• Title/Summary/Keyword: Bilinear Systems

Search Result 177, Processing Time 0.032 seconds

Ductility inverse-mapping method for SDOF systems including passive dampers for varying input level of ground motion

  • Kim, Hyeong-Gook;Yoshitomi, Shinta;Tsuji, Masaaki;Takewaki, Izuru
    • Earthquakes and Structures
    • /
    • v.3 no.1
    • /
    • pp.59-81
    • /
    • 2012
  • A ductility inverse-mapping method for SDOF systems including passive dampers is proposed which enables one to find the maximum acceleration of ground motion for the prescribed maximum response deformation. In the conventional capacity spectrum method, the maximum response deformation is computed through iterative procedures for the prescribed maximum acceleration of ground motion. This is because the equivalent linear model for response evaluation is described in terms of unknown maximum deformation. While successive calculations are needed, no numerically unstable iterative procedure is required in the proposed method. This ductility inverse-mapping method is applied to an SDOF model of bilinear hysteresis. The SDOF models without and with passive dampers (viscous, viscoelastic and hysteretic dampers) are taken into account to investigate the effectiveness of passive dampers for seismic retrofitting of building structures. Since the maximum response deformation is the principal parameter and specified sequentially, the proposed ductility inverse-mapping method is suitable for the implementation of the performance-based design.

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

Adaptive Cone-Kernel Time-Frequency Distribution for Analyzing the Pipe-Thinning in the Secondary Systems of NPP (원전 이차계통 파이프 감육상태 분석를 위한 적응 콘-커널 시간-주파수 분포함수)

  • Kim, Jung-Taek;Lee, Sang-Jeong;Lee, Cheol-Kwon
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.3
    • /
    • pp.131-137
    • /
    • 2006
  • The secondary system of nuclear power plants consists of sophisticated piping systems operating in very aggressive erosion and corrosion environments, which make a piping system vulnerable to the wear and degradation due to the several chemical components and high flow rate (~10 m/sec) of the coolant. To monitor the wear and degradation on a pipe, the vibration signals are measured from the pipe with an accelerometer For analyzing the vibration signal the time-frequency analysis (TFA) is used, which is known to be effective for the analysis of time-varying or transient signals. To reduce the inteferences (cross-terms) due to the bilinear structure of the time-frequency distribution, an adaptive cone-kernel distribution (ACKD) is proposed. The cone length of ACKD to determine the characteristics of distribution is optimally selected through an adaptive algorithm using the normalized Shannon's entropy And the ACKD's are compared with the results of other analyses based on the Fourier Transform (FT) and other TFA's. The ACKD shows a better signature for the wear/degradation within a pipe and provides the additional information in relation to the time that any analysis based on the conventional FT can not provide.

A novel approach to damage localisation based on bispectral analysis and neural network

  • Civera, M.;Fragonara, L. Zanotti;Surace, C.
    • Smart Structures and Systems
    • /
    • v.20 no.6
    • /
    • pp.669-682
    • /
    • 2017
  • The normalised version of bispectrum, the so-called bicoherence, has often proved a reliable method of damage detection on engineering applications. Indeed, higher-order spectral analysis (HOSA) has the advantage of being able to detect non-linearity in the structural dynamic response while being insensitive to ambient vibrations. Skewness in the response may be easily spotted and related to damage conditions, as the majority of common faults and cracks shows bilinear effects. The present study tries to extend the application of HOSA to damage localisation, resorting to a neural network based classification algorithm. In order to validate the approach, a non-linear finite element model of a 4-meters-long cantilever beam has been built. This model could be seen as a first generic concept of more complex structural systems, such as aircraft wings, wind turbine blades, etc. The main aim of the study is to train a Neural Network (NN) able to classify different damage locations, when fed with bispectra. These are computed using the dynamic response of the FE nonlinear model to random noise excitation.

Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email

  • Alhumaidi, Hind;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.212-222
    • /
    • 2022
  • There has been a rapid increase in the use of cloud email services. As a result, email encryption has become more commonplace as concerns about cloud privacy and security grow. Nevertheless, this increase in usage is creating the challenge of how to effectively be searching and filtering the encrypted emails. They are popular technologies of solving the issue of the encrypted emails searching through searchable public key encryption. However, the problem of encrypted email filtering remains to be solved. As a new approach to finding and filtering encrypted emails in the cloud, we propose a ciphertext-based encrypted policy attribute-based encryption scheme and keyword search procedure based on hidden policy ciphertext. This feature allows the user of searching using some encrypted emails keywords in the cloud as well as allowing the emails filter-based server toward filter the content of the encrypted emails, similar to the traditional email keyword filtering service. By utilizing composite order bilinear groups, a hidden policy system has been successfully demonstrated to be secure by our dual system encryption process. Proposed system can be used with other scenarios such as searching and filtering files as an applicable method.

Seismic performance-based optimal design approach for structures equipped with SATMDs

  • Mohebbi, Mohtasham;Bakhshinezhad, Sina
    • Earthquakes and Structures
    • /
    • v.22 no.1
    • /
    • pp.95-107
    • /
    • 2022
  • This paper introduces a novel, rigorous, and efficient probabilistic methodology for the performance-based optimal design (PBOD) of semi-active tuned mass damper (SATMD) for seismically excited nonlinear structures. The proposed methodology is consistent with the modern performance-based earthquake engineering framework and aims to design reliable control systems. To this end, an optimization problem has been defined which considers the parameters of control systems as design variables and minimization of the probability of exceeding a targeted structural performance level during the lifetime as an objective function with a constraint on the failure probability of stroke length damage state associated with mass damper mechanism. The effectiveness of the proposed methodology is illustrated through a numerical example of performance analysis of an eight-story nonlinear shear building frame with hysteretic bilinear behavior. The SATMD with variable stiffness and damping have been designed separately with different mass ratios. Their performance has been compared with that of uncontrolled structure and the structure controlled with passive TMD in terms of probabilistic demand curves, response hazard curves, fragility curves, and exceedance probability of performance levels during the lifetime. Numerical results show the effectiveness, simplicity, and reliability of the proposed PBOD method in designing SATMD with variable stiffness and damping for the nonlinear frames where they have reduced the exceedance probability of the structure up to 49% and 44%, respectively.

Super Resolution based on Reconstruction Algorithm Using Wavelet basis (웨이브렛 기저를 이용한 초해상도 기반 복원 알고리즘)

  • Baek, Young-Hyun;Byun, Oh-Sung;Moon, Sung-Ryong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.1
    • /
    • pp.17-25
    • /
    • 2007
  • In most electronic imaging applications, image with high resolution(HR) are desired. HR means that pixel density within an image is high, and therefore HR image can offer more details that may be critical in various applications. Digital images that are captured by CCD and CMOS cameras usually have a very low resolution, which significantly limits the performance of image recognition systems. Image super-resolution techniques can be applied to overcome the limits of these imaging systems. Super-resolution techniques have been proposed to increase the resolution by combining information from multiple images. To techniques were consisted of the registration algorithm for estimation and shift, the nearest neighbor interpolation using weight of acquired frames and presented frames. In this paper, it is proposed the image interpolation techniques using the wavelet base function. This is applied to embody a correct edge image and natural image when expend part of the still image by applying the wavelet base function coefficient to the conventional Super-Resolution interpolation method. And the proposal algorithm in this paper is confirmed to improve the image applying the nearest neighbor interpolation algorithm, bilinear interpolation algorithm.,bicubic interpolation algorithm through the computer simulation.

