A novel algorithm is proposed for the simulation of fluid-structure interaction problems. In particular, much attention is paid to natural phenomena such as debris flow. The fluid part (debris flow fluid) is simulated in the framework of the smoothed particle hydrodynamics (SPH) approach, while the solid part (downstream obstacles) is treated using the finite element method (FEM). Fluid-structure coupling is implemented through dynamic boundary conditions. In particular, the software "TensorFlow" and an algorithm based on Python are combined to conduct the required calculations. The simulation results show that the dynamics of viscous and non-viscous debris flows can be extremely different when there are obstacles in the downstream direction. The implemented SPH-FEM coupling method can simulate the fluid-structure coupling problem with a reasonable approximation.
Based on the analysis of survey data of 121 family enterprises in China, we find that the relationship between job satisfaction and turnover intention is insignificant for family members, but significant for non-family members. Moreover, our findings also indicate that the effect of job satisfaction on work performance is less salient for family members, but more significant for non-family members. Our results further show that managerial positions moderates the main effects. This paper enriches the literature of family business by examining the importance of family membership and managerial position in the governance of family enterprises in an emerging country.
In order to address typical problems due to the huge demand of oil for consumption in traditional internal combustion engines, a new more efficient combustion mode is proposed and studied in the framework of Computational Fluid Dynamics (CFD). Moreover, a Non-dominated Sorting Genetic Algorithm (NSGA-II) is applied to optimize the related parameters, namely, the engine methanol ratio, the fuel injection time, the initial temperature, the Exhaust Gas Re-Circulation (EGR) rate, and the initial pressure. The so-called Conventional Diesel Combustion (CDC), Homogeneous Charge Compression Ignition (HCCI) and the Reactivity Controlled Compression Ignition (RCCI) combustion modes are compared. The results show that RCCI has a higher methanol ratio and an earlier injection timing with moderate EGR rate and higher initial pressure. The initial temperature increases as the methanol ratio increases. In comparison, CDC has the lowest hydrocarbon and CO emissions and the highest combustion efficiency. At different crankshaft rotation angles corresponding to 50% of the combustion amount (CA50), the combustion temperature and boundary layer temperature of HCCI change significantly, while those of RCCI undergo limited variations. At the same CA50, the exergy losses of HCCI and RCCI are lower than that of the CDC. On the basis of these findings, it can be concluded that the methanol/diesel RCCI engine can be used to obtain a clean and efficient combustion process, which should be regarded as a promising combustion mode.
Abstract-To design an effective secure routing of trusted nodes in wireless sensor networks, quantum ant colony algorithm is applied to the design of large-scale wireless sensor network routing. The trustworthy network is used as the pheromone distribution strategy. Then, the pheromone is encoded by the quantum bit. The pheromone is updated by the quantum revolving door, and the energy consumption prediction is carried out to select the path. Finally, the trusted security routing algorithm of the wireless sensor network based on the global energy balance is realized. The quantum ant colony algorithm is superior to the traditional ant colony algorithm in algorithm convergence speed and global optimization. It can balance the energy consumption of the network node and can effectively resist the attacks such as Wormholes. It is very promising to apply the quantum ant colony algorithm to the routing algorithm of large scale wireless sensor networks.Keywords-wireless sensor network, quantum ant colony algorithm, safe and reliable, routing algorithm IntroductionBecause many nodes in wireless sensor networks are distributed densely, messages often reach multi-hop relay nodes. Each node is a potential routing node, which has no fixed infrastructure and is more vulnerable to attacks. The nodes are assumed to be friendly nodes and lack the necessary trust mechanism, and are vulnerable to attacks such as fake nodes. As the wireless sensor network node and network characteristics and energy consumption constraints, leading to wireless sensor network security threats are different from traditional computer networks [1]. We believe that the design principles of WSN (wireless sensor networks) security routing algorithm are as follows: (1) to maintain the global energy load balance of the whole network; (2) to have certain fault tolerance and network self-healing function; (3) application is data centric, routing protocols will continue to be data-based, location-based; (4) it should have a credible security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.