• Title/Summary/Keyword: Multi-Propagation

Search Result 680, Processing Time 0.032 seconds

System Target Propagation to Model Order Reduction of a Beam Structure Using Genetic Algorithm (유전자 알고리즘을 이용한 시스템 최적 부분구조화)

  • Jeong, Yong-Min;Kim, Jun-Sik
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.35 no.3
    • /
    • pp.175-182
    • /
    • 2022
  • In many engineering problems, the dynamic substructuring can be useful to analyze complex structures which made with many substructures, such as aircrafts and automotive vehicles. It was originally intended as a method to simplify the engineering problem. The powerful advantage to this is that computational efficiency dramatically increases with eliminating unnecessary degrees-of-freedom of the system and the system targets are concurrently satisfied. Craig-Bampton method has been widely used for the linear system reduction. Recently, multi-level optimization (such as target cascading), which propagates the system-level targets to the subsystem-level targets, has been widely utilized. To this concept, the genetic algorithm which one of the global optimization technique has been utilized to the substructure optimization. The number of internal modes for each substructure can be obtained by the genetic algorithm. Simultaneously, the reduced system meets the top-level targets. In this paper, various numerical examples are tested to verify this concept.

Raw Spectrum Analysis of operated UHF-Wind Profiler Radar in South Korea (국내 운용 UHF-윈드프로파일러 레이더의 원시 스펙트럼 분석)

  • Lee, Kyung-Hun;Kwon, Byung-Hyuk;Kim, Yu-Jin;Lee, Geon-Myeong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.767-774
    • /
    • 2022
  • In this paper raw spectrum data were analyzed to suggest the moving forward of performance evaluation and quality control of wind profilers of four manufacturers operating in South Korea. For the analysis, the profile of the spectrum averaged by season and the profile of four statistical values (minimum, average, median, and maximum) calculated by Power Spectrum Density (PSD) were used. The quality of spectrum data was the best for LAP-3000, followed by YKJ3, PCL-1300, and CLC-11-H. In Cheorwon and Chupungnyeong, where PCL-1300 was installed, the variability of the spectrum due to ground clutter and non-meteorological signals was large, so ground clutter removal and signal processing such as moving average and multi-peak were required. In Gunsan and Paju, where CLC-11-H was installed, DC (Direct Current) bias and propagation folding were found, so it is necessary to remove the DC bias and limit the effective altitude for observation.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

RIS Selection and Energy Efficiency Optimization for Irregular Distributed RIS-assisted Communication Systems

  • Xu Fangmin;Fu Jinzhao;Cao HaiYan;Hu ZhiRui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1823-1840
    • /
    • 2023
  • In order to improve spectral efficiency and reduce power consumption for reconfigurable intelligent surface (RIS) assisted wireless communication systems, a joint design considering irregular RIS topology, RIS on-off switch, power allocation and phase adjustment is investigated in this paper. Firstly, a multi-dimensional variable joint optimization problem is established under multiple constraints, such as the minimum data requirement and power constraints, with the goal of maximizing the system energy efficiency. However, the proposed optimization problem is hard to be resolved due to its property of nonlinear nonconvex integer programming. Then, to tackle this issue, the problem is decomposed into four sub-problems: topology design, phase shift adjustment, power allocation and switch selection. In terms of topology design, Tabu search algorithm is introduced to select the components that play the main role. For RIS switch selection, greedy algorithm is used to turn off the RISs that play the secondary role. Finally, an iterative optimization algorithm with high data-rate and low power consumption is proposed. The simulation results show that the performance of the irregular RIS aided system with topology design and RIS selection is better than that of the fixed topology and the fix number of RISs. In addition, the proposed joint optimization algorithm can effectively improve the data rate and energy efficiency by changing the propagation environment.

