• Title/Summary/Keyword: Information Expansion Ratio

Search Result 112, Processing Time 0.025 seconds

Nonlinear static analysis of composite cylinders with metamaterial core layer, adjustable Poisson's ratio, and non-uniform thickness

  • Eipakchi, Hamidreza;Nasrekani, Farid Mahboubi
    • Steel and Composite Structures
    • /
    • v.43 no.2
    • /
    • pp.241-256
    • /
    • 2022
  • In this article, an analytical procedure is presented for static analysis of composite cylinders with the geometrically nonlinear behavior, and non-uniform thickness profiles under different loading conditions by considering moderately large deformation. The composite cylinder includes two inner and outer isotropic layers and one honeycomb core layer with adjustable Poisson's ratio. The Mirsky-Herman theory in conjunction with the von-Karman nonlinear theory is employed to extract the governing equations which are a system of nonlinear differential equations with variable coefficients. The governing equations are solved analytically using the matched asymptotic expansion (MAE) method of the perturbation technique and the effects of moderately large deformations are studied. The presented method obtains the results with fast convergence and high accuracy even in the regions near the boundaries. Highlights: • An analytical procedure based on the matched asymptotic expansion method is proposed for the static nonlinear analysis of composite cylindrical shells with a honeycomb core layer and non-uniform thickness. • The effect of moderately large deformation has been considered in the kinematic relations by assuming the nonlinear von Karman theory. • By conducting a parametric study, the effect of the honeycomb structure on the results is studied. • By adjusting the Poisson ratio, the effect of auxetic behavior on the nonlinear results is investigated.

A Performance Analysis of CDMA System Based on the Combination of Bandwidth Expansion (CDMA 시스템의 대역폭확장 조합에 따른 성능분석)

  • Ryu, Kil-Hyen
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.11
    • /
    • pp.14-18
    • /
    • 2010
  • We propose a performance analysis of code division multiple access systems based on the combination of M-ary and pseudo-noise spreading. In spite of the total bandwidth expansion being equal, there is a difference in the system performance by the combination of M-ary and pseudo-noise spreading. The proposed analysis uses each bandwidth expansion, caused by M-ary and pseudo-noise spreading, rather than the total bandwidth expansion. If the signal to interference plus noise ratio becomes high, it is more effective to reduce biterror rate by bandwidth expansion of M-ary modulation rather than that of pseudo-noise spreading. Since the proposed analysis reflects the effect of the M-ary modulation, the bit error rate from the proposed analysis is closer to the results of the simulation than from the conventional analysis.

Experimental Result on Map Expansion of Underwater Robot Using Acoustic Range Sonar (수중 초음파 거리 센서를 이용한 수중 로봇의 2차원 지도 확장 실험)

  • Lee, Yeongjun;Choi, Jinwoo;Lee, Yoongeon;Choi, Hyun-Taek
    • The Journal of Korea Robotics Society
    • /
    • v.13 no.2
    • /
    • pp.79-85
    • /
    • 2018
  • This study focuses on autonomous exploration based on map expansion for an underwater robot equipped with acoustic sonars. Map expansion is applicable to large-area mapping, but it may affect localization accuracy. Thus, as the key contribution of this paper, we propose a method for underwater autonomous exploration wherein the robot determines the trade-off between map expansion ratio and position accuracy, selects which of the two has higher priority, and then moves to a mission step. An occupancy grid map is synthesized by utilizing the measurements of an acoustic range sonar that determines the probability of occupancy. This information is then used to determine a path to the frontier, which becomes the new search point. During area searching and map building, the robot revisits artificial landmarks to improve its position accuracy as based on imaging sonar-based recognition and EKF-SLAM if the position accuracy is above the predetermined threshold. Additionally, real-time experiments were conducted by using an underwater robot, yShark, to validate the proposed method, and the analysis of the results is discussed herein.

