The risk of gas leakage due to geological flaws in offshore carbon capture, utilization, and storage, as well as leakage from underwater oil or gas pipelines, highlights the need for underwater gas leakage monitoring ...The risk of gas leakage due to geological flaws in offshore carbon capture, utilization, and storage, as well as leakage from underwater oil or gas pipelines, highlights the need for underwater gas leakage monitoring technology. Remotely operated vehicles(ROVs) and autonomous underwater vehicles(AUVs) are equipped with high-resolution imaging sonar systems that have broad application potential in underwater gas and target detection tasks. However, some bubble clusters are relatively weak scatterers, so detecting and distinguishing them against the seabed reverberation in forward-looking sonar images are challenging. This study uses the dual-tree complex wavelet transform to extract the image features of multibeam forward-looking sonar. Underwater gas leakages with different flows are classified by combining deep learning theory. A pool experiment is designed to simulate gas leakage, where sonar images are obtained for further processing. Results demonstrate that this method can detect and classify underwater gas leakage streams with high classification accuracy. This performance indicates that the method can detect gas leakage from multibeam forward-looking sonar images and has the potential to predict gas leakage flow.展开更多
Recent seismic events have raised concerns over the safety and vulnerability of reinforced concrete moment resisting frame "RC-MRF" buildings. The seismic response of such buildings is greatly dependent on the compu...Recent seismic events have raised concerns over the safety and vulnerability of reinforced concrete moment resisting frame "RC-MRF" buildings. The seismic response of such buildings is greatly dependent on the computational tools used and the inherent assumptions in the modelling process. Thus, it is essential to investigate the sensitivity of the response demands to the corresponding modelling assumption. Many parameters and assumptions are justified to generate effective structural finite element(FE) models of buildings to simulate lateral behaviour and evaluate seismic design demands. As such, the present study focuses on the development of reliable FE models with various levels of refinement. The effects of the FE modelling assumptions on the seismic response demands on the design of buildings are investigated. the predictive ability of a FE model is tied to the accuracy of numerical analysis; a numerical analysis is performed for a series of symmetric buildings in active seismic zones. The results of the seismic response demands are presented in a comparative format to confirm drift and strength limits requirements. A proposed model is formulated based on a simplified modeling approach, where the most refined model is used to calibrate the simplified model.展开更多
Aiming at a novel missile-borne detector in the optional burst height proximity fuze, a self-adaptive high-resolution forward-looking imaging algorithm (SAHRFL-IA) is presented. The echo data are captured by the missi...Aiming at a novel missile-borne detector in the optional burst height proximity fuze, a self-adaptive high-resolution forward-looking imaging algorithm (SAHRFL-IA) is presented. The echo data are captured by the missile-borne detector in the target regions;thereby the azimuth angulation accuracy at the same distance dimension is improved dynamically. Thus, azimuth information of the targets in the detection area may be obtained accurately. The proposed imaging algorithm breaks through the conventional misconception of merely using azimuth discrimination curves under ideal conditions during monopulse angulation. The real-time echo data from the target region are used to perform error correction for this discrimination curve, and finally the accuracy of the azimuth angulation may reach the optimum at the same distance dimension. A series of experiments demonstrate the validity, reliability and high performance of the proposed imaging algorithm. Azimuth angulation accuracy may reach ten times that of the detection beam width. Meanwhile, the running time of this algorithm satisfies the requirements of missile-borne platforms.展开更多
The bistatic Synthetic Aperture Radar (SAR) systems with separate transmitter and receiver antennas provide a new potential to imaging in the forward-looking geometry. Analysis of the Doppler property in this paper in...The bistatic Synthetic Aperture Radar (SAR) systems with separate transmitter and receiver antennas provide a new potential to imaging in the forward-looking geometry. Analysis of the Doppler property in this paper indicates the feasibility of Bistatic Forward-Looking (BFL) SAR imaging. Considering the different Doppler property determined by the two platforms in BFL SAR, a new 2-D point target spectrum is derived in our study. Based on the spectrum, an imaging method is chosen for the configuration, and the point target simulation validates the analysis.展开更多
