The data information transfer and time marching strategies between computational fluid dynamics (CFD) and computational structural dynamics (CSD) play crucial roles on the aeroelastic analysis in a time domain. An...The data information transfer and time marching strategies between computational fluid dynamics (CFD) and computational structural dynamics (CSD) play crucial roles on the aeroelastic analysis in a time domain. An improved CFD/CSD coupled system is designed, including an interpolation method and an improved loosely coupled algorithm. The interpolation method based on boundary element method (BEM) is developed to transfer aerodynamic loads and structural displacements between CFD and CSD grid systems, it can be universally used in fluid structural interaction solution by keeping energy conservation. The improved loosely coupled algo-rithm is designed, thus it improves the computational accuracy and efficiency. The new interface is performed on the two-dimensional (2-D) extrapolation and the aeroelastie response of AGARD445.6 wing. Results show that the improved interface has a superior accuracy.展开更多
Through the coherent accumulation of target echoes, inverse synthetic aperture radar (ISAR) imaging achieves high azimuth resolution. However, because of the instability of the radar system, the echoes of the 1SAR w...Through the coherent accumulation of target echoes, inverse synthetic aperture radar (ISAR) imaging achieves high azimuth resolution. However, because of the instability of the radar system, the echoes of the 1SAR will be randomly lost. The conventional FFT processing methods can cause image blur and high sidelobes or other issues. A novel algorithm for ISAR missing-data imaging based on the Iterative Adaptive Approach (IAA) is proposed. The algorithm enjoys global convergence properties and does not need to set the parameters in advance. The missing-data ISAR imaging results for simulated and measured data illustrate the effectiveness of the algorithm.展开更多
The Zakharov-Kuznetsov equation is proved to be nonintegrable by standard Painleve approach and three new types of soliton solutions are obtained by means of the nonstandard truncation of the extended Painleve analysi...The Zakharov-Kuznetsov equation is proved to be nonintegrable by standard Painleve approach and three new types of soliton solutions are obtained by means of the nonstandard truncation of the extended Painleve analysis approach.展开更多
A generalized Lyapunov function was employed to investigate the ultimate bound and positively invariant set of a generalized Lorenz system.We derived an ellipsoidal estimate of the ultimate bound and positively invari...A generalized Lyapunov function was employed to investigate the ultimate bound and positively invariant set of a generalized Lorenz system.We derived an ellipsoidal estimate of the ultimate bound and positively invariant set for the generalized Lorenz system,for all the positive values of system parameters a,b,and c.Our results extend the related result of Li,et al.[Li DM,Lu JA,Wu XQ,et al.,Estimating the ultimate bound and positively invariant set for the Lorenz system and a unified chaotic system,Journal of Mathematical Analysis and Application,2006,323(2):844-653].展开更多
The properties of the paths in an ROBDD representation of a Boolean function are presented and proved in the present paper, and the applications of ROBDD in calculating signal probability are also discussed. By this m...The properties of the paths in an ROBDD representation of a Boolean function are presented and proved in the present paper, and the applications of ROBDD in calculating signal probability are also discussed. By this method, the troublesome calculation of the correlation among the nodes, which is caused by the re-convergent fan-out in digital system, can be avoided and power estimation can be faster than simulation-based method in [1].展开更多
We studied the normality conditions in families of meromorphic functions, improved the results of Fang and Zalcman [Fang ML, Zalcman L, Normal families and shared values of meromorphic functions, Computational Methods...We studied the normality conditions in families of meromorphic functions, improved the results of Fang and Zalcman [Fang ML, Zalcman L, Normal families and shared values of meromorphic functions, Computational Methods and Function Theory, 2001, 1 (1): 289-299], and generalized two new normality criterions. Let F be a family of meromorphic functions in a domain D, a a non-zero finite complex number, B a positive real number, and k and m two positive integers satisfying m〉2k+4. If every function denoted by f belonging to F has only zeros with multiplicity at least k and satisfies f^m(z)f^(k)(Z)=α→ |^f(k)(z)| ≤B or f^m(z)f^(k)(z)=α→|f(z)| ≥, then F is normal in D.展开更多
