the characteristics and application architecture of Saa S enterprise cloud services, we propose the security problems analysis model, the analysis system architecture and the relational model. Our researches can support further research of the automatic generation of solutions and guide the deployment of security policies of Saa S enterprise cloud services.