Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks ...Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation.展开更多
Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protoc...Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange.展开更多
The simulation techniques of hardware-in-loop simulation(HLS) of homing antitank missile based on the personal computer (PC) are discussed. The PC and MCS-96 chip controller employ A/D and D/A boards (with photoelectr...The simulation techniques of hardware-in-loop simulation(HLS) of homing antitank missile based on the personal computer (PC) are discussed. The PC and MCS-96 chip controller employ A/D and D/A boards (with photoelectricity isolation) to transfer measur ment and control information about homing head, gyro and rudder and utilize the digital hand shaking board to build correct communication communication protocol. In order to satisfy the real-time requirement of HLS, this paper first simplifies the aerodynamic data file reasonably, then builds a PC software with C language. The program of the controller part is made with PL/M language. The simulation of HLS based on PC is done with the same sampling period of 10ms as that of YH-F1 and the experiment results are identical to those of digital simulation of the homing anti-tank guided missile.展开更多
Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received pa...Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate.展开更多
For the research of mobile Ad hoc network (MANET), hardware in the loop simulation (HILS) is introduced to improve simulation fidelity. The architectures and frameworks of HILS system are discussed. Based on HILS and ...For the research of mobile Ad hoc network (MANET), hardware in the loop simulation (HILS) is introduced to improve simulation fidelity. The architectures and frameworks of HILS system are discussed. Based on HILS and QualNet network simulator, two kinds of simulation frameworks for MANET multicast emergency communication network are proposed. By running simulation under this configuration and doing experiments with on-demand multicast routing protocol (ODMRP), unicast and multicast functions of this protocol are tested. Research results indicate that HILS method can effectively reduce the difficulty of system modeling and improve precision of simulation, and can further accelerate transition from design to system deployment.展开更多
The goal of an UHDTV is to broadcast digital video contents which is 16 times the pixel resolution of HDTV. As the resolution is increased, the UHDTV requires a transmission technology to support very high data transf...The goal of an UHDTV is to broadcast digital video contents which is 16 times the pixel resolution of HDTV. As the resolution is increased, the UHDTV requires a transmission technology to support very high data transfer rate. In this paper, we propose two out-of-band protocols to transmit UHDTV contents in a CATV network: an OOB-based protocol and a DSG-based protocol. The former may be a short term solution which is well suitable for a traditional CATV network and the letter may be a long term solution which is adoptable for a CATV network equipped with DOCSIS functionalities. In order to transfer 200 Mbps UHDTV contents, proposed protocols use a channel bonding mechanism which combines several QAM channels. We propose CATV network architectures to support an UHDTV service with a channel bonding mechanism, and design the format of messages to share the information of bonded channels between a headend and a STB. We develop an OPNET simulator and ascertain successful transmission of UHDTV contents.展开更多
Building performance simulation (BPS) is a crucial tool towards the design of projects better adapted its climatic context. In this sense, the objective of this research is to evaluate a method of thermal comfort anal...Building performance simulation (BPS) is a crucial tool towards the design of projects better adapted its climatic context. In this sense, the objective of this research is to evaluate a method of thermal comfort analysis of schools in three Brazilian cities using BPS. The methodological procedures involved a literature review, in which the simulation tool and analysis method were chosen. Following simulations with the software DesignBuilder were performed using as study case a standard school typology designed by the General Coordination of Educational Infrastructure (CODIN/FNDE). This article evaluates its percentage occupied comfort hours in 3 reference cities: Cuiabá-MT, Brasília-DF, and Curitiba-PR. The results show respectively, for the cities of Curitiba, Brasília and Cuiabá, percentages of comfort hours of 76%, 70%, and 23%. The research states that the project must have different strategies for different climates. Finally, this article recommends this method should be applied to other cities and buildings.展开更多
Several works by the authors have shown that energy consumption in communication networks does not only depend on the traffic load but on all connected equipment in the network. We have contributed a new mathematical ...Several works by the authors have shown that energy consumption in communication networks does not only depend on the traffic load but on all connected equipment in the network. We have contributed a new mathematical model and a new energy saving strategy with Software Defined Network (SDN) technology [1]. Our Model solution is based on the Modified SPRING Protocol (MSP). In this paper, we simulated our work and compared it to that of the authors [2] and [3]. The OMNET++ simulator was used for our work. Thus, the results of the simulations gave a delay that tends to zero, a packet loss of the order of 10% and a constant jitter of 4% better than the previous authors.展开更多
Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smar...Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.展开更多
