Gave a brief introduction to the origin,concepted and hierarchical structure of Digital Mine.As a huge complex system,Digital Mine took data base and model base to- gether as a mine data management system being its co...Gave a brief introduction to the origin,concepted and hierarchical structure of Digital Mine.As a huge complex system,Digital Mine took data base and model base to- gether as a mine data management system being its core,and Digital Mine was com- prised of five subsystems including data obtaining system,integral dispatching system, applied engineering system,data processing system,and data management system.Be- ing a digitally 3D visualized representation and a spatial information infrastructure of an actual mine,Digital Mine had three basic features such as data warehouse,information reference and digital platform.The present developments of Digital Mine in mining industry, research and education were also introduced.Examples were shown for present Digital Mine construction in China.The development trends,the key technologies and the recent construction procedures on Digital Mine were presented.展开更多
This paper proposes a simple and efficient distributed algorithm for calculating minimal dominating set in wireless sensor network. This method can avoid maintaining the connectivities between backbone hosts. Consider...This paper proposes a simple and efficient distributed algorithm for calculating minimal dominating set in wireless sensor network. This method can avoid maintaining the connectivities between backbone hosts. Considering that the hosts in mobile networks have different characteristics, this paper proposes a method of calculating minimal dominating set with weight. The nodes can be chosen to form a minimal dominating set when the network topology changes. For the host switch on/off operation, the updating algorithm was provided. The change in the status of a hostaffects only the status of hosts in the restricted vicinity. Simulation results show that the proposed method can ensure fewer dominators but with higher weight to form the minimal dominating set and the nodes can be adaptive to the changes of network topology.展开更多
This paper introduces the architecture and implementation of an industrial robot control system based on Windows NT. This robot control system, which is based on a single-processor structure, can run on general indust...This paper introduces the architecture and implementation of an industrial robot control system based on Windows NT. This robot control system, which is based on a single-processor structure, can run on general industrial computers. Owing to using Windows NT's real-time extension RTX, the control system can achieve good realtime performance and friendly user interface in one general-purpose operating system. A three layer hierarchical architecture of control software is proposed to make the system more scalable and flexible. Furthermore a communication and configuration system is implemented to enable modules to communicate with each other, which make the control system scalable and flexible.展开更多
In this article,we review the recent progress in active control of a turbulent boundary layer for skin-friction drag reduction.Near-wall coherent structures,which are closely associated with large skin-friction drag a...In this article,we review the recent progress in active control of a turbulent boundary layer for skin-friction drag reduction.Near-wall coherent structures,which are closely associated with large skin-friction drag and are thus often the target to be manipulated,are discussed briefly,providing a rationale of various control strategies.Open-and closed-loop controls are extensively reviewed,largely focusing on techniques and drag-reduction mechanisms.Finally,some concluding remarks are given.展开更多
Software Defined Networking (SDN) is an emerging networking paradigm that assumes a logically centralized control plane separated from the data plane. Despite all its advantages, separating the control and data plan...Software Defined Networking (SDN) is an emerging networking paradigm that assumes a logically centralized control plane separated from the data plane. Despite all its advantages, separating the control and data planes introduces new challenges regarding resilient communications between the two. That is, disconnec- tions between switches and their controllers could result in substantial packet loss and performance degradation. This paper addresses this challenge by studying the issue of control traffic protection in SDNs with arbitrary numbers of controllers. Specifically, we propose a control traffic protection scheme that combines both local rerouting and constrained reverse path forwarding protections, through which switches can locally react to fail- ures and redirect the control traffic using standby backup forwarding options. Our goal is then to find a set of primary routes for control traffic, called protected control network, where as many switches as possible can benefit from the proposed protection scheme. We formulate the protected control network problem, prove its NP-hardness, and develop an algorithm that reconciles proteetability and performance (e.g., switch-to-control latency). Through extensive simulations based on real topologies, we show that our approach significantly im- proves protectability of control traffic. The results should help further the process of deploying SDN in real-world networks.展开更多
基金the National 863 High-Tech.Program of China(2006AA12Z2162007AA06Z108)the Natural Science Funds of China(50525414,40571137)
文摘Gave a brief introduction to the origin,concepted and hierarchical structure of Digital Mine.As a huge complex system,Digital Mine took data base and model base to- gether as a mine data management system being its core,and Digital Mine was com- prised of five subsystems including data obtaining system,integral dispatching system, applied engineering system,data processing system,and data management system.Be- ing a digitally 3D visualized representation and a spatial information infrastructure of an actual mine,Digital Mine had three basic features such as data warehouse,information reference and digital platform.The present developments of Digital Mine in mining industry, research and education were also introduced.Examples were shown for present Digital Mine construction in China.The development trends,the key technologies and the recent construction procedures on Digital Mine were presented.
基金Supported by National Natural Science Foundation of China (No.60973141)Natural Science Foundation of Tianjin (No.09JCYBJC00300)
文摘This paper proposes a simple and efficient distributed algorithm for calculating minimal dominating set in wireless sensor network. This method can avoid maintaining the connectivities between backbone hosts. Considering that the hosts in mobile networks have different characteristics, this paper proposes a method of calculating minimal dominating set with weight. The nodes can be chosen to form a minimal dominating set when the network topology changes. For the host switch on/off operation, the updating algorithm was provided. The change in the status of a hostaffects only the status of hosts in the restricted vicinity. Simulation results show that the proposed method can ensure fewer dominators but with higher weight to form the minimal dominating set and the nodes can be adaptive to the changes of network topology.
基金Supported by National Natural Science foundation of China (No. 69975014)
文摘This paper introduces the architecture and implementation of an industrial robot control system based on Windows NT. This robot control system, which is based on a single-processor structure, can run on general industrial computers. Owing to using Windows NT's real-time extension RTX, the control system can achieve good realtime performance and friendly user interface in one general-purpose operating system. A three layer hierarchical architecture of control software is proposed to make the system more scalable and flexible. Furthermore a communication and configuration system is implemented to enable modules to communicate with each other, which make the control system scalable and flexible.
基金supported by the Research Grants Council of HKSAR (Grant No. PolyU 5350/10E)
文摘In this article,we review the recent progress in active control of a turbulent boundary layer for skin-friction drag reduction.Near-wall coherent structures,which are closely associated with large skin-friction drag and are thus often the target to be manipulated,are discussed briefly,providing a rationale of various control strategies.Open-and closed-loop controls are extensively reviewed,largely focusing on techniques and drag-reduction mechanisms.Finally,some concluding remarks are given.
基金supported in part by National High-tech R&D Program of China(863 Program)(Grant Nos.2013AA0133012015AA016101)
文摘Software Defined Networking (SDN) is an emerging networking paradigm that assumes a logically centralized control plane separated from the data plane. Despite all its advantages, separating the control and data planes introduces new challenges regarding resilient communications between the two. That is, disconnec- tions between switches and their controllers could result in substantial packet loss and performance degradation. This paper addresses this challenge by studying the issue of control traffic protection in SDNs with arbitrary numbers of controllers. Specifically, we propose a control traffic protection scheme that combines both local rerouting and constrained reverse path forwarding protections, through which switches can locally react to fail- ures and redirect the control traffic using standby backup forwarding options. Our goal is then to find a set of primary routes for control traffic, called protected control network, where as many switches as possible can benefit from the proposed protection scheme. We formulate the protected control network problem, prove its NP-hardness, and develop an algorithm that reconciles proteetability and performance (e.g., switch-to-control latency). Through extensive simulations based on real topologies, we show that our approach significantly im- proves protectability of control traffic. The results should help further the process of deploying SDN in real-world networks.