In this paper, on the principle of the modern control theory, the safety state equation of the safety systems was established and the dynamic model of the safety evaluation was put out. And finally, the example of its...In this paper, on the principle of the modern control theory, the safety state equation of the safety systems was established and the dynamic model of the safety evaluation was put out. And finally, the example of its application in an iron and steel corporation was given.展开更多
This paper deals with the increasing safety of working in aggressive potential locations, having SCADA system and WSN sensors, using a “probabilistic strategy” in comparison with a “deterministic” one, modeling/si...This paper deals with the increasing safety of working in aggressive potential locations, having SCADA system and WSN sensors, using a “probabilistic strategy” in comparison with a “deterministic” one, modeling/simulation and application in underground coal mining. In general, three conditions can be considered: 1) an unfriendly environment that facilitates the risk of accidents, 2) aggressive equipments that can compete to cause accidents and 3) the work security breaches that can cause accidents. These conditions define the triangle of accidents and are customized for an underground coal mining where the methane gas is released with the exploitation of the massive coal. In this case, the first two conditions create an explosive potential atmosphere. To allow people to work in a safe location it needs: first, a continuing monitoring through SCADA system of the explosive potential atmosphere and second, the use of antiexplosive equipment. This method, named “deterministic strategy”, increases the safety of working, but the explosions have not been completely eliminated. In order to increase the safety of working, the paper continues with the presentation of a new method based on hazard laws, named “probabilistic strategy”. This strategy was validated through modeling/simulation using CupCarbon software platform, and application of WSN networks implemented on Arduino equipments. At the end of the paper the interesting conclusions are emphases which are applicable to both strategies.展开更多
Conventional analysis methods cannot fully meet the business needs of power grids.At present,several artificial intelligence (AI) projects in a single business field are competing with each other,and the interfaces be...Conventional analysis methods cannot fully meet the business needs of power grids.At present,several artificial intelligence (AI) projects in a single business field are competing with each other,and the interfaces between the systems lack unified specifications.Therefore,it is imperative to establish a comprehensive service platform.In this paper,an AI platform framework for power fields is proposed;it adopts the deep learning technology to support natural language processing and computer vision services.On one hand,it can provide an algorithm,a model,and service support for power-enterprise applications,and on the other hand,it can provide a large number of heterogeneous data processing,algorithm libraries,intelligent services,model managements,typical application scenarios,and other services for different levels of business personnel.The establishment of the platform framework could break data barrier,improve portability of technology,avoid the investment waste caused by repeated constructions,and lay the foundation for the construction of "platform + application + service" ecological chain.展开更多
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio...Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.展开更多
The paper studied the connection between internet of things (IOT) technology and transportation industry. Meanwhile,the definition of IOT in transportation was given. Concerning that many problems occurred during the ...The paper studied the connection between internet of things (IOT) technology and transportation industry. Meanwhile,the definition of IOT in transportation was given. Concerning that many problems occurred during the process of traditional intelligent transportation system,the paper proposed a promising model of IOT in transportation. The advantage of the information utilization model from information to function was confirmed through comparative study. Finally,the model presented that a real interconnection of transportation would be achieved based on the unified information collection. It can greatly save cost on technology transfer,exploit potential value of information,and promote the emergence of a sustainable information service market and the industrial upgrade.展开更多
A systematic approach is proposed to the theme of safety,reliability and global quality of complex networks(material and immaterial)by means of special mathematical tools that allow an adequate geometric characterizat...A systematic approach is proposed to the theme of safety,reliability and global quality of complex networks(material and immaterial)by means of special mathematical tools that allow an adequate geometric characterization and study of the operation,even in the presence of multiple obstacles along the path.To that end,applying the theory of graphs to the problem under study and using a special mathematical model based on stochastic geometry,in this article we consider some regular lattices in which it is possible to schematize the elements of the network,with the fundamental cell with six,eight or 2(n+2)obstacles,calculating the probability of Laplace.In this way it is possible to measure the“degree of impedance”exerted by the anomalies along the network by the obstacles examined.The method can be extended to other regular and/or irregular geometric figures,whose union together constitutes the examined network,allowing to optimize the functioning of the complex system considered.展开更多
