The Planning and design of engineering depend on the output of surveying. Therefore the quality of surveying directly impacts that of planning and design, which in turn impacts the quality of construction. Each phase ...
详细信息
The Planning and design of engineering depend on the output of surveying. Therefore the quality of surveying directly impacts that of planning and design, which in turn impacts the quality of construction. Each phase within a project life cycle set the stage for the next sustainability. A construction project requires vast material and human resources;any misstep could lead to costly wastes. A mature legal framework, sound public policy and abundant knowledge base are essential for its success. Innovation management requires systematic approaches to make use of advancements in multiple disciplines. Geographic Information System (GIS) empowers us to manage and make use of the information while minimizing the redundancy and waste. Integration is conductive to management, storage/retrieval, planning, design, study/analysis, check, and ultimately decision making. The goal is to elevate the standards in engineering, surveying, planning, design, construction and supervision. Technology management, after all, is the service provided by the engineering consulting service industry. This paper takes a close look at multiple viewpoints on the innovation for integration mechanisms of engineering consulting service industry, it's future development, quality control and regulation issues. It explores the concept and strategies on surveying, planning, design, implementation and quality control. With a methodological approach to project management, utilizing the latest technology, risk analysis and management, time and information management rampant cost overrun can be controlled. In the end it might help government agencies and engineering consulting industry improve efficiency and establish high benchmark standard.
For controlling the arc ion plating process precisely to improve the plating quality, an automatic control sysytem is developed in this paper. This system is different from other plating automation system;it is based ...
详细信息
ISBN:
(纸本)9781612841021
For controlling the arc ion plating process precisely to improve the plating quality, an automatic control sysytem is developed in this paper. This system is different from other plating automation system;it is based on not PLCs used in most automation system, but control cards and boards for industry and configuration software-MCGS. The hardware of the automatic control system consists mainly of an industrial computer, three ISA cards, and five I/O wiring terminal boards. The master control menus, devices configuration, user windows, real-time database, and control program constitute the software of the automatic control system. Compared with manual control system, the automatic control system is more timely and precisely, improving the quality of plating and production efficiency. Compared with automatic control system based on PLC, the automatic control system is more simplified, reducing investment in hardwares, and this system can be operated more conveniently owing to its friendly human-machine interfaces.
A slotted elliptical antenna is designed and fabricated to meet the requirements for the WLAN applications. This antenna has a wideband, operating in the frequency range from 2.4 GHz to 6.65 GHz. A 50Ω microtsrip-lin...
详细信息
A slotted elliptical antenna is designed and fabricated to meet the requirements for the WLAN applications. This antenna has a wideband, operating in the frequency range from 2.4 GHz to 6.65 GHz. A 50Ω microtsrip-line is used to feed the antenna. The radiation characteristics of this antenna are investigated with commercial available CST Microwave studio software. The design method is also described.
This paper proposes a method for knowledge acquisition,visualizing and analysis which is combined by data flow diagram(BFD),and entity-relationships diagram(ERD).The knowledge acquisition from an expert or specialist ...
详细信息
This paper proposes a method for knowledge acquisition,visualizing and analysis which is combined by data flow diagram(BFD),and entity-relationships diagram(ERD).The knowledge acquisition from an expert or specialist uses a video recorder and interview skill *** visualization is effective for information sharing among working place as well as for idea *** analysis aims to clarify a structure of decision making from the viewpoints of input, output and *** method developed is applied to Japanese manufacturer which produces electronic *** company had only a partial portion of the manual for its production planning procedure. Finally the manual for production planning procedure has been developed which could inform us a future problem to improve productivity of the *** have found this knowledge extracting or externalizing and expressing or describing methods can be applied to various processes of which detail procedures exist only in the knowledge of the planning expert.
Test compression has become a de facto technique in VLSI testing. Meanwhile, excessive capture power of at-speed testing has also become a serious concern. Therefore, it is important to co-optimize test power and comp...
