188 research outputs found

    Fully kinetic particle-in-cell simulations of plasma-surface-dust interactions for lunar exploration

    Get PDF
    The studies involving lunar surface explorations have drawn attentions in recent years. A better understanding of possible potential hazards to astronauts and electronic equipment has become a necessity for future lunar explorations. The lunar surface, lacking an atmosphere and global magnetic field therefore directly exposed to solar radiation and solar wind plasma, is electrically charged by the bombardment of solar wind plasma and emission/collection of photoelectrons. Additionally, lunar dust grains can also get charged and levitated from the surface under the influence of the electric field as well as gravity within the plasma sheath. Since the plasma sheath formed near the illuminated lunar surface is dominated by photoelectrons, it is usually referred to as \u27photoelectron sheath\u27. In this research, we will focus on resolving the photoelectron sheath structure near lunar surface through numerical simulations. Firstly, we will introduce the fundamental assumptions of our analytic and simulation studies. We will present the derivation of a 1-D semi-analytic model to numerically obtain the quantities of interest as functions of the distance from surface within the photoelectron sheath. Secondly, we will present the numerical simulations with a fully kinetic Finite Difference (FD) Particle-in-Cell (PIC) code to solve the surface charging problem on lunar surface. In this study, we will consider both Maxwellian and Kappa distribution of solar wind electron velocities. Finally, we will show our current studies on the charged lunar dust lofting and transport under the influence of local electrostatic environment. We will consider both uncoupled and coupled method in the simulations. In uncoupled method, a steady state electric field is obtained through FD-PIC simulations and provided to simulate the charged dust transport, indicting that the charged dust transport does not influence the local electrostatic environment. Whereas in the coupled method, the electrostatic environment and the charged dust transport are simulated simultaneousness, which means the electrostatic environment and the dust transport influence each other during the simulations --Abstract, page iii

    Algorithm of Finding Hypo-Critical Path in Network Planning

    Get PDF
    AbstractNetwork planning technology could be used to represent project plan management, such Critical Path Method (CPM for short) and Performance Evaluation Review Technique (PERT for short) etc. Aiming at problem that how to find hypo-critical path in network planning, firstly, properties of total float. free float and safety float are analyzed, and total float theorem is deduced on the basis of above analysis; and secondly, simple algorithm of finding the hypo-critical path is designed by using these properties of float and total theorem, and correctness of the algorithm is analyzed. Proof shows that the algorithm could realize effect of whole optimization could be realized by part optimization. Finally, one illustration is given to expatiate the algorithm

    A Generalized Minimum Cost Flow Model for Multiple Emergency Flow Routing

    Get PDF
    During real-life disasters, that is, earthquakes, floods, terrorist attacks, and other unexpected events, emergency evacuation and rescue are two primary operations that can save the lives and property of the affected population. It is unavoidable that evacuation flow and rescue flow will conflict with each other on the same spatial road network and within the same time window. Therefore, we propose a novel generalized minimum cost flow model to optimize the distribution pattern of these two types of flow on the same network by introducing the conflict cost. The travel time on each link is assumed to be subject to a bureau of public road (BPR) function rather than a fixed cost. Additionally, we integrate contraflow operations into this model to redesign the network shared by those two types of flow. A nonconvex mixed-integer nonlinear programming model with bilinear, fractional, and power components is constructed, and GAMS/BARON is used to solve this programming model. A case study is conducted in the downtown area of Harbin city in China to verify the efficiency of proposed model, and several helpful findings and managerial insights are also presented

    Authentication in Millimeter-Wave Body-Centric Networks Through Wireless Channel Characterization

    Get PDF
    Advent of 5G technologies has ensued in massive growth of body-centric communications (BCCs), especially at millimeter-wave (mm-wave) frequencies. As a result, the portable/handheld terminals are becoming more and more “intelligent” but not without the cost of being less secure. Improved authentication measures need to be explored, as effective identity authentication is the first level of security in these devices. This paper presents a novel keyless authentication method exploiting wireless channel characteristics. Human palm has distinct transmission coefficient (S21) for each of the users and is used for in vivo fingerprint identification in this paper. A detailed channel modeling using data acquisition from real environment and empirical approach is adopted to evaluate the usability of this method. The results show that this method can provide a secure operation for the mm-wave 5G BCCs

    Hand palm local channel characterization for millimeter-wave body-centric applications

    Get PDF
    The body-centric wireless channel characterization mostly utilizes whole body models. However, localized channels for body parts consistently interacting with the wireless device have their own importance. This paper attempts to characterize the hand palm local channel through experimental measurements at three millimeter-wave frequency bands of 27-28 GHz, 29-30 GHz, and 31-32 GHz. Five human subjects are used in this study. Net body loss is found to be 3dB for different subjects with subject-specific and varying palm shape size is found to be the primary affecting source. The repeatability of the on-body propagation measurements is found to be within 10% of variance

    A Study of Network Violator Interception Based on a Reliable Game Model

    Get PDF
    This study focuses on planning interceptor locations in a general transportation network to maximize the expected benefits from catching violators mixing in public traveler flow. Two reliability-related characteristics are also integrated into the planning model to make it more practical. One is that each interceptor (e.g., a sensor or a checkpoint) has a failure probability. The second is the existence of a “game” between the interceptor planner and violators. A nonlinear nonconvex binary integer programming model is presented. We develop a simulated annealing (SA) algorithm to solve this model, and numerical experiments are conducted to illustrate the computational efficiency of the proposed algorithm. We also analyze the sensitivity of the disruption probability of interceptors to optimal objective function values and discuss how to determine the values of these parameters in a violator route choice model
    corecore