In the last years, architectural practice has been confronted with a paradigm shift towards the application of digital methods in design activities. In this regard, it is a pedagogic challenge to provide a suitable co...In the last years, architectural practice has been confronted with a paradigm shift towards the application of digital methods in design activities. In this regard, it is a pedagogic challenge to provide a suitable computational background for architectural students, to improve their ability to apply algorithmic-parametric logic, as well as fabrication and prototyping resources to design problem solving. This challenge is even stronger when considering less favored social and technological contexts, such as in Brazil, for example. In this scenario, this article presents and discusses the procedures and the results from a didactic experience carried out in a design computing-oriented discipline, inserted in the curriculum of a Brazilian architecture course. Hence, this paper shares some design computing teaching experiences and presents some results on computational methods and creative approaches, with a view to contribute to a better understanding about the relations between logical thinking, mathematics and architectural design processes.展开更多
Routing algorithm is a challenge for a mobile ad hoc network (MANET), but current routing protocols for MANETs consider the path with minimum number of hops as the optimal path to a given destination. This strategy ...Routing algorithm is a challenge for a mobile ad hoc network (MANET), but current routing protocols for MANETs consider the path with minimum number of hops as the optimal path to a given destination. This strategy does not balance the traffic load over a MANET, and may result in some disadvantages such as creating congested area, depleting power faster and enlarging time delay in the nodes with heavy duties. In this paper, we propose a routing scheme that balances the load over the network by selecting a path based on its mean load-square, the proposed routing metric can reflect not only the load of the path, but also the load distribution along the path. Simulation results show effectiveness of this routing scheme on balancing the load over all nodes in the network.展开更多
We studied the normality criterion for families of meromorphic functions related to shared sets. Let F be a family of meromorphic functions on the unit disc △, a and b be distinct non-zero values, S={a,b}, and k be a...We studied the normality criterion for families of meromorphic functions related to shared sets. Let F be a family of meromorphic functions on the unit disc △, a and b be distinct non-zero values, S={a,b}, and k be a positive integer. If for every f∈ F, i) the zeros of f(z) have a multiplicity of at least k+ 1, and ii) E^-f(k)(S) lohtain in E^-f(S), then F is normal on .4. At the same time, the corresponding results of normal function are also proved.展开更多
The uniqueness problem of entire functions concerning weighted sharing was discussed, and the following theorem was proved. Let f and 8 be two non-constant entire functions, m, n and k three positive integers, and n...The uniqueness problem of entire functions concerning weighted sharing was discussed, and the following theorem was proved. Let f and 8 be two non-constant entire functions, m, n and k three positive integers, and n〉2k+4. If Em(1,(f^n)^(k))= Em(1,(g^n)^(k)), then either f(z)=c1c^cz and 8(z)= c2c^cz or f=ts, where c, c1 and c2 are three constants satisfying (-1)^k(c1c2)^n(nc)^2k=], and t is a constant satisfying t^n=1. The theorem generalizes the result of Fang [Fang ML, Uniqueness and value sharing of entire functions, Computer & Mathematics with Applications, 2002, 44: 823-831].展开更多
A normal theorem concerning meromorphic functions sharing values was proved with the method of Zalcman- Pang.The theorem is as follows. If for each f in F, all zeros of f-a have multiplicity at least k (k≥2), f and i...A normal theorem concerning meromorphic functions sharing values was proved with the method of Zalcman- Pang.The theorem is as follows. If for each f in F, all zeros of f-a have multiplicity at least k (k≥2), f and its k-th derivative function share a, and if f=b whenever its k-th derivative equal b, then F is normal in D. This theorem improved the result of Chen and Fang [Chen HH, Fang ML, Shared values and normal families of meromorphic functions, Journal of Mathematical Analysis and Applications, 2001, 260: 124-132].展开更多
The class of E'-matrices introduced in [4] is a subclass of Q0-matrices whose proper principal submatrices are Q--matrices. In this paper, we investigate the relation of the class E' to other known matrix classes an...The class of E'-matrices introduced in [4] is a subclass of Q0-matrices whose proper principal submatrices are Q--matrices. In this paper, we investigate the relation of the class E' to other known matrix classes and obtain a series of necessary and sufficient conditions for E'-matrices.展开更多
Gas extraction is one of the main measures of control and use of gas of coal mines. At present, the design method is under the experimental period and do not satisfy the need of practice. In this paper, the theory of ...Gas extraction is one of the main measures of control and use of gas of coal mines. At present, the design method is under the experimental period and do not satisfy the need of practice. In this paper, the theory of gas extraction of coal seams based upon Darcy law was studied. Mathematical model of gas extraction of coal seams was established and two kinds of solv- ing approaches based on computer software and linear approximation were given. The rightness and the validities of the model were examined with a practical example. Results obtained can be used to determine and optimize the parameters related etc.展开更多
By using a well known result in combinatorics, named Konig Lemma, this paper generalized the method of constructing measure by repeated subdivision, which was a basic tool for fractal geometry. A more general method w...By using a well known result in combinatorics, named Konig Lemma, this paper generalized the method of constructing measure by repeated subdivision, which was a basic tool for fractal geometry. A more general method was presented to construct measure, which was an essential improvement to the existing result. The proof employed a skill similar to that for Konig Lemma, which helped to avoid using the compactness in Euclidean space. Two conditions of the existing method were found not necessary.展开更多
Computational fluid dynamics is an efficient numerical approach for spray atomization study, but it is challenging to accurately capture the gas-liquid interface. In this work, an accurate conservative level set metho...Computational fluid dynamics is an efficient numerical approach for spray atomization study, but it is challenging to accurately capture the gas-liquid interface. In this work, an accurate conservative level set method is intro- duced to accurately track the gas-liquid interfaces in liquid atomization. To validate the capability of this method, binary drop collision and drop impacting on liquid film are investigated. The results are in good agreement with experiment observations. In addition, primary atomization (swirling sheet atomization) is studied using this method. To the swirling sheet atomization, it is found that Rayleigh-Taylor instability in the azimuthal direction causes the primary breakup of liquid sheet and complex vortex structures are clustered around the rim of the liq- uid sheet. The effects of central gas velocity and liquid-gas density ratio on atomization are also investigated. This work lays a solid foundation for further studvin~ the mechanism of s^rav atomization.展开更多
This paper presents an inequality, by use of which some results about the value distribution of f nf (k) are proved, where n and k are two positive integers.
The sufficient and necessary conditions, the existence and uniqueness of a new class of central configuration in R^3, for the conjugate-nest consisting of two regular tetrahedrons, are proved. If the configuration is ...The sufficient and necessary conditions, the existence and uniqueness of a new class of central configuration in R^3, for the conjugate-nest consisting of two regular tetrahedrons, are proved. If the configuration is a central configuration, then all masses of outside layer are equivalent, and the masses of inside layer are also equivalent. At the same time p (the ratio of the sizes) and mass ratio τ=m^/m must be satisfied by some formulas. For any radius ratios ρ∈(0, 0.152996 918 2) or (0.715 223 148 7, 1.398 165 037), there is only one central configuration. Otherwise, for any given mass ratio τ, there may exist more than one central configuration.展开更多
The uniqueness of meromorphic fuctions sharing one value was studied. Using the concept of weighted sharing, we proved the following theorem. For two meromorphic functions [ and g which are not polynominals of degree ...The uniqueness of meromorphic fuctions sharing one value was studied. Using the concept of weighted sharing, we proved the following theorem. For two meromorphic functions [ and g which are not polynominals of degree less than a positive integer k, if f^nf(k)and g^ng^(k) share (1,2), where n is another positive integer not less than k+10, then f^nf^(k) identically equals g^ng ^(k) or f^nf^(k)g^ng^(k) identically equals 1. Particularly for k =1, we improved the results of Yang [Yang CC, Hua XH, Uniqueness and value-sharing of meromorphic functions, Annales Academiae Scientiarum Fennicae Mathematica, 1997, 22: 395-406], and Fang [Fang ML, Hua XH, Entire function that share one value, Journal of Nanjing University, 1996, 13(1): 44-48. (In Chinese)].展开更多
