期刊文献+
共找到1,779篇文章
< 1 2 89 >
每页显示 20 50 100
Multi-objective workflow scheduling in cloud system based on cooperative multi-swarm optimization algorithm 被引量:2
1
作者 YAO Guang-shun DING Yong-sheng HAO Kuang-rong 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第5期1050-1062,共13页
In order to improve the performance of multi-objective workflow scheduling in cloud system, a multi-swarm multiobjective optimization algorithm(MSMOOA) is proposed to satisfy multiple conflicting objectives. Inspired ... In order to improve the performance of multi-objective workflow scheduling in cloud system, a multi-swarm multiobjective optimization algorithm(MSMOOA) is proposed to satisfy multiple conflicting objectives. Inspired by division of the same species into multiple swarms for different objectives and information sharing among these swarms in nature, each physical machine in the data center is considered a swarm and employs improved multi-objective particle swarm optimization to find out non-dominated solutions with one objective in MSMOOA. The particles in each swarm are divided into two classes and adopt different strategies to evolve cooperatively. One class of particles can communicate with several swarms simultaneously to promote the information sharing among swarms and the other class of particles can only exchange information with the particles located in the same swarm. Furthermore, in order to avoid the influence by the elastic available resources, a manager server is adopted in the cloud data center to collect the available resources for scheduling. The quality of the proposed method with other related approaches is evaluated by using hybrid and parallel workflow applications. The experiment results highlight the better performance of the MSMOOA than that of compared algorithms. 展开更多
关键词 MULTI-OBJECTIVE WORKFLOW scheduling multi-swarm OPTIMIZATION particle SWARM OPTIMIZATION (PSO) cloud computing system
在线阅读 下载PDF
Server load prediction algorithm based on CM-MC for cloud systems 被引量:2
2
作者 XU Xiaolong ZHANG Qitong +1 位作者 MOU Yiqi LU Xinyuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第5期1069-1078,共10页
Accurate prediction of server load is important to cloud systems for improving the resource utilization, reducing the energy consumption and guaranteeing the quality of service(QoS).This paper analyzes the features of... Accurate prediction of server load is important to cloud systems for improving the resource utilization, reducing the energy consumption and guaranteeing the quality of service(QoS).This paper analyzes the features of cloud server load and the advantages and disadvantages of typical server load prediction algorithms, integrates the cloud model(CM) and the Markov chain(MC) together to realize a new CM-MC algorithm, and then proposes a new server load prediction algorithm based on CM-MC for cloud systems. The algorithm utilizes the historical data sample training method of the cloud model, and utilizes the Markov prediction theory to obtain the membership degree vector, based on which the weighted sum of the predicted values is used for the cloud model. The experiments show that the proposed prediction algorithm has higher prediction accuracy than other typical server load prediction algorithms, especially if the data has significant volatility. The proposed server load prediction algorithm based on CM-MC is suitable for cloud systems, and can help to reduce the energy consumption of cloud data centers. 展开更多
关键词 cloud computing load prediction cloud model Markov chain energy saving
在线阅读 下载PDF
Cloud edge integrated security architecture of new cloud manufacturing system 被引量:1
3
作者 ZHAO Longbo LI Bohu YUAN Haitao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1177-1189,共13页
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre... With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations. 展开更多
关键词 new cloud manufacturing system(NCMS) integrated cloud-edge-terminal security system architecture zero trust
在线阅读 下载PDF
美国CLOUD法案数据跨境执法中的安全风险与中国的应对 被引量:2
4
作者 廖明月 王佳宜 杨映雪 《图书馆论坛》 北大核心 2025年第1期128-137,共10页
数据是数字经济时代重要的国家战略资源,数据跨境流动亦是其中的重要一环。囿于犯罪活动呈现数字化和跨境化态势,数据跨境执法成为打击网络犯罪的重要手段,但基于执法目的的数据出境对数据存储国的影响重大。美国凭借“数据自由”话语... 数据是数字经济时代重要的国家战略资源,数据跨境流动亦是其中的重要一环。囿于犯罪活动呈现数字化和跨境化态势,数据跨境执法成为打击网络犯罪的重要手段,但基于执法目的的数据出境对数据存储国的影响重大。美国凭借“数据自由”话语体系通过CLOUD法案推出以“数据控制者标准”为核心的数据管辖模式,进而依托网络服务提供者实施“长臂管辖”,使得我国数据被动出境和被调取而引发的国家数据安全风险大幅提升。我国应将数据主权作为数据跨境流动的法理基础,探索控制数据安全风险的制度工具,包括基于国家主权调适“数据控制者”标准模式,完善数据跨境调取安全规则和审查机制,以阻断法限制单边数据跨境执法,对美国的相关“长臂管辖”进行有效制衡。 展开更多