Rehabilitation of existing structures with fiber reinforced plastic(FRP)has been growing in popularity because they offer superior performance in terms of resistance to corrosion and high specific stiffness.The strain...Rehabilitation of existing structures with fiber reinforced plastic(FRP)has been growing in popularity because they offer superior performance in terms of resistance to corrosion and high specific stiffness.The strain coordination results of 34 reinforced concrete beams(four groups)strengthened with different methods were presented including external-bonded or near-surface mounted glass or carbon FRP or helical rib bar in order to study the strain coordination of the strengthening materials and steel rebar of RC beam.Because there is relative slipping between concrete and strengthening materials(SM),the strain of SM and steel rebar of RC beam satisfies the double linear strain distribution assumption,that is,the strain of longitudinal fiber parallel to the neutral axis of plated beam within the scope of effective height(h0)of the cross section is in direct proportion to the distance from the fiber to the neutral axis.The strain of SM and steel rebar satisfies the equation εGCH=βεsteel,where the value of β is equal to 1.1-1.3 according to the test results.展开更多
Background:Familiarity with a simulation platform can seduce modellers into accepting untested assumptions for convenience of implementation.These assumptions may have consequences greater than commonly suspected,and ...Background:Familiarity with a simulation platform can seduce modellers into accepting untested assumptions for convenience of implementation.These assumptions may have consequences greater than commonly suspected,and it is important that modellers remain mindful of assumptions and remain diligent with sensitivity testing.Methods:Familiarity with a technique can lead to complacency,and alternative approaches and software can reveal untested assumptions.Visual modelling environments based on system dynamics may help to make critical assumptions more evident by offering an accessible visual overview and empowering a focus on representational rather than computational efficiency.This capacity is illustrated using a cohort-based forest growth model developed for mixed species forest.Results:The alternative model implementation revealed that untested assumptions in the original model could have substantial influence on simulated outcomes.Conclusions:An important implication is that modellers should remain conscious of all assumptions,consider alternative implementations that reveal assumptions more clearly,and conduct sensitivity tests to inform decisions.展开更多
In the spaceborne/airborne forward-looking bistatic syn- thetic aperture radar (SA-FBSAR), due to the system platforms' remarkable velocity difference and the forward-looking mode, the range cell migration (RCM) ...In the spaceborne/airborne forward-looking bistatic syn- thetic aperture radar (SA-FBSAR), due to the system platforms' remarkable velocity difference and the forward-looking mode, the range cell migration (RCM) not only depends on the target's two- dimensional location, but also varies with the range location non- linearly. And the nonlinearity is not just the slight deviation from the linear part, but exhibits evident nonlinear departure in the RCM trajectory. If the RCM is not properly corrected, nonlinear image distortions would occur. Based on the RCM model, a modified two-step RCM compensation (RCMC) method for SA-FBSAR is proposed. In this method, firstly the azimuth-dependent RCM is compensated by the scaling Fourier transform and the phase multi- plication. And then the range-dependent RCM is removed through interpolation. The effectiveness of the proposed RCMC method is verified by the simulation results of both point scatterers and area targets.展开更多
The distribution of shear stress on the cross-section of plastic metal solid circular shaft under pure torsion yielding, the applicability of complete plastic model assumption and the shear stress formula were researc...The distribution of shear stress on the cross-section of plastic metal solid circular shaft under pure torsion yielding, the applicability of complete plastic model assumption and the shear stress formula were researched. Based on the shear stress formula of circular shaft under pure torsion in elastic stage, the formula of torque in elastic stage and the definition of yield, it is obtained that the yielding stage of plastic metal shaft under pure torsion is only a surface phenomenon of torque-torsion angle relationship, and the distribution of shear stress is essentially different from that of tensile stress when yielding under uniaxial tension. The pure torsion platform-torsion angle and the shape of torque-torsion angle curve cannot change the distribution of shear stress on the shaft cross-section. The distribution of shear stress is still linear with the maximum shear stress ts. The complete plasticity model assumption is not in accordance with the actual situation of shaft under torsion. The experimental strength data of nine plastic metals are consistent with the calculated results of the new limiting strain energy strength theory (LSEST). The traditional yield stress formula for plastic shaft under torsion is reasonable. The shear stress formula based on the plane assumption in material mechanics is applicable for all loaded stages of torsion shaft.展开更多
