Simulation on Effect of Five Kinds of Belt Structures on Tire Performance

2012 ◽  
Vol 501 ◽  
pp. 151-155
Author(s):  
Yong Liu ◽  
Ge Zhang ◽  
Hua Yan ◽  
Yu Mei Ding ◽  
Wei Min Yang

In this article, three kinds of belt named B, C and D type are invented, then their main performance are compared with the other two kinds of belt structures introduced in previous papers. Simulation results showed that B and D-type belts are better than the other three. Comparatively the latter needs less material, its molding process is easier, and the tire body is lighter than B type tire, so in general it can be considered that D-type belt is the best among the five kinds of belt structures.

2012 ◽  
Vol 268-270 ◽  
pp. 1426-1431
Author(s):  
Jian Jun Yi ◽  
Fei Luo ◽  
Shao Li Chen ◽  
Bai Yang Ji ◽  
Hai Xu Yan

RFID anti-collision technology is one of a key technology in RFID application system. Anti-collision algorithms for RFID systems include tag anti-collision algorithms and reader anti-collision algorithms. This paper focused on the impoved binary algorithm and dynamic binary algorithm. An improved algorithm has been proposed, in which the collision bits was put into the stack and they were used as the reader’s request. Based on this mechanism, a novel binary stack algorithm has been proposed. Its simulation was given to analyze the performance of this algorithm. The simulation results showed that the amount of transmitted data in proposed algorithm was obviously less than those in the other two traditional algorithms with the number of tags and their bytes increasing. Consequently, the performance of the proposed algorithm is much better than that of the traditional anti-collision binary algorithm.


Author(s):  
Md. Mohibur Rahaman ◽  
Mohammad Khairul Islam ◽  
Kazi Ashrafuzzaman ◽  
Mohammad Sanaullah Chowdhury

<p>The IEEE 802.15.4 is the standard for Low Rate Wireless Personal Area network (LR-WPAN). It is widely used in many application areas. The standard uses Slotted CSMA/CA mechanism in its contention access period (CAP) for the beacon enabled mode. The protocol has two modes - single sensing (SS) and double sensing (DS). The protocol also adopts a binary exponential backoff (BEB) algorithm. In this paper, we explore the saturation throughput, delay and energy consumption of this standard with double sensing (DS) using the existing BEB algorithm. We also investigate three other backoff schemes - exponential increase exponential decrease (EIED), exponential increase linear decrease (EILD) and exponential increase multiplicative decrease (EIMD). From simulation results, it is found that the EIED, EILD, EIMD perform better than the BEB for higher loads. It shows that the EIED, EILD, EIMD have better throughput and lower delay than the BEB. The EIED outperforms the other schemes in terms of throughput, delay and energy for the higher loads.</p>


2014 ◽  
Vol 490-491 ◽  
pp. 1579-1583
Author(s):  
Ming Jie Yang ◽  
Xue Min Zi

We compare the ARL of three charts for monitoring the mean shifts of the first-order auto regressive model to choose a proper control chart. Simulation results show that the REWMA chart has a large superior to the EWMA and T2 the chart when -1<Ø<0, but when Ø>0, the chart is better than the other two charts.


Author(s):  
Yuhui Shi

In this paper, the human brainstorming process is modeled, based on which two versions of Brain Storm Optimization (BSO) algorithm are introduced. Simulation results show that both BSO algorithms perform reasonably well on ten benchmark functions, which validates the effectiveness and usefulness of the proposed BSO algorithms. Simulation results also show that one of the BSO algorithms, BSO-II, performs better than the other BSO algorithm, BSO-I, in general. Furthermore, average inter-cluster distance Dc and inter-cluster diversity De are defined, which can be used to measure and monitor the distribution of cluster centroids and information entropy of the population over iterations. Simulation results illustrate that further improvement could be achieved by taking advantage of information revealed by Dc and/or De, which points at one direction for future research on BSO algorithms.


Author(s):  
Yuhui Shi

In this chapter, the human brainstorming process is modeled, based on which two versions of a Brain Storm Optimization (BSO) algorithm are introduced. Simulation results show that both BSO algorithms perform reasonably well on ten benchmark functions, which validates the effectiveness and usefulness of the proposed BSO algorithms. Simulation results also show that one of the BSO algorithms, BSO-II, performs better than the other BSO algorithm, BSO-I, in general. Furthermore, average inter-cluster distance Dc and inter-cluster diversity De are defined, which can be used to measure and monitor the distribution of cluster centroids and information entropy of the population over iterations. Simulation results illustrate that further improvement could be achieved by taking advantage of information revealed by Dc, which points at one direction for future research on BSO algorithms.


