• 제목/요약/키워드: Phase identification

검색결과 685건 처리시간 0.022초

비최소 위상을 갖는 외팔보에서 SVD를 이용한 역변환 문제에 관한 연구 (A Study on the Application of SVD to an Inverse Problem in a Cantilever Beam with a Non-minimum Phase)

  • 이상권;노경래;박진호
    • 한국소음진동공학회논문집
    • /
    • 제11권9호
    • /
    • pp.431-438
    • /
    • 2001
  • This paper present experimental results of source identification for non-minimum phase system. Generally, a causal linear system may be described by matrix form. The inverse problem is considered as a matrix inversion. Direct inverse method can\`t be applied for a non-minimum phase system, the reason is that the system has ill-conditioning. Therefore, in this study to execute an effective inversion, SVD inverse technique is introduced. In a Non-minimum phase system, its system matrix may be singular or near-singular and has one more very small singular values. These very small singular values have information about a phase of the system and ill-conditioning. Using this property we could solve the ill-conditioned problem of the system and then verified it for the practical system(cantilever beam). The experimental results show that SVD inverse technique works well for non-minimum phase system.

  • PDF

상호 확산 반응 중의 생성상 제어 (Product Phase Control During Interdiffusion Reactions)

  • 박준식;김지훈
    • 한국주조공학회지
    • /
    • 제26권1호
    • /
    • pp.27-33
    • /
    • 2006
  • Phase evolutions involving nucleation stages together with diffusional growth have been examined in order to provide a guideline for determining rate limiting stages during phase evolutions. In multiphase materials systems in coatings, composites or multilayered structures, diffusion treatments often result in the development of metastable/intermediate phases at the reaction interfaces. The development of metastable phases during solid state interdiffusion demonstrates that the nucleation reaction can be one controlling factor. Also, the concentration gradient and the relative magnitudes of the component diffusivities provide a basis for a phase selection and the application of a kinetic bias strategy in the phase selection. For multicomponent alloy systems, the identification of the operative diffusion pathway is central to control phase formation. Experimental access to the nucleation and growth stage is discussed in thin film multi layers and bulk samples.

EXTENSION OF CFD CODES APPLICATION TO TWO-PHASE FLOW SAFETY PROBLEMS

  • Bestion, Dominique
    • Nuclear Engineering and Technology
    • /
    • 제42권4호
    • /
    • pp.365-376
    • /
    • 2010
  • This paper summarizes the results of a Writing Group on the Extension of CFD codes to two-phase flow safety problems, which was created by the Group for Analysis and Management of Accidents of the Nuclear Energy Agency' Committee on the Safety of Nuclear Installations (NEA-CSNI). Two-phase CFD used for safety investigations may predict small scale flow processes, which are not seen by system thermalhydraulic codes. However, the two-phase CFD models are not as mature as those in the single phase CFD and potential users need some guidance for proper application. In this paper, a classification of various modelling approaches is proposed. Then, a general multi-step methodology for using two-phase-CFD is explained, including a preliminary identification of flow processes, a model selection, and a verification and validation process. A list of 26 nuclear reactor safety issues that could benefit from investigations at the CFD scale is identified. Then, a few issues are analyzed in more detail, and a preliminary state-of-the-art is proposed and the remaining gaps in the existing approaches are identified. Finally, guidelines for users are proposed.

무선 센서 망을 이용한 공장 내 장치 관리 시스템 설계 (A Design of Device Management System for Factories using Wireless Sensor Network)

  • 문성남;김영한
    • 한국통신학회논문지
    • /
    • 제37권3C호
    • /
    • pp.233-240
    • /
    • 2012
  • 일반적인 네트워크를 통한 공장 내 관리와 달리 무선 센서 네트워크를 이용한 공장 내 관리를 위해서는 장치의 발견, 확인, 검증의 과정이 자동으로 수행되어야 한다. 이에 대한 방안으로 본 논문에서는 장치 등록 서버를 제안하고 이를 이용한 관리 시스템을 설계한다. 장치의 발견단계에서는 무선 센서 망에서 사용되는 라우팅 기술의 특성을 이용하고 식별 및 검증 단계에서는 장치를 식별할 수 있는 일반적인 정보를 장치 등록 서버에 저장하여 활용한다. 제안하는 관리 시스템은 구현의 복잡성을 낮추고 여러 종류의 장치들이 분산되어 있는 공장 내에서의 장치 관리를 용이하게 해준다.

양산단계 무기체계 신뢰성 향상을 위한 위조 전자부품 식별 및 검증 방안에 대한 연구 (A Study on Counterfeit Electronic Parts Identification and Verification Methods to Improve the Reliability of Weapons Systems in Mass Production Phase)

  • 김병준
    • 한국전자통신학회논문지
    • /
    • 제15권4호
    • /
    • pp.617-624
    • /
    • 2020
  • 급속한 속도로 과학기술이 나날이 발전하고 있는 현 추세와 더불어 방위산업의 주요특성인 개발기간의 장기화, 설계의 복잡성, 긴 수명주기로 인한 높은 부품단종 가능성, 소량생산 등으로 인해 위조 전자부품이 유입되어 무기체계의 신뢰성 저하를 유발시킬 가능성이 가중되고 있다. 본 논문은 개발이 완료되어 양산중인 무기 체계를 대상으로 위조 전자부품 검증을 위한 구체적인 식별기준을 도출하고, 다양한 식별 및 검증방안을 제시한다.

