-
21
A hybrid model of extended FMEA model based on F-PIPRECIA and Z-EDAS methods with Bow Tie to evaluate cybersecurity risks in Industry 4.0
Published 2024-03-01“…Therefore, in the present study, for the first time, a hybrid FMEA model developed based on multi-criteria decision-making methods in uncertain environments with the Bowtie method in four phases has been used to evaluate cyber security in Industry 4.0. First, based on the literature, 16 cybersecurity risks in the fourth industrial revolution are identified based on the FMEA model and the determinants of RPN are quantified. …”
Get full text
Article -
22
Bursting Oscillations in Shimizu-Morioka System with Slow-Varying Periodic Excitation
Published 2018-01-01“…The coupling effect of two different frequency scales between the exciting frequency and the natural frequency of the Shimizu-Morioka system with slow-varying periodic excitation is investigated. First, based on the analysis of the equilibrium states, homoclinic bifurcation, fold bifurcation, and supercritical Hopf bifurcation are observed in the system under a certain parameter condition. …”
Get full text
Article -
23
Analysis of 3D Cobweb Economic Differential Dynamic System Based on Supply-Demand and Price Relationships
Published 2022-01-01“…This paper proposes a method for constructing a three-dimensional cobweb economic model using the “predator-prey” theory. Firstly, based on the intrinsic driving relationships among supply, price, and demand, a differential dynamic model of the commodity and a pulse differential model when productivity increases are established. …”
Get full text
Article -
24
Empirical Analysis of Financial Statement Fraud of Listed Companies Based on Logistic Regression and Random Forest Algorithm
Published 2021-01-01“…In this paper, two machine learning algorithms, decision tree and random forest, are used to detect the company's financial data. Firstly, based on the financial data of 100 sample listed companies, this paper makes an empirical study on the fraud of financial statements of listed companies by using machine learning technology. …”
Get full text
Article -
25
A computing allocation strategy for Internet of things’ resources based on edge computing
Published 2021-12-01“…In order to meet the demand for efficient computing services in big data scenarios, a cloud edge collaborative computing allocation strategy based on deep reinforcement learning by combining the powerful computing capabilities of cloud is proposed. First, based on the comprehensive consideration of computing resources, bandwidth, and migration decisions, an optimization problem is constructed that minimizes the sum of all user task execution delays and energy consumption weights. …”
Get full text
Article -
26
A Lead-Lag Relationship and Forecast Research between China’s Crude Oil Futures and Spot Markets
Published 2022-01-01“…The integration of the global economy has led to an increasingly strong connection between the futures and spot markets of commodities. First, based on one-minute high-frequency prices, this paper applies the thermal optimal path (TOP) method to examine the lead-lag relationship between Chinese crude oil futures and spot from March 2018 to December 2021. …”
Get full text
Article -
27
A Further Study and Assessment on Geographic Information System: From Highway Ecological Landscape Environment Angle of View
Published 2022-01-01“…We use the designed evaluation model to analyze and evaluate the three highways in the Zhangjiakou area. First, based on the analytic hierarchy process, the combination of qualitative and quantitative evaluation indicators is selected, and then, the GIS geographic information system is used to obtain the basic data of the quantitative indicators and the questionnaire method is used. …”
Get full text
Article -
28
Key Technology of Internet of Things Middleware and Computer Event Matching Algorithm
Published 2022-01-01“…In order to solve the problem of complex event pattern in big data and strengthen research on key technologies of the Internet of Things and computer time matching algorithms, this paper studies the problem based on Hadoop clustering algorithm. Firstly, based on the subtype attribute of event type, the maximum value is selected as the final attribute value of the event after weighting the event. …”
Get full text
Article -
29
Retirement adjustment solutions: A comparative analysis using Shannon's Entropy and TOPSIS techniques
Published 2025-03-01“…For this purpose, the challenges and problems that discourage people from retiring are identified first. Based on these challenges, retirement adjustment solutions are proposed. …”
Get full text
Article -
30
Kinematics and spatial structure analysis of TBM gunite robot based on D–H parameter method
Published 2024-06-01“…In order to evaluate the kinematic performance of the mechanism, this paper studies the forward and inverse kinematics and spatial architecture of the TBM shotcrete robot. Firstly, based on the D–H parameter method, the number of joints and links is determined and structural analysis is performed to obtain the robot's forward kinematics equation, achieving the mapping between joint space and pose space. …”
Get full text
Article -
31
Systematic Thinking and Evaluation of Construction Quality Management Standardization of Power Engineering in China
