期刊文献+
共找到272篇文章
< 1 2 14 >
每页显示 20 50 100
Risk assessment of high-speed railway CTC system based on improved game theory and cloud model
1
作者 Yanhao Sun Tao Zhang +2 位作者 Shuxin Ding Zhiming Yuan Shengliang Yang 《Railway Sciences》 2024年第3期388-410,共23页
Purpose-In order to solve the problem of inaccurate calculation of index weights,subjectivity and uncertainty of index assessment in the risk assessment process,this study aims to propose a scientific and reasonable c... Purpose-In order to solve the problem of inaccurate calculation of index weights,subjectivity and uncertainty of index assessment in the risk assessment process,this study aims to propose a scientific and reasonable centralized traffic control(CTC)system risk assessment method.Design/methodologylapproach-First,system-theoretic process analysis(STPA)is used to conduct risk analysis on the CTC system and constructs risk assessment indexes based on this analysis.Then,to enhance the accuracy of weight calculation,the fuzzy analytical hierarchy process(FAHP),fuzzy decision-making trial and evaluation laboratory(FDEMATEL)and entropy weight method are employed to calculate the subjective weight,relative weight and objective weight of each index.These three types of weights are combined using game theory to obtain the combined weight for each index.To reduce subjectivity and uncertainty in the assessment process,the backward cloud generator method is utilized to obtain the numerical character(NC)of the cloud model for each index.The NCs of the indexes are then weighted to derive the comprehensive cloud for risk assessment of the CTC system.This cloud model is used to obtain the CTC system's comprehensive risk assessment.The model's similarity measurement method gauges the likeness between the comprehensive risk assessment cloud and the risk standard cloud.Finally,this process yields the risk assessment results for the CTC system.Findings-The cloud model can handle the subjectivity and fuzziness in the risk assessment process well.The cloud model-based risk assessment method was applied to the CTC system risk assessment of a railway group and achieved good results.Originality/value-This study provides a cloud model-based method for risk assessment of CTC systems,which accurately calculates the weight of risk indexes and uses cloud models to reduce uncertainty and subjectivity in the assessment,achieving effective risk assessment of CTC systems.It can provide a reference and theoretical basis for risk management of the CTC system. 展开更多
关键词 High-speed railway Centralized traffic control Risk assessment Game theory cloud model Paper type Research paper
下载PDF
基于SOPC的单芯片云控制器
2
作者 黄崧 曾芳玲 杨景曙 《微计算机信息》 北大核心 2006年第10Z期280-282,共3页
