Recently,various mobile apps have included more features to improve user convenience.Mobile operating systems load as many apps into memory for faster app launching and execution.The least recently used(LRU)-based ter...Recently,various mobile apps have included more features to improve user convenience.Mobile operating systems load as many apps into memory for faster app launching and execution.The least recently used(LRU)-based termination of cached apps is a widely adopted approach when free space of the main memory is running low.However,the LRUbased cached app termination does not distinguish between frequently or infrequently used apps.The app launch performance degrades if LRU terminates frequently used apps.Recent studies have suggested the potential of using users’app usage patterns to predict the next app launch and address the limitations of the current least recently used(LRU)approach.However,existing methods only focus on predicting the probability of the next launch and do not consider how soon the app will launch again.In this paper,we present a new approach for predicting future app launches by utilizing the relaunch distance.We define the relaunch distance as the interval between two consecutive launches of an app and propose a memory management based on app relaunch prediction(M2ARP).M2ARP utilizes past app usage patterns to predict the relaunch distance.It uses the predicted relaunch distance to determine which apps are least likely to be launched soon and terminate them to improve the efficiency of the main memory.展开更多
Currently, Infrastructure as a Service(IaaS) and Platform as a Service(PaaS) platforms play a role as a cloud operating system(COS).They are separated from each other in resource management,which may cause inconsisten...Currently, Infrastructure as a Service(IaaS) and Platform as a Service(PaaS) platforms play a role as a cloud operating system(COS).They are separated from each other in resource management,which may cause inconsistent resource status and result in the decrease of performance. Moreover, heterogeneous resources are not managed well in existing cloud computing platforms. Referring to the theory of operating system, we propose a unified architecture model of cloud operating system, which has six layers corresponding to the layered architecture of legacy operating system. Based on this architecture, a new cloud operating system called Hua-Cloud Computing System(HCOS) is realized. In HCOS, the hybrid resources are managed in a unified way. This method improves the unified scheduling capability of heterogeneous resources and eliminates the problem of resource status inconsistency.The main characteristics of HCOS are introduced and two typical applications are illustrated in this paper.展开更多
In recent years,with the changes in the international competitive environment,the development strategic focuses of the national software industry have also shifted.To adapt to these changes,we analyze and summarize th...In recent years,with the changes in the international competitive environment,the development strategic focuses of the national software industry have also shifted.To adapt to these changes,we analyze and summarize the problems existing in the teaching content and methods of the traditional“Operating System”course and carry out the reform and practice of this core course for software engineering majors.First,we design and integrate domestic operating system examples into the course to meet the needs of national strategic development,thus cultivating operating system software talents in line with China’s national conditions and needs.Second,we reconstruct the teaching content of the course,strengthen the assessment of comprehensive ability,and establish a 3-level progressive teaching structure.Third,we carry out the deep integration of university and enterprise to realize the combination of theory and practice and establish a comprehensive and whole process university-enterprise course co-construction mode.Through the above reform measures,students show a strong interest in learning the operating system course.The operating system course has won the honor of the first-class course of Beijing Jiaotong University and has been approved for 4 industry-education cooperation projects of the Ministry of Education.展开更多
This article presents an embedded Smart Phone Operating System (SPOS) independently designed by ZTE Corporation. The SPOS is based on single kernel architecture with its multi-task real-time kernel supporting hardware...This article presents an embedded Smart Phone Operating System (SPOS) independently designed by ZTE Corporation. The SPOS is based on single kernel architecture with its multi-task real-time kernel supporting hardware platforms and resources of mainstream mobile phones. It has remarkable advantages such as highly efficient and dynamic power management, priority - based preemptive scheduling, fast startup, a variety of drivers, and excellent system stability and operability. For the development of upper layer communication protocols and application software, the SPOS provides wireless communication interfaces and the application program framework.展开更多