Bistatic forward-looking synthetic aperture radar(SAR) has many advantages and applications owing to its twodimensional imaging capability.There could be various imaging configurations because of the geometric flexi...Bistatic forward-looking synthetic aperture radar(SAR) has many advantages and applications owing to its twodimensional imaging capability.There could be various imaging configurations because of the geometric flexibility of bistatic platforms,resulting in kinds of models built independently among which there could be some similar even the same motion features.Comprehensive research on such systems in a more comprehensive and general point of view is required to address their difference and consistency.Property analysis of bistatic forwardlooking SAR with arbitrary geometry is achieved including stripmap and spotlight modes on airborne platform,missile-borne platform,and hybrid platform of both.Emphasis is placed on azimuth space variance of some key parameters significantly affecting the subsequent imaging processing,based on which the frequency spectra are further described and compared considering respective features of different platforms for frequency imaging algorithm developing.Simulation results confirm the effectiveness and correctness of our analysis.展开更多
The article is devoted to hitherto never undertaken applying an almost unknown logically formalized axiomatic epistemology-and-axiology system called “Sigma-V” to the Third Newton’s Law of mechanics. The author has...The article is devoted to hitherto never undertaken applying an almost unknown logically formalized axiomatic epistemology-and-axiology system called “Sigma-V” to the Third Newton’s Law of mechanics. The author has continued investigating the extraordinary (paradigm-breaking) hypothesis of formal-axiological interpreting Newton’s mathematical principles of natural philosophy and, thus, has arrived to discrete mathematical modeling a system of formal axiology of nature by extracting and systematical studying its proper algebraic aspect. Along with the proper algebraic machinery, the axiomatic (hypothetic-deductive) method is exploited in this investigation systematically. The research results are the followings. 1) The Third Newton’s Law of mechanics has been modeled by a formal-axiological equation of two-valued algebraic system of metaphysics as formal axiology. (Precise defining the algebraic system is provided.) The formal-axiological equation has been established (and examined) in this algebraic system by accurate computing compositions of relevant evaluation-functions. Precise tabular definitions of the evaluation-functions are given. 2) The wonderful formula representing the Third Newton’s Law (in the relevant physical interpretation of the formal theory Sigma-V) has been derived logically in Sigma-V from the presumption of a-priori-ness of knowledge. A precise axiomatic definition of the nontrivial notion “a-priori-ness of knowledge” is given. The formal derivation is implemented in strict accordance with the rigor standard of D. Hilbert’s formalism;hence, checking the formal derivation submitted in this article is not a difficult task. With respect to proper theoretical physics, the formal inference is a nontrivial scientific novelty which has not been discussed and published elsewhere yet.展开更多
Based on the general theory of elastic plates which abandons Kirchhoff-Loveassunption in the classical theory. this paper establishes a first order approximationtheory of elastic circular plates with non-Kirchhoff-Lov...Based on the general theory of elastic plates which abandons Kirchhoff-Loveassunption in the classical theory. this paper establishes a first order approximationtheory of elastic circular plates with non-Kirchhoff-Love assumption, and presents ananalytic solution to the axisymmetric problem of elastic circular plates with clampedboundary under uniformly distributed load. By comparing with the classical solution ofthe thin circular plates, it is verified that the new solution is closer to the experimentresults than the classical solution. By virtue of the new theory. the influence of thediameter-to=thickness ratio upon the precision of the classical theory is examined.展开更多
Recently, many bit commitment schemes have been presented. This paper presents a new practical bit commitment scheme based on Schnorr's one-time knowledge proof scheme,where the use of cut-and-choose method and ma...Recently, many bit commitment schemes have been presented. This paper presents a new practical bit commitment scheme based on Schnorr's one-time knowledge proof scheme,where the use of cut-and-choose method and many random exam candidates in the protocols are replaced by a single challenge number. Therefore the proposed bit commitment scheme is more efficient and practical than the previous schemes In addition, the security of the proposed scheme under factoring assumption is proved, thus the cryptographic basis of the proposed scheme is clarified.展开更多