本文提出基于可编程片上系统在FPGA中实现单芯片云控制器的设计方法。将定制处理器系统加入硬件设计实体,生成硬件配置文件,编写调试云控制器代码,生成软件配置文件,再利用二者生成最终的配置文件并下载到FPGA配置芯片中,实现单芯片云... 本文提出基于可编程片上系统在FPGA中实现单芯片云控制器的设计方法。将定制处理器系统加入硬件设计实体,生成硬件配置文件,编写调试云控制器代码,生成软件配置文件,再利用二者生成最终的配置文件并下载到FPGA配置芯片中,实现单芯片云控制器,具有接口灵活,扩展性强,体积小,成本低等优点。 展开更多
关键词 可编程片上系统 云模型 云控制器
下载PDF
Lateral control of autonomous vehicles based on learning driver behavior via cloud model 被引量:8
3
作者 Gao Hongbo Xie Guotao +2 位作者 Liu Hongzhe Zhang Xinyu Li Deyi 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2017年第2期10-17,共8页
In order to achieve the lateral control of the intelligent vehicle, use the bi-cognitive model based on cloud model and cloud reasoning, solve the decision problem of the qualitative and quantitative of the lateral co... In order to achieve the lateral control of the intelligent vehicle, use the bi-cognitive model based on cloud model and cloud reasoning, solve the decision problem of the qualitative and quantitative of the lateral control of the intelligent vehicle. Obtaining a number of experiment data by driving a vehicle, classify the data according to the concept of data and fix the input and output variables of the cloud controller, design the control rules of the cloud controller of intelligent vehicle, and clouded and fix the parameter of cloud controller: expectation, entropy and hyper entropy. In order to verify the effectiveness of the cloud controller, joint simulation platform based on Matlab/Simulink/CarSim is established. Experimental analysis shows that: driver's lateral controller based on cloud model is able to achieve tracking of the desired angle, and achieve good control effect, it also verifies that a series of mental activities such as feeling, cognition, calculation, decision and so on are fuzzy and uncertain. 展开更多
关键词 cloud model driver behavior autonomous vehicles lateral control
原文传递
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12
4
作者 LIN Guoyuan WANG Danru +1 位作者 BIE Yuyu LEI Min 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ... As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 展开更多
关键词 cloud computing access control trust model mutual trust mechanism MTBAC
下载PDF
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
5
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
下载PDF
A Multi-Tenant Usage Access Model for Cloud Computing 被引量:1
6
作者 Zhengtao Liu Yun Yang +1 位作者 Wen Gu Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2020年第8期1233-1245,共13页
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated tha... Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants. 展开更多
关键词 Multi-tenant usage access control model cloud computing
下载PDF
Formal Approach to Workow Application Fragmentations Over Cloud Deployment Models
7
作者 Hyun Ahn Kwanghoon Pio Kim 《Computers, Materials & Continua》 SCIE EI 2021年第6期3071-3088,共18页
