Finding the nearest volume-preserving matrix for a given matrix is studied. Amatrix equation is first obtained, which is a necessary condition for the solution to the problem.Then the equation is solved by the singula...Finding the nearest volume-preserving matrix for a given matrix is studied. Amatrix equation is first obtained, which is a necessary condition for the solution to the problem.Then the equation is solved by the singular value decomposition method. Some additional results arealso provided to further characterize the solution. Using these results, a numerical algorithm isintroduced and a numerical test is given to illustrate the effectiveness of the algorithm.展开更多
In classical nonlinear programming, it is a general method of developing optimality conditions that a nonlinear programming problem is linearized as a linear programming problem by using first order approximations of ...In classical nonlinear programming, it is a general method of developing optimality conditions that a nonlinear programming problem is linearized as a linear programming problem by using first order approximations of the functions at a given feasible point. The linearized procedure for differentiable nonlinear programming problems can be naturally generalized to the quasi differential case. As in classical case so called constraint qualifications have to be imposed on the constraint functions to guarantee that for a given local minimizer of the original problem the nullvector is an optimal solution of the corresponding 'quasilinearized' problem. In this paper, constraint qualifications for inequality constrained quasi differentiable programming problems of type min {f(x)|g(x)≤0} are considered, where f and g are qusidifferentiable functions in the sense of Demyanov. Various constraint qualifications for this problem are presented and a new one is proposed. The relations among these conditions are investigated. Moreover, a Wolf dual problem for this problem is introduced, and the corresponding dual theorems are given.展开更多
This paper discusses a fictitious domain method for the linear Dirichlet problem and its applications to the generalized Stokes problem. This method treats Dirichlet boundary condit ion via a Lagrange multiplier tec...This paper discusses a fictitious domain method for the linear Dirichlet problem and its applications to the generalized Stokes problem. This method treats Dirichlet boundary condit ion via a Lagrange multiplier technique and is well suited to the no-slip bound ary condition in viscous flow problems. In order to improve the accuracy of solu tions, meshes are refined according to the a posteriori error estimate. The mini -element discretization is applied to solve the generalized Stokes problem. Fin ally, some numerical results to validate this method are presented for partial d ifferential equations with Dirichlet boundary condition.展开更多
Numerical simulations are performed on the interface with large deformation induced by the interaction between a moving shock and two consecutive bubbles. The high performance of the level set method for multi-materia...Numerical simulations are performed on the interface with large deformation induced by the interaction between a moving shock and two consecutive bubbles. The high performance of the level set method for multi-material interfaces is demonstrated. Discontinuous Galerkin finite element method is used to solve Euleri- an equations. And the fifth-order weighted essentially non-oscillatory (WENO) scheme is used to solve the level set equation for capturing multi-material interfaces. The ghost fluid method is used to deal with the interfacial boundary condition. Results are obtained for two bubble interacting with a moving shock. The contours of the constant density and the pressure at different time are given. In the computational domain, three different cases are considered, i.e. two helium bubbles, a helium bubble followed by an R22 bubble in the direction of the moving shock, and an R22 bubble followed by a helium bubble. Computational results indicate that multi-mate- rial interfaces can be properly captured by the level set method. Therefore, for problems involving the flow of three different materials with two different interfaces, each interface separating two different materials can be similarly handled.展开更多
A class of quasilinear singularly perturbed problems with boundary perturbation is considered. Under suitable conditions, using theory of differential inequalities we studied the asymptotic behavior of the solution fo...A class of quasilinear singularly perturbed problems with boundary perturbation is considered. Under suitable conditions, using theory of differential inequalities we studied the asymptotic behavior of the solution for the boundary value problem.展开更多
