Volume 2 Issue 3
Authors: Klaus-Dieter Thoben; Xiaoqin Gao; Jens Eschenbächer; Junzhou Yan
Abstract: The key of distributed innovation’s success is to enhance enterprise knowledge absorptive capacity. Based on establish evaluation indexes ,the authors using factor analysis and SPSS, data from 184 large enterprises in China, take a empirical analysis to enterprise distributed innovation capacity and enterprise knowledge absorptive capacity. The result indicated that enterprise distributed innovation capacity is significantly correlated to enterprise knowledge absorptive capacity. Enterprise knowledge absorption capacity has a positive influence to distributed innovation capacity. The relationship between enterprise distributed innovation capacity and knowledge absorptive capacity is a quadratic curve distribution. To improve enterprise knowledge absorptive capacity ,the enterprises should establishing a clear channel for obtaining knowledge, pay special attention to the tacit knowledge management and building a public platform for knowledge exchange and sharing.
Keywords: Distributed Innovation; Knowledge Absorptive Capacity; Innovation Capacity; Relationship; SPSS
Authors: Wei Wang
Abstract: China is crying for some reforms of its higher education system, which are expected to meet the challenges of a decline in quality of teaching and a failure at educating students in an all-round way, coupled with larger scale of enrollment expansion and nationwide campus constructions. A time-tested and proven system of higher educational management and undergraduate tutorial system will facilitate an efficient educational system to increase and guarantee the overall quality of higher education. This paper makes an analysis of the developmental dilemma of the system, and the current education of English studies in Chinese higher learning with the possible solutions discussed. Taking Xi’an Polytechnic University as an example, the author explores a bottom-up strategy of conducting the reform, which justifies the necessity and favorable condition of implementing the tutorial system for undergraduates of English. The present study sheds some insights into the researches concerned, and offers practical approaches especially to those less prestigious universities of sciences and technologies.
Keywords: Education Reform; Tutorial System; Undergraduates of English; A Dilemma; A Bottom-up Strategy
Authors: Dongxiao Niu; Hongyun Zhang; Fei Guo
Abstract: The development of offshore wind in China is still at an early stage. This paper researches the current situation and trend of offshore wind industries in European countries and China, from aspects of offshore wind farms as capacity, turbine, location, foundation, and grid connection, and analyzes the proper development direction of the industry in China. It is acknowledged that a comprehensive assessment is essential for establishing new offshore wind projects. Therefore, this paper provides a preliminary overall evaluation index system, in order to scientifically judge the feasibility of offshore wind projects.
Keywords: Offshore Wind Farm; Development; Evaluation
Authors: Xiaoping Wang
Abstract: The BL model is inadequate in measuring risks of investment assets. The author makes changes for the original model based on inflation, and makes a new model named BL-Inflation model. By mathematical test and empirical test, the author proves that the BL-Inflation model is more reasonable in asset allocation for fighting against inflation than the BL model. Besides, the author also proves that investors have different expected returns for the investment assets which have different sensitivities of inflation risk.
Keywords: BL-Inflation Model; Inflation; BL Model
Authors: Andreas Pfitzmann; Elke Franz; Katrin Borcea-Pfitzmann
Abstract: The problem of naming objects has been studied intensively for some years. Suggested properties of names ensure that they can unambiguously designate objects, i.e., the mapping between names and objects is unique, and that human beings are able to remember names. However, especially in the case of assigning names to human beings, names may constitute a threat to the privacy of the name holders as they often expose additional information about the named object. The first contribution of this paper is a thorough analysis of the privacy aspects in the given setting which leads to adding a supplemental property related to privacy: names used for designating human beings should be privacy-friendly, unique, and memorable. We point out that we have to use at least two clearly separated types of names to fulfill these requirements. Since the separation is crucial particularly for the property “privacy-friendly”, this paper defines a naming system that comprehensively supports users in managing names. The second contribution of the paper is a discussion of the implementation of the suggested concept: we describe assumptions as well as required functionality of such a system and discuss security aspects as well as specifics related to the implementation.
