• Title/Summary/Keyword: Addition Theorem

Search Result 116, Processing Time 0.029 seconds

A Study on Evaluation of Optimal Replacement Period by Reliability Prediction for the Door Control Relay of EMU (전동차 출입문제어 계전기의 신뢰도예측을 통한 적정 교체주기 연구)

  • Han, Jaehyun;Kim, JongWoon;Koo, JeongSeo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.7
    • /
    • pp.34-40
    • /
    • 2014
  • In this paper, we want to know the optimal replacement cycle(time) for this study was performed. The optimal preventive replacement age can be fond by finding the value of time that minimizes the cost function(model of Barlow and Jardine). In addition, The reliability of the relay according to the service environment were studied. The use of the exchange relay period is longer, and maintenance cost rate(per hour) may increase, and also the reliability may cause a decline. In addition, considering the preventive maintenance and purchase order, a representative relay(RAX-L440-A type) life was calculated.

Study on Risk Priority for TBM Tunnel Collapse based on Bayes Theorem through Case Study (사례분석을 통한 베이즈 정리 기반 TBM 터널 붕괴 리스크 우선순위 도출 연구)

  • Kwon, Kibeom;Kang, Minkyu;Hwang, Byeonghyun;Choi, Hangseok
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.6
    • /
    • pp.785-791
    • /
    • 2023
  • Risk management is essential for preventing accidents arising from uncertainties in TBM tunnel projects, especially concerning managing the risk of TBM tunnel collapse, which can cause extensive damage from the tunnel face to the ground surface. In addition, prioritizing risks is necessary to allocate resources efficiently within time and cost constraints. Therefore, this study aimed to establish a TBM risk database through case studies of TBM accidents and determine a risk priority for TBM tunnel collapse using the Bayes theorem. The database consisted of 87 cases, dealing with three accidents and five geological sources. Applying the Bayes theorem to the database, it was found that fault zones and weak ground significantly increased the probability of tunnel collapse, while the other sources showed low correlations with collapse. Therefore, the risk priority for TBM tunnel collapse, considering geological sources, is as follows: 1) Fault zone, 2) Weak ground, 3) Mixed ground, 4) High in-situ stress, and 5) Expansive ground. In practice, the derived risk priority can serve as a valuable reference for risk management, enhancing the safety and efficiency of TBM construction. It provides guidance for developing appropriate countermeasure plans and allocating resources effectively to mitigate the risk of TBM tunnel collapse.

Study on Capacity Analysis Methodology for Riverside Bike-Exclusive Road (하천변 자전거도로의 용량 분석 방법론 연구)

  • Jeon, Woo Hoon;Lee, Young-Ihn;Yang, Inchul
    • International Journal of Highway Engineering
    • /
    • v.18 no.6
    • /
    • pp.69-76
    • /
    • 2016
  • OBJECTIVES : The objective of this study is to propose a capacity analysis methodology for riverside bike-exclusive roads. METHODS : Three steps were performed to develop a methodology to estimate bikeway capacity. First, we reviewed previous studies on the vehicle-road capacity analysis and proposed their applicability to bikeways. Second, two assumptions were made based on the traffic flow characteristics of bikeways: (1) the capacitated state in bikeways occur within a bicycle platoon, and (2) a bicycle platoon consists of more than three bicycles running in close proximity. In addition, it is assumed that the mean time headway of a bicycle platoon represents the characteristics of the platoon. The normality of the mean-time headway of a bicycle platoon calculated using the central limit theorem leads to the development of a method that estimates the riverside bikeway capacity using data collected from two different riverside bike-exclusive roads (Han-river and Anyangcheon). We used a location-fixed video camera to record videos of running bicycles and wrote a special-purpose software program to code the time-headway data from the videos. RESULTS : Time headways from 189 bicycle platoons were analyzed. The estimated mean-time headway of the capacitated bicycle flow is 1.01 s, from which the capacity of the bikeway is found to be 3578 vehicles/h. CONCLUSIONS : The proposed method that estimates bikeway capacity could be applicable to the analysis of short-range congested area rather than planning the number of lanes. In other words, it determines the sections that are temporarily highly congested and proposes appropriate strategies to mitigate the congestion.

