The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Telecom regulatory departments issued many policies to keep the healthy development of telecom assets market, while the governments pay little attention to the resource configuration of telecom assets, and some of the existing researches have not got verified in academia. In this paper, firstly it puts forward the evaluation model for resource configuration of telecom assets, and indicators of cause...
Traditionally, the container is usually regarded as a ‘black box’ in container supply chain design and analysis, which ignores the interactions between container, inner packaging and logistics operations and their impact on sustainability performance of the logistics solution. But according to UK and international insurance organisations, more than half of incidents in container shipping are cargo...
Utilizing graph analysis models and algorithms to exploit complex interactions over a network of entities is emerging as an attractive network analytic technology. In this paper, we show that traditional column or row-based trace analysis may not be effective in deriving deep insights hidden in the storage traces collected over complex storage applications, such as complex spatial and temporal patterns,...
Conventional methods used to analyze storage workloads have been centered on relational database technology combined with attributes-based classification algorithms. This paper presents a novel analytic architecture, GraphLens, for mining and analyzing real world storage traces. The design of our GraphLens system embodies three unique features. First, we model storage traces as heterogeneous trace...
Service provision networks are popular platforms for decentralized service management. eBay and Amazon are two representative examples of enabling and hosting service provision networks for their customers. Trust management is a critical component for scaling service provision networks to larger set of participants. This paper presents Service Trust, a quality sensitive and attack resilient trust...
With the deeply insight into the research on prognostic and health management(PHM), very little attention has been focused on conducting validation and performance evaluation in the airborne PHM systems. According to the designing flowchart, three validation methods are proposed with the sample implementation. In this paper, a dynamic semi-physical validation framework for the flight control system...
This paper explores the meaning and construction of supply chain logistics costs, and analyzes the influence factors of transportation costs, inventory costs, packing costs, logistics information costs and logistics customer service costs in supply chain logistics costs; Finally the paper establishes the model which analyzes supply chain logistics costs by Analytic Hierarchy Process based on the composing...
In view of fast and precision measuring request of terrain data of ldquoModel Yellow Riverrdquo dynamic river-bed physical model experiment, as well as the difficulty of the analysis on the topographic change, this article proposes analysis system based on 3D laser scanner technology. The article introduces the work principle of 3D laser scanner. The insufficiency of 3D laser scanner technology has...
Supply chain system is a dynamic network system with fuzzy edge, and how to assess the risks of this system has become the bottleneck of enterprises management. In the light of the influence diagram theory, this paper builds a risk assessment model of supply chain from the topology layer and function layer. The model graphically describes the elements of risk assessment process and takes into account...
In this paper, there is a need for a temporal analysis to evaluate and optimize a design with respect to the deadlines. The authors put forward some performance parameters of CAN bus and attempt to find better ways to simulate and evaluate its performance. The paper compares and analyzes the characteristics of CAN scheduling and that of RM. Finally, we present a Petri Net model with extended PNK2e...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.