• Title/Summary/Keyword: Two-level scheme

Search Result 500, Processing Time 0.022 seconds

Numerical analysis of a tidal flow using quadtree grid (사면구조 격자를 이용한 조석흐름 수치모의)

  • Kim, Jong-Ho;Kim, Hyung-Jun;NamGung, Don;Cho, Yong-Sik
    • 한국방재학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.163-167
    • /
    • 2007
  • For numerical analysis of a tidal flow, a two-dimensional hydrodynamic model is developed by solving the nonlinear shallow-water equations. The governing equations are discretized explicitly with a finite difference leap-frog scheme and a first-order upwind scheme on adaptive hierarchical quadtree grids. The developed model is verified by applying to prediction of tidal behaviors. The calculated tidal levels are compared to available field measurements. A very reasonable agreement is observed.

  • PDF

Neural Hamming MAXNET Design for Binary Pattern Classification (2진 패턴분류를 위한 신경망 해밍 MAXNET설계)

  • 김대순;김환용
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.12
    • /
    • pp.100-107
    • /
    • 1994
  • This article describes the hardware design scheme of Hamming MAXNET algorithm which is appropriate for binary pattern classification with minimum HD measurement between stimulus vector and storage vector. Circuit integration is profitable to Hamming MAXNET because the structure of hamming network have a few connection nodes over the similar neuro-algorithms. Designed hardware is the two-layered structure composed of hamming network and MAXNET which enable the characteristics of low power consumption and fast operation with biline volgate sensing scheme. Proposed Hamming MAXNET hardware was designed as quantize-level converter for simulation, resulting in the expected binary pattern convergence property.

  • PDF

An Efficient Public Key Based Security Architecture for Wireless Sensor Networks

  • Haque, Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1098-1099
    • /
    • 2007
  • In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSNs). The basic architecture comprises of two schemes; a key handshaking scheme based on simple linear operations for fast computation and an identity based cryptosystem which does not require any certificate authority. Our analysis shows that, the combined scheme ensures a good level of security and is very much suitable for the energy constrained trend of wireless sensor network.

Tolerance Design for Multiple Performance Characteristics (다수 성능특성치의 허용차설계)

  • Byun, Jai-Hyun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.20 no.4
    • /
    • pp.99-111
    • /
    • 1994
  • Toguchi method is a systematic technique for designing high quality product at low cost. There are three steps in the Toguchi method, 1)system design, 2)parameter design, and 3)tolerance design. This paper considers the tolerance design for multiple performance characteristics which is practically important. We present two tolerance design procedures : grade selection and tolerance determining procedures. In grade selection procedure a scheme is presented that minimizes the sum of the price of low-level characteristics and the expected loss due to the variations of high-level characteristics. In tolerance determining procedure we determine the tolerances of the low-level characteristics.

  • PDF

Power Allocation for Opportunistic Full-Duplex based Relay Selection in Cooperative Systems

  • Zhong, Bin;Zhang, Dandan;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3908-3920
    • /
    • 2015
  • In this paper, performance analysis of full-duplex (FD) relay selection under decode-and-forward (DF) relaying mode is carried out by taking into account several critical factors, including the distributions of the received signal-to-noise ratio (SNR) and the outage probability of wireless links. The tradeoff between the FD and half-duplex (HD) modes for relay selection techniques is also analyzed, where the former suffers from the impact of residual self-interference, but the latter requires more channel resources than the former (i.e., two orthogonal channels are required). Furthermore, the impact of optimal power allocation (OPA) on the proposed relay-selection scheme is analyzed. Particularly, the exact closed-form expressions for outage probability of the proposed scheme over Rayleigh fading channels are derived, followed by validating the proposed analysis using simulation. Numerical results show that the proposed FD based scheme outperforms the HD based scheme by more than 4 dB in terms of coding gain, provided that the residual self-interference level in the FD mode can be substantially suppressed to the level that is below the noise power.

Three-Level Optimal Control of Nonlinear Systems Using Fast Walsh Transform (고속월쉬변환을 이용한 비선형 시스템의 3계층 최적제어)

  • Kim, Tai-Hoon;Shin, Seung-Kwon;Cho, Young-Ho;Lee, Han-Seok;Lee, Jae-Chun;Ahn, Doo-Soo
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.50 no.11
    • /
    • pp.505-513
    • /
    • 2001
  • This paper presents the new three-level optimal control scheme for the large scale nonlinear systems, which is based on fast walsh transform. It is well known that optimization for nonlinear systems leads to the resolution of a nonlinear two point boundary value problem which always requires a numerical iterative technique for their solution. However, Three-level costate coordination can avoid two point boundary condition in subsystem. But this method also has the defect that must solve high order differential equation in intermediate level. The proposed method makes use of fast walsh transform, therefore, is simple in computation because of solving algebra equation instead of differential equation.

  • PDF

Water Level Control of Nuclear Plant Steam Generator (원자력 발전소의 증기발생기 수위조절)

  • 이윤준
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.16 no.4
    • /
    • pp.753-764
    • /
    • 1992
  • The steam generator water level is difficult to control at low power due to its reversed responses to the feedwater flow, which are well known as the shrink and swell phenomena. With regard to this problem a new control scheme has been studied by which the level transients could be kept within permissible ranges at low power. The relations between the various input conditions to steam generator and the level transients have been examined to be expressed in the form of process transfer functions. Analog filters have been incorporated to be expressed in the process with proper control constants. This control scheme allows the prediction of level variation together with the corresponding feedwater rate and results in mider transients with good stabilites.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

Design of Fault Tolerant Control System for Steam Generator Using Fuzzy Logic

  • Kim, Myung-Ki;Seo, Mi-Ro
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1998.05a
    • /
    • pp.321-328
    • /
    • 1998
  • A controller and sensor fault tolerant system jot a steam generator is designed with fuzzy logic. A structure of the : proposed fault tolerant redundant system is composed of a supervisor and two fuzzy weighting modulators. A supervisor alternatively checks a controlled and a sensor induced performances to identify Which Part, a controller or a sensor, is faulty. In order to analyze controller induced performance both an error and a charge in error of the system output an chosen as fuzzy variables. The fuzzy logic jot a sensor induced performance uses two variables : a deviation between two sensor outputs and its frequency, Fuzzy weighting modulator generates an output signal compensated for faulty input signal. Simulations show that the : proposed fault tolerant control scheme jot a steam generator regulates welt water level by suppressing fault effect of either controllers or sensors. Therefore through duplicating sensors and controllers with the proposed fault tolerant scheme, both a reliability of a steam generator control and sensor system and that of a power plant increase even mote.

  • PDF

Common-Mode Voltage and Current Harmonic Reduction for Five-Phase VSIs with Model Predictive Current Control

  • Vu, Huu-Cong;Lee, Hong-Hee
    • Journal of Power Electronics
    • /
    • v.19 no.6
    • /
    • pp.1477-1485
    • /
    • 2019
  • This paper proposes an effective model predictive current control (MPCC) that involves using 10 virtual voltage vectors to reduce the current harmonics and common-mode voltage (CMV) for a two-level five-phase voltage source inverter (VSI). In the proposed scheme, 10 virtual voltage vectors are included to reduce the CMV and low-order current harmonics. These virtual voltage vectors are employed as the input control set for the MPCC. Among the 10 virtual voltage vectors, two are applied throughout the whole sampling period to reduce current ripples. The two selected virtual voltage vectors are based on location information of the reference voltage vector, and their duration times are calculated using a simple algorithm. This significantly reduces the computational burden. Simulation and experimental results are provided to verify the effectiveness of the proposed scheme.