Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: February 2014
Authors: Li Zhong Han, Jin Quan Zhang, Yun Yang
plant
Qualitative
u326
Crop loss(t)
Quantitative
u327
famous scenery
Qualitative
u328
the river area decreased(km3)
Quantitative
Surface water environment u33
u331
SS(mg/l)
Quantitative
u332
COD(mg/l)
Quantitative
u333
NH3-N(mg/l)
Quantitative
u334
Pb(mg/l)
Quantitative
u335
Oil(mg/l)
Quantitative
u336
pH
Quantitative
u337
Hydrology
Qualitative
Air environment u34
u341
NOX(t)
Quantitative
u342
SO2(t)
Quantitative
u343
CO2(t)
Quantitative
u344
CO(t)
Quantitative
u345
TSP(t)
Quantitative
u346
Hydrocarbon(t)
Quantitative
Construction waste
environment u35
u351
Pile construction(t)
Quantitative
u352
Construction waste(t)
Quantitative
u353
Domestic garbage(t)
Quantitative
Acoustic environment u36
u361
Construction machinery(dB)
Quantitative
u362
The noise of traffic(dB)
Quantitative
Table 1 with the above
Operation stage u4
Social environment u41
u411
Residents living
Qualitative
u412
Access traffic safety
Qualitative
Ecological environment u42
u421
Natural landscape
Qualitative
u422
Journal of Highway and Transportation Research and Development,2006,23(7):154-157(in Chinese) [3] Gu Daojin,Zhu Yingxin,Gu Lijing.
Journal of Tsinghua University(Science and Technology),2006,46(12):1953-1956(in Chinese) [4] Wang Xian’en,Zhang Haihua,Zhao Wenjin,et al.
Journal of Jilin University(Science Edition),2006,44(1):137-141(in Chinese) [5] Toshiharu ikaga, and simultaneous evaluation of LCA﹒ LCC tool of buildings in the country and local governments and enterprises on the application situation [J].
Environment International Organization, 2004,30(5):721-739 [7] Deng Nansheng,Wang Xiaobing.
Journal of Highway and Transportation Research and Development,2006,23(7):154-157(in Chinese) [3] Gu Daojin,Zhu Yingxin,Gu Lijing.
Journal of Tsinghua University(Science and Technology),2006,46(12):1953-1956(in Chinese) [4] Wang Xian’en,Zhang Haihua,Zhao Wenjin,et al.
Journal of Jilin University(Science Edition),2006,44(1):137-141(in Chinese) [5] Toshiharu ikaga, and simultaneous evaluation of LCA﹒ LCC tool of buildings in the country and local governments and enterprises on the application situation [J].
Environment International Organization, 2004,30(5):721-739 [7] Deng Nansheng,Wang Xiaobing.
Online since: January 2012
Authors: Jian Tong, Hai Tao Wen, Sebastian Kummer, Xiao Na Wang
Indeed, express also sells the safety to the customer [17].
In this research, the SWOT analysis was used for the option air-, marine- and rail traffic.
Indeed, express also sells the safety to the customer [17].
[4] Babbar, S. and Prasad, S., “International purchasing, inventory management and logistics research", International Journal of Physical Distribution & Logistics Management, Vol.28 No.6, 1998, pp. 403-433
Pedersen, "The transport selection criteria of Norwegian exporters", International Journal of Physical Distribution & Logistics Management, Vol. 28 No. 2, 1998, pp. 108-120
In this research, the SWOT analysis was used for the option air-, marine- and rail traffic.
Indeed, express also sells the safety to the customer [17].
[4] Babbar, S. and Prasad, S., “International purchasing, inventory management and logistics research", International Journal of Physical Distribution & Logistics Management, Vol.28 No.6, 1998, pp. 403-433
Pedersen, "The transport selection criteria of Norwegian exporters", International Journal of Physical Distribution & Logistics Management, Vol. 28 No. 2, 1998, pp. 108-120
Online since: June 2014
Authors: Cherng Shing Lin, Kuo Da Chou
The average daily traffic volume of Hsuehshan Tunnel is approximately 40000 vehicles.
