• Title/Summary/Keyword: Level Set method

Search Result 1,490, Processing Time 0.035 seconds

A Study on the Improved Protective Relaying Algorithm Applied in the Linked System Interconnecting Wind Farm with the Utilities (풍력발전단지 연계 전용선로 보호계전방식의 향상에 대한 연구)

  • 장성일;김광호;권혁완;김대영;권혁진
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.12
    • /
    • pp.675-683
    • /
    • 2003
  • This paper describes the correction strategy of an overcurrent relay applied in the linked line for interconnecting wind farm with utility power networks in order to improve the capability of a fault detection. The fault current measured in a relaying point might vary according to the fault conditions. Generally, the current of the line to line fault or the line to ground fault in the linked line is much higher than the set value of protective relay due to the large fault level. However, when the high impedance fault occurs in the linked line, we can't detect it by conventional set value because its fault level may be lower than the generating capacity of wind farm. And, the protective relay with conventional set value may generate a trip signal for the insertion of wind turbine generators due to the large transient characteristics. In order to solve above problems and improve protective relaying algorithms applied in the linked line, we propose a new correction strategy of the protective relay in the linked line. The presented method can detect the high impedance fault which can't be detected by conventional relay set value and may prevent the mis-operation of protective relay caused by the insertion of wind farm.

Bandwidth-Award Bus Arbitration Method (점유율을 고려한 버스중재 방식)

  • Choi, Hang-Jin;Lee, Kook-Pyo;Yoon, Yung-Sup
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.5
    • /
    • pp.80-86
    • /
    • 2010
  • The conventional bus system architecture consists of masters, slaves, arbiter, decoder and so on in shared bus. As several masters can't use a bus concurrently, arbiter plays an role in arbitrating the bus. The efficiency of bus usage can be determined by the selection of arbitration method. Fixed Priority, Round-Robin, TDMA and Lottery arbitration policies are studied in the conventional arbitration method where the bus priority is primarily considered. In this paper, we propose the arbitration method that calculates the bus utilization of each master. Furthermore, we verify the performance compared with the other arbitration methods through TLM(Transaction Level Model). From the results of performance verification, the arbitration methods of Fixed Priority and Round-Robin can not set the bus utilization and those of TDMA and Lottery happen the error of 50% and 70% respectively compared with bus utilization set by user in more than 100,000 cycles. On the other hand, the bandwidth-award bus arbitration method remains the error of less than 1% since approximately 1000 cycles, compared with bus utilization set by user.

High-Level Test Generation for Asynchronous Circuits Using Signal Transition Graph (신호 전이그래프를 이용한 비동기회로의 상위수준 테스트 생성)

  • 오은정;김수현;최호용;이동익
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.137-140
    • /
    • 2000
  • In this paper, we have proposed an efficient test generation method for asynchronous circuits. The test generation is based on specification level, especially on Signal Transition Graph(STG)〔1〕 which is a kind of specification method for asynchronous circuits. To conduct a high-level test generation, we have defined a high-level fault model, called single State Transition Fault(STF) model on STG and proposed a test generation algorithm for STF model. The effectiveness of the proposed fault model and its test generation algorithm is shown by experimental results on a set of benchmarks given in the form of STG. Experimental results show that the generated test for the proposed fault model achieves high fault coverage over single input stuck-at fault model with low cost. We have also proposed extended STF model with additional gate-level information to achieve higher fault coverage in cost of longer execution time.

  • PDF

A Study on a Moving Adaptive Grid Generation Method Using a Level-set Scheme (레벨셋법을 이용한 이동 집중격자 생성법에 대한 연구)

  • Il-Ryong Park;Ho-Hwan Chun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.39 no.3
    • /
    • pp.18-27
    • /
    • 2002
  • In order to improve the accuracy of the solution near the boundary in an analysis of viscous flow around an arbitrary boundary which move and be deformed using an Eulerian concept, a level-set based grid deformation method is introduced to concentrate grid points near the boundary. This paper presents a new monitor function which can easily control the level of the concentration of grid points along the boundary. Computations for steady flow around a semi-circular cylinder mounted on the bottom of the flow domain were carried out to check the improvement of the solution using the adaptive grid system with an immersed boundary method. The present numerical results show a good agreement with the solutions obtained by a body fitted grid system and more accurate solutions than those computed with non-adaptive grid system. For the validation of mechanical usefulness of the present method, an expanded analysis of flow around multi-body fixed in the flow domain was carried out. Finally, the present moving adaptive grid method was applied to a two-dimensional bubble rise problem. The computed results show well adapted grid points around the boundary of the bubble at every time and a good agreement with the result calculated by fixed grid system.

