Different paradigms that relate verification and validation to the simulation model have different development process. A simulation model developing process based on Five-Object Framework (FOF) is discussed in this p...Different paradigms that relate verification and validation to the simulation model have different development process. A simulation model developing process based on Five-Object Framework (FOF) is discussed in this paper. An example is given to demonstrate the applications of the proposed method.展开更多
This paper studies the problem of deriving an interface automata model from UML statechart, in which, interface automata is a formaliged model for describing component behavior in an open system, but there is no unive...This paper studies the problem of deriving an interface automata model from UML statechart, in which, interface automata is a formaliged model for describing component behavior in an open system, but there is no universal criterion for deriving behavior from component to construct the model. UML is a widely used modeling standard, yet it is very difficult to apply it to system verification and testing directly for its imprecise semantics. After analyzing the expression ability of the two models, several transforma- tion rules are defined and each step of transformation is described in detail, after that, the approach is illustrated with an example. The paper provides a method for acquiring interface automata and lays the foundation for related research.展开更多
Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue a...Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model.展开更多
Some mechanistic models have been proposed to predict the No3- concentrations in the soil solution at root surface and the NO3-N uptake by plants, but all these relatively effective non-steady state models have not ye...Some mechanistic models have been proposed to predict the No3- concentrations in the soil solution at root surface and the NO3-N uptake by plants, but all these relatively effective non-steady state models have not yet been verified by any soil culture experiment. In the present study, a mathematical model based on the nutrient transport to the roots, root length and root uptake kinetics as well as taking account of the inter-root competition was used for calculation, and soil culture experiments with rice, wheat and rape plants grown on alkali, neutral and acid soils in rhizoboxes with nylon screen as a isolator were carried out to evaluate the prediction ability of the model through comparing the measured NO3-concentrations at root surface and N uptake with the calculated values. Whether the inter-root competition for nutrients was accounted for in the model was of less importance to the calculated N uptake but could induce significant changes in the relative concentrations of NO3- at root surface. For the three soils and crops, the measured NO3-N uptake agreed well with the calculated one, and the calculated relative concentrations at root surface were approximate to the measured values. But an appropriate rectification for some conditions is necessary when the plant uptake parameter obtained in solution culture experiment is applied to soil culture. In contrast with the present non-steady state model, the predicted relative concentrations, which show an accumulation, by the Phillips' steady-state model were distinct from the measured values which show a depletion, indicating that the present model has a better prediction ability than the steady-state model.展开更多
To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key...To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes .展开更多
This paper is on control system design for visual based indoor inspection by the model helicopters. For the indoor inspection system for large structures, there are some cases where it is difficult for htunans to work...This paper is on control system design for visual based indoor inspection by the model helicopters. For the indoor inspection system for large structures, there are some cases where it is difficult for htunans to work with. This paper introduces indoor inspection helicopter system with only inspection camera and prism for position sensing as payload. The control system is designed to help the operator of the inspection system to control the helicopter to designated position without much practice. The cases of the control by experienced and novice operators are compared and results show that the system has feasibility for indoor inspection system to be used by any kind of users.展开更多
Traffic simulation models have the potential to provide an objective, cost-effective and flexible approach to assessing system design, traffic operations and management strategies. In that regard, the calibration and ...Traffic simulation models have the potential to provide an objective, cost-effective and flexible approach to assessing system design, traffic operations and management strategies. In that regard, the calibration and validation of simulation model is crucial for appropriate decision making process. This paper presents an application of microscopic simulation model calibration and validation procedure for a multimodal urban traffic network. Model is developed by VISSIM and VISSIG software tools.展开更多
A model to predict the double leakage and tip leakage leading edge spillage flows was developed. This model was combined by a TLV trajectory model and a TLV diameter model and formed as a function of compressor one-di...A model to predict the double leakage and tip leakage leading edge spillage flows was developed. This model was combined by a TLV trajectory model and a TLV diameter model and formed as a function of compressor one-dimensional design parameters, i.e. the compressor massflow coefficient, Ф and compressor loading coeffi- cient, ψ, and some critical blade geometrical parameters, i.e. blade solidity, a, stagger angle, βs, blade chord length, C, and blade pitch length, S. By using this model, the double leakage and tip leakage leading edge spillage flow could be predicted even at the compressor preliminary design process. Considering the leading edge spillage flow usually indicates the inception of spike-type stall, i.e. the compressor is a tip critical design, this model could also be used as a tool to choose the critical design parameters for designers. At last, some experimental data from literature was used to validate the model and the results proved that the model was reliable.展开更多
For a variable speed large scale wind turbine, the vibration issues become a key problem that cannot be ignored in the turbine's life cycle. Wind turbine tower vibration will cause superfluous mechanical loads. To re...For a variable speed large scale wind turbine, the vibration issues become a key problem that cannot be ignored in the turbine's life cycle. Wind turbine tower vibration will cause superfluous mechanical loads. To resolve the vibration issue, a method for constructng the energy function V is proposed to meet the demands of safe operation. The Lyapunov theorem has been em- bedded in a wind turbine control algorithm, proving the theoretical feasibility of stability control based on function V. Accord- ing to an analysis of this complex nonlinear model for the wind turbine, the general method of constructing an energy function suitable for a wind turbine is presented explicitly. The feasibility of applying an energy function to wind turbine vibration con- trol is verified experimentally using a 3.0-MW direct drive wind turbine model. The experimental results indicate that the dy- namic performance of the tested wind turbine model with energy function control is significantly better than that of the uncon- trolled structure in terms of the reduction of nacelle acceleration, velocity, and displacement response.展开更多
文摘Different paradigms that relate verification and validation to the simulation model have different development process. A simulation model developing process based on Five-Object Framework (FOF) is discussed in this paper. An example is given to demonstrate the applications of the proposed method.
