With the growth of wind power industry and the increase of single unit capacity, wind power generation plays a more important role in the national economy, which also puts forward higher requirements for the reliable ...
详细信息
All over the world, the need for electrical energy has increased dramatically, forcing hydroelectric power plants to operate under non-standard conditions. This leads to premature fatigue cracking and consequently to ...
详细信息
Business process Management (BPM) is the factual criteria for business processmodeling. Although it is widely used in various fields, when required When using business processes to express big data business processes...
Business process Management (BPM) is the factual criteria for business processmodeling. Although it is widely used in various fields, when required When using business processes to express big data business processes, the existing business process specifications do not support it. Big data business can only be simulated as multiple manual tasks before execution, which is not friendly to non-big data technology practitioners, and will The non-standardized business process and poor reusability lead to a reduction in the efficiency of business completion. On the other hand, while supporting big data technology brings flexibility to BPM, it consumes a lot of process engine resources when executing big data business processes, and the execution efficiency is low, which brings greater burden to the process engine. Aiming at the above deficiencies, this paper carries out the following work: (1) Extend the existing business processmodeling, and define a new category of " Big data Service Task" by extending the activity elements in BPMN2.0 (2) Propose a compatible big data technology The task scheduling strategy in the business process includes a single big data task scheduling decision and an intensive big data task scheduling decision.
A two-dimensional (2D) axisymmetric model is used to simulate the process of filling of hydrogen storage tanks with an operational pressure of 35MPa and 150L to attempt to increase the filling efficiency of the tanks ...
详细信息
Internet users in Indonesia continue to increase yearly, reaching 215.63 million people in 2022. However, many internet users in Indonesia complain about the services provided by internet service providers. This compl...
详细信息
Aiming at the problem of lacking effective means to detect and evaluate the internal state of spatial ant-hole type aerodynamic and thermal engineering multi-stage pressure reduction control valves, a digital twin mod...
详细信息
This study investigates the utilization of fuzzy association rule algorithms for the secure storage of enterprise economic data. The study applies the concept of fuzzy partitioning to the mining of industrial producti...
详细信息
As part of the digitization of the AEC industry, the Digital Twin concept is becoming increasingly important. Originating in the manufacturing industry, the concept at its core involves a bidirectional coupling of the...
详细信息
The global share of energy consumption by data centers has reached the level of several percent and continues to rise. For this reason, ensuring optimal energy efficiency of the cooling process in data centers is an e...
详细信息
ISBN:
(纸本)9798400704802
The global share of energy consumption by data centers has reached the level of several percent and continues to rise. For this reason, ensuring optimal energy efficiency of the cooling process in data centers is an essential matter. As most data centers are air-cooled, it is required to investigate an airflow pattern inside as well as the accompanying heat transfer phenomena to assess the efficiency of the cooling process of the object. What is more, the thermal state of a server room as well as its power consumption often has a transient nature not only due to turbulent airflow inside but also because of dynamically changing servers’ load and time-varying output conditions of the coolers as a consequence of their control algorithms. That is why it is necessary to use transient modeling to get a deep and complete insight into the nature of the airflow and heat transfer phenomena in a server room and the resulting energy usage. A technique which allows modeling of the airflow and heat transfer in a detailed, volumetric way is computational fluid dynamics (CFD). Unfortunately, employing CFD for complex models especially in a transient manner can become a tedious process for an engineer and a challenging task for computational resources. In this paper we present a framework which is designed for automatic numerical heat transfer analysis of data center objects, using in the backend OpenFOAM, a well-known open-source CFD toolkit. Besides the automation process, the presented framework includes the implementation of transient models of active server room equipment and modeling of their energy usage as well as support for using high performance computing (HPC) systems equipped with SLURM queuing system. The software description is followed by a presentation of its application for a study of a hypothetical server room. A transient scenario of rapid application of servers’ load is simulated, including an energy consumption analysis of cooling devices.
Industrial control systems (ICS) are increasingly vulnerable to cyberattacks that can propagate to impact physical industrial processes. Existing research on ICS impact analysis views ICS dependability attributes as a...
详细信息
ISBN:
(数字)9798331532390
ISBN:
(纸本)9798331532406
Industrial control systems (ICS) are increasingly vulnerable to cyberattacks that can propagate to impact physical industrial processes. Existing research on ICS impact analysis views ICS dependability attributes as an afterthought and focuses primarily on attacks but not the attackers and their different behaviors. In this work, we include explicit considerations for ICS dependability attributes and attacker behaviors in ICS impact analysis. By adopting the Structured Cyberattack Impact analysis (SCIA) approach, our model-based impact analysis is demonstrated on a manufacturing ICS modeled in UPPAAL-SMC. More specifically, we visualize and quantify, respectively, using simulations and statistical model checking, the potential impact of data tampering attacks when performed by attackers with different behaviors (random, relentless, and informed). Furthermore, the impact analysis results highlight the interplay of ICS dependability attributes in terms of (1) how attacks on ICS security can impact system reliability and availability, (2) how improving security can improve system availability and reliability, and (3) how accepting some sacrifices on one attribute (availability) can end up improving other attributes (security and reliability).
暂无评论