One of the most serious problems encountered in Naval steam plants following World War II was the unreliable performance of boiler and main feedpump pneumatic control systems. In addition to control component and syst...
One of the most serious problems encountered in Naval steam plants following World War II was the unreliable performance of boiler and main feedpump pneumatic control systems. In addition to control component and system design deficiencies, these control systems suffered from inadequate methods to measure and adjust system alignment. This paper describes the development of a set of procedures for on-line alignment verification (OLV) of pneumatic main boiler and feedpump control systems. The procedures are designed for use by N avy control system technicians and, in addition to on-line alignment verification, provide guidance for troubleshooting and for performing system alignment. Procedure static checks measure steady state steaming performance and OLV procedure dynamic checks measure the ability of the boiler and control systems to respond to load changes. The paper describes typical control system characteristics that influence OLV procedure content and the supporting analysis that was used to establish alignment criteria ranges that satisfy both steady state and transient performance requirements. Also described is the alignment criteria tolerance analysis along with the steps involved in a typical OLV check procedure development. Descriptions of the various OLV checks, troubleshooting procedures and alignment procedures are provided. Typical shipboard implementation requirements are described and experience to date with the procedures is provided along with a status report on OLV procedure implementations.
The 9th International Conference on Extending Database Technology, EDBT 2004, was held in Heraklion, Crete, Greece, during March 14–18, 2004. The EDBT series of conferences is an established and prestigious forum for...
详细信息
ISBN:
(数字)9783540247418
ISBN:
(纸本)9783540212003
The 9th International Conference on Extending Database Technology, EDBT 2004, was held in Heraklion, Crete, Greece, during March 14–18, 2004. The EDBT series of conferences is an established and prestigious forum for the exchange of the latest research results in data management. Held every two years in an attractive European location, the conference provides unique opp- tunities for database researchers, practitioners, developers, and users to explore new ideas, techniques, and tools, and to exchange experiences. The previous events were held in Venice, Vienna, Cambridge, Avignon, Valencia, Konstanz, and Prague. EDBT 2004 had the theme “new challenges for database technology,” with the goal of encouraging researchers to take a greater interest in the current exciting technological and application advancements and to devise and address new research and development directions for database technology. From its early days, database technology has been challenged and advanced by new uses and applications, and it continues to evolve along with application requirements and hardware advances. Today’s DBMS technology faces yet several new challenges. Technological trends and new computation paradigms, and applications such as pervasive and ubiquitous computing, grid computing, bioinformatics, trust management, virtual communities, and digital asset management, to name just a few, require database technology to be deployed in a variety of environments and for a number of di?erent purposes. Such an extensive deployment will also require trustworthy, resilient database systems, as well as easy-to-manage and ?exible ones, to which we can entrust our data in whatever form they are.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on R...
详细信息
ISBN:
(数字)9783642294204
ISBN:
(纸本)9783642294198
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed trust management systems; trust-based reasoning; digital assets protection; data protection; privacy and ID issues; information flow analysis; language-based security; security and trust aspects of ubiquitous computing; validation/analysis tools; web service security/trust/privacy; grid security; security risk assessment; and case studies.
This volume constitutes the proceedings of the 10th International Conference on Simulated Evolution and Learning, SEAL 2012, held in Dunedin, New Zealand, in December 2014. The 42 full papers and 29 short papers prese...
详细信息
ISBN:
(数字)9783319135632
ISBN:
(纸本)9783319135625
This volume constitutes the proceedings of the 10th International Conference on Simulated Evolution and Learning, SEAL 2012, held in Dunedin, New Zealand, in December 2014. The 42 full papers and 29 short papers presented were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on evolutionary optimization; evolutionary multi-objective optimization; evolutionary machine learning; theoretical developments; evolutionary feature reduction; evolutionary scheduling and combinatorial optimization; real world applications and evolutionary image analysis.
This book constitutes the refereed proceedings of the International Conference on the applications of Evolutionary Computation, Evoapplications 2012, held in Málaga, Spain, in April 2012, colocated with the Evo* ...
详细信息
ISBN:
(数字)9783642291784
ISBN:
(纸本)9783642291777
This book constitutes the refereed proceedings of the International Conference on the applications of Evolutionary Computation, Evoapplications 2012, held in Málaga, Spain, in April 2012, colocated with the Evo* 2012 events EuroGP, EvoCOP, EvoBIO, and EvoMUSART. The 54 revised full papers presented were carefully reviewed and selected from 90 submissions. Evoapplications 2012 consisted of the following 11 tracks: EvoCOMNET (nature-inspired techniques for telecommunication networks and other parrallel and distributed systems), EvoCOMPLEX (algorithms and complex systems), EvoFIN (evolutionary and natural computation in finance and economics), EvoGAMES (bio-inspired algorithms in games), EvoHOT (bio-inspired heuristics for design automation), EvoIASP (evolutionary computation in image analysis and signal processing), EvoNUM (bio-inspired algorithms for continuous parameter optimization), EvoPAR (parallel implementation of evolutionary algorithms), EvoRISK (computational intelligence for risk management, security and defense applications), EvoSTIM (nature-inspired techniques in scheduling, planning, and timetabling), and EvoSTOC (evolutionary algorithms in stochastic and dynamic environments).
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were caref...
详细信息
ISBN:
(数字)9783642309212
ISBN:
(纸本)9783642309205
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
This book describes in contributions by scientists and practitioners the development of scientific concepts, technologies, engineering techniques and tools for a service-based society. The focus is on microservices, i...
详细信息
ISBN:
(数字)9783030316464
ISBN:
(纸本)9783030316457;9783030316488
This book describes in contributions by scientists and practitioners the development of scientific concepts, technologies, engineering techniques and tools for a service-based society. The focus is on microservices, i.e cohesive, independent processes deployed in isolation and equipped with dedicated memory persistence tools, which interact via messages.;The book is structured in six parts. Part 1 “Opening” analyzes the new (and old) challenges including service design and specification, data integrity, and consistency management and provides the introductory information needed to successfully digest the remaining parts. Part 2 “Migration” discusses the issue of migration from monoliths to microservices and their loosely coupled architecture. Part 3 “Modeling” introduces a catalog and a taxonomy of the most common microservices anti-patterns and identifies common problems. It also explains the concept of RESTful conversations and presents insights from studying and developing two further modeling approaches. Next , Part 4 is dedicated to various aspects of “Development and Deployment”. Part 5 then covers “applications” of microservices, presenting case studies from Industry 4.0, Netflix, and customized SaaS examples. Eventually, Part 6 focuses on “Education” and reports on experiences made in special programs, both at academic level as a master program course and for practitioners in an industrial training.;As only a joint effort between academia and industry can lead to the release of modern paradigm-based programming languages, and subsequently to the deployment of robust and scalable softwaresystems, the book mainly targets researchers in academia and industry who develop tools and applications for microservices.
暂无评论