期刊文献+
共找到14,976篇文章
< 1 2 250 >
每页显示 20 50 100
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
1
作者 Aodi Liu Na Wang +3 位作者 Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第4期1705-1726,共22页
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources. 展开更多
关键词 Big data access control data security BiLSTM
下载PDF
Data Driven Vibration Control:A Review
2
作者 Weiyi Yang Shuai Li Xin Luo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1898-1917,共20页
With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests... With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests from both the industrial and academic communities.Input shaping(IS),as a simple and effective feedforward method,is greatly demanded in DDVC methods.It convolves the desired input command with impulse sequence without requiring parametric dynamics and the closed-loop system structure,thereby suppressing the residual vibration separately.Based on a thorough investigation into the state-of-the-art DDVC methods,this survey has made the following efforts:1)Introducing the IS theory and typical input shapers;2)Categorizing recent progress of DDVC methods;3)Summarizing commonly adopted metrics for DDVC;and 4)Discussing the engineering applications and future trends of DDVC.By doing so,this study provides a systematic and comprehensive overview of existing DDVC methods from designing to optimizing perspectives,aiming at promoting future research regarding this emerging and vital issue. 展开更多
关键词 data driven vibration control(DDVC) data science designing method feedforward control industrial robot input shaping optimizing method residual vibration
下载PDF
Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
3
作者 Youngho Park Su Jin Shin Sang Uk Shin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期671-688,共18页
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly... Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies. 展开更多
关键词 Bilateral access control blockchain data sharing policy-match
下载PDF
Analysis of the Impact of Big Data Technology on Environmental Pollution Control Audit
4
作者 Xianrui Yang Jinyu Liu 《Proceedings of Business and Economic Studies》 2024年第3期22-27,共6页
As China strives towards the second centenary goal,increasing attention is being paid to environmental pollution and other related issues.Concurrently,with the rapid development of big data technology,many big data so... As China strives towards the second centenary goal,increasing attention is being paid to environmental pollution and other related issues.Concurrently,with the rapid development of big data technology,many big data solutions have been applied to environmental pollution control audits,exerting a significant impact.This paper presents the current situation of environmental pollution audits,summarizing the application of big data from the perspectives of both domestic and international research.In terms of data collection and data analysis for environmental pollution audits,cloud platform technology,and visualization technology are selected based on multiple data sources.The impact in the field of environmental pollution control audits is further analyzed.It is found that the environmental pollution audit cloud platform is not yet perfect,the technical skills of audit personnel are insufficient,and some technologies are not mature.Relevant suggestions are put forward to provide a reference for the future development of big data technology and its integration with environmental pollution control audits. 展开更多
关键词 Big data technology Environmental pollution control AUDIT
下载PDF
Kinematic Control of Serial Manipulators Under False Data Injection Attack 被引量:2
5
作者 Yinyan Zhang Shuai Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期1009-1019,共11页
With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits ... With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations. 展开更多
关键词 Cyber-physical systems false data injection attack MANIPULATORS remote kinematic control
下载PDF
Deployment Strategy for Multiple Controllers Based on the Aviation On-Board Software-Defined Data Link Network
6
作者 Yuting Zhu Yanfang Fu +3 位作者 Yang Ce Pan Deng Jianpeng Zhu Huankun Su 《Computers, Materials & Continua》 SCIE EI 2023年第12期3867-3894,共28页
In light of the escalating demand and intricacy of services in contemporary terrestrial,maritime,and aerial combat operations,there is a compelling need for enhanced service quality and efficiency in airborne cluster ... In light of the escalating demand and intricacy of services in contemporary terrestrial,maritime,and aerial combat operations,there is a compelling need for enhanced service quality and efficiency in airborne cluster communication networks.Software-Defined Networking(SDN)proffers a viable solution for the multifaceted task of cooperative communication transmission and management across different operational domains within complex combat contexts,due to its intrinsic ability to flexibly allocate and centrally administer network resources.This study pivots around the optimization of SDN controller deployment within airborne data link clusters.A collaborative multi-controller architecture predicated on airborne data link clusters