• Title/Summary/Keyword: changing rules

Search Result 163, Processing Time 0.025 seconds

Influence of Different Frequency Harmonic Generated by Rectifier on High-speed Permanent Magnet Generator

  • Qiu, Hongbo;Wei, Yanqi;Yang, Cunxiang;Fan, Xiaobin
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.1956-1964
    • /
    • 2018
  • Since the stator winding of High-Speed Permanent Magnet Generator (HSPMG) has few winding turns and low inductance value, it is more prone to be influenced by harmonic current. Moreover, the operation efficiency and the torque stability of HSPMG will be greatly influenced by harmonic current. Taking a 117 kW, 60 000 rpm HSPMG as an example, in order to analyze the effects of harmonic current on HSPMG in this paper, the 2-D finite element electromagnetic field model of the generator was established and the correctness of the model was verified by testing the generator prototype. Based on the model, the losses and torque of the generator under different frequency harmonic current were studied. The change rules of the losses and torque were found out. Based on the analysis of the influence of the harmonic phase angle on torque ripple, it is found that the torque ripple could be weakened through changing the harmonic phase angle. Through the analysis of eddy current density in rotor, the change mechanism of the rotor eddy current loss was revealed. These conclusions can contribute to reduce harmonic loss, prevent demagnetization fault and optimize torque ripple of HSPMG used in distributed power supply system.

Structural Strength Assessment and Optimization for 20 Feet Class Power Boat (20피트급 파워보트의 구조강도 평가 및 최적화)

  • Yum, Jae-Seon;Yoo, Jaehoon
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.53 no.2
    • /
    • pp.108-114
    • /
    • 2016
  • Recently, there has been a growing interest in marine leisure sports and high speed power boat for fishing. The prototype of 20 feet class power boat was developed and authors are joined in this government-led project. The research was performed to evaluate the optimal structure and design of the structural strength necessary to ensure the structural safety of the power boat. A new material ROCICORE fiber added to the mat and roving was adopted for high-power tenacity. ANSYS Workbench has been used to make the structural model, evaluate the strength and optimize the structural design. The response of the structure to quasi-static slamming loads according to the rules and regulations of ISO 12215-5, Lloyd’s Register of Shipping and Korean Register has been implemented and studied. An optimization study for the structural response is carried out by changing the plate thickness and section modulus of stiffeners. The power boat structure derived fuel efficiency is optimized by performing the best possible structural design to minimize the hull weight.

Attack Evolution of 'DNSpionage' and Countermeasures on Survey ('DNS피오나지' 공격의 진화에 따른 대응방안)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.52-57
    • /
    • 2019
  • DNS stands for 'Domain Name System' and uses IP addresses to identify devices connected to the network on the network. IP is a protocol that registers and manages aliases such as IPs because it is difficult for general users to remember. In recent years, the abuse of such DNS is increasing abroad, and behind the scenes, called 'DNS pionage,' are developing and evolving new rules and malware. DNSpionage attack is abusing DNS system such as Increasing hacking success rate, leading to fake sites, changing or forged data. As a result it is increasing the damage cases. As the global DNS system is expanding to the extent that it is out of control. Therefore, in this research, the countermeasures of DNSpionage attack is proposed to contribute to build a secure and efficient DNS system.

Deriving Robust Reservoir Operation Policy under Changing Climate: Use of Robust Optimiziation with Stochastic Dynamic Programming

  • Kim, Gi Joo;Kim, Young-Oh
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.171-171
    • /
    • 2020
  • Decision making strategies should consider both adaptiveness and robustness in order to deal with two main characteristics of climate change: non-stationarity and deep uncertainty. Especially, robust strategies are different from traditional optimal strategies in the sense that they are satisfactory over a wider range of uncertainty and may act as a key when confronting climate change. In this study, a new framework named Robust Stochastic Dynamic Programming (R-SDP) is proposed, which couples previously developed robust optimization (RO) into the objective function and constraint of SDP. Two main approaches of RO, feasibility robustness and solution robustness, are considered in the optimization algorithm and consequently, three models to be tested are developed: conventional-SDP (CSDP), R-SDP-Feasibility (RSDP-F), and R-SDP-Solution (RSDP-S). The developed models were used to derive optimal monthly release rules in a single reservoir, and multiple simulations of the derived monthly policy under inflow scenarios with varying mean and standard deviations are undergone. Simulation results were then evaluated with a wide range of evaluation metrics from reliability, resiliency, vulnerability to additional robustness measures. Evaluation results were finally visualized with advanced visualization tools that are used in multi-objective robust decision making (MORDM) framework. As a result, RSDP-F and RSDP-S models yielded more risk averse, or conservative, results than the CSDP model, and a trade-off relationship between traditional and robustness metrics was discovered.

  • PDF

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

A new four-unknown equivalent single layer refined plate model for buckling analysis of functionally graded rectangular plates

  • Ibrahim Klouche Djedid;Sihame Ait Yahia;Kada Draiche;Emrah Madenci;Kouider Halim Benrahou;Abdelouahed Tounsi
    • Structural Engineering and Mechanics
    • /
    • v.90 no.5
    • /
    • pp.517-530
    • /
    • 2024
  • This paper presents a new four-unknown equivalent single layer (ESL) refined plate theory for the buckling analysis of functionally graded (FG) rectangular plates with all simply supported edges and subjected to in-plane mechanical loading conditions. The present model accounts for a parabolic variation of transverse shear stress over the thickness, and accommodates correctly the zero shear stress conditions on the top and bottom surfaces of the plate. The material properties are supposed to vary smoothly in the thickness direction through the rules of mixture named power-law gradation. The governing equilibrium equations are formulated based on the total potential energy principle and solved for simply supported boundary conditions by implementing the Navier's method. A numerical result on elastic buckling using the current theory was computed and compared with those published in the literature to examine the accuracy of the proposed analytical solution. The effects of changing power-law exponent, aspect ratio, thickness ratio and modulus ratio on the critical buckling load of FG plates under different in-plane loading conditions are investigated in detail. Moreover, it was found that the geometric parameters and power-law exponent play significant influences on the buckling behavior of the FG plates.