It is a challenge to evaluate the conditions of railway track without interruption of regular traffic. In this paper, the authors introduce the detection of cavities under the railway substructure by using forward-loo...It is a challenge to evaluate the conditions of railway track without interruption of regular traffic. In this paper, the authors introduce the detection of cavities under the railway substructure by using forward-looking ground penetrating radar (FLGPR). Main advantages of FLGPR are that such a system can illuminate a large area and can stand off a long distance over its down-looking counterpart. Two methods, frequency wave-number (F-W) synthetic aperture imaging (SAI) and beam-forming by delay and sum (DAS), are applied to process the collected data. Analysis and measuring show that the distinct radar image of the cavity beneath the substructure 1.2 m deep can be formed by these two methods.展开更多
The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for ...The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for two party key agreement protocol, however most of the current secure protocols can not be prove to secure without Gap assumption. To avoid this phenomenon, by using twinning key technology we propose a new two party key agreement protocol TUP which is obtained by modifying the UP protocol, then in conjunction with the trapdoor test, we prove strictly that the new protocol is secure in eCK model. Compared with previous protocols, the security assumption of new proposal is more standard and weaker, and it also solves an open problem in ProvSec'09.展开更多
In this paper, the theory of elastic circular plate with no classical Kirchhoff-Love assumptions is established on the basis of a previous paper. In this theory, no classical Kirchhoff-Love assumptions are pre-assumed...In this paper, the theory of elastic circular plate with no classical Kirchhoff-Love assumptions is established on the basis of a previous paper. In this theory, no classical Kirchhoff-Love assumptions are pre-assumed and the axial symmetrical analytic solution of fixed circular plate under the action of uniform pressure is obtained. Comparison of this solution and the known classical solution shows that this new solution agrees better than classical solution with the experiment measurement.This gives also the quantitative effect of the thickness on the deflection of circular plate with moderate thickness.展开更多
One of the key assumptions in respondent-driven sampling (RDS) analysis, called “random selection assumption,” is that respondents randomly recruit their peers from their personal networks. The objective of this stu...One of the key assumptions in respondent-driven sampling (RDS) analysis, called “random selection assumption,” is that respondents randomly recruit their peers from their personal networks. The objective of this study was to verify this assumption in the empirical data of egocentric networks. Methods: We conducted an egocentric network study among young drug users in China, in which RDS was used to recruit this hard-to-reach population. If the random recruitment assumption holds, the RDS-estimated population proportions should be similar to the actual population proportions. Following this logic, we first calculated the population proportions of five visible variables (gender, age, education, marital status, and drug use mode) among the total drug-use alters from which the RDS sample was drawn, and then estimated the RDS-adjusted population proportions and their 95% confidence intervals in the RDS sample. Theoretically, if the random recruitment assumption holds, the 95% confidence intervals estimated in the RDS sample should include the population proportions calculated in the total drug-use alters. Results: The evaluation of the RDS sample indicated its success in reaching the convergence of RDS compositions and including a broad cross-section of the hidden population. Findings demonstrate that the random selection assumption holds for three group traits, but not for two others. Specifically, egos randomly recruited subjects in different age groups, marital status, or drug use modes from their network alters, but not in gender and education levels. Conclusions: This study demonstrates the occurrence of non-random recruitment, indicating that the recruitment of subjects in this RDS study was not completely at random. Future studies are needed to assess the extent to which the population proportion estimates can be biased when the violation of the assumption occurs in some group traits in RDS samples.展开更多
To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violation...To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.展开更多
SUMMARY Linear regression is widely used in biomedical and psychosocial research.A critical assumption that is often overlooked is homoscedasticity.Unlike normality,the other assumption on data distribution,homoscedas...SUMMARY Linear regression is widely used in biomedical and psychosocial research.A critical assumption that is often overlooked is homoscedasticity.Unlike normality,the other assumption on data distribution,homoscedasticity is often taken for granted when fitting linear regression models.However,contrary to popular belief,this assumption actually has a bigger impact on validity of linear regression results than normality.In this report,we use Monte Carlo simulation studies to investigate and compare their effects on validity of inference.展开更多