Most resource allocation algorithms are based on interference power constraint in cognitive radio networks.Instead of using conventional primary user interference constraint,we give a new criterion called allowable si...Most resource allocation algorithms are based on interference power constraint in cognitive radio networks.Instead of using conventional primary user interference constraint,we give a new criterion called allowable signal to interference plus noise ratio(SINR) loss constraint in cognitive transmission to protect primary users.Considering power allocation problem for cognitive users over flat fading channels,in order to maximize throughput of cognitive users subject to the allowable SINR loss constraint and maximum transmit power for each cognitive user,we propose a new power allocation algorithm.The comparison of computer simulation between our proposed algorithm and the algorithm based on interference power constraint is provided to show that it gets more throughput and provides stability to cognitive radio networks.展开更多
With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality...With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.展开更多
Objectives:lnterprofessional collaboration in the training of nursing and psychology students helps provide students of both disciplines with the ability and competences they need to best attend to their patients.This...Objectives:lnterprofessional collaboration in the training of nursing and psychology students helps provide students of both disciplines with the ability and competences they need to best attend to their patients.This study implemented and analyzed a method for developing the competences of each discipline in a scenario of joint clinical simulation that incorporates mental and physical health simultaneously,and measured the caring ability of the participating students.Methods:Participants took a self-applied survey measuring their own caring ability.After,a clinical simulation was performed where nursing students performed clinical interviews on psychology students,who acted as standardized patients.Caring abilities were measured in the nursing students,and the psychology students implemented an intervention service measuring caring ability and brief-debrief simulation by coaching to nursing students.Results:The results indicated that the self-applied questionnaire of caring ability resulted in scores significantly higher than what was measured by observers.Conclusions:The results contribute to the development of protocols,training and collaborative work practices in interprofessional education,which allow the scaling of these competences.展开更多
One of the key problems in the use of underground gas storage is frequent leakage. It can lead to the actual gas storage amount being less than that accounted for. Combining numerical simulation and parameter auto fit...One of the key problems in the use of underground gas storage is frequent leakage. It can lead to the actual gas storage amount being less than that accounted for. Combining numerical simulation and parameter auto fit, this paper ascertains the dynamic variation of the pressure in the storage reservoir, adjusts the actual injecting and producing gas to fit the accounted pressure with the tested pressure, obtains the gas leakage of the storage, and then determines the difference between accounted amount and leakage amount. The result is the actual reserves of the storage. The simulation result shows that the method presented can provide a theoretic foundation for estimating the leakage amount, thereby ensuring the actual reserves, searching the leakage route, and reducing leakage by adjusting the storage method.展开更多
In thsssse cellular network, Relay Stations (RSs) help to improve the system performance; however, little work has been done considering the fairness of RSs. In this paper, we study the cooperative game approaches for...In thsssse cellular network, Relay Stations (RSs) help to improve the system performance; however, little work has been done considering the fairness of RSs. In this paper, we study the cooperative game approaches for scheduling in the wireless relay networks with two-virtual-antenna array mode. After defining the metric of relay channel capacity, we form a cooperative game for scheduling and present the interpretation of three different utilization objectives physically and mathematically. Then, a Nash Bargaining Solution (NBS) is utilized for resource allocation considering the traffic load fairness for relays. After proving the existence and uniqueness of NBS in Cooperative Game (CG-NBS), we are able to resolve the resource allocation problem in the cellular relay network by the relay selection and subcarrier assignment policy and the power allocation algorithm for both RSs and UEs. Simulation results reveal that the proposed CG-NBS scheme achieves better tradeoff between relay fairness and system throughput than the conventional Maximal Rate Optimization and Maximal Minimal Fairness methods.展开更多
