The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes the approach of analyzing risk of deep excavation engineering based on fuzzy theory. By using fuzzy mathematical method, the risk assessment model is established, and a practical method on fuzzy comprehensive assessment on risk of deep excavation engineering is proposed, and the practicability of this method is verified in a real engineering projects.
In this paper, integrated fuzzy comprehensive appraisal approach is described and applied to government website evaluation. A government website evaluation system is established, consisting of 5 primary indexes (website content, e-government affairs, Quality of Service, website design and network characteristic) and 24 secondary indexes. Results show that it is important for websites to provide timely...
This paper focuses on the comparison of different forms of land compensation in China. A comprehensive analysis based on questionnaire surveys and case studies points out that the current compensation approach, lump sum payments is inefficient for its underestimate of benefits that land conveyed to farmers, which results in its inabilities in securing land-loss farmers' long-term living. To solve...
According to characteristics of bracing engineering for deep foundation pit in metro, an index system for supporting scheme is established. Using the theory of fuzzy probability and analytic hierarchy process (AHP), a comprehensive assessment model is constructed to optimize supporting scheme for deep excavation of metro. In order to assess the index weights scientifically, the fuzzy weighted value...
Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a large disparity between the computational power of attackers and legitimate clients: increasing the difficulty of puzzles might unnecessarily restrict legitimate clients too much, and lower difficulty puzzles cannot sufficiently block...
On the basis of considering each factor of environmental effect of highway construction projects, a new evaluation method for environmental security effect of highway construction projects is set up. Based on the grades of evaluation's definition, the extension rough set evaluation method is utilized to assess environmental security effect of highway construction projects. Analyzing the elements that...
This research establishes a comprehensive evaluation index system of economic security of land resource by using Delphi and AHP methods. An empirical analysis of Shanghai China is conducted. The conclusions are as follows. (1)The economic security of land resource is on the level of "basic security" in Shanghai from 1999 to 2006. In 2005 and 2006 the compound evaluation values are 62.9 and...
In order to solve the issue on housing shortage of Low-income families, Government vigorously promotes the construction of public housing. To discover the security level of public housing, the paper set up the public housing public satisfaction evaluation index system, and also built the public housing public satisfaction evaluation model. Then, it used the survey data of a public housing residential...
This paper presents a heuristic method for solving transmission system expansion problems (TSEP) with consideration of N-1 security constraints. The method is divided into two phases. An initial plan is established in the first phase by a search process which is based on a modified simplex method and sensitivity indices. The second phase starts from the initial plan and performs the local search in...
As widespread features of landscape and human disturbance paths, road networks bring forth many ecological effects and affect the regional land ecological security. In this paper, the methods of GIS buffer were used to elucidate the influence of roads on landscape and assess the road impacts on land ecological security in Hengshan county. Land use change greatly with different buffers. Landscape fragmentation...
Satellite images are now used as the primary source of spatial information for land-use pattern analysis. In this paper, land-use information is extracted by the maximum likelihood classification (MLC) and neural network classification (NNC) method, which is a combinative methodology of automatic extraction and recognition of land-use in Beijing City from remote sensing data. The temporal and spatial...
Along with the increased competition on construction market, the traditional performance evaluation system which based on the schedule, quality and cost is no longer applicable to the needs of the construction enterprisespsila development. How to evaluate project managementpsilas performance of construction corporations effectively has become a pressing issue. Combined with the characteristics of...
This paper aims at providing a realistic method to measure liquidity risk of China's stock market and data base for China's stock market liquidity risk management. The construction of research model is based on VaR method and the analysis method is adopted to calculate the VaR. The total sample is 121 shares, which are selected according to industry and region. Empirical research results show that...
Risks of construction project are aroused by a series of factors with hierarchical structure, which includes main risk factors and sub-risk factors. Using the multidimensional features of risk factors to form utility function, and according to the evaluations of values of sub-risks given by experts to calculate the weights and then get the evaluations of main risks. Then we could use the results to...
The capital asset pricing model (CAPM) can not be applied to estimate the capital cost of the project because of lack of applying condition due to the inefficiency of the market. In this paper we analyze the behavioral capital asset pricing model(BAPM) which has been only used in the financial markets and we get the conclusion that it can be used to estimate the project capital cost. We also modify...
Most environmental problems of buildings emerge during the construction phase of a project. Although the duration of the construction phase is a short part in the project lifecycle, the impact on the surrounding environment is paroxysmal. Moreover, the consumption of global resources and energy is mass. Therefore, green construction alternatives need to be applied in order to reduce the environmental...
Access control in content distribution networks (CDNs) is a long-standing problem and has attracted extensive research. Traditional centralized access control approaches, such as reference monitor based approach, do not suit for CDNs as such networks are of large scale and geographically distributed in nature. Current CDNs usually resort to cryptographic-based distributed approaches for better fulfilling...
Building information modelling (BIM) is only a tool in the procurement of a building, but it is changing the way the whole process is undertaken. Having a single model which is used by all disciplines requires a different management structure and by consequence a restructuring of the resources required to complete a project.These changes are encompassed in Integrated Practice and more recently Integrated...
Smart cards represent an effective tool for trustworthy portable storage of secret-keys and critical processes needed in many recent applications. We develop a more general Feistel network structure with pre- (or post-) pseudorandom shuffling of the plaintext before (or after, respectively) ciphering it using two reversibly key-linked block ciphers that is suitable for length increasing remotely keyed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.