An Energy-Efficient Dynamic Area Compression Scheme in Wireless Multimedia Sensor Networks (무선 멀티미디어 센서 네트워크에서 에너지 효율적인 동적 영역 압축 기법)

  • Park, Junho;Ryu, Eunkyung;Son, Ingook;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.9-18
    • /
    • 2013
  • In recent years, the demands of multimedia data in wireless sensor networks have been significantly increased for the high-quality environment monitoring applications that utilize sensor nodes to collect multimedia data. However, since the amount of multimedia data is very large, the network lifetime and network performance are significantly reduced due to excessive energy consumption on particular nodes. In this paper, we propose an energy-efficient dynamic area compression scheme in wireless multimedia sensor networks. The proposed scheme minimizes the energy consumption in the huge multimedia data transmission process by compression using the Chinese Remainder Theorem(CRT) and dynamic area detection and division algorithm. Our experimental results show that our proposed scheme improves the data compression ratio by about 37% and reduces the amount of transmitted data by about 56% over the existing scheme on average. In addition, the proposed scheme increases network lifetime by about 14% over the existing scheme on average.

A Study on Shell Foundation Behaviour in Cohesionless Soil (사질토 지반에서 Shell 기초 거동에 대한 연구)

  • Kim, Sang-Hwan;Lee, Chung-Hwan;Choi, Chung-Sic
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.03a
    • /
    • pp.1144-1154
    • /
    • 2008
  • In this paper, the behaviour of shell foundation was studied. In order to perform this study, three studies such as theoretical, numerical and experimental programs were performed. In the theoretical program, the general shallow foundation theories and failure mechanism developed by Terzaghi, Mayerhof and others were reviewed and compared. Based on the previous shallow foundation behaviour, the shell foundation theory was developed using the upper boundary theorem. In the numerical study, the 2 and 3 dimensional FEM simulations were carried out using an uncoupled-analysis approach. From the analysis results, the adequate depth of shell foundation was evaluated. It was also evaluated the bearing capacity according to the shell angle ($120^{\circ}$, $90^{\circ}$, $60^{\circ}$). In the experimental study, the laboratory model tests were carried out for five cases of different foundation shapes including the rectangular and circular foundation in order to verify the theoretical and nemerical study. According to the results of this study, the bearing capacity of shell foundation was theoretically about 15% larger than that of general foundation. However, in the model test, the bearing capacity of shell foundation was about 25 to 30% larger than that of general foundation. In the case of shell angle, the maximum bearing capacity of shell foundation shows when the shell angle of foundation was $60^{\circ}$. In addition, Even if the shell foundation has the various advantages compared with the general foundations as described above, the practical verifications in full scale size will be necessary to use in the field and will be helpful in the technical development of other special foundations.

  • PDF

Dynamic Voltage Scaling Technique Considering Application Characteristics (응용 프로그램 특성을 고려한 동적 전압 조절 기법)

  • Cho, Young-Jin;Chang, Nae-Hyuck
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.12
    • /
    • pp.96-104
    • /
    • 2009
  • In the real system environments, the performance of the application is not linearly proportional to the clock frequency of the microprocessor, in contrast to the general assumption of conventional dynamic voltage scaling. In this paper, we analytically model the relation between the performance of the application and the clock frequency of the microprocessor, and introduce the energy-optimal scheduling algorithm for a task set with distinct application characteristics. In addition, we present a theorem for the energy-optimal scheduling, which the derivative of the energy consumption with respect to the execution time should be the same for all the tasks. The proposed scheduling algorithm always generates the energy-optimal scaling factor thanks to the theorem for energy-optimal scheduling. We achieved about 7% additional energy reduction in the experiments using synthetic task sets.

An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks

  • Zhao, Zhen;Chen, Jie;Zhang, Yueyu;Dang, Lanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4250-4267
    • /
    • 2015
  • Although many revocable group signature schemes has been proposed in vehicular ad hoc networks (VANETs), the existing schemes suffer from long computation delay on revocation that they cannot adapt to the dynamic VANETs. Based on Chinese remainder theorem and Schnorr signature algorithm, this paper proposes an efficient revocable group signature scheme in VANETs. In the proposed scheme, it only need to update the corresponding group public key when a member quits the group, and in the meanwhile the key pairs of unchanged group members are not influenced. Furthermore, this scheme can achieve privacy protection by making use of blind certificates. Before joining to the VANETs, users register at local trusted agencies (LTAs) with their ID cards to obtain blind certificates. The blind certificate will be submitted to road-side units (RSUs) to verify the legality of users. Thus, the real identities of users can be protected. In addition, if there is a dispute, users can combine to submit open applications to RSUs against a disputed member. And LTAs can determine the real identity of the disputed member. Moreover, since the key pairs employed by a user are different in different groups, attackers are not able to track the movement of users with the obtained public keys in a group. Furthermore, performance analysis shows that proposed scheme has less computation cost than existing schemes.