The examination of an unstructured finite volume method for structural dynamics is assessed for simulations of systematic impact dynamics. A robust display dual-time stepping method is utilized to obtain time accurate...The examination of an unstructured finite volume method for structural dynamics is assessed for simulations of systematic impact dynamics. A robust display dual-time stepping method is utilized to obtain time accurate solutions. The study of impact dynamics is a complex problem that should consider strength models and state equations to describe the mechanical behavior of materials. The current method has several features, l) Discrete equations of unstructured finite volume method naturally follow the conservation law. 2) Display dual-time stepping method is suitable for the analysis of impact dynamic problems of time accurate solutions. 3) The method did not produce grid distortion when large deformation appeared. The method is validated by the problem of impact dynamics of an elastic plate with initial conditions and material properties. The results validate the finite element numerical data展开更多
In the network virtualization environments, one of the most challenges is how to map the virtual networks(VNs) onto a shared substrate network managed by an infrastructure provider(In P), which is termed as virtual ne...In the network virtualization environments, one of the most challenges is how to map the virtual networks(VNs) onto a shared substrate network managed by an infrastructure provider(In P), which is termed as virtual network embedding problem. Prior studies on this issue only emphasize on maximizing the revenue or minimizing the energy consumption while ignoring the reliability requirements of end-users. In our work, we incorporate the reliability probability into the virtual network embedding process with an aim to improve the Qo S/Qo E of end users from a new perspective. We devised two novel reliable virtual network embedding algorithms called RRW-Max Match and RDCC-VNE based on RW-Max Match and DCC-VNE, respectively. Extensive simulations demonstrated that the efficiency of our proposed algorithms is better than those of two primitive algorithms in terms of the reliability demands, the acceptance ratio of virtual networks and the long-term average revenue.展开更多
This paper has been done on study kinematic problem of Persian joint in a general way. In this study, instead of using simulation analysis method as in the previous researches, the 3D rotation matrix method is applied...This paper has been done on study kinematic problem of Persian joint in a general way. In this study, instead of using simulation analysis method as in the previous researches, the 3D rotation matrix method is applied to present the relationship of angular velocities of input shaft and output shaft. The result shows that when the angle between intersecting shafts changes from 0 to 135°, the angular velocity is maintained constant. This new result completely matches with analysis from kinematic simulation of this mechanism. The obtained result is an important base to solve dynamic problem in order to develop the applicability of this joint in reality.展开更多
The northern Batinah occupies approximately 12,150 km2 in the north of Oman Quaternary deposits and Neogene's upper Fats form the aquifer units. MODFLOW compatible MT3D was used for simulation development of the area...The northern Batinah occupies approximately 12,150 km2 in the north of Oman Quaternary deposits and Neogene's upper Fats form the aquifer units. MODFLOW compatible MT3D was used for simulation development of the area. It can be concluded that: (1) The groundwater in the Batinah area generally flows from the south-west to the gulf of Oman in the north-east; (2) Recharge takes place through direct recharge from rainfall and wadi flow by about 902 ×10^3 ma/day; (3) The hydraulic conductivity attains a relatively wide range between 0.02 m/day and 78 m/day and 0.02 m/day and 60 m/day for the Quaternary and Fars respectively; (4) There is probably less potential for groundwater abstraction in the northern part of the area; (5) The water level decreased by about 6 m over 24 years and (6) The increase of salinity most likely due to a contribution of sea water intrusion from the gulf along the coast. It is recommended that: (1) automatic well control system should be installed to accurate measurements of abstraction; (2) further analysis under different future scenarios should be made and (3) formulate an integrated management plan for the basin.展开更多
Virtualization is a common technology for resource sharing in data center. To make efficient use of data center resources, the key challenge is to map customer demands (modeled as virtual data center, VDC) to the ph...Virtualization is a common technology for resource sharing in data center. To make efficient use of data center resources, the key challenge is to map customer demands (modeled as virtual data center, VDC) to the physical data center effectively. In this paper, we focus on this problem. Distinct with previous works, our study of VDC embedding problem is under the assumption that switch resource is the bottleneck of data center networks (DCNs). To this end, we not only propose relative cost to evaluate embedding strategy, decouple embedding problem into VM placement with marginal resource assignment and virtual link mapping with decided source-destination based on the property of fat-tree, but also design the traffic aware embedding algorithm (TAE) and first fit virtual link mapping (FFLM) to map virtual data center requests to a physical data center. Simulation results show that TAE+FFLM could increase acceptance rate and reduce network cost (about 49% in the case) at the same time. The traffie aware embedding algorithm reduces the load of core-link traffic and brings the optimization opportunity for data center network energy conservation.展开更多
