Tech Science Press
Not a member yet
3799 research outputs found
Sort by
A Preconditioned JFNK Algorithm Applied to Unsteady Incompressible Flow and Fluid Structure Interaction Problems
Despite the advances in computer power and numerical algorithms over the last decades, solutions to unsteady flow problems remain computing time intensive.
In previous work [Lucas, P.,Bijl, H., and Zuijlen, A.H. van(2010)], we have shown that a Jacobian-free Newton-Krylov (JFNK) algorithm, preconditioned with an approximate factorization of the Jacobian which approximately matches the target residual operator, enables a speed up of a factor of 10 compared to nonlinear multigrid (NMG) for two-dimensional, large Reynolds number, unsteady flow computations. Furthermore, in [Lucas, P., Zuijlen, A.H. van, and Bijl, H. (2010)] we show that this algorithm also greatly outperforms NMG for parameter studies into the maximum aspect ratio, grid density and physical time step: speeds ups, up to a factor of 25 are achieved.
The goal of this paper is to demonstrate the wider applicability of the preconditioned JFNK algorithm by studying incompressible flow and an incompressible fluid structure-interaction (FSI) case. It is shown that the preconditioned JFNK algorithm is able to tackle the stiffness induced by the low Mach regime, making it possible to apply a compressible flow solver to nearly incompressible flow. Furthermore, it is shown that the preconditioned JFNK algorithm can be readily applied to FSI problems
Flexural Property of String Beam of Pre-Stressed Glulam Based on Influence of Regulation and Control
Applying pre-stress in glulam beam can reduce its deformation and make full use of the compressive strength of wood. However, when the glulam with low strength and the pre-stressed steel with high strength form combined members, materials of high strength can’t be fully utilized. Therefore, this study puts forward the idea of regulating and controlling string beam of pre-stressed glulam. By regulating and controlling the pre-stress, a part of the load borne by the wood is allocated to the pre-stressed tendon, which is equivalent to completing a redistribution of internal force, thus realizing the repeated utilization of the wood strength and the full utilization of the strength of the high-strength pre-stressed tendon. The bending experiments of 10 beams under 5 working conditions are carried out. The failure mode, bearing capacity and deformation of the beams are analyzed. The results show that 90% of beams are deformed under compression. The ultimate load of the regulated and controlled beam is obviously larger than that of the unregulated beam, and the ultimate load of the beam increases with the increase of the degree of regulation and control. Compared with that of the unregulated beams, the ultimate load of beams regulated by 7.5%-30% increases by 25.42%-65.08%, and the regulated and controlled effect is obvious. With the increase of the regulation and control amplitude of pre-stress, the stiffness of string beam of pre-stressed glulam increases. In addition, with the increase of the regulation and control amplitude, the compression height of the beam increases before the failure, and it reaches the state of full-section compression at the time of failure, giving full play to the compressive property of the glulam. At the end of the experiment, the constitutive relation which can reflect the anisotropy of the wood is established combined with the experimental data. The finite element analysis of the beam under 7 working conditions is carried out by using ABAQUS finite element program, and the influence of the regulation and control amplitude on the stress distribution and ultimate bearing capacity of the beam is discussed
Radiation Cross Calibration Based on GF-1 Side Swing Angle
Radiation cross-calibration is an effective method to check and verify the accuracy and stability of sensor measurements. Satellites with high radiation accuracy are used to calibrate satellites with low radiation accuracy. In order to ensure the reliability of the radiation cross-calibration method, we propose to obtain the gain and offset of the GaoFen-1 satellite by linear regression after the radiation cross-calibration of the satellite with low precision and compare with the official coefficient. Finally, we get the relationship between the error in radiation cross-calibration results and side swing angle. The linear correction coefficients of each band are: 0.618, 0.625, 0.512 and 0.474. The results show that after the method is corrected by the linear correction coefficient, the error caused by the side swing angle during the cross-calibration of the orbital radiation is reduced. The accuracy of radiation cross-calibration is improved, the frequency of calibration is improved and the requirements of remote sensing applications in the new era are adapted
Impact of Tactical Parameters of Aircraft on Jamming Effectiveness of Surface-Source IR Decoy
As the platform for surface-source infrared decoys, the target aircraft is the aim of attacks in air-to-air combat. It can quickly and accurately evaluate the jamming effectiveness of the surface-source IR decoy in various states of motion is important for enhancing the security of the aircraft. This paper proposes a model of surface-source IR decoy, and compares and analyzes simulated and measured infrared images of diffusion. A system to assess the effectiveness of the jamming of the surface-source IR decoy, target aircraft, and infrared guided missile called “Trinity” is established. Simulations were conducted to assess the impact of flight height, flight speed, and the maneuvering of the target aircraft on the jamming effectiveness of the surface-source IR decoy. The results show that with an increase in flight height and speed, the jamming probability of a surface-source IR decoy first increases and then decreases, where evasive maneuvering by the target aircraft can effectively improve this probability. When the radius of the vertical snake maneuver was 125 m, that of the horizontal snake maneuver was 200 m, and the radius of the barrel roll maneuver was 250 m, the jamming probability of the surface-source IR decoy was relatively high. By comparing the simulation results with measured data, the study verified the accuracy of the proposed method
Rigid Medical Image Registration Using Learning-Based Interest Points and Features