In the framework of an overlapping generations model, forward-looking monetary policy roles and backward-looking monetary policy rules were investigated. It is shown that the monetary steady state is more likely to be...In the framework of an overlapping generations model, forward-looking monetary policy roles and backward-looking monetary policy rules were investigated. It is shown that the monetary steady state is more likely to be indeterminate under an active forwardlooking rule than under the corresponding backward-looking rule. It is also shown that backward-looking roles can render the monetary steady state unstable.展开更多
This study is focused on the mineralogical and chemical compositions,deposition environment and mechanism of formation of sediments of Kyzyltokoy basin.By an interpretation of formation,an environment of sedimentation...This study is focused on the mineralogical and chemical compositions,deposition environment and mechanism of formation of sediments of Kyzyltokoy basin.By an interpretation of formation,an environment of sedimentation of a basin was separated into three general conditions:a condition where glauconitization process interrupted,where process reached a completion and where occurred decay of glauconites,i.e.,the beginning and interruption in the middle of glauconitization,completion of the展开更多
文摘The risk of gas leakage due to geological flaws in offshore carbon capture, utilization, and storage, as well as leakage from underwater oil or gas pipelines, highlights the need for underwater gas leakage monitoring technology. Remotely operated vehicles(ROVs) and autonomous underwater vehicles(AUVs) are equipped with high-resolution imaging sonar systems that have broad application potential in underwater gas and target detection tasks. However, some bubble clusters are relatively weak scatterers, so detecting and distinguishing them against the seabed reverberation in forward-looking sonar images are challenging. This study uses the dual-tree complex wavelet transform to extract the image features of multibeam forward-looking sonar. Underwater gas leakages with different flows are classified by combining deep learning theory. A pool experiment is designed to simulate gas leakage, where sonar images are obtained for further processing. Results demonstrate that this method can detect and classify underwater gas leakage streams with high classification accuracy. This performance indicates that the method can detect gas leakage from multibeam forward-looking sonar images and has the potential to predict gas leakage flow.
基金Scientific Research Deanship,Taibah University Grant No.6363/436
文摘Recent seismic events have raised concerns over the safety and vulnerability of reinforced concrete moment resisting frame "RC-MRF" buildings. The seismic response of such buildings is greatly dependent on the computational tools used and the inherent assumptions in the modelling process. Thus, it is essential to investigate the sensitivity of the response demands to the corresponding modelling assumption. Many parameters and assumptions are justified to generate effective structural finite element(FE) models of buildings to simulate lateral behaviour and evaluate seismic design demands. As such, the present study focuses on the development of reliable FE models with various levels of refinement. The effects of the FE modelling assumptions on the seismic response demands on the design of buildings are investigated. the predictive ability of a FE model is tied to the accuracy of numerical analysis; a numerical analysis is performed for a series of symmetric buildings in active seismic zones. The results of the seismic response demands are presented in a comparative format to confirm drift and strength limits requirements. A proposed model is formulated based on a simplified modeling approach, where the most refined model is used to calibrate the simplified model.
基金supported by the Key Army Pre-research Projects of China(30107030803)
文摘Aiming at a novel missile-borne detector in the optional burst height proximity fuze, a self-adaptive high-resolution forward-looking imaging algorithm (SAHRFL-IA) is presented. The echo data are captured by the missile-borne detector in the target regions;thereby the azimuth angulation accuracy at the same distance dimension is improved dynamically. Thus, azimuth information of the targets in the detection area may be obtained accurately. The proposed imaging algorithm breaks through the conventional misconception of merely using azimuth discrimination curves under ideal conditions during monopulse angulation. The real-time echo data from the target region are used to perform error correction for this discrimination curve, and finally the accuracy of the azimuth angulation may reach the optimum at the same distance dimension. A series of experiments demonstrate the validity, reliability and high performance of the proposed imaging algorithm. Azimuth angulation accuracy may reach ten times that of the detection beam width. Meanwhile, the running time of this algorithm satisfies the requirements of missile-borne platforms.