is thus proposed.Within this architectural framework,the controller deployment issue is reframed as a two-fold problem:subdomain partition-ing and central interaction node selection.We advocate a subdomain segmentation approach grounded in node value ranking(NDVR)and a central interaction node selection methodology predicated on an enhanced Artificial Fish Swarm Algorithm(AFSA).The advanced NDVR-AFSA(Node value ranking-Improved artificial fish swarm algorithm)algorithm makes use of a chaos algorithm for population initialization,boosting population diversity and circumventing premature algorithm convergence.By the integration of adaptive strategies and incorporation of the genetic algorithm’s crossover and mutation operations,the algorithm’s search range adaptability is enhanced,thereby increasing the possibility of obtaining globally optimal solutions,while concurrently augmenting cluster reliability.The simulation results verify the advantages of the NDVR-IAFSA algorithm,achieve a better load balancing effect,improve the reliability of aviation data link cluster,and significantly reduce the average propagation delay and disconnection rate,respectively,by 12.8%and 11.7%.This shows that the optimization scheme has important significance in practical application,and can meet the high requirements of modern sea,land,and air operations to aviation airborne communication networks. 展开更多
关键词 Aviation cluster software defined network controller deployment Airborne network data link
下载PDF
Congestion Control Using In-Network Telemetry for Lossless Datacenters
7
作者 Jin Wang Dongzhi Yuan +3 位作者 Wangqing Luo Shuying Rao R.Simon Sherratt Jinbin Hu 《Computers, Materials & Continua》 SCIE EI 2023年第4期1195-1212,共18页
In the Ethernet lossless Data Center Networks (DCNs) deployedwith Priority-based Flow Control (PFC), the head-of-line blocking problemis still difficult to prevent due to PFC triggering under burst trafficscenarios ev... In the Ethernet lossless Data Center Networks (DCNs) deployedwith Priority-based Flow Control (PFC), the head-of-line blocking problemis still difficult to prevent due to PFC triggering under burst trafficscenarios even with the existing congestion control solutions. To addressthe head-of-line blocking problem of PFC, we propose a new congestioncontrol mechanism. The key point of Congestion Control Using In-NetworkTelemetry for Lossless Datacenters (ICC) is to use In-Network Telemetry(INT) technology to obtain comprehensive congestion information, which isthen fed back to the sender to adjust the sending rate timely and accurately.It is possible to control congestion in time, converge to the target rate quickly,and maintain a near-zero queue length at the switch when using ICC. Weconducted Network Simulator-3 (NS-3) simulation experiments to test theICC’s performance. When compared to Congestion Control for Large-ScaleRDMA Deployments (DCQCN), TIMELY: RTT-based Congestion Controlfor the Datacenter (TIMELY), and Re-architecting Congestion Managementin Lossless Ethernet (PCN), ICC effectively reduces PFC pause messages andFlow Completion Time (FCT) by 47%, 56%, 34%, and 15.3×, 14.8×, and11.2×, respectively. 展开更多
关键词 data center lossless networks congestion control head of line blocking in-network telemetry
下载PDF
Blockchain-Enabled Privacy Protection and Access Control Scheme Towards Sensitive Digital Assets Management
8
作者 Duan Pengfei Ma Zhaofeng +2 位作者 Zhang Yuqing Wang Jingyu Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期224-236,共13页
With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,howeve... With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability. 展开更多
关键词 access control data trading MAABE multi-channel privacy preserving
下载PDF
The Construction and Implementation Path of the Audit System for Quality Control in the Big Data Era
9
作者 Wenjun Zou 《Proceedings of Business and Economic Studies》 2023年第6期111-115,共5页
In the era of big data,the construction and implementation of a quality control audit system are particularly crucial.This article delves into the impact of big data technology on quality control auditing,establishes ... In the era of big data,the construction and implementation of a quality control audit system are particularly crucial.This article delves into the impact of big data technology on quality control auditing,establishes a quality control auditing system in the big data era,and elucidates the pathway to realizing this system.Through the application of big data technology to quality control audits,there is an enhancement in audit efficiency,the attainment of more accurate risk assessment,and the provision of robust support for the sustainable development of enterprises. 展开更多
关键词 Big data Quality control Audit system
下载PDF
Research on Influencing Factors and Countermeasures of Risk Control of State-Owned Enterprises under the Background of Big Data
10
作者 Fengyan Wang Ziyu Hou +1 位作者 Ronaldo Juanatas Jasmin Niguidula 《Proceedings of Business and Economic Studies》 2023年第6期128-133,共6页
