• Title/Summary/Keyword: MD 시뮬레이션

Search Result 118, Processing Time 0.025 seconds

Mode II and Mixed Mode Fracture of Single Layer Graphene Sheet (단층 그래핀시트의 모드 II 및 혼합모드 파괴)

  • Nguyen, Minh-Ky;Yum, Young-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.2
    • /
    • pp.105-113
    • /
    • 2014
  • The mode II fracture behavior of a single-layer graphene sheet (SLGS) containing a center crack was characterized with the results of an atomistic simulation and an analytical model. The fracture of zigzag graphene models was analyzed with molecular dynamics and the mode II fracture toughness was found to be $2.04MPa{\sqrt{m}}$. The in-plane shear fracture of a cellular material was analyzed theoretically for deriving the $K_{IIc}$ of SLGS, and FEM results were obtained. Mixed-mode fracture of SLGS was studied for various mode I and mode II ratios. The mixed-mode fracture criterion was determined, and the obtained fracture envelope was in good agreement with that of another study.

A Study on the Validity of the Prediction of Binaural Parameters by 5 Channel Microphone System (5채널 마이크로폰 시스템을 활용한 공간감 지표 예측의 타당성에 관한 연구)

  • Jang Jae-Hee;Oh Yang-Ki;Jeong Dae-Up;Jeong Hyok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.2
    • /
    • pp.103-110
    • /
    • 2005
  • Providing adequate amount of spatial impression for spaciousness) has been known to be one of the most important design considerations for the good acoustics of rooms for music. and the measurement, of room acoustics using parameters. such as LEF and IACC, forms an essential part of such evaluation. However. it is unavoidable to use different transducers (figure of eight microphones. head and torso) for the measurement of each parameter and it tends to make the measurement procedure complicated. The Present work tried to provide a simpler way to measure these binaural room acoustic parameters including monaural ones with a single measurement system using both spatial information collected through a 5-channel microphone and a trained neural network. A computer simulation program, CATT-Acoustic V7.2. which allowed us to obtain exactly the same spatial information as a 5-channel microphone was used. since it requires quite a large amount of data for practical training of a neural network. Since each reflection has different energy. delay and direction, energy should be integrated properly. the concept of ray tracing method was applied inversely in this work. Also applying weightings according to the delay times was considered in this work. Finally, predicted results were compared with the measured data md their correlations were analyzed and discussed.

Provisioning Anonymous Communication in Ad Hoc Networks (Ad Hoc 네트워크상에서 익명성을 보장하는 방법에 관한 연구)

  • Kang, Seung-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.77-85
    • /
    • 2006
  • The cost of downloading content from the Internet may be costly for mobile device users using its 3G connection, because the 3G connection cost to download data from the Internet is a function of the amount of data downloaded. This paper introduces an approach in which mobile devices, called peers, form an ad hoc network and share their downloaded content with others. As an example, spectators may want to collect/share information about players and game records in a stadium. In an art gallery, visitors may want to retrieve some background information about the displayed work from the nearby ad hoc network. In an outdoor class, a teacher may download today's topic files from the Internet, and all students may share the content with minimal or no cost paid. This is possible if mobile device has both a 3G interface and a wireless LAN interface. If the peers want to improve privacy md discourage traffic analysis when sharing content, this paper describes a low-delay anonymous connection between the sending peer and the receiving peer using two additional peers. Simulation results show that the transmission time overhead of the anonymous connection may increase 50% or less as the number of peers increase or the peers are scattered over the larger area.

  • PDF

A Simulation Study on the Analysis of Optimal Gas Storage System of the Depleted Gas Reservoir (고갈가스전에의 적정 가스저장시스템 분석을 위한 시뮬레이션 연구)

  • Lee, Youngsoo;Choi, Haewon;Lee, Jeonghwan;Han, Jeongmin;Ryou, Sangsoo;Roh, Jeongyong;Sung, Wonmo
    • Korean Chemical Engineering Research
    • /
    • v.45 no.5
    • /
    • pp.515-522
    • /
    • 2007
  • In this study we have attempted to evaluate the technical feasibility of "BB-HY", which is depleted gas reservoir as a gas storage field, using the commercial compositional simulator "ECLIPSE 300". The "BB-HY" reservoir has an initial gas in place of 143 BCF which is relatively small, and its porosity and permeability are 19.5% and 50 md, respectively. For "BB-HY" gas reservoir, we have performed a feasibility analysis by investigating the cushion gas (or working gas), converting time to gas storage field, operation cycle, number of wells and the possible application of horizontal borehole as well. From the simulation results, it was found that the amount of cushion gas in "BB-HY" reservoir is required at least 50% of IGIP in order to operate stably as gas storage field. When one produces gas for longer time and hence the remaining gas in reservoir is less than optimal cushion gas, no technical problem was occurred as long as additional cushion gas is injected up to the optimal cushion gas. In the case of changing the operation cycle into producing gas for three months during winter season from producing five months, the result shows that either the cushion gas should be greater than 60% or the more number of wells should be drilled. Meanwhile, from the results of sensitivity analysis for the number of wells, in cases of operating six or eight vertical wells, the stable reproduction of the injected gas can not be possible in "BB-HY" gas reservoir since the remaining gas in reservoir is increased. Therefore, in "BB-HY" reservoir, at least ten vertical wells should be drilled for the stable operation of gas. This time, when three horizontal wells are additionally drilled including the existing two vertical wells, it was found that the operation of injection and reproduction of gas is relatively stable in "BB-HY" gas reservoir.

