Joint-Individual Monitoring of Parallel-Running Batch Processes Based on MCCA
نویسندگان
چکیده
منابع مشابه
Intra-Batch Evolution Based Process Monitoring for Multiphase Batch Processes
Batch-wise variations, called intra-batch evolution here, widely exist in batch processes. In this paper, intra-batch evolution is tracked and monitored for multiphase batch processes. First, a batch cycle is divided into multiple phases. Within each phase, sliding windows are constructed for analysis of intra-batch relative variations, based on which different process modes are separated in or...
متن کاملStatistical Process Monitoring of Industrial Batch Processes
The manufacture of high-value products involves many different batch processes, for example industrial fermenters. Such processes require high levels of consistency in their operation to ensure minimal losses of raw materials, utilities and product. Recent application studies have indicated that multivariate statistical technology can provide some support when trying to maintain consistent oper...
متن کاملCoordinating Parallel Processes on Networks of Workstations Running Head: Coordinating Parallel Processes on Nows
The Network of Workstations (NOW) we consider for scheduling is heterogeneous and non-dedicated, where computing power varies among the workstations, and local and parallel jobs may interact with each other in execution. An eeective NOW scheduling scheme needs suucient information about system heterogeneity and job interactions. We use measured power weight of each workstation to quantify the d...
متن کاملBatch-to-batch Control of Batch Processes Based on Multilayer Recurrent Fuzzy Neural Network
The batch-to-batch model-based iterative optimal control strategy for batch processes is realized based on multilayer recurrent fuzzy neural network (MRFNN) and chaotic search. MRFNNs are used to model batch processes. Modeling and optimization problems are mainly solved by chaotic search. Due to model-plant mismatches and disturbances, the calculated optimal control profile may not be optimal ...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2018
ISSN: 2169-3536
DOI: 10.1109/access.2017.2784097