A 2-dimensional global free surface diagnostic model, combined with dynamic calculation, is used to investigate the world ocean circulation; the model has a horizontal resolution of 1/4°×1/4°. The simul...A 2-dimensional global free surface diagnostic model, combined with dynamic calculation, is used to investigate the world ocean circulation; the model has a horizontal resolution of 1/4°×1/4°. The simulated results agree well with the results of other modesl and observations. The distribution of Stream Function suggests that the main circulation systems in the wodd ocean have been represented, including oceanic currents strengthened in the oceanic western. Be close to the observed results, the net mass transport of the Kuroshio axes is estimated about 54Sv; The distribution of the horizontal circulation in each layer shows that the main circulation systems in the world ocean are well simulated, for example, the Kuroshio and the Antarctic Circumpolar Current can go down to the bottom layer, but the Gulf Stream cannot, and its direction reverses at the depths of 1000 to 2 000 m.展开更多
The numerical simulation of wake and flee-surface flow around ships is a complex topic that involves multiple tasks: the generation of an optimal computational grid and the development of numerical algorithms capable...The numerical simulation of wake and flee-surface flow around ships is a complex topic that involves multiple tasks: the generation of an optimal computational grid and the development of numerical algorithms capable to predict the flow field around a hull. In this paper, a numerical framework is developed aimed at high-resolution CFD simulations of turbulent, free-surface flows around ship hulls. The framework consists in the concatenation of "tools", partly available in the open-source finite volume library OpenFOAM. A novel, flexible mesh-generation algorithm is presented, capable of producing high-quality computational grids for free-surface ship hydrodynamics. The numerical frame work is used to solve some benchmark problems, providing results that are in excellent agreement with the experimental measures.展开更多
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system...Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.展开更多
A numerical code called Rock Failure Process Analysis (RFPA2D) was em- ployed to investigate the closure,damage and failure behavior of the horizontal tunnels.In this code the time-dependent deformation was described ...A numerical code called Rock Failure Process Analysis (RFPA2D) was em- ployed to investigate the closure,damage and failure behavior of the horizontal tunnels.In this code the time-dependent deformation was described in terms of evolution of meso- scopic structure,leading to progressive degradation of elastic modulus and failure strength of material.In terms of material degradation,a series of numerical simulations were per- formed to study the convergence and subsequent failure in circular tunnels.The numerical results provide a complete illumination for the closure,damage and failure behavior with different loading conditions.It is shown that the depth and the ratio of far field stresses play an important role in the creep behavior of tunnels.Creep failure is expected to occur in the direction of the smallest far field stress component,which means that rheological failure of tunnels is influenced not only by the rock characteristic around the tunnels but also by the orientation and distribution of far field stress on a global scale.展开更多
Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the...Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance.展开更多
Currently, the flow field of annular seals disturbed by the circular whirl motion of rotors is usually solved using computational fluid dynamics(CFD) to evaluate the five rotordynamic coefficients. The simulations are...Currently, the flow field of annular seals disturbed by the circular whirl motion of rotors is usually solved using computational fluid dynamics(CFD) to evaluate the five rotordynamic coefficients. The simulations are based on the traditional quasi-steady method. In this work, an improved quasi-steady method along with the transient method was presented to compute the rotordynamic coefficients of a long seal. By comparisons with experimental data, the shortcomings of quasi-steady methods have been identified. Then, the effects of non-uniform incoming flow on seal dynamic coefficients were studied by transient simulations. Results indicate that the long seal has large cross stiffness k and direct mass M which are not good for rotor stability, while the transient method is more suitable for the long seal for its excellent performance in predicting M. When the incoming flow is non-uniform, the stiffness coefficients vary with the eccentric directions. Based on the rotordynamic coefficients under uniform incoming flow, the linearized fluid force formulas, which can consider the effects of non-uniform incoming flow, have been presented and can well explain the varying-stiffness phenomenon.展开更多