A Fast Method for Computing Multiplcative Inverses in GF(2$^{m}$ ) Using Normal Bases

  • 장용희;권용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.127-132
    • /
    • 2003
  • Cryptosystems have received very much attention in recent years as importance of information security is increased. Most of Cryptosystems are defined over finite or Galois fields GF($2^m$) . In particular, the finite field GF($2^m$) is mainly used in public-key cryptosystems. These cryptosystems are constructed over finite field arithmetics, such as addition, subtraction, multiplication, and multiplicative inversion defined over GF($2^m$) . Hence, to implement these cryptosystems efficiently, it is important to carry out these operations defined over GF($2^m$) fast. Among these operations, since multiplicative inversion is much more time-consuming than other operations, it has become the object of lots of investigation. Recently, many methods for computing multiplicative inverses at hi호 speed has been proposed. These methods are based on format's theorem, and reduce the number of required multiplication using normal bases over GF($2^m$) . The method proposed by Itoh and Tsujii[2] among these methods reduced the required number of times of multiplication to O( log m) Also, some methods which improved the Itoh and Tsujii's method were proposed, but these methods have some problems such as complicated decomposition processes. In practical applications, m is frequently selected as a power of 2. In this parer, we propose a fast method for computing multiplicative inverses in GF($2^m$) , where m = ($2^n$) . Our method requires fewer ultiplications than the Itoh and Tsujii's method, and the decomposition process is simpler than other proposed methods.

Theoretical formulation for calculating elastic lateral stiffness in a simple steel frame equipped with elliptic brace

  • Jouneghani, Habib Ghasemi;Fanaie, Nader;Haghollahi, Abbas
    • Steel and Composite Structures
    • /
    • v.45 no.3
    • /
    • pp.437-454
    • /
    • 2022
  • Elliptic-braced simple resisting frame as a new lateral bracing system installed in the middle bay of frame in building facades has been recently introduced. This system not only creates a problem for opening space from the architectural viewpoint but also improves the structural behavior. Despite the researches on the seismic performance of lateral bracing systems, there are few studies performed on the effect of the stiffness parameters on the elastic story drift and calculation of period in simple braced steel frames. To overcome this shortcoming, in this paper, for the first time, an analytical solution is presented for calculating elastic lateral stiffness in a simple steel frame equipped with elliptic brace subjected to lateral load. In addition, for the first time, in this study, a precise formulation has been developed to evaluate the elastic stiffness variation in a steel frame equipped with a two-dimensional single-story single-span elliptic brace using strain energy and Castigliano's theorem. Thus, all the effective factors, including axial and shear loads as well as bending moments of elliptic brace could be considered. At the end of the analysis, the lateral stiffness can be calculated by an improved and innovative relation through the energy method based on the geometrical properties of the employed sections and specification of the used material. Also, an equivalent element of an elliptic brace was presented for the ease of modeling and use in linear designs. Application of the proposed relation have been verified through a variety of examples in OpenSees software. Based on the results, the error percentage between the elastic stiffness derived from the developed equations and the numerical analyses of finite element models was very low and negligible.

The Design and Implementation to Teach Sampling Distributions with the Statistical Inferences (통계적 추론에서의 표집분포 개념 지도를 위한 시뮬레이션 소프트웨어 설계 및 구현)

  • Lee, Young-Ha;Lee, Eun-Ho
    • School Mathematics
    • /
    • v.12 no.3
    • /
    • pp.273-299
    • /
    • 2010
  • The purpose of the study is designing and implementing 'Sampling Distributions Simulation' to help students to understand concepts of sampling distributions. This computer simulation is developed to help students understand sampling distributions more easily. 'Sampling Distributions Simulation' consists of 4 sessions. 'The first session - Confidence level and confidence intervals - includes checking if the intended confidence level is actually achieved by the real relative frequency for the obtained sample confidence intervals containing population mean. This will give the students clearer idea about confidence level and confidence intervals in addition to the role of sampling distribution of the sample means among those. 'The second session - Sampling Distributions - helps understand sampling distribution of the sample means, through the simulation method to make comparison between the histogram of sampling distributions and that of the population. The third session - The Central Limit Theorem - includes calculating the means of the samples taken from a population which follows a uniform distribution or follows a Bernoulli distribution and then making the histograms of those means. This will provides comprehension of the central limit theorem, which mentions about the sampling distribution of the sample means when the sample size is very large. The forth session - the normal approximation to the binomial distribution - helps understand the normal approximation to the binomial distribution as an alternative version of central limit theorem. With the practical usage of the shareware 'Sampling Distributions Simulation', we expect students to have a new vision on the sampling distribution and to get more emphasis on it. With the sound understandings on the sampling distributions, more accurate and profound statistical inferences are expected. And the role of the sampling distribution in the inferences should be more deeply appreciated.

  • PDF