Analysis of Multi-Mode Reflection and Transmission Coefficients of a Lamb Wave Across a Rectangular Notch (사각형 노치에 대한 램파의 다중 모드 반사와 투과 계수 해석)

  • Kim, Byung-Soo;Roh, Yong-Rae
    • The Journal of the Acoustical Society of Korea
    • /
    • v.27 no.3
    • /
    • pp.129-139
    • /
    • 2008
  • The purpose of the present work is to derive the reflection and transmission coefficients of $S_0\;and\;A_0$ mode Lamb waves in relation to the geometry of a rectangular notch when the waves propagate across the notch in an elastic plate. Firstly, the excitable modes of the Lamb wave were analyzed with respect to the plate thickness. The scattering phenomena were divided into three independent processes according to the boundary shape of the notch and the direction of the wave propagation. Linear equations for each process were derived with corresponding free or continuous boundary conditions to analyze the scattered waves. By the rule of linear superposition, the waves scattered at each process were summed for each mode. Then the steady-state reflection and transmission coefficients of the scattered waves were determined so that the difference of energy flux between the incident and the scattered waves would remain within 4%.

Development of a Freeway Travel Time Forecasting Model for Long Distance Section with Due Regard to Time-lag (시간처짐현상을 고려한 장거리구간 통행시간 예측 모형 개발)

  • 이의은;김정현
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.4
    • /
    • pp.51-61
    • /
    • 2002
  • In this dissertation, We demonstrated the Travel Time forecasting model in the freeway of multi-section with regard of drives' attitude. Recently, the forecasted travel time that is furnished based on expected travel time data and advanced experiment isn't being able to reflect the time-lag phenomenon specially in case of long distance trip, so drivers don't believe any more forecasted travel time. And that's why the effects of ATIS(Advanced Traveler Information System) are reduced. Therefore, in this dissertation to forecast the travel time of the freeway of multi-section reflecting the time-lag phenomenon & the delay of tollgate, we used traffic volume data & TCS data that are collected by Korea Highway Cooperation. Also keep the data of mixed unusual to applicate real system. The applied model for forecasting is consisted of feed-forward structure which has three input units & two output units and the back-propagation is utilized as studying method. Furthermore, the optimal alternative was chosen through the twelve alternative ideas which is composed of the unit number of hidden-layer & repeating number which affect studying speed & forecasting capability. In order to compare the forecasting capability of developed ANN model. the algorithm which are currently used as an information source for freeway travel time. During the comparison with reference model, MSE, MARE, MAE & T-test were executed, as the result, the model which utilized the artificial neural network performed more superior forecasting capability among the comparison index. Moreover, the calculated through the particularity of data structure which was used in this experiment.

MCBP Neural Netwoek for Effcient Recognition of Tire Claddification Code (타이어 분류 코드의 효율적 인식을 위한 MCBP망)

  • Koo, Gun-Seo;O, Hae-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.465-482
    • /
    • 1997
  • In this paper, we have studied on cinstructing code-recognition shstem by neural network according to a image process taking the DOT classification code stamped on tire surface.It happened to a few problems that characters distorted in edge by diffused reflection and two adjacent characters take the same label,even very sen- sitive to illumination ofr recognition the stamped them on tire.Thus,this paper would propose the algorithm for tire code under being cinscious of these properties and prove the algorithm drrciency with a simulation.Also,we have suggerted the MCBP network composing of multi-linked recognizers of dffcient identify the DOT code being tire classification code.The MCBP network extracts the projection balue for classifying each character's rdgion after taking out the prjection of each chracter's region on X,Y axis,processes each chracters by taking 7$\times$8 normalization.We have improved error rate 3% through the MCBP network and post-process comparing the DOT code Database. This approach has a accomplished that learming time get's improvenent at 60% and recognition rate has become to 95% from 90% than BckPropagation with including post- processing it has attained greate rates of entire of tire recoggnition at 98%.