关键词 数据跨境执法 安全风险 数据主权 cloud法案
在线阅读 下载PDF
An Algorithm for Cloud-based Web Service Combination Optimization Through Plant Growth Simulation
5
作者 Li Qiang Qin Huawei +1 位作者 Qiao Bingqin Wu Ruifang 《系统仿真学报》 北大核心 2025年第2期462-473,共12页
In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-base... In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-based web services and the constraints of system resources.Then,a light-induced plant growth simulation algorithm was established.The performance of the algorithm was compared through several plant types,and the best plant model was selected as the setting for the system.Experimental results show that when the number of test cloud-based web services reaches 2048,the model being 2.14 times faster than PSO,2.8 times faster than the ant colony algorithm,2.9 times faster than the bee colony algorithm,and a remarkable 8.38 times faster than the genetic algorithm. 展开更多
关键词 cloud-based service scheduling algorithm resource constraint load optimization cloud computing plant growth simulation algorithm
在线阅读 下载PDF
Control model for burning-bubble clouds formed by confined meltcast explosives under thermal stimulation
6
作者 Zhi Li Zhuoping Duan +4 位作者 Zhiling Bai Jixuan Jiao Liji Xu Liansheng Zhang Fenglei Huang 《Defence Technology(防务技术)》 2025年第6期268-283,共16页
DNAN-based insensitive melt-cast explosives have been widely utilized in insensitive munition in recent years. When constrained DNAN-based melt-cast explosives are ignited under thermal stimulation, the base explosive... DNAN-based insensitive melt-cast explosives have been widely utilized in insensitive munition in recent years. When constrained DNAN-based melt-cast explosives are ignited under thermal stimulation, the base explosive exists in a molten liquid state, where high-temperature gases expand and react in the form of bubble clouds within the liquid explosive;this process is distinctly different from the dynamic crack propagation process observed in the case of solid explosives. In this study, a control model for the reaction evolution of burning-bubble clouds was established to describe the reaction process and quantify the reaction violence of DNAN-based melt-cast explosives, considering the size distribution and activation mechanism of the burning-bubble clouds. The feasibility of the model was verified through experimental results. The results revealed that under geometrically similar conditions, with identical confinement strength and aspect ratio, larger charge structures led to extended initial gas flow and surface burning processes, resulting in greater reaction equivalence and violence at the casing fracture.Under constant charge volume and size, a stronger casing confinement accelerated self-enhanced burning, increasing the internal pressure, reaction degree, and reaction violence. Under a constant casing thickness and radius, higher aspect ratios led to a greater reaction violence at the casing fracture.Moreover, under a constant charge volume and casing thickness, higher aspect ratios resulted in a higher internal pressure, increased reaction degree, and greater reaction violence at the casing fracture. Further,larger ullage volumes extended the reaction evolution time and increased the reaction violence under constant casing dimensions. Through a matching design of the opening threshold of the pressure relief holes and the relief structure area, a stable burning reaction could be maintained until completion,thereby achieving a control of the reaction violence. The proposed model could effectively reflect the effects of the intrinsic burning rate, casing confinement strength, charge size, ullage volume, and pressure relief structure on the reaction evolution process and reaction violence, providing a theoretical method for the thermal safety design and reaction violence evaluation of melt-cast explosives. 展开更多
关键词 Melt-cast explosives Non-shock-initiated reaction Self-sustaining enhanced combustion Burning-bubble cloud model Pressure relief area Reaction violence
在线阅读 下载PDF
Link-16 anti-jamming performance evaluation based on grey relational analysis and cloud model
7
