During the operation of air separation units(ASU), planned short-term shutdowns are often required to ensure a balance between supply and demand of downstream air separation products, and maintain equipment performanc...
详细信息
During the operation of air separation units(ASU), planned short-term shutdowns are often required to ensure a balance between supply and demand of downstream air separation products, and maintain equipment performance and ensure production safety. Making the device shut down smoothly and safely is a key measure in air separation production. However, this process highly relies on manual participation and carries risks and uncertainties. In response to this practical demand, we propose an ASU Shutdown operation flow assistance system(SOFAS). We firstly build a standard logical model based on the actual shutdown process and develop algorithms to assist in executing standardized and safe shutdown operations. Then, we propose an operation flow identification algorithm to identify the shutdown operation flow, and an evaluation algorithm to quantitatively analyze the efficiency and safety of the operation flow using two performance indicators. Finally, the effectiveness of the method was verified through experimental analysis using the actual operational data of ASU.
In an integrated electricity-gas system (IEGS), gas-fired units with flexibility response capabilities address the uncertainty associated with renewable energy by swiftly adapting their output, which may result in unc...
详细信息
In an integrated electricity-gas system (IEGS), gas-fired units with flexibility response capabilities address the uncertainty associated with renewable energy by swiftly adapting their output, which may result in uncertain fluctuations in the gas withdrawal of gas-fired units, potentially posing risks to the security of IEGS. Hence, it is necessary to efficiently evaluate the dynamic security region (DSR) of natural gas systems in IEGS by considering the real-time dynamic characteristics of natural gas systems, which are not satisfactorily handled in state-of-theart works. To bridge this gap, this paper first conceptionally verifies the necessity of the DSR and establishes its mathematical model. Then, a dimensionality reduction method is proposed for the efficient solution and visualization of the high-dimensional DSR evaluation model. A fast evaluation (FE) algorithm is developed to address the difficulties of the nonconvex dynamic constraints in the reduced DSR model. Finally, the necessity and notable advantages of the proposed DSR model and FE are verified based on small and relatively large test systems in comparison with common security region models and algorithms. To the best of our knowledge, this is the first paper that comprehensively presents models and efficient algorithms regarding the DSR of natural gas systems in IEGS.
The introduction of the full paper discusses that the influence of weak ties to Information Spreading in online social network are different according to different online social network type. In the information exchan...
详细信息
ISBN:
(纸本)9781467355803;9781467355780
The introduction of the full paper discusses that the influence of weak ties to Information Spreading in online social network are different according to different online social network type. In the information exchanged social networks, removing the weak ties have little influence on the information spreading, while in the relationship social network, removing the weak ties have significant influence on the information *** efficient weak ties evaluation algorithm can more accurately find the weak ties in a social network to improve the control effect of information spreading. We study the weak ties evaluation algorithm, use the concept of clustering coefficient between two friends and the global evolution to optimize the initial algorithm, in order to solve some existed problem in the initial algorithm. Analysis and experiences proved that the new algorithm perform better than the initial algorithm and the weak ties are more effective on the information spreading in online social network, but the new algorithm still has little influence on the information spreading in the information exchanged social networks.
The article develops the decision rules to win each set of the Chinese chess game using evaluation algorithm and artificial intelligence method, and uses the mobile robot to be instead of the chess, and presents the m...
详细信息
The article develops the decision rules to win each set of the Chinese chess game using evaluation algorithm and artificial intelligence method, and uses the mobile robot to be instead of the chess, and presents the movement scenarios using the shortest motion paths for mobile robots. Player can play the Chinese chess game according to the game rules with the supervised computer. The supervised computer decides the optimal motion path to win the set using artificial intelligence method, and controls mobile robots according to the programmed motion paths of the assigned chesses moving on the platform via wireless RF interface. We uses enhance A* searching algorithm to solve the shortest path problem of the assigned chess, and solve the collision problems of the motion paths for two mobile robots moving on the platform simultaneously. We implement a famous set to be called "wild horses run in farm" using the proposed method. First we use simulation method to display the motion paths of the assigned chesses for the player and the supervised computer. Then the supervised computer implements the simulation results on the chessboard platform using mobile robots. Mobile robots move on the chessboard platform according to the programmed motion paths and is guided to move on the centre line of the corridor, and avoid the obstacles (chesses), and detect the cross point of the platform using three reflective IR modules.
