• Title/Summary/Keyword: 유사동적

Search Result 691, Processing Time 0.032 seconds

정규모드 동역학을 활용한 비선형 진동

  • 박철희
    • Journal of KSNVE
    • /
    • v.7 no.1
    • /
    • pp.6-12
    • /
    • 1997
  • 물리계에서 일어나는 동적 현상들은 선형해석 만으로 설명하기에는 불충분한 점이 많이 있다. 이는 기계구조물과 같은 실제 계의 진동이 기하학적 비선형성, 강성 의 비선형성 또는 경계조건의 비선형성 등의 영향으로 비선형적인 거동을 하기 때문 이다. 비선형 진동을 하는 기계 계는 우리 주변에서 쉽게 찾아 볼 수 있는데, 그 예로써 진자운동을 포함하여 동흡진기, 회전체계, 공작기계의 절삭운동, 건마찰 (dry friction) 관련 기계장치, 치차 및 기차의 바퀴와 레일 간의 접촉에서 볼수 있는 구분적 선형(piecewise linear) 진동계, 충격 진동계 등을 들 수 있다. 비선형 진동 연구는 limit cycle, 준주기운동(quasiperiodic motion), 점프현상(jump phenomena) 등의 인식에서 시작되어, 과거에는 설명이 안되어 회피되 왔던 랜덤(random) 형태의 비주기운동에 대한 연구로 까지 발전하고 있다. 비선형 진동을 다루는데 있어서 정규모드(normal mode)를 이용하는 방법이 있다. 일반적으로 선형계는 선형 정규모드 (linear normal mode)가 존재하는 것과 같이 비선형계에도 이와 유사한 정규모드가 존재한다는 사실이 연구 보고된 바 있다. 비선형계에 존재하는 정규모드는 계의 매개 변수(system parameters)에 따라 그 안정성이 바뀔 수 있으며, 만일 안정한 정규모드 가 어떤 매개변수에서 그 안정성이 바뀐다면 선형이론으로는 설명될 수 없는 새로운 운동이 일어나고 이러한 운동을 분기모드(bifurcation mode)라고 한다. 안정한 정규 모드 및 분기모드를 포함하여 비선형계를 다류는 것을 "정규모드 동역학(normal mode dynamics)"이라고 한다. 정규모드 동역학은 앞에서 언급된 비선형 현상들의 원인규명, 예측, 안정성해석 및 강제진동 해석을 가능하게 한다. 또한 최근에 활발히 연구되고 있는 혼돈운동(chaotic motion)의 해석도 가능하다. 이 글에서는 비선형 진동해석을 위한 정규모드 동역학에 대한 연구동향 및 기본 이론을 살펴 보았고, 그 적용 예를 통하여 실험결과와 비교 고찰 함으로써 정규모드 동역학의 적용성을 서술하여 보았다. 선형이론으로 이해하기 어려운 현상들에 대하여는 비선형의 관점에서 새롭게 접근하 려는 노력이 필요하며 비선형 이론에 대한 연구가 지속적으로 진행되어야 한다. 진행되어야 한다.

  • PDF

Compensate Voltage Drop for Autotransformer-Fed AC Electric Railroad System with Single-Phase STATCOM (STATCOM을 이용한 교류 전기철도 급전시스템의 전압강하 보상)

  • 정현수;이승혁;김진오
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.16 no.5
    • /
    • pp.53-60
    • /
    • 2002
  • This paper presents exact autotransformer-fed AC electric railroad system modeling using constant current mode, and single-phase STATCOM(Static Synchronous Compensator) which has an effect on electric railroad system. An AC electric railroad is rapidly changing single-phase feeding electric power. To avoid voltage fluctuation under single phase loads, electric power should be received from a large source. The system modeling theory is based on the solution of algebraic. The AC electric railroad load model is nonlinear. Therefore this paper is considered nonlinear load using PSCAD/EMTDC. And the proposed modeling method is considered the line self-impedances and mutual-impedances that techniques for the AC electric railroad system modeling analysis, and that single-phase STATCOM can reliably compensate the voltage drop. In the case study, the allowance range of feeding voltage is 22.5∼27.5 kV, AT-fed AC electric railroad system circuit is analyzed by loop equation both normal and extension modes. The simulation objectives are to calculate the catenary and rail voltages with respect to ground, as the train moves along a section of line between two adjacent ATs. The results show that single-phase STATCOM can reduce the voltage drop in the feeding circuit and improve the power quality at AC electric railroad system by compensating the reactive power.