During extended holidays, the daily traffic volume can reach 80000 vehicles [1].
This highlights the importance of tunnel safety, which is a crucial topic in the field of fire protection engineering.
Beard,“Flashover and boundary properties,”Fire Safety Journal, vol. 45,pp.116-121,2010
Ehtamo, “FDS+Evac: Modelling Social Interactions in Fire Evacuation”, Proceedings of the 7th International Conference on Performance-Based Codes and Fire Safety Design Methods, SFPE, Bethesda, MD, USA, pp. 241–250 ,2008
During extended holidays, the daily traffic volume can reach 80000 vehicles [1].
This highlights the importance of tunnel safety, which is a crucial topic in the field of fire protection engineering.
Beard,“Flashover and boundary properties,”Fire Safety Journal, vol. 45,pp.116-121,2010
Ehtamo, “FDS+Evac: Modelling Social Interactions in Fire Evacuation”, Proceedings of the 7th International Conference on Performance-Based Codes and Fire Safety Design Methods, SFPE, Bethesda, MD, USA, pp. 241–250 ,2008
Online since: February 2014
Authors: Liu Dan
EDI in e-commerce application and safety measures
Liu Dan
Wuhan Biological Engineering College of Computer and Information Engineering
Wuhan,China
e-mail:15694270@qq.com
Keywords: EDI; E-commerce; security; Legal
Abstract:The science and technology, information industry, the development of sudden flight, so that means of transaction in international trade and method of the emergence of new forms, a variety of commercial institutions to establish electronic communications between the handling of the relationship between business activities and speed up the supply-side processing speed.
Currently, the developed countries and some developing countries in Europe and America, EDI has become the most basic means of foreign trade and contact, are widely used in trading companies, customs, commodity inspection, banking, transportation and insurance sectors or industries, and has achieved huge economic benefits to its users at an annual growth rate of 40%, as a new type of trade, EDI has begun to become a leading international trade.
More familiar for both sides, more business, the case of a large amount of data communications, can be a virtual private network VPN, dedicated agreed by the parties encryption and authentication algorithms, re-set on the IP datagram packet and ESP header and the latter part of All the inner IP data encryption, which in both the internal network to establish an encrypted tunnel between security gateways, both to ensure data security, and simplify the mutual authentication complexity and unfamiliar for both sides, business exchanges less data traffic is relatively small, the true identity of identity not only includes the identification, but also on the credibility of the confirmation, CA certificate should be the core encryption and authentication system to ensure data transmission security.
Conclusion In short, EDI standardization of data packets through the realization of the automatic generation of business documents, transport processing, you can use VPN or a CA certificate-based encryption and authentication system to ensure their safety, and only really, really involved to solve the legal EDI questions to EDI technology as the core e-commerce will be a healthy development.
IEEE Journal on Selected Areas in Communcia-tions, 2008 (5) :16-20
Currently, the developed countries and some developing countries in Europe and America, EDI has become the most basic means of foreign trade and contact, are widely used in trading companies, customs, commodity inspection, banking, transportation and insurance sectors or industries, and has achieved huge economic benefits to its users at an annual growth rate of 40%, as a new type of trade, EDI has begun to become a leading international trade.
More familiar for both sides, more business, the case of a large amount of data communications, can be a virtual private network VPN, dedicated agreed by the parties encryption and authentication algorithms, re-set on the IP datagram packet and ESP header and the latter part of All the inner IP data encryption, which in both the internal network to establish an encrypted tunnel between security gateways, both to ensure data security, and simplify the mutual authentication complexity and unfamiliar for both sides, business exchanges less data traffic is relatively small, the true identity of identity not only includes the identification, but also on the credibility of the confirmation, CA certificate should be the core encryption and authentication system to ensure data transmission security.
Conclusion In short, EDI standardization of data packets through the realization of the automatic generation of business documents, transport processing, you can use VPN or a CA certificate-based encryption and authentication system to ensure their safety, and only really, really involved to solve the legal EDI questions to EDI technology as the core e-commerce will be a healthy development.