基金Supported by the National Natural Science Foundation of China (No. 61071165)the Aviation Science Foundation (No. 20102052024)
文摘The bistatic Synthetic Aperture Radar (SAR) systems with separate transmitter and receiver antennas provide a new potential to imaging in the forward-looking geometry. Analysis of the Doppler property in this paper indicates the feasibility of Bistatic Forward-Looking (BFL) SAR imaging. Considering the different Doppler property determined by the two platforms in BFL SAR, a new 2-D point target spectrum is derived in our study. Based on the spectrum, an imaging method is chosen for the configuration, and the point target simulation validates the analysis.
基金Project(11B033)supported by the Foundation for Excellent Young Scholars of Hunan Scientific Committee,ChinaProject(116001)supported by the Consultative Program of the Chinese Academy of Engineering+1 种基金Project(11JJ6040)supported by the National Natural Science Foundation of Hunan Province,ChinaProject(2010GK3198)supported by the Science and Research Program of Hunan Province,China
文摘Rehabilitation of existing structures with fiber reinforced plastic(FRP)has been growing in popularity because they offer superior performance in terms of resistance to corrosion and high specific stiffness.The strain coordination results of 34 reinforced concrete beams(four groups)strengthened with different methods were presented including external-bonded or near-surface mounted glass or carbon FRP or helical rib bar in order to study the strain coordination of the strengthening materials and steel rebar of RC beam.Because there is relative slipping between concrete and strengthening materials(SM),the strain of SM and steel rebar of RC beam satisfies the double linear strain distribution assumption,that is,the strain of longitudinal fiber parallel to the neutral axis of plated beam within the scope of effective height(h0)of the cross section is in direct proportion to the distance from the fiber to the neutral axis.The strain of SM and steel rebar satisfies the equation εGCH=βεsteel,where the value of β is equal to 1.1-1.3 according to the test results.
文摘Background:Familiarity with a simulation platform can seduce modellers into accepting untested assumptions for convenience of implementation.These assumptions may have consequences greater than commonly suspected,and it is important that modellers remain mindful of assumptions and remain diligent with sensitivity testing.Methods:Familiarity with a technique can lead to complacency,and alternative approaches and software can reveal untested assumptions.Visual modelling environments based on system dynamics may help to make critical assumptions more evident by offering an accessible visual overview and empowering a focus on representational rather than computational efficiency.This capacity is illustrated using a cohort-based forest growth model developed for mixed species forest.Results:The alternative model implementation revealed that untested assumptions in the original model could have substantial influence on simulated outcomes.Conclusions:An important implication is that modellers should remain conscious of all assumptions,consider alternative implementations that reveal assumptions more clearly,and conduct sensitivity tests to inform decisions.
基金supported by the National Natural Science Foundation of China (61102143)the Fundamentl Research Funds for the Central Universities (ZYGX2011x003)
文摘In the spaceborne/airborne forward-looking bistatic syn- thetic aperture radar (SA-FBSAR), due to the system platforms' remarkable velocity difference and the forward-looking mode, the range cell migration (RCM) not only depends on the target's two- dimensional location, but also varies with the range location non- linearly. And the nonlinearity is not just the slight deviation from the linear part, but exhibits evident nonlinear departure in the RCM trajectory. If the RCM is not properly corrected, nonlinear image distortions would occur. Based on the RCM model, a modified two-step RCM compensation (RCMC) method for SA-FBSAR is proposed. In this method, firstly the azimuth-dependent RCM is compensated by the scaling Fourier transform and the phase multi- plication. And then the range-dependent RCM is removed through interpolation. The effectiveness of the proposed RCMC method is verified by the simulation results of both point scatterers and area targets.
文摘The distribution of shear stress on the cross-section of plastic metal solid circular shaft under pure torsion yielding, the applicability of complete plastic model assumption and the shear stress formula were researched. Based on the shear stress formula of circular shaft under pure torsion in elastic stage, the formula of torque in elastic stage and the definition of yield, it is obtained that the yielding stage of plastic metal shaft under pure torsion is only a surface phenomenon of torque-torsion angle relationship, and the distribution of shear stress is essentially different from that of tensile stress when yielding under uniaxial tension. The pure torsion platform-torsion angle and the shape of torque-torsion angle curve cannot change the distribution of shear stress on the shaft cross-section. The distribution of shear stress is still linear with the maximum shear stress ts. The complete plasticity model assumption is not in accordance with the actual situation of shaft under torsion. The experimental strength data of nine plastic metals are consistent with the calculated results of the new limiting strain energy strength theory (LSEST). The traditional yield stress formula for plastic shaft under torsion is reasonable. The shear stress formula based on the plane assumption in material mechanics is applicable for all loaded stages of torsion shaft.
