• Title/Summary/Keyword: Algorithms and Procedures

Search Result 241, Processing Time 0.026 seconds

Algorithms for Determining the Geostationary Satellite Orbital Positions (정지궤도 위성의 궤도 선정을 위한 알고리즘)

  • Kim Soo-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.30 no.1
    • /
    • pp.177-185
    • /
    • 2005
  • We consider the optimization problem of the geostationary satellite orbital positions. which is very fundamental and important in setting up the new satellite launching plan. We convert the problem into a discrete optimization problem. However, the converted problem is too complex to find an optimal solution. Therefore, we develope the solution procedures using simulated annealing technique. The results of applying our method to some examples are reported.

Accuracy Enhancement in Direct & Adaptive Slicing of a Rotational Surface (회전곡면의 직접ㆍ적응 단면화에 있어서 정밀도 향상)

  • 박정환;신양호
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.1
    • /
    • pp.185-191
    • /
    • 2000
  • Direct & adaptive slicing of sculptured surfaces in RP improves, quality & accuracy of the final product, compared to the slicing with uniform layer thickness or the slicing of facets (ie, STL). Present D&A slicing procedures adaptively compute the next layer thickness based on the surface information of current sliced contour, which assumes constant normal curvature values. In some cases, however. such assumption leads to intolerable slicing result which cannot correctly consider the entire local feature shape. We propose improved adaptive slicing algorithms which can determine near-optimal layer thickness, including illustrated examples.

  • PDF

A Study on the Effectiveness of Computational Thinking Ability on Software Development (Computational Thinking 능력이 소프트웨어 개발에 미치는 영향에 관한 연구)

  • Park, Seongbean;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.5
    • /
    • pp.45-54
    • /
    • 2015
  • There has been rising demand within the South Korean government and among various industries in recent years on the need for strengthening the competitiveness of the software industry, which they highlight as being a core element for national competitiveness. This strategy would require enhancing the job competency of software developers. This study's results show that computational thinking (CT), which is one of the more creative solutions to the problem, has a positive effect on the enhancement of software developers' job competency. Furthermore, the study finds that the software development tasks of simulation, algorithms and procedures, and parallelization (in that order) serve as influential elements for software developers, which differs from previous studies' findings. The South Korean government thus should emphasize education in these areas in order to enhance the nation's job competence. Because simulation, especially, has the greatest influence among these areas, there is a particular need to strengthen that area.

Verification of Control System Algorithms for Compressed Gas Supply Facility in Launch Complex (발사대 고압가스공급설비 제어시스템 알고리즘 검증)

  • An, Jae-Chel;Moon, Kyung-Rok;Oh, Il-Seok
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.23 no.2
    • /
    • pp.95-103
    • /
    • 2019
  • Control systems of compressed gas supply facility are responsible for storing and supplying compressed gases required for launch complex qualification test and launch operation. Most of the facilities that make up the launch complex require compressed gas for their operation. Therefore, such control systems should be developed and verified earlier rather than the other systems that constitute the launch complex. Each verification for hardware and software is performed separately. In particular, software verification of control algorithms loaded on the controller takes a lot of time and man power during the development period of the control system. Thus, specific test procedures and methods should be prepared in advance for efficient development. This paper introduces the configuration of a compressed gas supply facility and its control system with the verification procedure and results of major algorithms.

Optimum Design of Steel Frames Using Genetic Algorithms (유전자 알고리즘을 이용한 강 뼈대 구조물의 최적설계)

  • 정영식;정석진
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.13 no.3
    • /
    • pp.337-349
    • /
    • 2000
  • Genetic Algorithms(GA) together with simulated annealing are often called methods of last resorts since they can be applicable to any kind of problems, particularly those to which no sophisticated procedures are applicable or feasible. The design of structures is primarily the process of selecting a section for each member from those available in the market, resulting in the problem of combinatorial nature. Therefore it is usual for the design space to include astronomical number of designs making the search in the space often impossible. In this work, Genetic Algorithms and some related technique are introduced and applied to the design of steel frameworks. In problems with a small number of design variables, GA found true global optima. GA also found true optima for the continuous variable test problems and proved their applicability to structural optimization. For those problems of real size, however, it appears to be difficult to expect GA to find optimum or even near optimum designs. The use of G bit improvement added to ordinary GA has shown much better results and draws attention for further research.