Spectrum Allocation and Service Control for Energy Saving Based on Large-Scale User Behavior Constraints in Heterogeneous Networks

  • Yang, Kun;Zhang, Xing;Wang, Shuo;Wang, Lin;Wang, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3529-3550
    • /
    • 2016
  • In heterogeneous networks (HetNets), energy saving is vital for a sustainable network development. Many techniques, such as spectrum allocation, network planning, etc., are used to improve the network energy efficiency (EE). In this paper, micro BSs utilizing cell range expansion (CRE) and spectrum allocation are considered in multi-channel heterogeneous networks to improve EE. Hotspot region is assumed to be covered by micro BSs which can ensure that the hotspot capacity is greater than the average demand of hotspot users. The expressions of network energy efficiency are derived under shared, orthogonal and hybrid subchannel allocation schemes, respectively. Particle swarm optimization (PSO) algorithm is used to solve the optimal ratio of subchannel allocation in orthogonal and hybrid schemes. Based on the results of the optimal analysis, we propose three service control strategies on the basis of large-scale user behaviors, i.e., adjust micro cell rang expansion (AmCRE), adjust micro BSs density (AmBD) and adjust micro BSs transmit power (AmBTP). Both theoretical and simulation results show that using shared subchannel allocation scheme in AmBD strategies can obtain maximal EE with a very small area ratio. Using orthogonal subchannel allocation scheme in AmCRE strategies can obtain maximal EE when area ratio is larger. Using hybrid subchannel allocation scheme in AmCRE strategies can obtain maximal EE when area ratio is large enough. No matter which service control strategy is used, orthogonal spectrum scheme can obtain the maximal hotspot user rates.

An Effective Method to Treat The Boundary Pixels for Image Compression with DWT (DWT를 이용한 영상압축을 위한 경계화소의 효과적인 처리방법)

  • 서영호;김종현;김대경;유지상;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.618-627
    • /
    • 2002
  • In processing images using 2 dimensional Discrete Wavelet Transform(2D-DWT), the method to process the pixels around the image boundary may affect the quality of image and the cost to implement in hardware and software. This paper proposed an effective method to treat the boundary pixels, which is apt to implement in hardware and software without losing the quality of the image costly. This method processes the 2-D image as 1-D array so that 2-D DWT is performed by considering the image with the serial-sequential data structure (Serial-Sequential Processing). To show the performance and easiness in implementation of the proposed method, an image compression codec which compresses image and reconstructs it has been implemented and experimented. It included log-scale fried quantizer, but the entropy coder was not implemented. From the experimental results, the proposed method showed the SNR of almost the same SNR(Signal to Noise Ratio) to the Periodic Expansion(PE) method when the compression ratio(excluding entropy coding) of 2:1, 15.3% higher than Symmetric Expansion(SE) method, and 9.3% higher than 0-pixel Padding Expansion(ZPE) method. Also PE method needed 12.99% more memory space than the proposed method. By considering only the compression process, SE and ZPE methods needed additional operations than the proposed one. In hardware implementation, the proposed method in this paper had 5.92% of overall circuit as the control circuit, while SE, PE, and ZPE method has 22%, 21,2%, and 11.9% as the control circuit, respectively. Consequently, the proposed method can be thought more effective in implementing software and hardware without losing any image quality in the usual image processing applications.

Performance of cross-eye jamming due to amplitude mismatch: Comparison of performance analysis of angle tracking error (진폭비 불일치에 의한 cross-eye 재밍 성능: 각도 추적 오차 성능 분석 비교)

  • Kim, Je-An;Kim, Jin-Sung;Lee, Joon-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.51-56
    • /
    • 2021
  • In this paper, performance degradation in the cross-eye jamming due to amplitude mismatch of two jamming antennas is considered. The mismatch of the amplitude ratio is modeled as a random variable with a normal distribution of the difference between the actual amplitude ratio and the nominal amplitude ratio due to mechanical defects. In the proposed analytic performance analysis, the first-order Taylor series expansion and the second-order Taylor series expansion is adopted. Performance measure of the cross-eye jamming is the mean square difference (MSD). The analytically derived MSD is validated by comparing the analytically derived MSD with the first-order Taylor series-based simulation-based MSD and the second-order Taylor series-based simulation-based MSD. It shows that the analysis-based MSD is superior to the Monte-Carlo-based MSD, which has a high calculation cost.

