Based on systematically analyzing the procedure of hazard and operability (HAZOP) study, the author introduces a method of modeling fault diagnosis with the Petri net with fuzzy colors, in which the fuzzy information ...Based on systematically analyzing the procedure of hazard and operability (HAZOP) study, the author introduces a method of modeling fault diagnosis with the Petri net with fuzzy colors, in which the fuzzy information can be represented effectively in the process of analysis. The author proposes the architecture of a knowledge base, which integrates HAZOP analysis and fault diagnosis, and provides the conditions for constructing the knowledge-based expert system. The author also presents a method of knowledge representation for on-line HAZOP analysis and on-line fault diagnosis is presented based on the technology of Petri net with fuzzy colors, which establishes a technological fundamental for integrating the automatic HAZOP analysis and fault diagnosis.展开更多
It is shown in this article that by changing the initial operation condition of the batch processes, the dynamic performance of the system can be varied largely, especially for the initial operational temperature of t...It is shown in this article that by changing the initial operation condition of the batch processes, the dynamic performance of the system can be varied largely, especially for the initial operational temperature of the exothermic reaction. The initial operation condition is often ignored in the designing batch processes for flexibility against disturbances or parameter variations. When the initial condition is not rigid as in the case of a batch reactor, where the initial reaction temperature is quite arbitrary, optimization can also be applied to determine the "best" initial condition to use. Problems for dynamic flexibility analysis of exothermic reaction including initial temperature and process operation can be formulated as dynamic optimization problems. Formulations are derived when the initial conditions are considered or not. When the initial conditions are considered, the initial condition can be transferred into control variables in the first optimal step. The solution of the dynamic optimization is on the basis of Rugge-Kutta integration algorithm and decomposition search algorithm. This method, as illustrated and tested with two highly nonlinear process problems, enables the determination of the optimal level. The dynamic performance is improved by the proposed method in the two exothermic reaction examples.展开更多
A strategy for water and wastewater minimization is developed for continuous water utilization systems involving fixed flowrate(non-mass-transfer-based)operations,based on the fictitious operations that is introduced ...A strategy for water and wastewater minimization is developed for continuous water utilization systems involving fixed flowrate(non-mass-transfer-based)operations,based on the fictitious operations that is introduced to represent the water losing and/or generating operations and a modified concentration interval analysis(MCIA) technique.This strategy is a simple,nongraphical,and noniterative procedure and is suitable for the quick yields of targets and the identification of pinch point location.Moreover,on the basis of the target method,a heuristic-based approach is also presented to generate water utilization networks,which could be demonstrated to be optimum ones. The proposed approaches are illustrated with example problems.展开更多
Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicio...Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicious cyber attack. It is more difficult to fred the drivers and get network connections information from a 64-bit windows 7 memory image file than from a 32-bit operating system memory image f'de. In this paper, an approach to fred drivers and get network connection information from 64-bit windows 7 memory images is given. The method is verified on 64-bit windows 7 version 6.1.7600 and proved reliable and efficient.展开更多
This work is to observe the performance of PC based robot manipulator under general purpose (Windows), Soft (Linux) and Hard (RT Linux) Real Time Operating Systems (OS). The same open loop control system is ob...This work is to observe the performance of PC based robot manipulator under general purpose (Windows), Soft (Linux) and Hard (RT Linux) Real Time Operating Systems (OS). The same open loop control system is observed in different operating systems with and without multitasking environment. The Data Acquisition (DAQ, PLC-812PG) card is used as a hardware interface. From the experiment, it could be seen that in the non real time operating system (Windows), the delay of the control system is larger than the Soft Real Time OS (Linux). Further, the authors observed the same control system under Hard Real Time OS (RT-Linux). At this point, the experiment showed that the real time error (jitter) is minimum in RT-Linux OS than the both of the previous OS. It is because the RT-Linux OS kernel can set the priority level and the control system was given the highest priority. The same experiment was observed under multitasking environment and the comparison of delay was similar to the preceding evaluation.展开更多
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme...In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system展开更多
In this paper, we provide a framework of fuzzy landscape theory and discuss an application to alliance analysis. The fuzzy landscape theory may allow us to analyses a variety of aggregation processes in political, eco...In this paper, we provide a framework of fuzzy landscape theory and discuss an application to alliance analysis. The fuzzy landscape theory may allow us to analyses a variety of aggregation processes in political, economic, and social problems in a more flexible manner. The simulation results for the problems of the international alignment of the Second World War in Europe and the coalition formation in standard-setting alliances in the case of the UNIX operating system are compared with those given by the original theory.展开更多
文摘Based on systematically analyzing the procedure of hazard and operability (HAZOP) study, the author introduces a method of modeling fault diagnosis with the Petri net with fuzzy colors, in which the fuzzy information can be represented effectively in the process of analysis. The author proposes the architecture of a knowledge base, which integrates HAZOP analysis and fault diagnosis, and provides the conditions for constructing the knowledge-based expert system. The author also presents a method of knowledge representation for on-line HAZOP analysis and on-line fault diagnosis is presented based on the technology of Petri net with fuzzy colors, which establishes a technological fundamental for integrating the automatic HAZOP analysis and fault diagnosis.