The security situation of the network is determined by the observation state and hidden state of a complex virus system. To analyze the relationship between the two states and evaluate the trends in the security situa...
详细信息
The security situation of the network is determined by the observation state and hidden state of a complex virus system. To analyze the relationship between the two states and evaluate the trends in the security situation of the system, we construct a new model for security situation awareness based on Hidden Markov Model (HMM). Firstly, the paper examines the impact of virus propagation on network security and proposes a new SIR (Susceptible-Infected-Recovered) virus propagation model on scale-free networks. Secondly, we construct a Hidden Markov Model for network security, and this model designs and utilizes the Forward algorithm and Viterbi algorithm to assess the security status of epidemic networks. Finally, we ascertain the effectiveness of the model and algorithms through model examples and simulation experiments. The results show that the proposed algorithm is highly efficient in analyzing the security of virus systems and has great application value in predicting the security trends of networks.
Many problems in incomplete information games also exist in our daily *** is of great significance to solve the problems in our daily life and improve the *** Holdem is a typical card game with incomplete *** Texas Ho...
详细信息
Many problems in incomplete information games also exist in our daily *** is of great significance to solve the problems in our daily life and improve the *** Holdem is a typical card game with incomplete *** Texas Holdem a valuation algorithm model based on convolutional neural network is *** train the model using the game history between the masters,to achieve the purpose of learning master *** game procedure of the valuation model plays the game with the game procedure designed by the predecessors,and the experimental results show that the convolutional neural network valuation method of learning human master experience can provide better decisions and enhance the Texas Holdem game procedure.
Aiming at the two key problems during the process of the disassembly analysis,which are the combination explosion in generating the disassembly model and the lack of the uncertainty factors in determining the optim...
详细信息
ISBN:
(纸本)9781424436712
Aiming at the two key problems during the process of the disassembly analysis,which are the combination explosion in generating the disassembly model and the lack of the uncertainty factors in determining the optimal disassembly sequence,this paper proposes a level modular method and puts forward the Petri net model correspondently,which reduce the complication of the disassembly model effectively. Meanwhile,the influences of uncertainty factors on evaluationalgorithm of disassembly indexes,under different work conditions,are discussed and formulated. These parameters are saved in a fuzzy unit with the carrier of workers information,which form a special "place". Thus,a common Petri net is extended as a fuzzy Petri net disassembly model. Combining the corresponding evaluation algorithm,an optimal disassembly sequence according with the actual working situation can be achieved. Finally,a case is proposed to illustrate the above method.
Aiming at that the risk of perfect competition electricity market is limited information, the self-serving nature and the uncertain future, this paper presents a trust model BBTM (Behaviors Based Trust Model) that can...
详细信息
Aiming at that the risk of perfect competition electricity market is limited information, the self-serving nature and the uncertain future, this paper presents a trust model BBTM (Behaviors Based Trust Model) that can evaluate trust relationship between participators by measuring participators' behavior and computing trust levels of participators. In this model, the hierarchical structure of the main factors that affect the trust value of participators is established by Delphi method, and Layer Analysis Process is applied to determine the weights of various factors. The trading quantity of electricity is converted to standard transaction numbers and standard transaction satisfactory numbers, which can prevent participators from cheating in large-scale transaction by accumulating trust value in small-scale successful transactions. The model can enhance the mutual understanding among market participators and promote them to provide the credible service to improve their credibility, which could ensure that the electricity market operates stably and effectively.
暂无评论