2011 ◽  
Vol 2 (4) ◽  
pp. 35-62 ◽  
Author(s):  
Yuhui Shi

In this paper, the human brainstorming process is modeled, based on which two versions of Brain Storm Optimization (BSO) algorithm are introduced. Simulation results show that both BSO algorithms perform reasonably well on ten benchmark functions, which validates the effectiveness and usefulness of the proposed BSO algorithms. Simulation results also show that one of the BSO algorithms, BSO-II, performs better than the other BSO algorithm, BSO-I, in general. Furthermore, average inter-cluster distance Dc and inter-cluster diversity De are defined, which can be used to measure and monitor the distribution of cluster centroids and information entropy of the population over iterations. Simulation results illustrate that further improvement could be achieved by taking advantage of information revealed by Dc and/or De, which points at one direction for future research on BSO algorithms.


2018 ◽  
Vol 13 (5) ◽  
pp. 967-977 ◽  
Author(s):  
Masakazu Hashimoto ◽  
Nozomu Yoneyama ◽  
Kenji Kawaike ◽  
Tomonori Deguchi ◽  
Mohammed Abed Hossain ◽  
...  

This study investigated the vertical accuracy of satellite elevation data and its effect on flood and substance transportation analysis by using a two-dimensional flood simulation model. SRTM, AW3D, and ASTER GDEM satellite elevation data for East Dhaka, Bangladesh were used for evaluating the vertical accuracy and conducting numerical analyses. A case study in 2007 was simulated for the flooding analysis. The results showed that AW3D had the highest applicability because its vertical accuracy for low-lying areas was better than that of the other products. According to the differences in the flood extent of each satellite elevation data, the simulation results of the substance transportation analysis showed different spreading conditions. Furthermore, differences in the flood velocity and direction affected the distribution of the deposited substance.


2014 ◽  
Vol 513-517 ◽  
pp. 1160-1164
Author(s):  
Shu Juan Huang ◽  
Yi An Zhu

Nowadays, there are two approach in mixed-criticality scheduling. One is reservations-based approach such as EDF-VD(Earliest Deadline First-Virtual Deadline) and the Other is priority-based scheduling such as OCBP(Own Criticality Based Priority). This paper compared the two mixed-criticality scheduling algorithm from three aspects. The simulation results show that EDF-VD is better than OCBP in completed tasks and the system utilization, but in unmissed deadline ratio the later owns the better.


2019 ◽  
Vol 76 (6) ◽  
pp. 1690-1701 ◽  
Author(s):  
Lisa E Ailloud ◽  
Matthew V Lauretta ◽  
John F Walter ◽  
John M Hoenig

Abstract Age–length key (ALK) methods generally perform well when length samples and age samples are representative of the underlying population. It is unclear how well these methods perform when lengths are representative but age samples are sparse (i.e. age samples are small or missing in many years, and some length groups do not have any age observations). With western Atlantic bluefin tuna, the available age data are sparse and have been, for the most part, collected opportunistically. We evaluated two methods capable of accommodating sparse age data: a novel hybrid ALK (combining forward ALKs and cohort slicing) and the combined forward-inverse ALK. Our goal was to determine if the methods performed better than cohort slicing, which has traditionally been used to obtain catch-at-age for Atlantic bluefin tuna, given the data limitations outlined above. Simulation results indicated that the combined forward-inverse ALK performed much better than the other methods. When applied to western Atlantic bluefin tuna data, the combined forward-inverse ALK approach was able to track cohorts and identified an inconsistency in the ageing of some samples.


2015 ◽  
Vol 799-800 ◽  
pp. 604-609 ◽  
Author(s):  
Ching Yu Hsu ◽  
Tso Liang Teng ◽  
Cho Chung Liang ◽  
Hai Anh Nguyen ◽  
Chien Jong Shih

This paper focuses on the comparison between underwater explosion (UNDEX) shock loading empirical formulations. First, the numerical simulations for a cylindrical pressure hull subjected to UNDEX loading were conducted and the results are close to the failure modes shown in experiments of Kwon (1993). Second, the empirical UNDEX loading formula of Cole (1948), Keil (1961) and Shin (1994) used in cylinder subjected to underwater shock loading were compared. The simulation results by using three empirical formulas were compared and Shin’s (or Cole’s) empirical formula was shown to be better than the other empirical formulations when subjected to an UNDEX under the same conditions. The analytical results offer a valuable reference to the research of underwater explosion.


Sign in / Sign up

Export Citation Format

Share Document