• Title/Summary/Keyword: Chen algorithm

Search Result 480, Processing Time 0.021 seconds

Modal parameter identification of civil structures using symplectic geometry mode decomposition

  • Feng Hu;Lunhai Zhi;Zhixiang Hu;Bo Chen
    • Wind and Structures
    • /
    • 제36권1호
    • /
    • pp.61-73
    • /
    • 2023
  • In this article, a novel structural modal parameters identification methodology is developed to determine the natural frequencies and damping ratios of civil structures based on the symplectic geometry mode decomposition (SGMD) approach. The SGMD approach is a new decomposition algorithm that can decompose the complex response signals with better decomposition performance and robustness. The novel method firstly decomposes the measured structural vibration response signals into individual mode components using the SGMD approach. The natural excitation technique (NExT) method is then used to obtain the free vibration response of each individual mode component. Finally, modal natural frequencies and damping ratios are identified using the direct interpolating (DI) method and a curve fitting function. The effectiveness of the proposed method is demonstrated based on numerical simulation and field measurement. The structural modal parameters are identified utilizing the simulated non-stationary responses of a frame structure and the field measured non-stationary responses of a supertall building during a typhoon. The results demonstrate that the developed method can identify the natural frequencies and damping ratios of civil structures efficiently and accurately.

Servo control strategy for uni-axial shake tables using long short-term memory networks

  • Pei-Ching Chen;Kui-Xing Lai
    • Smart Structures and Systems
    • /
    • 제32권6호
    • /
    • pp.359-369
    • /
    • 2023
  • Servo-motor driven uniaxial shake tables have been widely used for education and research purposes in earthquake engineering. These shake tables are mostly displacement-controlled by a digital proportional-integral-derivative (PID) controller; however, accurate reproduction of acceleration time histories is not guaranteed. In this study, a control strategy is proposed and verified for uniaxial shake tables driven by a servo-motor. This strategy incorporates a deep-learning algorithm named Long Short-Term Memory (LSTM) network into a displacement PID feedback controller. The LSTM controller is trained by using a large number of experimental data of a self-made servo-motor driven uniaxial shake table. After the training is completed, the LSTM controller is implemented for directly generating the command voltage for the servo motor to drive the shake table. Meanwhile, a displacement PID controller is tuned and implemented close to the LSTM controller to prevent the shake table from permanent drift. The control strategy is named the LSTM-PID control scheme. Experimental results demonstrate that the proposed LSTM-PID improves the acceleration tracking performance of the uniaxial shake table for both bare condition and loaded condition with a slender specimen.

Converting Panax ginseng DNA and chemical fingerprints into two-dimensional barcode

  • Cai, Yong;Li, Peng;Li, Xi-Wen;Zhao, Jing;Chen, Hai;Yang, Qing;Hu, Hao
    • Journal of Ginseng Research
    • /
    • 제41권3호
    • /
    • pp.339-346
    • /
    • 2017
  • Background: In this study, we investigated how to convert the Panax ginseng DNA sequence code and chemical fingerprints into a two-dimensional code. In order to improve the compression efficiency, GATC2Bytes and digital merger compression algorithms are proposed. Methods: HPLC chemical fingerprint data of 10 groups of P. ginseng from Northeast China and the internal transcribed spacer 2 (ITS2) sequence code as the DNA sequence code were ready for conversion. In order to convert such data into a two-dimensional code, the following six steps were performed: First, the chemical fingerprint characteristic data sets were obtained through the inflection filtering algorithm. Second, precompression processing of such data sets is undertaken. Third, precompression processing was undertaken with the P. ginseng DNA (ITS2) sequence codes. Fourth, the precompressed chemical fingerprint data and the DNA (ITS2) sequence code were combined in accordance with the set data format. Such combined data can be compressed by Zlib, an open source data compression algorithm. Finally, the compressed data generated a two-dimensional code called a quick response code (QR code). Results: Through the abovementioned converting process, it can be found that the number of bytes needed for storing P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can be greatly reduced. After GTCA2Bytes algorithm processing, the ITS2 compression rate reaches 75% and the chemical fingerprint compression rate exceeds 99.65% via filtration and digital merger compression algorithm processing. Therefore, the overall compression ratio even exceeds 99.36%. The capacity of the formed QR code is around 0.5k, which can easily and successfully be read and identified by any smartphone. Conclusion: P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can form a QR code after data processing, and therefore the QR code can be a perfect carrier of the authenticity and quality of P. ginseng information. This study provides a theoretical basis for the development of a quality traceability system of traditional Chinese medicine based on a two-dimensional code.