With the rapid development in cloud data centers and cloud service customers,the demand for high quality cloud service has been grown rapidly.To face this reality,this paper focuses on service optimization issues in c...With the rapid development in cloud data centers and cloud service customers,the demand for high quality cloud service has been grown rapidly.To face this reality,this paper focuses on service optimization issues in cloud computing environment.First,a service-oriented architecture is proposed and programmable network facilities are utilized in it to optimize specific cloud services.Then various cloud services are categorized into two subcategories;static services and dynamic services.Furthermore,the concepts of cloud service quality and cloud resource idle rate are defined,and the aforementioned concepts have also been taken into consideration as parameters in the service optimization algorithm to improve the cloud service quality and optimize system workload simultaneously.Numerical simulations are conducted to verify the effectiveness of the proposed algorithm in balancing the workload of all servers.展开更多
A tool was developed to assist the cooling systems designer in designing and installing the microsprinklers and fan cooling system. The tool was developed by integrating a mathematical model into an electronic spark m...A tool was developed to assist the cooling systems designer in designing and installing the microsprinklers and fan cooling system. The tool was developed by integrating a mathematical model into an electronic spark map in order to use the mathematical model practically. The mathematical model was developed using the designs, parameters, variables, and constant values of the microsprinklers and fans cooling system. Subsequently, an electronic spark map (decision tree) was developed, and then the mathematical model was integrated into the electronic spark map. Afterwards, C# (C Sharp) programming language was used to develop a computer system via the electronic spark map, and to make the user interface. The developed computer system assists the designer in making decisions to specify and to calculate the required discharge of cooling system pump, length and diameter of cooling system pipelines, number of cooling fans, and number of microsprinklers. Moreover, this tool calculates the capital investment and the fixed, variable, and total costs of the cooling system. However, the mathematical model of the spark map requires some input data such as: pressure and discharge of microsprinklers, and some other engineering parameters. Data of 4 cooling systems were used to carry out the model validation. The differences between actual and calculated values were determined, and the standard deviations were calculated. The coefficients of variation were between 2.25% and 4.13%.展开更多
In this paper we carry out a study of modules over a 3 × 3 formal triangular matrix ringГ=(T 0 0 M U 0 N×UM N V)where T, U, V are rings, M, N are U-T, V-U bimodules, respectively. Using the alternative ...In this paper we carry out a study of modules over a 3 × 3 formal triangular matrix ringГ=(T 0 0 M U 0 N×UM N V)where T, U, V are rings, M, N are U-T, V-U bimodules, respectively. Using the alternative description of left Г-module as quintuple (A, B, C; f, g) with A ∈ mod T, B ∈ mod U and C ∈ mod V, f : M ×T A →B ∈ mod U, g : N ×U B → C ∈ mod V, we shall characterize uniform, hollow and finitely embedded modules over F, respectively. Also the radical as well as the socle of r (A + B + C) is determined.展开更多
In this paper, we consider three species harvesting model and develop a solution proce- dure which is able to calculate the equilibrium points of the model where some biological parameters of the model are interval nu...In this paper, we consider three species harvesting model and develop a solution proce- dure which is able to calculate the equilibrium points of the model where some biological parameters of the model are interval numbers. A parametric mathematical program is formulated to find the biological equilibrium of the model for different values of parame- ters. This interval-valued problem is converted into equivalent crisp model using interval operations. The main advantage of the proposed procedure is that we can present dif- ferent characteristics of the model in a single framework. Analytically, the existence of steady state and stabilities are looked into. Using mathematical software, the model is illustrated and the results are obtained and presented in tabular and graphical forms.展开更多
This paper presents a hybrid symbolic-numeric algorithm to compute ranking functions for establishing the termination of loop programs with polynomial guards and polynomial assignments.The authors first transform the ...This paper presents a hybrid symbolic-numeric algorithm to compute ranking functions for establishing the termination of loop programs with polynomial guards and polynomial assignments.The authors first transform the problem into a parameterized polynomial optimization problem,and obtain a numerical ranking function using polynomial sum-of-squares relaxation via semidefinite programming(SDP).A rational vector recovery algorithm is deployed to recover a rational polynomial from the numerical ranking function,and some symbolic computation techniques are used to certify that this polynomial is an exact ranking function of the loop programs.At last,the authors demonstrate on some polynomial loop programs from the literature that our algorithm successfully yields nonlinear ranking functions with rational coefficients.展开更多