A finite volume algorithm was established in order to investigate two-dimensional hydrodynamic problems. These include viscous free surface flow interaction with free rigid bodies in the case of large and/or relative ...A finite volume algorithm was established in order to investigate two-dimensional hydrodynamic problems. These include viscous free surface flow interaction with free rigid bodies in the case of large and/or relative motions. Two-phase flow with complex deformations at the interface was simulated using a fractional step-volume of fluid algorithm. In addition, body motions were captured by an overlapping mesh system. Here, flow variables are transferred using a simple fully implicit non-conservative interpolation scheme which maintains the second-order accuracy of implemented spatial discretisation. Code was developed and an appropriate set of problems investigated. Results show good potential for development of a virtual hydrodynamics laboratory.展开更多
This paper illustrates the use of a general purpose differential equation (DE) solver called FlexPDE for the solution heat transfer problems in electric wire. FlexPDE uses the finite element method for the solution ...This paper illustrates the use of a general purpose differential equation (DE) solver called FlexPDE for the solution heat transfer problems in electric wire. FlexPDE uses the finite element method for the solution of boundary and initial value problems. A flexible input of the governing DE's and of material properties functions allows the simulation of non-linear variable behavior quickly and inexpensively. A modeling of temperature distribution in one-dimensional problem, a cross section of an electric wire was simulated. Comparison of those results obtained by FlexPDE with analytical and numerical solutions are done. The results compared well with those obtained from the analytical and numerical methods. The adaptability of the FlexPDE software for solving a variety of problem types was clearly demonstrated.展开更多
A non-equilibrium model of multicomponent melt solidification has been developed in which a Stefan problem with two boundaries is solved numerically, the boundaries being between the solid phase and the two-phase tran...A non-equilibrium model of multicomponent melt solidification has been developed in which a Stefan problem with two boundaries is solved numerically, the boundaries being between the solid phase and the two-phase transition zone and between the two-phase transition zone and the liquid phase. The two-phase zone is represented as a porous medium with variable porosity. The additional force resisting the melt flow due to porosity and introduced by analogy with Darcy's law is taken into account. Computer simulation has been performed of the experiment on Sn-20 wt.%Pb binary alloy solidification by the method of downward-directed crystallization along the gravity vector. The paper shows the results of a quasi two-dimensional benchmark experiment on horizontal (i.e., at the right angle to the gravity vector) directional solidification of a binary Sn-3 wt.%Pb alloy. The calculations were done using two crystallization models: the equilibrium model and the non-equilibrium one. It is shown that the non-equilibrium model gives a better description of the thermal field evolution and solute distribution caused by natural convection.展开更多
文摘Finding the nearest volume-preserving matrix for a given matrix is studied. Amatrix equation is first obtained, which is a necessary condition for the solution to the problem.Then the equation is solved by the singular value decomposition method. Some additional results arealso provided to further characterize the solution. Using these results, a numerical algorithm isintroduced and a numerical test is given to illustrate the effectiveness of the algorithm.
文摘In classical nonlinear programming, it is a general method of developing optimality conditions that a nonlinear programming problem is linearized as a linear programming problem by using first order approximations of the functions at a given feasible point. The linearized procedure for differentiable nonlinear programming problems can be naturally generalized to the quasi differential case. As in classical case so called constraint qualifications have to be imposed on the constraint functions to guarantee that for a given local minimizer of the original problem the nullvector is an optimal solution of the corresponding 'quasilinearized' problem. In this paper, constraint qualifications for inequality constrained quasi differentiable programming problems of type min {f(x)|g(x)≤0} are considered, where f and g are qusidifferentiable functions in the sense of Demyanov. Various constraint qualifications for this problem are presented and a new one is proposed. The relations among these conditions are investigated. Moreover, a Wolf dual problem for this problem is introduced, and the corresponding dual theorems are given.
