The precise integration method proposed for linear time-invariant homogeneous dynamic systems can provide accurate numerical results that approach an exact solution at integration points. However, difficulties arise w...The precise integration method proposed for linear time-invariant homogeneous dynamic systems can provide accurate numerical results that approach an exact solution at integration points. However, difficulties arise when the algorithm is used for non-homogeneous dynamic systems due to the inverse matrix calculation required. In this paper, the structural dynamic equalibrium equations are converted into a special form, the inverse matrix calculation is replaced by the Crout decomposition method to solve the dynamic equilibrium equations, and the precise integration method without the inverse matrix calculation is obtained. The new algorithm enhances the present precise integration method by improving both the computational accuracy and efficiency. Two numerical examples are given to demonstrate the validity and efficiency of the proposed algorithm.展开更多
This paper expounds the main structure design and function implementation of a provincial power grid relay protection setting calculation integration system. In accordance with the actual features of the relay protect...This paper expounds the main structure design and function implementation of a provincial power grid relay protection setting calculation integration system. In accordance with the actual features of the relay protection setting calculation work, setting calculation system is developed based on the project. For the development and research of integration of setting calculation system, to achieve a certain provincial power grid relay protection setting calculation and the standardization of the operation and management, network and intelligent, is of great significance.展开更多
1 INTRODUCTIONIn recent years,the energy-saving retrofit of existing chemical process plants,especially exist-ing large-scale complex chemical process system(LCCPS),has been becoming necessary as theengineers’knowled...1 INTRODUCTIONIn recent years,the energy-saving retrofit of existing chemical process plants,especially exist-ing large-scale complex chemical process system(LCCPS),has been becoming necessary as theengineers’knowledge goes on and the market changes.展开更多
This paper makes a study of some technical and engineering aspects by using C2+ hydrocarbon separation facility at Guangdong Dapeng liquefied natural gas (GDLNG) terminal. In the C2+ hydrocarbon extraction process,the...This paper makes a study of some technical and engineering aspects by using C2+ hydrocarbon separation facility at Guangdong Dapeng liquefied natural gas (GDLNG) terminal. In the C2+ hydrocarbon extraction process,the cold energy contained in LNG will be utilized. In order to ensure the optimum operating conditions of the terminal and C2+ hydrocarbon extraction facility by optimizing the current operating processes of the terminal,the C2+ hydrocarbon extraction facility construction plan is proposed. We conducted numerous calculations and simulations using such specific analysis software as PRO II<version 7.0>. Additionally available flow data are used to verify the cyclic send-out rates from the terminal,thus establishing the current and future projected load factors. This study is intended to make sure that GDLNG can continue to supply gas via the pipeline system safely without interruptions and most significantly solves the effects of flow fluctuations at the terminal gasification send-out facility on the hydrocarbons extraction,ensuring optimum pipeline operations and ensuring safe and effective means for such C2+ hydrocarbons extraction process as well. At the same time,the terminal is also in the optimum operation condition. This is very significant to the terminal safety operation and the energy conservation and emission reduction.展开更多
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a...Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.展开更多
Predicting the usage of container cloud resources has always been an important and challenging problem in improving the performance of cloud resource clusters.We proposed an integrated prediction method of stacking co...Predicting the usage of container cloud resources has always been an important and challenging problem in improving the performance of cloud resource clusters.We proposed an integrated prediction method of stacking container cloud resources based on variational modal decomposition(VMD)-Permutation entropy(PE)and long short-term memory(LSTM)neural network to solve the prediction difficulties caused by the non-stationarity and volatility of resource data.The variational modal decomposition algorithm decomposes the time series data of cloud resources to obtain intrinsic mode function and residual components,which solves the signal decomposition algorithm’s end-effect and modal confusion problems.The permutation entropy is used to evaluate the complexity of the intrinsic mode function,and the reconstruction based on similar entropy and low complexity is used to reduce the difficulty of modeling.Finally,we use the LSTM and stacking fusion models to predict and superimpose;the stacking integration model integrates Gradient boosting regression(GBR),Kernel ridge regression(KRR),and Elastic net regression(ENet)as primary learners,and the secondary learner adopts the kernel ridge regression method with solid generalization ability.The Amazon public data set experiment shows that compared with Holt-winters,LSTM,and Neuralprophet models,we can see that the optimization range of multiple evaluation indicators is 0.338∼1.913,0.057∼0.940,0.000∼0.017 and 1.038∼8.481 in root means square error(RMSE),mean absolute error(MAE),mean absolute percentage error(MAPE)and variance(VAR),showing its stability and better prediction accuracy.展开更多