So far,the acyclic hypergraph has two different definitions.One is based on the cyclomatic number of the hypergraph,whereas the other arises from the acyclic schema of the relational database in the computer science.I...So far,the acyclic hypergraph has two different definitions.One is based on the cyclomatic number of the hypergraph,whereas the other arises from the acyclic schema of the relational database in the computer science.In this paper,it is first proved that these two definitions coincide with each other completely.Then we prove that a hypergraph H is not acyclic,or cyclic,if and only if it contains a special partial hypergraph named hypercircuit.In addition,we show that H has l(H) different hypercircuits,where l(H)is a parameter used to decide whether H is acyclic or cyclic.展开更多
An n × n ω-circulant matrix which has a specific structure is a type of important matrix. Several norm equalities and inequalities are proved for ω-circulant operator matrices with ω = e^(iθ)(0≤θ < 2π) ...An n × n ω-circulant matrix which has a specific structure is a type of important matrix. Several norm equalities and inequalities are proved for ω-circulant operator matrices with ω = e^(iθ)(0≤θ < 2π) in this paper. We give the special cases for norm equalities and inequalities, such as the usual operator norm and the Schatten p-norms. Pinching type inequality is also proposed for weakly unitarily invariant norms. Meanwhile,we present that the set of ω-circulant matrices with complex entries has an idempotent basis. Based on this basis, we introduce an automorphism on the ω-circulant algebra and then show different operators on linear vector space that are isomorphic to the ω-circulant algebra. The function properties, other idempotent bases and a linear involution are discussed for ω-circulant algebra. These results are closely related to the special structure of ω-circulant matrices.展开更多
This paper presents a new effcient algorithm for exactly computing the halfspace depth contours based on the idea of a circular sequence. Unlike the existing methods, the proposed algorithm segments the unit sphere di...This paper presents a new effcient algorithm for exactly computing the halfspace depth contours based on the idea of a circular sequence. Unlike the existing methods, the proposed algorithm segments the unit sphere directly relying on the permutations that correspond to the projections of observations onto some unit directions, without having to use the technique of parametric programming.Some data examples are also provided to illustrate the performance of the proposed algorithm.展开更多
Accurate calculation of circulating current is one of the key problems for stator transposition bars in the design of turbo-generators. Aimed at limitation that analytical algorithm of circulating current could not re...Accurate calculation of circulating current is one of the key problems for stator transposition bars in the design of turbo-generators. Aimed at limitation that analytical algorithm of circulating current could not reflect the local electromagnetic field distribution and difficulty that overlaps easily exist in solid modeling process of stator transposition bars, a simplified physical model of transposition bars is established. A three-dimensional(3-D) numerical method for circulating current in stator transposition bars of large water-cooled turbo-generators is investigated, which is combined with field-circuit coupling method. Taking stator bars less than 540° transposition with void model of a 600-MW water-cooled turbo-generator as the research object, the magnetic flux density distribution, current density distribution and circulating current distribution of transposition strands are obtained by numerical calculation. Compared with calculation results of the improved analytical algorithm, the correctness of the numerical calculation for circulating current is demonstrated, the calculation value difference for the maximum current of strands is obtained. The numerical calculation for circulating current will provide an appropriate basis for the reasonable calculation of local overheating of stator transposition bars and the design of safety margin for turbo-generators.展开更多
基金supported by the Project Funding of the Fund Committee of Science Department (No.40346029)National Natural Science Foundation (40346029)the offing comprehensive evaluation of our country (908-02-01-03)
文摘A 2-dimensional global free surface diagnostic model, combined with dynamic calculation, is used to investigate the world ocean circulation; the model has a horizontal resolution of 1/4°×1/4°. The simulated results agree well with the results of other modesl and observations. The distribution of Stream Function suggests that the main circulation systems in the wodd ocean have been represented, including oceanic currents strengthened in the oceanic western. Be close to the observed results, the net mass transport of the Kuroshio axes is estimated about 54Sv; The distribution of the horizontal circulation in each layer shows that the main circulation systems in the world ocean are well simulated, for example, the Kuroshio and the Antarctic Circumpolar Current can go down to the bottom layer, but the Gulf Stream cannot, and its direction reverses at the depths of 1000 to 2 000 m.
