• 제목/요약/키워드: 요소제거법

Search Result 256, Processing Time 0.032 seconds

Vibration Fatigue Analysis of Spot Welded Component considering Change of Stiffness due to Fatigue Damage (피로손상의 누적에 따른 강성변화를 고려한 점용접부의 진동피로해석)

  • Kang, Ki-Weon
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.1
    • /
    • pp.1-8
    • /
    • 2014
  • The purpose of this paper was to evaluate the fatigue life to apply the vibration fatigue analysis considering the stiffness change of the spot welding due to fatigue damage accumulation. For this, the mechanical and fatigue properties of base and spot welded standard specimens were obtained through the tensile and constant amplitude fatigue test. The transfer function of the spot-welded structure was obtained from the frequency response analysis and fatigue analyisis was performed under the condition of PSD=0.11. A vibration fatigue analysis that considered changes in the frequency response due to the fatigue damage that is, failure of some wleding point was conducted on spot-welded structure. The fatigue life of the spot-welded structure was determined by combining the transfer function, the S-N curve of the tensile-shear spot-welded joint and the input PSD.

Analysis of Dynamic Behavior and Balancing of High Speed Spindle (고속 스핀들의 동적거동과 밸런싱 해석)

  • Koo, Ja-Ham;Kwon, Soon-Goo;Kim, Jong-Soon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.238-244
    • /
    • 2017
  • A spindle with a built-in motor can be used to simplify the structure of a machine tool system, but the rotor inevitably has unbalanced mass. This paper presents an analysis of the dynamic behavior. The spindle was used in a CNC lathe and investigated using the finite element method and transfer matrices. The high-speed spindle can be very sensitive to the rotation of an unbalanced mass, which has a harmful effect on many machine tools. Thus, a balancing procedure was performed with a spindle-bearing system for the CNC lathe by numerical analysis. The balancing was performed through the influence coefficient method, and the whirl orbit radii before and after balancing were compared to evaluate the effects. The results show that the rotational speed of the spindle seriously affects the whirl responses of the spindle. The whirl responses were also affected by other factors, such as the unbalanced mass and bearing stiffness. The balancing of the assembled spindle model significantly reduced the whirl orbit magnitude.

Development of three-dimensional thermal oxidation simulator (3차원 산화 시뮬레이터 개발)

  • 이제희;윤상호;광태영
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.34D no.2
    • /
    • pp.38-45
    • /
    • 1997
  • In this paper, the three-dimensional stress effect of thermal oxide is simulated. We developed a three-dimensional finite element numerical simulator including three-dimensional adaptive mesh generator that is able to refine and eliminate nearby moving boundary of oxide, and oxidation solver with stress model. To investigate the behavior of thermal oxidation the simulations of thermal oxidation for island and hole structures are carried out assuming silicon wafer of <100> direction, temperature of $1000^{\circ}C$, oxidation time of 60min, wet ambient, initial oxide thickness of $300\AA$, and nitride thickness of $2, 000\AA$. The main effect of deformation at the corner area of oxide is due to distribution of oxidant, but the deformation of oxide is affected by the stressin theoxide. In the island structure which is the structure mostly covered with nitride and a coner is opended to oxidation, oxidation is reduced at the coner by compressive stress. In the hole structure which is the structure mostly opedned to oxide and a coner is convered with nitride, however, oxidation is increased at the coner by tensile stress.

  • PDF

RAiSE : A Graphical Process Modeling Language Providing Semantic Richness and Ease of Use (RAiSE :다양한 의미론과 사용의 용이성을 제공하는 그래픽 프로세스 모델링 언어)

  • Lee, Hyung-Won
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1007-1016
    • /
    • 2005
  • A key issue for process language design is balancing the need for semantic richness with the need for ease of use. Most process modeling languages fail to satisfy above two conflicting aspects, which is an impediment to the widespread adoption of process modeling languages in the software industry despite of a variety of software process language studies. This paper describes a process modeling language RAiSE attempting to resolve such problem and presents the result of applying RAiSE to a well-known benchmark process, ISPW-6 software process example. RAiSE provides rigorous, yet clear semantics through combing essential features in various modeling paradigms and defining them in a well-structured graphical notation. Process models represented in RAiSE are interpreted and enacted by process engine implemented using CLiPS, a rule based expert system tool.

A WDM Based Multichannel All-Optical Ring Network (파장 분할 다중화에 의한 다 채널 광 링 통신망의 성능 분석)

  • 박병석;강철신;신종덕;정제명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.1
    • /
    • pp.159-169
    • /
    • 1994
  • A multichannel optical slotted ring network is designed using a wavelength division multiplexing(WDM) technique and photonic packet switching devices. The electronics speed bottleneck is removed out of the ring, which allows utilization of the full bandwidth for the optical fiber transmission medium. The ring channel adopts a slotted ring concept with a destination cell remove strategy for the eing access mechanism. The slot size in the ring is selected as the same as that of ATM based cell in order to be used as B-ISDN Access Networks. In this paper, we devised a mathematical method to measure the average transfer delay characteristics of the network. The analytical method turned out to yield accurate results over a broad range of parameters in comparison to simulation results. From the study, we observed the average transfer delay of the network as the network parameters vary.

