• Title/Summary/Keyword: Additive Algorithm

Search Result 308, Processing Time 0.023 seconds

Analysis of Temperature Rise History Considering Construction Environments in Mass Concrete Structural Element (매스콘크리트 구조체의 주변환경을 고려한 온도이력 해석)

  • 이장화;변근주
    • Magazine of the Korea Concrete Institute
    • /
    • v.8 no.4
    • /
    • pp.191-199
    • /
    • 1996
  • Cracks occur in mass concrete structures during construction if temperature of the concrete due to heat of hydration is suddenly changed. The temperature is also changed after placement of mass concrete by construction environments on structures. However, methods which can analyze the temperature history of mass concrete considering the construction environments have not been developed yet. In this research, an algorithm and finite element analysis program is developed for the analysis of temperature rise history of mass concrete considering quantitatively heat transfer coefficient and construction environmental conditions such as climate conditions, curing conditions, forms and form removal, and additive curing. By comparing analysis results of the program with experimental data, other research data, and analysis results by a finite element program ADINAT, validity and accuracy of the program is verified.

Computational Design of Electrode Networks for Preferentially Aligned Short Fiber Composite Component Fabrication via Dielectrophoresis

  • Srisawadi, Sasitorn;Cormier, Denis R.;Harrysson, Ola L.A.;Modak, Sayantan
    • International Journal of CAD/CAM
    • /
    • v.12 no.1
    • /
    • pp.20-28
    • /
    • 2012
  • Finite Element Analysis (FEA) is often used to identify local stress/strain concentrations where a component is likely to fail. In order to reduce the degree of strain concentration, component thickness can be increased in those regions, or a stronger material can be used. In short fiber reinforced composite materials, strength and stiffness can be increased through proper fiber alignment. The field-aided microtailoring (FAiMTa) process is one promising method for doing this. FAiMTa uses principles of dielectrophoresis to preferentially align particles or fibers within a matrix. To achieve the preferred fiber orientation, an interdigitated electrode network must be integrated into the mold halves which can be fabricated by additive manufacturing (AM) processes. However, the process of determining the preferred fiber arrangements and electrode locations can be very challenging. This paper presents algorithms to semi-automate the interdigitated electrode design process. The algorithm has been implemented in the Solidworks CAD system and is demonstrated in this paper.

Development of Low Reynolds Number k-ε Model for Prediction of a Turbulent Flow with a Weak Adverse Pressure Gradient (약한 역압력구배의 난류유동장 해석을 위한 저레이놀즈수 k-ε 모형 개발)

  • Song, Kyoung;Cho, Kang Rae
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.5
    • /
    • pp.610-620
    • /
    • 1999
  • Recently, numerous modifications of low Reynolds number $k-{\epsilon}$ model have boon carried out with the aid of DNS data. However, the previous models made in this way are too intricate to be used practically. To overcome this shortcoming, a new low Reynolds number $k-{\epsilon}$ model has boon developed by considering the distribution of turbulent properties near the wall. This study proposes the revised a turbulence model for prediction of turbulent flow with adverse pressure gradient and separation. Nondimensional distance $y^+$ in damping functions is changed to $y^*$ and some terms modeled for one dimensional flow in $\epsilon$ equations are expanded into two or three dimensional form. Predicted results by the revised model show an acceptable agreement with DNS data and experimental results. However, for a turbulent flow with severe adverse pressure gradient, an additive term reflecting an adverse pressure gradient effect will have to be considered.

Optimal Harvest-Use-Store Design for Delay-Constrained Energy Harvesting Wireless Communications

  • Yuan, Fangchao;Jin, Shi;Wong, Kai-Kit;Zhang, Q.T.;Zhu, Hongbo
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.902-912
    • /
    • 2016
  • Recent advances in energy harvesting (EH) technology have motivated the adoption of rechargeable mobile devices for communications. In this paper, we consider a point-to-point (P2P) wireless communication system in which an EH transmitter with a non-ideal rechargeable battery is required to send a given fixed number of bits to the receiver before they expire according to a preset delay constraint. Due to the possible energy loss in the storage process, the harvest-use-and-store (HUS) architecture is adopted. We characterize the properties of the optimal solutions, for additive white Gaussian channels (AWGNs) and then block-fading channels, that maximize the energy efficiency (i.e., battery residual) subject to a given rate requirement. Interestingly, it is shown that the optimal solution has a water-filling interpretation with double thresholds and that both thresholds are monotonic. Based on this, we investigate the optimal double-threshold based allocation policy and devise an algorithm to achieve the solution. Numerical results are provided to validate the theoretical analysis and to compare the optimal solutions with existing schemes.

Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors

  • Zhang, Zhi;Wang, Dongyan;Wang, Chengyou;Zhou, Xiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4567-4587
    • /
    • 2017
  • With the growth of the Internet and the extensive applications of image editing software, it has become easier to manipulate digital images without leaving obvious traces. Copy-move is one of the most common techniques for image forgery. Image blind forensics is an effective technique for detecting tampered images. This paper proposes an improved copy-move forgery detection method based on the discrete cosine transform (DCT). The quantized DCT coefficients, which are feature representations of image blocks, are truncated using a truncation factor to reduce the feature dimensions. A method for judging whether two image blocks are similar is proposed to improve the accuracy of similarity judgments. The main transfer vectors whose frequencies exceed a threshold are found to locate the copied and pasted regions in forged images. Several experiments are conducted to test the practicability of the proposed algorithm using images from copy-move databases and to evaluate its robustness against post-processing methods such as additive white Gaussian noise (AWGN), Gaussian blurring, and JPEG compression. The results of experiments show that the proposed scheme effectively detects both copied region and pasted region of forged images and that it is robust to the post-processing methods mentioned above.

