Beijing Special Engineering Design and Research Institute

Design and, China

Beijing Special Engineering Design and Research Institute

Design and, China
SEARCH FILTERS
Time filter
Source Type

Zhang H.,Dalian University of Technology | Li Q.,Dalian University of Technology | Zhang X.,Beijing Special Engineering Design and Research Institute | Ba W.,China Institute of Technology
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2017

Pipeline transportation plays a significant role in modern industry, and it is an important way to transport many kinds of oils and natural gases. Industrial oil pipeline leakage will cause many unexpected circumstances, such as soil pollution, air pollution, casualties and economic losses. An extreme learning machine (ELM) method is proposed to detect the pipeline leakage online. The algorithm of ELM has been optimized based on the traditional neural network, so the training speed of ELM is much faster than traditional ones, also the generalization ability has become stronger. The industrial oil pipeline leakage simulation experiments are studied. The simulation results showed that the performance of ELM is better than BP and RBF neural networks on the pipeline leakage classification accuracy and speed. © Springer International Publishing AG 2017.


Niu J.-J.,Tsinghua National Laboratory for Information Sciences and Technology | Niu J.-J.,Beijing Special Engineering Design and Research Institute | Deng Z.-D.,Tsinghua National Laboratory for Information Sciences and Technology | Li C.,Tsinghua National Laboratory for Information Sciences and Technology
Zidonghua Xuebao/Acta Automatica Sinica | Year: 2011

Wireless sensor network (WSN) is a resource constrained network system. Many kinds of scheduling approaches have been proposed to improve the performances of WSN. In this paper, the design principles and classification methods for distributed scheduling approaches of WSN are summarized. And the scheduling approaches are discussed and classified with respect to scheduling object. The fundamental mechanisms of some typical approaches are discussed further and the characteristics of each class are analyzed in detail. Comparison between the designed objects and the performance features of these scheduling approaches are presented. Finally, the current research situations for distributed scheduling approaches of WSN are summarized and the key aspects for further research are also suggested. Copyright © 2011 Acta Automatica Sinica.


Xiao L.,Tsinghua University | Xiao L.,Beijing Special Engineering Design and Research Institute | Gu M.,Tsinghua University | Sun J.,Tsinghua University
Communications in Computer and Information Science | Year: 2011

PLC is widely used in the field of automatic control. The correctness verification methods of PLC programs include software model checking and theorem proving, etc. To use formal methods verifying the correctness of PLC programs, denotational semantics needs to define and then PLC programs can be modeled, model checking and verified. Based on the extended λ-calculus definition, the paper has researched and defined the architecture and denotational semantics of PLC programs. The work is the basis of model checking and theorem proving for correctness verification on PLC programs. © 2011 Springer-Verlag.


Wang J.,Dalian University of Technology | Han F.,Tsinghua University | Cheng G.,Beijing Special Engineering Design and Research Institute | Zhao F.,Dalian University of Technology
International Journal of Machine Tools and Manufacture | Year: 2012

Debris accumulation in the discharge gap causes a poor machining stability and low production efficiency. Thus, an understanding on the mechanism of debris exclusion in electrical discharge machining is important. However, to date, this mechanism has not been fully understood because of the difficulty in observing debris movements in discharge gaps. The current study established a series of experimental devices using transparent materials to observe debris and bubble movements. Based on the observations, the mechanism of debris and bubble exclusion during consecutive pulse discharges is analyzed, and the effects of the electrode jump height and speed on the debris and bubble movements are investigated. In addition, the effectiveness of the debris and bubble movements on machining efficiency is discussed. © 2012 Elsevier Ltd. All rights reserved.


Ding Y.H.,Wuhan Polytechnic University | Xiang R.H.,Beijing Special Engineering Design and Research Institute
Advanced Materials Research | Year: 2014

Business developer needs to develop fault-tolerant process, but fault-tolerant process development based on exception handling mechanism provided by BPEL costs much time and is easy to make mistake. We analyze application exception throw chain theory of service-oriented system. Exception throwing of BPEL process is broadcasted among component layer, service layer and process layer. We also propose an application exception handling method for BPEL by using EHPDL-P. EHPDL-P can separate normal business logic and exception business logic, and thus it can enhance BPEL fault-tolerance ability. © (2014) Trans Tech Publications, Switzerland.