文摘This paper discusses a fictitious domain method for the linear Dirichlet problem and its applications to the generalized Stokes problem. This method treats Dirichlet boundary condit ion via a Lagrange multiplier technique and is well suited to the no-slip bound ary condition in viscous flow problems. In order to improve the accuracy of solu tions, meshes are refined according to the a posteriori error estimate. The mini -element discretization is applied to solve the generalized Stokes problem. Fin ally, some numerical results to validate this method are presented for partial d ifferential equations with Dirichlet boundary condition.
基金Supported by the National Natural Science Foundation of China(10476011)~~
文摘Numerical simulations are performed on the interface with large deformation induced by the interaction between a moving shock and two consecutive bubbles. The high performance of the level set method for multi-material interfaces is demonstrated. Discontinuous Galerkin finite element method is used to solve Euleri- an equations. And the fifth-order weighted essentially non-oscillatory (WENO) scheme is used to solve the level set equation for capturing multi-material interfaces. The ghost fluid method is used to deal with the interfacial boundary condition. Results are obtained for two bubble interacting with a moving shock. The contours of the constant density and the pressure at different time are given. In the computational domain, three different cases are considered, i.e. two helium bubbles, a helium bubble followed by an R22 bubble in the direction of the moving shock, and an R22 bubble followed by a helium bubble. Computational results indicate that multi-mate- rial interfaces can be properly captured by the level set method. Therefore, for problems involving the flow of three different materials with two different interfaces, each interface separating two different materials can be similarly handled.
基金Project supported by the National Natural Science Foundation of China (No. 90211004)the Hundred Talents Project of Chinese Academy of Sciences, China
文摘A class of quasilinear singularly perturbed problems with boundary perturbation is considered. Under suitable conditions, using theory of differential inequalities we studied the asymptotic behavior of the solution for the boundary value problem.
基金ACKNOWLEDGEMENTS This work is supported by National Natural Science Foundation of China (No. 61171079). The authors would like to thank the editors and the anonymous reviewers for their detailed constructive comments that helped to improve the presentation of this paper.
文摘Most resource allocation algorithms are based on interference power constraint in cognitive radio networks.Instead of using conventional primary user interference constraint,we give a new criterion called allowable signal to interference plus noise ratio(SINR) loss constraint in cognitive transmission to protect primary users.Considering power allocation problem for cognitive users over flat fading channels,in order to maximize throughput of cognitive users subject to the allowable SINR loss constraint and maximum transmit power for each cognitive user,we propose a new power allocation algorithm.The comparison of computer simulation between our proposed algorithm and the algorithm based on interference power constraint is provided to show that it gets more throughput and provides stability to cognitive radio networks.
基金Project (No. 60373088) supported by the National Natural ScienceFoundation of China
文摘With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.
文摘Objectives:lnterprofessional collaboration in the training of nursing and psychology students helps provide students of both disciplines with the ability and competences they need to best attend to their patients.This study implemented and analyzed a method for developing the competences of each discipline in a scenario of joint clinical simulation that incorporates mental and physical health simultaneously,and measured the caring ability of the participating students.Methods:Participants took a self-applied survey measuring their own caring ability.After,a clinical simulation was performed where nursing students performed clinical interviews on psychology students,who acted as standardized patients.Caring abilities were measured in the nursing students,and the psychology students implemented an intervention service measuring caring ability and brief-debrief simulation by coaching to nursing students.Results:The results indicated that the self-applied questionnaire of caring ability resulted in scores significantly higher than what was measured by observers.Conclusions:The results contribute to the development of protocols,training and collaborative work practices in interprofessional education,which allow the scaling of these competences.
文摘One of the key problems in the use of underground gas storage is frequent leakage. It can lead to the actual gas storage amount being less than that accounted for. Combining numerical simulation and parameter auto fit, this paper ascertains the dynamic variation of the pressure in the storage reservoir, adjusts the actual injecting and producing gas to fit the accounted pressure with the tested pressure, obtains the gas leakage of the storage, and then determines the difference between accounted amount and leakage amount. The result is the actual reserves of the storage. The simulation result shows that the method presented can provide a theoretic foundation for estimating the leakage amount, thereby ensuring the actual reserves, searching the leakage route, and reducing leakage by adjusting the storage method.
