The authors developed a prototype of a warship maintenance system. The process started by defining the maintenance requirements of warship equipment. Next, a planning scheme was development for a maintenance network. ...The authors developed a prototype of a warship maintenance system. The process started by defining the maintenance requirements of warship equipment. Next, a planning scheme was development for a maintenance network. An optimization target for the plan and indexes for assessment were established. Based on the above work, a simulation model was proposed with two layers: a base and a workshop. Dispatching rules were then formulated for the simulation. Experimental results proved the validity of the model and the dispatching algorithm. It was found that the model can solve the capacity evaluation problem for maintenance systems and provides a scientific basis for decision-maker to make decisions regarding equipment maintenance.展开更多
Based on the discrete time method, an effective movement control model is designed for a group of high- speed trains on a rail network. The purpose of the model is to investigate the specific traffic characteristics o...Based on the discrete time method, an effective movement control model is designed for a group of high- speed trains on a rail network. The purpose of the model is to investigate the specific traffic characteristics of high-speed trains under the interruption of stochastic irregular events. In the model, the high-speed rail traffic system is supposed to be equipped with the moving-block signalling system to guarantee maximum traversing capacity of the railway. To keep the safety of trains' movements, some operational strategies are proposed to control the movements of trains in the model, including traction operation, braking operation, and entering-station operation. The numerical simulations show that the designed model can well describe the movements of high-speed trains on the rail network. The research results can provide the useful information not only for investigating the propagation features of relevant delays under the irregular disturbance but also for rerouting and reseheduling trains on the rail network.展开更多
The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. G...The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena.展开更多
Deployment of nodes based on K-barrier coverage in an underground wireless sensor network is described. The network has automatic routing recovery by using a basic information table (BIT) for each node. An RSSI positi...Deployment of nodes based on K-barrier coverage in an underground wireless sensor network is described. The network has automatic routing recovery by using a basic information table (BIT) for each node. An RSSI positioning algorithm based on a path loss model in the coal mine is used to calculate the path loss in real time within the actual lane way environment. Simulation results show that the packet loss can be controlled to less than 15% by the routing recovery algorithm under special recovery circum- stances. The location precision is within 5 m, which greatly enhances performance compared to tradi- tional frequency location systems. This approach can meet the needs for accurate location underground.展开更多
This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on...This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on the analysis on the protocols of realistic P2P systems, a software which can be used to simulate the P2P network environment and the propagation of P2P active worm is imple- mented in this paper. A large number of simulation experiments are performed using the developed simulation software. The results from these simulation experiments validate the proposed model, which means that the model can be used to analyze the spreading behaviors of the P2P active worm and predict its trend.展开更多
A fully coupled 6-degree-of-freedom nonlinear dynamic model is presented to analyze the dynamic response of a semi-submersible platform which is equipped with the dynamic positioning(DP) system. In the control force d...A fully coupled 6-degree-of-freedom nonlinear dynamic model is presented to analyze the dynamic response of a semi-submersible platform which is equipped with the dynamic positioning(DP) system. In the control force design, a dynamic model of reference linear drift frequency in the horizontal plane is introduced. The dynamic surface control(DSC) is used to design a control strategy for the DP. Compared with the traditional back-stepping methods, the dynamic surface control combined with radial basis function(RBF) neural networks(NNs) can avoid differentiating intermediate variables repeatedly in every design step due to the introduction of a first order filter. Low frequency motions obtained from total motions by a low pass filter are chosen to be the inputs for the RBF NNs which are used to approximate the low frequency wave force. Considering the propellers' wear and tear, the effect of filtering frequencies for the control force is discussed. Based on power consumptions and positioning requirements, the NN centers are determined. Moreover, the RBF NNs used to approximate the total wave force are built to monitor the disturbances. With the DP assistance, the results of fully coupled dynamic response simulations are given to illustrate the effectiveness of the proposed control strategy.展开更多
In this paper, we conduct theoretical research on small-scale streaming data transmission communication system based on ARM and FPGA. Compared with network layer IP multicast, it does not need to change the underlying...In this paper, we conduct theoretical research on small-scale streaming data transmission communication system based on ARM and FPGA. Compared with network layer IP multicast, it does not need to change the underlying structure of the network with the realization. Aa are day by day mature as a result of the embedded technical high speed development and the GPRS technology with use the embedded system essence small, special-purpose strong, the system simplification and the GPRS network cover characteristics and so on whole world. Under this basis, this paper proposes the new ARM and FPGA based small-scale streaming data transmission communication system. The implementation of the system proves its effectiveness.展开更多
The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using a...The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.展开更多
Some microscopic traffic simulations on urban road network are developed up to now. However, the effect of urban transport policy in the local city is influenced with the complex interaction of automobile traffic and ...Some microscopic traffic simulations on urban road network are developed up to now. However, the effect of urban transport policy in the local city is influenced with the complex interaction of automobile traffic and public transport traffic. Particularly, behaviours of vehicles should be described with the fuzziness of the subjective recognition and operation. On the other hand, the trip makers are influenced by various transport policies in terms of mode choice behaviour. The change in mode choice behaviour and number of public transport mode users would eventually affect traffic flow conditions on road network. Modal spilt and traffic conditions of a network are interrelated. Therefore, the present study mainly aims to integrate mode choice model and microscopic traffic simulation model based on fuzzy logic. In the study, the fuzzy logic based mode choice model is proposed. The proposed mode choice model and the existing microscopic traffic simulation model are combined. The developed model has been applied on real urban network to demonstrate the effectiveness of the installation of LRT system. Finally, it is helpful for evaluation of transport policy that the fuzzy logic based microscopic traffic simulation with modal choice model has been constructed.展开更多
基金Supported by the National Natural Science Foundation of China under Grant No.60774036
文摘The authors developed a prototype of a warship maintenance system. The process started by defining the maintenance requirements of warship equipment. Next, a planning scheme was development for a maintenance network. An optimization target for the plan and indexes for assessment were established. Based on the above work, a simulation model was proposed with two layers: a base and a workshop. Dispatching rules were then formulated for the simulation. Experimental results proved the validity of the model and the dispatching algorithm. It was found that the model can solve the capacity evaluation problem for maintenance systems and provides a scientific basis for decision-maker to make decisions regarding equipment maintenance.