TPM 명령어 인가 프로토콜에 대한 내부자 공격 취약점 분석 및 대응책 (Vulnerability Analysis of Insider Attack on TPM Command Authorization Protocol and Its Countermeasure)

  • 오두환;최두식;김기현;오수현;하재철
    • 한국산학기술학회논문지
    • /
    • 제12권3호
    • /
    • pp.1356-1366
    • /
    • 2011
  • TPM(Trusted Platform Module)은 신뢰된 컴퓨팅 환경을 구성하기 위해 플랫폼 내부에 부착된 하드웨어 칩이다. TPM의 핵심 명령어들 중에서 정당한 사용자만이 TPM을 사용할 수 있도록 명령어에 대한 인가(authorization)가 선행되어야 한다. 즉, 사용자는 TPM 칩에게 명령어 인가를 받기 위해 OIAP(Object-Independent Authorization Protocol)이나 OSAP(Object-Specific Authorization Protocol) 프로토콜을 사용한다. 그러나 최근 Chen과 Ryan은 단일 플랫폼 내의 멀티유저 환경에서 내부 공격자가 TPM으로 위장하는 공격에 취약함을 밝히고 그 대응책으로 SKAP(Session Key Authorization Protocol) 프로토콜을 이론적으로 제안하였다. 본 논문에서는 실제 PC에 TPM 칩을 장착한 상태에서 OSAP에 대한 내부자 공격이 실제로 가능함을 인가 프로토콜 실험을 통해 확인하였다. 또한 이전의 대응 방법인 SKAP에서 명령어 구조 변경 및 대칭 키 암호 연산이 필요했던 점을 개선하여 보다 효과적인 내부자 공격 대응책을 제안하였다. 제안 프로토콜에서는 OSAP 명령어 체계만 간단히 수정하고 사용자 및 TPM 칩에서 각각 RSA 암 복호 연산 한번만 추가하면 내부자 공격을 막을 수 있다.

구조적 희소성 기반 압축 센싱 알고리즘을 통한 측면주사소나 영상의 비균일 잡음 제거 (Non-homogeneous noise removal for side scan sonar images using a structural sparsity based compressive sensing algorithm)

  • 진영생;구본화;이승호;김성일;고한석
    • 한국음향학회지
    • /
    • 제37권1호
    • /
    • pp.73-81
    • /
    • 2018
  • 측면주사소나 영상의 화질은 소나 운용 주파수의 영향을 받는다. 저주파 측면주사소나 장비로 얻는 영상은 저화질 영상이며, 잡음이 화질 저하의 요소 중 하나가 된다. 균일한 잡음을 가정하는 광학 영상과는 달리. 측면주사소나 데이터의 잡음은 해양 환경(장비 소음, 신호 간섭 등)에 의해 발생한다. 또한 소나 신호의 전달 손실을 보상하고자 시간변환이득(Time-Varied Gain, TVG)을 수행하며, 이로 인해 측면주사소나 영상에 비균일 잡음이 생성된다. 본 논문에서는 측면주사소나 영상에 포함된 비균일 잡음을 제거하는 구조적 희소성에 기반한 압축 센싱 알고리즘 (Structural Sparsity based Compressive Sensing, SSCS)을 제안한다. 영상의 구조적 특징 도메인에서 국부적 및 비국부적 모델링을 동시에 구현하여 계수의 희소성을 보장하면서 비국부적 자가 유사성을 강화한다. 그리고 잡음의 비균일성을 고려하여 비국부적 모델링을 보상한다. 다양한 모의 실험을 통해 제안한 알고리즘의 우수성을 입증한다.