基金supported in part by the State Major Science and Technology Special Projects under Grant No. 2012ZX03004001the National Basic Research Program (973) of China under Grants No. 2012CB315801, No. 2011CB302901the Chinese Universities Scientific Fund under Grant No. 2012RC0306
文摘In thsssse cellular network, Relay Stations (RSs) help to improve the system performance; however, little work has been done considering the fairness of RSs. In this paper, we study the cooperative game approaches for scheduling in the wireless relay networks with two-virtual-antenna array mode. After defining the metric of relay channel capacity, we form a cooperative game for scheduling and present the interpretation of three different utilization objectives physically and mathematically. Then, a Nash Bargaining Solution (NBS) is utilized for resource allocation considering the traffic load fairness for relays. After proving the existence and uniqueness of NBS in Cooperative Game (CG-NBS), we are able to resolve the resource allocation problem in the cellular relay network by the relay selection and subcarrier assignment policy and the power allocation algorithm for both RSs and UEs. Simulation results reveal that the proposed CG-NBS scheme achieves better tradeoff between relay fairness and system throughput than the conventional Maximal Rate Optimization and Maximal Minimal Fairness methods.
文摘The examination of an unstructured finite volume method for structural dynamics is assessed for simulations of systematic impact dynamics. A robust display dual-time stepping method is utilized to obtain time accurate solutions. The study of impact dynamics is a complex problem that should consider strength models and state equations to describe the mechanical behavior of materials. The current method has several features, l) Discrete equations of unstructured finite volume method naturally follow the conservation law. 2) Display dual-time stepping method is suitable for the analysis of impact dynamic problems of time accurate solutions. 3) The method did not produce grid distortion when large deformation appeared. The method is validated by the problem of impact dynamics of an elastic plate with initial conditions and material properties. The results validate the finite element numerical data
基金supported by "the Fundamental Research Funds for the Central Universities" of China University of Petroleum(East China)(Grant No.18CX02139A)the Shandong Provincial Natural Science Foundation,China(Grant No.ZR2014FQ018)+3 种基金the National Natural Science Foundation of China(Grant No.61471056)the National Basic Research Program(973)of China(Grant No.2012CB315801)the Research on coordinated management and control technology of network and satellite multi-domain network resources(Grant No.17-H863-01-ZT-001-001-02)the China research project on key technology strategy of infrastructure security for information network development
文摘In the network virtualization environments, one of the most challenges is how to map the virtual networks(VNs) onto a shared substrate network managed by an infrastructure provider(In P), which is termed as virtual network embedding problem. Prior studies on this issue only emphasize on maximizing the revenue or minimizing the energy consumption while ignoring the reliability requirements of end-users. In our work, we incorporate the reliability probability into the virtual network embedding process with an aim to improve the Qo S/Qo E of end users from a new perspective. We devised two novel reliable virtual network embedding algorithms called RRW-Max Match and RDCC-VNE based on RW-Max Match and DCC-VNE, respectively. Extensive simulations demonstrated that the efficiency of our proposed algorithms is better than those of two primitive algorithms in terms of the reliability demands, the acceptance ratio of virtual networks and the long-term average revenue.
文摘This paper has been done on study kinematic problem of Persian joint in a general way. In this study, instead of using simulation analysis method as in the previous researches, the 3D rotation matrix method is applied to present the relationship of angular velocities of input shaft and output shaft. The result shows that when the angle between intersecting shafts changes from 0 to 135°, the angular velocity is maintained constant. This new result completely matches with analysis from kinematic simulation of this mechanism. The obtained result is an important base to solve dynamic problem in order to develop the applicability of this joint in reality.