文摘This paper studies the problem of deriving an interface automata model from UML statechart, in which, interface automata is a formaliged model for describing component behavior in an open system, but there is no universal criterion for deriving behavior from component to construct the model. UML is a widely used modeling standard, yet it is very difficult to apply it to system verification and testing directly for its imprecise semantics. After analyzing the expression ability of the two models, several transforma- tion rules are defined and each step of transformation is described in detail, after that, the approach is illustrated with an example. The paper provides a method for acquiring interface automata and lays the foundation for related research.
文摘Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model.
文摘Some mechanistic models have been proposed to predict the No3- concentrations in the soil solution at root surface and the NO3-N uptake by plants, but all these relatively effective non-steady state models have not yet been verified by any soil culture experiment. In the present study, a mathematical model based on the nutrient transport to the roots, root length and root uptake kinetics as well as taking account of the inter-root competition was used for calculation, and soil culture experiments with rice, wheat and rape plants grown on alkali, neutral and acid soils in rhizoboxes with nylon screen as a isolator were carried out to evaluate the prediction ability of the model through comparing the measured NO3-concentrations at root surface and N uptake with the calculated values. Whether the inter-root competition for nutrients was accounted for in the model was of less importance to the calculated N uptake but could induce significant changes in the relative concentrations of NO3- at root surface. For the three soils and crops, the measured NO3-N uptake agreed well with the calculated one, and the calculated relative concentrations at root surface were approximate to the measured values. But an appropriate rectification for some conditions is necessary when the plant uptake parameter obtained in solution culture experiment is applied to soil culture. In contrast with the present non-steady state model, the predicted relative concentrations, which show an accumulation, by the Phillips' steady-state model were distinct from the measured values which show a depletion, indicating that the present model has a better prediction ability than the steady-state model.
基金This research was supported partially by the National Natural Science Foundation of China under Grants No. 61103247, No. 6110209 the Natural Science Foundation of Fujian Province under Grant No. 2011J05147+1 种基金 the Research Foundation of Education Bureau of Fujian Province under Grant No. JBll017 the Foundation for Excellent Young Teachers of Fujian Normal University under Grant No. fjsdjk2012049.
文摘To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes .
文摘This paper is on control system design for visual based indoor inspection by the model helicopters. For the indoor inspection system for large structures, there are some cases where it is difficult for htunans to work with. This paper introduces indoor inspection helicopter system with only inspection camera and prism for position sensing as payload. The control system is designed to help the operator of the inspection system to control the helicopter to designated position without much practice. The cases of the control by experienced and novice operators are compared and results show that the system has feasibility for indoor inspection system to be used by any kind of users.
文摘Traffic simulation models have the potential to provide an objective, cost-effective and flexible approach to assessing system design, traffic operations and management strategies. In that regard, the calibration and validation of simulation model is crucial for appropriate decision making process. This paper presents an application of microscopic simulation model calibration and validation procedure for a multimodal urban traffic network. Model is developed by VISSIM and VISSIG software tools.
基金funded by the National Natural Science Foundation of China,Grant No.51006007,51136003 and 50976009
文摘A model to predict the double leakage and tip leakage leading edge spillage flows was developed. This model was combined by a TLV trajectory model and a TLV diameter model and formed as a function of compressor one-dimensional design parameters, i.e. the compressor massflow coefficient, Ф and compressor loading coeffi- cient, ψ, and some critical blade geometrical parameters, i.e. blade solidity, a, stagger angle, βs, blade chord length, C, and blade pitch length, S. By using this model, the double leakage and tip leakage leading edge spillage flow could be predicted even at the compressor preliminary design process. Considering the leading edge spillage flow usually indicates the inception of spike-type stall, i.e. the compressor is a tip critical design, this model could also be used as a tool to choose the critical design parameters for designers. At last, some experimental data from literature was used to validate the model and the results proved that the model was reliable.
文摘For a variable speed large scale wind turbine, the vibration issues become a key problem that cannot be ignored in the turbine's life cycle. Wind turbine tower vibration will cause superfluous mechanical loads. To resolve the vibration issue, a method for constructng the energy function V is proposed to meet the demands of safe operation. The Lyapunov theorem has been em- bedded in a wind turbine control algorithm, proving the theoretical feasibility of stability control based on function V. Accord- ing to an analysis of this complex nonlinear model for the wind turbine, the general method of constructing an energy function suitable for a wind turbine is presented explicitly. The feasibility of applying an energy function to wind turbine vibration con- trol is verified experimentally using a 3.0-MW direct drive wind turbine model. The experimental results indicate that the dy- namic performance of the tested wind turbine model with energy function control is significantly better than that of the uncon- trolled structure in terms of the reduction of nacelle acceleration, velocity, and displacement response.