Resource Type

Journal Article 116

Year

2023 8

2022 7

2021 5

2020 5

2019 6

2018 12

2017 8

2016 18

2015 4

2014 1

2013 2

2012 3

2011 3

2010 2

2009 1

2008 4

2007 3

2006 2

2005 8

2004 2

open ︾

Keywords

cyberspace security 6

cyberspace 5

Petri net 3

Network security 2

3G mobile phone 1

5% approach 1

5G 1

6G security 1

ADV 1

Accelerator 1

Adaptive traffic signal control 1

Address resolution 1

Algebraic connectivity 1

Alternate vertex updating 1

Anonymous 1

Apoptosis 1

Artificial intelligence (AI) 1

Attack detection 1

Attribute 1

open ︾

Search scope:

排序: Display mode:

Modeling and Analysis of Elevator System Based on Timed-Coloured Petri Net

Zong Qun,Dou Liqian,Cheng Yiju

Strategic Study of CAE 2004, Volume 6, Issue 12,   Pages 51-55

Abstract:

In this paper, an elevator running model based on timed-coloured Petri net is proposed.

Keywords: Petri net     timed-coloured Petri net     the model of elevator     the running of elevator    

The research of grey clustering decision of assembly sequence based on petri net

Mo Qian,Luo Yi

Strategic Study of CAE 2008, Volume 10, Issue 11,   Pages 65-68

Abstract: This paper establishes assembly model according to the intuitionistic graphics mode characteristics of petrinet, and gets feasible assembly sequence according to the principle of petri net.indicates this method can evaluate correctly the feasible assembly sequences according to the principle of petri

Keywords: assembly sequence     petri net     grey clustering decision method    

Modeling and Analysis of Fault-tolerant System With Rejuvenation

Guo Chenghao,Liu Fengyu

Strategic Study of CAE 2007, Volume 9, Issue 10,   Pages 75-79

Abstract: rejuvenation schedule in the fault-tolerant system, formalizes the system with Non-Markovian stochastic Petri

Keywords: fault-tolerant system     software rejuvenation     software aging     redundant strategy     Non-Markovian stochastic Petri    

Using information flowanalysis to detect implicit information leaks forweb service composition None

Jia-xin JIANG, Zhi-qiu HUANG, Wei-wei MA, Yan CAO

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 494-502 doi: 10.1631/FITEE.1601371

Abstract: We introduce an adequate meta-model for BPEL representation based on a Petri net for transformation andBuilding on the concept of Petri net place-based noninterference, the core contribution of this paperis the application of a Petri net reachability graph to estimate Petri net interference and thereby

Keywords: Information flow analysis     Business process execution language     Petri net     Interference    

Preserving privacy information flowsecurity in composite service evolution None

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5,   Pages 626-638 doi: 10.1631/FITEE.1700359

Abstract: First, a privacy data item dependency analysis method based on a Petri net model is presented.

Keywords: Composite service     Privacy information flow security     Service evolution     Petri net    

Research and modeling analysis on adaptive nested fine-grainedsoftware rejuvenation of object-oriented software system

Wang Zhan,Zhao Yanli,Liu Fengyu,Zhang Hong

Strategic Study of CAE 2008, Volume 10, Issue 7,   Pages 158-164

Abstract:

In order to enlarge the field of application, reduce the cost of software rejuvenation and improve software availability and reliability,the adaptive software rejuvenation with fine rejuvenation granularity of object-oriented software system would be put forward. Based on the characteristics of the component and coupling relation between the components of the system, this paper determines the finest rejuvenation granularity, analyzes the degree of the coupling relation,sets down a method to calculate the restart dependence and its degree of the components,so that determines the restart reachable set of each component and gets the restart gather of the components at every granularity,and finally sets down and models the adaptive nested software rejuvenation policy. So executing intelligent software rejuvenation at fine rejuvenation granularity in the object-oriented software system can be supported.

Keywords: software rejuvenation     restart dependence     restart reachable set     rejuvenation granularity     SHLPN    

Vector soliton and noise-like pulse generation using a Ti3C2 MXene material in a fiber laser Research

Dongsu Jeong, Dohyun Kim, Yoonho Seo,jdsvs2979@korea.ac.kr,davydo@korea.ac.kr,yoonhoseo@korea.ac.kr

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 3,   Pages 287-436 doi: 10.1631/FITEE.1900649

Abstract: With technological advancements, weapon system development has become increasingly complex and costly. Using modeling and simulation (M&S) technology in the conceptual design stage is effective in reducing the development time and cost of weapons. One way to reduce the complexity and trial-and-error associated with weapon development using M&S technology is to develop s to review the functions assigned to new weapons. Although the M&S technology is applicable, it is difficult to analyze how effectively the weapons are functioning, because of the dynamic features inherent in modeling, which considers interrelations among different weapon entities. To support review of weapon functions including these characteristics, this study develops a method to model the interactions between weapons in the . This method includes the following three steps: (1) construct virtual models by converting the weapons and the weapon functions into their corresponding components; (2) generate the combat process from the , which is derived from the interrelations among weapons under consideration using reasoning rules; (3) develop a process-based model that describes weapon functions by combining the combat process with virtual models. Then, a PBM system based on this method is implemented. The case study executed on this system shows that it is useful in deriving process-based models from various s, analyzing weapon functions using the derived models, and reducing weapon development issues in the conceptual design stage.

