• Title/Summary/Keyword: Key Constraints

Search Result 317, Processing Time 0.024 seconds

Non-iterative Global Mesh Smoothing with Feature Preservation

  • Ji, Zhongping;Liu, Ligang;Wang, Guojin
    • International Journal of CAD/CAM
    • /
    • v.6 no.1
    • /
    • pp.89-97
    • /
    • 2006
  • This paper presents a novel approach for non-iterative surface smoothing with feature preservation on arbitrary meshes. Laplacian operator is performed in a global way over the mesh. The surface smoothing is formulated as a quadratic optimization problem, which is easily solved by a sparse linear system. The cost function to be optimized penalizes deviations from the global Laplacian operator while maintaining the overall shape of the original mesh. The features of the original mesh can be preserved by adding feature constraints and barycenter constraints in the system. Our approach is simple and fast, and does not cause surface shrinkage and distortion. Many experimental results are presented to show the applicability and flexibility of the approach.

A study regarding an TP(Thinking process) Application Plan for selecting the CTQ(Critical To Quality) of 6 Sigma (6시그마의 CTQ(Critical To Quality)선정을 위한 TP(Thinking Process) 활용 방안에 관한 연구)

  • Lee Jeong Seop;Seo Jang Hun;Park Myeong Gyu
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2004.11a
    • /
    • pp.81-85
    • /
    • 2004
  • Companies adopted a program called Six Sigma, in order to make fundamental changes in the way the company operated to fulfill customers' expectations. Six Sigma reduces the occurrence of defects. This approach derives the overall process of selection the right projects based on their potential to improve performance metrics and selection and training the right people to get the business results. However, in the course of Six Sigma process steps, companies are in the face of problems. This study is to solve the problems using TP(Thinking Process) of TOC(Theory of Constraints). TOC is methodology for solving key problem in system which is called Constraints. Nowadays, its application is going to be wide and its concept is being implemented. In this paper, it is showed possibility of application TOC to Six Sigma.

  • PDF

Design and optimization of layout patterns for rock TBM cutterheads

  • Ebrahim Farrokh
    • Geomechanics and Engineering
    • /
    • v.38 no.2
    • /
    • pp.179-189
    • /
    • 2024
  • This paper presents a geomechanical framework for designing and optimizing layout patterns of cutterheads for rock Tunnel Boring Machines (TBMs), aiming to enhance their engineering performance. By examining the forces and moments exerted by rock, the study addresses geometric constraints associated with cutter boxes in key regions of the cutterhead, including the center, face, and gage areas, as well as the three-dimensional effects of cutterhead curvature on the geometric constraints of the back of the cutter boxes in the gage area. Novel formulas are proposed for determining the center points of cutter boxes and calculating both the minimum angular spacing and distance spacing between consecutive cutter boxes along a spiral path. The paper outlines an optimized layout design process for four cutterhead configurations: random, random paired, radial, and double spiral designs. Examples are provided to illustrate the results of applying these designs. The findings underscore the efficacy of the proposed methods in achieving a uniform and symmetrical distribution of cutters and buckets on the cutterhead surface. This approach effectively eliminates boundary overlap and minimizes unbalanced forces and moments. From a geomechanical standpoint, this framework offers a robust strategy for enhancing the performance and reliability of TBM cutterheads in rock tunneling operations.

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.

Understanding Post-Pandemic Travel Intention: Boredom as a Key Predictor (포스트 팬데믹 여행 의도에 관한 연구 : 코로나에 대한 지루함을 중심으로)

  • Park, Jun Sung;Park, Heejun
    • Journal of Korean Society for Quality Management
    • /
    • v.52 no.1
    • /
    • pp.1-21
    • /
    • 2024
  • Purpose: This study seeks to explore the impact of COVID-19-induced boredom, a prevalent form of pandemic-related stress, on travel motivation and post-pandemic travel intentions. Additionally, it examines the interplay among travel motivation, travel constraints, and the willingness to pay more for travel experiences in the post-pandemic context. Methods: A PLS-SEM analysis was conducted to analyze the data. Data collection took place through an online survey in February and March 2021, with a total of 575 respondents participating. Participants provided responses regarding their current levels of boredom due to COVID-19, five different travel motivations, seven travel constraints, and their post-pandemic travel intentions. Additionally, participants were asked about their willingness to pay more for travel. Results: This study highlights the significant role of COVID-19-induced boredom in predicting post-pandemic travel intentions and the willingness to pay more for travel. Contrary to previous perceptions, boredom emerges as a driving factor, enhancing travel intentions during the pandemic. Additionally, relaxation becomes the primary motivation for travel during COVID-19, and structural constraints exert a noticeable impact on travel intentions, challenging previous assumptions. Stress levels directly influence the willingness to pay more during travel experiences, expanding the understanding of additional payment behavior in the context of travel. Conclusion: This study offers practical insights for tourism stakeholders. Recognizing and addressing boredom in marketing strategies, implementing aggressive additional payment options, and focusing on relaxation-oriented travel products are recommended to cater to post-pandemic traveler preferences and revive the tourism industry effectively.