  • PDF

Active One-Way Ranging Method based on Post-Facto Wireless Synchronization in Wireless Sensor Networks (무선 센서망에서의 사후 무선동기 기반 능동형 단반향 거리추정 방식)

  • Nam, Yoon-Seok;Bae, Byoung-Chul
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.234-242
    • /
    • 2010
  • Two-way ranging methods such as TWR and SDS-TWR have been considered for many ranging systems because these methods are useful in the absence of synchronization. To estimate the location of a mobile node, complicated ranging procedures consisting of ranging frames between an anchor node and the mobile node are performed. Supporting multiple mobile nodes such as a few hundreds or thousands and several anchor nodes, the ranging procedures have the fatal disadvantage of processing delay and inefficient traffic bandwidth. On the other hand, the one-way ranging method is simple and fast, but susceptible to network synchronization. In this paper, we propose a method to modify asynchronous ranging equations to establish exact frequency or frequency offset, a method to estimate frequencies or frequency offsets, and a method to establish post-facto synchronization with anchor nodes. The synchronization for a node pair is adapted using instantaneous time information and corresponding difference of distances can be determined. We evaluate the performance of TWR, SDS-TWR and proposed ranging algorithms.

A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks

  • Lee, Myoung-Rak;Lee, Taek;Yoon, Byung-Sik;Kim, Hyo-Gon;In, Hoh Peter
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.626-633
    • /
    • 2009
  • Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

Aircraft wings dynamics suppression by optimal NESs designed through an Efficient stochastic linearisation approach

  • Navarra, Giacomo;Iacono, Francesco Lo;Oliva, Maria;Esposito, Antonio
    • Advances in aircraft and spacecraft science
    • /
    • v.7 no.5
    • /
    • pp.405-423
    • /
    • 2020
  • Non-linear energy sink (NES) is an emerging passive absorber able to mitigate the dynamic response of structures without any external energy supply, resonating with all the modes of the primary structure to control. However, its inherent non-linearities hinder its large-scale use and leads to complicated design procedures. For this purpose, an approximate design approach is herein proposed in a stochastic framework. Since loads are random in nature, the stochastic analysis of non-linear systems may be performed by means of computational intensive techniques such as Monte Carlo simulations (MCS). Alternatively, the Stochastic Linearisation (SL) technique has proven to be an effective tool to investigate the performance of different passive control systems under random loads. Since controlled systems are generally non-classically damped and most of SL algorithms operate recursively, the computational burden required is still large for those problems that make intensive use of SL technique, as optimal design procedures. Herein, a procedure to speed up the Stochastic Linearisation technique is proposed by avoiding or strongly reducing numerical evaluations of response statistics. The ability of the proposed procedure to effectively reduce the computational effort and to reliably design the NES is showed through an application on a well-known case study related to the vibrations mitigation of an aircraft wing.

The Development of Micro NCT for Micro Blanking/Punching of Thin Plates (미세박판가공을 위한 마이크로 NCT 제작에 관한 연구)

  • 홍남표;신용승;최근형;김병희;장인배;김헌영;오수익
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.1084-1087
    • /
    • 1997
  • In this paper, we developed the micro NCT system for punching the thin plates, which is driven is driven by the standalone type microprocessor. In order to adjust the alignment between the punch and die in-situ punching procedures, the non-contact type laser sensor for measuring the burr and micro-driving system for punching die with using the differential screw are developed. The height of burr in four directions in the punched hole of test specimen are measured, and the measured data are transferred to the personal computer by RS232C serial communication technology. In the personal computer, by using the graphic user interface type monitoring program and data handling procedures which includes the filtering algorithms, the direction and length of movement of the die position is decided and these data are transferred back to the microprocessor. The microprocessor drives the micro positioning stage based on these data. Even if this method is not a perfect solution for the in-situ alignment in micro punching, but this alignment methodology is accomplished in the same stage just after the punching that we hope to solve the alignment problem in the punching system based on this technology.

  • PDF

Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms

  • Salem, Asma;Sharieh, Ahmad;Sleit, Azzam;Jabri, Riad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4076-4092
    • /
    • 2019
  • Nowadays, most users access internet through mobile applications. The common way to authenticate users through websites forms is using passwords; while they are efficient procedures, they are subject to guessed or forgotten and many other problems. Additional multi modal authentication procedures are needed to improve the security. Behavioral authentication is a way to authenticate people based on their typing behavior. It is used as a second factor authentication technique beside the passwords that will strength the authentication effectively. Keystroke dynamic rhythm is one of these behavioral authentication methods. Keystroke dynamics relies on a combination of features that are extracted and processed from typing behavior of users on the touched screen and smart mobile users. This Research presents a novel analysis in the keystroke dynamic authentication field using two features categories: timing and no timing combined features. The proposed model achieved lower error rate of false acceptance rate with 0.1%, false rejection rate with 0.8%, and equal error rate with 0.45%. A comparison in the performance measures is also given for multiple datasets collected in purpose to this research.