基金supported by the National Natural Science Foundation of China(6100121161303035+1 种基金61471283)the Fundamental Research Funds for the Central Universities(K5051202016)
文摘Bistatic forward-looking synthetic aperture radar(SAR) has many advantages and applications owing to its twodimensional imaging capability.There could be various imaging configurations because of the geometric flexibility of bistatic platforms,resulting in kinds of models built independently among which there could be some similar even the same motion features.Comprehensive research on such systems in a more comprehensive and general point of view is required to address their difference and consistency.Property analysis of bistatic forwardlooking SAR with arbitrary geometry is achieved including stripmap and spotlight modes on airborne platform,missile-borne platform,and hybrid platform of both.Emphasis is placed on azimuth space variance of some key parameters significantly affecting the subsequent imaging processing,based on which the frequency spectra are further described and compared considering respective features of different platforms for frequency imaging algorithm developing.Simulation results confirm the effectiveness and correctness of our analysis.
文摘The article is devoted to hitherto never undertaken applying an almost unknown logically formalized axiomatic epistemology-and-axiology system called “Sigma-V” to the Third Newton’s Law of mechanics. The author has continued investigating the extraordinary (paradigm-breaking) hypothesis of formal-axiological interpreting Newton’s mathematical principles of natural philosophy and, thus, has arrived to discrete mathematical modeling a system of formal axiology of nature by extracting and systematical studying its proper algebraic aspect. Along with the proper algebraic machinery, the axiomatic (hypothetic-deductive) method is exploited in this investigation systematically. The research results are the followings. 1) The Third Newton’s Law of mechanics has been modeled by a formal-axiological equation of two-valued algebraic system of metaphysics as formal axiology. (Precise defining the algebraic system is provided.) The formal-axiological equation has been established (and examined) in this algebraic system by accurate computing compositions of relevant evaluation-functions. Precise tabular definitions of the evaluation-functions are given. 2) The wonderful formula representing the Third Newton’s Law (in the relevant physical interpretation of the formal theory Sigma-V) has been derived logically in Sigma-V from the presumption of a-priori-ness of knowledge. A precise axiomatic definition of the nontrivial notion “a-priori-ness of knowledge” is given. The formal derivation is implemented in strict accordance with the rigor standard of D. Hilbert’s formalism;hence, checking the formal derivation submitted in this article is not a difficult task. With respect to proper theoretical physics, the formal inference is a nontrivial scientific novelty which has not been discussed and published elsewhere yet.
文摘Based on the general theory of elastic plates which abandons Kirchhoff-Loveassunption in the classical theory. this paper establishes a first order approximationtheory of elastic circular plates with non-Kirchhoff-Love assumption, and presents ananalytic solution to the axisymmetric problem of elastic circular plates with clampedboundary under uniformly distributed load. By comparing with the classical solution ofthe thin circular plates, it is verified that the new solution is closer to the experimentresults than the classical solution. By virtue of the new theory. the influence of thediameter-to=thickness ratio upon the precision of the classical theory is examined.
基金Supported by the National Natural Science Foundation of China(No.69772035,69882002) and "863" Programme
文摘Recently, many bit commitment schemes have been presented. This paper presents a new practical bit commitment scheme based on Schnorr's one-time knowledge proof scheme,where the use of cut-and-choose method and many random exam candidates in the protocols are replaced by a single challenge number. Therefore the proposed bit commitment scheme is more efficient and practical than the previous schemes In addition, the security of the proposed scheme under factoring assumption is proved, thus the cryptographic basis of the proposed scheme is clarified.
基金This work was supported by the National Nature Science Foundation of China under Grant No. 60472014.