A Recommendation Procedure based on Intelligent Collaboration between Agents in Ubiquitous Computing Environments (유비쿼터스 환경에서 개체간의 자율적 협업에 기반한 추천방법 개발)

  • Kim, Jae-Kyeong;Kim, Hyea-Kyeong;Choi, Il-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.31-50
    • /
    • 2009
  • As the collected information which is static or dynamic is infinite in ubiquitous computing environments, information overload and invasion of privacy have been pressing issues in the recommendation service. In this study, we propose a recommendation service procedure through P2P, The P2P helps customer to obtain effective and secure product information because of communication among customers who have the similar preference about the products without connection to server. To evaluate the performance of the proposed recommendation service, we utilized real transaction and product data of the Korean mobile company which service character images. We developed a prototype recommender system and demonstrated that the proposed recommendation service makes an effect on recommending product in the ubiquitous environments. We expect that the information overload and invasion of privacy will be solved by the proposed recommendation procedure in ubiquitous environment.

  • PDF

Modal Analysis of Wind Turbine Blade Using Optical-Fiber Bragg-Grating Sensors (광섬유 브레그격자 센서를 이용한 풍력발전기 날개의 모드 해석)

  • Kim, Chang-Hwan;Paek, In-Su;Yoo, Neung-Soo;Nam, Yoon-Su
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.35 no.5
    • /
    • pp.513-516
    • /
    • 2011
  • The dynamic behavior of a small wind-turbine blade was analyzed experimentally. Arrays of fiber Bragg-Grating (FBG) sensors attached along the blade were used to measure the strains of the blade surface. An impact test was performed to estimate the resonance frequencies of the fundamental and higher modes of the cantilever blade system developed for this study. The results were similar to the results for conventional strain gages. However, FBG sensors could sense modes that strain gauges could not sense. The strains obtained from the FBG sensor array were used to estimate displacement-mode shapes of the blade.

Development of Simulation System For Real-Time Location Tracking In Global Shipping Logistics (글로벌 해운물류 실시간 위치 추적 시뮬레이션 시스템 개발)

  • Park, Byung-Kwon;Choi, Hyung-Rim;Kim, Chae-Soo;Lee, Kang-bae;Park, Min-Seon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1235-1242
    • /
    • 2015
  • In global shipping logistics, it is important for users to keep track of the location of their continuously moving cargos. Analyzing the GPS data stream coming from the tag which is attached to the cargo, we are able to keep track of the cargo location in terms of going into or out of a certain logistics area using the information of the spatial relationship change between the tag and the logistics area. In this paper, we propose a simulation system for measuring the precision and false alarm rate of the cargo location tracking algorithm which generates spatial events over the global logistics areas. Due to the difficulty of experiment with a real tag, we developed a tag emulator to create a virtual tag which operates exactly like a real tag. We show the cargo location tracking system works correctly with the tag emulator which communicates with it using the same protocol as the real tag.

A Study on the Recognition of Car Plate using an Enhanced Fuzzy ART Algorithm (개선된 퍼지 ART 알고리즘을 이용한 차량 번호판 인식에 관한 연구)

  • 임은경;김광백
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.5
    • /
    • pp.433-444
    • /
    • 2000
  • The recognition of car plate was investigated by means of the enhanced fuzzy ART algorithm. The morphological information of horizontal and vertical edges was used to extract a plate area from a car image. In addition, the contour tracking algorithm by utilizing the SOFM was applied to extract the specific area which includes characters from an extracted plate area. The extracted characteristic area was recognized by using the enhanced fuzzy ART algorithm. In this study we propose the novel fuzzy ART algorithm different from the conventional fuzzy ART algorithm by the dynamical establishment of the vigilance threshold which shows a tolerance limit of unbalance between voluntary and saved patterns for clustering. The extraction rate obtained by using the morphological information of horizontal and vertical edges showed better results than that from the color information of RGB and HSI. Furthermore, the recognition rate of the enhanced fuzzy ART algorithm was improved much more than that of the conventional fuzzy ART and SOFM algorithms.