作者 NING Xiaoyan WANG Ying +1 位作者 WANG Zhenduo SUN Zhiguo 《Journal of Systems Engineering and Electronics》 2025年第1期62-72,共11页
Anti-jamming performance evaluation has recently received significant attention. For Link-16, the anti-jamming performance evaluation and selection of the optimal anti-jamming technologies are urgent problems to be so... Anti-jamming performance evaluation has recently received significant attention. For Link-16, the anti-jamming performance evaluation and selection of the optimal anti-jamming technologies are urgent problems to be solved. A comprehensive evaluation method is proposed, which combines grey relational analysis (GRA) and cloud model, to evaluate the anti-jamming performances of Link-16. Firstly, on the basis of establishing the anti-jamming performance evaluation indicator system of Link-16, the linear combination of analytic hierarchy process(AHP) and entropy weight method (EWM) are used to calculate the combined weight. Secondly, the qualitative and quantitative concept transformation model, i.e., the cloud model, is introduced to evaluate the anti-jamming abilities of Link-16 under each jamming scheme. In addition, GRA calculates the correlation degree between evaluation indicators and the anti-jamming performance of Link-16, and assesses the best anti-jamming technology. Finally, simulation results prove that the proposed evaluation model can achieve the objective of feasible and practical evaluation, which opens up a novel way for the research of anti-jamming performance evaluations of Link-16. 展开更多
关键词 LINK-16 ANTI-JAMMING grey relational analysis(GRA) cloud model combination weights
在线阅读 下载PDF
NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems 被引量:10
8
作者 XU Xiao-long ZHANG Qi-tong ZHOU Jing-lan 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第4期807-818,共12页
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untru... The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time. 展开更多
关键词 cloud storage data PRIVACY PROXY re-encryption multi-authority
在线阅读 下载PDF
Cloud model-clustering analysis based evaluation for ventilation system of underground metal mine in alpine region 被引量:6
9
作者 YAN Fang LI Zi-jun +4 位作者 DONG Long-jun HUANG Rui CAO Ri-hong GE Ji XU Kai-li 《Journal of Central South University》 SCIE EI CAS CSCD 2021年第3期796-815,共20页
Ventilation system is significant in underground metal mine of alpine region.Reasonable evaluation of ventilation effectiveness will lead to a practical improvement for the maintenance and management of ventilation sy... Ventilation system is significant in underground metal mine of alpine region.Reasonable evaluation of ventilation effectiveness will lead to a practical improvement for the maintenance and management of ventilation system.However,it is difficult to make an effective evaluation of ventilation system due to the lack of classification criteria with respect to underground metal mine in alpine region.This paper proposes a novel evaluation method called the cloud model-clustering analysis(CMCA).Cloud model(CM)is utilized to process collected data of ventilation system,and they are converted into cloud descriptors by CM.Cloud similarity(CS)based Euclidean distance(ED)is proposed to make clustering analysis of assessed samples.Then the classification of assessed samples will be identified by clustering analysis results.A case study is developed based on CMCA.Evaluation results show that ventilation effectiveness can be well classified.Moreover,CM is used alone to make comparison of evaluation results obtained by CMCA.Then the availability and validity of CMCA is verified.Meanwhile,difference of CS based ED and classical ED is analyzed.Two new clustering analysis methods are introduced to make comparison with CMCA.Then the ability of proposed CMCA to meet evaluation requirements of ventilation system is verified. 展开更多
关键词 ventilation system underground metal mine alpine region cloud model cloud similarity Euclidean distance
在线阅读 下载PDF
Predictive cruise control for heavy trucks based on slope information under cloud control system 被引量:9
10
作者 LI Shuyan WAN Keke +3 位作者 GAO Bolin LI Rui WANG Yue LI Keqiang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第4期812-826,共15页