Zoning Permanent Basic Farmland Based on Artificial Immune System coupling with spatial constraints

  • Hua, Wang;Mengyu, Wang;Yuxin, Zhu;Jiqiang, Niu;Xueye, Chen;Yang, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권5호
    • /
    • pp.1666-1689
    • /
    • 2021
  • The red line of Permanent Basic Farmland is the most important part in the "three-line" demarcation of China's national territorial development plan. The scientific and reasonable delineation of the red line is a major strategic measure being taken by China to improve its ability to safeguard the practical interests of farmers and guarantee national food security. The delineation of Permanent Basic Farmland zoning (DPBFZ) is essentially a multi-objective optimization problem. However, the traditional method of demarcation does not take into account the synergistic development goals of conservation of cultivated land utilization, ecological conservation, or urban expansion. Therefore, this research introduces the idea of artificial immune optimization and proposes a multi-objective model of DPBFZ red line delineation based on a clone selection algorithm. This research proposes an objective functional system consisting of these three sub-objectives: optimal quality of cropland, spatially concentrated distribution, and stability of cropland. It also takes into consideration constraints such as the red line of ecological protection, topography, and space for major development projects. The mathematical formal expressions for the objectives and constraints are given in the paper, and a multi-objective optimal decision model with multiple constraints for the DPBFZ problem is constructed based on the clone selection algorithm. An antibody coding scheme was designed according to the spatial pattern of DPBFZ zoning. In addition, the antibody-antigen affinity function, the clone mechanism, and mutation strategy were constructed and improved to solve the DPBFZ problem with a spatial optimization feature. Finally, Tongxu County in Henan province was selected as the study area, and a controlled experiment was set up according to different target preferences. The results show that the model proposed in this paper is operational in the work of delineating DPBFZ. It not only avoids the adverse effects of subjective factors in the delineation process but also provides multiple scenarios DPBFZ layouts for decision makers by adjusting the weighting of the objective function.

소프트웨어 개발인력 배치를 위한 수학적 업무 배정 방법 (A Mathematical Approach of Work Assignment for Human Resource in Software Development)

  • 진상;이상준;서성채;김병기
    • 디지털융복합연구
    • /
    • 제11권2호
    • /
    • pp.205-214
    • /
    • 2013
  • 애자일 개발방법론 기반의 소프트웨어 개발 프로젝트에서도 각광받고 있는 팀의 공동작업이 일반화되고 있다. 효율적인 팀워크는 보다 효과적인 팀 관리운영과 프로젝트의 성과 측면에서 매우 중요하다. 기존의 소프트웨어 개발 인력배치는 휴리스틱 방법을 사용하였지만 이를 보완하기 위한 알고리즘적 접근법도 필요하다. 본 논문에서는 팀워크 기반의 소프트웨어 개발 프로젝트에서 개발자의 인력 배치를 위한 수학적 접근 방안을 제안하였다. 제안한 방안은 6개의 프로세스로 구성되며, 각 프로세서에서의 활동을 수학적으로 정의하였고, 기능배치매트릭스를 사용하였다. 본 논문에서 제시한 접근방법의 유용성을 증명하기 위하여 사례 연구를 제시하였다. 본 논문은 그동안 직관적이나 경험적 방법으로 팀을 구성하는 방식에서 벗어나, 계량적인 논리에 의해 인적자원을 할당하는 수학적 접근방법을 개발하였다는데 큰 의의가 있다.

