Volume 2 Issue 7
Authors: Jielin Geology; Junhu WANG
Abstract: It is difficult to extract the clay alteration information in the vegetation coverage, and the extraction precision of alteration minerals is low all the time because of the smaller altered targets and the smaller scale image. Nevertheless, there is a good relationship between the clay alteration and the uranium mineralization. In order to get the good extraction effect in the vegetation coverage, the paper chose the uranium metallogenic zone of Tao Shan in south of China as the study area, used the ASTER image as the data source and devised a technological method to extract the clay alteration information in the vegetation coverage. What’s more, the paper developed a new method named RBD-PPI to acquire the spectrum of end-member. According to the experiment of this paper, the result of alteration information extraction achieved the good consistence with the known uranium deposits, and the important clay alteration abnormal have been validated in the field. Based on the information extraction result, the paper proposed some potential area for the uranium exploration. Above all, the result reveals that the method developed in the paper gets the satisfying result, furthermore, the technological method could provide good reference for the clay alteration information extraction in other area with high vegetation cover.
Keywords: Clay Alteration Information; High Vegetation Coverage; End-member Spectrum; RBD-PPI; Uranium Exploration
Authors: Lingying Zhang; Wojie Tan; Yingcong Xu; Genlue Tan
Abstract: Consumers’ perceived risk is an important factor that affects online consumers’ purchasing behavior. In this paper, the first empirical research was about the dimension structure of consumers’ perceived risk (CPR) for the overall process of B2C E-Commerce, and eight dimensions of consumers’ perceived risk were ascertained by confirmatory factor analysis, i.e. perceived health risk, perceived quality risk, perceived privacy risk, perceived economic risk, perceived time risk, perceived social risk, perceived delivery risk and perceived after-sale risk. Then, perceived risk dimensions affecting consumers’ purchasing behavior and their structural relationships were investigated through a consumer survey and statistical analysis using the methods of confirmatory factor analysis and structural equation model. The results of empirical testing demonstrate that there are five independent dimensions, perceived health risk, perceived quality risk, perceived time risk, perceived delivery risk and perceived after-sale risk which affect significantly online consumers’ purchasing behavior. The results also show that the other three dimensions, perceived privacy risk, perceived social risk and perceived economic risk are the less relevant factors.
Keywords: Risk Dimensions; Perceived Risk; Shopping Online; Consumers’ Purchasing Behavior; Overall Process of B2C
Authors: Rongfang Cao; Shumei Zhang
Abstract: The paper explores the features of some typical technologies such as WAPI, FRID Technology, ICC Security and Defense technology, Electronic Public Service, 4G Network Technology, Tele Presence and Optical Network, which are applied in the international large-scale Chinese sports events such as Beijing Olympics and Shenzhen Universiade. In addition, the approach of network system control is discussed. It is concluded that the large-scale sports events will be the experiment for the high-tech network application, which will not only make breakthroughs for the management of all the industries in China but also set successful examples for creative strategies in production, learning, research and application. What’s more, it will have deep influence on E-Government Management, Internet of Things, Security and Defense technology and Emerging Technology, etc.
Keywords: Large-scale Sports Events; Network Technology; Electronic Information Technology; Network System; Government Management
Authors: Junfeng Mei; Jianliang Wei
Abstract: As a way of mass communication, Internet public opinion plays a very important role in social life in recent years, especially with the development of 3G. This paper first introduces the concept and features of Internet public opinion and 3G. Then the influences of 3G on Internet public opinion are analyzed, including Internet public opinion broadcast ways, forms and speed, and making the network more complex and difficult to control. Finally, this paper put forwards four strategies to guide the development of 3G, namely, innovate the working mechanism, improve the attainment of media, improve the identify mechanism and strengthen the control mechanisms.
Keywords: 3G; Internet Public Opinion; Impact
Authors: Weiyi Zhang; Xiaobin Zhang
Abstract: In this paper, we focus on the need for presenting an AC electronic load based on PWM voltage source converter and providing a new control scheme in closed loop, based on phase control. The phase control can use RC circuit or LC circuit, in this paper, implementing of RC circuit permits a good control for output current. This control is easier to control and achieve and low cost. For the single phase converter, simulation and experimental results have been provided. The proposed method is expected to be applicable for three phase converters also.
Keywords: Single PWM Circuit; AC Load; RC Filter Circuit; Phase Control; Closed Loop
Authors: Yunna Wu; Qing Bian
Abstract: Hydropower has played an important role in promoting the development of the economy and cost control is one of the key facts in the hydropower construction project. In order to carry out cost control effectively, we develop a model of the drivers affecting the implementation of cost control of hydropower construction project using an Interpretive Structural Modeling (ISM) framework. The various drivers of cost control of hydropower construction project (CHCP) are identified based on the relative literatures and on consultations with experts in the industry. And we calculate the weight values of these drivers in each layer of the ISM framework using Fuzzy Analytical Hierarchy Process (FAHP). The research has an obvious theoretic and practical value for distributing resources properly and reducing cost waste in the hydropower construction project. And it would help project manager to master cost control in the hydropower construction project and improve project management level.
Keywords: Hydropower Construction Project; Cost Control; Drivers; Interpretive Structural Modeling(ISM); Fuzzy Analytical Hierarchy Process (FAHP)
Authors: Li Ze-zhong; XU Ling-shuang; HU Xin-liang; WU Yun-na
Abstract: Public-private Partnership (PPP) introduced private capital, chnology and management experience into the infrastructure projects that plays a huge economic and social benefit. In the practice process of PPP in China, the ambiguous risk allocation problems have always been the key factor hindering the development of this mode in the infrastructure investment and financing. The uncertainty of subjects undertaking the risks is the nature impacting the public and private parts to keep lasting and stable cooperation, this paper uses Topsis method to evaluate these risks of unclear sharing subject that will determine a reasonable risk allocation program. The index system processed by the Rough Set theory removes the indicators influencing the result of evaluation that will make risk allocation more accurate. The evaluation result provides a reasonable risk allocation program for both public and private.
Keywords: Infrastructure Projects; Risk Allocation; Public -private Partnership; Rough Set Theory
Authors: Chunyan Han; Yixian Liu; Man Chen; Dancheng Li
Abstract: Since devices provided by different manufacturers do not support the same MIB and multi-VLANs in one topology, it is a hard work to discover heterogeneous network topology. An algorithm based on VLAN was proposed in this paper to discover heterogeneous network topology. First we analysed the address forwarding table to get connection between switches, then we collected data of public MIB and private MIB from different manufacturers to get VLAN information. At last we built a heterogeneous network to test the algorithm, and the results proved that the algorithm is feasible.
Keywords: Heterogeneous Network; Topology Discovery; VLAN; Link Layer; Address Forwarding Table