期刊文献+
共找到1,168篇文章
< 1 2 59 >
每页显示 20 50 100
Improved reservoir characterization by means of supervised machine learning and model-based seismic impedance inversion in the Penobscot field,Scotian Basin
1
作者 Satya Narayan Soumyashree Debasis Sahoo +2 位作者 Soumitra Kar Sanjit Kumar Pal Subhra Kangsabanik 《Energy Geoscience》 EI 2024年第2期183-201,共19页
The present research work attempted to delineate and characterize the reservoir facies from the Dawson Canyon Formation in the Penobscot field,Scotian Basin.An integrated study of instantaneous frequency,P-impedance,v... The present research work attempted to delineate and characterize the reservoir facies from the Dawson Canyon Formation in the Penobscot field,Scotian Basin.An integrated study of instantaneous frequency,P-impedance,volume of clay and neutron-porosity attributes,and structural framework was done to unravel the Late Cretaceous depositional system and reservoir facies distribution patterns within the study area.Fault strikes were found in the EW and NEE-SWW directions indicating the dominant course of tectonic activities during the Late Cretaceous period in the region.P-impedance was estimated using model-based seismic inversion.Petrophysical properties such as the neutron porosity(NPHI)and volume of clay(VCL)were estimated using the multilayer perceptron neural network with high accuracy.Comparatively,a combination of low instantaneous frequency(15-30 Hz),moderate to high impedance(7000-9500 gm/cc*m/s),low neutron porosity(27%-40%)and low volume of clay(40%-60%),suggests fair-to-good sandstone development in the Dawson Canyon Formation.After calibration with the welllog data,it is found that further lowering in these attribute responses signifies the clean sandstone facies possibly containing hydrocarbons.The present study suggests that the shale lithofacies dominates the Late Cretaceous deposition(Dawson Canyon Formation)in the Penobscot field,Scotian Basin.Major faults and overlying shale facies provide structural and stratigraphic seals and act as a suitable hydrocarbon entrapment mechanism in the Dawson Canyon Formation's reservoirs.The present research advocates the integrated analysis of multi-attributes estimated using different methods to minimize the risk involved in hydrocarbon exploration. 展开更多
关键词 Reservoir characterization model-based inversion Multilayer perceptron(MLP) IMPEDANCE Petrophysical properties Scotian Basin
下载PDF
Model-Based Systems Engineering Approach to Design a Human Settlement to Better Serve Displaced People
2
作者 Anicet Adjahossou 《Open Journal of Applied Sciences》 2024年第4期865-880,共16页
The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficultie... The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficulties in providing social services that meet the required standards, and the prolongation of emergencies. Despite this challenging context, short-term considerations continue to guide their planning and management rather than more integrated, longer-term perspectives, thus preventing viable, sustainable development. Over the years, the design of humanitarian settlements has not been adapted to local contexts and perspectives, nor to the dynamics of urbanization and population growth and data. In addition, the current approach to temporary settlement harms the environment and can strain limited resources. Inefficient land use and ad hoc development models have compounded difficulties and generated new challenges. As a result, living conditions in settlements have deteriorated over the last few decades and continue to pose new challenges. The stakes are such that major shortcomings have emerged along the way, leading to disruption, budget overruns in a context marked by a steady decline in funding. However, some attempts have been made to shift towards more sustainable approaches, but these have mainly focused on vague, sector-oriented themes, failing to consider systematic and integration views. This study is a contribution in addressing these shortcomings by designing a model-driving solution, emphasizing an integrated system conceptualized as a system of systems. This paper proposes a new methodology for designing an integrated and sustainable human settlement model, based on Model-Based Systems Engineering and a Systems Modeling Language to provide valuable insights toward sustainable solutions for displaced populations aligning with the United Nations 2030 agenda for sustainable development. 展开更多
关键词 Humanitarian Settlement Human Settlement Sustainability Systems Engineering model-based Systems Engineering Systems Modeling Language
下载PDF
Formal management-specifying approach for model-based safety assessment
3
作者 XU Changyi DUAN Yiman ZHANG Chao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第6期1589-1601,共13页
