• Title/Summary/Keyword: Equivalent Source Method

Search Result 183, Processing Time 0.022 seconds

Numerical Modeling of Heat Analysis of Bridge Pavement (포장 열영향 해석을 위한 아스팔트 열원 평가)

  • Lee, Wan-Hoon;Yoo, Byoung-Chan;Chung, Heung-Jin
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2007.04a
    • /
    • pp.253-258
    • /
    • 2007
  • Guss asphalt used in pavement of a steel deck bridge may cause severe stress and displacement on the bridge as it is treated using very high temperatures ranging from $220^{\circ}C$ to $260^{\circ}C$. Therefore, it is critical to estimate the thermal effect of Guss asphalt on the steel deck bridge before the width and pattern of the unit portion are decided to minimize impact. In this study, introduce a new analysis method styled the Heat source of equivalent of the cable stayed bridge were conducted to verify the feasibility of numerical value analysis by comparing the results with the data measured. The thermal effects of Guss asphalt on the steel deck bridge according to temperature changes were also studied.

  • PDF

A XML DTD Matching using Fuzzy Similarity Measure

  • Kim, Chang-Suk;Son, Dong-Cheul;Kim, Dae-Su
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.1
    • /
    • pp.32-36
    • /
    • 2003
  • An equivalent schema matching among several different source schemas is very important for information integration or mining on the XML based World Wide Web. Finding most similar source schema corresponding mediated schema is a major bottleneck because of the arbitrary nesting property and hierarchical structures of XML DTD schemas. It is complex and both very labor intensive and error prune job. In this paper, we present the first complex matching of XML schema, i.e. XML DTD. The proposed method captures not only schematic information but also integrity constraints information of DTD to match different structured DTD. We show the integrity constraints based hierarchical schema matching is more semantic than the schema matching only to use schematic information and stored data.

Analysis of Electro-magnetic Wave radiating from an Ignition Plug and High-voltage Cable inside an Engine Room (자동차의 점화 플러그와 고압 케이블에서 발생하는 전자파에 대한 해석)

  • 최광제;조시기;정원락;장성국;강신한
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.12 no.1
    • /
    • pp.209-215
    • /
    • 2004
  • This paper presents the frequency range and an analysis method to find the dominant source of electro-magnetic wave which originates from a spark ignition in engine room. Applying the distributed constant equivalent circuit theory the radiation of probable electro-magnetic wave around an ignition plug and a high voltage cable is studied analytically. Experimental studies are also conducted by measuring the frequency spectrum to obtain the radiating characteristics of electro-magnetic wave. Results from both analytical and experimental studies confirm that an ignition plug and a high voltage cable are dominant sources of electro-magnetic wave and that the radiating frequency is ranged from 1.3[GHz] to 2[GHz] band.

RC Tree Delay Estimation (RC tree의 지연시간 예측)

  • 유승주;최기영
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.12
    • /
    • pp.209-219
    • /
    • 1995
  • As a new algorithm for RC tree delay estimation, we propose a $\tau$-model of the driver and a moment propagation method. The $\tau$-model represents the driver as a Thevenin equivalent circuit which has a one-time-constant voltage source and a linear resistor. The new driver model estimates the input voltage waveform applied to the RC more accurately than the k-factor model or the 2-piece waveform model. Compared with Elmore method, which is a lst-order approximation, the moment propagation method, which uses $\pi$-model loads to calculate the moments of the voltage waveform on each node of RC trees, gives more accurate results by performing higher-order approximations with the same simple tree walking algorithm. In addition, for the instability problem which is common to all the approximation methods using the moment matching technique, we propose a heuristic method which guarantees a stable and accureate 2nd order approximation. The proposed driver model and the moment propagation method give an accureacy close to SPICE results and more than 1000 times speedup over circuit level simulations for RC trees and FPGA interconnects in which the interconnect delay is dominant.

  • PDF

Dual Reciprocity Boundary Element Analysis for the Graetz Problem in Circular Duct (원형 덕트유동에서의 Graetz 문제에 대한 이중교환 경계요소 해석)

  • Choi, Chang Yong
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.2
    • /
    • pp.243-253
    • /
    • 1999
  • The dual reciprocity boundary element method (DRBEM) is used to solve the Graetz problem of laminar flow inside circular duct. In this method the domain integral tenn of boundary integral equation resulting from source term of governing equation is transformed into equivalent boundary-only integrals by using the radial basis interpolation function, and therefore complicate domain discretization procedure Is completely removed. Velocity profile is obtained by solving the momentum equation first and then, using this velocities as Input data, energy equation Is solved to get the temperature profile by advancing from duct entrance through the axial direction marching scheme. DRBEM solution is tested for the uniform temperature and heat flux boundary condition cases. Local Nusselt number, mixed mean temperature and temperature profile inside duct at each dimensionless axial location are obtained and compared with exact solutions for the accuracy test Solutions arc in good agreement at the entry region as well as fully developed region of circular duct, and their accuracy are verified from error analysis.