Generalized complex mode superposition approach for non-classically damped systems

  • Chen, Huating;Liu, Yanhui;Tan, Ping
    • Structural Engineering and Mechanics
    • /
    • 제73권3호
    • /
    • pp.271-286
    • /
    • 2020
  • Passive control technologies are commonly used in several areas to suppress structural vibrations by the addition of supplementary damping, and some modal damping may be heavy beyond critical damping even for regular structures with energy dissipation devices. The design of passive control structures is typically based on (complex) mode superposition approaches. However, the conventional mode superposition approach is predominantly applied to cases of under-critical damping. Moreover, when any modal damping ratio is equal or close to 1.0, the system becomes defective, i.e., a complete set of eigenvectors cannot be obtained such that some well-known algorithms for the quadratic eigenvalue problem are invalid. In this paper, a generalized complex mode superposition method that is suitable for under-critical, critical and over-critical damping is proposed and expressed in a unified form for structural displacement, velocity and acceleration responses. In the new method, the conventional algorithm for the eigenvalue problem is still valid, even though the system becomes defective due to critical modal damping. Based on the modal truncation error analysis, modal corrected methods for displacement and acceleration responses are developed to approximately consider the contribution of the truncated higher modes. Finally, the implementation of the proposed methods is presented through two numerical examples, and the effectiveness is investigated. The results also show that over-critically damped modes have a significant impact on structural responses. This study is a development of the original complex mode superposition method and can be applied well to dynamic analyses of non-classically damped systems.

Spherical Indentation 실험을 이용한 재료 소성 물성치 측정방법 (A Method of Measuring the Plastic Properties of Materials using Spherical Indentation)

  • 이광하;강윤식;;박대효
    • 한국전산구조공학회논문집
    • /
    • 제23권4호
    • /
    • pp.353-360
    • /
    • 2010
  • 본 논문에서는 단 한번 만의 간단한 구형 인덴테이션 임프레션 실험을 통하여 재료 소성 물성치를 측정함에 있어서 효율적인 알고리즘이 개발되었다. 본 논문에서는 레프리젠터티브 스트레인의 새로운 정의를 기반으로 연구가 수행되어 예전의 연구와 비교할 때 상당한 량의 피팅 매개변수의 개수를 줄이게 됨으로서 계산 량이 대폭 줄어들면서 연구가 쉽게 진행될 수 있었다. 또한 레프리젠터티브 스트레인에 대한 새로운 정의는 보다 명확한 물리적 임의를 부여하였다. 역 해석의 신뢰성을 증명하기 위하여 본 논문에서는 거의 모든 공학적 금속과 합금이 포함되는 재료 세트들을 사용하여 해석을 진행하였다. 수치 해석 모델링을 통하여 얻은 P-${\delta}$ 그래프를 바탕으로 하여 인덴테이션 반응 특성과 재료의 탄소성 물성치가 양 함수에 의하여 연계되었고, 역 해석방법을 적용시켜 재료의 항복응력과 power-law 경화 지수가 얻어진다. 마지막으로, 역 해석을 통하여 얻어진 재료 물성 치와 실제 실험을 통하여 얻어진 재료 물성치가 좋은 일치성을 가진다는 것을 보여준다.

HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere

  • Chen, Jiahui;Tang, Shaohua;Zhang, Xinglin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권6호
    • /
    • pp.3166-3187
    • /
    • 2017
  • For "generic" multivariate public key cryptography (MPKC) systems, experts believe that the Unbalanced Oil-Vinegar (UOV) scheme is a feasible signature scheme with good efficiency and acceptable security. In this paper, we address two problems that are to find inversion solution of quadratic multivariate equations and find another structure with some random Oil-Oil terms for UOV, then propose a novel signature scheme based on hyper-sphere (HS-Sign for short) which directly answers these two problems. HS-Sign is characterized by its adding Oil-Oil terms and more advantages compared to UOV. On the one side, HS-Sign is based on a new inversion algorithm from hyper-sphere over finite field, and is shown to be a more secure UOV-like scheme. More precisely, according to the security analysis, HS-Sign achieves higher security level, so that it has larger security parameters choice ranges. On the other side, HS-Sign is beneficial from both the key side and computing complexity under the same security level compared to many baseline schemes. To further support our view, we have implemented 5 different attack experiments for the security analysis and we make comparison of our new scheme and the baseline schemes with simulation programs so as to show the efficiencies. The results show that HS-Sign has exponential attack complexity and HS-Sign is competitive with other signature schemes in terms of the length of the message, length of the signature, size of the public key, size of the secret key, signing time and verification time.