The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To ensure the normal production, it is necessary to have a safety inventory as a buffer. Safety inventory is mainly affected by the following factors: the expected customer service, the mean value and standard deviation of the lead time, the mean value and standard deviation of demand. We build a system dynamics model to analyze impacts of the several factors above on the safety inventory. We design...
Most traditional researches on inventory management mainly focused on inventory management of individual enterprises, especially on the algorithm analysis. This paper analyze the characteristics of the supply chain inventory management system, and then build three system dynamics models: the supplier supply chain inventory management system, the manufacturer supply chain inventory management system...
By analyzing stress bear and distribution of wall finishing robot guide rails, this thesis puts forward a measuring method based on PSD measurement circuit to measure robot lift rail tilt angle. Meanwhile, wall finishing robot tilt automatic correction servo system is completely designed and simulation analysis is carried out on the servo system and the servo correction results.
Heterogeneous semantic models have been introduced to represent knowledge of interpreting the semantics of Web information, as well as semantic information on the Web. In this paper, the current semantic representation models are introduced firstly. After comparative analysis of the advantages and disadvantages between those models, this paper illustrated the deficiencies among those models. Then...
In order to meet the fast maintenance requirements of modern missile, distributed fault diagnosis expert system is used in the decision-making of launch and maintenance of missile. Firstly, this paper builds missile distributed fault diagnosis expert system based on FMEA (fault model and effects analysis). According to the maintenance requirements, then diagnosis task can be divided into two stages,...
In this paper, aim at mechanical hand brake circuit to establish the hydraulic model, utilize AMESim and MATLAB software to simulate the brake circuit, analysis circuit characteristic and the factors which impact brake circuit characteristic, find out the key factors that affect the braking circuit braking characteristics. And analysis simulation results, it show that the conclusion right and it is...
Using the ANSYS finite element analysis software to establish a SOLID92 as the basic unit of the finite element model. We use ANSYS to analysis the Qianjiaying of Tangshan coal mine shaft sheave, from the quiet intensity of the head sheave to evaluate its safety. It will give reasonable advice for the similar design.
Computers have been used in many fields, for example, design, fabrication and installation of the offshore oil and gas exploration and production structures. As computer processor and memory have been rapidly developed in the past decades, computers have been used much more widely. This paper will mainly discuss the computer application in Offshore Engineering. Because of the particularity of Steel...
The network security situation perception technology as active defense technology has become the new research direction of network security field. On the basis of analyzing and summarizing the basic concept and the model of network security situation perception, put forward a method of network security situation perception based on artificial life. This method builds an artificial life model which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.