10 results
Search Results
2. Numerical research on the lateral global buckling characteristics of a high temperature and pressure pipeline with two initial imperfections.
- Author
-
Liu, Wenbin and Liu, Aimin
- Subjects
- *
MECHANICAL buckling , *WATER pipelines , *IMPERFECTION , *COMPUTER simulation , *WAVELENGTHS - Abstract
With the exploitation of offshore oil and gas gradually moving to deep water, higher temperature differences and pressure differences are applied to the pipeline system, making the global buckling of the pipeline more serious. For unburied deep-water pipelines, the lateral buckling is the major buckling form. The initial imperfections widely exist in the pipeline system due to manufacture defects or the influence of uneven seabed, and the distribution and geometry features of initial imperfections are random. They can be divided into two kinds based on shape: single-arch imperfections and double-arch imperfections. This paper analyzed the global buckling process of a pipeline with 2 initial imperfections by using a numerical simulation method and revealed how the ratio of the initial imperfection’s space length to the imperfection’s wavelength and the combination of imperfections affects the buckling process. The results show that a pipeline with 2 initial imperfections may suffer the superposition of global buckling. The growth ratios of buckling displacement, axial force and bending moment in the superposition zone are several times larger than no buckling superposition pipeline. The ratio of the initial imperfection’s space length to the imperfection’s wavelength decides whether a pipeline suffers buckling superposition. The potential failure point of pipeline exhibiting buckling superposition is as same as the no buckling superposition pipeline, but the failure risk of pipeline exhibiting buckling superposition is much higher. The shape and direction of two nearby imperfections also affects the failure risk of pipeline exhibiting global buckling superposition. The failure risk of pipeline with two double-arch imperfections is higher than pipeline with two single-arch imperfections. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
3. Correction of failure in linear antenna arrays with greedy sparseness constrained optimization technique.
- Author
-
Khan, Shafqat Ullah, Rahim, M. K. A., Aminu-Baba, Murtala, and Murad, N. A.
- Subjects
- *
LINEAR antenna arrays , *CORRECTION factors , *CONSTRAINED optimization , *ORTHOGONAL matching pursuit , *COMPUTER simulation - Abstract
This paper proposes the correction of faulty sensors using a synthesis of the greedy sparse constrained optimization GSCO) technique. The failure of sensors can damage the radiation power pattern in terms of sidelobes and nulls. The synthesis problem can recover the wanted power pattern with reduced number of sensors into the background of greedy algorithm and solved with orthogonal matching pursuit (OMP) technique. Numerical simulation examples of linear arrays are offered to demonstrate the effectiveness of getting the wanted power pattern with a reduced number of antenna sensors which is compared with the available techniques in terms of sidelobes level and number of nulls. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
4. A novel Gravity-FREAK feature extraction and Gravity-KLT tracking registration algorithm based on iPhone MEMS mobile sensor in mobile environment.
- Author
-
Hong, Zhiling, Lin, Fan, and Xiao, Bin
- Subjects
- *
FEATURE extraction , *IPHONE (Smartphone) , *COMPUTER algorithms , *ELECTRONIC information resources , *MICROELECTROMECHANICAL systems , *COMPUTER simulation - Abstract
Based on the traditional Fast Retina Keypoint (FREAK) feature description algorithm, this paper proposed a Gravity-FREAK feature description algorithm based on Micro-electromechanical Systems (MEMS) sensor to overcome the limited computing performance and memory resources of mobile devices and further improve the reality interaction experience of clients through digital information added to the real world by augmented reality technology. The algorithm takes the gravity projection vector corresponding to the feature point as its feature orientation, which saved the time of calculating the neighborhood gray gradient of each feature point, reduced the cost of calculation and improved the accuracy of feature extraction. In the case of registration method of matching and tracking natural features, the adaptive and generic corner detection based on the Gravity-FREAK matching purification algorithm was used to eliminate abnormal matches, and Gravity Kaneda-Lucas Tracking (KLT) algorithm based on MEMS sensor can be used for the tracking registration of the targets and robustness improvement of tracking registration algorithm under mobile environment. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
5. A multi-domain trust management model for supporting RFID applications of IoT.
- Author
-
Wu, Xu and Li, Feng
- Subjects
- *
RADIO frequency identification systems , *INTERNET of things , *COMPUTER simulation , *MATHEMATICAL models , *HIERARCHICAL clustering (Cluster analysis) - Abstract
The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
6. Implementation of real-time energy management strategy based on reinforcement learning for hybrid electric vehicles and simulation validation.
- Author
-
Kong, Zehui, Zou, Yuan, and Liu, Teng
- Subjects
- *
HYBRID electric vehicles , *COMPUTER simulation , *AUTOMOTIVE fuel consumption standards , *ENERGY management , *REINFORCEMENT learning , *ENERGY consumption - Abstract
To further improve the fuel economy of series hybrid electric tracked vehicles, a reinforcement learning (RL)-based real-time energy management strategy is developed in this paper. In order to utilize the statistical characteristics of online driving schedule effectively, a recursive algorithm for the transition probability matrix (TPM) of power-request is derived. The reinforcement learning (RL) is applied to calculate and update the control policy at regular time, adapting to the varying driving conditions. A facing-forward powertrain model is built in detail, including the engine-generator model, battery model and vehicle dynamical model. The robustness and adaptability of real-time energy management strategy are validated through the comparison with the stationary control strategy based on initial transition probability matrix (TPM) generated from a long naturalistic driving cycle in the simulation. Results indicate that proposed method has better fuel economy than stationary one and is more effective in real-time control. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
