با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Three-scale integrated optimization model of furnace simulation, cyclic scheduling, and supply chain of ethylene plants
سه سطح مقیاس مدل بهینه سازی شبیه سازی کوره ، برنامه ریزی چرخه ای ، و زنجیره تامین کارخانه های اتیلن-2021 In order to explore the potential of profit margin improvement, a novel three-scale integrated optimization model of furnace simulation, cyclic scheduling, and supply chain of ethylene plants is proposed and evaluated. A decoupling strategy is proposed for the solution of the three-scale model, which uses our previously proposed reactor scale model for operation optimization and then transfers the obtained results as a parameter table in the joint MILP optimization of plant-supply chain scale for cyclic scheduling. This optimization framework simplifies the fundamental MINLP into several sub-models, and improves the interpretability and extendibility. In the evaluation of an industrial case, a profit increase at a percentage of 3.25% is attained in optimization compared to the practical operations. Further sensitivity analysis is carried out for strategy evolving study when price policy, supply chain, and production requirement parameters are varied. These results could provide useful suggestions for petrochemical enterprises on thermal cracking production. Keywords: three-scale integrated optimization | cyclic scheduling | supply chain | MILP | thermal cracking |
مقاله انگلیسی |
2 |
Design optimization for security- and safety-critical distributed real-time applications
طراحی برنامه های کاربردی با بهینه سازی در زمان واقعی با امنیت و ایمنی بحرانی توزیع شده -2017 In this paper, we are interested in the design of real-time applications with security, safety, timing, and
energy requirements. The applications are scheduled with cyclic scheduling, and are mapped on dis
tributed heterogeneous architectures. Cryptographic services are deployed to satisfy security requirements
on confidentiality of messages, task replication is used to enhance system reliability, and dynamic voltage
and frequency scaling is used for energy efficiency of tasks. It is challenging to address these factors si
multaneously, e.g., better security protections need more computing resources and consume more energy,
while lower voltages and frequencies may impair schedulability and security, and also lead to reliability
degradation. We introduce a vulnerability based method to quantify the security performance of com
munications on distributed systems. We then focus on determining the appropriate security measures
for messages, the voltage and frequency levels for tasks, and the schedule tables such that the security
and reliability requirements are satisfied, the application is schedulable, and the energy consumption is
minimized. We propose a Tabu Search based metaheuristic to solve this problem. Extensive experiments
and a real-life application are conducted to evaluate the proposed techniques.
Keywords: Embedded system | Security | Safety | Energy | Design optimization |
مقاله انگلیسی |