دانلود و نمایش مقالات مرتبط با cyclic scheduling::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - cyclic scheduling

تعداد مقالات یافته شده: 2
ردیف عنوان نوع
1 Three-scale integrated optimization model of furnace simulation, cyclic scheduling, and supply chain of ethylene plants
سه سطح مقیاس مدل بهینه سازی شبیه سازی کوره ، برنامه ریزی چرخه ای ، و زنجیره تامین کارخانه های اتیلن-2021
In order to explore the potential of profit margin improvement, a novel three-scale integrated optimization model of furnace simulation, cyclic scheduling, and supply chain of ethylene plants is proposed and evaluated. A decoupling strategy is proposed for the solution of the three-scale model, which uses our previously proposed reactor scale model for operation optimization and then transfers the obtained results as a parameter table in the joint MILP optimization of plant-supply chain scale for cyclic scheduling. This optimization framework simplifies the fundamental MINLP into several sub-models, and improves the interpretability and extendibility. In the evaluation of an industrial case, a profit increase at a percentage of 3.25% is attained in optimization compared to the practical operations. Further sensitivity analysis is carried out for strategy evolving study when price policy, supply chain, and production requirement parameters are varied. These results could provide useful suggestions for petrochemical enterprises on thermal cracking production.
Keywords: three-scale integrated optimization | cyclic scheduling | supply chain | MILP | thermal cracking
مقاله انگلیسی
2 Design optimization for security- and safety-critical distributed real-time applications
طراحی برنامه های کاربردی با بهینه سازی در زمان واقعی با امنیت و ایمنی بحرانی توزیع شده -2017
In this paper, we are interested in the design of real-time applications with security, safety, timing, and energy requirements. The applications are scheduled with cyclic scheduling, and are mapped on dis tributed heterogeneous architectures. Cryptographic services are deployed to satisfy security requirements on confidentiality of messages, task replication is used to enhance system reliability, and dynamic voltage and frequency scaling is used for energy efficiency of tasks. It is challenging to address these factors si multaneously, e.g., better security protections need more computing resources and consume more energy, while lower voltages and frequencies may impair schedulability and security, and also lead to reliability degradation. We introduce a vulnerability based method to quantify the security performance of com munications on distributed systems. We then focus on determining the appropriate security measures for messages, the voltage and frequency levels for tasks, and the schedule tables such that the security and reliability requirements are satisfied, the application is schedulable, and the energy consumption is minimized. We propose a Tabu Search based metaheuristic to solve this problem. Extensive experiments and a real-life application are conducted to evaluate the proposed techniques.
Keywords: Embedded system | Security | Safety | Energy | Design optimization
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5264 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 39531 :::::::: افراد آنلاین: 59