With the advantage of fast calculation and map resources on cloud control system(CCS), cloud-based predictive cruise control(CPCC) for heavy trucks has great potential to improve energy efficiency, which is significan... With the advantage of fast calculation and map resources on cloud control system(CCS), cloud-based predictive cruise control(CPCC) for heavy trucks has great potential to improve energy efficiency, which is significant to achieve the goal of national carbon neutrality. However, most investigations focus on the on-board predictive cruise control(PCC) system,lack of research on CPCC architecture under CCS. Besides, the current PCC algorithms have the problems of a single control target and high computational complexity, which hinders the improvement of the control effect. In this paper, a layered architecture based on CCS is proposed to effectively address the realtime computing of CPCC system and the deployment of its algorithm on vehicle-cloud. In addition, based on the dynamic programming principle and the proposed road point segmentation method(RPSM), a PCC algorithm is designed to optimize the speed and gear of heavy trucks with slope information. Simulation results show that the CPCC system can adaptively control vehicle driving through the slope prediction, with fuel-saving rate of 6.17% in comparison with the constant cruise control. Also,compared with other similar algorithms, the PCC algorithm can make the engine operate more in the efficient zone by cooperatively optimizing the gear and speed. Moreover, the RPSM algorithm can reconfigure the road in advance, with a 91% roadpoint reduction rate, significantly reducing algorithm complexity.Therefore, this study has essential research significance for the economic driving of heavy trucks and the promotion of the CPCC system. 展开更多
关键词 predictive cruise control(PCC) cloud control system(CCS) layered architecture road point segmentation method(RPSM) economic driving
在线阅读 下载PDF
Design and implementation of data-driven predictive cloud control system 被引量:3
11
作者 GAO Runze XIA Yuanqing +2 位作者 DAI Li SUN Zhongqi ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第6期1258-1268,共11页
The rapid increase of the scale and the complexity of the controlled plants bring new challenges such as computing power and storage for conventional control systems.Cloud computing is concerned as a powerful solution... The rapid increase of the scale and the complexity of the controlled plants bring new challenges such as computing power and storage for conventional control systems.Cloud computing is concerned as a powerful solution to handle complex large-scale control missions by using sufficient computing resources.However,the computing ability enables more complex devices and more data to be involved and most of the data have not been fully utilized.Meanwhile,it is even impossible to obtain an accurate model of each device in the complex control systems for the model-based control algorithms.Therefore,motivated by the above reasons,we propose a data-driven predictive cloud control system.To achieve the proposed system,a practical data-driven predictive cloud control testbed is established and together a cloud-edge communication scheme is developed.Finally,the simulations and experiments demonstrate the effectiveness of the proposed system. 展开更多
关键词 cloud control system data-driven predictive control networked control system cloud computing
在线阅读 下载PDF
A semantic-centered cloud control framework for autonomous unmanned system 被引量:3
12
作者 PANG Weijian LI Hui +1 位作者 MA Xinyi ZHANG Hailin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第4期771-784,共14页
Rich semantic information in natural language increases team efficiency in human collaboration, reduces dependence on high precision data information, and improves adaptability to dynamic environment. We propose a sem... Rich semantic information in natural language increases team efficiency in human collaboration, reduces dependence on high precision data information, and improves adaptability to dynamic environment. We propose a semantic centered cloud control framework for cooperative multi-unmanned ground vehicle(UGV) system. Firstly, semantic modeling of task and environment is implemented by ontology to build a unified conceptual architecture, and secondly, a scene semantic information extraction method combining deep learning and semantic web rule language(SWRL) rules is used to realize the scene understanding and task-level cloud task cooperation. Finally, simulation results show that the framework is a feasible way to enable autonomous unmanned systems to conduct cooperative tasks. 展开更多