The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and...The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and the Vulnerability Index Indicator (VII) of a computer operating network. Both of these functions, VIF and VII are entities of the stochastic process that we have identified, which characterizes the probabilistic behavior of the number of vulnerabilities of a computer operating network. The VIF identifies the rate at which the number of vulnerabilities changes with respect to time. The VII is an important index indicator that conveys the following information about the number of vulnerabilities of Desktop Operating Systems: the numbers are increasing, decreasing, or remaining the same at a particular time of interest. This decision type of index indicator is crucial in every strategic planning and decision-making. The proposed VIF and VII illustrate their importance by using real data for Microsoft Windows Operating Systems 10, 8, 7, and Apple MacOS. The results of the actual data attest to the importance of VIF and VII in the cybersecurity problem we are currently facing.展开更多
Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society,...Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society, and ubiquitous embedded applications constitute the 'ubiquitous' computing era. Embedded operating system is the core of the em-bedded system, and it directly affects the performance of the whole system. Our Liaoning Provincial Key Laboratory of Embedded Technology has successfully developed five kinds of device-level embedded operating systems by more than ten years’ efforts, and these systems are Webit 5.0, Worix, μKernel, iDCX 128 and μc/os-II 128. This paper mainly analyses and compares the implementation mechanism and performance of these five kinds of device-level embedded operating systems in detail.展开更多
As an outstanding asymmetric cryptography,RSA al gorithm has a lot of virtues and thus is well applied in the scope of IC card applications. T he paper deals with the application of RSA in smart cards and the approach...As an outstanding asymmetric cryptography,RSA al gorithm has a lot of virtues and thus is well applied in the scope of IC card applications. T he paper deals with the application of RSA in smart cards and the approach in wh ich the modular exponentiation of huge number is simplified by using the Chinese Remainder Theorem. We have already succeeded in completing RSA in IC cards. Res ults indicate that RSA algorithm applied in IC cards has the equivalent speed of DES algorithm with the same environment.展开更多
In this paper, a new concept of simulation operating system (SIMOS) is described. A detailed definition of SIMOS is given, and two integrated simulation software (IPSOS and IMSS) are introduced based on SIMOS.
With the rapid development of mobile communication and computer network technologies, the new mobile learning mode has been accepted by more and more people. In this paper, taking the learning system under mobile envi...With the rapid development of mobile communication and computer network technologies, the new mobile learning mode has been accepted by more and more people. In this paper, taking the learning system under mobile environment and from the perspective of necessary theoretic knowledge and relative technologies for mobile learning, the structural frame of the mobile learning system was discussed and constructed. According to this structural frame, the learning system under mobile environment was designed and applied into the OS course.展开更多
Nowadays rapidly increasing technology is mobile phone technology in telecommunication sector. This mobile device technology has great effect on everyone’s life. This technology has reduced the burden of people in th...Nowadays rapidly increasing technology is mobile phone technology in telecommunication sector. This mobile device technology has great effect on everyone’s life. This technology has reduced the burden of people in their daily life. To manage the rising demand for such mobile devices, numerous operating systems came in the market as a platform upon which modern application can be produced. As a result, numbers of platforms and essential depository describe these platforms;customers may or may not be aware of these platforms that are appropriate for their needs. In order to solve this issue, we examine the most famous mobile phone operating systems to decide which operating system is most suitable for developers, business applications as well as casual use. In this paper we make assessment on the popular operating systems of mobile devices available in the business market, and on behalf of such assessment we distinguish that operating system OS is much useful of its particular characteristics compared with other systems.展开更多
This paper presents a new architecture of a graphics system for microkernel operating systems,including real-time operating systems.The following major parts of the architecture are presented:a user-level subsystem re...This paper presents a new architecture of a graphics system for microkernel operating systems,including real-time operating systems.The following major parts of the architecture are presented:a user-level subsystem responsible for interaction with user applications;a bottom-level subsystem providing the functionality for graphics drivers,such as managing graphics output,video memory management,etc.;a kernel-level subsystem providing interaction with the kernel,and performing low-level operations,such as working with physical memory,processes,etc.The mechanisms of interaction of user applications with the user level of the graphics system,as well as interaction of the different levels of the graphics subsystem are presented.The paper pays much attention to various approaches to testing:the use of unit testing,testing using hardware and software emulators.Another important characteristic of a graphics system is its performance,in particular the performance of low-level operations such as memory allocation:the developed architecture suggests using a separate memory allocator which is faster than standard memory allocation functions.Comparison of the performances of graphics system implementation for microkernel real-time operating system and graphics server Xorg is presented,showing significant superiority of the proposed architecture in a number of work scenarios.展开更多