文摘It is a challenge to evaluate the conditions of railway track without interruption of regular traffic. In this paper, the authors introduce the detection of cavities under the railway substructure by using forward-looking ground penetrating radar (FLGPR). Main advantages of FLGPR are that such a system can illuminate a large area and can stand off a long distance over its down-looking counterpart. Two methods, frequency wave-number (F-W) synthetic aperture imaging (SAI) and beam-forming by delay and sum (DAS), are applied to process the collected data. Analysis and measuring show that the distinct radar image of the cavity beneath the substructure 1.2 m deep can be formed by these two methods.
文摘The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for two party key agreement protocol, however most of the current secure protocols can not be prove to secure without Gap assumption. To avoid this phenomenon, by using twinning key technology we propose a new two party key agreement protocol TUP which is obtained by modifying the UP protocol, then in conjunction with the trapdoor test, we prove strictly that the new protocol is secure in eCK model. Compared with previous protocols, the security assumption of new proposal is more standard and weaker, and it also solves an open problem in ProvSec'09.
文摘In this paper, the theory of elastic circular plate with no classical Kirchhoff-Love assumptions is established on the basis of a previous paper. In this theory, no classical Kirchhoff-Love assumptions are pre-assumed and the axial symmetrical analytic solution of fixed circular plate under the action of uniform pressure is obtained. Comparison of this solution and the known classical solution shows that this new solution agrees better than classical solution with the experiment measurement.This gives also the quantitative effect of the thickness on the deflection of circular plate with moderate thickness.
文摘One of the key assumptions in respondent-driven sampling (RDS) analysis, called “random selection assumption,” is that respondents randomly recruit their peers from their personal networks. The objective of this study was to verify this assumption in the empirical data of egocentric networks. Methods: We conducted an egocentric network study among young drug users in China, in which RDS was used to recruit this hard-to-reach population. If the random recruitment assumption holds, the RDS-estimated population proportions should be similar to the actual population proportions. Following this logic, we first calculated the population proportions of five visible variables (gender, age, education, marital status, and drug use mode) among the total drug-use alters from which the RDS sample was drawn, and then estimated the RDS-adjusted population proportions and their 95% confidence intervals in the RDS sample. Theoretically, if the random recruitment assumption holds, the 95% confidence intervals estimated in the RDS sample should include the population proportions calculated in the total drug-use alters. Results: The evaluation of the RDS sample indicated its success in reaching the convergence of RDS compositions and including a broad cross-section of the hidden population. Findings demonstrate that the random selection assumption holds for three group traits, but not for two others. Specifically, egos randomly recruited subjects in different age groups, marital status, or drug use modes from their network alters, but not in gender and education levels. Conclusions: This study demonstrates the occurrence of non-random recruitment, indicating that the recruitment of subjects in this RDS study was not completely at random. Future studies are needed to assess the extent to which the population proportion estimates can be biased when the violation of the assumption occurs in some group traits in RDS samples.
文摘To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.
文摘SUMMARY Linear regression is widely used in biomedical and psychosocial research.A critical assumption that is often overlooked is homoscedasticity.Unlike normality,the other assumption on data distribution,homoscedasticity is often taken for granted when fitting linear regression models.However,contrary to popular belief,this assumption actually has a bigger impact on validity of linear regression results than normality.In this report,we use Monte Carlo simulation studies to investigate and compare their effects on validity of inference.
基金Project supported by National Natural Science Foundation of China (Grant No. 70071012)
文摘In the framework of an overlapping generations model, forward-looking monetary policy roles and backward-looking monetary policy rules were investigated. It is shown that the monetary steady state is more likely to be indeterminate under an active forwardlooking rule than under the corresponding backward-looking rule. It is also shown that backward-looking roles can render the monetary steady state unstable.
文摘This study is focused on the mineralogical and chemical compositions,deposition environment and mechanism of formation of sediments of Kyzyltokoy basin.By an interpretation of formation,an environment of sedimentation of a basin was separated into three general conditions:a condition where glauconitization process interrupted,where process reached a completion and where occurred decay of glauconites,i.e.,the beginning and interruption in the middle of glauconitization,completion of the