关键词 scene understanding cloud control ONTOLOGY autonomous cooperation
在线阅读 下载PDF
Research on UAV cloud control system based on ant colony algorithm 被引量:3
13
作者 ZHANG Lanyong ZHANG Ruixuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第4期805-811,共7页
In the cloud era, the control objects are becoming larger and the information processing is more complex, and it is difficult for traditional control systems to process massive data in a timely manner. In view of the ... In the cloud era, the control objects are becoming larger and the information processing is more complex, and it is difficult for traditional control systems to process massive data in a timely manner. In view of the difficulty of data processing in the cloud era, it is extremely important to perform massive data operations through cloud servers. Unmanned aeriel vehicle(UAV) control is the representative of the intelligent field. Based on the ant colony algorithm and incorporating the potential field method, an improved potential field ant colony algorithm is designed. To deal with the path planning problem of UAVs, the potential field ant colony algorithm shortens the optimal path distance by 6.7%, increases the algorithm running time by39.3%, and increases the maximum distance by 24.1% compared with the previous improvement. The cloud server is used to process the path problem of the UAV and feedback the calculation results in real time. Simulation experiments verify the effectiveness of the new algorithm in the cloud environment. 展开更多
关键词 ant colony algorithm potential field method cloud server path planning
在线阅读 下载PDF
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
14
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryption(ABE).
在线阅读 下载PDF
Distributed point-to-point routing method for tasks in cloud control systems 被引量:1
15
作者 WANG Guan ZHAN Yufeng +1 位作者 XIA Yuanqing YAN Liping 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第4期792-804,共13页
With the rapid development of cloud computing and control theory, a new paradigm of networked control systems called cloud control systems is proposed to meet the requirements of large-scale and complex applications. ... With the rapid development of cloud computing and control theory, a new paradigm of networked control systems called cloud control systems is proposed to meet the requirements of large-scale and complex applications. Currently, cloud control systems are mainly built by using a centralized architecture. The centralized system is overly dependent on the central control plane and has huge challenges in large-scale heterogeneous node systems. In this paper, we propose a decentralized approach to establish cloud control systems by proposing a distributed point-to-point task routing method. A considerable number of tasks in the system will not rely on the central plane and will be directly routed to the target devices through the pointto-point routing method, which improves the horizontal scalability of the cloud control system. The point-to-point routing method directly gives a unique address to every task, making inter-task communication more efficient in a complex heterogeneous and busy cloud control systems. Finally, we experimentally demonstrate that the distributed point-to-point task routing approach is compatible against the state-of-the-art central systems in large-scale task situations. 展开更多
关键词 cloud control system task routing cloud-edge-device cooperation
在线阅读 下载PDF
基于CloudSim的电力系统计算云原生模型与仿真方法 被引量:3
16
作者 陈元榉 刘媛媛 +3 位作者 张延旭 蔡煜 胡春潮 蔡泽祥 《电力自动化设备》 EI CSCD 北大核心 2024年第9期189-196,204,共9页
分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,... 分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,分析电力云任务调配时的资源供需平衡问题。建立基于微服务的电力云任务模型,分析微服务的处理时序逻辑及其层级关系并生成微服务队列。据此提出微服务的动态调配模型,采用微服务-容器映射策略与实体动态整合策略,实现微服务在实体间的动态映射。利用CloudSim进行仿真分析,结果证明所提方法可行且有效,可为电力云计算的资源配置、任务调度等提供基本的仿真工具与方法。 展开更多
关键词 电力系统 cloudSim 云原生建模 电力系统计算架构 动态调配 时序逻辑 微服务队列
在线阅读 下载PDF
Special Section on Cloud Control Systems
17
《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第4期F0003-F0003,共1页