Operation control of power systems has become challenging with an increase in the scale and complexity of power distribution systems and extensive access to renewable energy.Therefore,improvement of the ability of dat...Operation control of power systems has become challenging with an increase in the scale and complexity of power distribution systems and extensive access to renewable energy.Therefore,improvement of the ability of data-driven operation management,intelligent analysis,and mining is urgently required.To investigate and explore similar regularities of the historical operating section of the power distribution system and assist the power grid in obtaining high-value historical operation,maintenance experience,and knowledge by rule and line,a neural information retrieval model with an attention mechanism is proposed based on graph data computing technology.Based on the processing flow of the operating data of the power distribution system,a technical framework of neural information retrieval is established.Combined with the natural graph characteristics of the power distribution system,a unified graph data structure and a data fusion method of data access,data complement,and multi-source data are constructed.Further,a graph node feature-embedding representation learning algorithm and a neural information retrieval algorithm model are constructed.The neural information retrieval algorithm model is trained and tested using the generated graph node feature representation vector set.The model is verified on the operating section of the power distribution system of a provincial grid area.The results show that the proposed method demonstrates high accuracy in the similarity matching of historical operation characteristics and effectively supports intelligent fault diagnosis and elimination in power distribution systems.展开更多
Battery pack capacity estimation under real-world operating conditions is important for battery performance optimization and health management,contributing to the reliability and longevity of batterypowered systems.Ho...Battery pack capacity estimation under real-world operating conditions is important for battery performance optimization and health management,contributing to the reliability and longevity of batterypowered systems.However,complex operating conditions,coupling cell-to-cell inconsistency,and limited labeled data pose great challenges to accurate and robust battery pack capacity estimation.To address these issues,this paper proposes a hierarchical data-driven framework aimed at enhancing the training of machine learning models with fewer labeled data.Unlike traditional data-driven methods that lack interpretability,the hierarchical data-driven framework unveils the“mechanism”of the black box inside the data-driven framework by splitting the final estimation target into cell-level and pack-level intermediate targets.A generalized feature matrix is devised without requiring all cell voltages,significantly reducing the computational cost and memory resources.The generated intermediate target labels and the corresponding features are hierarchically employed to enhance the training of two machine learning models,effectively alleviating the difficulty of learning the relationship from all features due to fewer labeled data and addressing the dilemma of requiring extensive labeled data for accurate estimation.Using only 10%of degradation data,the proposed framework outperforms the state-of-the-art battery pack capacity estimation methods,achieving mean absolute percentage errors of 0.608%,0.601%,and 1.128%for three battery packs whose degradation load profiles represent real-world operating conditions.Its high accuracy,adaptability,and robustness indicate the potential in different application scenarios,which is promising for reducing laborious and expensive aging experiments at the pack level and facilitating the development of battery technology.展开更多
Powered by advanced information industry and intelligent technology,more and more complex systems are exhibiting characteristics of the cyber-physical-social systems(CPSS).And human factors have become crucial in the ...Powered by advanced information industry and intelligent technology,more and more complex systems are exhibiting characteristics of the cyber-physical-social systems(CPSS).And human factors have become crucial in the operations of complex social systems.Traditional mechanical analysis and social simulations alone are powerless for analyzing complex social systems.Against this backdrop,computational experiments have emerged as a new method for quantitative analysis of complex social systems by combining social simulation(e.g.,ABM),complexity science,and domain knowledge.However,in the process of applying computational experiments,the construction of experiment system not only considers a large number of artificial society models,but also involves a large amount of data and knowledge.As a result,how to integrate various data,model and knowledge to achieve a running experiment system has become a key challenge.This paper proposes an integrated design framework of computational experiment system,which is composed of four parts:generation of digital subject,generation of digital object,design of operation engine,and construction of experiment system.Finally,this paper outlines a typical case study of coal mine emergency management to verify the validity of the proposed framework.展开更多
