Research on Automatic Stacking and Loading System in Major Logistics

2014 ◽  
Vol 933 ◽  
pp. 918-920
Author(s):  
Ze Feng Wei ◽  
Hui Ju ◽  
Dong Xing Qin ◽  
Han Bing Yan ◽  
Zhi Hong Wang ◽  
...  

This document introduces the current status of the stacking and loading technology in major logistics. It introduces the development of a kind of automatic stacking and loading system in major logistics from Chengdu University of Information Technology, including the function, composition, characteristics, key technology of structure design for Non bulk cargo object, automatic extract, automatic loading and stacking. Then the main technical parameters are put forward. It is pointed out that the system has a good social, economic significance.

2013 ◽  
Vol 655-657 ◽  
pp. 113-116
Author(s):  
Dai Liang Luo ◽  
Yong Fa Qiu ◽  
Wei Bing Xie ◽  
Guo Qiang Dong

The waterflooding development of Oilfield fringe area and scattered blocks are restricted by the existing pipe network design and pipeline transportation distance and so on. In order to improve the development effect of these blocks, by using advantages of ESP including high head, range capacity and mature technology, technology of exploiting and waterflooding in one well with ESP was discussed. Then, some key problems were settled such as sand prevention, sealing, downhole monitoring of process parameters, structure design and so on, and three process schemes were summarized including exploiting the upper layer and waterflooding the lower layer, exploiting the lower layer and waterflooding the upper layer and downhole pressurized injection. The technology proposed by this article has achieved good results proved by field applications. The success of the technology provides an economical and reliable energy supply technology for oilfield development, and has a broad market prospect.


2018 ◽  
Vol 22 (1) ◽  
Author(s):  
Kudrat Dukalang

Abstract. Globalization that has been going on rapidly since the 1980s has led to very basic social, economic and political changes in all countries. The world of higher education which adheres to universalism in science and technology actually always pays attention and considers that the Indonesian education community is part of a global society. In the next 1015 years, Indonesian universities will face a variety of major challenges that need to be responded wisely. Economic globalization and the information technology revolution is a huge force affecting the world of Indonesian universities. Keywords: Education Management, Challenges, Problems, Globalization Abstrak. Globalisasi yang sedang berlangsung dengan cepat sejak dekade 1980-an telah menimbulkan perubahan sosial, ekonomi dan politik yang sangat mendasar pada semua negara.  Dunia pendidikan tinggi yang menganut faham universialisme ilmu pengetahuan dan teknologi sebenarnya selalu memperhatikan dan mempertimbangkan bahwa masyarakat pendidikan Indonesia adalah bagian dari masyarakat global. Pada kurun waktu 10-15 tahun ke depan, perguruan tinggi Indonesia akan menghadapi berbagai tantangan besar yang perlu di respons dengan bijaksana. Globalisasi ekonomi dan revolusi teknologi informasi merupakan kekuatan yang amat besar mempengaruhi dunia perguruan tinggi Indonesia. Kata Kunci: Managemen Pendidikan, Tantangan, Permasalahan, Globalisasi


Author(s):  
Theodosios Tsiakis ◽  
Theodoros Kargidis ◽  
Aristeidis Chatzipoulidis

Most industries have been influenced in different ways by e-commerce, and the banking industry is no exception. Particularly, banks are embracing electronic banking (e-banking) as a service to reach a wider market share, increase customer satisfaction and lower operational costs. This increased supply and demand in e-banking services has caused not only opportunities but also risks. The need to manage and regulate those risks calls for a sound Information Technology Security Governance (ITSG) program as means to deliver value business and mitigate Information Technology (IT) risks. In this regard, the chapter’s objectives are to explore, evaluate, and compare the current status and characteristics of Information Security Governance (ISG) approaches for e-banking. Therefore, the authors focus on an analysis of reputed best standards, guidelines on governance, risk management methods, and internal controls currently used for e-banking as means to research which satisfies best ISG objectives. Results show that banks should not be restricted to currently used approaches to ISG for e-banking but should take into consideration benefits and shortcomings other approaches possess. In this regard, the authors propose an ITSG framework for e-banking as a continuous process for assuring ISG objectives. They also highlight the importance of consistent measurement of metrics of ITSG performance with the aid of security content automation protocol.


