Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although...Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.展开更多
Reduced order models(ROMs) based on the snapshots on the CFD high-fidelity simulations have been paid great attention recently due to their capability of capturing the features of the complex geometries and flow con...Reduced order models(ROMs) based on the snapshots on the CFD high-fidelity simulations have been paid great attention recently due to their capability of capturing the features of the complex geometries and flow configurations. To improve the efficiency and precision of the ROMs, it is indispensable to add extra sampling points to the initial snapshots, since the number of sampling points to achieve an adequately accurate ROM is generally unknown in prior, but a large number of initial sampling points reduces the parsimony of the ROMs. A fuzzy-clustering-based adding-point strategy is proposed and the fuzzy clustering acts an indicator of the region in which the precision of ROMs is relatively low. The proposed method is applied to construct the ROMs for the benchmark mathematical examples and a numerical example of hypersonic aerothermodynamics prediction for a typical control surface. The proposed method can achieve a 34.5% improvement on the efficiency than the estimated mean squared error prediction algorithm and shows same-level prediction accuracy.展开更多
We investigate the behavior of geometric global quantum discord (GGQD) and concurrence (C) between half- spins of a mixed-three-spin (1/2, 1, 1/2) system with the Ising-XY model for which spins (1, 1/2) have t...We investigate the behavior of geometric global quantum discord (GGQD) and concurrence (C) between half- spins of a mixed-three-spin (1/2, 1, 1/2) system with the Ising-XY model for which spins (1, 1/2) have the Ising interaction and half-spins (1/2, 1/2) have both XY and the Dzyaloshinskii Moriya interactions together, under the decoherence action. A single-ion anisotropy property with coefficient ζ is assumed for the spin-integer. This system which includes an analytical Hamiltonian is considered at the front of an external homogeneous magnetic field B in thermal equilibrium. Finally, we compare GGQD and C and express some interesting phase flip reactions of the total quantum correlation and pairwise entanglement between spins (1/2, 1/2). Generally, we conclude that the concurrence and GGQD have different behaviors under the phase flip channel.展开更多
Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc ne...Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc network (MANET). This paper designed a QoS model in MANET. The feasibility and reliability of this model is analyzed and verified. Compared with the traditional model, the proposed approach is improved in MAC layer in order to achieve high control rate of low-priority transactions.展开更多
Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the net...Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the network is considered as a birthdeath process and the space is reused for n times in the flooding process, which is named as an n-spatiai reuse birth-death model (n-SRBDM). We analyze the performance of the network under the dynamic source routing protocol (DSR) which is a famous reactive routing protocol. Some performance parameters of the route discovery are studied such as the probability distribution and the expectation of the flooding distance, the probability that a route is discovered by a query packet with a hop limit, the probability that a request packet finds a τ-time-valid route or a symmetric-valid route, and the average time needed to discover a valid route. For the route maintenance, some parameters are introduced and studied such as the average frequency of route recovery and the average time of a route to be valid. We compare the two models with spatial reuse and without spatial reuse by evaluating these parameters. It is shown that the spatial reuse model is much more effective in routing.展开更多
During the insect flight, the force peak at the start of each stroke contributes a lot to the total aerodynamic force. Yet how this force is generated is still controversial. Two current explanations to this are wake ...During the insect flight, the force peak at the start of each stroke contributes a lot to the total aerodynamic force. Yet how this force is generated is still controversial. Two current explanations to this are wake capture and Added Mass Effect (AME) mechanisms. To study the AME, we present an extended unsteady blade element model which takes both the added mass of fluid and rotational effect of the wing into account. Simulation results show a high force peak at the start of each stroke and are quite similar to the measured forces on the physical wing model. We found that although the Added Mass Force (AMF) of the medium contributes a lot to this force peak, the wake capture effect further augments this force and may play a more important role in delayed mode. Furthermore, we also found that there might be an unknown mechanism which may augment the AME during acceleration period at the start of each stroke, and diminish the AME during deceleration at the end of each stroke.展开更多
For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle en...For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols.展开更多
基金the National Natural Science Foundation of China (60773049)the Natural Science Foundationof Jiangsu Province (BK2007086)the Fundamental Research Project of Natural Science in Colleges of Jiangsu Province(07KJB520016).
