• Title/Summary/Keyword: Truncate

Search Result 44, Processing Time 0.023 seconds

Vibration Analysis for the Euler-Bernoulli Wedge Beam by Using Differential Transformation Method (미분변환법에 의한 Euler-Bernoulli 쐐기 보의 진동 해석)

  • Yun, Jong-Hak;Shin, Young-Jae
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.15 no.11 s.104
    • /
    • pp.1318-1323
    • /
    • 2005
  • In this paper, the vibration analysis for the Euler-Bernoulli complete and truncate wedge beams by differential Transformation method(DTM) was investigated. The governing differential equation of the Euler-Bernoulli complete and truncate wedge beams with regular singularity is derived and verified. The concepts of DTM were briefly introduced. Numerical calculations are carried out and compared with previous published results. The usefulness and the application of DTM are discussed.

Vibration Analysis for the Euler-Bernoulli Wedge Beam by using Differential Transformation Method (미분변환법에 의한 Euler-Bernoulli 쐐기 보의 진동 해석)

  • Shin, Young-Jae;Yun, Jong-Hak;Ferdinand, T.;Willmo, I.C.
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2005.11a
    • /
    • pp.507-512
    • /
    • 2005
  • This paper investigated the vibration analysis fer the Euler-Bernoulli complete and truncate wedge beams by Differential Transformation Method(DTM). The governing differential equation of the Euler-Bernoulli complete and truncate wedge beams with regular singularity is derived and verified. The concepts of DTM were briefly introduced. Numerical calculations are carried out and compared with previous published results. The usefulness and the application of DTM are discussed.

  • PDF

Truncate products of lattices

  • Bae, Deok-Rak;Lee, Jeh-Gwon
    • Journal of the Korean Mathematical Society
    • /
    • v.31 no.4
    • /
    • pp.559-568
    • /
    • 1994
  • A lattice is called bounded if it has both the least element and the largest element which are usually denoted by 0 (zero) and 1(unit), respectively.

  • PDF

Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server (Microsoft SQL Server 삭제 이벤트의 데이터 잔존 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.223-232
    • /
    • 2017
  • Previous research on data recovery in Microsoft SQL Server has focused on restoring data based on in the transaction log that might have deleted records exist. However, there was a limit that was not applicable if the related transaction log did not exist or the physical database file was not connected to Server. Since the suspect in the crime scene may delete the data records using a different deletion statements besides "delete", we need to check the remaining data and a recovery possibility of the deleted record. In this paper, we examined the changes "Page Allocation information" of the table, "Unallocation deleted data", "Row Offset Array" in the page according to "delete", "truncate" and "drop" events. Finally it confirmed the possibility of data recovery and availability of management tools in Microsoft SQL Server digital forensic investigation.

Wiener filtering-based ambient noise reduction technique for improved acoustic target detection of directional frequency analysis and recording sonobuoy (Directional frequency analysis and recording 소노부이의 표적 탐지 성능 향상을 위한 위너필터링 기반 주변 소음 제거 기법)

  • Hong, Jungpyo;Bae, Inyeong;Seok, Jongwon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.2
    • /
    • pp.192-198
    • /
    • 2022
  • As an effective weapon system for anti-submarine warfare, DIrectional Frequency Analysis and Recording (DIFAR) sonobuoy detects underwater targets via beamforming with three channels composed of an omni-direcitonal and two directional channels. However, ambient noise degrades the detection performance of DIFAR sonobouy in specific direction (0°, 90°, 180°, 270°). Thus, an ambient noise redcution technique is proposed for performance improvement of acoustic target detection of DIFAR sonobuoy. The proposed method is based on OTA (Order Truncate Average), which is widely used in sonar signal processing area, for ambient noise estimation and Wiener filtering, which is widely used in speech signal processing area, for noise reduction. For evaluation, we compare mean square errors of target bearing estmation results of conventional and proposed methods and we confirmed that the proposed method is effective under 0 dB signal-to-noise ratio.

Regularity of solutions to Helmholtz-type problems with absorbing boundary conditions in nonsmooth domains

  • Kim, Jinsoo;Dongwoo Sheen
    • Bulletin of the Korean Mathematical Society
    • /
    • v.34 no.1
    • /
    • pp.135-146
    • /
    • 1997
  • For the numerical simulation of wave phenomena either in unbounded domains that it is not feasible to compute solutions on the entire region, it is needed to truncate the original domains to manageable bounded domains whose geometries are simple but usually nonsmooth. On the artificial boundaries thus created, absorbing boundary conditions are taken so that the significant part of waves arriving at the artificial boundaries can be transmitted [5,10,11,16,17,26]$.

  • PDF

Optimal Method for Binary Neural Network using AETLA (AETLA를 이용한 이진 신경회로망의 최적 합성방법)

  • 성상규;정종원;이준탁
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.05a
    • /
    • pp.105-108
    • /
    • 2001
  • In this paper, the learning algorithm called advanced expanded and truncate algorithm(AETLA) is proposed to training multilayer binary neural network to approximate binary to binary mapping. AETLA used merit of ETL and MTGA learning algorithm. We proposed to new learning algorithm to decrease number of hidden layer. Therefore, learning speed of the proposed AETLA learning algorithm is much faster than other learning algorithm.

  • PDF

A System Unauthorized Access using MAC Address and OTP (MAC Address와 OTP를 이용한 비인가 접근 거부 시스템)

  • Shin, Seung-Soo;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.127-135
    • /
    • 2012
  • This study improves the existing user identification method using user ID and password. The new protocol protecting unauthorized access is designed and developed using user's ID, password, and OTP for user certification as well as MAC address for computer identification on networks. The safety on trials of unauthorized certification is tested and analyzed for four types following the criterion of information acquisition.

A Study on Mobile OTP Generation Model (모바일 OTP 생성 모델에 관한 연구)

  • Jeong, Yoon-Su;Han, Sang-Ho;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.183-191
    • /
    • 2012
  • This study proposes dual certification model using both what users know and what users own. In detail, this mobile OTP generation model is made up of mobile OTP generation and extraction algorithm satisfying the conditions for reviewing mobile OTP implementation. In order to improve the security of the existing OTP-based systems, the suggested method utilizes user's ID and random number at the mobile OTP generation stage.

A Study on the Gas Wave Propagation in the Pipe by Numerical analysis (수치해석에 의한 파이프에서의 가스파동전하에 관한 연구)

  • 김명균
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1998.03a
    • /
    • pp.154-160
    • /
    • 1998
  • This study describes a theoretical and experimental investigation of gas wave propagation in the pipe system. Most calculations of compressible flows in the pipe have been based on the method of characteristics. This technique has propensity to truncate waves and is difficult to apply to non-perfect gas. A method that describes the application of a two-step Lax-Wendroff acheme to solution of the unsteady one-dimentional flow in the pipe was developed. Theoretical calculations using both the method of characteristics and the two-step Lax-Wendroff method are presented including a realistic model for heat transfer and friction processes. In the present work, account is taken of the nonlinear behavior. For sections of parallel pipe, an one dimensional unsteady homentropic analysis is employed, and a numerical solution is obtained with the aid of a digital computer, using the method of characteristics and two-step Lax-Wendroff method. This analysis is then combined with boundary models, based on a quasi-steady flow approach, to give a complete treatment of the flow behavior in the pipe system.

  • PDF