Nonlinear stochastic optimal control strategy of hysteretic structures

  • Li, Jie;Peng, Yong-Bo;Chen, Jian-Bing
    • Structural Engineering and Mechanics
    • /
    • v.38 no.1
    • /
    • pp.39-63
    • /
    • 2011
  • Referring to the formulation of physical stochastic optimal control of structures and the scheme of optimal polynomial control, a nonlinear stochastic optimal control strategy is developed for a class of structural systems with hysteretic behaviors in the present paper. This control strategy provides an amenable approach to the classical stochastic optimal control strategies, bypasses the dilemma involved in It$\hat{o}$-type stochastic differential equations and is applicable to the dynamical systems driven by practical non-stationary and non-white random excitations, such as earthquake ground motions, strong winds and sea waves. The newly developed generalized optimal control policy is integrated in the nonlinear stochastic optimal control scheme so as to logically distribute the controllers and design their parameters associated with control gains. For illustrative purposes, the stochastic optimal controls of two base-excited multi-degree-of-freedom structural systems with hysteretic behavior in Clough bilinear model and Bouc-Wen differential model, respectively, are investigated. Numerical results reveal that a linear control with the 1st-order controller suffices even for the hysteretic structural systems when a control criterion in exceedance probability performance function for designing the weighting matrices is employed. This is practically meaningful due to the nonlinear controllers which may be associated with dynamical instabilities being saved. It is also noted that using the generalized optimal control policy, the maximum control effectiveness with the few number of control devices can be achieved, allowing for a desirable structural performance. It is remarked, meanwhile, that the response process and energy-dissipation behavior of the hysteretic structures are controlled to a certain extent.

Fragility analysis of R/C frame buildings based on different types of hysteretic model

  • Borekci, Muzaffer;Kircil, Murat S.
    • Structural Engineering and Mechanics
    • /
    • v.39 no.6
    • /
    • pp.795-812
    • /
    • 2011
  • Estimation of damage probability of buildings under a future earthquake is an essential issue to ensure the seismic reliability. Fragility curves are useful tools for showing the probability of structural damage due to earthquakes as a function of ground motion indices. The purpose of this study is to compare the damage probability of R/C buildings with low and high level of strength and ductility through fragility analysis. Two different types of sample buildings have been considered which represent the building types mentioned above. The first one was designed according to TEC-2007 and the latter was designed according to TEC-1975. The pushover curves of sample buildings were obtained via pushover analyses. Using 60 ground motion records, nonlinear time-history analyses of equivalent single degree of freedom systems were performed using bilinear hysteretic model and peak-oriented hysteretic model with stiffness - strength deterioration for each scaled elastic spectral displacement. The damage measure is maximum inter-story drift ratio and each performance level considered in this study has an assumed limit value of damage measure. Discrete damage probabilities were calculated using statistical methods for each considered performance level and elastic spectral displacement. Consequently, continuous fragility curves have been constructed based on the lognormal distribution assumption. Furthermore, the effect of hysteresis model parameters on the damage probability is investigated.

New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing

  • Zhang, Leyou;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1343-1356
    • /
    • 2013
  • Cloud computing has emerged as perhaps the hottest development in information technology at present. This new computing technology requires that the users ensure that their infrastructure is safety and that their data and applications are protected. In addition, the customer must ensure that the provider has taken the proper security measures to protect their information. In order to achieve fine-grained and flexible access control for cloud computing, a new construction of hierarchical attribute-based encryption(HABE) with Ciphertext-Policy is proposed in this paper. The proposed scheme inherits flexibility and delegation of hierarchical identity-based cryptography, and achieves scalability due to the hierarchical structure. The new scheme has constant size ciphertexts since it consists of two group elements. In addition, the security of the new construction is achieved in the standard model which avoids the potential defects in the existing works. Under the decision bilinear Diffie-Hellman exponent assumption, the proposed scheme is provable security against Chosen-plaintext Attack(CPA). Furthermore, we also show the proposed scheme can be transferred to a CCA(Chosen-ciphertext Attack) secure scheme.