文摘Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.
基金Supported by National Natural Science Foundation of China(Grant No.11372036)
文摘Reduced order models(ROMs) based on the snapshots on the CFD high-fidelity simulations have been paid great attention recently due to their capability of capturing the features of the complex geometries and flow configurations. To improve the efficiency and precision of the ROMs, it is indispensable to add extra sampling points to the initial snapshots, since the number of sampling points to achieve an adequately accurate ROM is generally unknown in prior, but a large number of initial sampling points reduces the parsimony of the ROMs. A fuzzy-clustering-based adding-point strategy is proposed and the fuzzy clustering acts an indicator of the region in which the precision of ROMs is relatively low. The proposed method is applied to construct the ROMs for the benchmark mathematical examples and a numerical example of hypersonic aerothermodynamics prediction for a typical control surface. The proposed method can achieve a 34.5% improvement on the efficiency than the estimated mean squared error prediction algorithm and shows same-level prediction accuracy.
文摘We investigate the behavior of geometric global quantum discord (GGQD) and concurrence (C) between half- spins of a mixed-three-spin (1/2, 1, 1/2) system with the Ising-XY model for which spins (1, 1/2) have the Ising interaction and half-spins (1/2, 1/2) have both XY and the Dzyaloshinskii Moriya interactions together, under the decoherence action. A single-ion anisotropy property with coefficient ζ is assumed for the spin-integer. This system which includes an analytical Hamiltonian is considered at the front of an external homogeneous magnetic field B in thermal equilibrium. Finally, we compare GGQD and C and express some interesting phase flip reactions of the total quantum correlation and pairwise entanglement between spins (1/2, 1/2). Generally, we conclude that the concurrence and GGQD have different behaviors under the phase flip channel.
文摘Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc network (MANET). This paper designed a QoS model in MANET. The feasibility and reliability of this model is analyzed and verified. Compared with the traditional model, the proposed approach is improved in MAC layer in order to achieve high control rate of low-priority transactions.
基金Project supported by the National Natural Science Foundation of China (Nos.10471088 and 60572126)the Science Foundation of Shanghai Municipal Commission of Education (No.06ZZ84)
文摘Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the network is considered as a birthdeath process and the space is reused for n times in the flooding process, which is named as an n-spatiai reuse birth-death model (n-SRBDM). We analyze the performance of the network under the dynamic source routing protocol (DSR) which is a famous reactive routing protocol. Some performance parameters of the route discovery are studied such as the probability distribution and the expectation of the flooding distance, the probability that a route is discovered by a query packet with a hop limit, the probability that a request packet finds a τ-time-valid route or a symmetric-valid route, and the average time needed to discover a valid route. For the route maintenance, some parameters are introduced and studied such as the average frequency of route recovery and the average time of a route to be valid. We compare the two models with spatial reuse and without spatial reuse by evaluating these parameters. It is shown that the spatial reuse model is much more effective in routing.
文摘During the insect flight, the force peak at the start of each stroke contributes a lot to the total aerodynamic force. Yet how this force is generated is still controversial. Two current explanations to this are wake capture and Added Mass Effect (AME) mechanisms. To study the AME, we present an extended unsteady blade element model which takes both the added mass of fluid and rotational effect of the wing into account. Simulation results show a high force peak at the start of each stroke and are quite similar to the measured forces on the physical wing model. We found that although the Added Mass Force (AMF) of the medium contributes a lot to this force peak, the wake capture effect further augments this force and may play a more important role in delayed mode. Furthermore, we also found that there might be an unknown mechanism which may augment the AME during acceleration period at the start of each stroke, and diminish the AME during deceleration at the end of each stroke.
文摘For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols.