• Title/Summary/Keyword: Topology configuration

Search Result 181, Processing Time 0.03 seconds

Functionally Graded Structure Design for Heat Conduction Problems using Machine Learning (머신 러닝을 사용한 열전도 문제에 대한 기능적 등급구조 설계)

  • Moon, Yunho;Kim, Cheolwoong;Park, Soonok;Yoo, Jeonghoon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.3
    • /
    • pp.159-165
    • /
    • 2021
  • This study introduces a topology optimization method for the simultaneous design of macro-scale structural configuration and unit structure variation to ensure effective heat conduction. Shape changes in the unit structure depending on its location within the macro-scale structure result in micro- as well as macro-scale design and enable better performance than using isotropic unit structures. They result in functionally graded composite structures combining both configurations. The representative volume element (RVE) method is applied to obtain various thermal conductivity properties of the multi-material based unit structure according to its shape change. Based on the RVE analysis results, the material properties of the unit structure having a certain shape can be derived using machine learning. Macro-scale topology optimization is performed using the traditional solid isotropic material with penalization method, while the unit structures composing the macro-structure can have various shapes to improve the heat conduction performance according to the simultaneous optimization process. Numerical examples of the thermal compliance minimization issue are provided to verify the effectiveness of the proposed method.

A Social Motivation-aware Mobility Model for Mobile Opportunistic Networks

  • Liu, Sen;Wang, Xiaoming;Zhang, Lichen;Li, Peng;Lin, Yaguang;Yang, Yunhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3568-3584
    • /
    • 2016
  • In mobile opportunistic networks (MONs), human-carried mobile devices such as PDAs and smartphones, with the capability of short range wireless communications, could form various intermittent contacts due to the mobility of humans, and then could use the contact opportunity to communicate with each other. The dynamic changes of the network topology are closely related to the human mobility patterns. In this paper, we propose a social motivation-aware mobility model for MONs, which explains the basic laws of human mobility from the psychological point of view. We analyze and model social motivations of human mobility mainly in terms of expectancy value theory and affiliation motivation. Furthermore, we introduce a new concept of geographic functional cells, which not only incorporates the influence of geographical constraints on human mobility but also simplifies the complicated configuration of simulation areas. Lastly, we validate our model by simulating three real scenarios and comparing it with reality traces and other synthetic traces. The simulation results show that our model has a better match in the performance evaluation when applying social-based forwarding protocols like BUBBULE.

Identification on the Three-Dimensional Vortical Structures of Impeller Flow by a Multi-Plane Stereoscopic PIV Method (스테레오 PIV 기법에 의한 임펠러 와류유동의 3차원 구조측정)

  • Yoon, Sang-Youl;Kim, Kyung-Chun
    • Proceedings of the KSME Conference
    • /
    • 2001.06e
    • /
    • pp.690-695
    • /
    • 2001
  • The three-dimensional spatial structures of impeller flow created by a six bladed Rushton turbine have identified based on the volumetric velocity information from multi-plane stereoscopic PIV measurements. A total of 10 planes with 2 mm space with a 50 mm by 64 mm size of the field of view were targeted. To reduce the depth of focus, we adopted an angle offset configuration which satisfied the Scheimpflug condition. The distortion compensation procedure was utilized during the in situ calibration. Phase-locked instantaneous data were ensemble averaged and interpolated in order to obtain mean 3-D, volumetric velocity fields on a 60 degree sector of a cylindrical ring volume enclosing the turbine blade. Using the equi-vorticity surface rendering, the spatial structure of the trailing vortices was clearly demonstrated. Detail flow characteristics of the radial jet reported in previous studies of mixer flows were easily identified.

  • PDF

A Study on MD5 Security Routing based on MANET (MANET 기반 MD5 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.797-803
    • /
    • 2012
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

A Routing Security Authentication using S-EKE in MANET Environments (MANET 환경에서 S-EKE를 이용한 라우팅 보안 인증)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.433-438
    • /
    • 2014
  • The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on MANET and the application of MANET has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes S-EKE authentication mechanism for a robust authentication based on MANET and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.