Performance Analysis of Input-Output Buffering ATM Switch with Output-port Expansion Mechanism (출력포트 확장 방식을 사용한 입출력 버퍼형 ATM 교환기에서의 성능 비교 분석)

  • Kwon, Se-Dong;Park, Hyun-Min
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.531-542
    • /
    • 2002
  • An input and output buffering ATM switch conventionally operates in either Queueloss mode or Backpressure mode. Recently, a new mode, which is called Hybrid mode, was proposed to overcome the drawbacks of Queueloss mode and Backpressure mode. In Hybrid mode, when both the destined output buffer and the originfted input buffer are full, a cell is dropped. This thesis analyzes the cell loss rate and the cell delay of Queueloss, Backpressure and Hybrid modes in a switch adopting output-port expansion scheme under uniform traffic. Output-port expansion scheme allows only one cell from an input buffer to be switched during one time slot. If several cells switch to a same destined output port, the number of maximum transfer cells is restricted to K (Output-port expansion ratio). The simulation results show that if an offered load is less than 0.9, Hybrid mode has lower cell loss rate than the other modes; otherwise, Queueloss mode illustrates the lowest cell loss rate, which is a different result from previous researches. However, the difference between Hybrid and Queueloss modes is comparably small. As expected, the average cell delay in Backpressure mode is lower than those of Queueloss mode and Hybrid mode, since the cell delay due to the retransmission of higher number of dropped cells in Backpressure mode is not considered.

Performance of space -time coding for four transmit antennas on Rayleigh fading channel (4개의 송신 안테나를 사용하는 5-T 방식의 Rayleigh fading에서의 성능)

  • 이은옥;이혁재
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.41-44
    • /
    • 2002
  • Alamouti proposes a two branch transmit diver-sity scheme that provides the same diversity order as maximal ratio combining at the receiver. It has many advantages of no bandwidth expansion, not requiring channel information at the transmitter and simple maximum likelihood decoding at the receiver. Papadias and Foschini extend this sch-eme to four transmit antennas and suggest several schemes to decrease the interference component and allow the attainment of the open-loop capacity. This paper shows the performance of ZF and MM-SE schemes comparing with ideal case on 4xl sy-stem over BER and 10% outage capacity.

