期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Cuckoo search algorithm-based optimal deployment method of heterogeneous multistatic radar for barrier coverage
1
作者 LI Haipeng FENG Dazheng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第5期1101-1115,共15页
This paper proposes an optimal deployment method of heterogeneous multistatic radars to construct arc barrier coverage with location restrictions.This method analyzes and proves the properties of different deployment ... This paper proposes an optimal deployment method of heterogeneous multistatic radars to construct arc barrier coverage with location restrictions.This method analyzes and proves the properties of different deployment patterns in the optimal deployment sequence.Based on these properties and considering location restrictions,it introduces an optimization model of arc barrier coverage and aims to minimize the total deployment cost of heterogeneous multistatic radars.To overcome the non-convexity of the model and the non-analytical nature of the objective function,an algorithm combining integer line programming and the cuckoo search algorithm(CSA)is proposed.The proposed algorithm can determine the number of receivers and transmitters in each optimal deployment squence to minimize the total placement cost.Simulations are conducted in different conditions to verify the effectiveness of the proposed method. 展开更多
关键词 heterogeneous multistatic radar(HMR) arc barrier coverage minimum deployment cost optimal deployment sequence cuckoo search algorithm(CSA)
下载PDF
Optimization method of linear barrier coverage deployment for multistatic radar
2
作者 LI Haipeng FENG Dazheng WANG Xiaohui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第1期68-80,共13页
To address the problem of building linear barrier coverage with the location restriction, an optimization method for deploying multistatic radars is proposed, where the location restriction splits the deployment line ... To address the problem of building linear barrier coverage with the location restriction, an optimization method for deploying multistatic radars is proposed, where the location restriction splits the deployment line into two segments. By proving the characteristics of deployment patterns, an optimal deployment sequence consisting of multiple deployment patterns is proposed and exploited to cover each segment. The types and numbers of deployment patterns are determined by an algorithm that combines the integer linear programming(ILP)and exhaustive method(EM). In addition, to reduce the computation amount, a formula is introduced to calculate the upper threshold of receivers’ number in a deployment pattern. Furthermore, since the objective function is non-convex and non-analytic, the overall model is divided into two layers concerning two suboptimization problems. Subsequently, another algorithm that integrates the segments and layers is proposed to determine the deployment parameters, such as the minimum cost, parameters of the optimal deployment sequence, and the location of the split point. Simulation results demonstrate that the proposed method can effectively determine the optimal deployment parameters under the location restriction. 展开更多
关键词 multistatic radar linear barrier coverage minimum deployment cost deployment sequence wireless sensor networks(WSNs)
下载PDF
Cost Deployment Tool for Technological Innovation of World Class Manufacturing
3
作者 Luan Carlos Santos Silva Joao Luiz Kovaleski +2 位作者 Silvia Gaia Manon Garcia Pedro Paulo de Andrade Júnior 《Journal of Transportation Technologies》 2013年第1期17-23,共7页
This article brings a discussion about using the Cost Deployment methodology for technological innovation in the World Class Manufacturing (WCM) systems at Fiat Group Automobiles Production System (FAPS). It aims to s... This article brings a discussion about using the Cost Deployment methodology for technological innovation in the World Class Manufacturing (WCM) systems at Fiat Group Automobiles Production System (FAPS). It aims to show how this tool acts in the technical pillars of the WCM, and its proper use as an alternative to innovate in production processes, achieving a drastic reduction in wastes and cost optimization during specific activities in production systems. The Cost Deployment builds a distinctive transversal method of WCM which helps to promote and provide extremely effectiveness in the activation of more specific methods that have been tried successfully in the Japanese manufacturing improvements. It also allows to link the operational performances, usually measured with indicators such as efficiency, providing number of defects, hours of desaturation. The used methodology was based on a literature review about the proposed topic. It ends up finding that the Cost Deployment tool is one of the most sophisticated technological innovations existing for the production systems of the World Class Manufacturing. 展开更多
关键词 Cost deployment Technological Innovation World Class Manufacturing Fiat Group Automobile Production Systems
下载PDF
Security Analysis Model, System Architecture and Relational Model of Enterprise Cloud Services
4
作者 Dang-Dang Niu Lei Liu +2 位作者 Xin Zhang Shuai Lu Zhuang Li 《International Journal of Automation and computing》 EI CSCD 2016年第6期574-584,共11页
Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and thei... Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and their employees have hired the enterprise cloud services, and put much important information in the cloud gradually. Cloud service systems have become the main targets of malicious attacks. However, the cloud computing technologies are still not perfect, and the management and maintenance of enterprise cloud services are more complex compared to traditional network services of cloud computing. So, enterprise cloud services are more likely to encounter some security problems, and the influenced scale of these security problems is broad. But there are few researches on the security of enterprise cloud services. In this paper, we analyze the software as a service(Saa S) enterprise cloud services and introduce the research status of security problems in cloud computing environment. Combining with the analysis of the characteristics and application architecture of Saa S enterprise cloud services, we propose the security problems analysis model, the analysis system architecture and the relational model. Our researches can support further research of the automatic generation of solutions and guide the deployment of security policies of Saa S enterprise cloud services. 展开更多
关键词 cloud deployment perfect maintenance likely users bases encounter relational costs
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部