Phosphorus is an essential element in agricultural production and chemical industry. However, since the risk of casualties and economic loss by mining accidents, the application of clean and safe production in phospho...Phosphorus is an essential element in agricultural production and chemical industry. However, since the risk of casualties and economic loss by mining accidents, the application of clean and safe production in phosphorus mines encounters great challenges. For this purpose, a man-machine-environment system composed of evaluation indexes was established, and the grading standards of indexes were defined. Firstly, the measurements of 39 qualitative indexes were obtained through the survey data. According to the measured values of 31 quantitative indexes, the measurements of quantitative indexes were calculated by linear measurement function(LM) and other three functions. Then the singleindex measurement evaluation matrixes were established. Secondly, the entropy weight method was used to determine the weights of each index directly. The analytic hierarchy process(AHP) was also applied to calculate the weights of index and index factor hierarchies after the established hierarchical model. The weights of system hierarchies were given by the grid-based fuzzy Borda method(GFB). The comprehensive weights were determined by the combination method of AHP and GFB(CAG). Furthermore, the multi-index comprehensive measurement evaluation vectors were obtained.Thirdly, the vectors were evaluated by the credible degree recognition(CDR) and the maximum membership(TMM)criteria. Based on the above functions, methods, and criteria, 16 combination evaluation methods were recommended.Finally, the clean and safe production grade of Kaiyang phosphate mine in China was evaluated. The results show that the LM-CAG-CDR is the most reasonable method, which can not only determine the clean and safe production grade of phosphorus mines, but also improve the development level of clean and safe mining of phosphorus mines for guidance.In addition, some beneficial suggestions and measures were also proposed to advance the clean and safe production grade of Kaiyang phosphorus mine.展开更多
We presented Mathematical apparatus of the choice of optimum parameters of technical, technological systems and materials on the basis of vector optimization. We have considered the formulation and solution of three t...We presented Mathematical apparatus of the choice of optimum parameters of technical, technological systems and materials on the basis of vector optimization. We have considered the formulation and solution of three types of tasks presented below. First, the problem of selecting the optimal parameters of technical systems depending on the functional characteristics of the system. Secondly, the problem of selecting the optimal parameters of the process depending on the technological characteristics of the process. Third, the problem of choosing the optimal structure of the material depending on the functional characteristics of this material. The statement of all problems is made in the form of vector problems of mathematical (nonlinear) programming. The theory and the principle of optimality of the solution of vector tasks it is explained in work of https://rdcu.be/bhZ8i. The implementation of the methodology is shown on a numerical example of the choice of optimum parameters of the technical, technological systems and materials. On the basis of mathematical methods of solution of vector problems we developed the software in the MATLAB system. The numerical example includes: input data (requirement specification) for modeling;transformation of mathematical models with uncertainty to the model under certainty;acceptance of an optimal solution with equivalent criteria (the solution of numerical model);acceptance of an optimal solution with the given priority of criterion.展开更多
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces...Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.展开更多
基金Project(51974362) supported by the National Natural Science Foundation of ChinaProject(2282020cxqd055) supported by the Fundamental Research Funds for the Central Universities,ChinaProject(2021-QYC-10050-25631) supported by the Department of Emergency Management of Hunan Province,China。
文摘Phosphorus is an essential element in agricultural production and chemical industry. However, since the risk of casualties and economic loss by mining accidents, the application of clean and safe production in phosphorus mines encounters great challenges. For this purpose, a man-machine-environment system composed of evaluation indexes was established, and the grading standards of indexes were defined. Firstly, the measurements of 39 qualitative indexes were obtained through the survey data. According to the measured values of 31 quantitative indexes, the measurements of quantitative indexes were calculated by linear measurement function(LM) and other three functions. Then the singleindex measurement evaluation matrixes were established. Secondly, the entropy weight method was used to determine the weights of each index directly. The analytic hierarchy process(AHP) was also applied to calculate the weights of index and index factor hierarchies after the established hierarchical model. The weights of system hierarchies were given by the grid-based fuzzy Borda method(GFB). The comprehensive weights were determined by the combination method of AHP and GFB(CAG). Furthermore, the multi-index comprehensive measurement evaluation vectors were obtained.Thirdly, the vectors were evaluated by the credible degree recognition(CDR) and the maximum membership(TMM)criteria. Based on the above functions, methods, and criteria, 16 combination evaluation methods were recommended.Finally, the clean and safe production grade of Kaiyang phosphate mine in China was evaluated. The results show that the LM-CAG-CDR is the most reasonable method, which can not only determine the clean and safe production grade of phosphorus mines, but also improve the development level of clean and safe mining of phosphorus mines for guidance.In addition, some beneficial suggestions and measures were also proposed to advance the clean and safe production grade of Kaiyang phosphorus mine.
文摘We presented Mathematical apparatus of the choice of optimum parameters of technical, technological systems and materials on the basis of vector optimization. We have considered the formulation and solution of three types of tasks presented below. First, the problem of selecting the optimal parameters of technical systems depending on the functional characteristics of the system. Secondly, the problem of selecting the optimal parameters of the process depending on the technological characteristics of the process. Third, the problem of choosing the optimal structure of the material depending on the functional characteristics of this material. The statement of all problems is made in the form of vector problems of mathematical (nonlinear) programming. The theory and the principle of optimality of the solution of vector tasks it is explained in work of https://rdcu.be/bhZ8i. The implementation of the methodology is shown on a numerical example of the choice of optimum parameters of the technical, technological systems and materials. On the basis of mathematical methods of solution of vector problems we developed the software in the MATLAB system. The numerical example includes: input data (requirement specification) for modeling;transformation of mathematical models with uncertainty to the model under certainty;acceptance of an optimal solution with equivalent criteria (the solution of numerical model);acceptance of an optimal solution with the given priority of criterion.
文摘Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.