With the expansion and implementation of rural revitalization strategies,there is a constant need for new energy sources for the construction of new townships.Consequently,integrated energy systems with the interconne...With the expansion and implementation of rural revitalization strategies,there is a constant need for new energy sources for the construction of new townships.Consequently,integrated energy systems with the interconnection and interaction of multiple energy sources are developing rapidly.Biomass energy,a renewable green energy source with low pollution and wide distribution,has significant application potential in integrated energy systems.Considering the application of biomass energy in townships,this study established an integrated biomass energy system and proposed a model to optimize its operation.Lowest economic cost and highest clean energy utilization rate were considered as the objective functions.In addition,a plan was suggested to adjust the heat-electricity ratio based on the characteristics of the combined heat and power of the biomass.Finally,a simulation analysis conducted for a town in China was discussed,demonstrating that the construction of a township integrated-energy system and the use of biomass can significantly reduce operating costs and improve the energy utilization rate.Moreover,by adjusting the heat-electricity ratio,the economic cost was further reduced by 6.70%,whereas the clean energy utilization rate was increased by 5.14%.展开更多
In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive ...In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive image.In this paper,an improved sine map(ISM)possessing a larger chaotic region,more complex chaotic behavior and greater unpredictability is proposed and extensively tested.Drawing upon the strengths of ISM,we introduce a lightweight symmetric image encryption cryptosystem in wavelet domain(WDLIC).The WDLIC employs selective encryption to strike a satisfactory balance between security and speed.Initially,only the low-frequency-low-frequency component is chosen to encrypt utilizing classic permutation and diffusion.Then leveraging the statistical properties in wavelet domain,Gaussianization operation which opens the minds of encrypting image information in wavelet domain is first proposed and employed to all sub-bands.Simulations and theoretical analysis demonstrate the high speed and the remarkable effectiveness of WDLIC.展开更多
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti...This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities.展开更多
The variation of the principal stress of formations with the working and geo-mechanical conditions can trigger wellbore instabilities and adversely affect the well completion.A finite element model,based on the theory...The variation of the principal stress of formations with the working and geo-mechanical conditions can trigger wellbore instabilities and adversely affect the well completion.A finite element model,based on the theory of poro-elasticity and the Mohr-Coulomb rock damage criterion,is used here to analyze such a risk.The changes in wellbore stability before and after reservoir acidification are simulated for different pressure differences.The results indicate that the risk of wellbore instability grows with an increase in the production-pressure difference regardless of whether acidification is completed or not;the same is true for the instability area.After acidizing,the changes in the main geomechanical parameters(i.e.,elastic modulus,Poisson’s ratio,and rock strength)cause the maximum wellbore instability coefficient to increase.展开更多
The main objective of this study is to determine the hydrogeochemical specificities of the groundwater of the Angovia mine operating permit, located in the Yaouré mountains in the center-west of Côte d’Ivoi...The main objective of this study is to determine the hydrogeochemical specificities of the groundwater of the Angovia mine operating permit, located in the Yaouré mountains in the center-west of Côte d’Ivoire. To do so, descriptive and multivariate statistical analysis methods with the SOM (Self Organizing Maps) algorithm were applied to the physicochemical parameters of 17 boreholes using the calcite (ISC) and dolomite (ISD) saturation indices. The results obtained have shown that the groundwater in the Angovia mine operating permit area has an average temperature of 27.52°C (long rainy season) and 27.87°C (long dry season) and has an average pH of 7.09 ± 0.35 during the main rainy season and 7.32 ± 0.35 during the main dry season. They are mineralized with an average electrical conductivity of 505.98 ± 302.85 μS/cm during the long rainy season and with 450.33 ± 233.74 μS/cm as average during the long dry season. The main phenomena at the origin of groundwater mineralization are water residence time, oxidation-reduction and surface inflow. The study of the relative age of the water shows that the groundwater in the Angovia mine operating permit area is mainly undersaturated with respect to calcite and dolomite. They are therefore very old in the aquifer with a slow circulation speed during the long rainy season and the long dry season.展开更多
基金This work was supported in part by the National Research Foundation of Korea(NRF)Grant funded by the Korea Government(MSIT)under Grant 2020R1A2C100526513in part by the R&D Program for Forest Science Technology(Project No.2021338C10-2323-CD02)provided by Korea Forest Service(Korea Forestry Promotion Institute).