文摘The numerical simulation of wake and flee-surface flow around ships is a complex topic that involves multiple tasks: the generation of an optimal computational grid and the development of numerical algorithms capable to predict the flow field around a hull. In this paper, a numerical framework is developed aimed at high-resolution CFD simulations of turbulent, free-surface flows around ship hulls. The framework consists in the concatenation of "tools", partly available in the open-source finite volume library OpenFOAM. A novel, flexible mesh-generation algorithm is presented, capable of producing high-quality computational grids for free-surface ship hydrodynamics. The numerical frame work is used to solve some benchmark problems, providing results that are in excellent agreement with the experimental measures.
基金partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001)+2 种基金the National Key Research and Development Program of China (Grant No. 2016YFB0800204)the National Science Foundation of China (No. 61502017)the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
文摘Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.
基金the"973"Program(2007CB209400)the National Natural Science Foundation of China(40638040)the Opening Foundation of State Key Laboratory of Geohazards Prevention and Geoenvironment Protection,Chengdu University of Technology
文摘A numerical code called Rock Failure Process Analysis (RFPA2D) was em- ployed to investigate the closure,damage and failure behavior of the horizontal tunnels.In this code the time-dependent deformation was described in terms of evolution of meso- scopic structure,leading to progressive degradation of elastic modulus and failure strength of material.In terms of material degradation,a series of numerical simulations were per- formed to study the convergence and subsequent failure in circular tunnels.The numerical results provide a complete illumination for the closure,damage and failure behavior with different loading conditions.It is shown that the depth and the ratio of far field stresses play an important role in the creep behavior of tunnels.Creep failure is expected to occur in the direction of the smallest far field stress component,which means that rheological failure of tunnels is influenced not only by the rock characteristic around the tunnels but also by the orientation and distribution of far field stress on a global scale.
基金supported by the National Natural Science Foundation of China (The key trusted running technologies for the sensing nodes in Internet of things: 61501007, The research of the trusted and security environment for high energy physics scientific computing system: 11675199)General Project of science and technology project of Beijing Municipal Education Commission: KM201610005023+2 种基金the outstanding personnel training program of Beijing municipal Party Committee Organization Department (The Research of Trusted Computing environment for Internet of things in Smart City: 2014000020124G041)The key technology research and validation issue for the emergency treatment telemedicine public service platform which integrates the military and civilian and bases on the broadband wireless networks (No.2013ZX03006001-005)the issue belongs to Major national science and technology projects
文摘Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance.
