• Title/Summary/Keyword: discrete elements

Search Result 273, Processing Time 0.027 seconds

An Improvement in Adaptive Estimation for a Tracking System with Additive Measurement Impulse noise (충격성 잡음이 혼입되는 추적계통의 적응 추정 개선)

  • 윤현보;박희창
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.12 no.5
    • /
    • pp.519-526
    • /
    • 1987
  • An adaptive estimation system which operates propoerly in the environments corrupted by additive impulse noise in addition to the white Gaussian noise has been proposed. A feed forward loop is inserted into the adaptive estimator proposed by R. L. Moose for a system with an unknown measurement bias by which the improved adaptive estimator is processed successfully without the sum of the time varying weights being zero even when the measurement system is added impulue noise. Successfully processed adaptive estimator has been obtained under the large impulse noise in addition to randomly varying unknown biases condition by giving sufficient large value to the elements of discrete vector on the computer simulation.

  • PDF

An efficient VLSI Implementation of the 2-D DCT with the Algorithm Decomposition (알고리즘 분해를 이용한 2-D DCT)

  • Jeong, Jae-Gil
    • The Journal of Natural Sciences
    • /
    • v.7
    • /
    • pp.27-35
    • /
    • 1995
  • This paper introduces a VLSI (Very Large Scale Integrated Circuit) implementation of the 2-D Discrete Cosine Transform (DCT) with an application to image and video coding. This implementation, which is based upon a state space model, uses both algorithm and data partitioning to achieve high efficiency. With this implementation, the amount of data transfers between the processing elements (PEs) are reduced and all the data transfers are limitted to be local. This system accepts the input as a progressively scanned data stream which reduces the hardware required for the input data control module. With proper ordering of computations, a matrix transposition between two matrix by matrix multiplications, which is required in many 2-D DCT systems based upon a row-column decomposition, can be also removed. The new implementation scheme makes it feasible to implement a single 2-D DCT VLSI chip which can be easily expanded for a larger 2-D DCT by cascading these chips.

  • PDF

Harmonic differential quadrature (HDQ) for axisymmetric bending analysis of thin isotropic circular plates

  • Civalek, Omer;Ulker, Mehmet
    • Structural Engineering and Mechanics
    • /
    • v.17 no.1
    • /
    • pp.1-14
    • /
    • 2004
  • Numerical solution to linear bending analysis of circular plates is obtained by the method of harmonic differential quadrature (HDQ). In the method of differential quadrature (DQ), partial space derivatives of a function appearing in a differential equation are approximated by means of a polynomial expressed as the weighted linear sum of the function values at a preselected grid of discrete points. The method of HDQ that was used in the paper proposes a very simple algebraic formula to determine the weighting coefficients required by differential quadrature approximation without restricting the choice of mesh grids. Applying this concept to the governing differential equation of circular plate gives a set of linear simultaneous equations. Bending moments, stresses values in radial and tangential directions and vertical deflections are found for two different types of load. In the present study, the axisymmetric bending behavior is considered. Both the clamped and the simply supported edges are considered as boundary conditions. The obtained results are compared with existing solutions available from analytical and other numerical results such as finite elements and finite differences methods. A comparison between the HDQ results and the finite difference solutions for one example plate problem is also made. The method presented gives accurate results and is computationally efficient.

The Dynamics Responses of Railway Bridges Considering the Track Model (궤도모형에 따른 철도교량의 동적응답분석)

  • Kim, Sang-Hyo;Lee, Yong-Seon;Jung, Jun;Lee, Jun-Suk
    • Proceedings of the KSR Conference
    • /
    • 2002.10a
    • /
    • pp.715-720
    • /
    • 2002
  • The dynamic load effects, generated by moving trains, are transferred to the railway bridges through tracks. The dynamic load effects may vary due to the dynamic characteristics of the applied vehicle loads and the railway bridges including the track system. However, the track models have been neglected or simplified by spring elements in the most studies since it is quite complicated to consider the track systems in the dynamic analysis models of railway bridges. In this study track system on railway bridges are modeled using a three-dimensional discrete-support model that can simulate the load carrying behavior of tracks. A 40m simply supported prestressed concrete box-girder system adopted for high-speed railway bridges are modeled for simulation works. The train models are composed of 20 cars for KTX. The dynamic response of railway bridges are found to be affected depending on whether the track model is considered for not. The influencing rate depends on the traveling speed and different wheel-axle distance. The dynamic bridge response decreases remarkably by the track systems around the resonant frequency. Therefore, the resonance effect can be reduced by modifying the track properties in the railway bridge, especially for KTX trains.