Workow management technologies have been dramatically improving their deployment architectures and systems along with the evolution and proliferation of cloud distributed computing environments.Especially,such cloud c... Workow management technologies have been dramatically improving their deployment architectures and systems along with the evolution and proliferation of cloud distributed computing environments.Especially,such cloud computing environments ought to be providing a suitable distributed computing paradigm to deploy very large-scale workow processes and applications with scalable on-demand services.In this paper,we focus on the distribution paradigm and its deployment formalism for such very large-scale workow applications being deployed and enacted across the multiple and heterogeneous cloud computing environments.We propose a formal approach to vertically as well as horizontally fragment very large-scale workow processes and their applications and to deploy the workow process and application fragments over three types of cloud deployment models and architectures.To concretize the formal approach,we rstly devise a series of operational situations fragmenting into cloud workow process and application components and deploying onto three different types of cloud deployment models and architectures.These concrete approaches are called the deployment-driven fragmentation mechanism to be applied to such very large-scale workow process and applications as an implementing component for cloud workow management systems.Finally,we strongly believe that our approach with the fragmentation formalisms becomes a theoretical basis of designing and implementing very large-scale and maximally distributed workow processes and applications to be deployed on cloud deployment models and architectural computing environments as well. 展开更多
关键词 cloud workows cloud deployment model workow application fragmentations information control net
下载PDF
Cloud Security Service for Identifying Unauthorized User Behaviour
8
作者 D.Stalin David Mamoona Anam +4 位作者 Chandraprabha Kaliappan S.Arun Mozhi Selvi Dilip Kumar Sharma Pankaj Dadheech Sudhakar Sengan 《Computers, Materials & Continua》 SCIE EI 2022年第2期2581-2600,共20页
Recently,an innovative trend like cloud computing has progressed quickly in InformationTechnology.For a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing numbe... Recently,an innovative trend like cloud computing has progressed quickly in InformationTechnology.For a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model.The cloud computing environment extracts the execution details of services and systems from end-users and developers.Additionally,through the system’s virtualization accomplished using resource pooling,cloud computing resources become more