Keywords: 武器系统;基于过程的建模(PBM);作战场景;交互分析;元模型;Petri网    

Rhizosphere immunity: targeting the underground for sustainable plant health management

Zhong WEI, Ville-Petri FRIMAN, Thomas POMMIER, Stefan GEISEN, Alexandre JOUSSET, Qirong SHEN

Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 3,   Pages 317-328 doi: 10.15302/J-FASE-2020346

Abstract:

Managing plant health is a great challenge for modern food production and is further complicated by the lack of common ground between the many disciplines involved in disease control. Here we present the concept of rhizosphere immunity, in which plant health is considered as an ecosystem level property emerging from networks of interactions between plants, microbiota and the surrounding soil matrix. These interactions can potentially extend the innate plant immune system to a point where the rhizosphere immunity can fulfil all four core functions of a full immune system: pathogen prevention, recognition, response and homeostasis. We suggest that considering plant health from a meta-organism perspective will help in developing multidisciplinary pathogen management strategies that focus on steering the whole plant-microbe-soil networks instead of individual components. This might be achieved by bringing together the latest discoveries in phytopathology, microbiome research, soil science and agronomy to pave the way toward more sustainable and productive agriculture.

Keywords: rhizosphere     soil microbiome     plant immunity     microbial ecology     plant health     soilborne pathogens    

Three Basic Laws for the Network Era and Capacity Evolution for Backbone Networks

Wei Leping

Strategic Study of CAE 2001, Volume 3, Issue 5,   Pages 12-16

Abstract:

First this paper described the great challenge from the new era and its impacts on networks and indicated the huge capacity pressure faced by networks. Then, the paper discussed implications, effects and technical limits for the three basic laws which guide network era such as Moored Law, Optical Fiber Law and Metcalfe´s Law. Finally, the paper presented capacity evolution strategies for transmission links, transport nodes and service nodes in backbone networks, respectively.

Keywords: network     capacity     backbone network    

Industrial Ethernet Forming New Generation of Distributed System

Fang Laihua,Wu Aiguo,Zhang Zhao,Wang Dongqing

Strategic Study of CAE 2005, Volume 7, Issue 5,   Pages 66-69

Abstract:

Feasibility and use of Ethernet in distributed system are discussed. Four industrial Ethernet protocols, which meet the requirement of distributed control, are analyzed, and so are their relative advantages and weakness. The things the device vendors should consider to support these protocols and the means to add Ethernet connectivity to their product are proposed.

Keywords: distributed system     industrial Ethernet protocol     Ethernet connectivity embedding    

Obtain the optimum of logistics delivery network with annealing algorithm

Duan Jingmin,Chang Yuejun,Li Zanxiang,Cui Jianming

Strategic Study of CAE 2012, Volume 14, Issue 7,   Pages 109-112

Abstract:

Simulated annealing algorithm is a heuristic algorithm, proposed one approximation algorithm of solving optimization combinatorial problems inspired by objects in the annealing process by heating crunch. The algorithm is superior to the traditional greedy algorithm,which avoids falling into local optimum and reaches global optimum. There are often some problems to find the shortest path, etc., in the logistics and we distribution network, and we need optimization for logistics and distribution path in order to achieve the shortest, best, most economical, and so on. The paper uses an example of simulated annealing algorithm to verify it, and the method is proved to be feasible.

Keywords: simulated annealing algorithm     global optimum     network of logistics and distribution network    

State of the Art of Compartment Fire Modeling

Zheng Xin,Yuan Hongyong

Strategic Study of CAE 2004, Volume 6, Issue 3,   Pages 68-74

Abstract:

The aim of the present review is to provide the reader with a brief discussion on the mathematical modeling techniques, currently available for compartment fires. The relevant underlying physical assumptions are presented first and the conventional model performance is analyzed in the range of application. The final part of the review deals with current trends and perspective of mathematic fire models and highlights the need for extensive validation studies and interaction between theoretical and experimental investigations.