Nowadays,numerous applications are associated with cloud and user data gets collected globally and stored in cloud units.In addition to shared data storage,cloud computing technique offers multiple advantages for the ...Nowadays,numerous applications are associated with cloud and user data gets collected globally and stored in cloud units.In addition to shared data storage,cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud,public cloud,community cloud and private cloud.Though cloud-based computing solutions are highly con-venient to the users,it also brings a challenge i.e.,security of the data shared.Hence,in current research paper,blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentica-tion process.Blockchain technology is utilized in this study to enable efficient and secure operation which not only empowers cloud security but also avoids threats and attacks.Additionally,the data integrity authentication technique is also uti-lized to limit the unwanted access of data in cloud storage unit.The major objec-tive of the projected technique is to empower data security and user authentication in cloud computing environment.To improve the proposed authentication pro-cess,cuckoofilter and Merkle Hash Tree(MHT)are utilized.The proposed meth-odology was validated using few performance metrics such as processing time,uploading time,downloading time,authentication time,consensus time,waiting time,initialization time,in addition to storage overhead.The proposed method was compared with conventional cloud security techniques and the outcomes establish the supremacy of the proposed method.展开更多
This article describes a novel approach for enhancing the three-dimensional(3D)point cloud reconstruction for light field microscopy(LFM)using U-net architecture-based fully convolutional neural network(CNN).Since the...This article describes a novel approach for enhancing the three-dimensional(3D)point cloud reconstruction for light field microscopy(LFM)using U-net architecture-based fully convolutional neural network(CNN).Since the directional view of the LFM is limited,noise and artifacts make it difficult to reconstruct the exact shape of 3D point clouds.The existing methods suffer from these problems due to the self-occlusion of the model.This manuscript proposes a deep fusion learning(DL)method that combines a 3D CNN with a U-Net-based model as a feature extractor.The sub-aperture images obtained from the light field microscopy are aligned to form a light field data cube for preprocessing.A multi-stream 3D CNNs and U-net architecture are applied to obtain the depth feature fromthe directional sub-aperture LF data cube.For the enhancement of the depthmap,dual iteration-based weighted median filtering(WMF)is used to reduce surface noise and enhance the accuracy of the reconstruction.Generating a 3D point cloud involves combining two key elements:the enhanced depth map and the central view of the light field image.The proposed method is validated using synthesized Heidelberg Collaboratory for Image Processing(HCI)and real-world LFM datasets.The results are compared with different state-of-the-art methods.The structural similarity index(SSIM)gain for boxes,cotton,pillow,and pens are 0.9760,0.9806,0.9940,and 0.9907,respectively.Moreover,the discrete entropy(DE)value for LFM depth maps exhibited better performance than other existing methods.展开更多
为实现“双碳”目标,综合能源系统(integrated energy systems, IES)成为了近几年的重要研究方向之一,然而传统的IES能流计算已经无法精确地反映电制气(power-to-gas, P2G)技术带来的氢气注入天然气网络后的混合燃气的参数变化对IES的...为实现“双碳”目标,综合能源系统(integrated energy systems, IES)成为了近几年的重要研究方向之一,然而传统的IES能流计算已经无法精确地反映电制气(power-to-gas, P2G)技术带来的氢气注入天然气网络后的混合燃气的参数变化对IES的影响。为此,在传统天然气系统稳态分析方法的基础上加入了SRK(Soawk-Redlich-Kwong)气体状态方程,将压缩因子作为状态变量,提出可以反映氢气注入天然气系统,对气体流量和混合燃气热值产生影响的稳态分析方法。以此为基础,提出了计及氢气注入与压缩因子的电-热-气IES能流分解求解计算方法。最后通过算例验证了所提方法可有效反映混合燃气的参数变化对IES的影响。展开更多
文摘The precise integration method proposed for linear time-invariant homogeneous dynamic systems can provide accurate numerical results that approach an exact solution at integration points. However, difficulties arise when the algorithm is used for non-homogeneous dynamic systems due to the inverse matrix calculation required. In this paper, the structural dynamic equalibrium equations are converted into a special form, the inverse matrix calculation is replaced by the Crout decomposition method to solve the dynamic equilibrium equations, and the precise integration method without the inverse matrix calculation is obtained. The new algorithm enhances the present precise integration method by improving both the computational accuracy and efficiency. Two numerical examples are given to demonstrate the validity and efficiency of the proposed algorithm.