Zhou W.,National University of Defense Technology | Wang D.,Beijing Special Engineering Design and Research Institute | Sheng J.,National University of Defense Technology | Guo B.,National University of Defense Technology
Journal of Systems Engineering and Electronics | Year: 2012

A collaborative optimization model for maintenance and spare ordering of a single-unit degrading system is proposed in this paper based on the continuous detection. A gamma distribution is used to model the material degradation. The degrading decrement after the imperfect maintenance action is assumed as a random variable normal distribution. This model aims to obtain the optimal maintenance policy and spare ordering point with the expected cost rate within system lifecycle as the optimization objective. The rationality and feasibility of the model are proved through a numerical example.


Liu W.,Beijing Special Engineering Design and Research Institute | Liu Q.,Beijing Special Engineering Design and Research Institute | Li W.,Beijing Special Engineering Design and Research Institute
Lecture Notes in Electrical Engineering | Year: 2016

With the development of IoT technology, it will be ubiquitous for the communication between machine to machine, machine to infrastructure, machine to human beings, and machine to any other intelligent things. IoT is being of great importance for MSLS. The research focuses on the application of IoT technology in manned spaceflight launch site (MSLS in short). The application framework is designed in this article. The framework consist of three layers: sensing layer, network and data layer, and application layer. The future application of IoT in MSLS will focus on technologies of cloud computing and big data processing and data mining. Meanwhile, we also discussed the key technologies of this framework and the huge potentials of IoT. © Springer India 2016.


Ding Y.H.,Wuhan Polytechnic University | Xiang R.H.,Beijing Special Engineering Design and Research Institute
Proceedings of 2013 International Conference on Sensor Network Security Technology and Privacy Communication System, SNS and PCS 2013 | Year: 2013

Exception handling is a time-consuming and easy to make error task. Especially in service-oriented architecture, exception throw chain becomes complicated particularly, so it improves requirements of exception capture and exception handling. This paper analyzes service-oriented exception produce source and proposes service-oriented exception classification. The exception classification divides exception into service layer exception and process exception. The two kinds of exception are subdivided into system exception, resource exception and application exception. This paper presents a corresponding exception handling method for all kinds of exceptions. The method can enhance robustness of service layer and process layer for service-oriented system. © 2013 IEEE.


Niu J.,Intelligent Systems Technology, Inc. | Niu J.,Beijing Special Engineering Design and Research Institute | Deng Z.,Intelligent Systems Technology, Inc.
Ad Hoc Networks | Year: 2013

Energy constraints pose great challenges to wireless sensor network (WSN) with battery-powered nodes. But the reduction of energy consumption often introduces additional latency of data delivery. In this paper, a new distributed scheduling approach, self-learning scheduling approach (SSA), is presented in order to reduce energy consumption and to achieve low latency for WSN. This approach, extending the Q-learning method, enables nodes to learn continuous transmission parameter and sleep parameter through interacting with the WSN. We compare SSA with S-MAC protocol and DW-MAC protocol using simulations. The results show that the SSA can make nodes to learn the optimal scheduling policy gradually. The results under different work loads also exhibit that SSA performs much better than S-MAC protocol and DW-MAC protocol in terms of energy consumption and throughput. With regard to latency and maximum queue length, SSA also outperforms the other two MAC protocols in the scenarios, where the collision is serious and the work load is heavy. © 2011 Elsevier B.V. All rights reserved.


Niu J.,Intelligent Systems Technology, Inc. | Niu J.,Beijing Special Engineering Design and Research Institute
Proceedings of the 2010 2nd International Conference on Future Computer and Communication, ICFCC 2010 | Year: 2010

Energy efficiency is one of key issues of wireless sensor network (WSN). In this paper, we propose a self-learning scheduling approach (SSA) to reduce energy consumption for wireless sensor network (WSN). This approach integrates sleep scheduling together with packet transmission scheduling to reduce energy consumption. It enables nodes to learn continuous transmission parameters and sleep parameter through interacting with the WSN. The continuous value of transmission parameter is achieved by our extension of Q-learning method, and the value of sleep parameter can be calculated from the transmission parameter. We valid this approach in a MAC protocol and compare some network performances between the SSA and SMAC protocol. The simulation results show that our SSA performs much better than SMAC protocol in these QoS metrics. ©2010 IEEE.

Loading Beijing Special Engineering Design and Research Institute collaborators
Loading Beijing Special Engineering Design and Research Institute collaborators