• Title/Summary/Keyword: frequency problem

Search Result 3,568, Processing Time 0.04 seconds

Collocation of Sensor and Actuator for Active Control of Sound and Vibration (능동음향진동제어를 위한 센서와 액추에이터의 동위치화 연구)

  • 이영섭
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.14 no.3
    • /
    • pp.253-263
    • /
    • 2004
  • The problem considered in this paper is about the collocation of sensor and actuator for the active control of sound and vibration. It is well-known that a point collocated sensor-actuator pair offers an unconditional stability with very high performance when it is used with a direct velocity feedback (DVFB) control, because the pair has strictly positive real (SPR) property. In order to utilize this SPR characteristics, a matched piezoelectric sensor and actuator pair is considered. but this pair suffers from the in-plane motion coupling problem with the out-of-plane motion due to the piezo sensor and actuator interaction. This coupling phnomenon limits the stability and performance of the matched pair with DVFBcontrol. As a new alternative, a point sensor and distributed piezoelectric actuator pair is also considered, which provides SPR property in all frequency range when the pair is implemented on a clamped-clapmed beam. The use of this sensor-actuator pair is highly expected for the applications to more practical active control of sound and vibration systems with the DVFB control strategy.

State Transformations for Regenerative Sampling in Simulation Experiments

  • Kim, Yun-Bae
    • IE interfaces
    • /
    • v.11 no.3
    • /
    • pp.89-101
    • /
    • 1998
  • The randomness of the input variables in simulation experiments produce output responses which are also realizations of random variables. The random responses make necessary the use of statistical inferences to adequately describe the stochastic nature of the output. The analysis of the simulation output of non-terminating simulations is frequently complicated by the autocorrelation of the output data and the effect of the initial conditions that produces biased estimates. The regenerative method has been developed to deal with some of the problems created by the random nature of the simulation experiments. It provides a simple solution to some tactical problems and can produce valid statistical results. However, not all processes can he modeled using the regenerative method. Other processes modeled as regenerative may not return to a given demarcating state frequently enough to allow for adequate statistical analysis. This paper shows how the state transformation concept was successfully used in a queueing model and a job shop model. Although the first example can be analyzed using the regenerative method. it has the problem of too few recurrences under certain conditions. The second model has the problem of no recurrences. In both cases, the state transformation increase the frequency of the demarcating state. It was shown that time state transformations are regenerative and produce more cycles than the best typical discrete demarcating state in a given run length.

  • PDF

Impacts of Local Civic Consciousness Formation : Focused on the Yong-in City (지역시민의식 형성 영향 요인 : 용인시를 중심으로)

  • Jeon, Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.785-799
    • /
    • 2011
  • This study apprehends the effect of primary causes that form civic consciousness, which mature local residents should have. Moreover, it tries to contribute to the development of mature civic consciousness with regard to the situations and conditions of local community, by observing how the extent of local problem recognition, personal viewpoints, and participation in social activities affect formation of civic consciousness. The research was conducted to 600 local residents, ages 20 and above, with proportional stratified sampling method. The study showed that high recognition of environmental, social, economic and aging issues, fulfillment on social achievement, self-perception, culture orientation, and higher frequency on participating on social activities have positive effects on formation of sound civic consciousness.

1D finite element artificial boundary method for layered half space site response from obliquely incident earthquake

  • Zhao, Mi;Yin, Houquan;Du, Xiuli;Liu, Jingbo;Liang, Lingyu
    • Earthquakes and Structures
    • /
    • v.9 no.1
    • /
    • pp.173-194
    • /
    • 2015
  • Site response analysis is an important topic in earthquake engineering. A time-domain numerical method called as one-dimensional (1D) finite element artificial boundary method is proposed to simulate the homogeneous plane elastic wave propagation in a layered half space subjected to the obliquely incident plane body wave. In this method, an exact artificial boundary condition combining the absorbing boundary condition with the inputting boundary condition is developed to model the wave absorption and input effects of the truncated half space under layer system. The spatially two-dimensional (2D) problem consisting of the layer system with the artificial boundary condition is transformed equivalently into a 1D one along the vertical direction according to Snell's law. The resulting 1D problem is solved by the finite element method with a new explicit time integration algorithm. The 1D finite element artificial boundary method is verified by analyzing two engineering sites in time domain and by comparing with the frequency-domain transfer matrix method with fast Fourier transform.