文摘Recently,various mobile apps have included more features to improve user convenience.Mobile operating systems load as many apps into memory for faster app launching and execution.The least recently used(LRU)-based termination of cached apps is a widely adopted approach when free space of the main memory is running low.However,the LRUbased cached app termination does not distinguish between frequently or infrequently used apps.The app launch performance degrades if LRU terminates frequently used apps.Recent studies have suggested the potential of using users’app usage patterns to predict the next app launch and address the limitations of the current least recently used(LRU)approach.However,existing methods only focus on predicting the probability of the next launch and do not consider how soon the app will launch again.In this paper,we present a new approach for predicting future app launches by utilizing the relaunch distance.We define the relaunch distance as the interval between two consecutive launches of an app and propose a memory management based on app relaunch prediction(M2ARP).M2ARP utilizes past app usage patterns to predict the relaunch distance.It uses the predicted relaunch distance to determine which apps are least likely to be launched soon and terminate them to improve the efficiency of the main memory.
基金supported in part by Sichuan Provincial Public Security Bureau of China under Grant No.2015TD0002Unicom Cloud Data Co.,Ltd of China under Grant No.2013JQ0005Science and Technology Department of Sichuan Province under Grant no.2017HH0075
文摘Currently, Infrastructure as a Service(IaaS) and Platform as a Service(PaaS) platforms play a role as a cloud operating system(COS).They are separated from each other in resource management,which may cause inconsistent resource status and result in the decrease of performance. Moreover, heterogeneous resources are not managed well in existing cloud computing platforms. Referring to the theory of operating system, we propose a unified architecture model of cloud operating system, which has six layers corresponding to the layered architecture of legacy operating system. Based on this architecture, a new cloud operating system called Hua-Cloud Computing System(HCOS) is realized. In HCOS, the hybrid resources are managed in a unified way. This method improves the unified scheduling capability of heterogeneous resources and eliminates the problem of resource status inconsistency.The main characteristics of HCOS are introduced and two typical applications are illustrated in this paper.
基金This work is supported by the Fundamental Research Funds for the Central Universities(Grant No.2019RC026).
文摘In recent years,with the changes in the international competitive environment,the development strategic focuses of the national software industry have also shifted.To adapt to these changes,we analyze and summarize the problems existing in the teaching content and methods of the traditional“Operating System”course and carry out the reform and practice of this core course for software engineering majors.First,we design and integrate domestic operating system examples into the course to meet the needs of national strategic development,thus cultivating operating system software talents in line with China’s national conditions and needs.Second,we reconstruct the teaching content of the course,strengthen the assessment of comprehensive ability,and establish a 3-level progressive teaching structure.Third,we carry out the deep integration of university and enterprise to realize the combination of theory and practice and establish a comprehensive and whole process university-enterprise course co-construction mode.Through the above reform measures,students show a strong interest in learning the operating system course.The operating system course has won the honor of the first-class course of Beijing Jiaotong University and has been approved for 4 industry-education cooperation projects of the Ministry of Education.
文摘This article presents an embedded Smart Phone Operating System (SPOS) independently designed by ZTE Corporation. The SPOS is based on single kernel architecture with its multi-task real-time kernel supporting hardware platforms and resources of mainstream mobile phones. It has remarkable advantages such as highly efficient and dynamic power management, priority - based preemptive scheduling, fast startup, a variety of drivers, and excellent system stability and operability. For the development of upper layer communication protocols and application software, the SPOS provides wireless communication interfaces and the application program framework.