7. Comparison of two SVD-based color image compression schemes.
- Author
-
Li, Ying, Wei, Musheng, Zhang, Fengxia, and Zhao, Jianli
- Subjects
- *
COLOR image processing , *IMAGE compression , *COMPARATIVE studies , *QUATERNIONS , *IMAGE quality analysis , *COMPUTER simulation - Abstract
Color image compression is a commonly used process to represent image data as few bits as possible, which removes redundancy in the data while maintaining an appropriate level of quality for the user. Color image compression algorithms based on quaternion are very common in recent years. In this paper, we propose a color image compression scheme, based on the real SVD, named real compression scheme. First, we form a new real rectangular matrix C according to the red, green and blue components of the original color image and perform the real SVD for C. Then we select several largest singular values and the corresponding vectors in the left and right unitary matrices to compress the color image. We compare the real compression scheme with quaternion compression scheme by performing quaternion SVD using the real structure-preserving algorithm. We compare the two schemes in terms of operation amount, assignment number, operation speed, PSNR and CR. The experimental results show that with the same numbers of selected singular values, the real compression scheme offers higher CR, much less operation time, but a little bit smaller PSNR than the quaternion compression scheme. When these two schemes have the same CR, the real compression scheme shows more prominent advantages both on the operation time and PSNR. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
8. Evolutionary Algorithm for RNA Secondary Structure Prediction Based on Simulated SHAPE Data.
- Author
-
Montaseri, Soheila, Ganjtabesh, Mohammad, and Zare-Mirakabad, Fatemeh
- Subjects
- *
MOLECULAR structure of RNA , *BIOLOGICAL evolution , *GENETICS , *NON-coding RNA , *GENETIC algorithms , *THERMODYNAMICS , *COMPUTER simulation - Abstract
Background: Non-coding RNAs perform a wide range of functions inside the living cells that are related to their structures. Several algorithms have been proposed to predict RNA secondary structure based on minimum free energy. Low prediction accuracy of these algorithms indicates that free energy alone is not sufficient to predict the functional secondary structure. Recently, the obtained information from the SHAPE experiment greatly improves the accuracy of RNA secondary structure prediction by adding this information to the thermodynamic free energy as pseudo-free energy. Method: In this paper, a new method is proposed to predict RNA secondary structure based on both free energy and SHAPE pseudo-free energy. For each RNA sequence, a population of secondary structures is constructed and their SHAPE data are simulated. Then, an evolutionary algorithm is used to improve each structure based on both free and pseudo-free energies. Finally, a structure with minimum summation of free and pseudo-free energies is considered as the predicted RNA secondary structure. Results and Conclusions: Computationally simulating the SHAPE data for a given RNA sequence requires its secondary structure. Here, we overcome this limitation by employing a population of secondary structures. This helps us to simulate the SHAPE data for any RNA sequence and consequently improves the accuracy of RNA secondary structure prediction as it is confirmed by our experiments. The source code and web server of our proposed method are freely available at . [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
9. Enhancing the Flexibility of TCP in Heterogeneous Network.
- Author
-
Hui, Wang, Peiyu, Li, Zhihui, Fan, Zheqing, Li, and Xuhui, Wei
- Subjects
- *
TCP/IP , *CHAOS theory , *INITIAL value problems , *CONVERGENCE (Telecommunication) , *COMPUTER simulation - Abstract
Due to a set of constant initial values, the performance of conventional TCP drops significantly encountering heterogeneous network, showing low throughput and unfairness. This paper firstly demonstrates the chaotic character of TCP congestion control in heterogeneous network, especially the sensitivity to initial value. Inspired by merit of nature-inspired algorithm, a novel structure of TCP congestion control (IPPM, Internet Prey-Predator Model) is proposed. Parameters such as available link capacity(C), congestion window (W) and queue length (Q) are collected by IPPM, which calculates the max value of C according to the interacting relationship existing in C, W and Q, and IPPM initiates the TCP ssthresh with the calculated value. Plenty of simulation results show that the modified TCP can effectively avoid network congestion and packet loss. Besides, it holds high resource utilization, convergence speeds, fairness and stability. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
10. Spectral X-Ray CT Image Reconstruction with a Combination of Energy-Integrating and Photon-Counting Detectors.
- Author
-
Yang, Qingsong, Cong, Wenxiang, Xi, Yan, and Wang, Ge
- Subjects
- *
COMPUTED tomography , *IMAGE reconstruction , *PHOTON counting , *COMPUTER simulation , *ALGORITHMS , *FEATURE extraction - Abstract
The purpose of this paper is to develop an algorithm for hybrid spectral computed tomography (CT) which combines energy-integrating and photon-counting detectors. While the energy-integrating scan is global, the photon-counting scan can have a local field of view (FOV). The algorithm synthesizes both spectral data and energy-integrating data. Low rank and sparsity prior is used for spectral CT reconstruction. An initial estimation is obtained from the projection data based on physical principles of x-ray interaction with the matter, which provides a more accurate Taylor expansion than previous work and can guarantee the convergence of the algorithm. Numerical simulation with clinical CT images are performed. The proposed algorithm produces very good spectral features outside the FOV when no K-edge material exists. Exterior reconstruction of K-edge material can be partially achieved. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.