Humidity can affect the attenuation of MEA(membrane electrode assembly), however, the relationship between humidity and MEA decays is complex and ambiguous in realistic application. Herein, we design a simulating auto...Humidity can affect the attenuation of MEA(membrane electrode assembly), however, the relationship between humidity and MEA decays is complex and ambiguous in realistic application. Herein, we design a simulating automotive protocol, performed on five single fuel cells under RH(relative humidity) 100%,RH 80%, RH 64%, and RH 40%, RH 10%, respectively, to study the relationship of MEA decays and humidity and suggest optimized humidity range to extend the durability. With the electrochemical impedance spectroscopy, cyclic voltammetry, X-ray fluorescence, X-ray diffraction, transmission electron microscope, X-ray photoelectron spectroscopy, the four degradation mechanisms about catalyst layer, including Pt dissolution, Pt coarsening, carbon corrosion and ionomer degradation, are observed. Pt coarsening and carbon corrosion are accelerated by higher water content at high humidity. Ionomer degradation and Pt dissolution are enhanced in low humidity. With the linear sweep voltammetry, ion chromatography,nuclear magnetic resonance, tensile test and scan electron microscope, chemical and mechanical degradation in proton exchange membrane are all observed in these five fuels. Chemical degradation, characterized by membrane thinning and more fluoride loss, occurred markedly in RH 10%. Mechanical degradation, characterized by the non-uniformity thickness and bad mechanical properties, is more pronounced in RH 100%, RH 80%, RH 64%. These two degradations are in a moderate level in RH 40%. The research suggests that the RH range from 64% to 40% is conductive to mitigate the degradation of MEAs operated in automotive applications.展开更多
This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering...This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology.展开更多
A new network protocol (Demand Priority Protocol) environmentcan provide more satisfying service for different urgent transmission requests. Inthis paper, in order to provide guidance for the selection of environment ...A new network protocol (Demand Priority Protocol) environmentcan provide more satisfying service for different urgent transmission requests. Inthis paper, in order to provide guidance for the selection of environment of multimedia data transmission in Computer Supported Cooperative Work better, an objectoriented protocol specification language based on C++ is used to design a virtualenvironment of multiworkstation of computer cooperative work and to simulate execution of demand priority network protocol and then the performances of varioustransmission requests are analyzed. Finally, an evaluation of the demand priorityLAN is given.展开更多
To meet the challenges in software testing for automated vehicles,such as increasing system complexity and an infinite number of operating scenarios,new simulation methods must be developed.Closed-loop simulations for...To meet the challenges in software testing for automated vehicles,such as increasing system complexity and an infinite number of operating scenarios,new simulation methods must be developed.Closed-loop simulations for automated driving(AD)require highly complex simulation models for multiple controlled vehicles with their perception systems as well as their surrounding context.For the realization of such models,different simulation domains must be coupled with co-simulation.However,widely supported model integration standards such as functional mock-up interface(FMI)lack native support for distributed platforms,which is a key feature for AD due to the computational intensity and platform exclusivity of certain models.The newer FMI companion standard distributed co-simulation protocol(DCP)introduces platform coupling but must still be used in conjunction with AD co-simulations.As part of an assessment framework for AD,this paper presents a DCP compliant implementation of an interoperable interface between a 3D environment and vehicle simulator and a co-simulation platform.A universal Python wrapper is implemented and connected to the simulator to allow its control as a DCP slave.A C-code-based interface enables the co-simulation platform to act as a DCP master and to realize cross-platform data exchange and time synchronization of the environment simulation with other integrated models.A model-in-the-loop use case is performed with the traffic simulator CARLA running on a Linux machine connected to the co-simulation master xMOD on a Windows computer via DCP.Several virtual vehicles are successfully controlled by cooperative adaptive cruise controllers executed outside of CARLA.The standard compliance of the implementation is verified by exemplary connection to prototypic DCP solutions from 3rd party vendors.This exemplary application demonstrates the benefits of DCP compliant tool coupling for AD simulation with increased tool interoperability,reuse potential,and performance.展开更多
Quantum computing is a game-changing technology for global academia,research centers and industries including computational science,mathematics,finance,pharmaceutical,materials science,chemistry and cryptography.Altho...Quantum computing is a game-changing technology for global academia,research centers and industries including computational science,mathematics,finance,pharmaceutical,materials science,chemistry and cryptography.Although it has seen a major boost in the last decade,we are still a long way from reaching the maturity of a full-fledged quantum computer.That said,we will be in the noisy-intermediate scale quantum(NISQ)era for a long time,working on dozens or even thousands of qubits quantum computing systems.An outstanding challenge,then,is to come up with an application that can reliably carry out a nontrivial task of interest on the near-term quantum devices with non-negligible quantum noise.To address this challenge,several near-term quantum computing techniques,including variational quantum algorithms,error mitigation,quantum circuit compilation and benchmarking protocols,have been proposed to characterize and mitigate errors,and to implement algorithms with a certain resistance to noise,so as to enhance the capabilities of near-term quantum devices and explore the boundaries of their ability to realize useful applications.Besides,the development of near-term quantum devices is inseparable from the efficient classical sim-ulation,which plays a vital role in quantum algorithm design and verification,error-tolerant verification and other applications.This review will provide a thorough introduction of these near-term quantum computing techniques,report on their progress,and finally discuss the future prospect of these techniques,which we hope will motivate researchers to undertake additional studies in this field.展开更多
The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detecti...The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detection of multipath routing (CD_AOMDV) is proposed. The method of combining the whole congestion degree detection and local congestion degree detection before service initiation is adopted. Timely and accurate judgment of the congestion degree reduced the loss rate of the hot nodes, so the average packet loss rate reduced. Simulation results show that compared with the traditional AOMDV protocol, the CD_AOMDV proposed in this paper has reduced the packet loss and improved delay performance, which is more suitable for the airspace communication network.展开更多
The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity mak...The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios.展开更多
The necessary background as well as the details of simulation was presented to simulate and evaluate the performance of the ad hoc on-demand distance vector routing protocol in mobile ad hoc network with the help of t...The necessary background as well as the details of simulation was presented to simulate and evaluate the performance of the ad hoc on-demand distance vector routing protocol in mobile ad hoc network with the help of the network simulator NS2 using the common transmission range to deliver the data packets at the destination node. The number of participating nodes played an important role to predict the conditions for the best performance of the protocol with respect to throughput, delay, packet delivery ratio, drop packets, consumed and residual energy of the network. Further, the efforts can be put to control the transmission range dynamically and overheads for reducing the energy consumption in the network and improving its lifetime of the nodes and the lifespan of the network.展开更多
基金National Natural Science Foundations of China(Nos.60872073,6097501,and 51075068)the Doctoral Fund of Ministry of Education of China(No.20110092130004)the Research Foundation and Education Bureau of Anhui Province of China(No.KJ2009B137)
文摘Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation.
基金Supported by the National Natural Science Foundation of China(No.61401496)
文摘Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange.
文摘The simulation techniques of hardware-in-loop simulation(HLS) of homing antitank missile based on the personal computer (PC) are discussed. The PC and MCS-96 chip controller employ A/D and D/A boards (with photoelectricity isolation) to transfer measur ment and control information about homing head, gyro and rudder and utilize the digital hand shaking board to build correct communication communication protocol. In order to satisfy the real-time requirement of HLS, this paper first simplifies the aerodynamic data file reasonably, then builds a PC software with C language. The program of the controller part is made with PL/M language. The simulation of HLS based on PC is done with the same sampling period of 10ms as that of YH-F1 and the experiment results are identical to those of digital simulation of the homing anti-tank guided missile.
文摘Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate.
文摘For the research of mobile Ad hoc network (MANET), hardware in the loop simulation (HILS) is introduced to improve simulation fidelity. The architectures and frameworks of HILS system are discussed. Based on HILS and QualNet network simulator, two kinds of simulation frameworks for MANET multicast emergency communication network are proposed. By running simulation under this configuration and doing experiments with on-demand multicast routing protocol (ODMRP), unicast and multicast functions of this protocol are tested. Research results indicate that HILS method can effectively reduce the difficulty of system modeling and improve precision of simulation, and can further accelerate transition from design to system deployment.
文摘The goal of an UHDTV is to broadcast digital video contents which is 16 times the pixel resolution of HDTV. As the resolution is increased, the UHDTV requires a transmission technology to support very high data transfer rate. In this paper, we propose two out-of-band protocols to transmit UHDTV contents in a CATV network: an OOB-based protocol and a DSG-based protocol. The former may be a short term solution which is well suitable for a traditional CATV network and the letter may be a long term solution which is adoptable for a CATV network equipped with DOCSIS functionalities. In order to transfer 200 Mbps UHDTV contents, proposed protocols use a channel bonding mechanism which combines several QAM channels. We propose CATV network architectures to support an UHDTV service with a channel bonding mechanism, and design the format of messages to share the information of bonded channels between a headend and a STB. We develop an OPNET simulator and ascertain successful transmission of UHDTV contents.
基金The first author wishes thanks to the Brazilian National Council for Scientific and Technological Development(CNPq)for supporting this research.
文摘Building performance simulation (BPS) is a crucial tool towards the design of projects better adapted its climatic context. In this sense, the objective of this research is to evaluate a method of thermal comfort analysis of schools in three Brazilian cities using BPS. The methodological procedures involved a literature review, in which the simulation tool and analysis method were chosen. Following simulations with the software DesignBuilder were performed using as study case a standard school typology designed by the General Coordination of Educational Infrastructure (CODIN/FNDE). This article evaluates its percentage occupied comfort hours in 3 reference cities: Cuiabá-MT, Brasília-DF, and Curitiba-PR. The results show respectively, for the cities of Curitiba, Brasília and Cuiabá, percentages of comfort hours of 76%, 70%, and 23%. The research states that the project must have different strategies for different climates. Finally, this article recommends this method should be applied to other cities and buildings.
文摘Several works by the authors have shown that energy consumption in communication networks does not only depend on the traffic load but on all connected equipment in the network. We have contributed a new mathematical model and a new energy saving strategy with Software Defined Network (SDN) technology [1]. Our Model solution is based on the Modified SPRING Protocol (MSP). In this paper, we simulated our work and compared it to that of the authors [2] and [3]. The OMNET++ simulator was used for our work. Thus, the results of the simulations gave a delay that tends to zero, a packet loss of the order of 10% and a constant jitter of 4% better than the previous authors.
文摘Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.
基金supported by the National Key Research and Development Program of China (2018YFB1502502)the National Natural Science Foundation of China (22179127)。
文摘Humidity can affect the attenuation of MEA(membrane electrode assembly), however, the relationship between humidity and MEA decays is complex and ambiguous in realistic application. Herein, we design a simulating automotive protocol, performed on five single fuel cells under RH(relative humidity) 100%,RH 80%, RH 64%, and RH 40%, RH 10%, respectively, to study the relationship of MEA decays and humidity and suggest optimized humidity range to extend the durability. With the electrochemical impedance spectroscopy, cyclic voltammetry, X-ray fluorescence, X-ray diffraction, transmission electron microscope, X-ray photoelectron spectroscopy, the four degradation mechanisms about catalyst layer, including Pt dissolution, Pt coarsening, carbon corrosion and ionomer degradation, are observed. Pt coarsening and carbon corrosion are accelerated by higher water content at high humidity. Ionomer degradation and Pt dissolution are enhanced in low humidity. With the linear sweep voltammetry, ion chromatography,nuclear magnetic resonance, tensile test and scan electron microscope, chemical and mechanical degradation in proton exchange membrane are all observed in these five fuels. Chemical degradation, characterized by membrane thinning and more fluoride loss, occurred markedly in RH 10%. Mechanical degradation, characterized by the non-uniformity thickness and bad mechanical properties, is more pronounced in RH 100%, RH 80%, RH 64%. These two degradations are in a moderate level in RH 40%. The research suggests that the RH range from 64% to 40% is conductive to mitigate the degradation of MEAs operated in automotive applications.
文摘This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology.
文摘A new network protocol (Demand Priority Protocol) environmentcan provide more satisfying service for different urgent transmission requests. Inthis paper, in order to provide guidance for the selection of environment of multimedia data transmission in Computer Supported Cooperative Work better, an objectoriented protocol specification language based on C++ is used to design a virtualenvironment of multiworkstation of computer cooperative work and to simulate execution of demand priority network protocol and then the performances of varioustransmission requests are analyzed. Finally, an evaluation of the demand priorityLAN is given.
基金Open Access funding enabled and organized by Projekt DEAL.This work was supported in part by the German Ministry of Education and Research(BMBF)under grant 01IS16043.
