In the realm of cyber security, particularly in the area of network security, IDS has recently attracted researchers’ attention since it has been considered one of the most powerful techniques incorporated to identif...
详细信息
Building Information Modeling (BIM) is the direct application of information technology in the construction industry. It has many advantages such as shared API data interfaces, high data integration, data consistency,...
详细信息
ISBN:
(数字)9781665474009
ISBN:
(纸本)9781665474009
Building Information Modeling (BIM) is the direct application of information technology in the construction industry. It has many advantages such as shared API data interfaces, high data integration, data consistency, data relevance and construction demonstration functions. It has been widely used and achieved remarkable results. In the 21st century, the development trend of Beijing city is to develop towards the sky and underground. Especially in the past ten years, with the increase of high-rise and super high-rise buildings in Beijing, and the booming development of subway construction. The underground continuous wall is a construction technology with very high use value whether it is used as the main body (or part of the main body) of the underground structure or as a waterproof and soil retaining facility during construction. However, in the Beijing area, the underground diaphragm wall (depth greater than 40 meters, width greater than or equal to 1.2 meters) due to the difficulty of the project, complex technology, and many construction problems, the relevant design and construction experience is less, and the relevant technical talents are scarce. The purpose of this article is to study the application of BIM in underground continuous walls. This article is based on the Microsoft Visual Studio 2017 development platform, based on the Visual C# programming language, using the API data interface provided by the Revit 2018 software, based on the built BIM model, for engineering quantity statistics, collision checking, drawing output, collaborative work and construction models. Wait for operations to show the application of BIM technology in the underground continuous wall. Experiments show that the use of the collision detection function of BIM technology can not only reasonably arrange pipelines, but also adjust the positions of brackets, buttresses and other components to facilitate the on-site installation of pipelines. The use of BIM technology can simulate th
The robotics industry has developed significantly in the last three decades due to the tremendous industrial development witnessed by factories and laboratories in various medical, military, service, and civil fields ...
The robotics industry has developed significantly in the last three decades due to the tremendous industrial development witnessed by factories and laboratories in various medical, military, service, and civil fields and device industries. This article reviews the most important and recent scientific studies, references, and literature that deal with controlling mobile robots with a moving arm. Several studies have been presented, especially those dealing with the mechanisms of control and controlling robots with a mobile arm, and the classification of controlling methods by mobile or self-programming. Various mobile robotics driving techniques, such as Wi-Fi, IoT, and microcontrollers, have been compared with their different advantages and applications.
Information security is a major problem in cloud computing systems as the information may be physically placed anywhere in any data center throughout the networks. Due to the nature of cloud computing, user authentica...
Information security is a major problem in cloud computing systems as the information may be physically placed anywhere in any data center throughout the networks. Due to the nature of cloud computing, user authentication, information integrity, and confidentiality are all brought up as significant challenges. In order to ensure confidentiality, integrity, and authentications while storing and accessing information from and to the data center as well as in peer contacts; it is advised to adopt a better, innovative, secure security method. Cloud security is a rapidly expanding area of computer and networks securities. In the cloud platforms paradigm, external data centers are used. It supports a range of programming languages used in the process of deploying web applications. The Cloud is built on a managed containers architecture that integrates information services and robust ecosystems for the deployment and operation of modern apps. In cloud computing, data securities are a major challenge that is dealt with using cryptographic methods. One potential method for encrypting data is the Advanced Encryption Standard (AES). After developing a cloud platform, the AES algorithm for encryption and the Data Encryption Standard (DES) method for decryption will be used in this work to secure data. The performance study suggests that DES and AES cryptography can be used to secure data. Calculations of data encryption and decryption delay also show that increased data delay periods are caused by bigger data volumes.
This document introduces the 1st international Virtual conference on Visual Pattern Extraction and Recognition for Cultural Heritage Understanding (VIPERC 2022), a premier forum for presenting the state-of-the-art, ne...
详细信息
Fully tapping into the flexibility potential inherent in iron and steel enterprise and fostering its friendly interactions with the power grid are key directions for future development. Gas, steam, and electricity con...
详细信息
ISBN:
(数字)9798350349030
ISBN:
(纸本)9798350349047
Fully tapping into the flexibility potential inherent in iron and steel enterprise and fostering its friendly interactions with the power grid are key directions for future development. Gas, steam, and electricity constitute the three essential secondary energy sources in iron and steel enterprise, and their integration forms a flexible and schedulable energy system. This study, with the objective of minimizing energy system operational costs, employs Mixed-Integer Linear programming (MILP) to establish a gas-steam-power coupled scheduling model that accounts for internal production constraints. The energy system engages in demand response as a virtual power plant, by optimally allocating the utilization of gas, steam, and power. Under the TOU tariff, the power regulation range of the virtual power plant reaches approximately 26.94% of the purchased power when not participating in TOU, unveiling the enormous potential for load regulation within the iron and steel enterprise.
We address the problematic of cutting m rectangular items from a two-dimensional strip. Each item has a given width, height, and demand. The purpose is to minimize the height of the used strip, while respecting the tw...
详细信息
In this paper, the stochastic user equilibrium model and its optimization conditions are studied. At the same time, the first and second order differential information of the objective function is reasonably used to d...
详细信息
Large-scale instruments sharing platform has been completed based on using Java language to program, and using spring Boot framework technology for building the background project, and using MySQL database to store th...
详细信息
IEEE-9 bus system complexity and real-world applicability make it a benchmark for power system analysis and optimization. This article describes a method for IEEE-9 bus load flow and dispatch analysis. Load dispatch a...
IEEE-9 bus system complexity and real-world applicability make it a benchmark for power system analysis and optimization. This article describes a method for IEEE-9 bus load flow and dispatch analysis. Load dispatch analysis optimizes generator dispatch to meet load demand, whereas load flow analysis determines steady-state operating characteristics such voltage magnitudes, phase angles, and power flows. Bus voltages are repeatedly calculated using the Newton-Raphson technique in load flow analysis to ensure system stability and voltage limitations. Assessing line flows and losses reveals system performance. The economic dispatch framework for load dispatch analysis minimizes generating costs while respecting generator capacity restrictions and load demand. Each generator's optimum generation levels are found via linear programming. The study illustrates these studies step-by-step, emphasizing data gathering, constraint formulation, and optimization. In order to analyze system dependability and performance, voltage profile analysis and sensitivity evaluations are described. This method helps engineers and planners optimize power system operation and setup and choose generator dispatch methods. System dependability, operational costs, and power production and distribution resource efficiency improve with the results.
暂无评论