This study explores the risk control and response strategies of state-owned enterprises in the context of big data.Global economic uncertainty poses new challenges to state-owned enterprises,necessitating innovative r... This study explores the risk control and response strategies of state-owned enterprises in the context of big data.Global economic uncertainty poses new challenges to state-owned enterprises,necessitating innovative risk management approaches.This article proposes response strategies from four key aspects:establishing a proactive risk management culture,building a foundation in technology and data,conducting big data-driven risk analysis,and implementing predictive analysis and real-time monitoring.State-owned enterprises can foster a proactive risk management culture by cultivating employee risk awareness,demonstrating leadership,and establishing transparency and open communication.Additionally,data integration and analysis,leveraging the latest technology,are crucial factors that can help companies better identify risks and opportunities. 展开更多
关键词 State-owned enterprises Risk management Big data Risk control
下载PDF
A call for enhanced data-driven insights into wind energy flow physics
11
作者 Coleman Moss Romit Maulik Giacomo Valerio Iungo 《Theoretical & Applied Mechanics Letters》 CAS CSCD 2024年第1期6-10,共5页
With the increased availability of experimental measurements aiming at probing wind resources and wind turbine operations,machine learning(ML)models are poised to advance our understanding of the physics underpinning ... With the increased availability of experimental measurements aiming at probing wind resources and wind turbine operations,machine learning(ML)models are poised to advance our understanding of the physics underpinning the interaction between the atmospheric boundary layer and wind turbine arrays,the generated wakes and their interactions,and wind energy harvesting.However,the majority of the existing ML models for predicting wind turbine wakes merely recreate Computational fluid dynamics(CFD)simulated data with analogous accuracy but reduced computational costs,thus providing surrogate models rather than enhanced data-enabled physics insights.Although ML-based surrogate models are useful to overcome current limitations associated with the high computational costs of CFD models,using ML to unveil processes from experimental data or enhance modeling capabilities is deemed a potential research direction to pursue.In this letter,we discuss recent achievements in the realm of ML modeling of wind turbine wakes and operations,along with new promising research strategies. 展开更多
关键词 Machine learning WAKE Wind turbine Wind farm Supervisory control and data acquisition
下载PDF
Enhancing Patients Outcomes and Infection Control through Smart Indoor Air Quality Monitoring Systems
12
作者 Othniel Ojochonu Abalaka Joe Essien +1 位作者 Calistus Chimezie Martin Ogharandukun 《Journal of Computer and Communications》 2024年第6期25-37,共13页
Air pollution poses a critical threat to public health and environmental sustainability globally, and Nigeria is no exception. Despite significant economic growth and urban development, Nigeria faces substantial air q... Air pollution poses a critical threat to public health and environmental sustainability globally, and Nigeria is no exception. Despite significant economic growth and urban development, Nigeria faces substantial air quality challenges, particularly in urban centers. While outdoor air pollution has received considerable attention, the issue of indoor air quality remains underexplored yet equally critical. This study aims to develop a reliable, cost-effective, and user-friendly solution for continuous monitoring and reporting of indoor air quality, accessible from anywhere via a web interface. Addressing the urgent need for effective indoor air quality monitoring in urban hospitals, the research focuses on designing and implementing a smart indoor air quality monitoring system using Arduino technology. Employing an Arduino Uno, ESP8266 Wi-Fi module, and MQ135 gas sensor, the system collects real-time air quality data, transmits it to the ThingSpeak cloud platform, and visualizes it through a user-friendly web interface. This project offers a cost-effective, portable, and reliable solution for monitoring indoor air quality, aiming to mitigate health risks and promote a healthier living environment. 展开更多
关键词 Artificial Intelligence Air Pollution Infection control data Transmission data Acquisition SENSORS
下载PDF
基于ControlVAE的约束嵌入稠密时变阵列构建
13
作者 孙文力 原达 姜新波 《电子学报》 EI CAS CSCD 北大核心 2024年第1期354-363,共10页
在对探地雷达(Ground Penetrating Radar,GPR)数据进行三维建模与可视化分析过程中,其所依赖的三维时变阵列通常是由一维数据道或二维阵列间接生成的.由于采集到的数据往往比较稀疏,且存在不规则偏移,需要进行稠密处理,以获得高密度三... 在对探地雷达(Ground Penetrating Radar,GPR)数据进行三维建模与可视化分析过程中,其所依赖的三维时变阵列通常是由一维数据道或二维阵列间接生成的.由于采集到的数据往往比较稀疏,且存在不规则偏移,需要进行稠密处理,以获得高密度三维时变阵列.本文提出了一种基于可控变分自编码(Controllable Variational AutoEncoder,ControlVAE)的约束嵌入稠密时变阵列构建方法 .使用基于ControlVAE的时变数据重构网络,通过隐空间采样插值和深浅层特征信息的融合,生成接近真实分布的伪道数据来增加阵列密度.构建了基于尺度不变特征变换的数据配准模块,提取道间梯度特征与结构对称性特征,可以在时空域内完成数据配准.同时将浅层特征作为约束信息嵌入数据重构网络,以消除数据道偏移对阵列生成的影响.实验结果表明,本文方法仅使用单测线二维B-scan数据集即可重建稠密时变阵列,可以有效降低重构模型累积误差,提高面对复杂真实数据时的鲁棒性. 展开更多
关键词 时变阵列 数据生成 探地雷达 约束嵌入 可控变分自编码模型
下载PDF
Data-Driven Model Identification and Control of the Inertial Systems
14
作者 Irina Cojuhari 《Intelligent Control and Automation》 2023年第1期1-18,共18页