Published 2022-01-01“…To improve the quality management level of power engineering and realize the standardization of power engineering quality management, power engineering construction quality management standardization (CQMS) is evaluated using the order relation analysis method (G1 method) and the cloud model method. Firstly, based on systematic thinking and practice in China, the CQMS framework is proposed, and the evaluation index system including organizational performance, management behaviour performance, and entity performance related to power engineering construction quality is established. …”
Get full text
Article -
32
A Novel Guidance Law for Intercepting a Highly Maneuvering Target
Published 2021-01-01“…Given the resolution of the guidance for intercepting highly maneuvering targets, a novel finite-time convergent guidance law is proposed, which takes the following conditions into consideration, including the impact angle constraint, the guidance command input saturation constraint, and the autopilot second-order dynamic characteristics. Firstly, based on the nonsingular terminal sliding mode control theory, a finite-time convergent nonsingular terminal sliding mode surface is designed. …”
Get full text
Article -
33
Relationship between Corrosion of Reinforcement and Surface Cracking Width in Concrete
Published 2020-01-01“…The durability of structure cannot be guaranteed when a corrosion expansion crack reaches the surface of the reinforced concrete member. In this paper, firstly, based on the existing theoretical model of steel corrosion degree, the calculation process of the model and the determination of the relevant parameters in the model were analyzed and discussed. …”
Get full text
Article -
34
Application Effect Analysis of the Mie Scattering Theory Based on Big Data Analysis Technology in the Optical Scattering Direction
Published 2022-01-01“…In order to study the characteristics of wake, an application method of the Mie scattering theory based on big data analysis technology in the optical scattering direction is proposed in this paper. Firstly, based on the scattering theory, the optical scattering model of a single bubble is simulated on the computer. …”
Get full text
Article -
35
Second-Order Sliding Mode Guidance Law considering Second-Order Dynamics of Autopilot
Published 2019-01-01“…Aiming at the requirement that some missiles need to meet certain impact angles when attacking targets, we consider the second-order dynamic characteristics of autopilot, thereby proposing a second-order sliding mode guidance law with impact angle constraint. Firstly, based on the terminal sliding mode control, we design a fast nonsingular terminal sliding mode guidance law with impact angle constraint. …”
Get full text
Article -
36
A Method for the Inversion of Reservoir Effective Permeability Based on Time-Lapse Resistivity Logging Data and Its Application
Published 2022-01-01“…In this study, we proposed an effective permeability modeling method based on the time-lapse resistivity logging data. First, based on the resistivity measurement data at different times, the dynamic resistivity profile of the reservoir was obtained through joint inversion; we then obtained the invasion depth and invasion zone resistivity of the drilling fluid at different times, along with the original formation resistivity. …”
Get full text
Article -
37
An Improved HM-SAC-CA Algorithm for Mobile Robot Path Planning in Unknown Complex Environments
Published 2025-01-01“…To tackle this problem, we propose an improved SAC (HM-SAC-CA) algorithm for path planning in unknown complex environments. First, based on the SAC maximum entropy framework, a deep reinforcement learning algorithm with clipped automatic entropy adjustment is proposed to improve the quality of policy learning by suppressing entropy evaluation. …”
Get full text
Article -
38
Analysis Model of Risk Factors of Urban Bus Operation Based on FTA-CLR
Published 2021-01-01“…In order to comprehensively analyze the risk factors and accurately find the high risk factors related to accidents, an analysis model of risk factors of urban bus operation is proposed, in which the advantages of the structural analysis of the Fault Tree Analysis (FTA) and the correlation analysis of the Cumulative Logistic Regression (CLR) are combined. Firstly, based on the accident data in Northeast China, FTA is used to compile the urban bus operation fault tree. …”
Get full text
Article -
39
A New Methodology for Hesitant Fuzzy Emergency Decision Making with Unknown Weight Information
Published 2018-01-01“…This paper presents a novel approach to emergency decision making with hesitant fuzzy information, which takes regret aversion of the decision makers into account. Firstly, based on the idea of the water-filling theory in the field of wireless communications, a mathematical programming model that can convert the attribute values into a compatible scale and eliminate the influence of different physical dimensions is constructed to determine the attribute weights. …”
Get full text
Article -
40
Research on Aircraft Attitude Control Method Based on Linear Active Disturbance Rejection
Published 2022-01-01“…In this paper, a dual-loop active disturbance rejection attitude controller design method is proposed for the attitude control of aircraft. Firstly, based on the nonlinear dynamic model of aircraft, the control system model with inner loop as angular velocity and outer loop as attitude angle is established. …”
Get full text
Article