1,778,890 research outputs found
Fast Computational Kinetics Program
Batch kinetics (1-D) algorithm development, stirred reactor (O-D) algorithm development, and interactive computer programs are summarized
Evolutionary Synthesis of HVAC System Configurations: Algorithm Development.
This paper describes the development of an optimization procedure for the synthesis of novel heating, ventilating, and air-conditioning (HVAC) system configurations. Novel HVAC system designs can be synthesized using model-based optimization methods. The optimization problem can be considered as having three sub-optimization problems; the choice of a component set; the design of the topological connections between the components; and the design of a system operating strategy. In an attempt to limit the computational effort required to obtain a design solution, the approach adopted in this research is to solve all three sub-problems simultaneously. Further, the computational effort has been limited by implementing simplified component models and including the system performance evaluation as part of the optimization problem (there being no need in this respect to simulation the system performance). The optimization problem has been solved using a Genetic Algorithm (GA), with data structures and search operators that are specifically developed for the solution of HVAC system optimization problems (in some instances, certain of the novel operators may also be used in other topological optimization problems. The performance of the algorithm, and various search operators has been examined for a two-zone optimization problem (the objective of the optimization being to find a system design that minimizes the system energy use). In particular, the performance of the algorithm in finding feasible system designs has been examined. It was concluded that the search was unreliable when the component set was optimized, but if the component set was fixed as a boundary condition on the search, then the algorithm had an 81% probability of finding a feasible system design. The optimality of the solutions is not examined in this paper, but is described in an associated publication. It was concluded that, given a candidate set of system components, the algorithm described here provides an effective tool for exploring the novel design of HVAC systems. (c) HVAC & R journa
Development of the algorithm for aircraft control at inaccurate measurement of the state vector and variable accuracy parameter
A parametric method of the synthesis of control in the closed circuit, taking into account explicitly generalized error of the inertial module, is presented. The law of control in the form of analytical formulas is typically assigned to the control program and does not change during flight of an unmanned aerial vehicle. This decreases the capabilities of the autonomous flight control system to overcome control errors, which occur for various reasons. To verify assumptions about a possibility of improving the accuracy of an aerial vehicle control by the data of the strapdown inertial navigation system on a certain time interval of autonomous operation, the calculation experiment was conducted with the use of the developed software complex, simulating operation of the automatic flight control system. Parametrization of the law of control is considered as the main contribution (the outcome). Introduction of the parameter made it possible to decrease a negative impact of measurement errors and other disturbing factors on accuracy of reaching by the point of flight destination. Through computer modeling, it was shown that it is possible to decrease the impact of a generalized measurement error on generation of values of control functions by changing the value of the parameter. Analytical expressions for the estimation of accuracy of automatic control at the known generalized error of the inertial module and limited disturbing influences were obtained. After analyzing the influence of these factors on accuracy of the object control, a set of recommendations on selection of a variable parameter of synthesis of control depending on precision level of the sensors, used in the inertial module of measuring sensors, was generated.Розглянуто розв’язання термінальної задачі управління та синтезований параметризований закон управління в аналітичному вигляді, який залежить від змінного параметра глибини прогнозу. Досліджено особливості впливу величини параметра управління на точність досягнення кінцевої точки, дані рекомендації з вибору параметра для нівелювання помилки інерційних вимірювань. Синтез управління здійснюється методом переслідування ведучої точки за інформацією, отриманою інтегруванням вимірювань фактичного прискорення і містить помилку, характерну для акселерометрів
Algorithm development
The past decade has seen considerable activity in algorithm development for the Navier-Stokes equations. This has resulted in a wide variety of useful new techniques. Some examples for the numerical solution of the Navier-Stokes equations are presented, divided into two parts. One is devoted to the incompressible Navier-Stokes equations, and the other to the compressible form
Scalable parallel computation of the translation operator in three dimensions
We propose a novel algorithm for the parallel, distributed-memory computation of the translation operator in the three-dimensional multilevel fast multipole algorithm (MLFMA). Sequential algorithms can compute the translation operator with L multipoles and O(L-2) sampling points in O(L-2) time. State-of-the-art hierarchical parallelization schemes of the MLFMA rely on the distribution of radiation patterns and associated translation operators among P = O(L-2) parallel processes, necessitating the development of distributed-memory algorithms for the computation of the translation operator. Whereas a baseline parallel algorithm computes this translation operator in O(L) time, we propose an algorithm that achieves this in only O(log L) time. For large translation operators and a high number of parallel processes, our algorithm proves to be roughly ten times faster than the baseline algorithm
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. The 2-dimensional hybrid cube is generated based on permutation and combination of integer numbers that are utilized in the construction of encryption and decryption key in the non-binary block cipher. The generation of key space by using the 2-dimensional hybrid cubes are not sufficient to resist attacks and could easily be exploited. Therefore, the large key space is more desirable to resist any attack on the secret key. This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. By using the three-dimensional hybrid cube in KSAHC transformation, encryption keys are represented as n × n × n matrix of integer numbers and used in the development of the permutation and substitution of order 4 square matrix. Triangular Coordinate Extraction (TCE) technique has also been introduced to extract the coordinates during the rotation of Hybrid Cube surface (HCs) and plays an important role in the development of KSAHC algorithm. The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. The strength of the keys and ciphertext are compared with the Advanced Encryption Standard (AES), HiSea, and Dynamic Key Schedule Algorithm (DKSA). The proposed KSAHC algorithm has been validated using the randomness test proposed and recommended by NIST, the average result of avalanche test is 93%, entropy is 0.9968, correlation assessment test is -0.000601 and having large key space 2.70 × 1067 keys that makes the Brute Force attack difficult and time-consuming. Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems
- …