EFFECTS OF THE FREE SURFACE ON THE FLOW PATTERN PAST A SQUARE CYLINDER (정방형 실린더 주위 유동패턴에 대한 자유수면의 영향)

  • Ahn, Hyungsu;Yang, Kyung-Soo
    • Journal of computational fluids engineering
    • /
    • v.22 no.1
    • /
    • pp.81-87
    • /
    • 2017
  • The characteristics of flow past a square cylinder submerged under the free surface have been numerically studied. An immersed boundary method was adopted for implementation of the cylinder cross-section in a Cartesian grid system. Also, a level-set method was used to capture the interface of the two fluids. The case for Reynolds number 150 was examined. At the specific Reynolds number, by varying the gap ratio(0.25, 0.40, 0.55, 0.70, 1.00, 1.50, 2.50, 5.00) the effects of the free surface on the force coefficients and Strouhal number of vortex shedding were identified. The presence of the free surface very close to the cylinder significantly affects the shedding pattern, resulting in considerable deviation of the force coefficients and Strouhal number from those of the single-phase flow. In addition, the influence of Froude number was considered in this study. By increasing Froude number(0.2-0.4), flow topology change was identified at the specific gap ratios(0.40, 0.70, 1.50, 5.00).

Numerical Simulation of Transport Phenomena for Laser Full Penetration Welding

  • Zhao, Hongbo;Qi, Huan
    • Journal of Welding and Joining
    • /
    • v.35 no.2
    • /
    • pp.13-22
    • /
    • 2017
  • In laser full penetration welding process, full penetration hole(FPH) is formed as a result of force balance between the vapor pressure and the surface tension of the surrounding molten metal. In this work, a three-dimensional numerical model based on a conserved-mass level-set method is developed to simulate the transport phenomena during laser full penetration welding process, including full penetration keyhole dynamics. Ray trancing model is applied to simulate multi-reflection phenomena in the keyhole wall. The ghost fluid method and continuum method are used to deal with liquid/vapor interface and solid/liquid interface. The effects of processing parameters including laser power and scanning speed on the resultant full penetration hole diameter, laser energy distribution and energy absorption efficiency are studied. The model is validated against experimental results. The diameter of full penetration hole calculated by the simulation model agrees well with the coaxial images captured during laser welding of thin stainless steel plates. Numerical simulation results show that increase of laser power and decrease of welding speed can enlarge the full penetration hole, which decreases laser energy efficiency.

Modeling for Evolution of a 3-dimensional Structure on Semiconductor Substrate (반도체 기판 위의 3차원 구조에 대한 형상 진화 모델링 연구)

  • Jung, Hyun-Su;Won, Tae-Young
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.12
    • /
    • pp.24-28
    • /
    • 2000
  • This paper reports a new calculation method of three dimensional deposeition rate by level set method. To model an advancement of the surface efficiently, we have developed a new iteration method to re-initialize the level set function. For calculating etching and deposition rate by direct flow, we have developed a visibility test module and a refraction and re-sputtering model. Sputter deposition rate with shadow effect and surface refraction is calculated. We report that difference of profiles in cases that sticking coefficient are 1.0 and 0.3. We report that the difference of the deposition rate on bottom of the hole is caused by a difference of visible angle by the shadowing effect.

  • PDF

Image Encryption using Cellular Automata Sequence with Two Maximum Cycle (두 개의 최대 주기를 갖는 셀룰라 오토마타 수열을 이용한 영상 암호화)

  • Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1201-1208
    • /
    • 2010
  • In this paper, we propose an image encryption method using two linear MLCA(Maximum Length Cellular Automata). The encryption method first sets arbitrary 8 bit initial values. Next, we create high quality PN(pseudo noise) sequences by converting rows and columns with the set initial values. hen we generate a basis image using the set PN sequences. Lastly, the final image with high encryption level is produced by XOR operation of the basis image and the original image. In order to verify that the proposed method has the high encryption level, we performed histogram and stability analysis.

A novel method for the vibration optimisation of structures subjected to dynamic loading

  • Munk, David J.;Vio, Gareth A.;Steven, Grant P.
    • Advances in aircraft and spacecraft science
    • /
    • v.4 no.2
    • /
    • pp.169-184
    • /
    • 2017
  • The optimum design of structures with frequency constraints is of great importance in the aeronautical industry. In order to avoid severe vibration, it is necessary to shift the fundamental frequency of the structure away from the frequency range of the dynamic loading. This paper develops a novel topology optimisation method for optimising the fundamental frequencies of structures. The finite element dynamic eigenvalue problem is solved to derive the sensitivity function used for the optimisation criteria. An alternative material interpolation scheme is developed and applied to the optimisation problem. A novel level-set criteria and updating routine for the weighting factors is presented to determine the optimal topology. The optimisation algorithm is applied to a simple two-dimensional plane stress plate to verify the method. Optimisation for maximising a chosen frequency and maximising the gap between two frequencies are presented. This has the application of stiffness maximisation and flutter suppression. The results of the optimisation algorithm are compared with the state of the art in frequency topology optimisation. Test cases have shown that the algorithm produces similar topologies to the state of the art, verifying that the novel technique is suitable for frequency optimisation.

Image Encryption Using Two Linear MLCA (두 개의 선형 MLCA을 이용한 영상 암호화)

  • Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.953-955
    • /
    • 2009
  • In this paper, we propose an image encryption method using two linear MLCA(Maximum Length Cellular Automata). The encryption method first sets arbitrary 8 bit initial values. Next, we create high quality PN(pseudo noise) sequences by converting rows and columns with the set initial values. Then we generate a basis image using the set PN sequences. Lastly, the final image with high encryption level is produced by XOR operating the basis image and the original image. In order to verify that the proposed method has the high encryption level, we performed histogram and stability analysis.

  • PDF