The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of urban economy is facing the challenges from the natural environment. And how to realize the continuous development of urban economy and to make sure of the proper recycling between the nature, environment and human beings has become the core problem of modern urban economy development. Therefore, Dalian, a very famous Chinese seaside city, creates such a model, which forms a complete...
Nalla and Reddy proposes ID-based tripartite authenticated key agreement protocols from Weil pairing. Security analysis on passive attack for Nalla-Reddy's ID-AK-2 and ID-AK-3 protocols is proposed in this paper and the protocols are proved to be not secure on passive attack.
This paper researches a base for a judgment of stability control for a class of linear time-invariant systems with time-periodic inputs. By dynamic theory and methods, it is proved that in certain parameter region, for arbitrary time-periodic input, the system has a unique periodic solution attracting any bounded set exponentially. As an application, stability for a model of the forest with seasonal...
In this paper, a new technique has been proposed to enhance the impedance bandwidth of the COCO (Coaxial Collinear) antenna. The technique is rotating the coaxial-cable subsections of the antenna. The HFSS is adopted to prove its validity, and the simulated results indicate that the proposed method can widen the bandwidth from 4.2% to 13.5%.
An algorithm for GPS receiver performing to mitigate cross correlations between multiple satellite signals is presented. By using the known pseudosequence, the cross-correlation between every two signals can be computed, whereas this cross correlation value often changes since Doppler frequency shift and code phase difference. With aim to estimate the correct cross-correlation, a synthetical factor...
In our country, application of e-government based on the homemade platform is seldom, government support homemade platform application positively all along, But the current problem is that the homemade software and hardware is not mature, they are not compatible each other, this paper passed through combines, test, optimization repeatedly, finally has formed an e-government application platform based...
This paper presents an analysis of protection of geographical indications in China. As a member of WTO, China should meet the requirements of the agreement on trade-related aspects of intellectual property rights (TRIPs). An introduction to TRIPs is made to show the necessity of protection of geographical indications. It is pointed out that although the related protection system has already been established...
With the increasing development of software outsourcing (SO) in many countries, the competition between different software outsourcing vendees is very fierce. This paper provides a nontechnical analysis of ways that competitive intelligence (CI) system can be used by SO receivers to acquire information of the competitors, market and industry in order to gain perpetual competitive advantages. A conceptual...
Taking the domain of agriculture literature for example, this paper discussed the principles and methodology of developing domain ontology. It introduced the proceeding of domain concepts acquisition, taxonomy relation recognition and ontology formalization description. Driven by the domain ontology, a retrieval prototype system, which consisted of three tier architecture, was designed to realize...
To explore into the process difficulty of knowledge work could further improve the efficiency of the knowledge work. A model of process difficulty of knowledge work was developed. Based on 188 questionnaires, the confirmatory factor analysis showed the process difficulty of knowledge work was influence by four factors: complexity, uncertainty, structure and ambiguity.
Technological knowledge is a critical asset of enterprises, enterprise usually acquires knowledge either by self- creation or by transferring from outside. From viewpoint of knowledge management, the paper analyzes the characteristics of technological knowledge and flows in transferring technological knowledge, and inquires into knowledge from outside how to be acquainted, absorbed, utilized, shared...
This paper makes a theoretical and practical study on enterprise risk management based on combination of risk management theory and actual case. The article uses relevant theory and methods to analyze the risk management result of the SHELL ENTERPRISE case, and summarizes systematically the process and functions of risk identification, risk analysis, risk management and risk control, which is reference...
The evaluating index and assessment methods are very important aspects for the research of industrial international competitiveness. Therefore, this paper firstly summarized the types of evaluating index of industrial international competitiveness, including the achievement indicators and the reason indicators. Secondly, this paper expounded the advantages and disadvantages of the different assessment...
Multimedia messaging service (MMS) is developed from WAP FORUM and WAP protocol, and it pushes the multimedia information such as text, picture and sound to the mobile phone directly by using wap as the main data layer. MMS is becoming the most basic application of value added service. This paper presents a vehicle peccancy management system based on MMS. Through this platform, users can query their...
Based on the application of active networks in congestion control, this paper introduces the traditional congestion control policy and analyses their principles and feasibilities. Active networks congestion control policy introduces the active detection and the passive notification mechanism, the random early detect (RED) queue management and the load balance technology based on the traditional congestion...
In this paper, we propose and analyze a multi-level acknowledgement scheme for hybrid ARQ (H-ARQ) systems, which modifies a general ACK/NAK signals to represent multilevel information. For instance, the other signals except the ACK/NAK signals may be used for scheduling of retransmission in H-ARQ scheme, which results in increasing the resolution of uplink channel estimation signals. Simulation results...
We structured simulation model of logistics safety storage by using system dynamic (SD), made computer trends simulation. Based on the result, we tentatively calculated logistic safety storage.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.