A new method of car-highway barrier crash accident reconstruction is presented based on CRASH3 damage algorithm. Because the stiffness of a barrier is easy to obtain, the stiffness coefficients of a vehicle determined...
详细信息
A new method of car-highway barrier crash accident reconstruction is presented based on CRASH3 damage algorithm. Because the stiffness of a barrier is easy to obtain, the stiffness coefficients of a vehicle determined by this method is based on residual crush and the velocity before impact is calculated with change of kinetic energy. Also, a detailed FE model of a typical type of highway guardrail is established. Using this model, the dynamic characteristics of this guardrail under vehicle impact are investigated. It's found that the normal contact force between the vehicle and the barrier can be a linear function of the residual crush in most conditions, but the linear relation for the tangential force can only be satisfied in some conditions. Finally, the above-mentioned method is applied to a real-world accident. Compared with PC-CRASH, this method is proved to be feasible for accident reconstruction.
Wireless sensor networks have posed a number of challenging problems such as localization, deployment and tracking, etc. One of the interesting problems is the calculation of the coverage and exposure paths for the se...
详细信息
Wireless sensor networks have posed a number of challenging problems such as localization, deployment and tracking, etc. One of the interesting problems is the calculation of the coverage and exposure paths for the sensor networks. This paper presents a fully localized algorithm to solve the worst coverage problem first introduced by Meguerdichian et al. The nodes of the sensor network cooperate to construct the worst coverage path only by the one-hop neighbor's information, thus avoiding the massive communication and conserving the energy. The correctness of the proposed algorithm is proved formally under the sensing diminishing model. Moreover, this algorithm can be easily extended to solve the minimal exposure problem with local information as well.
In this paper, we present a general survey on parallel computing. The main contents include parallel computer system which is the hardware platform of parallel computing, parallel algorithm which is the theoretical ba...
详细信息
In this paper, we present a general survey on parallel computing. The main contents include parallel computer system which is the hardware platform of parallel computing, parallel algorithm which is the theoretical base of parallel computing, parallel programming which is the software support of parallel computing. After that, we also introduce some parallel applications and enabling technologies. We argue that parallel computing research should form an integrated methodology of "architecture algorithm programming application". Only in this way, parallel computing research becomes continuous development and more realistic.
An OpenMP approach was proposed to parallelize the sequential molecular dynamics(MD) code on shared memory machines. When a code is converted from the sequential form to the parallel form, data dependence is a main pr...
详细信息
An OpenMP approach was proposed to parallelize the sequential molecular dynamics(MD) code on shared memory machines. When a code is converted from the sequential form to the parallel form, data dependence is a main problem. A traditional sequential molecular dynamics code is anatomized to find the data dependence segments in it, and the two different methods, i.e., recover method and backward mapping method were used to eliminate those data dependencies in order to realize the parallelization of this sequential MD code. The performance of the parallelized MD code was analyzed by using some performance analysis tools. The results of the test show that the computing size of this code increases sharply form 1 million atoms before parallelization to 20 million atoms after parallelization, and the wall clock during computing is reduced largely. Some hot-spots in this code are found and optimized by improved algorithm. The efficiency of parallel computing is 30% higher than that of before, and the calculation time is saved and larger scale calculation problems are solved.
Grid manages resources and services distributed across multiple control domains. Grid computing provides people the way to share large mount of distributed resources and services that belong to different local domain....
详细信息
Grid manages resources and services distributed across multiple control domains. Grid computing provides people the way to share large mount of distributed resources and services that belong to different local domain. It also makes security problems more complicate, such as in the grid group communication. In this paper, we analyze security requirements of grid environment, especially for the secure group communication. We discuss the group key management for group communication and propose the scheme to implement the flexible secure group key management in grid environment. The algorithm and protocol are presented according to different conditions, and their characteristics are analyzed
When data mining occurs on distributed data, privacy of parties becomes great concerns. This paper considers the problem of mining quantitative association rules without revealing the private information of parties wh...
详细信息
When data mining occurs on distributed data, privacy of parties becomes great concerns. This paper considers the problem of mining quantitative association rules without revealing the private information of parties who compute jointly and share distributed data. The issue is an area of privacy preserving data mining (PPDM) research. Some researchers have considered the case of mining Boolean association rules; however, this method cannot be easily applied to quantitative rules mining. A new secure set union algorithm is proposed in this paper, which unifies the input sets of parties without revealing any element's owner and has lower time cost than existing algorithms. The new algorithm takes the advantages of both in privacy-preserving Boolean association rules mining and in privacy-preserving quantitative association mining. This paper also presents an algorithm for privacy-preserving quantitative association rules mining over horizontally portioned data, based on CF tree and secure sum algorithm. Besides, the analysis of the correctness, the security and the complexity of our algorithms are provided
Sample based texture synthesis allows the generation of arbitrarily sized textures based on a small sample image. One main drawback of the technique is that a new pixel or patch is selected only considering local info...
详细信息
Sample based texture synthesis allows the generation of arbitrarily sized textures based on a small sample image. One main drawback of the technique is that a new pixel or patch is selected only considering local information in the generated texture. Thus structural error can't assure to be avoided for structural textures. To accelerate texture synthesis process and to avoid structural mismatch in the output picture, we present in this paper a structural pattern analysis (SPA) algorithm and a texture synthesis method using the algorithm. The pattern analysis tool also quantizes the texture randomness in macro scope view. It can be used in other applications such as automatic texture classification and quality evaluation of synthesized texture. We illustrate our result with some examples
Streaming media is pervasive on the Internet now and continues to grow rapidly. A large scale streaming media system may demand thousands of disks to satisfy both the bandwidth and storage capacity requirements impose...
详细信息
Streaming media is pervasive on the Internet now and continues to grow rapidly. A large scale streaming media system may demand thousands of disks to satisfy both the bandwidth and storage capacity requirements imposed by thousands of concurrent clients. While performance has long been the focus of large scale storage systems research, manageability has become the dominant criterion in evaluating storage solutions, as the cost of storage management outweighs the cost of the storage devices themselves by a factor of three to eight. This paper designs and implements a highly reliable and available distributed media data oriented innovative Storage Management Mechanism (SMM) in a scalable streaming media system. All heterogeneous storage resources across the system are aggregated as a single logical view which strikes a good balance between a distributed data storage and centralized storage management. The centralized SMM dramatically simplifies the storage administration as the size and complexity of the streaming media system grows. Fault tolerance and dynamic load balance at the disk level and system level are achieved to provide high reliability and availability due to the SMM.
Java memory model (JMM) is an important topic in Java language and Java virtual machine (JVM) design. But the memory model in Java specification can't guarantee the safely running of Java multithread code. It need...
详细信息
Java memory model (JMM) is an important topic in Java language and Java virtual machine (JVM) design. But the memory model in Java specification can't guarantee the safely running of Java multithread code. It needs memory coherence, which imposes constraints that prohibit JVM implementation optimization. To fix the problem of Java memory model in Java specification, a new Java memory model, L-JMM, is proposed, which is based on location consistency. This model extends the location consistency to adapt the features of Java technology. It also defines the rule of Java multithread memory operation, including ordinary variable rule, volatile variable rule, final variable rule and synchronization rule. It is proved that this memory model has the same property as location consistency. It can guarantee the correctness for Java multithread code. It can also improve the performance of Java virtual machine. Finally, the simulation of this memory model in the simulator MMS verifies that the new model boasts a better performance than the Java specification memory model does.
暂无评论