The Topology of Novel Soft Switching Boost Rectifier (새로운 소프트 스위칭 승압형 정류기의 토폴로지)

  • Heo, Young-Hwan;Mun, Sang-Pil;Kim, Young-Mun;Park, Han-Seok
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.64 no.4
    • /
    • pp.308-314
    • /
    • 2015
  • This paper has proposed a new boost rectifier. Adequate input current was obtained by keeping the duty ratio constant without complicated conventional control methods and the improvement of the waveform was increased. With a decrease of distortion up to 12.9[%], the scope of restriction on harmonics was set to 13.0[%]($3^{td}$ harmonics), 1.1[%]($5^{td}$ harmonics) and 0.6[%]($7^{td}$ harmonics), respectively. Because complicated methods of control are avoided, the circuit configuration is simple and practical. In particular, the said effect turned out to be highly efficient in the low boosting ratio range(boosting ratio$({\alpha})=1.25$). The feasibility of these facts has been proven both theoretically and experimentally.

An Attack Graph Model for Dynamic Network Environment (동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구)

  • Moon, Joo Yeon;Kim, Taekyu;Kim, Insung;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.485-500
    • /
    • 2018
  • As the size of the system and network environment grows and the network structure and the system configuration change frequently, network administrators have difficulty managing the status manually and identifying real-time changes. In this paper, we suggest a system that scans dynamic network information in real time, scores vulnerability of network devices, generates all potential attack paths, and visualizes them using attack graph. We implemented the proposed algorithm based attack graph; and we demonstrated that it can be applicable in MTD concept based defense system by simulating on dynamic virtual network environment with SDN.

Enhanced Controller Topology for Photovoltaic Sourced Grid Connected Inverters under Unbalanced Nonlinear Loading

  • Sivakumar, P.;Arutchelvi, Meenakshi Sundaram
    • Journal of Power Electronics
    • /
    • v.14 no.2
    • /
    • pp.369-382
    • /
    • 2014
  • A growing dynamic electrical demand has created an increasing interest in utilizing nonconventional energy sources like Photovoltaic (PV), wind power, etc. In this context, this paper focuses on the design and development of a composite power controller (CPC) in the decoupled double synchronous reference frame (DDSRF) combining the advantages of direct power control (DPC) and voltage oriented control (VOC) for a PV sourced grid connected inverter. In addition, a controller with the inherent active filter configuration is tested with nonlinear and unbalanced loads at the point of common coupling in both grid connected and autonomous modes of operation. Furthermore, the loss and reactive power compensation due to a non-fundamental component is also incorporated in the design, and the developed DDSRF model subsequently allows independent active and reactive power control. The proposed developed model of the controller is also implemented using MATLAB-Simulink-ISE and a Xilinx system generator which evaluate both the simulated and experimental setups. The simulation and experimental results confirm the validity of the developed model. Further, simulation results for the DPC are also presented and compared with the proposed CPC to further bring out the salient features of the proposed work.

Leaderless Formation Control Strategy and Stability Analysis for Multiple UAVs (리더가 없는 방식의 다수 무인기 편대비행 제어와 안정성 해석)

  • Seo, Joong-Bo;Ahn, Chae-Ick;Kim, You-Dan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.36 no.10
    • /
    • pp.988-995
    • /
    • 2008
  • A consensus-based feedback linearization method is proposed to maintain a specified time-varying geometric configuration for formation flying of multiple autonomous vehicles. In this approach, there exists no explicit leader in the team, and the proposed control strategy requires only the local neighbor-to-neighbor information between vehicles. The information flow topology between the vehicles is defined by Graph Laplacian matrix, and the formation flying can be achieved by the proposed feedback linearization with consensus algorithm. The stability analysis of the proposed controller is also performed via eigenvalue analysis for the closed-looop system. Numerical simulation is performed for rotary-wing type micro aerial vehicles to validate the performance of the proposed controller.

A Study on Share Group Configuration Technique for Improving Data Transmission Performance (데이터 전달 성능 향상을 위한 공유 그룹 구성 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.89-96
    • /
    • 2015
  • The various services applied internet have been provided by the rapid development of wireless networks and providing multimedia contents are also increasing. It is caused a number of problems such as increasing of network traffic rapidly. P2P technique is gaining popularity for solving these problems. In particular, P2P technique in a wireless network environment has gained much popularity. Among them, MANET-based P2P techniques has been studied actively. It is not easy to be applied the existing technique as it is due to the dynamic topology and low bandwidth by moving nodes in MANET that is consisted of only mobile nodes. In this paper, we proposed sharing group construction technique for providing a stable connection between mobile nodes and reducing the load of network traffic and overhead of sharing group reconfiguration in order to improve data transmission performance between mobile nodes. The sharing group member nodes applied virtual sharing group generation technique with neighboring nodes of 1-hop distance in order to reduce traffic for file sharing. We performed comparative experiments with DHT technique to evaluate the performance of the proposed technique in this paper and the excellent performance is confirmed through experiments.