IEEE Journal on Selected Areas in Communcia-tions, 2008 (5) :16-20
Online since: September 2013
Authors: Qing Chao Li, Jin Zhang, Xiao Feng Liu, Bao Ding
Each elevator composes of the regular components: traction drive control, the car with hanging bracket, the balance weight and the safety system.
The algorithm proposed in this paper comprehensively considers the main and minor factors in different traffic modes, and adapts to different traffic flow modes.
Proceedings of SICE Annual Conference(2007), p. 2655-2662 [3] Kokolo Ikeda, Hiromichi Suzuki, Sandor Markon, et al: International Conference on Industrial Technology(2006), p. 2474-2479 [4] Yang Zhen-shan, Shao Cheng.
Journal of South China University of Technology.
Journal of Tianjin University.
The algorithm proposed in this paper comprehensively considers the main and minor factors in different traffic modes, and adapts to different traffic flow modes.
Proceedings of SICE Annual Conference(2007), p. 2655-2662 [3] Kokolo Ikeda, Hiromichi Suzuki, Sandor Markon, et al: International Conference on Industrial Technology(2006), p. 2474-2479 [4] Yang Zhen-shan, Shao Cheng.
Journal of South China University of Technology.
Journal of Tianjin University.
Online since: July 2011
Authors: Ju Hua Yang, Guang Wu Chen
Superadd the rest of the Chinese territory such as rivers, mountains, capital, international boundaries, and other entities, site map will be finished which is used in the web development WebGIS.
4.2 Realize of qurey visualization key technique
The geographic information system can realize the zoom, display, and other functions easily.
On the basis of this system, the comprehensive traffic information query system is realized which is better for providing aided travel decision for passenger through the research of the combination of urban traffic information system and railway, highway traffic information system.
Khan, Modeling urban transportation emissions: role of GIS, Computers, Environment and Urban Systems, 2004(28): p.421~433 [2] Chaowei Yang,David W Wong,Ruixin Yang.etal, Performance-improving techniques in web-based GIS[J].International Journal of Geographical Information Science,Vol 19(3).March 2005,p.319-34
Component-Based Safety Computer of Railway Signal Interlocking System.
ISECS International Colloquium on Publication Date: 3-4 Aug. 2008.Volume 1.p.538-541.
On the basis of this system, the comprehensive traffic information query system is realized which is better for providing aided travel decision for passenger through the research of the combination of urban traffic information system and railway, highway traffic information system.
Khan, Modeling urban transportation emissions: role of GIS, Computers, Environment and Urban Systems, 2004(28): p.421~433 [2] Chaowei Yang,David W Wong,Ruixin Yang.etal, Performance-improving techniques in web-based GIS[J].International Journal of Geographical Information Science,Vol 19(3).March 2005,p.319-34
Component-Based Safety Computer of Railway Signal Interlocking System.
ISECS International Colloquium on Publication Date: 3-4 Aug. 2008.Volume 1.p.538-541.
Online since: April 2014
Authors: Myung Seok Bang
Fig. 3 Safety Index Considering Aleatory Uncertainties
Minimum LCC Assessment for Optimal Design
The target of structural design is to minimize the total investment cost while keeping up the safety during life cycle.
The optimal safety level was examined to the beta when the expected LCC becomes minimum.
Damage cost was composed of the slight or serious cost item and the accidents, and it mostly comprises the economic loss resulting from the loss of life and the traffic closed or limited.
Cornell: A Probability-Based Structural Code, Journal of the American Concrete Institute, 66(12) (1969), pp. 974-985
Bang: Probabilistic optimal safety valuation based on stochastic finite element analysis of steel cable-stayed bridges, Smart Structures and Systems; An International Journal, Techno-Press, Vol. 10, No. 2, (2012). pp. 89-110
The optimal safety level was examined to the beta when the expected LCC becomes minimum.
Damage cost was composed of the slight or serious cost item and the accidents, and it mostly comprises the economic loss resulting from the loss of life and the traffic closed or limited.