In the field of model-based system assessment,mathematical models are used to interpret the system behaviors.However,the industrial systems in this intelligent era will be more manageable.Various management operations... In the field of model-based system assessment,mathematical models are used to interpret the system behaviors.However,the industrial systems in this intelligent era will be more manageable.Various management operations will be dynamically set,and the system will be no longer static as it is initially designed.Thus,the static model generated by the traditional model-based safety assessment(MBSA)approach cannot be used to accurately assess the dependability.There mainly exists three problems.Complex:huge and complex behaviors make the modeling to be trivial manual;Dynamic:though there are thousands of states and transitions,the previous model must be resubmitted to assess whenever new management arrives;Unreusable:as for different systems,the model must be resubmitted by reconsidering both the management and the system itself at the same time though the management is the same.Motivated by solving the above problems,this research studies a formal management specifying approach with the advantages of agility modeling,dynamic modeling,and specification design that can be re-suable.Finally,three typical managements are specified in a series-parallel system as a demonstration to show the potential. 展开更多
关键词 model-based safety assessment(MBSA) MANAGEMENT AVAILABILITY RELIABILITY MAINTAINABILITY continuous time Markov chain.
下载PDF
A Linked List Encryption Scheme for Image Steganography without Embedding
4
作者 Pengbiao Zhao Qi Zhong +3 位作者 Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期331-352,共22页
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks. 展开更多
关键词 steganography ENCRYPTION steganography without embedding coverless steganography
下载PDF
A Review on the Recent Trends of Image Steganography for VANET Applications
5
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 steganography image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(VANET) transportation system
下载PDF
An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization
6
作者 Zinah Khalid Jasim Jasim Sefer Kurnaz 《Computers, Materials & Continua》 SCIE EI 2024年第9期4643-4662,共20页
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,shoul... This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect.The contemporary methods of steganography are at best a compromise between these two.In this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic embedding.The approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret data.This approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale images.The ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual quality.Pheromone evaporation is introduced through iterations to avoid stagnation in solution refinement.The levels of pheromone are modified to reinforce successful pixel choices.Experimental results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of 0.98.The approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness. 展开更多
关键词 steganography STEGANALYSIS capacity optimization ant colony algorithm
下载PDF
Randomization Strategies in Image Steganography Techniques:A Review
7
作者 AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan 《Computers, Materials & Continua》 SCIE EI 2024年第8期3139-3171,共33页
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ... Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography. 展开更多
关键词 Information hiding image steganography randomized embedding techniques payload capacity IMPERCEPTIBILITY
下载PDF
Image Steganography by Pixel-Value Differencing Using General Quantization Ranges
8
作者 Da-Chun Wu Zong-Nan Shih 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期353-383,共31页
A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a ... A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a range table with range widths not limited to powers of 2,extending PVD-based methods to enhance their flexibility and data-embedding rates without changing their capabilities to resist security attacks.Specifically,the conventional PVD technique partitions a grayscale image into 1×2 non-overlapping blocks.The entire range[0,255]of all possible absolute values of the pixel pairs’grayscale differences in the blocks is divided into multiple quantization ranges.The width of each quantization range is a power of two to facilitate the direct embedding of the bit information with high embedding rates.Without using power-of-two range widths,the embedding rates can drop using conventional embedding techniques.In contrast,the proposed method uses general quantization range widths,and a multiple-based number conversion mechanism is employed skillfully to implement the use of nonpower-of-two range widths,with each pixel pair being employed to embed a digit in the multiple-based number.All the message bits are converted into a big multiple-based number whose digits can be embedded into the pixel pairs with a higher embedding rate.Good experimental results showed the feasibility of the proposed method and its resistance to security attacks.In addition,implementation examples are provided,where the proposed method adopts non-power-of-two range widths and employsmultiple-based number conversion to expand the data-hiding and steganalysis-resisting capabilities of other PVD methods. 展开更多
关键词 steganography pixel-value differencing multiple-based number conversion general quantization range
下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm
9
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
下载PDF
Elevating Image Steganography:A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities
10
作者 Muhammad Zaman Ali Omer Riaz +3 位作者 Hafiz Muhammad Hasnain Waqas Sharif Tenvir Ali Gyu Sang Choi 《Computers, Materials & Continua》 SCIE EI 2024年第5期2923-2943,共21页
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encr... In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure communications.Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution.In this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)substitution.The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three bits.The proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment capacity.The achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 dB.These findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity. 展开更多
关键词 steganography most significant bit(MSB) least significant bit(LSB) peak signal-to-noise ratio(PSNR)
下载PDF
A Novel LSB Steganography Technique for Enhancing Cloud Security
11
作者 Ahsan Ullah Md. Inzamul Haque +2 位作者 Md. Mokarom Hossain Md. Sadman Ahammad Mst. Nishita Aktar 《Journal of Information Security》 2024年第3期355-377,共23页
Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganogra... Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganography method for encrypting sound utilizing LSB-based computation. By using the least significant bit (LSB) of a byte to represent a message and then substituting each LSB bit with a binary message and encrypting a significant quantity of data. The proposed system uses the LSB technique of picture steganography, Multi-Level Encryption Algorithm (MLEA) and Two-Level Encryption Algorithm (TLEA) data encryption to give the highest level of cloud security. Compared to other current schemes, the performance of the suggested method is 1.732125% better on average. 展开更多
关键词 steganography LSB Cloud Computing SECURITY CRYPTOGRAPHY TLEA MLEA
下载PDF
Model-Based Degree Estimation of Unbalance and Misalignment in Flexible Coupling-rotor System 被引量:5
12
作者 LI Changyou XU Minqiang +2 位作者 GUO Song WANG Yuewu WANG Rixin 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2009年第4期550-556,共7页
The condition of rotor system must be assessed in order to develop condition-based maintenance for rotating machinery. It is determined by multiple variables such as unbalance degree, misalignment degree, the amount o... The condition of rotor system must be assessed in order to develop condition-based maintenance for rotating machinery. It is determined by multiple variables such as unbalance degree, misalignment degree, the amount of bending deformation of the shaft, occurrence of shaft crack of rotor system and so on. The estimation of the degrees of unbalance and misalignment in flexible coupling-rotor system is discussed. The model-based approach is employed to solve this problem. The models of the equivalent external loads for unbalance and misalignment are derived and analyzed. Then, the degrees of unbalance and misalignment are estimated by analyzing the components of the equivalent external loads of which the frequencies are equal to the 1 and 2 times running frequency respectively. The equivalent external loads are calculated according to the dynamic equation of the original rotor system and the differences between the dynamical responses in normal case and the vibrations when the degree of unbalance or misalignment or both changes. The denoise method based on bandpass filter is used to decrease the effect of noise on the estimation accuracy. The numerical examples are given to show that the proposed approach can estimate the degrees of unbalance and misalignment of the flexible coupling-rotor system accurately. 展开更多
关键词 model-based approach degree estimation MISALIGNMENT UNBALANCE rotor system flexible coupling
下载PDF
Use of models in large-area forest surveys: comparing model-assisted, model-based and hybrid estimation 被引量:7
13
作者 Goran Stahl Svetlana Saarela +8 位作者 Sebastian Schnell Soren Holm Johannes Breidenbach Sean P. Healey Paul L. Patterson Steen Magnussen Erik Naesset Ronald E. McRoberts Timothy G. Gregoire 《Forest Ecosystems》 SCIE CSCD 2016年第2期153-163,共11页
This paper focuses on the use of models for increasing the precision of estimators in large-area forest surveys. It is motivated by the increasing availability of remotely sensed data, which facilitates the developmen... This paper focuses on the use of models for increasing the precision of estimators in large-area forest surveys. It is motivated by the increasing availability of remotely sensed data, which facilitates the development of models predicting the variables of interest in forest surveys. We present, review and compare three different estimation frameworks where models play a core role: model-assisted, model-based, and hybrid estimation. The first two are well known, whereas the third has only recently been introduced in forest surveys. Hybrid inference mixes design- based and model-based inference, since it relies on a probability sample of auxiliary data and a model predicting the target variable from the auxiliary data.We review studies on large-area forest surveys based on model-assisted, model- based, and hybrid estimation, and discuss advantages and disadvantages of the approaches. We conclude that no general recommendations can be made about whether model-assisted, model-based, or hybrid estimation should be preferred. The choice depends on the objective of the survey and the possibilities to acquire appropriate field and remotely sensed data. We also conclude that modelling approaches can only be successfully applied for estimating target variables such as growing stock volume or biomass, which are adequately related to commonly available remotely sensed data, and thus purely field based surveys remain important for several important forest parameters. 展开更多
关键词 Design-based inference Model-assisted estimation model-based inference Hybrid inference Nationalforest inventory Remote sensing Sampling
下载PDF
Experts' Knowledge Fusion in Model-Based Diagnosis Based on Bayes Networks 被引量:5
14
作者 Deng Yong & Shi Wenkang School of Electronics & Information Technology, Shanghai Jiaotong University, Shanghai 200030, P. R. China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2003年第2期25-30,共6页
In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty ... In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty or not usually influences our knowledge about other components. Some experts may draw such a conclusion that 'if component m 1 is faulty, then component m 2 may be faulty too'. How can we use this experts' knowledge to aid the diagnosis? Based on Kohlas's probabilistic assumption-based reasoning method, we use Bayes networks to solve this problem. We calculate the posterior fault probability of the components in the observation state. The result is reasonable and reflects the effectiveness of the experts' knowledge. 展开更多
关键词 model-based diagnosis Experts' knowledge Probabilistic assumption-based reasoning Bayes networks.
下载PDF
Feedback Scheduling of Model-based Networked Control Systems with Flexible Workload 被引量:4
15
作者 Xian-Ming Tang Jin-Shou Yu 《International Journal of Automation and computing》 EI 2008年第4期389-394,共6页
In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted a... In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted according to the real-time network congestion situation.State observer is used under the situation where the state of the controlled plant could not be acquired.The stability criterion of the proposed structure is proved with time-varying state update time.On the basis of the stability of the novel system structure,the compromise between the control performance and the network utilization is realized by using feedback scheduler. Examples are provided to show the advantage of the proposed control structure. 展开更多
关键词 model-based networked control system state update time stability criterion feedback scheduling.
下载PDF
Optimized model-based control of main mine ventilation air flows with minimized energy consumption 被引量:5
16
作者 S.Sjostrom E.Klintenas +1 位作者 P.Johansson J.Nyqvist 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2020年第4期533-539,共7页
In early 2018,the Boliden Garpenberg operation implemented an optimized control strategy as an addition to the existing ventilation on demand system.The purpose of the strategy is to further minimize energy use for ma... In early 2018,the Boliden Garpenberg operation implemented an optimized control strategy as an addition to the existing ventilation on demand system.The purpose of the strategy is to further minimize energy use for main and booster fans,whilst also fulfilling airflow setpoints without violating constraints such as min/max differential pressure over fans and interaction of air between areas in mines.Using air flow measurements and a dynamical model of the ventilation system,a mine-wide coordination control of fans can be carried out.The numerical model is data driven and derived from historical operational data or step changes experiments.This makes both initial deployment and lifetime model maintenance,as the mine evolves,a comparably easy operation.The control has been proven to operate in a stable manner over long periods without having to re-calibrate the model.Results prove a 40%decrease in energy use for the fans involved and a greater controllability of air flow.Moreover,a 15%decrease of the total air flow into the mine will give additional proportional heating savings during winter periods.All in all,the multivariable controller shows a correlation between production in the mine and the ventilation system performance superior to all of its predecessors. 展开更多
关键词 Mine ventilation Ventilation on demand Optimized model-based control Minimized energy consumption Advanced process control