详细信息
ISBN:
(纸本)9781424475162
Test compression has become a de facto technique in VLSI testing. Meanwhile, excessive capture power of at-speed testing has also become a serious concern. Therefore, it is important to co-optimize test power and compression ratio in at-speed testing. In this paper, a novel X-filling framework is proposed to reduce capture power of both LoC and LoS at-speed testing, which is applicable for different test compression schemes. The proposed technology has been validated by the experimental results on larger ITC'99 benchmark circuits.
This paper presents an experiment on in situ summarisation in a museum context. We implement a range of standard summarisation algorithms, and use them to generate summaries for individual exhibit areas in a museum, i...
详细信息
Memory leak is a common type of defect that is hard to detect manually. Existing memory leak detection tools suffer from lack of precise interprocedural alias and path conditions. To address this problem, we present a...
详细信息
Memory leak is a common type of defect that is hard to detect manually. Existing memory leak detection tools suffer from lack of precise interprocedural alias and path conditions. To address this problem, we present a static interprocedural analysis algorithm, which captures memory actions and path conditions precisely, to detect memory leak in C programs. Our algorithm uses path-sensitive symbolic execution to track the memory actions in different program paths guarded by path conditions. A novel analysis model called Memory State Transition Graph (MSTG) is proposed to describe the tracking process and its results. An MSTG is generated from a procedure. Nodes in an MSTG contain states of memory objects which record the function behaviors precisely. Edges in anMSTG are annotated with path conditions collected by symbolic execution. The path conditions are checked for satisfiability to reduce the number of false alarms and the path explosion. In order to do interprocedural analysis, our algorithm generates a summary for each procedure from the MSTG and applies the summary at the procedure's call sites. Our implemented tool has found several memory leak bugs in some open source programs and detected more bugs than other tools in some programs from the SPEC2000 benchmarks. In some cases, our tool produces many false positives, but most of them are caused by the same code patterns which are easy to check.
To secure computing in pervasive environment, an adaptive algorithmic approach for access control (based on human notion of trust) is proposed. The proposed model provides support to calculate direct trust in situatio...
详细信息
To secure computing in pervasive environment, an adaptive algorithmic approach for access control (based on human notion of trust) is proposed. The proposed model provides support to calculate direct trust in situations when the requesting entity has a past experience with the service. It encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. An adaptive policy based management is proposed to handle strategic malicious behavior. The defense mechanism incorporated by proposed model against strategic attack is also demonstrated. Finally we have compared our model with existing evolutionary models in this field.
Message In Message (MIM) is an emerging wireless technology to improve the capacity of wireless networks, which augments concurrent transmission opportunities of contending wireless nodes. In a MIM-capable communicati...
详细信息
ISBN:
(纸本)9781450308212
Message In Message (MIM) is an emerging wireless technology to improve the capacity of wireless networks, which augments concurrent transmission opportunities of contending wireless nodes. In a MIM-capable communication system, however, the challenging problem is that the concurrent transmission opportunity is restricted by underlying network topologies. In this paper, we propose an MIM-aware association control scheme (MIMAC) that can greatly increase concurrent transmission opportunities by regulating the association among OpenFlow APs in NOX-based wireless systems. MIMAC exploits the distinctive features of NOX architectures, such as maintaining a global view of the network topology and controlling the association among OpenFlow APs in a centralized way. Using simulation-based evaluations, we demonstrate that MIMAC achieves high throughput enhancement by up to 200% compared to legacy WLAN systems.
By analyzing the typical business of graduation design management platform, which including these work of choosing a topic, starting a topic, paper and concluding a topic, four working platforms based on J2 EE were re...
详细信息
ISBN:
(纸本)9783642255373
By analyzing the typical business of graduation design management platform, which including these work of choosing a topic, starting a topic, paper and concluding a topic, four working platforms based on J2 EE were realized using the development technology of syncretizing struts2, Spring and Hibernate. This four working platforms contain: student work platform, instructor working platform, evaluation expert working platform and system administrator working platform. And because of these functions platform, a convenient and effective platform provided for the graduation design management.
暂无评论