The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is based on the two-stage supply chain, considering the situation that manufacturer opens direct sale channel and retailer provides private products. According to the fact that different ownership has a great influence on the supply chain structure, we establish the mathematical model, and analyze the impact of supply chain structure on supply chain members' profit and pricing strategies...
Gas insulated switchgear (GIS) is widely used for its good economic benefits. But mechanical faults caused by electromagnetic force occur occasionally. The conducting wire and the metal shell are exposed in the alternating electromagnetic field, which is caused by the load current and vortex. This leads to electromagnetic force because of electromagnetic induction. So it is necessary to analyze the...
Based on the special transform of graphics, the general mathematical geometric models of different wire ropes with defined initial parameters are presented. On this basis, the geometric model of IWRC6*36WS wire rope is set up by using Matlab and Pro/E. Abaqus/Explicit is used to analyze the elastic property of the wire rope under axial tension. The simulation analysis results show that the nonlinear...
Targeting at PHP program, this paper proposes an SQL vulnerability detection method based on the injection analysis technology. This method makes a detailed analysis on the one-time injection in the aspects of data flow and program behavior, on the basis of the combination of dynamic and static analysis technique. Then it implements the SQL vulnerability determination algorithm which is based on lexical...
Recent developments in processor, memory and radio technologies have made it possible to apply Wireless Sensor Network (WSN), which consists of nodes with limited computing capability and energy, to gather various information, for instance, to gather water consumption data from residential area. However, due to the limited energy of the working nodes, energy efficient data gathering protocol should...
This paper used the ADAMS mechanical systems dynamic simulation to estabLish the virtual prototype model of CYJY12-4.2-73-type beam-pumping unit. Through some parameters calculation and movement analysis, we obtained the rules of suspension point displacement, velocity and acceleration. From the movement rules of suspension point, we saw some weak points. We carried out parametric design and analysis...
Aimed to quality character management under "Main Manufacturer-Supplies" model, the structural equation model and programming model are set up to evaluate and optimize the supply chain components' quality characteristics. This paper can be divided into 4 parts: (1)Quality loss function: Design the quality loss functions according to 3 quality types as input of the model; (2)Structural equation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.