In fuzzy set theory, instead of the underlying membership set being a two-valued set it is a multi-valued set that generally has the structure of a lattice L with a minimal element O and the maximal element I. Further...In fuzzy set theory, instead of the underlying membership set being a two-valued set it is a multi-valued set that generally has the structure of a lattice L with a minimal element O and the maximal element I. Furthermore if ∧, ∨, → and ┐ are defined in the set L, then we can use these operations to define, as in the ordinary set theory, operations on fuzzy subsets. In this paper we give a model of the Lattice-Valued Logic with set of agents. Any agents know the logic value of a sentence p. The logic value is compatible with all of the accessible conceptual models or worlds of p inside the agent. Agent can be rational or irrational in the use of the logic operation. Every agent of n agents can have the same set of conceptual models for p and know the same logic for p in this case the agents form a consistent group of agents. When agents have different conceptual models for p, different subgroup of agents know different logic value for p. In this case the n agents are inconsistent in the expression of the logic value for p. The valuation structure of set of agents can be used as a semantic model for the Lattice-valued Logic and fuzzy logic.展开更多
基金Supported by the Ph.D.Program Foundation of Ministry of Education of China (20070699054)~~
文摘The data information transfer and time marching strategies between computational fluid dynamics (CFD) and computational structural dynamics (CSD) play crucial roles on the aeroelastic analysis in a time domain. An improved CFD/CSD coupled system is designed, including an interpolation method and an improved loosely coupled algorithm. The interpolation method based on boundary element method (BEM) is developed to transfer aerodynamic loads and structural displacements between CFD and CSD grid systems, it can be universally used in fluid structural interaction solution by keeping energy conservation. The improved loosely coupled algo-rithm is designed, thus it improves the computational accuracy and efficiency. The new interface is performed on the two-dimensional (2-D) extrapolation and the aeroelastie response of AGARD445.6 wing. Results show that the improved interface has a superior accuracy.
基金Sponsored by the National Natural Science Foundation of China(Grant Nos.61471149 and 61622107)
文摘Through the coherent accumulation of target echoes, inverse synthetic aperture radar (ISAR) imaging achieves high azimuth resolution. However, because of the instability of the radar system, the echoes of the 1SAR will be randomly lost. The conventional FFT processing methods can cause image blur and high sidelobes or other issues. A novel algorithm for ISAR missing-data imaging based on the Iterative Adaptive Approach (IAA) is proposed. The algorithm enjoys global convergence properties and does not need to set the parameters in advance. The missing-data ISAR imaging results for simulated and measured data illustrate the effectiveness of the algorithm.
基金supported by the Foundation of Shanghai Education Committee for Shanghai Prospective Excellent Young Teachers under Grant No.355876
文摘The Zakharov-Kuznetsov equation is proved to be nonintegrable by standard Painleve approach and three new types of soliton solutions are obtained by means of the nonstandard truncation of the extended Painleve analysis approach.
文摘A generalized Lyapunov function was employed to investigate the ultimate bound and positively invariant set of a generalized Lorenz system.We derived an ellipsoidal estimate of the ultimate bound and positively invariant set for the generalized Lorenz system,for all the positive values of system parameters a,b,and c.Our results extend the related result of Li,et al.[Li DM,Lu JA,Wu XQ,et al.,Estimating the ultimate bound and positively invariant set for the Lorenz system and a unified chaotic system,Journal of Mathematical Analysis and Application,2006,323(2):844-653].
文摘The properties of the paths in an ROBDD representation of a Boolean function are presented and proved in the present paper, and the applications of ROBDD in calculating signal probability are also discussed. By this method, the troublesome calculation of the correlation among the nodes, which is caused by the re-convergent fan-out in digital system, can be avoided and power estimation can be faster than simulation-based method in [1].
文摘We studied the normality conditions in families of meromorphic functions, improved the results of Fang and Zalcman [Fang ML, Zalcman L, Normal families and shared values of meromorphic functions, Computational Methods and Function Theory, 2001, 1 (1): 289-299], and generalized two new normality criterions. Let F be a family of meromorphic functions in a domain D, a a non-zero finite complex number, B a positive real number, and k and m two positive integers satisfying m〉2k+4. If every function denoted by f belonging to F has only zeros with multiplicity at least k and satisfies f^m(z)f^(k)(Z)=α→ |^f(k)(z)| ≤B or f^m(z)f^(k)(z)=α→|f(z)| ≥, then F is normal in D.
文摘In the last years, architectural practice has been confronted with a paradigm shift towards the application of digital methods in design activities. In this regard, it is a pedagogic challenge to provide a suitable computational background for architectural students, to improve their ability to apply algorithmic-parametric logic, as well as fabrication and prototyping resources to design problem solving. This challenge is even stronger when considering less favored social and technological contexts, such as in Brazil, for example. In this scenario, this article presents and discusses the procedures and the results from a didactic experience carried out in a design computing-oriented discipline, inserted in the curriculum of a Brazilian architecture course. Hence, this paper shares some design computing teaching experiences and presents some results on computational methods and creative approaches, with a view to contribute to a better understanding about the relations between logical thinking, mathematics and architectural design processes.
基金Project supported by the Development Science Foundation of Shanghai Municipal Commission of Science and Technology (Grant No.045115012)the Shanghai Leading Academic Discipline Project (Grant No.T0102)the Shanghai Fiber Optics Leading Lab (Grant No.SKLSF0200505)
文摘Routing algorithm is a challenge for a mobile ad hoc network (MANET), but current routing protocols for MANETs consider the path with minimum number of hops as the optimal path to a given destination. This strategy does not balance the traffic load over a MANET, and may result in some disadvantages such as creating congested area, depleting power faster and enlarging time delay in the nodes with heavy duties. In this paper, we propose a routing scheme that balances the load over the network by selecting a path based on its mean load-square, the proposed routing metric can reflect not only the load of the path, but also the load distribution along the path. Simulation results show effectiveness of this routing scheme on balancing the load over all nodes in the network.
文摘We studied the normality criterion for families of meromorphic functions related to shared sets. Let F be a family of meromorphic functions on the unit disc △, a and b be distinct non-zero values, S={a,b}, and k be a positive integer. If for every f∈ F, i) the zeros of f(z) have a multiplicity of at least k+ 1, and ii) E^-f(k)(S) lohtain in E^-f(S), then F is normal on .4. At the same time, the corresponding results of normal function are also proved.
文摘The uniqueness problem of entire functions concerning weighted sharing was discussed, and the following theorem was proved. Let f and 8 be two non-constant entire functions, m, n and k three positive integers, and n〉2k+4. If Em(1,(f^n)^(k))= Em(1,(g^n)^(k)), then either f(z)=c1c^cz and 8(z)= c2c^cz or f=ts, where c, c1 and c2 are three constants satisfying (-1)^k(c1c2)^n(nc)^2k=], and t is a constant satisfying t^n=1. The theorem generalizes the result of Fang [Fang ML, Uniqueness and value sharing of entire functions, Computer & Mathematics with Applications, 2002, 44: 823-831].
文摘A normal theorem concerning meromorphic functions sharing values was proved with the method of Zalcman- Pang.The theorem is as follows. If for each f in F, all zeros of f-a have multiplicity at least k (k≥2), f and its k-th derivative function share a, and if f=b whenever its k-th derivative equal b, then F is normal in D. This theorem improved the result of Chen and Fang [Chen HH, Fang ML, Shared values and normal families of meromorphic functions, Journal of Mathematical Analysis and Applications, 2001, 260: 124-132].
基金Supported by the YSF of Guangdong University of Technology(062058)
文摘The class of E'-matrices introduced in [4] is a subclass of Q0-matrices whose proper principal submatrices are Q--matrices. In this paper, we investigate the relation of the class E' to other known matrix classes and obtain a series of necessary and sufficient conditions for E'-matrices.
文摘Gas extraction is one of the main measures of control and use of gas of coal mines. At present, the design method is under the experimental period and do not satisfy the need of practice. In this paper, the theory of gas extraction of coal seams based upon Darcy law was studied. Mathematical model of gas extraction of coal seams was established and two kinds of solv- ing approaches based on computer software and linear approximation were given. The rightness and the validities of the model were examined with a practical example. Results obtained can be used to determine and optimize the parameters related etc.
