共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
The problem of achieving a uniform flow rate through a production line and controlling in-process inventories, i.e. balancing a line, has been the subject of prior research. Much of this research has been directed at identifying “optimal” solutions to the problem. The implementation of derived techniques, however, has been ignored. Particularly, some of the behavioral factors involved with implementing a technique has been disregarded. This paper describes an approach which addresses the “balancing problem” but considers the problem of implementation. The approach specifically examines production personnel reassignments as a key implementation factor.Some prior research studies identify variable operator performance times as a key factor relating to less than uniform flow rates and excess inventories. The approach proposed in this study demonstrates that average operator performance times can be used when multiple periods are used to implement a desired solution. 相似文献
4.
在某塑料厂高压聚乙烯料仓安全隐患研究及治理项目中,利用CFX仿真模拟软件对料仓通风系统进行仿真分析,找出了原料仓通风系统存在的缺陷,提出几种改造设计方案,并对设计方案进行了优化筛选,通过现场实施效果良好。 相似文献
5.
Faced with rising costs and rampant overcrowding, correctional facilities are turning to software technologies for help. 相似文献
6.
The author contends that packaging and interconnection technology is undergoing significant changes to meet the rapidly evolving requirements of portable electronics products. The need for high density and high performance at low cost demands sophisticated developments in technology. Future portable equipment packaging requirements can be met only through advanced concepts, including multichip modules, tape-automated bonding, and flip-chip assembly. Supporting technologies, such as adhesive assembly, thermal management, and design tools must also make attendant advances. Consortium-based cooperative research and development of technologies addresses these needs, while also developing the essential vendor infrastructure 相似文献
7.
We consider an optimization problem arising in the design of controllers for OLED displays. Our objective is to minimize amplitude of the electrical current through the diodes which has a direct impact on the lifetime of such a display. Modeling the problem in mathematical terms yields a class of network flow problems where we group the arcs and pay in each group only for the arc carrying the maximum flow. We develop (fully) combinatorial approximation heuristics suitable for being implemented in the hardware of a control device that drives an OLED display. M. Skutella supported by DFG Research Center MATHEON in Berlin. 相似文献
8.
Addressing cloud computing security issues 总被引:3,自引:0,他引:3
Dimitrios ZissisAuthor Vitae Dimitrios Lekkas Author Vitae 《Future Generation Computer Systems》2012,28(3):583-592
The recent emergence of cloud computing has drastically altered everyone’s perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats. This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment. The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data and communications. The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained. 相似文献
9.
10.
符合列车通信网国际标准的列车已在欧美得到了广泛的应用,为了对TCN的体系结构有更进一步的了解。对列车通信网的编址和寻址方式的研究是很有必要的。在介绍列车通信网结构、功能及特点的基础上,对基于多功能车辆总线和绞线式列车总线的列车通信网的编址和寻址方式进行了研究,并通过将其与几种流行的现场总线的编址和寻址方式的对比。研究了它们之间的差异与共同点,最后得出这种高效的列车通信网的编址和寻址方式为数据传输的实时性提供了保证的结论. 相似文献
11.
12.
Padgett Peterson 《Network Security》1994,1994(8):11-14
13.
The use of ontologies in knowledge engineering arose as a solution to the difficulties associated with acquiring knowledge, commonly referred to as the knowledge acquisition bottleneck. The knowledge-level model represented in an ontology provides a much more structured and principled approach compared with earlier transfer-of-symbolic-knowledge approaches but brings with it a new problem, which can be termed the ontology-acquisition (and maintenance) bottleneck. Each ontological approach offers a different structure, different terms and different meanings for those terms. The unifying theme across approaches is the considerable effort associated with developing, validating and connecting ontologies. We propose an approach to engineering ontologies by retrospectively and automatically discovering them from existing data and knowledge sources in the organization. The method offered assists in the identification of similar and different terms and includes strategies for developing a shared ontology. The approach uses a human-centered, concept-based knowledge processing technique, known as formal concept analysis, to generate an ontology from examples. To assist classification of examples and to identify the salient features of the example, we use a rapid and incremental knowledge acquisition and representation technique, known as ripple-down rules. The method can be used as an alternative or complement to other approaches. 相似文献
14.