文摘The northern Batinah occupies approximately 12,150 km2 in the north of Oman Quaternary deposits and Neogene's upper Fats form the aquifer units. MODFLOW compatible MT3D was used for simulation development of the area. It can be concluded that: (1) The groundwater in the Batinah area generally flows from the south-west to the gulf of Oman in the north-east; (2) Recharge takes place through direct recharge from rainfall and wadi flow by about 902 ×10^3 ma/day; (3) The hydraulic conductivity attains a relatively wide range between 0.02 m/day and 78 m/day and 0.02 m/day and 60 m/day for the Quaternary and Fars respectively; (4) There is probably less potential for groundwater abstraction in the northern part of the area; (5) The water level decreased by about 6 m over 24 years and (6) The increase of salinity most likely due to a contribution of sea water intrusion from the gulf along the coast. It is recommended that: (1) automatic well control system should be installed to accurate measurements of abstraction; (2) further analysis under different future scenarios should be made and (3) formulate an integrated management plan for the basin.
基金This research was partially supported by the National Grand Fundamental Research 973 Program of China under Grant (No. 2013CB329103), Natural Science Foundation of China grant (No. 61271171), the Fundamental Research Funds for the Central Universities (ZYGX2013J002, ZYGX2012J004, ZYGX2010J002, ZYGX2010J009), Guangdong Science and Technology Project (2012B090500003, 2012B091000163, 2012556031).
文摘Virtualization is a common technology for resource sharing in data center. To make efficient use of data center resources, the key challenge is to map customer demands (modeled as virtual data center, VDC) to the physical data center effectively. In this paper, we focus on this problem. Distinct with previous works, our study of VDC embedding problem is under the assumption that switch resource is the bottleneck of data center networks (DCNs). To this end, we not only propose relative cost to evaluate embedding strategy, decouple embedding problem into VM placement with marginal resource assignment and virtual link mapping with decided source-destination based on the property of fat-tree, but also design the traffic aware embedding algorithm (TAE) and first fit virtual link mapping (FFLM) to map virtual data center requests to a physical data center. Simulation results show that TAE+FFLM could increase acceptance rate and reduce network cost (about 49% in the case) at the same time. The traffie aware embedding algorithm reduces the load of core-link traffic and brings the optimization opportunity for data center network energy conservation.
文摘A finite volume algorithm was established in order to investigate two-dimensional hydrodynamic problems. These include viscous free surface flow interaction with free rigid bodies in the case of large and/or relative motions. Two-phase flow with complex deformations at the interface was simulated using a fractional step-volume of fluid algorithm. In addition, body motions were captured by an overlapping mesh system. Here, flow variables are transferred using a simple fully implicit non-conservative interpolation scheme which maintains the second-order accuracy of implemented spatial discretisation. Code was developed and an appropriate set of problems investigated. Results show good potential for development of a virtual hydrodynamics laboratory.
文摘This paper illustrates the use of a general purpose differential equation (DE) solver called FlexPDE for the solution heat transfer problems in electric wire. FlexPDE uses the finite element method for the solution of boundary and initial value problems. A flexible input of the governing DE's and of material properties functions allows the simulation of non-linear variable behavior quickly and inexpensively. A modeling of temperature distribution in one-dimensional problem, a cross section of an electric wire was simulated. Comparison of those results obtained by FlexPDE with analytical and numerical solutions are done. The results compared well with those obtained from the analytical and numerical methods. The adaptability of the FlexPDE software for solving a variety of problem types was clearly demonstrated.
文摘A non-equilibrium model of multicomponent melt solidification has been developed in which a Stefan problem with two boundaries is solved numerically, the boundaries being between the solid phase and the two-phase transition zone and between the two-phase transition zone and the liquid phase. The two-phase zone is represented as a porous medium with variable porosity. The additional force resisting the melt flow due to porosity and introduced by analogy with Darcy's law is taken into account. Computer simulation has been performed of the experiment on Sn-20 wt.%Pb binary alloy solidification by the method of downward-directed crystallization along the gravity vector. The paper shows the results of a quasi two-dimensional benchmark experiment on horizontal (i.e., at the right angle to the gravity vector) directional solidification of a binary Sn-3 wt.%Pb alloy. The calculations were done using two crystallization models: the equilibrium model and the non-equilibrium one. It is shown that the non-equilibrium model gives a better description of the thermal field evolution and solute distribution caused by natural convection.