  • PDF

Digital Modulation Types Recognition using HOS and WT in Multipath Fading Environments (다중경로 페이딩 환경에서 HOS와 WT을 이용한 디지털 변조형태 인식)

  • Park, Cheol-Sun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.102-109
    • /
    • 2008
  • In this paper, the robust hybrid modulation type classifier which use both HOS and WT key features and can recognize 10 digitally modulated signals without a priori information in multipath fading channel conditions is proposed. The proposed classifier developed using data taken field measurements in various propagation model (i,e., rural area, small town and urban area) for real world scenarios. The 9 channel data are used for supervised training and the 6 channel data are used for testing among total 15 channel data(i.e., holdout-like method). The Proposed classifier is based on HOS key features because they are relatively robust to signal distortion in AWGN and multipath environments, and combined WT key features for classifying MQAM(M=16, 64, 256) signals which are difficult to classify without equalization scheme such as AMA(Alphabet Matched Algorithm) or MMA(Multi-modulus Algorithm. To investigate the performance of proposed classifier, these selected key features are applied in SVM(Support Vector Machine) which is known to having good capability of classifying because of mapping input space to hyperspace for margin maximization. The Pcc(Probability of correct classification) of the proposed classifier shows higher than those of classifiers using only HOS or WT key features in both training channels and testing channels. Especially, the Pccs of MQAM 3re almost perfect in various SNR levels.

Parallel Flood Inundation Analysis using MPI Technique (MPI 기법을 이용한 병렬 홍수침수해석)

  • Park, Jae Hong
    • Journal of Korea Water Resources Association
    • /
    • v.47 no.11
    • /
    • pp.1051-1060
    • /
    • 2014
  • This study is attempted to realize an improved computation performance by combining the MPI (Message Passing Interface) Technique, a standard model of the parallel programming in the distributed memory environment, with the DHM(Diffusion Hydrodynamic Model), a inundation analysis model. With parallelizing inundation model, it compared with the existing calculation method about the results of applications to complicate and required long computing time problems. In addition, it attempted to prove the capability to estimate inundation extent, depth and speed-up computing time due to the flooding in protected lowlands and to validate the applicability of the parallel model to the actual flooding analysis by simulating based on various inundation scenarios. To verify the model developed in this study, it was applied to a hypothetical two-dimensional protected land and a real flooding case, and then actually verified the applicability of this model. As a result of this application, this model shows that the improvement effectiveness of calculation time is better up to the maximum of about 41% to 48% in using multi cores than a single core based on the same accuracy. The flood analysis model using the parallel technique in this study can be used for calculating flooding water depth, flooding areas, propagation speed of flooding waves, etc. with a shorter runtime with applying multi cores, and is expected to be actually used for promptly predicting real time flood forecasting and for drawing flood risk maps etc.

A Study on Interconnectioned LAN of Token Ring Network (토큰링 네트워크가 상호 연결된 근거리 통신망에 관한 연구)

  • 이상훈;김경식;강준길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1206-1218
    • /
    • 1992
  • Token ring systems which control to switch the data stream of networks by passing the token have been widely used to medium access controls in many ring or bus topology LANs. The system could be modeled for analysis as single-server-multi-queue system of the cyclic service method. These concepts could be expanded to multi-token ring systems interconnected with single ring consisting of bridges implemented simply to be stored and transmitted. In the proposal for the performance analysis of the interconnected token ring system, in has been assumed M/G/1 queueing model that frame arrivals are the Poisson process at each station queue and frame sizes are independently and identically distributed. And the average time delays were analyzed mathematically for arbitrary frame transferred from source station to destination area. The time delay of the frame transmission could be explained as the sum of the average time which the token passed from arbitrary position to source station, such as the waiting time in the source station transferring the previous arrival frames, and the propagation time from source station to interdestinated point. These delays were given as the sum of the duration from inner and outer bridge queues, the time delays from inner and outer bridge queues, and the time from outer bridge queue to destination station. These results were investigated by varing parameters effected to total time delays. In the results, those factors to be effected to dominant the total time delays were increased were in the cases of the high arrival rates and the high ration of destination of the other outerring. The system were shown the time delays increased exponentially in spite of the priority service policy. In order to decreasing the number of outerrings and increasing the number of nodes in backbone relatively, so the systems could be decreased the total delay in the interconnected token ring system.

  • PDF