For image-guided radiation therapy, radiosurgery, minimally invasive surgery, endoscopy and interventional radiology, one of the important techniques is medical image registration. In our study, we propose a learning-based approach named “FIP-CNNF” for rigid registration of medical image. Firstly, the pixel-level interest points are computed by the full convolution network (FCN) with self-supervise. Secondly, feature detection, descriptor and matching are trained by convolution neural network (CNN). Thirdly, random sample consensus (Ransac) is used to filter outliers, and the transformation parameters are found with the most inliers by iteratively fitting transforms. In addition, we propose “TrFIP-CNNF” which uses transfer learning and fine-tuning to boost performance of FIP-CNNF. The experiment is done with the dataset of nasopharyngeal carcinoma which is collected from West China Hospital. For the CT-CT and MR-MR image registration, TrFIP-CNNF performs better than scale invariant feature transform (SIFT) and FIP-CNNF slightly. For the CT-MR image registration, the precision, recall and target registration error (TRE) of the TrFIP-CNNF are much better than those of SIFT and FIP-CNNF, and even several times better than those of SIFT. The promising results are achieved by TrFIP-CNNF especially in the multimodal medical image registration, which demonstrates that a feasible approach can be built to improve image registration by using FCN interest points and CNN features
Optical design and performance comparison of various hyperspectral imagers based on Fery prisms
The paraxial ray-tracing model of Fery prism is illustrated in this paper, and the three-order aberration coefficients are calculated. According to the solutions for minimal aberrations, four types of imaging spectrometers are designed based on Fery prism, accommodating for different requirements. The image quality is evaluated to ensure that MTFs are larger than 0.6 at Naquist frequencies, and the spectral resolutions are all higher than 5 nm. The advantages of these imaging spectrometers are analyzed by comparison of the volume, spectral resolution and field of view. The potential competence of Fery prism in hyperspectral imaging is indicated since the field of view and the volume have a direct proportional function. One typical system of these designs is manufactured and assembled afterwards to verify the simulation data
Stream-Based Data Sampling Mechanism for Process Object
Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find a ppropriate d ata t o m odeling. F irst o f all, we use concept drift to make the partition of the life cycle of process object. Then, entity community detection is proposed to find changes. Finally, we propose stream-based real-time optimization of data sampling. Contributions of this paper are concept drift, community detection, and stream-based real-time computing. Experiments show the effectiveness and feasibility of our proposed adaptive data sampling mechanism for process object
A Quantum Authorization Management Protocol Based on EPR-Pairs
Quantum authorization management (QAM) is the quantum scheme for privilege management infrastructure (PMI) problem. Privilege management (authorization management) includes authentication and authorization. Authentication is to verify a user’s identity. Authorization is the process of verifying that a authenticated user has the authority to perform a operation, which is more fine-grained. In most classical schemes, the authority management center (AMC) manages the resources permissions for all network nodes within the jurisdiction. However, the existence of AMC may be the weakest link of the whole scheme. In this paper, a protocol for QAM without AMC is proposed based on entanglement swapping. In this protocol, Bob (the owner of resources) authenticates the legality of Alice (the user) and then shares the right key for the resources with Alice. Compared with the other existed QAM protocols, this protocol not only implements authentication, but also authorizes the user permissions to access certain resources or carry out certain actions. The authority division is extended to fin-grained rights division. The security is analyzed from the four aspects: the outsider’s attack, the user’s attack, authentication and comparison with the other two QAM protocols
An Improved End-to-End Memory Network for QA Tasks
At present, End-to-End trainable Memory Networks (MemN2N) has proven to be promising in many deep learning fields, especially on simple natural language-based reasoning question and answer (QA) tasks. However, when solving some subtasks such as basic induction, path finding or time reasoning tasks, it remains challenging because of limited ability to learn useful information between memory and query. In this paper, we propose a novel gated linear units (GLU) and local-attention based end-to-end memory networks (MemN2N-GL) motivated by the success of attention mechanism theory in the field of neural machine translation, it shows an improved possibility to develop the ability of capturing complex memory-query relations and works better on some subtasks. It is an improved end-to-end memory network for QA tasks. We demonstrate the effectiveness of these approaches on the 20 bAbI dataset which includes 20 challenging tasks, without the use of any domain knowledge. Our project is open source on github4
Three-Dimensional Numerical Analysis of Blast-Induced Damage Characteristics of the Intact and Jointed Rockmass
This article reports numerical results investigating the damage evolution and spatial distribution characteristics of intact and jointed rockmass subjected to blast loading. The behaviors of rock material are described by the Holmquist- Johnson-Cook (HJC) constitutive model incorporated in the finite element software LS-DYNA. Results indicate that the damage distribution shows a reverse S-shape attenuation with the increase of the distance from borehole, and a better goodness of fit with the Logistic function is observed. In the single-hole blasting of jointed rockmass, there are two types of regions around the intersection of borehole and joint in which the damage degree is quite different. The crushing damage develops in a Ψ-shape path along the joint. In the radial direction, the crushing damage and cracking damage of rock show different distribution forms with the increase of joint dip angle. As for the double-hole blasting, due to the superposition of the blast waves, the damage degree in the region between the two boreholes of intact rockmass is significantly large. For jointed rockmass, the joint has local enhancement or inhibition effect on the blast damage in the region between the two boreholes