下载PDF
Model-based design method of two-axis four-actuator fast steering mirror system 被引量:2
17
作者 黑沫 张连超 +2 位作者 周擎坤 鲁亚飞 范大鹏 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第1期150-158,共9页
This work was focused on the model-based design method of two-axis four-actuator(TAFA) fast steering mirror system(FSM), in order to improve the design efficiency. The structure and operation principle commonality of ... This work was focused on the model-based design method of two-axis four-actuator(TAFA) fast steering mirror system(FSM), in order to improve the design efficiency. The structure and operation principle commonality of normal TAFA FSM were investigated. Based on the structure and the commonality, the conditions of single-axis idea, high-frequency resonance and coupling were modeled gradually. Combining these models, a holonomic system model was established to reflect and predict the performance of TAFA FSM. A model-based design method was proposed based on the holonomic system model. The design flow and design concept of the method were described. In accordance with the method, a TAFA FSM was designed. Simulations and experiments of the FSM were done, and the results of them were compared. The compared results indicate that the holonomic system model can well reflect and predict the performance of TAFA FSM. The bandwidth of TAFA FSM is more than 250 Hz; adjust time is less than 15 ms;overshoot is less than 8%; position accuracy is better than 10 μrad; the FSM prototype can satisfy the requirements. 展开更多
关键词 fast steering mirror system model-based design dynamic modeling
下载PDF
On the model-based networked control for singularly perturbed systems 被引量:1
18
作者 Hongwang YU Zhiming WANG Yufan ZHENG 《控制理论与应用(英文版)》 EI 2008年第2期153-162,共10页
In this paper, the control of a two-time-scale plant, where the sensor is connected to a linear controller/ actuator via a network is addressed. The slow and fast systems of singularly perturbed systems are used to pr... In this paper, the control of a two-time-scale plant, where the sensor is connected to a linear controller/ actuator via a network is addressed. The slow and fast systems of singularly perturbed systems are used to produce an estimate of the plant state behavior between transmission times, by which one can reduce the usage of the network. The approximate solutions of the whole systems are derived and it is shown that the whole systems via the network control are generally asymptotically stable as long as their slow and fast systems are both stable. These results are also extended to the case of network delay. 展开更多
关键词 model-based networked control systems Singularly perturbed control systems Asymptotically stable Globally practical stability
下载PDF
Improved Video Steganography with Dual Cover Medium,DNA and Complex Frames 被引量:2
19
作者 Asma Sajjad Humaira Ashraf +3 位作者 NZ Jhanjhi Mamoona Humayun Mehedi Masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2023年第2期3881-3898,共18页
The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive... The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive information securely,researchers are combining robust cryptography and steganographic approaches.The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid(DNA)for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility.In the previous approach,DNA was used only for frame selection.If this DNA is compromised,then our frames with the hidden and unencrypted data will be exposed.Moreover the frame selected in this way were random frames,and no consideration was made to the contents of frames.Hiding data in this way introduces visible artifacts in video.In the proposed approach rather than using DNA for frame selection we have created a fakeDNA out of our data and then embedded it in a video file on intelligently selected frames called the complex frames.Using chaotic maps and linear congruential generators,a unique pixel set is selected each time only from the identified complex frames,and encrypted data is embedded in these random locations.Experimental results demonstrate that the proposed technique shows minimum degradation of the stenographic video hence reducing the very first chances of visual surveillance.Further,the selection of complex frames for embedding and creation of a fake DNA as proposed in this research have higher peak signal-to-noise ratio(PSNR)and reduced mean squared error(MSE)values that indicate improved results.The proposed methodology has been implemented in Matlab. 展开更多
关键词 Video steganography data encryption DNA embedding frame selection
下载PDF
Model-based predictive controller design for a class of nonlinear networked systems with communication delays and data loss
20
作者 安宝冉 刘国平 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期211-216,共6页
This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems,... This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme. 展开更多
关键词 communication delays data loss model-based networked predictive control
下载PDF
上一页 1 2 59 下一页 到第
使用帮助 返回顶部