  • PDF

Initial Equilibrium State Analysis of Cable Stayed Bridges Considering Axial Deformation (축방향 변형을 고려한 사장교의 초기평형상태 해석)

  • Kim, Je Choon;Chang, Sung Pil
    • Journal of Korean Society of Steel Construction
    • /
    • v.14 no.4
    • /
    • pp.539-547
    • /
    • 2002
  • The study proposed the initial equilibrium state analysis method that considers axial deformation, in order to accurately determine the initial shape of a cable-stayed bridge. Sepecifically, the proposed method adopted the successive iteration method. In order to evaluate appropriate initial cable force introduced in the initial equilibrium state analysis, parametric studies were performed and a useful linear analysis method proposed. The geometrically nonlinear static behaviors of cable-stayed bridges were considered, using three-dimensional frame element and elastic catenary cable element. The usefulness and applicability of the analytic method proposed in this study were demonstrated using numerical examples, including a real cable-stayed bridge. The algorithm, is applicable in cases wherein axial deformation is not adopted in the fabrication camber, or final cable force is adjusted to eliminate construction and fabrication errors occurring during construction.

Design Equation Suggestion through Parametric Study of Laterally Restrained Concrete Decks with Steel Strap (Steel Strap으로 횡보강된 콘크리트 바닥판의 매개변수해석을 통한 설계식 제안)

  • Kim, Cheol-Hwan;Yi, Seong-Tae;Jo, Byung-Wan
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.18 no.3
    • /
    • pp.49-57
    • /
    • 2014
  • A deterioration of typical reinforced concrete (RC) bridge deck is due to the use of calcium chloride, cracks and water penetration inside of the deck slab with steel reinforcement. In order to eliminate the defects of RC decks in terms of material, therefore, the steel-strapped deck system is studied and developed by maximizing the arching effect while the girders are restrained using straps in lateral direction to the bridge. This parametric study was performed to analyze the structural characteristics of steel-strapped deck, and to identify the factors of the thickness, span length and lateral restraint stiffness of deck slab considering the concrete non-linearity. Finally, a design equation, which is adequate to South Korea, is suggested.

Cloth Modeling using Implicit Constraint Enforcement (묵시적 제한방법을 이용한 옷 모델링 방법)

  • Hong, Min;Lee, Seung-Hyun;Park, Doo-Soon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.516-524
    • /
    • 2008
  • This paper presents a new modeling technique for the simulation of cloth specific characteristics with a set of hard constraints using an implicit constraint enforcement scheme. A conventional explicit Baumgarte constraint stabilization method has several defects. It requires users to pick problem-dependent coefficients to achieve fast convergence and has inherent stabilization limits. The proposed implicit constraint enforcement method is stable with large time steps, does not require problem dependent feed-back parameters, and guarantees the natural physics-based motion of an object. In addition, its computational complexity is the same as the explicit Baumgarte method. This paper describes a formulation of implicit constraint enforcement and provides a constraint error analysis. The modeling technique for complex components of cloth such as seams, buttons, sharp creases, wrinkles, and prevention of excessive elongation are explained. Combined with an adaptive constraint activation scheme, the results using the proposed method show the substantial enhancement of the realism of cloth simulations with a corresponding savings in computational cost.

  • PDF

A Study on Cybersecurity Regulation for Financial Sector: Policy Suggestion based on New York's Cybersecurity Regulation (23 NYCRR 500) (국내 금융 사이버보안 규제의 국제경쟁력 제고를 위한 연구: 미(美) 뉴욕 주 금융 사이버보안 규정 (23 NYCRR 500)을 중심으로)

  • Kim, Docheol;Kim, Inseok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.87-107
    • /
    • 2018
  • In March 2017, the State of New York became the first state to implement regulation specific to cybersecurity for financial institutions. Unlike previous regulations regarding information security, it has set a minimum requirements to establish cybersecurity program based on risk assessment results, protect Nonpublic Information, designate of CISO, and report to regulatory entity. This paper presents a need for a new cybersecurity policy in Korea by examining newly adopted cybersecurity regulation in the United States. Finally, the paper identify policy suggestions based on the United States's approach as they have successfully implemented the program.

Research on the development of automated tools to de-identify personal information of data for AI learning - Based on video data - (인공지능 학습용 데이터의 개인정보 비식별화 자동화 도구 개발 연구 - 영상데이터기반 -)

  • Hyunju Lee;Seungyeob Lee;Byunghoon Jeon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.56-67
    • /
    • 2023
  • Recently, de-identification of personal information, which has been a long-cherished desire of the data-based industry, was revised and specified in August 2020. It became the foundation for activating data called crude oil[2] in the fourth industrial era in the industrial field. However, some people are concerned about the infringement of the basic rights of the data subject[3]. Accordingly, a development study was conducted on the Batch De-Identification Tool, a personal information de-identification automation tool. In this study, first, we developed an image labeling tool to label human faces (eyes, nose, mouth) and car license plates of various resolutions to build data for training. Second, an object recognition model was trained to run the object recognition module to perform de-identification of personal information. The automated personal information de-identification tool developed as a result of this research shows the possibility of proactively eliminating privacy violations through online services. These results suggest possibilities for data-based industries to maximize the value of data while balancing privacy and utilization.

  • PDF