dynamic layout
Recently Published Documents


TOTAL DOCUMENTS

62
(FIVE YEARS 8)

H-INDEX

15
(FIVE YEARS 1)

2021 ◽  
Vol 12 (4) ◽  
pp. 243
Author(s):  
Feng Chen ◽  
Minling Feng ◽  
Bing Han ◽  
Shaofeng Lu

Electric vehicles (EV) are growing fast in recent years with the widespread concern about carbon neutrality. The development of charging infrastructures needs to be in phase with EV both in terms of quantity and charging time to decrease the range anxiety of EV users and resource waste. This paper proposed a multistage and dynamic layout optimization model based on mixed integer linear programming (MILP) for EV charging stations (CSs) to minimize the total social costs (TSC) consisting of the detour cost of EV users and the construction, relocation, and operating cost of CSs. The charging satisfaction coefficient and M/M/S/K model of queuing theory has been introduced to determine the desirable charging supply. The spatial-temporal distribution of charging demand was modeled based on the behavior analysis of travelers and over the discrete-time intervals for a day. Comparison studies based on the Sioux Falls network reveal that TSC with a multistage optimization strategy will drop 8.79% from that with a one-time optimization strategy. Charging service quality, relocation cost, and road network scales have a significant impact on the optimization results according to the sensitivity analysis.


Author(s):  
Zhijie Feng ◽  
Kai Wu ◽  
Xuan Liang ◽  
Jianbin Du
Keyword(s):  

2020 ◽  
Vol 3 (2) ◽  
pp. 507-519
Author(s):  
Wahju Tri Widadijo

Kinetic typography is widely applied to media such as Film Title,Television Program Title, presentation media, motion graphic media,and others. Motion design elements added to the kinetic typographydesign can strengthen the character of letters, strengthen themeaning of the message, give more emphasis and intonation, andadd aesthetic value. This article explores the analysis of the use ofkinetic typography in 6 (six) research samples of the winners of theAnimation Category of Indonesia Film Festival - FFI (2013 - 2018).The study was conducted referring to the temporal typographicclassification model developed by Barbara Brownie (2007). Wherein general kinetic typography is divided into two types, namely Typein Motion and Fluid Typography. Type in Motion itself is dividedinto Scrolling Typography and Dynamic Layout. The researchmethod used is descriptive qualitative. This research was identifyingand describing the use of kinetic typography types in the film title. Asa result, 2 (two) samples have not used kinetic typography optimally(F2 and F4), 2 (two) samples use Scrolling Typography (F1 and F3),1 (one) sample uses Fluid Typography (F5), and 1 (one) sample usesDynamic Layout (F6).


2020 ◽  
Vol 12 (8) ◽  
pp. 3349 ◽  
Author(s):  
Mirco Peron ◽  
Giuseppe Fragapane ◽  
Fabio Sgarbossa ◽  
Michael Kay

In recent years, companies have increased their focus on sustainability to achieve environmental-friendly improvements, to manage pressures from society and regulations, and to attract customers that appreciate sustainability efforts. While companies have mainly aimed short-term/operational improvements, long-term improvements are difficult to reach. One of the fundamental, strategical decision-making processes for a company is facility layout planning. The layout of a facility can have a significant impact on daily operations. Aiming for the goal of sustainability, a dynamic layout decision-making process can support in achieving it. However, the technologies used currently enable only the design of a static layout due to the time-consuming operations involved. In this paper, the introduction of emerging technologies such as 3D mapping, Indoor Positioning System (IPS), Motion Capture System (MoCap), and Immersive Reality (IR) for dynamic layout planning are assessed and discussed. The results obtained clearly demonstrate that the usage of these technologies favor a reconfigurable layout, positively affecting all the three pillars constituting the sustainability concept: the costs involved are reduced, social aspects are improved, and the environment is safeguarded.


2019 ◽  
Author(s):  
Fahmina Taranum ◽  
Syeda Hajra Mahin ◽  

With the enhancement in technical field of communication, efforts are made by the researchers to provide security. Security is dispensing protection and privacy to the system for the channeled data against any unwarranted access and refinements. MANET is a variant of wireless network used essentially by the dynamic devices with high motility and vulnerability. The distinctions like dynamic layout and curbed resources make them susceptible to miscellaneous kinds of threats. One such attack is wormhole which sneak and peep data with malicious intensions and operates either in coordinated or uncoordinated fashion. In its coordinated version, the malicious nodes coordinate their operations whereas in the uncoordinated version; they operate solitarily with the aim to decline the network performance. In this work, we aim to propose an algorithm for deployment of wormhole attack communicating with its peer through a tunnel. Planting of this attack in the network lays the foundation for developing successful strategies to mitigate their effects on the system.


2019 ◽  
Author(s):  
Fahmina Taranum ◽  
Syeda Hajra Mahin ◽  

With the enhancement in technical field of communication, efforts are made by the researchers to provide security. Security is dispensing protection and privacy to the system for the channeled data against any unwarranted access and refinements. MANET is a variant of wireless network used essentially by the dynamic devices with high motility and vulnerability. The distinctions like dynamic layout and curbed resources make them susceptible to miscellaneous kinds of threats. One such attack is wormhole which sneak and peep data with malicious intensions and operates either in coordinated or uncoordinated fashion. In its coordinated version, the malicious nodes coordinate their operations whereas in the uncoordinated version; they operate solitarily with the aim to decline the network performance. In this work, we aim to propose an algorithm for deployment of wormhole attack communicating with its peer through a tunnel. Planting of this attack in the network lays the foundation for developing successful strategies to mitigate their effects on the system.


Author(s):  
Steven J. DeRose
Keyword(s):  

I here present a tool, called “AJICSS”, intended to make two things easier: first, developers’ transition from CSS to Javascript; and second, implementation of hypertext capabilities that involve real-time modifications to documents. In short, AJICSS: lets you embed Javascript directly inside CSS rules (multiple reasons for this are discussed), and trigger it on demand. provides functions to facilitate useful things such as dynamic layout and content changes. facilitates implementing several hypertext features, including structural transclusion, stretchtext, user-controllable content changes and filtering, and spreadsheet-like tables. AJICSS is written in Javascript, but is much easier to use than Javascript alone, and in particular makes it fairly easy (even for those with little programming background) to accomplish several long-neglected hypertext capabilities.


Sign in / Sign up

Export Citation Format

Share Document