Error Resilience in Image Transmission Using LVQ and Turbo Coding

  • Hwang, Junghyeun;Joo, Sanghyun;Kikuchi, Hisakazu;Sasaki, Shigenobu;Muramatsu, Shogo;Shin, JaeHo
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.478-481
    • /
    • 2000
  • In this paper, we propose a joint coding system for still images using source coding and powerful error correcting code schemes. Our system comprises an LVQ (lattice vector quantization) source coding for wavelet transformed images and turbo coding for channel coding. The parameters of the image encoder and channel encoder have been optimized for an n-D (dimension) cubic lattice (D$_{n}$, Z$_{n}$), parallel concatenation fur two simple RSC (recursive systematic convolutional code) and an interleaver. For decoding the received image in the case of the AWGN (additive white gaussian noise) channel, we used an iterative joint source-channel decoding algorithm for a SISO (soft-input soft-output) MAP (maximum a posteriori) module. The performance of transmission system has been evaluated in the PSNR, BER and iteration times. A very small degradation of the PSNR and an improvement in BER were compared to a system without joint source-channel decoding at the input of the receiver.ver.

  • PDF

A Study on Noise Removal using Pixel Distribution of Local Mask in Degraded Image by AWGN (AWGN에 훼손된 영상에서 국부 마스크의 화소 분포를 이용한 잡음 제거에 관한 연구)

  • Kwon, Se-Ik;Hwang, Yeong-Yeun;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.933-935
    • /
    • 2015
  • Currently, image processing is being utilized in various fields and many studies on the image restoration is being progressed in order to eliminate the noise being generated during the process of transmitting, processing and storing of image. There are various types of noises included in the image according to the causes and types but AWGN is the most representative. In this paper, an algorithm was proposed which applies the variables differently according to the differences in surrounding pixels and central pixels within the local mask in order to mitigate the AWGN included in the image.

  • PDF

Multimedia Watermark Detection Algorithm Based on Bayes Decision Theory (Bayes 판단 이론 기반 멀티미디어 워터마크 검출 알고리즘)

  • 권성근;이석환;김병주;권기구;하인성;권기룡;이건일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7A
    • /
    • pp.695-704
    • /
    • 2002
  • Watermark detection plays a crucial role in multimedia copyright protection and has traditionally been tackled using correlation-based algorithms. However, correlation-based detection is not actually the best choice, as it does not utilize the distributional characteristics of the image being marked. Accordingly, an efficient watermark detection scheme for DWT coefficients is proposed as optimal for non-additive schemes. Based on the statistical decision theory, the proposed method is derived according to Bayes decision theory, the Neyman-Pearson criterion, and the distribution of the DWT coefficients, thereby minimizing the missed detection probability subject to a given false alarm probability. The proposed method was tested in the context of robustness, and the results confirmed the superiority of the proposed technique over conventional correlation-based detection method.

A Credit Card based Authentication and Key Exchange Protocol for Mobile Internet (무선 인터넷을 위한 신용카드 기반의 인증 및 키 교환 프로토콜)

  • 이현주;이충세
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1732-1742
    • /
    • 2003
  • WPP protocol based a Credit card payment in mobile Internet uses WTLS which is security protocol of WAP. WTLS can't provide End­to­End security in network. In this paper, we propose a protocol both independent in mobile Internet platform and allow a security between user and VASP using Mobile Gateway in AIP. In particular, our proposed protocol is suitable in mobile Internet, since session key for authentication and initial payment process is generated using Weil Diffie­Hellman key exchange method that use additive group algorithm on elliptic curve.

Compact-SQAM for Power & Bandwidth Algorithm of Output Error Method (전력 및 대역폭 효율적인 디지틀 전송 시스템을 위한 협대역 중첩 직교 변조 방식)

  • 박일근;서종수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.4
    • /
    • pp.519-529
    • /
    • 1993
  • A spectral and power efficient modulation technique, named Compact Superposed Quadrature Amplitude Modulation (Compact-SQAM), is introduced. The performance of Compact-SQAM system, in a Linearly and nonlinearly amplified single and multicarrier environment, in the presence of additive white Gaussian noise(AWGN), intersymbol interference(ISI), timing jitter and adjacent channel interference (ACI), is experimentally analyzed via computer simulation. Various channel conditions, such as channel spacing, between the main and adjacent channels and fade depth on the desired main channel, are examined. Our result shows that Compact-SQAM, and better P(e) performance that other modems using simple Butteroworth type postdetection receive filters. Especially, Compact-SQAM modem achieves higher efficiency of frequency utilization and better P(e) performance than other modems in the severly bandlimited nonlinear multicarrier channels.

  • PDF