基金Supported by the National Natural Science Foundation of China (20536020, 20876056).
文摘It is shown in this article that by changing the initial operation condition of the batch processes, the dynamic performance of the system can be varied largely, especially for the initial operational temperature of the exothermic reaction. The initial operation condition is often ignored in the designing batch processes for flexibility against disturbances or parameter variations. When the initial condition is not rigid as in the case of a batch reactor, where the initial reaction temperature is quite arbitrary, optimization can also be applied to determine the "best" initial condition to use. Problems for dynamic flexibility analysis of exothermic reaction including initial temperature and process operation can be formulated as dynamic optimization problems. Formulations are derived when the initial conditions are considered or not. When the initial conditions are considered, the initial condition can be transferred into control variables in the first optimal step. The solution of the dynamic optimization is on the basis of Rugge-Kutta integration algorithm and decomposition search algorithm. This method, as illustrated and tested with two highly nonlinear process problems, enables the determination of the optimal level. The dynamic performance is improved by the proposed method in the two exothermic reaction examples.
文摘A strategy for water and wastewater minimization is developed for continuous water utilization systems involving fixed flowrate(non-mass-transfer-based)operations,based on the fictitious operations that is introduced to represent the water losing and/or generating operations and a modified concentration interval analysis(MCIA) technique.This strategy is a simple,nongraphical,and noniterative procedure and is suitable for the quick yields of targets and the identification of pinch point location.Moreover,on the basis of the target method,a heuristic-based approach is also presented to generate water utilization networks,which could be demonstrated to be optimum ones. The proposed approaches are illustrated with example problems.
基金This work is supported by the National Natural Science Foundation of China(61070163) and Shandong Natural Science Foundation (Y2008G35).
文摘Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicious cyber attack. It is more difficult to fred the drivers and get network connections information from a 64-bit windows 7 memory image file than from a 32-bit operating system memory image f'de. In this paper, an approach to fred drivers and get network connection information from 64-bit windows 7 memory images is given. The method is verified on 64-bit windows 7 version 6.1.7600 and proved reliable and efficient.
文摘This work is to observe the performance of PC based robot manipulator under general purpose (Windows), Soft (Linux) and Hard (RT Linux) Real Time Operating Systems (OS). The same open loop control system is observed in different operating systems with and without multitasking environment. The Data Acquisition (DAQ, PLC-812PG) card is used as a hardware interface. From the experiment, it could be seen that in the non real time operating system (Windows), the delay of the control system is larger than the Soft Real Time OS (Linux). Further, the authors observed the same control system under Hard Real Time OS (RT-Linux). At this point, the experiment showed that the real time error (jitter) is minimum in RT-Linux OS than the both of the previous OS. It is because the RT-Linux OS kernel can set the priority level and the control system was given the highest priority. The same experiment was observed under multitasking environment and the comparison of delay was similar to the preceding evaluation.
基金This work was supported in part by the National Science Foundation Project of P.R.China,the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-14-046A2
文摘In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system
基金This research is supported by CAS,NSFC and the National Basic Research Programme in Natural Sciences of Vietnam.
文摘In this paper, we provide a framework of fuzzy landscape theory and discuss an application to alliance analysis. The fuzzy landscape theory may allow us to analyses a variety of aggregation processes in political, economic, and social problems in a more flexible manner. The simulation results for the problems of the international alignment of the Second World War in Europe and the coalition formation in standard-setting alliances in the case of the UNIX operating system are compared with those given by the original theory.