文摘This paper expounds the main structure design and function implementation of a provincial power grid relay protection setting calculation integration system. In accordance with the actual features of the relay protection setting calculation work, setting calculation system is developed based on the project. For the development and research of integration of setting calculation system, to achieve a certain provincial power grid relay protection setting calculation and the standardization of the operation and management, network and intelligent, is of great significance.
文摘1 INTRODUCTIONIn recent years,the energy-saving retrofit of existing chemical process plants,especially exist-ing large-scale complex chemical process system(LCCPS),has been becoming necessary as theengineers’knowledge goes on and the market changes.
文摘This paper makes a study of some technical and engineering aspects by using C2+ hydrocarbon separation facility at Guangdong Dapeng liquefied natural gas (GDLNG) terminal. In the C2+ hydrocarbon extraction process,the cold energy contained in LNG will be utilized. In order to ensure the optimum operating conditions of the terminal and C2+ hydrocarbon extraction facility by optimizing the current operating processes of the terminal,the C2+ hydrocarbon extraction facility construction plan is proposed. We conducted numerous calculations and simulations using such specific analysis software as PRO II<version 7.0>. Additionally available flow data are used to verify the cyclic send-out rates from the terminal,thus establishing the current and future projected load factors. This study is intended to make sure that GDLNG can continue to supply gas via the pipeline system safely without interruptions and most significantly solves the effects of flow fluctuations at the terminal gasification send-out facility on the hydrocarbons extraction,ensuring optimum pipeline operations and ensuring safe and effective means for such C2+ hydrocarbons extraction process as well. At the same time,the terminal is also in the optimum operation condition. This is very significant to the terminal safety operation and the energy conservation and emission reduction.
文摘Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.
基金The National Natural Science Foundation of China (No.62262011)The Natural Science Foundation of Guangxi (No.2021JJA170130).
文摘Predicting the usage of container cloud resources has always been an important and challenging problem in improving the performance of cloud resource clusters.We proposed an integrated prediction method of stacking container cloud resources based on variational modal decomposition(VMD)-Permutation entropy(PE)and long short-term memory(LSTM)neural network to solve the prediction difficulties caused by the non-stationarity and volatility of resource data.The variational modal decomposition algorithm decomposes the time series data of cloud resources to obtain intrinsic mode function and residual components,which solves the signal decomposition algorithm’s end-effect and modal confusion problems.The permutation entropy is used to evaluate the complexity of the intrinsic mode function,and the reconstruction based on similar entropy and low complexity is used to reduce the difficulty of modeling.Finally,we use the LSTM and stacking fusion models to predict and superimpose;the stacking integration model integrates Gradient boosting regression(GBR),Kernel ridge regression(KRR),and Elastic net regression(ENet)as primary learners,and the secondary learner adopts the kernel ridge regression method with solid generalization ability.The Amazon public data set experiment shows that compared with Holt-winters,LSTM,and Neuralprophet models,we can see that the optimization range of multiple evaluation indicators is 0.338∼1.913,0.057∼0.940,0.000∼0.017 and 1.038∼8.481 in root means square error(RMSE),mean absolute error(MAE),mean absolute percentage error(MAPE)and variance(VAR),showing its stability and better prediction accuracy.