Cornell: A Probability-Based Structural Code, Journal of the American Concrete Institute, 66(12) (1969), pp. 974-985
Bang: Probabilistic optimal safety valuation based on stochastic finite element analysis of steel cable-stayed bridges, Smart Structures and Systems; An International Journal, Techno-Press, Vol. 10, No. 2, (2012). pp. 89-110
Online since: September 2011
Authors: Ai Ping Tang, Ai Hua Wen, Lian Fa Wang
According to statistics of lifeline earthquake damage, this safety distance to the fault surface was about 300 meters (Fig.5).
A high seismic safety transportation system should base on reliable traffic network programming and planning, and some special measures should be focused on these important nodes such as bridge, tunnel.
Conclusions In this earthquake, it has been proven again that the geotechnical disasters including these earthquake faults are the biggest hazard and risk to traffic systems.
,et al. ,”Strong Motion Observations and Recordings from the Great Wenchuan Earthquake,” Journal of Earthquake Engineering and Engineering Vibration,Vol.7 ,3, 235-246,2008
Yin Y.P.,” Feathers of landslides trigged by the Wenchuan earthquake,” Journal of Engineering Geology, Vol.17,1:29-38,2009
A high seismic safety transportation system should base on reliable traffic network programming and planning, and some special measures should be focused on these important nodes such as bridge, tunnel.
Conclusions In this earthquake, it has been proven again that the geotechnical disasters including these earthquake faults are the biggest hazard and risk to traffic systems.
,et al. ,”Strong Motion Observations and Recordings from the Great Wenchuan Earthquake,” Journal of Earthquake Engineering and Engineering Vibration,Vol.7 ,3, 235-246,2008
Yin Y.P.,” Feathers of landslides trigged by the Wenchuan earthquake,” Journal of Engineering Geology, Vol.17,1:29-38,2009
Online since: January 2014
Authors: Pei Yuan Gao, Jian Wang, Ming Hui Zhu
At the same time, China's expressway operation and management is lagging behind in the face of meteorological geological disasters, major traffic accidents, holidays minibus free passage and other emergencies, and especially lack the ability to deal with emergencies, which restricts the operational efficiency of the road network.
National highway video surveillance networking platform is mainly used to improve road traffic accident emergency handling ability and the public services level.
National highway video surveillance networking platform should be achieved, which is fully functional, easy to use, safety and stable.
Research on Video Online Monitoring System of Expressway: Journal of Highway, 2006(11), p. 109-112
Performance Evaluation of Highway Video Surveillance Networking System: Proceedings of International Conference on Transportation Engineering 2013
National highway video surveillance networking platform is mainly used to improve road traffic accident emergency handling ability and the public services level.
National highway video surveillance networking platform should be achieved, which is fully functional, easy to use, safety and stable.
Research on Video Online Monitoring System of Expressway: Journal of Highway, 2006(11), p. 109-112
Performance Evaluation of Highway Video Surveillance Networking System: Proceedings of International Conference on Transportation Engineering 2013
Online since: May 2012
Authors: Hui Li Wang, Zhong Ke Shi
The truck traffic also shows a single peak in the middle of the day, in contrast to the typical double peaks of general traffic patterns.
Truck traffic is heavier during the weekdays than on weekends, indicating the freight movements still conform to the business activities.
It can be seen clearly that truck traffic volume is a dominant variable.
It was found that at most sites, heavier trucks operated during the daytime and there was a ‘plateau’ peak of truck traffic in the middle of the day.
International Journal of Physical Distribution & Logistics Management Vol 32, No.4 (2002), P:299-308
Truck traffic is heavier during the weekdays than on weekends, indicating the freight movements still conform to the business activities.
It can be seen clearly that truck traffic volume is a dominant variable.
It was found that at most sites, heavier trucks operated during the daytime and there was a ‘plateau’ peak of truck traffic in the middle of the day.
International Journal of Physical Distribution & Logistics Management Vol 32, No.4 (2002), P:299-308