Search Options

Sort by:

Sort search results by

Publication Type:

Publication Type filter

Open access:

Publication Date:

Periodicals:

Periodicals filter

Search results

Online since: February 2014
Authors: Li Zhong Han, Jin Quan Zhang, Yun Yang
 plant Qualitative u326 Crop loss(t) Quantitative u327 famous scenery Qualitative u328 the river area decreased(km3) Quantitative Surface water environment u33 u331 SS(mg/l) Quantitative u332 COD(mg/l) Quantitative u333 NH3-N(mg/l) Quantitative u334 Pb(mg/l) Quantitative u335 Oil(mg/l) Quantitative u336 pH Quantitative u337 Hydrology Qualitative Air environment u34 u341 NOX(t) Quantitative u342 SO2(t) Quantitative u343 CO2(t) Quantitative u344 CO(t) Quantitative u345 TSP(t) Quantitative u346 Hydrocarbon(t) Quantitative Construction waste environment u35 u351 Pile construction(t) Quantitative u352 Construction waste(t) Quantitative u353 Domestic garbage(t) Quantitative Acoustic environment u36 u361 Construction machinery(dB) Quantitative u362 The noise of traffic(dB) Quantitative Table 1 with the above Operation stage u4 Social environment u41 u411 Residents living Qualitative u412 Access traffic safety  Qualitative Ecological environment u42 u421 Natural landscape Qualitative u422
Journal of Highway and Transportation Research and Development,2006,23(7):154-157(in Chinese) [3] Gu Daojin,Zhu Yingxin,Gu Lijing.
Journal of Tsinghua University(Science and Technology),2006,46(12):1953-1956(in Chinese) [4] Wang Xian’en,Zhang Haihua,Zhao Wenjin,et al.
Journal of Jilin University(Science Edition),2006,44(1):137-141(in Chinese) [5] Toshiharu ikaga, and simultaneous evaluation of LCA﹒ LCC tool of buildings in the country and local governments and enterprises on the application situation [J].  
Environment International Organization, 2004,30(5):721-739 [7] Deng Nansheng,Wang Xiaobing.
Online since: January 2012
Authors: Jian Tong, Hai Tao Wen, Sebastian Kummer, Xiao Na Wang
Indeed, express also sells the safety to the customer [17].
In this research, the SWOT analysis was used for the option air-, marine- and rail traffic.
Indeed, express also sells the safety to the customer [17].
[4] Babbar, S. and Prasad, S., “International purchasing, inventory management and logistics research", International Journal of Physical Distribution & Logistics Management, Vol.28 No.6, 1998, pp. 403-433
Pedersen, "The transport selection criteria of Norwegian exporters", International Journal of Physical Distribution & Logistics Management, Vol. 28 No. 2, 1998, pp. 108-120
Online since: June 2014
Authors: Cherng Shing Lin, Kuo Da Chou
The average daily traffic volume of Hsuehshan Tunnel is approximately 40000 vehicles.
During extended holidays, the daily traffic volume can reach 80000 vehicles [1].
This highlights the importance of tunnel safety, which is a crucial topic in the field of fire protection engineering.
Beard,“Flashover and boundary properties,”Fire Safety Journal, vol. 45,pp.116-121,2010
Ehtamo, “FDS+Evac: Modelling Social Interactions in Fire Evacuation”, Proceedings of the 7th International Conference on Performance-Based Codes and Fire Safety Design Methods, SFPE, Bethesda, MD, USA, pp. 241–250 ,2008
Online since: February 2014
Authors: Liu Dan
EDI in e-commerce application and safety measures Liu Dan Wuhan Biological Engineering College of Computer and Information Engineering Wuhan,China e-mail:15694270@qq.com Keywords: EDI; E-commerce; security; Legal Abstract:The science and technology, information industry, the development of sudden flight, so that means of transaction in international trade and method of the emergence of new forms, a variety of commercial institutions to establish electronic communications between the handling of the relationship between business activities and speed up the supply-side processing speed.
Currently, the developed countries and some developing countries in Europe and America, EDI has become the most basic means of foreign trade and contact, are widely used in trading companies, customs, commodity inspection, banking, transportation and insurance sectors or industries, and has achieved huge economic benefits to its users at an annual growth rate of 40%, as a new type of trade, EDI has begun to become a leading international trade.      
More familiar for both sides, more business, the case of a large amount of data communications, can be a virtual private network VPN, dedicated agreed by the parties encryption and authentication algorithms, re-set on the IP datagram packet and ESP header and the latter part of All the inner IP data encryption, which in both the internal network to establish an encrypted tunnel between security gateways, both to ensure data security, and simplify the mutual authentication complexity and unfamiliar for both sides, business exchanges less data traffic is relatively small, the true identity of identity not only includes the identification, but also on the credibility of the confirmation, CA certificate should be the core encryption and authentication system to ensure data transmission security.
Conclusion In short, EDI standardization of data packets through the realization of the automatic generation of business documents, transport processing, you can use VPN or a CA certificate-based encryption and authentication system to ensure their safety, and only really, really involved to solve the legal EDI questions to EDI technology as the core e-commerce will be a healthy development.