Keywords: compartment     field model     zone model     network model     FZN (field     zone and network) model     empirical model    

Message delay time distribution analysis for controller area network under errors Research Papers

Lei-ming ZHANG, Yi-chao SUN, Yong LEI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 760-772 doi: 10.1631/FITEE.1700815

Abstract:

Controller area network (CAN) is a widely used fieldbus protocol in various industrial applications. To understand the network behavior under errors for the optimal design of networked control systems, the message response time of the CAN network needs to be analyzed. In this study, a novel delay time distribution analysis method for the response messages is proposed when considering errors. In this method the complex message queues are decomposed into typical message patterns and cases. First, a stochastic fault model is developed, and the probability factor is defined to calculate the error distribution. Then the message delay time distribution for the single slave node configuration is analyzed based on the error distribution. Next, based on the delay time distribution analysis of typical patterns and cases, an analysis framework of message delay time distribution for the master/slave configuration is developed. The testbed is constructed and case studies are conducted to demonstrate the proposed methodology under different network configurations. Experimental results show that the delay time distributions calculated by the proposed method agree well with the actual observations.

Keywords: Controller area network     Message delay     Probability distribution     Errors    

Ubiquitous Energy Internet—New Energy Internet Coupling with Information and Energy

Gan Zhongxue,Zhu Xiaojun,Wang Cheng and Chen Yue

Strategic Study of CAE 2015, Volume 17, Issue 9,   Pages 98-104

Abstract:

With the world energy crisis and environmental protection issues, countries around the world are actively engaged in exploring the new way of the future energy development. In recent years, Jeremy Rifkin, the famous American economist, proposed the idea of the third industrial revolution and the energy internet which caused widespread concern. Following this trend, countries put forward their own development strategies of industrial technology which are driven by internet respectively, such as: the third industrial revolution and industrial Internet of American, industry 4.0 of Germany, smart grid and “Internet + energy” of China. Based on energy efficiency theory in the system, the ubiquitous energy Internet has a stereoscopic structure which consists of three levels: information network, energy network and physical network. By using the optimization control based on the coupling between information and energy to adjust measures to local conditions and fully exploit the multiple grade energy, the ubiquitous energy Internet can give the solution to the integration stability of the renewable energy and the dynamic matching between demand and supply, and become a representative internet of the new energy.

Keywords: ubiquitous energy internet     coupling with information and energy     energy internet     system energy efficiency     ordering    

Application of microseismic monitoring technology in Daqing Oilfield A block well net design

Ma Jisheng

Strategic Study of CAE 2012, Volume 14, Issue 4,   Pages 74-76

Abstract:

The artificial fracture position and the well row direction influence the exploitation effect of low permeability reservoir. In the process of creating artificial fractures, we apply microseismic to monitor their direction, location, orientation, length and height, and determine the well alignment direction combined with the stress orientation, all of which establish well foundation for improving the development effect of A block.

Keywords: microseismic monitoring     artificial fracture     well pattern design    

Title Author Date Type Operation

Modeling and Analysis of Elevator System Based on Timed-Coloured Petri Net

Zong Qun,Dou Liqian,Cheng Yiju

Journal Article

The research of grey clustering decision of assembly sequence based on petri net

Mo Qian,Luo Yi

Journal Article

Modeling and Analysis of Fault-tolerant System With Rejuvenation

Guo Chenghao,Liu Fengyu

Journal Article

Using information flowanalysis to detect implicit information leaks forweb service composition

Jia-xin JIANG, Zhi-qiu HUANG, Wei-wei MA, Yan CAO

Journal Article

Preserving privacy information flowsecurity in composite service evolution

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Journal Article

Research and modeling analysis on adaptive nested fine-grainedsoftware rejuvenation of object-oriented software system

Wang Zhan,Zhao Yanli,Liu Fengyu,Zhang Hong

Journal Article

Vector soliton and noise-like pulse generation using a Ti3C2 MXene material in a fiber laser

Dongsu Jeong, Dohyun Kim, Yoonho Seo,jdsvs2979@korea.ac.kr,davydo@korea.ac.kr,yoonhoseo@korea.ac.kr

Journal Article

Rhizosphere immunity: targeting the underground for sustainable plant health management

Zhong WEI, Ville-Petri FRIMAN, Thomas POMMIER, Stefan GEISEN, Alexandre JOUSSET, Qirong SHEN

Journal Article

Three Basic Laws for the Network Era and Capacity Evolution for Backbone Networks

Wei Leping

Journal Article

Industrial Ethernet Forming New Generation of Distributed System

Fang Laihua,Wu Aiguo,Zhang Zhao,Wang Dongqing

Journal Article

Obtain the optimum of logistics delivery network with annealing algorithm

Duan Jingmin,Chang Yuejun,Li Zanxiang,Cui Jianming

Journal Article

State of the Art of Compartment Fire Modeling

Zheng Xin,Yuan Hongyong

Journal Article

Message delay time distribution analysis for controller area network under errors

Lei-ming ZHANG, Yi-chao SUN, Yong LEI

Journal Article

Ubiquitous Energy Internet—New Energy Internet Coupling with Information and Energy

Gan Zhongxue,Zhu Xiaojun,Wang Cheng and Chen Yue

Journal Article

Application of microseismic monitoring technology in Daqing Oilfield A block well net design

Ma Jisheng

Journal Article