accessible.The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this paper.With the help of multi-agents,we attempt to represent Open-Identity(ID)design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the cloud.This research aims to determine how authentication and authorization services were provided in an agreeable and preventive manner.Based on attack-oriented threat model security,the evaluation works.By considering security for both authentication and authorization systems,possible security threats are analyzed by the proposed security systems. 展开更多
关键词 cloud computing user behaviour access control security model
下载PDF
Design and Experimental Demonstration of Software Defined Space Optical Network (SDSON) Architecture Based on Cloud Platform
9
作者 Fangyuan Xing Hongxi Yin +3 位作者 Bin Wu Jianxin Liu Ming Li Jingchao Wang 《Journal of Computer and Communications》 2016年第3期7-13,共7页
Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation posit... Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation positioning and science exploration. In this paper, the architecture of Software Defined Space Optical Network (SDSON) based on cloud platform is designed by means of Software Defined Optical Network (SDON) and cloud services. The new architecture combining centralized and distributed management-control mechanism is a multi-layer and multi-domain architecture with powerful computing and storage ability. Moreover, reliable service and unreliable service communication models employed in the space information network are proposed considering the characteristic of Disruption/Delay Tolerant Network (DTN). Finally, the functional verification and demonstration are performed on our optical experimental network platform. 展开更多
关键词 Space Information Network SDON cloud Control Plane Communication model
下载PDF
基于组合赋权云模型的塔台管制系统运行安全评估 被引量:1
10
作者 张兆宁 石峰 《安全与环境学报》 CAS CSCD 北大核心 2024年第4期1254-1265,共12页
随着我国民航业的迅猛发展,空中交通流量不断攀升,机场塔台管制系统的运行安全面临严峻考验,因此,正确识别和评估风险成为有效提高塔台管制系统运行安全水平的重要前提。为精准且有效地完成对塔台管制系统运行的安全评估,构建了基于模... 随着我国民航业的迅猛发展,空中交通流量不断攀升,机场塔台管制系统的运行安全面临严峻考验,因此,正确识别和评估风险成为有效提高塔台管制系统运行安全水平的重要前提。为精准且有效地完成对塔台管制系统运行的安全评估,构建了基于模糊决策实验室分析法(Decision-Making Trial and Evaluation Laboratory,DEMATEL)网络层次分析法(Analytic Network Process,ANP)熵权法云模型的塔台管制系统运行安全评估模型。首先,通过流程图法并结合人机环管的思想建立塔台管制系统运行安全评估指标体系,并采用模糊DEMATEL法确定评估指标间的相互影响关系,绘制评估指标之间的网络结构图;然后,通过ANP法确定各评估指标的主观权重,采用熵权法确定各评估指标的客观权重,并通过博弈论方法计算评估指标的综合权重;最后,将权重结果与评语层云模型结合使用对各级安全评估指标进行安全评估,通过MATLAB软件完成算例的仿真分析。结果表明:该塔台管制系统运行安全等级在一般和良好之间,仍需采取有效措施对某些风险因素进行控制;同时验证了该模型在塔台管制系统运行安全评估中具有可行性和准确性,对塔台管制系统安全评估具有指导意义。 展开更多
关键词 安全工程 三角模糊数 决策实验室分析法(DEMATEL) 网络层次分析法(ANP) 熵权法 云模型 塔台管制
下载PDF
基于变论域云PI的含风电负荷频率控制方法
11
作者 李志军 丁子健 张家安 《控制工程》 CSCD 北大核心 2024年第1期54-60,共7页