IEEE Journal on Selected Areas in Communcia-tions, 2008 (5) :16-20
Online since: September 2013
Authors: Qing Chao Li, Jin Zhang, Xiao Feng Liu, Bao Ding
Each elevator composes of the regular components: traction drive control, the car with hanging bracket, the balance weight and the safety system.
The algorithm proposed in this paper comprehensively considers the main and minor factors in different traffic modes, and adapts to different traffic flow modes.
Proceedings of SICE Annual Conference(2007), p. 2655-2662 [3] Kokolo Ikeda, Hiromichi Suzuki, Sandor Markon, et al: International Conference on Industrial Technology(2006), p. 2474-2479 [4] Yang Zhen-shan, Shao Cheng.
Journal of South China University of Technology.
Journal of Tianjin University.
Online since: July 2011
Authors: Ju Hua Yang, Guang Wu Chen
Superadd the rest of the Chinese territory such as rivers, mountains, capital, international boundaries, and other entities, site map will be finished which is used in the web development WebGIS. 4.2 Realize of qurey visualization key technique The geographic information system can realize the zoom, display, and other functions easily.
On the basis of this system, the comprehensive traffic information query system is realized which is better for providing aided travel decision for passenger through the research of the combination of urban traffic information system and railway, highway traffic information system.
Khan, Modeling urban transportation emissions: role of GIS, Computers, Environment and Urban Systems, 2004(28): p.421~433 [2] Chaowei Yang,David W Wong,Ruixin Yang.etal, Performance-improving techniques in web-based GIS[J].International Journal of Geographical Information Science,Vol 19(3).March 2005,p.319-34
Component-Based Safety Computer of Railway Signal Interlocking System.
ISECS International Colloquium on Publication Date: 3-4 Aug. 2008.Volume 1.p.538-541.
Online since: April 2014
Authors: Myung Seok Bang
Fig. 3 Safety Index Considering Aleatory Uncertainties Minimum LCC Assessment for Optimal Design The target of structural design is to minimize the total investment cost while keeping up the safety during life cycle.
The optimal safety level was examined to the beta when the expected LCC becomes minimum.
Damage cost was composed of the slight or serious cost item and the accidents, and it mostly comprises the economic loss resulting from the loss of life and the traffic closed or limited.
Cornell: A Probability-Based Structural Code, Journal of the American Concrete Institute, 66(12) (1969), pp. 974-985
Bang: Probabilistic optimal safety valuation based on stochastic finite element analysis of steel cable-stayed bridges, Smart Structures and Systems; An International Journal, Techno-Press, Vol. 10, No. 2, (2012). pp. 89-110
Online since: September 2011
Authors: Ai Ping Tang, Ai Hua Wen, Lian Fa Wang
According to statistics of lifeline earthquake damage, this safety distance to the fault surface was about 300 meters (Fig.5).
A high seismic safety transportation system should base on reliable traffic network programming and planning, and some special measures should be focused on these important nodes such as bridge, tunnel.
Conclusions In this earthquake, it has been proven again that the geotechnical disasters including these earthquake faults are the biggest hazard and risk to traffic systems.
,et al. ,”Strong Motion Observations and Recordings from the Great Wenchuan Earthquake,” Journal of Earthquake Engineering and Engineering Vibration,Vol.7 ,3, 235-246,2008
Yin Y.P.,” Feathers of landslides trigged by the Wenchuan earthquake,” Journal of Engineering Geology, Vol.17,1:29-38,2009
Online since: January 2014
Authors: Pei Yuan Gao, Jian Wang, Ming Hui Zhu
At the same time, China's expressway operation and management is lagging behind in the face of meteorological geological disasters, major traffic accidents, holidays minibus free passage and other emergencies, and especially lack the ability to deal with emergencies, which restricts the operational efficiency of the road network.
National highway video surveillance networking platform is mainly used to improve road traffic accident emergency handling ability and the public services level.
National highway video surveillance networking platform should be achieved, which is fully functional, easy to use, safety and stable.
Research on Video Online Monitoring System of Expressway: Journal of Highway, 2006(11), p. 109-112
Performance Evaluation of Highway Video Surveillance Networking System: Proceedings of International Conference on Transportation Engineering 2013
Online since: May 2012
Authors: Hui Li Wang, Zhong Ke Shi
The truck traffic also shows a single peak in the middle of the day, in contrast to the typical double peaks of general traffic patterns.
Truck traffic is heavier during the weekdays than on weekends, indicating the freight movements still conform to the business activities.
It can be seen clearly that truck traffic volume is a dominant variable.
It was found that at most sites, heavier trucks operated during the daytime and there was a ‘plateau’ peak of truck traffic in the middle of the day.
International Journal of Physical Distribution & Logistics Management Vol 32, No.4 (2002), P:299-308
Showing 601 to 610 of 1586 items