Friction tuned mass damper optimization for structure under harmonic force excitation

  • Nasr, Aymen;Mrad, Charfeddine;Nasri, Rachid
    • Structural Engineering and Mechanics
    • /
    • v.65 no.6
    • /
    • pp.761-769
    • /
    • 2018
  • In this work, an optimization method of Friction Tuned Mass Damper (FTMD) parameters is presented. Friction tuned mass dampers (FTMD) are attached to mechanical structures to reduce their vibrations with dissipating the vibratory energy through friction between both bodies. In order to exploit the performances of FTMD, the determination of the optimum parameters is recommended. However, the presence of Coulomb's friction force requires the resolution of a non-linear stick-slip problem. First, this work aims at determining the responses of the vibratory system. The responses of the main mass and of the FTMD are determined analytically in the sticking and sliding phase using the equivalent damping method. Second, this work aims to optimize the FTMD parameters; the friction coefficient and the tuned frequency. The optimization formulation based on the Ricciardelli and Vickery method at the resonance frequencies, this method is reformulated for a system with a viscous damping. The inverse problem of finding the FTMD parameters given the magnitude of the force and the maximum acceptable displacement of the primary system is also considered; the optimization of parameters leads to conclude on the favorable FTMD giving significant vibration decrease, and to advance design recommendations.

Structural damage detection based on residual force vector and imperialist competitive algorithm

  • Ding, Z.H.;Yao, R.Z.;Huang, J.L.;Huang, M.;Lu, Z.R.
    • Structural Engineering and Mechanics
    • /
    • v.62 no.6
    • /
    • pp.709-717
    • /
    • 2017
  • This paper develops a two-stage method for structural damage identification by using modal data. First, the Residual Force Vector (RFV) is introduced to detect any potentially damaged elements of structures. Second, data of the frequency domain are used to build up the objective function, and then the Imperialist Competitive Algorithm (ICA) is utilized to estimate damaged extents. ICA is a heuristic algorithm with simple structure, which is easy to be implemented and it is effective to deal with high-dimension nonlinear optimization problem. The advantages of this present method are: (1) Calculation complexity can be decreased greatly after eliminating many intact elements in the first step. (2) Robustness, ICA ensures the robustness of the proposed method. Various damaged cases and different structures are investigated in numerical simulations. From these results, anyone can point out that the present algorithm is effective and robust for structural damage identification and is also better than many other heuristic algorithms.

Effect of the Phase and Amplitude for Optical Visual Encryption (광시각 암호화에 위상과 진폭이 미치는 영향)

  • 이석기;류충상;구향옥;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.1 no.1
    • /
    • pp.74-82
    • /
    • 2001
  • Visual cryptography made it possible to decrypt the Information encrypted by thresholding scheme not with digital system but with human vision system. This method, however, has some limit in it because of the rack of resolution in both the spatial and amplitude domain. Optical visual cryptography, which used laser system instead of human eyesight, was proposed by conjunction of the optical theory with the cryptography. However, it also had some difficulties because it did not overcome the existing problem of visual cryptography completely. The problem occurred in the process of transferring data processing system from visual to optics. Therefore, it is appropriate to approach these problems in terms of optics. In this paper, we analysis, in the aspect of frequency, the security characteristics and the noise level occurred in the process of optical visual encryption.

  • PDF

Design of lava Hardware Accelerator for Mobile Application (모바일 응용을 위한 자바 하드웨어 가속기의 설계)

  • 최병윤;박영수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.1058-1067
    • /
    • 2004
  • Java virtual machine provides code compactness, simple execution engines, and platform-independence which are important features for small devices such as mobile or embedded device, but it has a big problem, such as low throughput due to stack-oriented operation. In this paper hardware lava accelerator targeted for mobile or embedded application is designed to eliminate the slow speed problem of lava virtual machine. The designed lava accelerator can execute 81 instructions of Java virtual machine(JVM)'s opcodes and be used as Java coprocessor of conventional 32-bit RISC processor with efficient coprocessor interface and instruction buffer. It consists of about 14,300 gates and its maximum operating frequency is about 50 Mhz under 0.35um CMOS technology.

A Study On Usage Of the dimension barcode and the RFID based on Ubiquitous (유비쿼터스 환경에서 2차원 바코드 및 RFID 응용에 관한 연구)

  • 김병찬;정성훈;임재홍
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.49-54
    • /
    • 2004
  • Ubiquitous computing support to use various informations through any machine which can connect the computer in any where and any time. Recently barcode and RFID which is improved business model to store large scale information and certify security in on- and off-line internet technology is applied the credit curd and payment service and so on However this technology has serious problem that RFID In this paper, we investigate method used example of 2D barcode and RFID and compare and analysis characteristics of recent technology to solve former problem in Ubiquitous environment.

  • PDF

RFID Mutual Authentication Protocol Against Reflection Attack (반사공격에 안전한 RFID 인증 프로토콜)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3C
    • /
    • pp.348-354
    • /
    • 2007
  • RFID system is emerging new technology for ubiquitous computing environment. RFID system, however, provides privacy problems while the technology offers incredible rich opportunities for applications in the filed of logistics, distribution, and medical services, etc. Many researches have been conducted in order to solve this problem, but the current RFID authentication protocols are still insufficient for settling the privacy problem in the point of view of privacy intrusion and system efficiency. The purpose of this paper is to present a RFID mutual authentication protocol which improves safety level, compared with current authentication protocols. The proposed authentication protocol can provide mutual authentication services, and is secure against location tracing, spoofing, reflection attack.