• Title/Summary/Keyword: static method

Search Result 4,702, Processing Time 0.03 seconds

Shock Response Analysis under Underwater Explosion for Underwater Ship using ALE Technique (ALE기법을 이용한 수중함의 수중폭발 충격응답 해석에 관한 연구)

  • Kim, Jae-Hyun
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.10 no.4
    • /
    • pp.218-226
    • /
    • 2007
  • In modern naval ships, the design of submarines has continually evolved to improve survivability and it is also important to design ship against shock response. Exiting underwater ship design has been peformed due to results of static analysis considering shock acceleration by simple method. However, it can not be anticipated good assesment. The present study applied the Arbitrary Lagrangian-Eulerian (ALE) technique, a fluid-structure interaction approach, to simulate an underwater explosion and investigate the survival capability of a damaged submarine liquefied oxygen tank. The Lagrangian-Eulerian coupling algorithm and the equations of state for explosives and seawater were also reviewed. It is shown that underwater explosion analysis using the ALE technique can accurately evaluate structural damage after attack. This procedure could be applied quantitatively to real structural design.

  • PDF

Aeroelastic Response Analysis for Wing-Body Configuration Considering Shockwave and Flow Viscous Effects (충격파 및 유동점성 효과를 고려한 항공기 날개-동체 형상에 대한 공탄성 응답)

  • Kim, Dong-Hyun;Kim, Yu-Sung;Hwang, Mi-Hyun;Kim, Su-Hyun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.10
    • /
    • pp.984-991
    • /
    • 2009
  • In this study, transonic aeroelastic response analyses have been conducted for the DLR-F4(wing-body) aircraft configuration considering shockwave and flow separation effects. The developed fluid-structure coupled analysis system is applied for aeroelastic computations combining computational structural dynamics(CSD), finite element method(FEM) and computational fluid dynamics(CFD) in the time domain. It can give very accurate and useful engineering data on the structural dynamic design of advanced flight vehicles. For the nonlinear unsteady aerodynamics in high transonic flow region, Navier-Stokes equations using the structured grid system have been applied to wing-body configurations. In transonic flight region, the characteristics of static and dynamic aeroelastic responses have been investigated for a typical wing-body configuration model. Also, it is typically shown that the current computation approach can yield realistic and practical results for aircraft design and test engineers.

A Rotating Balance Design and Performance Estimation for a Rotor Test Jig (로터 실험 장치용 Rotating Balance의 설계 및 성능 검증에 관한 연구)

  • Ryi, Jae-Ha;Rhee, Wook;Choi, Jong-Soo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.3
    • /
    • pp.301-306
    • /
    • 2009
  • In this study a 3-component rotating balance, which is designed to measure the thrust (Fz) and two moment components (Mx, My) simultaneously for a rotor test jig, is designed and its performance is validated experimentally. The low voltage signal from the strain gages mounted on the balance is amplified with a rotating amplifier, which is then fed through a slip-ring unit into the data acquisition system. In order to validate the accuracy of the calibration matrix obtained from a static calibration test, an additional reaction type balance is used to measure the thrust from a model rotor simultaneously, and shows very good result. Finally, the expanded uncertainty value, which is obtained from ISO method is estimated to be $2.82\times10^{-1}$, and the balance turns out to be reliable.

A novel method with photochemical reaction for LK immobilization on the polyurethane surface (폴리우레탄 표면의 광화학적 공유결합을 이용한 새로운 LK 고정화 방법에 관한 연구)

  • Kim, H.J.;Nakayama, Yasuhide;Shim, J.H.;Ryu, G.H.;Kim, J.;Matsuda, Takehisa;Min, B.G.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1996 no.05
    • /
    • pp.91-96
    • /
    • 1996
  • 광반응을 이용하여 fibrinolytic 활성을 보이는 LK (lumbrokinase)를 생체재료인 PU (polyurethane) 표면에 고정화하는 방법에 관하여 연구하였다. 먼저 PU표면에 amino 작용기를 도입하기 위하여 side chain 작용기로 phenylazide 와 amino작용기를 갖는 AzPhPAL을 이용하였으며 광반응은 266nm 이상의 UV light을 약 1분간 조사시키는 방법을 이용하였다. LK를 amino작용기가 유도된 PU 표면에 공유결합시키기 위하여 amide결합 형성시 사용되는 수용성 carbodiimide인 EDC를 이용하였다. ESCA측정시, AzPhPAL으로 공유결합시킨 경우 반응하지 않은 PU표면에 비하여 N/C가 0.1717로, LK 고정시 S/C가 0.0043로 증가된것을 알 수 있었다. 이것으로부터 AzPhPAL과 LK가 PU표면에 공유결합된 것을 확인할 수 있었으며 static contact angle 측정으로 표면개질된 PU표면이 소수성에서 친수성으로 변화된 것을 확인 할 수 있었다. 또한 공유결합된 LK의 활성을 확인하기 위하여 fibrin plate test를 실시하였는데 그 결과 고정화된 후에도 LK의 활성이 존재함을 알 수 있었다.