随着风电渗透率不断提高,其不确定性严重影响了电力系统频率稳定。基于此问题,建立了含风电的互联电力系统负荷频率控制模型,其中风机通过附加下垂与虚拟惯性控制参与频率调节。在此基础上,为解决风电接入系统引起的频率波动问题,提出... 随着风电渗透率不断提高,其不确定性严重影响了电力系统频率稳定。基于此问题,建立了含风电的互联电力系统负荷频率控制模型,其中风机通过附加下垂与虚拟惯性控制参与频率调节。在此基础上,为解决风电接入系统引起的频率波动问题,提出变论域云PI负荷频率控制策略,对云模型输入和输出论域动态调整。为避免增加控制器的复杂程度,基于函数形式设计论域的伸缩因子。最后,仿真结果表明,所设计的控制器能进一步提高云PI控制器的自适应能力,更好地处理风电不确定性对系统频率的影响。 展开更多
关键词 风电 不确定性 负荷频率控制 变论域 云模型
下载PDF
基于二维云模型的进近管制系统安全风险评估
12
作者 张兆宁 史卓晨 《重庆交通大学学报(自然科学版)》 CAS CSCD 北大核心 2024年第7期94-103,共10页
进近管制系统的安全运行是确保民航运输安全的关键。安全风险评估是风险管理的基础,其可以提升安全风险管理效率,提高系统整体运行的安全性。同时考虑安全风险因素和安全风险事件,从管制员风险、设备风险、气象环境风险、管制环境风险... 进近管制系统的安全运行是确保民航运输安全的关键。安全风险评估是风险管理的基础,其可以提升安全风险管理效率,提高系统整体运行的安全性。同时考虑安全风险因素和安全风险事件,从管制员风险、设备风险、气象环境风险、管制环境风险和管理风险等5大方面建立进近管制系统安全风险评估指标体系;通过二维云模型得到某进近管制系统的安全风险等级为Ⅲ级并与一维云模型对比,证明评估模型具有有效性。将组合赋权的方法与改进的层次分析法和CRITIC法作对比分析,结果表明:组合赋权的方法不仅减少了主观随意性,还中和了主客观权重的不足;使用组合赋权-二维云模型进行进近管制系统安全风险评估结果更加准确。 展开更多
关键词 交通运输工程 安全风险评估 进近管制系统 指标体系 二维云模型 最小二乘法
下载PDF
城市地下空间逆向建模方法的研究——以浙江某高校地下室为例
13
作者 江金霞 徐招惺 江丽钧 《丽水学院学报》 2024年第2期54-59,共6页
使用北斗网络RTK(real-time kinematic,实时动态)技术、三维激光扫描技术,获取已建地下空间CGCS2000坐标系下的点云数据,运用3DMAX、Revit软件参考点云逆向建模,采集模型中的距离和坐标数据与地下空间实测数据进行比较,计算模型内部精... 使用北斗网络RTK(real-time kinematic,实时动态)技术、三维激光扫描技术,获取已建地下空间CGCS2000坐标系下的点云数据,运用3DMAX、Revit软件参考点云逆向建模,采集模型中的距离和坐标数据与地下空间实测数据进行比较,计算模型内部精度。实验结果表明:在多种新技术的融合应用下,可实现已建地下多场地使用统一坐标系建模,满足CIM(city information mode,城市信息模型)平台建设的需求。 展开更多
关键词 网络RTK 地下空间 控制测量 点云 逆向建模
下载PDF
面向空管信息系统网络安全的量化评估方法
14
作者 顾兆军 杨文 隋翯 《计算机仿真》 2024年第6期24-30,共7页
随着“智慧空管”建设不断推进,对空管信息系统的安全性要求逐步提高。为了及时发现空管信息系统存在的风险,提出一种面向空管信息系统网络安全的量化评估方法。结合空管信息系统结构复杂、业务繁多等特点,从技术和管理两方面确定了网... 随着“智慧空管”建设不断推进,对空管信息系统的安全性要求逐步提高。为了及时发现空管信息系统存在的风险,提出一种面向空管信息系统网络安全的量化评估方法。结合空管信息系统结构复杂、业务繁多等特点,从技术和管理两方面确定了网络安全评估指标体系;首先运用序关系分析法确定评估指标权重,引入决策实验室法能考虑到因素之间的影响,达到了优化指标权重的效果,进而构建基于云模型的网络安全评估模型,从而确定风险等级。最后选取多个具体的空管信息系统为例进行网络安全评估,验证了该评估模型的可用性和有效性。 展开更多
关键词 空管信息系统 量化评估 序关系分析法 决策实验室法 云模型
下载PDF
C型料场刮板机取料速度控制方法与系统开发
15
作者 吉孟扬 郭宇 +1 位作者 李曦 谢祖华 《烧结球团》 北大核心 2024年第5期80-87,116,共9页
在C型料场刮板机自动化作业过程中,取料过快经常导致刮板机跳闸故障,取料过慢会导致供料不足、效率低等问题。对此,本文提出一种基于点云模型的C型料场刮板机取料速度控制方法,并在某C型料场现场试验验证,该控制方法步骤:(1)获取料堆点... 在C型料场刮板机自动化作业过程中,取料过快经常导致刮板机跳闸故障,取料过慢会导致供料不足、效率低等问题。对此,本文提出一种基于点云模型的C型料场刮板机取料速度控制方法,并在某C型料场现场试验验证,该控制方法步骤:(1)获取料堆点云数据和形状,将其转换为高度灰阶图,并采用一种新型点云过滤算法降低其噪声、提高平滑度;(2)基于刮板机链板恒定条件建立物料流量模型,结合能量转换构建刮板机电流-速度模型,将模型结果实时写入刮板机PLC中,进而实时控制刮板机取料速度。结果表明:使用该模型,料堆点云模型的内存资源降低98.64%,点与点之间形成有效的拓扑关系,计算的复杂度降低,料堆点云模型的平滑度显著提高;刮板机作业时料流的流量波动在8.29%内,刮板机的设备故障率减少5.24%,生产效率提高9.68%。本文提出的取料速度控制方法可用于替代人工调节刮板机的取料速度,减少刮板机的作业故障,提高生产效率,有效提高设备的无人化、智能化水平,并可为各种刮板机取料速度控制与作业稳定性控制提供参考。 展开更多
关键词 C型料场 点云模型 速度控制 均匀料流 刮板机速度
下载PDF
小样本飞机生产质量偏差数据分析与预测方法研究
16
作者 王陆航 张冬冬 +2 位作者 卢鹄 李汝鹏 葛小丽 《计算机科学》 CSCD 北大核心 2024年第S02期949-956,共8页
随着现代工业水平和对飞机精度要求的不断提升,对飞机生产质量的分析和管控方法越来越受到各大航空企业的重视。当前阶段,针对飞机装配偏差存在可参考样本数据少、不确定性大、非线性、多层级装配等固有特征,传统的分析方法难以准确地... 随着现代工业水平和对飞机精度要求的不断提升,对飞机生产质量的分析和管控方法越来越受到各大航空企业的重视。当前阶段,针对飞机装配偏差存在可参考样本数据少、不确定性大、非线性、多层级装配等固有特征,传统的分析方法难以准确地构建飞机生产偏差分析模型。因此,以飞机生产过程的偏差为研究目标,对飞机生产质量偏差数据分析与预测方法展开系统研究。首先分析各个零件之间的偏差关系,基于主成分分析法识别对总偏差影响最大的关键零件,找到重点预测的目标;接着从实际生产的类正态数据出发,重点关注关键零件,实现了基于正态云模型的偏差数据预测、生成与验证,得到更多样本的飞机生产质量偏差数据及其隶属度,一定程度上缓解了“小样本”的问题,并基于k-折交叉验证对预测模型进行了评估;最后构建了基于改进的灰色预测模型的多源数据融合的装配偏差波动区间协同预测模型,“小样本”问题的缓解使得区间预测更加精细、科学,在公差数据的参考下,预测飞机生产质量偏差所在的区间范围,为实际生产和制定公差修正机制提供指导。 展开更多