文摘By using a well known result in combinatorics, named Konig Lemma, this paper generalized the method of constructing measure by repeated subdivision, which was a basic tool for fractal geometry. A more general method was presented to construct measure, which was an essential improvement to the existing result. The proof employed a skill similar to that for Konig Lemma, which helped to avoid using the compactness in Euclidean space. Two conditions of the existing method were found not necessary.
基金the National Natural Science Foundation of China(51176170,51276163)the Zhejiang Provincial Natural Science Foundation for Distinguished Young Scholars(LR12E06001)supported by the Fundamental Research Funds for the Central Universities
文摘Computational fluid dynamics is an efficient numerical approach for spray atomization study, but it is challenging to accurately capture the gas-liquid interface. In this work, an accurate conservative level set method is intro- duced to accurately track the gas-liquid interfaces in liquid atomization. To validate the capability of this method, binary drop collision and drop impacting on liquid film are investigated. The results are in good agreement with experiment observations. In addition, primary atomization (swirling sheet atomization) is studied using this method. To the swirling sheet atomization, it is found that Rayleigh-Taylor instability in the azimuthal direction causes the primary breakup of liquid sheet and complex vortex structures are clustered around the rim of the liq- uid sheet. The effects of central gas velocity and liquid-gas density ratio on atomization are also investigated. This work lays a solid foundation for further studvin~ the mechanism of s^rav atomization.
文摘This paper presents an inequality, by use of which some results about the value distribution of f nf (k) are proved, where n and k are two positive integers.
基金Funded by Natural Science Foundation of China (No. 10231010)KJ of Chongqing Educational Committee (No.KJ071105)and Chongqing Three Gorges University (No. SXXYYB07004).
文摘The sufficient and necessary conditions, the existence and uniqueness of a new class of central configuration in R^3, for the conjugate-nest consisting of two regular tetrahedrons, are proved. If the configuration is a central configuration, then all masses of outside layer are equivalent, and the masses of inside layer are also equivalent. At the same time p (the ratio of the sizes) and mass ratio τ=m^/m must be satisfied by some formulas. For any radius ratios ρ∈(0, 0.152996 918 2) or (0.715 223 148 7, 1.398 165 037), there is only one central configuration. Otherwise, for any given mass ratio τ, there may exist more than one central configuration.
文摘The uniqueness of meromorphic fuctions sharing one value was studied. Using the concept of weighted sharing, we proved the following theorem. For two meromorphic functions [ and g which are not polynominals of degree less than a positive integer k, if f^nf(k)and g^ng^(k) share (1,2), where n is another positive integer not less than k+10, then f^nf^(k) identically equals g^ng ^(k) or f^nf^(k)g^ng^(k) identically equals 1. Particularly for k =1, we improved the results of Yang [Yang CC, Hua XH, Uniqueness and value-sharing of meromorphic functions, Annales Academiae Scientiarum Fennicae Mathematica, 1997, 22: 395-406], and Fang [Fang ML, Hua XH, Entire function that share one value, Journal of Nanjing University, 1996, 13(1): 44-48. (In Chinese)].
文摘In fuzzy set theory, instead of the underlying membership set being a two-valued set it is a multi-valued set that generally has the structure of a lattice L with a minimal element O and the maximal element I. Furthermore if ∧, ∨, → and ┐ are defined in the set L, then we can use these operations to define, as in the ordinary set theory, operations on fuzzy subsets. In this paper we give a model of the Lattice-Valued Logic with set of agents. Any agents know the logic value of a sentence p. The logic value is compatible with all of the accessible conceptual models or worlds of p inside the agent. Agent can be rational or irrational in the use of the logic operation. Every agent of n agents can have the same set of conceptual models for p and know the same logic for p in this case the agents form a consistent group of agents. When agents have different conceptual models for p, different subgroup of agents know different logic value for p. In this case the n agents are inconsistent in the expression of the logic value for p. The valuation structure of set of agents can be used as a semantic model for the Lattice-valued Logic and fuzzy logic.