Keywords: Naming Scheme; Privacy; Unlinkability; Pseudonyms; Mnemonics; Privacy-enhancing Identity Management
Authors: Tianshi Wang
Abstract: In the 66kV grid which neutral point is grounding by arc suppression coil, the grounding capacitive current estimation plays an important role for accurate tuning. The error analysis for the existing capacitor current estimation method is carried out. Then a new method to estimate capacitive current is proposed in this paper, and the accuracy of the method is verified by field measurement. The new method can guarantee accurate tuning.
Keywords: Arc-suppression coil; Tuning; Capacitive current; Estimation
Authors: Li-ping Zhang
Abstract: In digital information age, rapid progress has been made in the integration of China’s digital library resources and the construction of specialized resources. The project “Zhejiang University Digital Library” (ZADL) has come into being. This paper introduces the overall construction, structure of resources, service system and the system of application. It has also discussed in detail the management institution, architectural model and architectural principles in the construction of the specialized resources database. It has also emphasized that specialized characteristics should be highlighted in the construction of the ZADL Project.
Keywords: Gtal Construction; Self-established Database; Specialized Resources; Co-construction and Sharing; Digital Lbrary
Authors: Chieh-Tsung Chi
Abstract: This paper presents the design and implementation of a new electric brush cutter based on the conventional mechanical mechanism of two or four strokes internal combustion engine type brush cutter. The mathematical model of electric brush cutter is presented and the difference between the engine type and electric type brush cutter is made as well. The system controller of electric brush cutter is composed of a speed controller based on a buck converter and the other electronic protection circuits. Some critical drawbacks are often occurred to conventional engine type brush cutter such as high mechanical noise and vibration, unfriendly operating interface, and high using cost during working process. They are very easy to be overcome by the proposed new electric brush cutter. In addition, the designing ideas and working principle of respective circuits included in system controller will be explained gradually. The performances of the proposed electric brush cutter were also validated through extensive experiments and a laboratory scale implementation.
Keywords: Electric Brush Cutter; Internal Combustion Engine; Buck Converter; Noise; Vibration
Authors: W. Suntiamorntut; W. Wittayapanpracha
Abstract: This paper presents the results of our study in the energy efficient AES encryption using S-box based on Galois-field (GF) aiming for a wireless FPGA node. The mapped composite-field GF(24)2 has been applied to compute S-box. In order to implement the energy efficient AES on FPGA for wireless sensor networks application, the several architectures such as pipelining and parallelism AES have been compared and analyzed. The low power design technique named gating is also applied to enable the necessary logics. By using this technique, we can gain the power saving about 19 percentages. In addition, the AES based on GF(24)2 gives the throughput per milli-Watts better than the AES based on LUT about 33 percentages. From the results, the AES based on GF (24)2 has been therefore chosen to build on a wireless reconfigurable node instead of using a basic structure; LUT in FPGA.
Keywords: AES; Galois field (GF); FPGA; Wireless Sensor Networks
Authors: Charlie Obimbo; Liliana Maria Arboleda-Cobo
Abstract: This paper discusses an enhancement of the Watchdog / Pathrater form of Intrusion Detection in Mobile wireless Ad-hoc networks (MANET). The participating nodes are allowed to listen to the nodes they have conveyed messages to, in promiscuous mode, if within a certain timeframe the message is not relayed, then the node is suggested to be tagged as a misbehaving node. Depending on the Trustworthiness of the node’s sending the tag information, and information already relayed by other nodes, the tagged node may then dropped from routing paths by the Pathrater, and new routes formulated. A simple simulation is done to illustrate the modality of this new IDS for MANET.
Keywords: Intrusion Detection and Prevention; Mobile Ad hoc Networks; Watchdog