  • PDF

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

An Analysis of the Decision Factors on Mokpo Port by Multinomial Logit Model

  • Seong, Yu-Chang;Youn, Myung-Ou
    • Journal of Navigation and Port Research
    • /
    • v.31 no.2
    • /
    • pp.133-139
    • /
    • 2007
  • Relative importance of maritime transport that takes charge of main current of freight in country' economy is very large. Especially, port and facility carry out important role which treats freight of import and export smoothly and improves international trade as turning point, to achieve key role on connection and association between sea and land. For such reason, enlargement of port facilities or development of port needs to grasp exactly the utilization of port, attributes and selective factors of shipper. On the other hand, the amounts of physical distribution on Mokpo port located in Korean west coast are increasing, with fast economic growth of East Asian including China. This study uses discrete choice model that is measuring to analyze attribute and characteristic of Mokpo port, and analyzes port selection by decision factors of shipper. This paper composed a questionnaire using the result of preceding research, to decide port selection factor among competitive ports. Through factor analysis on a basis of the questionnaire' result, five principal components were extracted. These are resorted out by Logit model, to grasp competitive elements of port. This research fin present direction which raises competitive power of ports in west coast of Korea, especially on alternative and concentration of middle-class port as Mokpo may be useful.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

3D Automatic Mesh Generation Scheme for the Boundary Element Method (경계요소법을 위한 3차원 자동요소분할)

  • Lee, H.B.;Lee, S.H.;Kim, H.S.;Lee, K.S.;Hahn, S.Y.
    • Proceedings of the KIEE Conference
    • /
    • 1993.07b
    • /
    • pp.935-937
    • /
    • 1993
  • This paper presents a three dimensional automatic mesh generation scheme for the boundary element method, and this scheme can be applicable to practical problems of complex shape. The geometry of the problem is expressed as an assemblage of linear Coon's surfaces, and each surface is made up of four edge curves which are defined in the form of a parametric function. Curves are automatically segmented according to their characteristics. With these segments of curves, interior points and triangular mesh elements are generated in the parametric plane using Lindholm's method, and then their projection on the real surface forms the initial mesh. The refinement of initial mesh is performed so that the discrete triangular planes are close to the real continuous surfaces. The bisection method is used for the refinement. Finally, interior points in the refined mesh are rearranged so as to make each element be close with an equilateral triangle. An attempt has been made to apply the proposed method to a DY(Deflection Yoke) model.

  • PDF

Calculation on Electronic Structure of ZnO with Impurities Belonging to III and IV Family (III, IV족 불순물이 첨가된 ZnO의 전자상태계산)

  • Lee, Dong-Yoon;Kim, Hyun-Ju;Koo, Bo-Kun;Lee, Won-Jae;Song, Jae-Sung
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2004.07a
    • /
    • pp.309-312
    • /
    • 2004
  • The electronic structure of ZnO oxide semiconductor having high optical transparency and good electric conductivity was theoretically investigated by $DV-X_{\alpha}$(the discrete variation $X_{\alpha}$) method, which is a sort of the first principle molecular orbital method using Hatre-Fock-Slater approximation. The electrical and optical properties of ZnO are seriously affected by the addition of impurities. The imnurities are added to ZnO in order to increase the electric conductivity of an electrode without losing optical transparency. In this study, the effect of impurities of III and IV family on the band structure, impurity levels and the density of state of ZnO were investigated. The cluster model used for calculations was $[MZn_{50}O_{53}]^{-2}$(M=elements belonging to III and IV family).

  • PDF

Assessment of heavy metals in sediments of Shitalakhya River, Bangladesh

  • Al-Razee, A.N.M.;Abser, Md. Nurul;Mottalib, Md. Abdul;Rahman, Md. Sayadur;Cho, Namjun
    • Analytical Science and Technology
    • /
    • v.32 no.5
    • /
    • pp.210-216
    • /
    • 2019
  • Concentrations of Cu, Zn, Fe, Mn, Ni and Cr have been estimated in sediments of the Shitalakhya River at Polash-Ghorashal area, Narsingdi, Bangladesh. 36 samples of sediments from nine sampling point at different locations of Shitalakhya River were collected to determine the concentration of Cu, Zn, Fe, Mn, Ni, Cr and the samples were analyzed by atomic absorption spectrophotometer (AAS). The obtained results were compared with national and international guidelines. The levels of heavy metal concentrations in sediments were found to decrease in the order of Fe > Mn > Zn > Ni > Cu > Cr, respectively. The heavy metal concentration in sediment of Shitalakhya was below the recommended safe limits of heavy metals by WHO, FAO and other international standards. Contamination factor (CF) of Zn and Cu at sampling point Fsd2 show higher (> 1) values due to the influence of external discrete sources like wastage catalysts of ZnO and CuO. Geo-accumulation index values of the study indicate as non-contaminated to moderately contaminate.