With the emergence of Internet of Things, modern control systems have to deal with the big data from the ubiquitous information sensing devices, which is often beyond the capacity of traditional control technologies. ... With the emergence of Internet of Things, modern control systems have to deal with the big data from the ubiquitous information sensing devices, which is often beyond the capacity of traditional control technologies. To deal with this issue, the rapidly developing cloud computing may provide a perfect platform for big data storage and processing, controller design, and performance optimization. 展开更多
关键词 OPTIMIZATION COMPUTING cloud
在线阅读 下载PDF
Stochastic stabilization of Markovian jump cloud control systems based on max-plus algebra
18
作者 WANG Jin YANG Hongjiu +1 位作者 XIA Yuanqing YAN Ce 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第4期827-834,共8页
In this paper, stochastic stabilization is investigated by max-plus algebra for a Markovian jump cloud control system with a reference signal. For the Markovian jump cloud control system, there exists framework adjust... In this paper, stochastic stabilization is investigated by max-plus algebra for a Markovian jump cloud control system with a reference signal. For the Markovian jump cloud control system, there exists framework adjustment whose evolution is satisfied with a Markov chain. Using max-plus algebra, a maxplus stochastic system is used to describe the Markovian jump cloud control system. A causal feedback matrix is obtained by exponential stability analysis for a causal feedback controller of the Markovian jump cloud control system. A sufficient condition is given to ensure existence on the causal feedback matrix of the causal feedback controller. Based on the causal feedback controller, stochastic stabilization in probability is analyzed for the Markovian jump cloud control system with a reference signal.Simulation results are given to show effectiveness of the causal feedback controller for the Markovian jump cloud control system. 展开更多
关键词 Markovian jump cloud control system causal feedback controller max-plus algebra max-product algebra stochastic stabilization
在线阅读 下载PDF
Cloud control for IIoT in a cloud-edge environment 被引量:1
19
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial Internet of Things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
在线阅读 下载PDF
Study on damage mechanism and damage distribution of the rear plate under impact of debris cloud
20
作者 Chenyang Wu Xiaowei Chen Qiguang He 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第5期151-167,共17页
The debris cloud generated by the hypervelocity impact(HVI)of orbiting space debris directly threatens the spacecraft.A full understanding of the damage mechanism of rear plate is useful for the optimal design of prot... The debris cloud generated by the hypervelocity impact(HVI)of orbiting space debris directly threatens the spacecraft.A full understanding of the damage mechanism of rear plate is useful for the optimal design of protective structures.In this study,the hypervelocity yaw impact of a cylindrical aluminum projectile on a double-layer aluminum plate is simulated by the FE-SPH adaptive method,and the damage process of the rear plate under the impact of the debris cloud is analyzed based on the debris cloud structure.The damage process can be divided into the main impact stage of the debris cloud and the structural response of the rear plate.The main impact stage lasts a short time and is the basis of the rear plate damage.In the stage of structure response,the continuous deformation and inertial motion of the rear plate dominate the perforation of the rear plate.We further analyze the damage mechanism and damage distribution characteristics of the rear plate in detail.Moreover,the connection between velocity space and position space of the debris cloud is established,which promotes the general analysis of the damage law of debris cloud.Based on the relationship,the features of typical damage areas are identified by the localized fine analysis.Both the cumulative effect and structural response cause the perforation of rear plate;in the non-perforated area,cratering by the impact of hazardous fragments is the main damage mode of the rear plate. 展开更多
关键词 Damage of rear plate Debris cloud Secondary impact Hypervelocity yaw impact FE-SPH adaptive method
在线阅读 下载PDF
上一页 1 2 89 下一页 到第
使用帮助 返回顶部