  • PDF

Change Acceptable In-Depth Searching in LOD Cloud for Efficient Knowledge Expansion (효과적인 지식확장을 위한 LOD 클라우드에서의 변화수용적 심층검색)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.171-193
    • /
    • 2018
  • LOD(Linked Open Data) cloud is a practical implementation of semantic web. We suggested a new method that provides identity links conveniently in LOD cloud. It also allows changes in LOD to be reflected to searching results without any omissions. LOD provides detail descriptions of entities to public in RDF triple form. RDF triple is composed of subject, predicates, and objects and presents detail description for an entity. Links in LOD cloud, named identity links, are realized by asserting entities of different RDF triples to be identical. Currently, the identity link is provided with creating a link triple explicitly in which associates its subject and object with source and target entities. Link triples are appended to LOD. With identity links, a knowledge achieves from an LOD can be expanded with different knowledge from different LODs. The goal of LOD cloud is providing opportunity of knowledge expansion to users. Appending link triples to LOD, however, has serious difficulties in discovering identity links between entities one by one notwithstanding the enormous scale of LOD. Newly added entities cannot be reflected to searching results until identity links heading for them are serialized and published to LOD cloud. Instead of creating enormous identity links, we propose LOD to prepare its own link policy. The link policy specifies a set of target LODs to link and constraints necessary to discover identity links to entities on target LODs. On searching, it becomes possible to access newly added entities and reflect them to searching results without any omissions by referencing the link policies. Link policy specifies a set of predicate pairs for discovering identity between associated entities in source and target LODs. For the link policy specification, we have suggested a set of vocabularies that conform to RDFS and OWL. Identity between entities is evaluated in accordance with a similarity of the source and the target entities' objects which have been associated with the predicates' pair in the link policy. We implemented a system "Change Acceptable In-Depth Searching System(CAIDS)". With CAIDS, user's searching request starts from depth_0 LOD, i.e. surface searching. Referencing the link policies of LODs, CAIDS proceeds in-depth searching, next LODs of next depths. To supplement identity links derived from the link policies, CAIDS uses explicit link triples as well. Following the identity links, CAIDS's in-depth searching progresses. Content of an entity obtained from depth_0 LOD expands with the contents of entities of other LODs which have been discovered to be identical to depth_0 LOD entity. Expanding content of depth_0 LOD entity without user's cognition of such other LODs is the implementation of knowledge expansion. It is the goal of LOD cloud. The more identity links in LOD cloud, the wider content expansions in LOD cloud. We have suggested a new way to create identity links abundantly and supply them to LOD cloud. Experiments on CAIDS performed against DBpedia LODs of Korea, France, Italy, Spain, and Portugal. They present that CAIDS provides appropriate expansion ratio and inclusion ratio as long as degree of similarity between source and target objects is 0.8 ~ 0.9. Expansion ratio, for each depth, depicts the ratio of the entities discovered at the depth to the entities of depth_0 LOD. For each depth, inclusion ratio illustrates the ratio of the entities discovered only with explicit links to the entities discovered only with link policies. In cases of similarity degrees with under 0.8, expansion becomes excessive and thus contents become distorted. Similarity degree of 0.8 ~ 0.9 provides appropriate amount of RDF triples searched as well. Experiments have evaluated confidence degree of contents which have been expanded in accordance with in-depth searching. Confidence degree of content is directly coupled with identity ratio of an entity, which means the degree of identity to the entity of depth_0 LOD. Identity ratio of an entity is obtained by multiplying source LOD's confidence and source entity's identity ratio. By tracing the identity links in advance, LOD's confidence is evaluated in accordance with the amount of identity links incoming to the entities in the LOD. While evaluating the identity ratio, concept of identity agreement, which means that multiple identity links head to a common entity, has been considered. With the identity agreement concept, experimental results present that identity ratio decreases as depth deepens, but rebounds as the depth deepens more. For each entity, as the number of identity links increases, identity ratio rebounds early and reaches at 1 finally. We found out that more than 8 identity links for each entity would lead users to give their confidence to the contents expanded. Link policy based in-depth searching method, we proposed, is expected to contribute to abundant identity links provisions to LOD cloud.

An Experimental Study on Supersonic Jet Issuing from Gas Atomizing Nozzle (I) (가스 미립화용 노즐로부터 방출되는 초음속 분류에 관한 실험적 연구)

  • Kim, Hui-Dong;Lee, Jong-Su
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.20 no.2
    • /
    • pp.697-709
    • /
    • 1996
  • Supersonic axisymmetric jets issuing from various kinds of nozzles with a throat diameter of a few millimeters were experimentally investigated. The exit Mach number and Reynolds number based on the throat diameter of nozzle were in the range of 1.0 ~ 5.9 and 8.4$\times$ $10^4$ ~ 2.9$\times$$10^6$, respectively. The nozzle pressure ratio was varied from 5 to 85. Present paper aims to offer fundamental information of the supersonic free-jets, with an emphasis to give data with which the shape of the free-jets can be depicted under a specified condition. Experimental data are summarized to enable an estimation of the shape of the supersonic free-jets. The result shows that the shape of free-jets is dependent on only the nozzle pressure ratio.