基金Supported by the National Natural Science Foundation of China under Grant No. 70901006Research Foundation of Beijing Jiaotong University under Grant Nos. 2011JBM158, 2011JBM162Research Foundation of State Key Laboratory of Rail Traffic Control and Safety under Grant Nos. RCS2009ZT001, RCS2010ZZ001
文摘Based on the discrete time method, an effective movement control model is designed for a group of high- speed trains on a rail network. The purpose of the model is to investigate the specific traffic characteristics of high-speed trains under the interruption of stochastic irregular events. In the model, the high-speed rail traffic system is supposed to be equipped with the moving-block signalling system to guarantee maximum traversing capacity of the railway. To keep the safety of trains' movements, some operational strategies are proposed to control the movements of trains in the model, including traction operation, braking operation, and entering-station operation. The numerical simulations show that the designed model can well describe the movements of high-speed trains on the rail network. The research results can provide the useful information not only for investigating the propagation features of relevant delays under the irregular disturbance but also for rerouting and reseheduling trains on the rail network.
文摘The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena.
基金supported by the National Key Technology R&D Program of China (No. 2008BAH37B05095)
文摘Deployment of nodes based on K-barrier coverage in an underground wireless sensor network is described. The network has automatic routing recovery by using a basic information table (BIT) for each node. An RSSI positioning algorithm based on a path loss model in the coal mine is used to calculate the path loss in real time within the actual lane way environment. Simulation results show that the packet loss can be controlled to less than 15% by the routing recovery algorithm under special recovery circum- stances. The location precision is within 5 m, which greatly enhances performance compared to tradi- tional frequency location systems. This approach can meet the needs for accurate location underground.
文摘This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on the analysis on the protocols of realistic P2P systems, a software which can be used to simulate the P2P network environment and the propagation of P2P active worm is imple- mented in this paper. A large number of simulation experiments are performed using the developed simulation software. The results from these simulation experiments validate the proposed model, which means that the model can be used to analyze the spreading behaviors of the P2P active worm and predict its trend.
基金funded by the National Basic Research Program of China (Grant Nos. 2011CB013702 and 2011CB013703)the Science Fund for Creative Research Groups of the National Natural Science Foundation of China (Grant No. 50921001)
文摘A fully coupled 6-degree-of-freedom nonlinear dynamic model is presented to analyze the dynamic response of a semi-submersible platform which is equipped with the dynamic positioning(DP) system. In the control force design, a dynamic model of reference linear drift frequency in the horizontal plane is introduced. The dynamic surface control(DSC) is used to design a control strategy for the DP. Compared with the traditional back-stepping methods, the dynamic surface control combined with radial basis function(RBF) neural networks(NNs) can avoid differentiating intermediate variables repeatedly in every design step due to the introduction of a first order filter. Low frequency motions obtained from total motions by a low pass filter are chosen to be the inputs for the RBF NNs which are used to approximate the low frequency wave force. Considering the propellers' wear and tear, the effect of filtering frequencies for the control force is discussed. Based on power consumptions and positioning requirements, the NN centers are determined. Moreover, the RBF NNs used to approximate the total wave force are built to monitor the disturbances. With the DP assistance, the results of fully coupled dynamic response simulations are given to illustrate the effectiveness of the proposed control strategy.
文摘In this paper, we conduct theoretical research on small-scale streaming data transmission communication system based on ARM and FPGA. Compared with network layer IP multicast, it does not need to change the underlying structure of the network with the realization. Aa are day by day mature as a result of the embedded technical high speed development and the GPRS technology with use the embedded system essence small, special-purpose strong, the system simplification and the GPRS network cover characteristics and so on whole world. Under this basis, this paper proposes the new ARM and FPGA based small-scale streaming data transmission communication system. The implementation of the system proves its effectiveness.
文摘The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.
文摘Some microscopic traffic simulations on urban road network are developed up to now. However, the effect of urban transport policy in the local city is influenced with the complex interaction of automobile traffic and public transport traffic. Particularly, behaviours of vehicles should be described with the fuzziness of the subjective recognition and operation. On the other hand, the trip makers are influenced by various transport policies in terms of mode choice behaviour. The change in mode choice behaviour and number of public transport mode users would eventually affect traffic flow conditions on road network. Modal spilt and traffic conditions of a network are interrelated. Therefore, the present study mainly aims to integrate mode choice model and microscopic traffic simulation model based on fuzzy logic. In the study, the fuzzy logic based mode choice model is proposed. The proposed mode choice model and the existing microscopic traffic simulation model are combined. The developed model has been applied on real urban network to demonstrate the effectiveness of the installation of LRT system. Finally, it is helpful for evaluation of transport policy that the fuzzy logic based microscopic traffic simulation with modal choice model has been constructed.