文摘The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and the Vulnerability Index Indicator (VII) of a computer operating network. Both of these functions, VIF and VII are entities of the stochastic process that we have identified, which characterizes the probabilistic behavior of the number of vulnerabilities of a computer operating network. The VIF identifies the rate at which the number of vulnerabilities changes with respect to time. The VII is an important index indicator that conveys the following information about the number of vulnerabilities of Desktop Operating Systems: the numbers are increasing, decreasing, or remaining the same at a particular time of interest. This decision type of index indicator is crucial in every strategic planning and decision-making. The proposed VIF and VII illustrate their importance by using real data for Microsoft Windows Operating Systems 10, 8, 7, and Apple MacOS. The results of the actual data attest to the importance of VIF and VII in the cybersecurity problem we are currently facing.
文摘Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society, and ubiquitous embedded applications constitute the 'ubiquitous' computing era. Embedded operating system is the core of the em-bedded system, and it directly affects the performance of the whole system. Our Liaoning Provincial Key Laboratory of Embedded Technology has successfully developed five kinds of device-level embedded operating systems by more than ten years’ efforts, and these systems are Webit 5.0, Worix, μKernel, iDCX 128 and μc/os-II 128. This paper mainly analyses and compares the implementation mechanism and performance of these five kinds of device-level embedded operating systems in detail.
文摘As an outstanding asymmetric cryptography,RSA al gorithm has a lot of virtues and thus is well applied in the scope of IC card applications. T he paper deals with the application of RSA in smart cards and the approach in wh ich the modular exponentiation of huge number is simplified by using the Chinese Remainder Theorem. We have already succeeded in completing RSA in IC cards. Res ults indicate that RSA algorithm applied in IC cards has the equivalent speed of DES algorithm with the same environment.
文摘In this paper, a new concept of simulation operating system (SIMOS) is described. A detailed definition of SIMOS is given, and two integrated simulation software (IPSOS and IMSS) are introduced based on SIMOS.
文摘With the rapid development of mobile communication and computer network technologies, the new mobile learning mode has been accepted by more and more people. In this paper, taking the learning system under mobile environment and from the perspective of necessary theoretic knowledge and relative technologies for mobile learning, the structural frame of the mobile learning system was discussed and constructed. According to this structural frame, the learning system under mobile environment was designed and applied into the OS course.
文摘Nowadays rapidly increasing technology is mobile phone technology in telecommunication sector. This mobile device technology has great effect on everyone’s life. This technology has reduced the burden of people in their daily life. To manage the rising demand for such mobile devices, numerous operating systems came in the market as a platform upon which modern application can be produced. As a result, numbers of platforms and essential depository describe these platforms;customers may or may not be aware of these platforms that are appropriate for their needs. In order to solve this issue, we examine the most famous mobile phone operating systems to decide which operating system is most suitable for developers, business applications as well as casual use. In this paper we make assessment on the popular operating systems of mobile devices available in the business market, and on behalf of such assessment we distinguish that operating system OS is much useful of its particular characteristics compared with other systems.
基金This work was supported by SRISA RAS fundamental scientific research 47 GP(No.FNEF-2022-0022).
文摘This paper presents a new architecture of a graphics system for microkernel operating systems,including real-time operating systems.The following major parts of the architecture are presented:a user-level subsystem responsible for interaction with user applications;a bottom-level subsystem providing the functionality for graphics drivers,such as managing graphics output,video memory management,etc.;a kernel-level subsystem providing interaction with the kernel,and performing low-level operations,such as working with physical memory,processes,etc.The mechanisms of interaction of user applications with the user level of the graphics system,as well as interaction of the different levels of the graphics subsystem are presented.The paper pays much attention to various approaches to testing:the use of unit testing,testing using hardware and software emulators.Another important characteristic of a graphics system is its performance,in particular the performance of low-level operations such as memory allocation:the developed architecture suggests using a separate memory allocator which is faster than standard memory allocation functions.Comparison of the performances of graphics system implementation for microkernel real-time operating system and graphics server Xorg is presented,showing significant superiority of the proposed architecture in a number of work scenarios.
基金supported by the National Key R&D Program of China(2020YFB0905900).