  • PDF

Evaluation of Machining Characteristics and Performance Analysis of Air-Lubricated Dynamic Bearing (공기동압베어링의 성능 해석 및 가공특성 평가)

  • Baek, Seung-Yub;Kim, Kwang-Lae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5412-5419
    • /
    • 2011
  • The need is growing for high-speed spindle because various equipment are becoming more precise, miniaturization and high speed with the development of industries. Air-lubricated dynamic bearings are widely used in the optical lithographic manufacturing of wafers to realize nearly zero friction for the motion of the stage. Air-lubricated dynamic bearing can be used in high-speed, high-precision spindle system and hard disk drive(HDD) because of its advantages such as low frictional loss, low heat generation, averaging effect leading better running accuracy. In the paper, numerical analysis is undertaken to calculate the performance of air-lubricated dynamic bearing with herringbone groove. The static performances of herringbone groove bearings which can be used to support the thrust load are calculated. Electrochemical micro machining($EC{\mu}M$) which is non-contact ultra precision machining method has been developed to fabricate the air-lubricated dynamic bearing and optimum parameters which are inter electrode gap size, concentration of electrolyte, machining time are simulated using numerical analysis program.

A Study on Damping Improvement of a Synchronous Generator with Static VAR Compensator using a Fuzzy-PI Controller (퍼지-PI 제어기를 이용하여 정지형 무효전력 보상기를 포함한 동기 발전기의 안정도 개선에 관한 연구)

  • 주석민;허동렬;김상효;정동일;정형환
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.15 no.3
    • /
    • pp.57-66
    • /
    • 2001
  • This paper resents a control approach for designing a fuzzy-PI controller for a synchronous generator excitation and SVC system A combination of thyristor-controlled reactors and fixed capacitors (TCR-FC) type SVC is recognized as having the must fiexible control and high speed response, which has been widely utilized in power systems, is considered and designed to improve the response of a synchronous generator, as well as controlling the system voltage A Fuzzy-PI controller for SVC system was proposed in this paper. The PI gain parameters of the proposed Fuzzy-PI controller which is a special type of PI ones are self-tuned by fuzzy inference technique. It is natural that the fuzzy inference technique should be barred on humans intuitions and empirical knowledge. Nonetheless, the conventional ones were not so. Therefore, In this paper, the fuzzy inference technique of PI gains using MMGM(Min Max Gravity Method) which is very similar to humans inference procedures, was presented and allied to the SVC system. The system dynamic responses are examined after applying all small disturbance condition.

  • PDF

Malware Analysis Based on Section, DLL (Section, DLL feature 기반 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1077-1086
    • /
    • 2017
  • Malware mutants based on existing malware is widely used because it can easily avoid the existing security system even with a slight pattern change. These malware appear on average more than 1.6 million times a day, and they are gradually expanding to IoT / ICS as well as cyber space, which has a large scale of damage. In this paper, we propose an analytical method based on features of PE Section and DLL that do not give much significance, rather than pattern-based analysis, Sandbox-based analysis, and CFG, Strings-based analysis. It is expected that the proposed model will be able to cope with effective malicious code in case of combined operation of various existing analysis technologies.

Share Renewal Scheme in Proactive Secret Sharing for Threshold Cryptosystem (임계 암호시스템 구현을 위한 능동적 비밀 분산에서의 공유 갱신 방법)

  • 이윤호;김희열;정병천;이재원;윤현수
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.239-249
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs $O(n^2)$ modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less than img ${\frac{1}{2}}$ n-1 adversaries exist and they are static adversary.

A New Active RED Algorithm for Congestion Control in IP Networks (IP 네트워크에서 혼잡제어를 위한 새로운 Active RED 알고리즘)

  • Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.437-446
    • /
    • 2002
  • In order to reduce the increasing packet loss rates caused by an exponential increase in network traffic, the IETF (Internet Engineering Task Force) is considering the deployment of active queue management techniques such as RED (Random Early Detection). While active queue management in routers and gateways can potentially reduce packet loss rates in the Internet, this paper has demonstrated the inherent weakness of current techniques and shows that they are ineffective in preventing high loss rates. The inherent problem with these queue management algorithms is that they all use static parameter setting. So, in case where these parameters do not match the requirement of the network load, the performance of these algorithms can approach that of a traditional Drop-tail. In this paper, in order to solve this problem, a new active queue management algorithm called ARED (Active RED) is proposed. ARED computes the parameter based on our heuristic method. This algorithm can effectively reduce packet loss while maintaining high link utilizations.

A Plagiarism Detection Technique for Source Codes Considering Data Structures (데이터 구조를 고려한 소스코드 표절 검사 기법)

  • Lee, Kihwa;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.6
    • /
    • pp.189-196
    • /
    • 2014
  • Though the plagiarism is illegal and should be avoided, it still occurs frequently. Particularly, the plagiarism of source codes is more frequently committed than others since it is much easier to copy them because of their digital nature. To prevent code plagiarism, there have been reported a variety of studies. However, previous studies for plagiarism detection techniques on source codes do not consider the data structures although a source code consists both of data structures and algorithms. In this paper, a plagiarism detection technique for source codes considering data structures is proposed. Specifically, the data structures of two source codes are represented as sets of trees and compared with each other using Hungarian Method. To show the usefulness of this technique, an experiment has been performed on 126 source codes submitted as homework results in an object-oriented programming course. When both the data structures and the algorithms of the source codes are considered, the precision and the F-measure score are improved 22.6% and 19.3%, respectively, than those of the case where only the algorithms are considered.