Dynamic-size Multi-hop Clustering Mechanism based on the Distance in Sensor Networks (센서 네트워크에서의 거리에 따른 동적 크기 다중홉 클러스터링 방법)

  • Ahn, Sang-Hyun;Lim, Yu-Jin
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.519-524
    • /
    • 2007
  • One of the most important issues on the sensor network with resource limited sensor nodes is prolonging the network lifetime by effectively utilizing the limited node energy. The most representative mechanism to achieve a long lived sensor network is the clustering mechanism which can be further classified into the single hop mode and the multi hop mode. The single hop mode requires that all sensor nodes in a cluster communicate directly with the cluster head(CH) via single hop md, in the multi hop mode, sensor nodes communicate with the CH with the help of other Intermediate nodes. One of the most critical factors that impact on the performance of the existing multi hop clustering mechanism is the cluster size and, without the assumption on the uniform node distribution, finding out the best cluster size is intractable. Since sensor nodes in a real sensor network are distributed non uniformly, the fixed size mechanism may not work best for real sensor networks. Therefore, in this paper, we propose a new dynamic size multi hop clustering mechanism in which the cluster size is determined according to the distance from the sink to relieve the traffic passing through the CHs near the sink. We show that our proposed scheme outperforms the existing fixed size clustering mechanisms by carrying out numerical analysis and simulations.

Performance Evaluation of the MAC Protocols for WDM Metro Ring with Wavelength-Shared Nodes Connecting Broadband Access Networks (대역 액세스 망을 연결하는 파장 공유 노드 기반 WDM 메트로 링의 MAC 프로토콜 성능 평가)

  • So Won-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.111-120
    • /
    • 2006
  • In this paper, a node architecture of WDM metro network for connecting broadband access networks to converge wire/wireless networks. In consideration of the proposed node architecture and network requirements we proposed and evaluated medium access control protocols. We review WDM related technologies of sub-carrier multiplexing and optical components in order to resolve the bottleneck between optical backbone networks md access networks, and a access node architecture sharing common wavelength is introduced. Source-stripping (SS) MAC protocol Is evaluated under the proposed functional node architecture. DS+IS (Destination-Stripping and Source-Stripping) and DS+IS (Destination-Stripping and Intermediate-Stripping) MAC protocols are described to increase the slot-reuse factor which is low on SS MAC protocol. The key function of new MAC protocols regards the optical switch module of proposed node architecture and helps intermediate or source access nodes for dropping slots to destinations of different wavelength group. Thus, slot-reuse factor increases as the MAC protocols reduce the unnecessary ring-rotation of transferred slots. We use a numerical analysis to expect bandwidth efficiency and maximum throughput by slot-reuse factor Throughput network simulation, the verification of throughput, queuing delay, and transmission fairness are compared among MAC protocols.

Design of Modified CGA for Address Autoconfiguration and Digital Signature in Hierarchical Ad Hoc Network (개선된 CGA(Modified CGA)를 이용한 계층적 애드 혹 네트워크에서의 주소 자동 설정 및 전자 서명 제공 방안)

  • Lee, Hye-Won;Kim, Guk-Boh;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.175-182
    • /
    • 2006
  • The CGA proposed by IETF working group prevents address spoofing and stealing and provides digital signature to users, but key collision problem arises. To solve this critical problem, the CGA defines the SEC field within address format, which is set to high value when high security is required and vice versa, but the CGA faces a dilemma between security and the processing time. As SEC value increases, the processing time to generate the CGA grows dramatically while key collision ratio increases if low SEC value is applied to the CGA. We propose modified CGA (MCGA) that has shorter processing time than the CGA and offers digital signature with small overheads. To solve key collision problem, we employ hierarchical ad hoc network. The MCGA is applicable to IPv6 networks as well public networks. In this paper, we design a mathematical model to analyze the processing time for MCGA and CGA first and evaluate the processing time via simulations, where the processing time for MCGA is reduced down 3.3 times when SEC value is set to 0 and 68,000 times when SEC value is set to 1. Further, we have proved that the CGA is inappropriate for both ad hoc networks and IPv6 networks when the SEC field is set to more than 3.

A Performance Comparison of CCA and RMMA Algorithm for Blind Adaptive Equalization (블라인드 적응 등화를 위한 CCA와 RMMA 알고리즘의 성능 비교)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.51-56
    • /
    • 2019
  • This paper related with the performance comparison of CCA and RMMA blind adaptive equalization in order to reduce the intersymbol interference which is occurred in channel when transmitting the 16-QAM signal, high spectrum efficiencies of nonconstant modulus characteristic. The CCA possible to improve the misadustment and initial convergence by compacting the every signal constellation of 16 by using the sliced symbol of the decision device output, namely statistical symbol, but incresing the computational cost. The RMMA possible to minimize the fast convergence speed and misadjustment and channel tracking capability without increasing the computational cost by obtain the error signal after transform to 4 constant modulus signal based on the region of signal constellation located. In this paper, these algorithm were implemented in the same channel, and the blind adaptive equalization performance were compared using the equalizer output signal constellation, residual isi, MSE, SER. As a result of simulation, the RMMA has better performance in output signal constellation, residual isi and MSE compared to the CCA, but has slow convergence speed about 1.3 times. And the SER performance presenting the robustness to the noise signal, the CCA has more beeter in less SNR, but the RMMA has better in greater than 6dB in SNR.