The Phoenix project is an experiment in the design of autonomous agents for a complex environment. The project consists of a simulator of the environment, a basic agent architecture, and specific implementation of agents based on real-time techniques; the first two parts have been constructed, the third is on-going. The facets of Phoenix that facilitate real-time research are: a simulator parameterized for varying environmental conditions and instrumented to record behaviors, an agent architecture designed to support adaptable planning and scheduling, and methods for reasoning about real-time constraints.This research has been supported by DARPA, # F30602-85-C-0014; the Office of Naval Research, under a University Research Initiative grant, N00014-86-K-0764; the Office of Naval Research, # N00014-88-K0009, and a grant from the Digital Equipment Corporation. We wish to thank Mike Greenberg for his keen understanding of design issues and mastery of programming that made Phoenix what it is today. We also wish to thank Paul Silvey and David Westbrook for their help. 相似文献
15.
Now that Y2K is behind us, IT professionals have been tempted to rest on their laurels particularly because the economic recession has significantly slowed spending on IT equipment and services. However, the tragic events of 11 September and a series of serious worms and denial-of-service attacks should serve as an urgent wake-up call that society is indeed vulnerable to threats against critical infrastructure. These critical systems include those for telecommunications, transportation, energy, banking and finance, government, and emergency services systems vital to the world's normal functioning and well being. Incapacitating any one or multiple portions of these infrastructures could compromise economies and public safety 相似文献
16.
《Information Security Journal: A Global Perspective》2013,22(6):16-22
Abstract Businesses possess a staggering amount of private and personally identifiable information (which I will collectively reference for the rest of this article as “PII”), not only about their customers, but also about their employees. Under which circumstances and representations was the information collected? How is that information being used? To whom is that information being transmitted? How is that information being stored? Who has access, authorized or not, to that information? Unfortunately, many, if not most, businesses do not know the answers to these questions even under normal business circumstances. 相似文献
17.
中国的电信业早已由卖方市场转为买方市场,消费者决定着企业的兴衰荣枯。若根据消费者的消费理念、消费需求及经济能力等,对各个目标市场的消费心理进行分析,则不难发现其中的“共性”与“个性”,由此区分出电信业务的“趋势”与“流行”,做到有的放矢地引导消费。用户消费心理的“共性”,是指市场中大多数消费者的心理与需求,是当前业务的“大趋势”。而“个性”则是少数消费者甚至极少数微观市场的需求,我们常称之为“流行”。“趋势”在现实业务中的地位极为重要,企业赖以生存;而“流行”则领导时尚,指引时代潮流,是企业明日的发展方向。… 相似文献
18.
19.
The inherent variability of multithreaded commercial workloads can lead to incorrect results in architectural simulation studies. Although most architectural simulation studies ignore space variability's effects, our results demonstrate that space variability has serious implications for architectural simulation studies using multithreaded workloads. The standard solution - running long enough - does not easily apply to simulation because of its enormous slowdown. To address this problem, we propose a simulation methodology combining multiple simulations with standard statistical techniques, such as confidence intervals and hypothesis testing. This methodology greatly decreases the probability of drawing incorrect conclusions, and permits reasonable simulation times given sufficient simulation hosts. 相似文献
20.
Kohonen's Self-Organizing Map (SOM) is combined with the Redundant Hash Addressing (RHA) principle. The SOM encodes the input feature vector sequence into the sequence of best-matching unit (BMU) indices and the RHA principle is then used to associate the BMU index sequence with the dictionary items. This provides a fast alternative for dynamic programming (DP) based methods for comparing and matching temporal sequences. Experiments include music retrieval and speech recognition. The separation of the classes can be improved by error-corrective learning. Comparisons to DP-based methods are presented. 相似文献