Cross iteration often exists in the computational process of the simulation models, especially for control models. There is a credibility defect tracing problem in the validation of models with cross iteration. In ord...Cross iteration often exists in the computational process of the simulation models, especially for control models. There is a credibility defect tracing problem in the validation of models with cross iteration. In order to resolve this problem, after the problem formulation, a validation theorem on the cross iteration is proposed, and the proof of the theorem is given under the cross iteration circumstance. Meanwhile, applying the proposed theorem, the credibility calculation algorithm is provided, and the solvent of the defect tracing is explained. Further, based on the validation theorem on the cross iteration, a validation method for simulation models with the cross iteration is proposed, which is illustrated by a flowchart step by step. Finally, a validation example of a sixdegree of freedom (DOF) flight vehicle model is provided, and the validation process is performed by using the validation method. The result analysis shows that the method is effective to obtain the credibility of the model and accomplish the defect tracing of the validation.展开更多
This paper deals with the increasing safety of working in aggressive potential locations, having SCADA system and WSN sensors, using a “probabilistic strategy” in comparison with a “deterministic” one, modeling/si...This paper deals with the increasing safety of working in aggressive potential locations, having SCADA system and WSN sensors, using a “probabilistic strategy” in comparison with a “deterministic” one, modeling/simulation and application in underground coal mining. In general, three conditions can be considered: 1) an unfriendly environment that facilitates the risk of accidents, 2) aggressive equipments that can compete to cause accidents and 3) the work security breaches that can cause accidents. These conditions define the triangle of accidents and are customized for an underground coal mining where the methane gas is released with the exploitation of the massive coal. In this case, the first two conditions create an explosive potential atmosphere. To allow people to work in a safe location it needs: first, a continuing monitoring through SCADA system of the explosive potential atmosphere and second, the use of antiexplosive equipment. This method, named “deterministic strategy”, increases the safety of working, but the explosions have not been completely eliminated. In order to increase the safety of working, the paper continues with the presentation of a new method based on hazard laws, named “probabilistic strategy”. This strategy was validated through modeling/simulation using CupCarbon software platform, and application of WSN networks implemented on Arduino equipments. At the end of the paper the interesting conclusions are emphases which are applicable to both strategies.展开更多
基金supported by the National Natural Science Foundation of China(61374164)
文摘Cross iteration often exists in the computational process of the simulation models, especially for control models. There is a credibility defect tracing problem in the validation of models with cross iteration. In order to resolve this problem, after the problem formulation, a validation theorem on the cross iteration is proposed, and the proof of the theorem is given under the cross iteration circumstance. Meanwhile, applying the proposed theorem, the credibility calculation algorithm is provided, and the solvent of the defect tracing is explained. Further, based on the validation theorem on the cross iteration, a validation method for simulation models with the cross iteration is proposed, which is illustrated by a flowchart step by step. Finally, a validation example of a sixdegree of freedom (DOF) flight vehicle model is provided, and the validation process is performed by using the validation method. The result analysis shows that the method is effective to obtain the credibility of the model and accomplish the defect tracing of the validation.
文摘This paper deals with the increasing safety of working in aggressive potential locations, having SCADA system and WSN sensors, using a “probabilistic strategy” in comparison with a “deterministic” one, modeling/simulation and application in underground coal mining. In general, three conditions can be considered: 1) an unfriendly environment that facilitates the risk of accidents, 2) aggressive equipments that can compete to cause accidents and 3) the work security breaches that can cause accidents. These conditions define the triangle of accidents and are customized for an underground coal mining where the methane gas is released with the exploitation of the massive coal. In this case, the first two conditions create an explosive potential atmosphere. To allow people to work in a safe location it needs: first, a continuing monitoring through SCADA system of the explosive potential atmosphere and second, the use of antiexplosive equipment. This method, named “deterministic strategy”, increases the safety of working, but the explosions have not been completely eliminated. In order to increase the safety of working, the paper continues with the presentation of a new method based on hazard laws, named “probabilistic strategy”. This strategy was validated through modeling/simulation using CupCarbon software platform, and application of WSN networks implemented on Arduino equipments. At the end of the paper the interesting conclusions are emphases which are applicable to both strategies.