In data centers, the transmission control protocol(TCP) incast causes catastrophic goodput degradation to applications with a many-to-one traffic pattern. In this paper, we intend to tame incast at the receiver-side a...In data centers, the transmission control protocol(TCP) incast causes catastrophic goodput degradation to applications with a many-to-one traffic pattern. In this paper, we intend to tame incast at the receiver-side application. Towards this goal, we first develop an analytical model that formulates the incast probability as a function of connection variables and network environment settings. We combine the model with the optimization theory and derive some insights into minimizing the incast probability through tuning connection variables related to applications. Then,enlightened by the analytical results, we propose an adaptive application-layer solution to the TCP incast.The solution equally allocates advertised windows to concurrent connections, and dynamically adapts the number of concurrent connections to the varying conditions. Simulation results show that our solution consistently eludes incast and achieves high goodput in various scenarios including the ones with multiple bottleneck links and background TCP traffic.展开更多
The network reliability is difficult to be evaluated because of the complex relationship among the network components.It can be quite different for different users running different applications on the same network.Th...The network reliability is difficult to be evaluated because of the complex relationship among the network components.It can be quite different for different users running different applications on the same network.This paper proposes a new concept and a model of application reliability.Different from the existing models that ignores the effects of applications,the proposed application reliability model considers the effects of different applications on the network performance and different types of network faults and makes the analysis of network components relationship possible.This paper also provides a method to evaluate the application reliability when the data flow satisfies Markov properties.Finally,a case study is presented to illustrate the proposed network reliability model and the analysis method.展开更多
The scope of this work is to present a multidisciplinary study in order to propose a tool called DIMZAL. DIMZAL forecasts fuelbreak safety zone sizes. To evaluate a safety zone and to prevent injury, the Acceptable Sa...The scope of this work is to present a multidisciplinary study in order to propose a tool called DIMZAL. DIMZAL forecasts fuelbreak safety zone sizes. To evaluate a safety zone and to prevent injury, the Acceptable Safety Distance (ASD) between the fire and firefighters is required. This distance is usually set thanks to a general rule-of-thumb: it should be at least 4 times the maximum flame length. A common assumption considers an empirical relationship between fireline intensity and flame length. In the current work which follows on from an oral presentation held at the VII International Conference on Forest Fire Research in Coimbra in 2014, an alternative way is proposed: a closed physical model is applied in order to quantize the ASD. This model is integrated in a software tool, which uses a simulation framework based on Discrete EVent system Specification formalism (DEVS), a 3D physical real-time model of surface fires developed at the University of Corsica and a mobile application based on a Google SDK to display the展开更多
文摘In this paper, on the principle of the modern control theory, the safety state equation of the safety systems was established and the dynamic model of the safety evaluation was put out. And finally, the example of its application in an iron and steel corporation was given.
文摘This paper deals with the increasing safety of working in aggressive potential locations, having SCADA system and WSN sensors, using a “probabilistic strategy” in comparison with a “deterministic” one, modeling/simulation and application in underground coal mining. In general, three conditions can be considered: 1) an unfriendly environment that facilitates the risk of accidents, 2) aggressive equipments that can compete to cause accidents and 3) the work security breaches that can cause accidents. These conditions define the triangle of accidents and are customized for an underground coal mining where the methane gas is released with the exploitation of the massive coal. In this case, the first two conditions create an explosive potential atmosphere. To allow people to work in a safe location it needs: first, a continuing monitoring through SCADA system of the explosive potential atmosphere and second, the use of antiexplosive equipment. This method, named “deterministic strategy”, increases the safety of working, but the explosions have not been completely eliminated. In order to increase the safety of working, the paper continues with the presentation of a new method based on hazard laws, named “probabilistic strategy”. This strategy was validated through modeling/simulation using CupCarbon software platform, and application of WSN networks implemented on Arduino equipments. At the end of the paper the interesting conclusions are emphases which are applicable to both strategies.
基金supported by National Key Research and Development Project(2017YFE0112600)Science and Technology Project of China Electric Power Research Institute(Research on the Key Technologies and Typical Application Scenarios of the Artificial Intelligence Basic Framework for Integrated Energy)
文摘Conventional analysis methods cannot fully meet the business needs of power grids.At present,several artificial intelligence (AI) projects in a single business field are competing with each other,and the interfaces between the systems lack unified specifications.Therefore,it is imperative to establish a comprehensive service platform.In this paper,an AI platform framework for power fields is proposed;it adopts the deep learning technology to support natural language processing and computer vision services.On one hand,it can provide an algorithm,a model,and service support for power-enterprise applications,and on the other hand,it can provide a large number of heterogeneous data processing,algorithm libraries,intelligent services,model managements,typical application scenarios,and other services for different levels of business personnel.The establishment of the platform framework could break data barrier,improve portability of technology,avoid the investment waste caused by repeated constructions,and lay the foundation for the construction of "platform + application + service" ecological chain.