In the synthesis of the control algorithm for complex systems, we are often faced with imprecise or unknown mathematical models of the dynamical systems, or even with problems in finding a mathematical model of the sy... In the synthesis of the control algorithm for complex systems, we are often faced with imprecise or unknown mathematical models of the dynamical systems, or even with problems in finding a mathematical model of the system in the open loop. To tackle these difficulties, an approach of data-driven model identification and control algorithm design based on the maximum stability degree criterion is proposed in this paper. The data-driven model identification procedure supposes the finding of the mathematical model of the system based on the undamped transient response of the closed-loop system. The system is approximated with the inertial model, where the coefficients are calculated based on the values of the critical transfer coefficient, oscillation amplitude and period of the underdamped response of the closed-loop system. The data driven control design supposes that the tuning parameters of the controller are calculated based on the parameters obtained from the previous step of system identification and there are presented the expressions for the calculation of the tuning parameters. The obtained results of data-driven model identification and algorithm for synthesis the controller were verified by computer simulation. 展开更多
关键词 data-Driven Model Identification controller Tuning Undamped Transient Response Closed-Loop System Identification PID controller
下载PDF
Stability of Iterative Learning Control with Data Dropouts via Asynchronous Dynamical System 被引量:18
15
作者 Xu-Hui Bu Zhong-Sheng Hou 《International Journal of Automation and computing》 EI 2011年第1期29-36,共8页
In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchr... In this paper, the stability of iterative learning control with data dropouts is discussed. By the super vector formulation, an iterative learning control (ILC) system with data dropouts can be modeled as an asynchronous dynamical system with rate constraints on events in the iteration domain. The stability condition is provided in the form of linear matrix inequalities (LMIS) depending on the stability of asynchronous dynamical systems. The analysis is supported by simulations. 展开更多
关键词 Iterative learning control (ILC) networked control systems (NCSs) data dropouts asynchronous dynamical system robustness.
下载PDF
Quality control of marine big data——a case study of real-time observation station data in Qingdao 被引量:6
16
作者 QIAN Chengcheng LIU Aichao +4 位作者 HUANG Rui LIU Qingrong XU Wenkun ZHONG Shan YU Le 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2019年第6期1983-1993,共11页
Offshore waters provide resources for human beings,while on the other hand,threaten them because of marine disasters.Ocean stations are part of offshore observation networks,and the quality of their data is of great s... Offshore waters provide resources for human beings,while on the other hand,threaten them because of marine disasters.Ocean stations are part of offshore observation networks,and the quality of their data is of great significance for exploiting and protecting the ocean.We used hourly mean wave height,temperature,and pressure real-time observation data taken in the Xiaomaidao station(in Qingdao,China)from June 1,2017,to May 31,2018,to explore the data quality using eight quality control methods,and to discriminate the most effective method for Xiaomaidao station.After using the eight quality control methods,the percentages of the mean wave height,temperature,and pressure data that passed the tests were 89.6%,88.3%,and 98.6%,respectively.With the marine disaster(wave alarm report)data,the values failed in the test mainly due to the influence of aging observation equipment and missing data transmissions.The mean wave height is often affected by dynamic marine disasters,so the continuity test method is not effective.The correlation test with other related parameters would be more useful for the mean wave height. 展开更多
关键词 quality control REAL-TIME STATION data MARINE BIG data Xiaomaidao STATION MARINE DISASTER
下载PDF
Evaluation of Two Momentum Control Variable Schemes and Their Impact on the Variational Assimilation of Radar Wind Data:Case Study of a Squall Line 被引量:10
17
作者 Xin LI Mingjian ZENG +3 位作者 Yuan WANG Wenlan WANG Haiying WU Haixia MEI 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2016年第10期1143-1157,共15页