文摘Operation control of power systems has become challenging with an increase in the scale and complexity of power distribution systems and extensive access to renewable energy.Therefore,improvement of the ability of data-driven operation management,intelligent analysis,and mining is urgently required.To investigate and explore similar regularities of the historical operating section of the power distribution system and assist the power grid in obtaining high-value historical operation,maintenance experience,and knowledge by rule and line,a neural information retrieval model with an attention mechanism is proposed based on graph data computing technology.Based on the processing flow of the operating data of the power distribution system,a technical framework of neural information retrieval is established.Combined with the natural graph characteristics of the power distribution system,a unified graph data structure and a data fusion method of data access,data complement,and multi-source data are constructed.Further,a graph node feature-embedding representation learning algorithm and a neural information retrieval algorithm model are constructed.The neural information retrieval algorithm model is trained and tested using the generated graph node feature representation vector set.The model is verified on the operating section of the power distribution system of a provincial grid area.The results show that the proposed method demonstrates high accuracy in the similarity matching of historical operation characteristics and effectively supports intelligent fault diagnosis and elimination in power distribution systems.
基金supported by the National Outstanding Youth Science Fund Project of National Natural Science Foundation of China[Grant No.52222708]the Natural Science Foundation of Beijing Municipality[Grant No.3212033]。
文摘Battery pack capacity estimation under real-world operating conditions is important for battery performance optimization and health management,contributing to the reliability and longevity of batterypowered systems.However,complex operating conditions,coupling cell-to-cell inconsistency,and limited labeled data pose great challenges to accurate and robust battery pack capacity estimation.To address these issues,this paper proposes a hierarchical data-driven framework aimed at enhancing the training of machine learning models with fewer labeled data.Unlike traditional data-driven methods that lack interpretability,the hierarchical data-driven framework unveils the“mechanism”of the black box inside the data-driven framework by splitting the final estimation target into cell-level and pack-level intermediate targets.A generalized feature matrix is devised without requiring all cell voltages,significantly reducing the computational cost and memory resources.The generated intermediate target labels and the corresponding features are hierarchically employed to enhance the training of two machine learning models,effectively alleviating the difficulty of learning the relationship from all features due to fewer labeled data and addressing the dilemma of requiring extensive labeled data for accurate estimation.Using only 10%of degradation data,the proposed framework outperforms the state-of-the-art battery pack capacity estimation methods,achieving mean absolute percentage errors of 0.608%,0.601%,and 1.128%for three battery packs whose degradation load profiles represent real-world operating conditions.Its high accuracy,adaptability,and robustness indicate the potential in different application scenarios,which is promising for reducing laborious and expensive aging experiments at the pack level and facilitating the development of battery technology.
基金supported in part by the National Key Research and Development Program of China(2021YFF0900800)the National Natural Science Foundation of China(61972276,62206116,62032016)+3 种基金Open Research Fund of The State Key Laboratory for Management and Control of Complex Systems(20210101)New Liberal Arts Reform and Practice Project of National Ministry of Education(2021170002)Tianjin University Talent InnovationReward Program for Literature&Science Graduate Student(C1-2022-010)。
文摘Powered by advanced information industry and intelligent technology,more and more complex systems are exhibiting characteristics of the cyber-physical-social systems(CPSS).And human factors have become crucial in the operations of complex social systems.Traditional mechanical analysis and social simulations alone are powerless for analyzing complex social systems.Against this backdrop,computational experiments have emerged as a new method for quantitative analysis of complex social systems by combining social simulation(e.g.,ABM),complexity science,and domain knowledge.However,in the process of applying computational experiments,the construction of experiment system not only considers a large number of artificial society models,but also involves a large amount of data and knowledge.As a result,how to integrate various data,model and knowledge to achieve a running experiment system has become a key challenge.This paper proposes an integrated design framework of computational experiment system,which is composed of four parts:generation of digital subject,generation of digital object,design of operation engine,and construction of experiment system.Finally,this paper outlines a typical case study of coal mine emergency management to verify the validity of the proposed framework.