Research of Runoff Management in Urban Area using Genetic Algorithm (유전자알고리즘을 이용한 도시화 유역에서의 유출 관리 방안 연구)

  • Lee, Beum-Hee
    • Journal of the Korean Geophysical Society
    • /
    • v.9 no.4
    • /
    • pp.321-331
    • /
    • 2006
  • Recently, runoff characteristics of urban area are changing because of the increase of impervious area by rapidly increasing of population and industrialization, urbanization. It needs to extract the accurate topologic and hydrologic parameters of watershed in order to manage water resource efficiently. Thus, this study developed more precise input data and more improved parameter estimating procedures using GIS(Geographic Information System) and GA(Genetic Algorithm). For these purposes, XP-SWMM (EXPert-Storm Water Management Model) was used to simulate the urban runoff. The model was applied to An-Yang stream basin that is a typical Korean urban stream basin with several tributaries. The rules for parameter estimation were composed and applied based on quantity parameters that are investigated through the sensitivity analysis. GA algorithm is composed of these rules and facts. The conditions of urban flows are simulated using the rainfall-runoff data of the study area. The data of area, slope, width of each subcatchment and length, slope of each stream reach were acquired from topographic maps, and imperviousness rate, land use types, infiltration capacities of each subcatchment from land use maps, soil maps using GIS. Also we gave the management scheme of urbanization runoff using XP-SWMM. The parameters are estimated by GA from sensitivity analysis which is performed to analyze the runoff parameters.

  • PDF

Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern (경보데이터 패턴 분석을 위한 순차 패턴 마이너 설계 및 구현)

  • Shin, Moon-Sun;Paik, Woo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2009
  • Intrusion detection is a process that identifies the attacks and responds to the malicious intrusion actions for the protection of the computer and the network resources. Due to the fast development of the Internet, the types of intrusions become more complex recently and need immediate and correct responses because the frequent occurrences of a new intrusion type rise rapidly. Therefore, to solve these problems of the intrusion detection systems, we propose a sequential pattern miner for analysis of the alert data in order to support intelligent and automatic detection of the intrusion. Sequential pattern mining is one of the methods to find the patterns among the extracted items that are frequent in the fixed sequences. We apply the prefixSpan algorithm to find out the alert sequences. This method can be used to predict the actions of the sequential patterns and to create the rules of the intrusions. In this paper, we propose an extended prefixSpan algorithm which is designed to consider the specific characteristics of the alert data. The extended sequential pattern miner will be used as a part of alert data analyzer of intrusion detection systems. By using the created rules from the sequential pattern miner, the HA(high-level alert analyzer) of PEP(policy enforcement point), usually called IDS, performs the prediction of the sequence behaviors and changing patterns that were not visibly checked.

  • PDF

Metamodeling Construction for Generating Test Case via Decision Table Based on Korean Requirement Specifications (한글 요구사항 기반 결정 테이블로부터 테스트 케이스 생성을 위한 메타모델링 구축화)

  • Woo Sung Jang;So Young Moon;R. Young Chul Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.381-386
    • /
    • 2023
  • Many existing test case generation researchers extract test cases from models. However, research on generating test cases from natural language requirements is required in practice. For this purpose, the combination of natural language analysis and requirements engineering is very necessary. However, Requirements analysis written in Korean is difficult due to the diverse meaning of sentence expressions. We research test case generation through natural language requirement definition analysis, C3Tree model, cause-effect graph, and decision table steps as one of the test case generation methods from Korean natural requirements. As an intermediate step, this paper generates test cases from C3Tree model-based decision tables using meta-modeling. This method has the advantage of being able to easily maintain the model-to-model and model-to-text transformation processes by modifying only the transformation rules. If an existing model is modified or a new model is added, only the model transformation rules can be maintained without changing the program algorithm. As a result of the evaluation, all combinations for the decision table were automatically generated as test cases.

How Do People Experience Changes and Growths of the Self in On-line Game World? (온라인 게임 세계 속에서 게임 사용자들은 시간이 흐름에 따라 자신의 모습에서 어떠한 변화와 성장을 경험하는가?)

  • Do, Young-Yim;Whang, Sang-Min
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.1208-1217
    • /
    • 2009
  • This research was conducted in an attempt to understand changes and growths of the self in on-line game world. Q methodology was used to investigate players in Mabinogi, which is an on-line game(MMORPG). Based on 57 behavior statements, Players distributed their changing experiences from when they were novices in on-line game world to the current state. In early start phase, they recognized that on-line game world was different from the reality. And they perceived their experiences in on-line game as separated from the real ones. However, as they spend more time in on-line game world, they began to realized that on-line game world is as real as the world because they function as an individual living in a society in both the game and the real world. They felt and learned that in on-line game life, they also need to follow the rules and order. In addition, trust and politeness were essential in order to live with other players. As time passed, the players realized that on-line game experiences have the same meanings and values as the real life ones. 3 types of self-changing patterns were found : Achievement change, Control change, and Relation change. The behavior patterns of the 3 types were then compared to Identify similarities and differences amongst them in psychological meanings and values in the on-line game life. This result illustrates that on-line game world can be defined as new behavioral setting or developmental context established by digital technology. In this new setting, people can experiment and understand their behavior patterns and also experience changes and growths of the self.

  • PDF