基金Project(51276213)supported by the National Natural Science Foundation of ChinaProject(2013BAF01B00)supported by the National Science and Technology Support Program of China
文摘Currently, the flow field of annular seals disturbed by the circular whirl motion of rotors is usually solved using computational fluid dynamics(CFD) to evaluate the five rotordynamic coefficients. The simulations are based on the traditional quasi-steady method. In this work, an improved quasi-steady method along with the transient method was presented to compute the rotordynamic coefficients of a long seal. By comparisons with experimental data, the shortcomings of quasi-steady methods have been identified. Then, the effects of non-uniform incoming flow on seal dynamic coefficients were studied by transient simulations. Results indicate that the long seal has large cross stiffness k and direct mass M which are not good for rotor stability, while the transient method is more suitable for the long seal for its excellent performance in predicting M. When the incoming flow is non-uniform, the stiffness coefficients vary with the eccentric directions. Based on the rotordynamic coefficients under uniform incoming flow, the linearized fluid force formulas, which can consider the effects of non-uniform incoming flow, have been presented and can well explain the varying-stiffness phenomenon.
基金Supported by the National Natural Science Foundation of China(No.61272508,61472033,61202432)
文摘With the rapid development in cloud data centers and cloud service customers,the demand for high quality cloud service has been grown rapidly.To face this reality,this paper focuses on service optimization issues in cloud computing environment.First,a service-oriented architecture is proposed and programmable network facilities are utilized in it to optimize specific cloud services.Then various cloud services are categorized into two subcategories;static services and dynamic services.Furthermore,the concepts of cloud service quality and cloud resource idle rate are defined,and the aforementioned concepts have also been taken into consideration as parameters in the service optimization algorithm to improve the cloud service quality and optimize system workload simultaneously.Numerical simulations are conducted to verify the effectiveness of the proposed algorithm in balancing the workload of all servers.
文摘A tool was developed to assist the cooling systems designer in designing and installing the microsprinklers and fan cooling system. The tool was developed by integrating a mathematical model into an electronic spark map in order to use the mathematical model practically. The mathematical model was developed using the designs, parameters, variables, and constant values of the microsprinklers and fans cooling system. Subsequently, an electronic spark map (decision tree) was developed, and then the mathematical model was integrated into the electronic spark map. Afterwards, C# (C Sharp) programming language was used to develop a computer system via the electronic spark map, and to make the user interface. The developed computer system assists the designer in making decisions to specify and to calculate the required discharge of cooling system pump, length and diameter of cooling system pipelines, number of cooling fans, and number of microsprinklers. Moreover, this tool calculates the capital investment and the fixed, variable, and total costs of the cooling system. However, the mathematical model of the spark map requires some input data such as: pressure and discharge of microsprinklers, and some other engineering parameters. Data of 4 cooling systems were used to carry out the model validation. The differences between actual and calculated values were determined, and the standard deviations were calculated. The coefficients of variation were between 2.25% and 4.13%.
基金the National Natural Science Foundation of China (No. 10371107).
文摘In this paper we carry out a study of modules over a 3 × 3 formal triangular matrix ringГ=(T 0 0 M U 0 N×UM N V)where T, U, V are rings, M, N are U-T, V-U bimodules, respectively. Using the alternative description of left Г-module as quintuple (A, B, C; f, g) with A ∈ mod T, B ∈ mod U and C ∈ mod V, f : M ×T A →B ∈ mod U, g : N ×U B → C ∈ mod V, we shall characterize uniform, hollow and finitely embedded modules over F, respectively. Also the radical as well as the socle of r (A + B + C) is determined.
文摘In this paper, we consider three species harvesting model and develop a solution proce- dure which is able to calculate the equilibrium points of the model where some biological parameters of the model are interval numbers. A parametric mathematical program is formulated to find the biological equilibrium of the model for different values of parame- ters. This interval-valued problem is converted into equivalent crisp model using interval operations. The main advantage of the proposed procedure is that we can present dif- ferent characteristics of the model in a single framework. Analytically, the existence of steady state and stabilities are looked into. Using mathematical software, the model is illustrated and the results are obtained and presented in tabular and graphical forms.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.10901055,61021004,91118007by NKBRPC 2011CB302802,2011CB70690by the Fundamental Research Funds for the Central Universities under Grant No.78210043
文摘This paper presents a hybrid symbolic-numeric algorithm to compute ranking functions for establishing the termination of loop programs with polynomial guards and polynomial assignments.The authors first transform the problem into a parameterized polynomial optimization problem,and obtain a numerical ranking function using polynomial sum-of-squares relaxation via semidefinite programming(SDP).A rational vector recovery algorithm is deployed to recover a rational polynomial from the numerical ranking function,and some symbolic computation techniques are used to certify that this polynomial is an exact ranking function of the loop programs.At last,the authors demonstrate on some polynomial loop programs from the literature that our algorithm successfully yields nonlinear ranking functions with rational coefficients.