옥내 배선계통에서 직렬 아크의 검출과 판별 (Detection and Identification of the Series Arc in an Indoor Wiring System)

  • 김우현;왕국명;길경석;지홍근
    • 한국전기전자재료학회논문지
    • /
    • 제31권6호
    • /
    • pp.412-416
    • /
    • 2018
  • Most series arcs lead to electrical fires that cannot be interrupted by circuit breakers, because the arc's current is outside the breaker's operating range. In this paper, experiments were conducted on the detection and identification of series arcs to prevent electrical fires. Plugs and outlets specified in KS C 8305 were deteriorated to replicate arc faults commonly found in fields. The characteristics of series arcs resulting from various types of loose connections were determined by analyzing the frequency spectra and phase distributions of detected arc pulses. The results showed that the simulated arc defects used in this study were more similar to actual arc phenomena than the existing arc generator specified in UL 1699. In addition, loose connections, such as wire-wire, terminal-wire, and outlet-plug, can be identified by phases of $0^{\circ}$, $180^{\circ}$ and $360^{\circ}$, respectively. These phases can be detected by a band pass filter with a frequency range of 5~10 MHz, which can be used as the trip signal for circuit breakers.

AUTOMATED HAZARD IDENTIFICATION FRAMEWORK FOR THE PROACTIVE CONSIDERATION OF CONSTRUCTION SAFETY

  • JunHyuk Kwon;Byungil Kim;SangHyun Lee;Hyoungkwan Kim
    • 국제학술발표논문집
    • /
    • The 5th International Conference on Construction Engineering and Project Management
    • /
    • pp.60-65
    • /
    • 2013
  • Introducing the concept of construction safety in the design/engineering phase can improve the efficiency and effectiveness of safety management on construction sites. In this sense, further improvements for safety can be made in the design/engineering phase through the development of (1) an automated hazard identification process that is little dependent on user knowledge, (2) an automated construction schedule generation to accommodate varying hazard information over time, and (3) a visual representation of the results that is easy to understand. In this paper, we formulate an automated hazard identification framework for construction safety by extracting hazard information from related regulations to eliminate human interventions, and by utilizing a visualization technique in order to enhance users' understanding on hazard information. First, the hazard information is automatically extracted from textual safety and health regulations (i.e., Occupational Safety Health Administration (OSHA) Standards) by using natural language processing (NLP) techniques without users' interpretations. Next, scheduling and sequencing of the construction activities are automatically generated with regard to the 3D building model. Then, the extracted hazard information is integrated into the geometry data of construction elements in the industry foundation class (IFC) building model using a conformity-checking algorithm within the open source 3D computer graphics software. Preliminary results demonstrate that this approach is advantageous in that it can be used in the design/engineering phases of construction without the manual interpretation of safety experts, facilitating the designers' and engineers' proactive consideration for improving safety management.

  • PDF

Group Delay를 이용한 GMM기반의 성별 인식 알고리즘 (GMM-Based Gender Identification Employing Group Delay)

  • 이계환;임우형;김남수;장준혁
    • 한국음향학회지
    • /
    • 제26권6호
    • /
    • pp.243-249
    • /
    • 2007
  • 본 논문은 Group Delay(GD)를 이용한 음성신호 기반의 효과적인 성별인식 시스템을 제안한다. 일반적인 음성 인식과 관련된 시스템에서 사용되는 특징들은 위상에 관한 정보를 제거한 크기만의 정보를 이용하여 구성한다. 본 연구에서는 위상에 관한 정보를 토대로 유도되어 지는 GD의 성별에 따른 특징을 알아보고, 보다 향상된 성별인식을 위해 MFCC(Mel-frequency cepstral coefficient), LPC(linear predictive coding) 계수, 반사계수(reflection coefficient) 그리고 포만트(formant)등과 같은 크기 정보와 GD를 이용한 결합 특징 벡터를 적용하였다. 실험을 통해 성별에 따른 GD의 특징을 확인할 수 있었고, 이를 이용한 제안된 특징 벡터를 사용했을 때 우수한 인식 성능을 얻을 수 있었다.

A Method and Tool for Identifying Domain Components Using Object Usage Information

  • Lee, Woo-Jin;Kwon, Oh-Cheon;Kim, Min-Jung;Shin, Gyu-Sang
    • ETRI Journal
    • /
    • 제25권2호
    • /
    • pp.121-132
    • /
    • 2003
  • To enhance the productivity of software development and accelerate time to market, software developers have recently paid more attention to a component-based development (CBD) approach due to the benefits of component reuse. Among CBD processes, the identification of reusable components is a key but difficult process. Currently, component identification depends mainly on the intuition and experience of domain experts. In addition, there are few systematic methods or tools for component identification that enable domain experts to identify reusable components. This paper presents a systematic method and its tool called a component identifier that identifies software components by using object-oriented domain information, namely, use case models, domain object models, and sequence diagrams. To illustrate our method, we use the component identifier to identify candidates of reusable components from the object-oriented domain models of a banking system. The component identifier enables domain experts to easily identify reusable components by assisting and automating identification processes in an earlier development phase.

  • PDF

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model

  • Tan, Syh-Yuan;Chin, Ji-Jian;Heng, Swee-Huay;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.910-922
    • /
    • 2013
  • In 2008, Chin et al. proposed an efficient and provable secure identity-based identification scheme in the standard model. However, we discovered a subtle flaw in the security proof which renders the proof of security useless. While no weakness has been found in the scheme itself, a scheme that is desired would be one with an accompanying proof of security. In this paper, we provide a fix to the scheme to overcome the problem without affecting the efficiency as well as a new proof of security. In particular, we show that only one extra pre-computable pairing operation should be added into the commitment phase of the identification protocol to fix the proof of security under the same hard problems.