文摘To meet the challenges in software testing for automated vehicles,such as increasing system complexity and an infinite number of operating scenarios,new simulation methods must be developed.Closed-loop simulations for automated driving(AD)require highly complex simulation models for multiple controlled vehicles with their perception systems as well as their surrounding context.For the realization of such models,different simulation domains must be coupled with co-simulation.However,widely supported model integration standards such as functional mock-up interface(FMI)lack native support for distributed platforms,which is a key feature for AD due to the computational intensity and platform exclusivity of certain models.The newer FMI companion standard distributed co-simulation protocol(DCP)introduces platform coupling but must still be used in conjunction with AD co-simulations.As part of an assessment framework for AD,this paper presents a DCP compliant implementation of an interoperable interface between a 3D environment and vehicle simulator and a co-simulation platform.A universal Python wrapper is implemented and connected to the simulator to allow its control as a DCP slave.A C-code-based interface enables the co-simulation platform to act as a DCP master and to realize cross-platform data exchange and time synchronization of the environment simulation with other integrated models.A model-in-the-loop use case is performed with the traffic simulator CARLA running on a Linux machine connected to the co-simulation master xMOD on a Windows computer via DCP.Several virtual vehicles are successfully controlled by cooperative adaptive cruise controllers executed outside of CARLA.The standard compliance of the implementation is verified by exemplary connection to prototypic DCP solutions from 3rd party vendors.This exemplary application demonstrates the benefits of DCP compliant tool coupling for AD simulation with increased tool interoperability,reuse potential,and performance.
基金support from the Youth Talent Lifting Project(Grant No.2020-JCJQ-QT-030)the National Natural Science Foundation of China(Grant Nos.11905294,and 12274464)+7 种基金the China Postdoctoral Science Foundation,and the Open Research Fund from State Key Laboratory of High Performance Computing of China(Grant No.201901-01)support from the National Natural Science Foundation of China(Grant Nos.11805279,12074117,61833010,and 12061131011)support from the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDB28000000)the National Natural Science Foundation of China(Grant Nos.61832003,61872334,and 61801459)the National Natural Science Foundation of China(Grant No.12005015)the National Natural Science Foundation of China(Grant Nos.11974205,and 11774197)the National Key Research and Development Program of China(Grant No.2017YFA0303700)the Key Research and Development Program of Guangdong Province(Grant No.2018B030325002).
文摘Quantum computing is a game-changing technology for global academia,research centers and industries including computational science,mathematics,finance,pharmaceutical,materials science,chemistry and cryptography.Although it has seen a major boost in the last decade,we are still a long way from reaching the maturity of a full-fledged quantum computer.That said,we will be in the noisy-intermediate scale quantum(NISQ)era for a long time,working on dozens or even thousands of qubits quantum computing systems.An outstanding challenge,then,is to come up with an application that can reliably carry out a nontrivial task of interest on the near-term quantum devices with non-negligible quantum noise.To address this challenge,several near-term quantum computing techniques,including variational quantum algorithms,error mitigation,quantum circuit compilation and benchmarking protocols,have been proposed to characterize and mitigate errors,and to implement algorithms with a certain resistance to noise,so as to enhance the capabilities of near-term quantum devices and explore the boundaries of their ability to realize useful applications.Besides,the development of near-term quantum devices is inseparable from the efficient classical sim-ulation,which plays a vital role in quantum algorithm design and verification,error-tolerant verification and other applications.This review will provide a thorough introduction of these near-term quantum computing techniques,report on their progress,and finally discuss the future prospect of these techniques,which we hope will motivate researchers to undertake additional studies in this field.
文摘The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detection of multipath routing (CD_AOMDV) is proposed. The method of combining the whole congestion degree detection and local congestion degree detection before service initiation is adopted. Timely and accurate judgment of the congestion degree reduced the loss rate of the hot nodes, so the average packet loss rate reduced. Simulation results show that compared with the traditional AOMDV protocol, the CD_AOMDV proposed in this paper has reduced the packet loss and improved delay performance, which is more suitable for the airspace communication network.
文摘The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios.
文摘The necessary background as well as the details of simulation was presented to simulate and evaluate the performance of the ad hoc on-demand distance vector routing protocol in mobile ad hoc network with the help of the network simulator NS2 using the common transmission range to deliver the data packets at the destination node. The number of participating nodes played an important role to predict the conditions for the best performance of the protocol with respect to throughput, delay, packet delivery ratio, drop packets, consumed and residual energy of the network. Further, the efforts can be put to control the transmission range dynamically and overheads for reducing the energy consumption in the network and improving its lifetime of the nodes and the lifespan of the network.