关键词 小样本数据 飞机生产质量管控 数学建模 主成分分析法 正态云模型 k-折交叉验证 灰色预测模型
下载PDF
基于AHP-云模型的矿井瓦斯防治系统安全状态评价 被引量:2
17
作者 刘鹏泽 尚宇琦 +1 位作者 黄家远 张枝伟 《中国矿山工程》 2024年第2期48-54,共7页
针对瓦斯突出矿井难以做到对其矿井瓦斯防治系统安全状态进行客观、精准评价的问题。本文首先对矿井瓦斯防治系统安全状态影响因素进行了分析,在此基础上,构建了矿井瓦斯防治系统安全状态评价体系。其次,基于层次分析法,并结合粒子群优... 针对瓦斯突出矿井难以做到对其矿井瓦斯防治系统安全状态进行客观、精准评价的问题。本文首先对矿井瓦斯防治系统安全状态影响因素进行了分析,在此基础上,构建了矿井瓦斯防治系统安全状态评价体系。其次,基于层次分析法,并结合粒子群优化算法PSO对判断矩阵进行优化、修正,在降低主观影响的基础上计算得到评价体系各指标权重。最后,基于云理论与二级指标权重、一级指标权重计算得出总指标的云数字特征,在matlab中运用正向云发生器生成评价指标的标准云模型。并以贵州省某典型瓦斯突出矿井为研究对象,结合该矿现场的实际调研情况,得出矿井瓦斯防治系统安全状态综合判别评价标准指标云,并对该矿瓦斯防治系统安全状态做出了准确评价并提出了相应的整改措施。研究成果对瓦斯突出矿井瓦斯防治系统安全状态的客观精准评价、煤矿安全生产有着重要意义。 展开更多
关键词 瓦斯灾害 矿井瓦斯防治 系统安全评价 层次分析法 云模型
下载PDF
多学科计算程序联合设计平台的研发
18
作者 王媛美 芦韡 +4 位作者 庞勃 张思原 黄擎宇 杨昆霖 林源峰 《中国核电》 2024年第4期542-546,共5页
传统计算程序在前处理、计算以及后处理这三个核心步骤均存在问题。在前处理方面对用户有较高的专业要求且直观性差;在计算过程中,用户需处理多学科计算程序联合设计验证中烦琐的数据传递;在后处理方面,需利用第三方后处理软件进行再次... 传统计算程序在前处理、计算以及后处理这三个核心步骤均存在问题。在前处理方面对用户有较高的专业要求且直观性差;在计算过程中,用户需处理多学科计算程序联合设计验证中烦琐的数据传递;在后处理方面,需利用第三方后处理软件进行再次处理分析。本文通过多学科计算程序联合设计平台,优化了集成前处理、计算以及后处理三个核心步骤。其中,前处理实现了快速、精细化建模等功能;计算步骤通过计算设计引擎实现了计算程序运行控制、指令解析、任务调度、运行流程控制等功能;后处理实现了可提供云图等功能。最后,通过建立一个双管道模型对平台的相关功能进行验证,证明了该平台突破了系统与设备快速精细化设计建模、在线调试等关键技术,为反应堆系统性能设计方案的快速生成、评估、验证与优化提供了高效直观的技术手段。 展开更多
关键词 精细化建模 指令解析 运行流程控制 云图
下载PDF
基于相对风险管控能力的化工企业风险分级方法 被引量:1
19
作者 田震 沈艳洋 赖恩 《安全与环境学报》 CAS CSCD 北大核心 2023年第8期2598-2606,共9页
综合考虑企业的固有风险与风险管控能力,建立一种化工企业安全生产风险分级的新方法。通过潜在生命损失值评估企业固有风险,确定风险分级判据;引入过程量与动态量构建化工企业风险管控能力评估指标体系,并基于云模型评估企业风险管控能... 综合考虑企业的固有风险与风险管控能力,建立一种化工企业安全生产风险分级的新方法。通过潜在生命损失值评估企业固有风险,确定风险分级判据;引入过程量与动态量构建化工企业风险管控能力评估指标体系,并基于云模型评估企业风险管控能力;提出相对风险管控能力系数概念,描述风险管控能力与固有风险相互作用下的企业安全生产风险等级。案例应用结果表明:根据相对风险管控能力系数的大小,可识别出固有风险等级低而安全生产风险等级高的企业,基于相对风险管控能力的风险分级方法具有可行性、有效性和实用性,对企业风险管控工作具有科学指导价值。 展开更多
关键词 安全工程 风险管控能力 化工企业 云模型 潜在生命损失
下载PDF
云环境下基于改进SEIRS模型的VOCs最优减排计算
20
作者 黄光球 赵羲轩 陆秋琴 《系统仿真学报》 CAS CSCD 北大核心 2023年第3期632-645,共14页
不同区域的挥发性有机物(volatile organic compounds, VOCs)排放是相互关联与影响的,为了将VOCs对大气环境的影响降到最低,实现VOCs区域协同联动治理,建立了以VOCs减排总量最大为首要目标最优减排模型,提出一种考虑环境污染因素的改进S... 不同区域的挥发性有机物(volatile organic compounds, VOCs)排放是相互关联与影响的,为了将VOCs对大气环境的影响降到最低,实现VOCs区域协同联动治理,建立了以VOCs减排总量最大为首要目标最优减排模型,提出一种考虑环境污染因素的改进SEIRS传染病动力学优化算法(SEIRS infectious disease dynamics optimization algorithm considering environmental pollution,SEIRSCE)在云环境下求解模型。应用案例以西安市为例,在阿里云服务器中使用SEIRS-CE算法对西安市13个气象监测站所对应VOCs关联区域减排问题进行计算并与传统智能优化算法进行对比,结果表明建立的VOCs最优减排模型具有科学性和可行性,在云环境下使用SEIRS-CE算法相较于对比算法求解VOCs最优减排问题的收敛速度更快,求解精度更高,陷入局部陷阱概率更低,具有高并发性、高安全性、高共享性,对府际间VOCs联防联控治理提供借鉴。 展开更多
关键词 VOCS 云计算 SEIRS传染病模型 联防联控 最优减排方案
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部