基金the Iran Telecommunication Research Center (ITRC)
文摘Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.
基金CAE Internet of Things and its Application Project in 2010National Basic Research Program of China"973"Program (No. 2012CB315805)
文摘The paper studied the connection between internet of things (IOT) technology and transportation industry. Meanwhile,the definition of IOT in transportation was given. Concerning that many problems occurred during the process of traditional intelligent transportation system,the paper proposed a promising model of IOT in transportation. The advantage of the information utilization model from information to function was confirmed through comparative study. Finally,the model presented that a real interconnection of transportation would be achieved based on the unified information collection. It can greatly save cost on technology transfer,exploit potential value of information,and promote the emergence of a sustainable information service market and the industrial upgrade.
文摘A systematic approach is proposed to the theme of safety,reliability and global quality of complex networks(material and immaterial)by means of special mathematical tools that allow an adequate geometric characterization and study of the operation,even in the presence of multiple obstacles along the path.To that end,applying the theory of graphs to the problem under study and using a special mathematical model based on stochastic geometry,in this article we consider some regular lattices in which it is possible to schematize the elements of the network,with the fundamental cell with six,eight or 2(n+2)obstacles,calculating the probability of Laplace.In this way it is possible to measure the“degree of impedance”exerted by the anomalies along the network by the obstacles examined.The method can be extended to other regular and/or irregular geometric figures,whose union together constitutes the examined network,allowing to optimize the functioning of the complex system considered.
基金supported by the Fundamental Research Fundsfor the Central Universities under Grant No.ZYGX2015J009the Sichuan Province Scientific and Technological Support Project under Grants No.2014GZ0017 and No.2016GZ0093
文摘In data centers, the transmission control protocol(TCP) incast causes catastrophic goodput degradation to applications with a many-to-one traffic pattern. In this paper, we intend to tame incast at the receiver-side application. Towards this goal, we first develop an analytical model that formulates the incast probability as a function of connection variables and network environment settings. We combine the model with the optimization theory and derive some insights into minimizing the incast probability through tuning connection variables related to applications. Then,enlightened by the analytical results, we propose an adaptive application-layer solution to the TCP incast.The solution equally allocates advertised windows to concurrent connections, and dynamically adapts the number of concurrent connections to the varying conditions. Simulation results show that our solution consistently eludes incast and achieves high goodput in various scenarios including the ones with multiple bottleneck links and background TCP traffic.
基金supported by the Beijing Natural Science Foundation(4113074)
文摘The network reliability is difficult to be evaluated because of the complex relationship among the network components.It can be quite different for different users running different applications on the same network.This paper proposes a new concept and a model of application reliability.Different from the existing models that ignores the effects of applications,the proposed application reliability model considers the effects of different applications on the network performance and different types of network faults and makes the analysis of network components relationship possible.This paper also provides a method to evaluate the application reliability when the data flow satisfies Markov properties.Finally,a case study is presented to illustrate the proposed network reliability model and the analysis method.
基金pported in part by the French Ministry of Research,the Corsican Region and the CNRS,under Grant CPER 2007-2013
文摘The scope of this work is to present a multidisciplinary study in order to propose a tool called DIMZAL. DIMZAL forecasts fuelbreak safety zone sizes. To evaluate a safety zone and to prevent injury, the Acceptable Safety Distance (ASD) between the fire and firefighters is required. This distance is usually set thanks to a general rule-of-thumb: it should be at least 4 times the maximum flame length. A common assumption considers an empirical relationship between fireline intensity and flame length. In the current work which follows on from an oral presentation held at the VII International Conference on Forest Fire Research in Coimbra in 2014, an alternative way is proposed: a closed physical model is applied in order to quantize the ASD. This model is integrated in a software tool, which uses a simulation framework based on Discrete EVent system Specification formalism (DEVS), a 3D physical real-time model of surface fires developed at the University of Corsica and a mobile application based on a Google SDK to display the