首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到5条相似文献,搜索用时 0 毫秒
1.
The paper presents experimental tests and theoretical studies of a Stirling engine cycle applied to a β-type machine. The finite physical dimension thermodynamics (FPDT) method and 0D modeling by the imperfectly regenerated Schmidt model are used to develop analytical models for the Stirling engine cycle. The purpose of this study is to show that two simple models that take into account only the irreversibility due to temperature difference in the heat exchangers and imperfect regeneration are able to indicate engine behavior. The share of energy loss for each is determined using these two models as well as the experimental results of a particular engine. The energies exchanged by the working gas are expressed according to the practical parameters, which are necessary for the engineer during the entire project, namely the maximum pressure, the maximum volume, the compression ratio, the temperature of the heat sources, etc. The numerical model allows for evaluation of the energy processes according to the angle of the crankshaft (kinematic–thermodynamic coupling). The theoretical results are compared with the experimental research. The effect of the engine rotation speed on the power and efficiency of the actual operating machine is highlighted. The two methods show a similar variation in performance, although heat loss due to imperfect regeneration is evaluated differently.  相似文献   

2.
提出求解位置-速度相空间中高维两相流PDF(probability density function)方程的有限分析方法,将位置-速度相空间颗粒PDF方程约化到速度空间,并解析求解,颗粒的位置PDF用轨道方法求解.对壁面射流两相流动进行数值模拟,并与颗粒雷诺应力轨道方法进行比较计算,结果优于颗粒雷诺应力轨道方法.  相似文献   

3.
Insecure applications (apps) are increasingly used to steal users’ location information for illegal purposes, which has aroused great concern in recent years. Although the existing methods, i.e., static and dynamic taint analysis, have shown great merit for identifying such apps, which mainly rely on statically analyzing source code or dynamically monitoring the location data flow, identification accuracy is still under research, since the analysis results contain a certain false positive or true negative rate. In order to improve the accuracy and reduce the misjudging rate in the process of vetting suspicious apps, this paper proposes SAMLDroid, a combined method of static code analysis and machine learning for identifying Android apps with location privacy leakage, which can effectively improve the identification rate compared with existing methods. SAMLDroid first uses static analysis to scrutinize source code to investigate apps with location acquiring intentions. Then it exploits a well-trained classifier and integrates an app’s multiple features to dynamically analyze the pattern and deliver the final verdict about the app’s property. Finally, it is proved by conducting experiments, that the accuracy rate of SAMLDroid is up to 98.4%, which is nearly 20% higher than Apparecium.  相似文献   

4.
The effect of noise on computer-derived samples of voice was compared across three different hardware/software configurations. The hardware/software systems included a stand-alone A/D converter (CSL Module 4300B) coupled to a custom Pentium PC used in conjunction with the Multi-Dimensional Voice Program (MDVP) software, and a Creative Labs A/D converter coupled to the same custom PC under software control of MDVP/Multispeech and CSpeechSP. Voice samples were taken from 10 female subjects, then mixed with computer fan noise creating three different signal-to-noise (S/N) levels. Mixed signals were analyzed on the three hardware/software systems. Results revealed that fundamental frequency was most resistant to the degradation effect of noise across systems; jitter and shimmer values, however, were more variable across all configurations. Jitter and shimmer values were significantly higher under certain S/N levels for the MDVP 4300B based system as compared to MDVP for Multi-Speech and CSpeechSP. The findings punctuate the need for sensitivity to recording environments, careful selection of hardware/software equipment arrays, and the establishment of minimal recording conditions (>25 dBA S/N) for voice sampling and analysis using computer-assisted methods.  相似文献   

5.
Although most of the early research studies on fractional-order systems were based on the Caputo or Riemann–Liouville fractional-order derivatives, it has recently been proven that these methods have some drawbacks. For instance, kernels of these methods have a singularity that occurs at the endpoint of an interval of definition. Thus, to overcome this issue, several new definitions of fractional derivatives have been introduced. The Caputo–Fabrizio fractional order is one of these nonsingular definitions. This paper is concerned with the analyses and design of an optimal control strategy for a Caputo–Fabrizio fractional-order model of the HIV/AIDS epidemic. The Caputo–Fabrizio fractional-order model of HIV/AIDS is considered to prevent the singularity problem, which is a real concern in the modeling of real-world systems and phenomena. Firstly, in order to find out how the population of each compartment can be controlled, sensitivity analyses were conducted. Based on the sensitivity analyses, the most effective agents in disease transmission and prevalence were selected as control inputs. In this way, a modified Caputo–Fabrizio fractional-order model of the HIV/AIDS epidemic is proposed. By changing the contact rate of susceptible and infectious people, the atraumatic restorative treatment rate of the treated compartment individuals, and the sexual habits of susceptible people, optimal control was designed. Lastly, simulation results that demonstrate the appropriate performance of the Caputo–Fabrizio fractional-order model and proposed control scheme are illustrated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号