A Novel Service Migration Method Based on Content Caching and Network Condition Awareness in Ultra-Dense Networks

  • Zhou, Chenjun;Zhu, Xiaorong;Zhu, Hongbo;Zhao, Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2680-2696
    • /
    • 2018
  • The collaborative content caching system is an effective solution developed in recent years to reduce transmission delay and network traffic. In order to decrease the service end-to-end transmission delay for future 5G ultra-dense networks (UDN), this paper proposes a novel service migration method that can guarantee the continuity of service and simultaneously reduce the traffic flow in the network. In this paper, we propose a service migration optimization model that minimizes the cumulative transmission delay within the constraints of quality of service (QoS) guarantee and network condition. Subsequently, we propose an improved firefly algorithm to solve this optimization problem. Simulation results show that compared to traditional collaborative content caching schemes, the proposed algorithm can significantly decrease transmission delay and network traffic flow.

Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service (융합형 u-헬스케어 서비스에서 헬스 정보 교환을 위한 키 트리 기반 관리 체계 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.81-86
    • /
    • 2015
  • The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.

Adaptive location of repaired blade for multi-axis milling

  • Wu, Baohai;Wang, Jian;Zhang, Ying;Luo, Ming
    • Journal of Computational Design and Engineering
    • /
    • v.2 no.4
    • /
    • pp.261-267
    • /
    • 2015
  • Free-form blades are widely used in different industries, such as aero-engine and steam turbine. Blades that are damaged during service or have production deficiencies are usually replaced with new ones. This leads to the waste of expensive material and is not sustainable. However, material and costs can be saved by repairing of locally damaged blades or blades with localized production deficiencies. The blade needs to be further machined after welding process to reach the aerodynamic performance requirements. This paper outlines an adaptive location approach of repaired blade for model reconstruction and NC machining. Firstly, a mathematical model is established to describe the localization problem under constraints. Secondly, by solving the mathematical model, localization of repaired blade for NC machining can be obtained. Furthermore, a more flexible method based on the proposed mathematical model and the continuity of the deformation process is developed to realize a better localization. Thirdly, by rebuilding the model of the repaired blade and extracting repair error, optimized tool paths for NC machining is generated adaptively for each individual part. Finally, three examples are given to validate the proposed method.

Damping of Inter-Area Low Frequency Oscillation Using an Adaptive Wide-Area Damping Controller

  • Yao, Wei;Jiang, L.;Fang, Jiakun;Wen, Jinyu;Wang, Shaorong
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.1
    • /
    • pp.27-36
    • /
    • 2014
  • This paper presents an adaptive wide-area damping controller (WADC) based on generalized predictive control (GPC) and model identification for damping the inter-area low frequency oscillations in large-scale inter-connected power system. A recursive least-squares algorithm (RLSA) with a varying forgetting factor is applied to identify online the reduced-order linearlized model which contains dominant inter-area low frequency oscillations. Based on this linearlized model, the generalized predictive control scheme considering control output constraints is employed to obtain the optimal control signal in each sampling interval. Case studies are undertaken on a two-area four-machine power system and the New England 10-machine 39-bus power system, respectively. Simulation results show that the proposed adaptive WADC not only can damp the inter-area oscillations effectively under a wide range of operation conditions and different disturbances, but also has better robustness against to the time delay existing in the remote signals. The comparison studies with the conventional lead-lag WADC are also provided.

Optimal Energy-Efficient Power Allocation and Outage Performance Analysis for Cognitive Multi-Antenna Relay Network Using Physical-Layer Network Coding

  • Liu, Jia;Zhu, Ying;Kang, GuiXia;Zhang, YiFan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3018-3036
    • /
    • 2013
  • In this paper, we investigate power allocation scheme and outage performance for a physical-layer network coding (PNC) relay based secondary user (SU) communication in cognitive multi-antenna relay networks (CMRNs), in which two secondary transceivers exchange their information via a multi-antenna relay using PNC protocol. We propose an optimal energy-efficient power allocation (OE-PA) scheme to minimize total energy consumption per bit under the sum rate constraint and interference power threshold (IPT) constraints. A closed-form solution for optimal allocation of transmit power among the SU nodes, as well as the outage probability of the cognitive relay system, are then derived analytically and confirmed by numerical results. Numerical simulations demonstrate the PNC protocol has superiority in energy efficiency performance over conventional direct transmission protocol and Four-Time-Slot (4TS) Decode-and-Forward (DF) relay protocol, and the proposed system has the optimal outage performance when the relay is located at the center of two secondary transceivers.