Different choices of control variables in variational assimilation can bring about different influences on the analyzed atmospheric state. Based on the WRF model's three-dimensional variational assimilation system, t... Different choices of control variables in variational assimilation can bring about different influences on the analyzed atmospheric state. Based on the WRF model's three-dimensional variational assimilation system, this study compares the be- havior of two momentum control variable options-streamfunction velocity potential (ψ-χ) and horizontal wind components (U-V)-in radar wind data assimilation for a squall line case that occurred in Jiangsu Province on 24 August 2014. The wind increment from the single observation test shows that the ψ-χ control variable scheme produces negative increments in the neighborhood around the observation point because streamfunction and velocity potential preserve integrals of velocity. On the contrary, the U-V control variable scheme objectively reflects the information of the observation itself. Furthermore, radial velocity data from 17 Doppler radars in eastern China are assimilated. As compared to the impact of conventional observation, the assimilation of radar radial velocity based on the U-V control variable scheme significantly improves the mesoscale dynamic field in the initial condition. The enhanced low-level jet stream, water vapor convergence and low-level wind shear result in better squall line forecasting. However, the ψ-χ control variable scheme generates a discontinuous wind field and unrealistic convergence/divergence in the analyzed field, which lead to a degraded precipitation forecast. 展开更多
关键词 three-dimensional variational assimilation momentum control variable Doppler radar data squall line
下载PDF
A review of control loop monitoring and diagnosis:Prospects of controller maintenance in big data era 被引量:6
18
作者 Xinqing Gao Fan Yang +1 位作者 Chao Shang Dexian Huang 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2016年第8期952-962,共11页
Owing to wide applications of automatic control systems in the process industries, the impacts of controller performance on industrial processes are becoming increasingly significant. Consequently, controller maintena... Owing to wide applications of automatic control systems in the process industries, the impacts of controller performance on industrial processes are becoming increasingly significant. Consequently, controller maintenance is critical to guarantee routine operations of industrial processes. The workflow of controller maintenance generally involves the following steps: monitor operating controller performance and detect performance degradation, diagnose probable root causes of control system malfunctions, and take specific actions to resolve associated problems. In this article, a comprehensive overview of the mainstream of control loop monitoring and diagnosis is provided, and some existing problems are also analyzed and discussed. From the viewpoint of synthesizing abundant information in the context of big data, some prospective ideas and promising methods are outlined to potentially solve problems in industrial applications. 展开更多
关键词 control LOOP performance assessment Industrial ALARM system Process knowledge ROOT CAUSE diagnosis BIG data
下载PDF
DEVELOPMENT OF A DATA MINING METHOD FOR LAND CONTROL 被引量:3
19
作者 Wang Shuliang Wang Xinzhou Shi Wenzhong 《Geo-Spatial Information Science》 2001年第1期68-76,共9页
Land resources are facing crises of being misused,especially for an intersection area between town and country,and land control has to be enforced.This paper presents a development of data mining method for land contr... Land resources are facing crises of being misused,especially for an intersection area between town and country,and land control has to be enforced.This paper presents a development of data mining method for land control.A vector_match method for the prerequisite of data mining i.e., data cleaning is proposed,which deals with both character and numeric data via vectorizing character_string and matching number.A minimal decision algorithm of rough set is used to discover the knowledge hidden in the data warehouse.In order to monitor land use dynamically and accurately,it is suggested to set up a real_time land control system based on GPS,digital photogrammetry and online data mining.Finally,the means is applied in the intersection area between town and country of Wuhan city,and a set of knowledge about land control is discovered. 展开更多
关键词 LAND control data MINING vector-match method ROUGH SET GIS
下载PDF
Fault detection observer design for networked control system with long time-delays and data packet dropout 被引量:3
20
作者 Xuan Li Xiaobei Wu +1 位作者 Zhiliang Xu Cheng Huang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第5期877-882,共6页
Focusing on the networked control system with long time-delays and data packet dropout,the problem of observerbased fault detection of the system is studied.According to conditions of data arrival of the controller,th... Focusing on the networked control system with long time-delays and data packet dropout,the problem of observerbased fault detection of the system is studied.According to conditions of data arrival of the controller,the state observers of the system are designed to detect faults when they occur in the system.When the system is normal,the observers system is modeled as an uncertain switched system.Based on the model,stability condition of the whole system is given.When conditions are satisfied,the system is asymptotically stable.When a fault occurs,the observers residual can change rapidly to detect the fault.A numerical example shows the effectiveness of the proposed method. 展开更多
关键词 networked control system fault detection long timedelays data packet dropout.
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部