文摘Nowadays,numerous applications are associated with cloud and user data gets collected globally and stored in cloud units.In addition to shared data storage,cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud,public cloud,community cloud and private cloud.Though cloud-based computing solutions are highly con-venient to the users,it also brings a challenge i.e.,security of the data shared.Hence,in current research paper,blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentica-tion process.Blockchain technology is utilized in this study to enable efficient and secure operation which not only empowers cloud security but also avoids threats and attacks.Additionally,the data integrity authentication technique is also uti-lized to limit the unwanted access of data in cloud storage unit.The major objec-tive of the projected technique is to empower data security and user authentication in cloud computing environment.To improve the proposed authentication pro-cess,cuckoofilter and Merkle Hash Tree(MHT)are utilized.The proposed meth-odology was validated using few performance metrics such as processing time,uploading time,downloading time,authentication time,consensus time,waiting time,initialization time,in addition to storage overhead.The proposed method was compared with conventional cloud security techniques and the outcomes establish the supremacy of the proposed method.
基金supported by the National Research Foundation of Korea (NRF) (NRF-2018R1D1A3B07044041&NRF-2020R1A2C1101258)supported by the MSIT (Ministry of Science and ICT),Korea,under the ITRC (Information Technology Research Center)Support Program (IITP-2023-2020-0-01846)was conducted during the research year of Chungbuk National University in 2023.
文摘This article describes a novel approach for enhancing the three-dimensional(3D)point cloud reconstruction for light field microscopy(LFM)using U-net architecture-based fully convolutional neural network(CNN).Since the directional view of the LFM is limited,noise and artifacts make it difficult to reconstruct the exact shape of 3D point clouds.The existing methods suffer from these problems due to the self-occlusion of the model.This manuscript proposes a deep fusion learning(DL)method that combines a 3D CNN with a U-Net-based model as a feature extractor.The sub-aperture images obtained from the light field microscopy are aligned to form a light field data cube for preprocessing.A multi-stream 3D CNNs and U-net architecture are applied to obtain the depth feature fromthe directional sub-aperture LF data cube.For the enhancement of the depthmap,dual iteration-based weighted median filtering(WMF)is used to reduce surface noise and enhance the accuracy of the reconstruction.Generating a 3D point cloud involves combining two key elements:the enhanced depth map and the central view of the light field image.The proposed method is validated using synthesized Heidelberg Collaboratory for Image Processing(HCI)and real-world LFM datasets.The results are compared with different state-of-the-art methods.The structural similarity index(SSIM)gain for boxes,cotton,pillow,and pens are 0.9760,0.9806,0.9940,and 0.9907,respectively.Moreover,the discrete entropy(DE)value for LFM depth maps exhibited better performance than other existing methods.
文摘为实现“双碳”目标,综合能源系统(integrated energy systems, IES)成为了近几年的重要研究方向之一,然而传统的IES能流计算已经无法精确地反映电制气(power-to-gas, P2G)技术带来的氢气注入天然气网络后的混合燃气的参数变化对IES的影响。为此,在传统天然气系统稳态分析方法的基础上加入了SRK(Soawk-Redlich-Kwong)气体状态方程,将压缩因子作为状态变量,提出可以反映氢气注入天然气系统,对气体流量和混合燃气热值产生影响的稳态分析方法。以此为基础,提出了计及氢气注入与压缩因子的电-热-气IES能流分解求解计算方法。最后通过算例验证了所提方法可有效反映混合燃气的参数变化对IES的影响。