基金supported by the National Natural Science Foundation of China(U2066211)。
文摘With the expansion and implementation of rural revitalization strategies,there is a constant need for new energy sources for the construction of new townships.Consequently,integrated energy systems with the interconnection and interaction of multiple energy sources are developing rapidly.Biomass energy,a renewable green energy source with low pollution and wide distribution,has significant application potential in integrated energy systems.Considering the application of biomass energy in townships,this study established an integrated biomass energy system and proposed a model to optimize its operation.Lowest economic cost and highest clean energy utilization rate were considered as the objective functions.In addition,a plan was suggested to adjust the heat-electricity ratio based on the characteristics of the combined heat and power of the biomass.Finally,a simulation analysis conducted for a town in China was discussed,demonstrating that the construction of a township integrated-energy system and the use of biomass can significantly reduce operating costs and improve the energy utilization rate.Moreover,by adjusting the heat-electricity ratio,the economic cost was further reduced by 6.70%,whereas the clean energy utilization rate was increased by 5.14%.
基金Project supported by the Key Area Research and Development Program of Guangdong Province,China(Grant No.2022B0701180001)the National Natural Science Foundation of China(Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China(Grant Nos.2019B010140002 and 2020B111110002)the Guangdong–Hong Kong–Macao Joint Innovation Field Project(Grant No.2021A0505080006).
文摘In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive image.In this paper,an improved sine map(ISM)possessing a larger chaotic region,more complex chaotic behavior and greater unpredictability is proposed and extensively tested.Drawing upon the strengths of ISM,we introduce a lightweight symmetric image encryption cryptosystem in wavelet domain(WDLIC).The WDLIC employs selective encryption to strike a satisfactory balance between security and speed.Initially,only the low-frequency-low-frequency component is chosen to encrypt utilizing classic permutation and diffusion.Then leveraging the statistical properties in wavelet domain,Gaussianization operation which opens the minds of encrypting image information in wavelet domain is first proposed and employed to all sub-bands.Simulations and theoretical analysis demonstrate the high speed and the remarkable effectiveness of WDLIC.
基金Project supported by the Open Fund of Anhui Key Laboratory of Mine Intelligent Equipment and Technology (Grant No.ZKSYS202204)the Talent Introduction Fund of Anhui University of Science and Technology (Grant No.2021yjrc34)the Scientific Research Fund of Anhui Provincial Education Department (Grant No.KJ2020A0301)。
文摘This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities.
基金This work is financially sponsored by Tarim Oilfield“Study on Adaptability Evaluation and Parameter Optimization of Completion Technology in Bozi Block,Tarim Oilfield”(Item Number:201021113436).
文摘The variation of the principal stress of formations with the working and geo-mechanical conditions can trigger wellbore instabilities and adversely affect the well completion.A finite element model,based on the theory of poro-elasticity and the Mohr-Coulomb rock damage criterion,is used here to analyze such a risk.The changes in wellbore stability before and after reservoir acidification are simulated for different pressure differences.The results indicate that the risk of wellbore instability grows with an increase in the production-pressure difference regardless of whether acidification is completed or not;the same is true for the instability area.After acidizing,the changes in the main geomechanical parameters(i.e.,elastic modulus,Poisson’s ratio,and rock strength)cause the maximum wellbore instability coefficient to increase.
文摘The main objective of this study is to determine the hydrogeochemical specificities of the groundwater of the Angovia mine operating permit, located in the Yaouré mountains in the center-west of Côte d’Ivoire. To do so, descriptive and multivariate statistical analysis methods with the SOM (Self Organizing Maps) algorithm were applied to the physicochemical parameters of 17 boreholes using the calcite (ISC) and dolomite (ISD) saturation indices. The results obtained have shown that the groundwater in the Angovia mine operating permit area has an average temperature of 27.52°C (long rainy season) and 27.87°C (long dry season) and has an average pH of 7.09 ± 0.35 during the main rainy season and 7.32 ± 0.35 during the main dry season. They are mineralized with an average electrical conductivity of 505.98 ± 302.85 μS/cm during the long rainy season and with 450.33 ± 233.74 μS/cm as average during the long dry season. The main phenomena at the origin of groundwater mineralization are water residence time, oxidation-reduction and surface inflow. The study of the relative age of the water shows that the groundwater in the Angovia mine operating permit area is mainly undersaturated with respect to calcite and dolomite. They are therefore very old in the aquifer with a slow circulation speed during the long rainy season and the long dry season.