基金This research is supported by the National Natural Science Foundation of China(No. 19831080).
文摘So far,the acyclic hypergraph has two different definitions.One is based on the cyclomatic number of the hypergraph,whereas the other arises from the acyclic schema of the relational database in the computer science.In this paper,it is first proved that these two definitions coincide with each other completely.Then we prove that a hypergraph H is not acyclic,or cyclic,if and only if it contains a special partial hypergraph named hypercircuit.In addition,we show that H has l(H) different hypercircuits,where l(H)is a parameter used to decide whether H is acyclic or cyclic.
基金supported by National Natural Science Foundation of China(Grant Nos.11301251 and 11301252)the Applied Mathematics Enhancement Program of Linyi UniversityChina
文摘An n × n ω-circulant matrix which has a specific structure is a type of important matrix. Several norm equalities and inequalities are proved for ω-circulant operator matrices with ω = e^(iθ)(0≤θ < 2π) in this paper. We give the special cases for norm equalities and inequalities, such as the usual operator norm and the Schatten p-norms. Pinching type inequality is also proposed for weakly unitarily invariant norms. Meanwhile,we present that the set of ω-circulant matrices with complex entries has an idempotent basis. Based on this basis, we introduce an automorphism on the ω-circulant algebra and then show different operators on linear vector space that are isomorphic to the ω-circulant algebra. The function properties, other idempotent bases and a linear involution are discussed for ω-circulant algebra. These results are closely related to the special structure of ω-circulant matrices.
基金supported by the National Natural Science Foundation of China under Grant No.11461029the Natural Science Foundation of Jiangxi Province under Grant Nos.20142BAB211014+5 种基金20132BAB21101520122BAB20102320133BCB23014the Youth Science Fund Project of Jiangxi provincial education department under Grant Nos.GJJ14350GJJ14449KJLD13033
文摘This paper presents a new effcient algorithm for exactly computing the halfspace depth contours based on the idea of a circular sequence. Unlike the existing methods, the proposed algorithm segments the unit sphere directly relying on the permutations that correspond to the projections of observations onto some unit directions, without having to use the technique of parametric programming.Some data examples are also provided to illustrate the performance of the proposed algorithm.
基金supported by the National Natural Science Foundation of China(Grant No.51477038)
文摘Accurate calculation of circulating current is one of the key problems for stator transposition bars in the design of turbo-generators. Aimed at limitation that analytical algorithm of circulating current could not reflect the local electromagnetic field distribution and difficulty that overlaps easily exist in solid modeling process of stator transposition bars, a simplified physical model of transposition bars is established. A three-dimensional(3-D) numerical method for circulating current in stator transposition bars of large water-cooled turbo-generators is investigated, which is combined with field-circuit coupling method. Taking stator bars less than 540° transposition with void model of a 600-MW water-cooled turbo-generator as the research object, the magnetic flux density distribution, current density distribution and circulating current distribution of transposition strands are obtained by numerical calculation. Compared with calculation results of the improved analytical algorithm, the correctness of the numerical calculation for circulating current is demonstrated, the calculation value difference for the maximum current of strands is obtained. The numerical calculation for circulating current will provide an appropriate basis for the reasonable calculation of local overheating of stator transposition bars and the design of safety margin for turbo-generators.