  • PDF

A Realtime Malware Detection Technique Using Multiple Filter (다중 필터를 이용한 실시간 악성코드 탐지 기법)

  • Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.77-85
    • /
    • 2014
  • Recently, several environment damage caused by malicious or suspicious code is increasing. We study comprehensive response system actively for malware detection. Suspicious code is installed on your PC without your consent, users are unaware of the damage. Also, there are need to technology for realtime processing of Big Data. We must develope advanced technology for malware detection. We must analyze the static, dynamic of executable file for fundamentally malware detection in recently and verified by a reputation for verification. It is need to judgment of similarity for realtime response with big data. In this paper, we proposed realtime detection and verification technology using multiple filter. Our malware study suggests a new direction of realtime malware detection.

MPEG-2 Bit-Rate Control for Video Sequence Editing using Dynamic Macroblock Bit Assignment (압축 비디오시퀀스 편집을 위한 동적 매크로블럭 비트할당 MPEG-2 비트율 제어)

  • Kim, Ju-Do;Lee, Keun-Young
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.9
    • /
    • pp.63-69
    • /
    • 1998
  • In this paper, we propose a new Bit-Rate control algorithm based on bit usage matching to substitute encoded GOP(s) for new GOP(s) in MPEG-2 bitstream. It iteratively encodes current picture according to quantization value of previous picture and records bit-usage of each slice until nearly target bits are used. With target bits falling in two output bits, quantization value of slice should be changed to alleviate output bit error. We use recorded bit-usage information to decide which slices should be encoded with one quantization value and others with another. As every macroblock has different activity, we change macroblock quantization value using slice quantization value and activity value. The simulation results demonstrate that the fluctuation of the output bits can be kept within few-several tens of bits while maintaining the quality of the reconstructed pictures at a relatively stable level.

  • PDF

A Genetic Algorithm with Ageing chromosomes (나이를 먹는 염색채를 갖는 유전자 알고리즘)

  • 정성훈
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.16-24
    • /
    • 1997
  • This paper proposes a modified GA whose individuals have their own ages. Thus, a chromosome will die only when the age becomes zero, as a result, the population size of this method increases according to the generations. This helps a GA to preserve the good characteristics of a few chromosomes during several generations if the ages are evaluated with fitness values. As a result, the performance of the method is better than that of existing ones. A multi-modal function optimization problem is employed to simulate the performance of this method. To show the effective:~esso f ageing paradigm, three ageing evaluation methods are introduced. A paper whose itlea is similar to that of ours have been published in a conference. We also experimented a method that showed the best performance in the paper. Original simple GA was also experimented and the performance is compared with others. However, the perforniance of the previous method shows worse than that of our methods in some aspects because the previous method didn't take the fitness value into account in the selection process.

  • PDF

Malicious Attack Success Probability on the Change of Vulnerable Surfaces in MTD-SDR System (MTD-SDR 시스템의 취약요소 변경에 따른 악의적 공격 성공 확률)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.55-62
    • /
    • 2018
  • The MTD-based approach changes various operating parameters dynamically so that the vulnerability of the system can be protected from the malicious attack. In this paper, random/serial scanning/jamming attack success probabilities have been mathematically analyzed and verified through simulation to improve the security of the wireless communication systems in which the MTD-SDR technologies are applied. As a result, for random scanning attacks, attack success probability increases as the change period of transmission channel increases, while for random jamming attacks there is no change. The attack success probability patterns for serial attacks are similar to those of random attacks, but when the change period of transmission channel approaches to the total number of transmission channels, the success probability of serial attack is getting greater than that of random attack, up to twice in jamming attacks and up to 36% in scanning attacks.