Author(s):  
Hamid R. Nemati ◽  
Christopher D. Barko

An increasing number of organizations are struggling to overcome “information paralysis” — there is so much data available that it is difficult to understand what is and is not relevant. In addition, managerial intuition and instinct are more prevalent than hard facts in driving organizational decisions. Organizational Data Mining (ODM) is defined as leveraging data mining tools and technologies to enhance the decision-making process by transforming data into valuable and actionable knowledge to gain a competitive advantage (Nemati & Barko, 2001). The fundamentals of ODM can be categorized into three fields: Artificial Intelligence (AI), Information Technology (IT), and Organizational Theory (OT), with OT being the core differentiator between ODM and data mining. We take a brief look at the current status of ODM research and how a sample of organizations is benefiting. Next we examine the evolution of ODM and conclude our chapter by contemplating its challenging yet opportunistic future.


Author(s):  
Erkki Harjula ◽  
Jani Hautakorpi ◽  
Nicklas Beijar ◽  
Mika Ylianttila

Due to the increasing popularity of Peer-to-Peer (P2P) computing, the information technology industry and standardization organizations have started to direct their efforts on standardizing P2P algorithms and protocols. The Internet Engineering Task Force (IETF) has recently formed the Peer-to-Peer SIP (P2PSIP) working group for enabling serverless operation of Session Initiation Protocol (SIP). This chapter introduces the P2PSIP by presenting its background and purpose, operational principles, current status, and application areas. The focus is on the challenges and problem areas from the viewpoint of standardization and related research. The mobile- and heterogeneous environments are considered with special care. The authors provide a glance to the existing and emerging solutions that may be used in tackling the mentioned challenges and thus paving the way for successful deployment of P2PSIP in mobile environments.


2012 ◽  
Vol 198-199 ◽  
pp. 1006-1011
Author(s):  
Jia Ni Liu ◽  
Yuan Li ◽  
Le Chen ◽  
Jian Bin Sun ◽  
Xin Shi

Based on the demonstration of some problems exposed in the fields of PLA equipment overhaul, this paper put forward the design scheme of the equipment overhaul management system in view of information technology. It described the design objective of system, analysed system business flow, built system construction from two sides of software and hardware, and introduced the key technology and development platform for system implementation. This system has reading/encoding RFID card, photography, satellite positioning functions, which can automatically collect and transfer information during the process of the equipment overhaul. It is convenient for analysing system to office staff, and ensures the equipment overhaul expenditures was used reasonably.


2018 ◽  
Vol 246 ◽  
pp. 03045
Author(s):  
Siwei Li ◽  
Yansong Liang ◽  
Yanran Feng

This paper proposed a portable intelligent mobile detection equipment aimed at emergency treatment of chemical accidents, and mainly introduces the function, features, structure design and key technology of the equipment. The function is realized mainly through internal real-time monitoring and leakage source location calculation. using this unmanned detection equipment can effectively reduce casualties and risks of emergency personnel, and make rescue work easier and safer.


2019 ◽  
Vol 11 (7) ◽  
pp. 2179 ◽  
Author(s):  
Fan ◽  
Tan

The present study investigates the current status of aesthetic education as implemented in information technology by preschool teachers in New Taipei City. To that end, stratified random sampling of preschool teachers in New Taipei City was conducted, and the selected teachers, 235 in total, then answered a questionnaire developed specifically for the study. The survey results indicated that “teacher” was the job title/position of most of the respondents, the largest percentage of whom were more than 41 years of age and had an education level consisting of a qualification received from a teacher’s college or university of education. Moreover, the results indicated that the teaching models employed by the majority of respondents focused on “thematic teaching.” In regards to their integration of information technology in their teaching of aesthetic education, the survey results indicated that the teachers obtained the highest average score for the “knowledge of information technology” dimension. Meanwhile, the dimension for which the respondents obtained the highest average score in terms of aesthetic teaching itself was the dimension pertaining to aesthetic cognition. Generally speaking, survey respondents from different backgrounds did not differ significantly in terms of their overall intentions regarding the use of aesthetic teaching, but there was a significant and positive relationship between those overall intentions and the current status of information technology integration into aesthetic education.


Sign in / Sign up

Export Citation Format

Share Document