Implementation of an Obfuscator for Visual C++ Source Code (비주얼 C++소스 코드를 위한 obfuscator 구현)

  • Chang, Hye-Young;Cho, Seong-Je
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.59-69
    • /
    • 2008
  • Automatic obfuscation is known to be the most viable method for preventing reverse engineering intentional1y making code more difficult to understand for security purposes. In this paper, we study and implement an obfuscation method for protecting MS Visual C++ programs against attack on the intellectual property in software like reverse engineering attack. That is, the paper describes the implementation of a code obfuscator, a tool which converts a Visual C++ source program into an equivalent one that is much harder to understand. We have used ANTLR parser generator for handling Visual C++ sources, and implemented some obfuscating transformations such as 'Remove comments', 'Scramble identifiers', 'Split variables', 'Fold array', 'Insert class', 'Extend loop condition', 'Add redundant operands', and 'Insert dead code'. We have also evaluated the performance and effectiveness of the obfuscator in terms of potency, resilience, and cost. When the obfuscated source code has been compared with the original source code, it has enough effectiveness for software protection though it incurs some run-time overheads.

A Method for Computing the Network Reliability of a Computer Communication Network

  • Ha, Kyung-Jae;Seo, Ssang-Hee
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 1998.10a
    • /
    • pp.202-207
    • /
    • 1998
  • The network reliability is to be computed in terms of the terminal reliability. The computation of a terminal reliability is started with a Boolean sum of products expression corresponding to simple paths of the pair of nodes. This expression is then transformed into another equivalent expression to be a Disjoint Sum of Products form. But this computation of the terminal reliability obviously does not consider the communication between any other nodes but for the source and the sink. In this paper, we derive the overall network reliability which all other remaining nodes. For this, we propose a method to make the SOP disjoint for deriving the network reliability expression from the system success expression using the modified Sheinman's method. Our method includes the concept of spanning trees to find the system success function by the Cartesian products of vertex cutsets.

  • PDF

Modeling of Unified Power Flow Controllers Using a Current Injection Method for Transient Stability Analysis (전류 주입형 방식의 UPFC 모델을 이용한 과도 안정도 해석)

  • Kim, Chon-Hoe;Park, Jung-Soo;Jang, Gil-Soo;Son, Kwang-M.;Kim, Tae-Kyun
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.332-334
    • /
    • 2005
  • This paper presents a dynamic simulation of the unified power flow controller (UPFC) using a current injection method. Flexible AC Transmission System (FACTS) devices give more flexibility of control for security and economic operation of power systems. Diffculties of modeling UPFC in the conventional dynamic simulation programs arise from the fact that the injected voltage by the series inverter is superimposed on the shunt inverter side voltage. A solution can be a current injection method, in which a serial part of UPFC is converted to a parallel equivalent circuit using source transformation, and two current sources affect each other at every time step. To verify efficiency of this method, the proposed model is applied for the transient analysis of an example power system.

  • PDF

The Power Analysis and Its Control of Two-phase Orthogonal Power Supply for the Continuous Casting

  • Ma, Fujun;Luo, An;Xiong, Qiaopo
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.971-982
    • /
    • 2015
  • In order to improve the quality of the billet continuous casting, a two-phase orthogonal power supply (TPOPS) for electromagnetic stirrer is researched, which is composed of three-phase PWM rectifier and three-leg inverter. According to the power analysis of system, the ripple of dc-link voltage is analyzed and its analytical expression is derived. In order to improve the performance of electromagnetic stirring, an integrated control method with feedforward control is proposed for PWM rectifier to suppress the fluctuations of dc-link voltage and provide a stable dc source for inverter. According to the simplified equivalent model, a composite current control method is proposed for inverter. This proposed method can combine the merits of feedforward control with feedback control to effectively improve the dynamic output performance of TPOPS. Finally, a 300kVA prototype of TPOPS is developed, and the results have verified the analysis and control method.

DSP BASED CONTROL OF HIGH POWER STATIC VAR COMPENSATOR USING NOVEL VECTOR PRODUCT PHASE LOCKED LOOP (새로운 벡터적 PLL를 이용한 대용량 무효전력 보상기(SVC)의 DSP 제어)

  • Jung, Gu-H.;Cho, Guk-C.;Chae, Cyun;Cho, Gyu-H.
    • Proceedings of the KIEE Conference
    • /
    • 1996.07a
    • /
    • pp.262-264
    • /
    • 1996
  • This paper presents a new dual loop control using novel vector phase locked loop(VP-PLL) for a high power static var compensator(SVC) with three-level GTO voltage source inverter(VSI). Through circuit DQ-transformation, a simple dq-axis equivalent circuit is obtained. From this, DC analysis is carried out to obtain maximum controllable phase angle ${\alpha}_{max}$ per unit current between the three phase source and the switching function of inverter, and AC open-loop transfer function is given. Because ${\alpha}_{max}$ becomes small in high power SVC, this paper proposes VP-PLL for more accurate $\alpha$-control. As a result, the overall control loop has dual loop structure, which consists of inner VP-PLL for synchronizing the phase angle with source and outer Q-loop for compensating reactive power of load. Finally, the validity of the proposed control method is verified through the experimental results.

  • PDF