• Title/Summary/Keyword: Dynamic Trust

Search Result 104, Processing Time 0.031 seconds

jerk characteristics through dynamic simulation of Linear induction motors (직선형 유도전동기의 동특성 시뮬레이션을 통한 저크의 특성 해석)

  • Jang, Seok-Myeong;You, Dae-Joon;Han, Hyung-Suk
    • Proceedings of the KIEE Conference
    • /
    • 2007.10c
    • /
    • pp.7-9
    • /
    • 2007
  • Generally, the dynamic parameters by dynamic simulation are calculated from an equivalent circuit parameters in design process. By performing dynamics of motors, it can be achieved design considering control pattern. In this paper, dynamic characteristics of LIM (Linear Induction Motors) is discussed using the new method of equivalent circuit parameters by field analysis. And the system response of VVVF(Variable Voltage Variable frequency) are presented for jerk characteristics represented as acceleration and deceleration by steep trust ripple.

  • PDF

Dynamic Characteristic Analysis of Air-Conditioning System Using Solar Energy (태양열 이용 공조시스템의 동특성 해석)

  • Kim, J.D.
    • Solar Energy
    • /
    • v.19 no.3
    • /
    • pp.75-83
    • /
    • 1999
  • The optimum drive control method have to be developed to exhibit the use object contributed trust, accuracy, amenity and energy save of product. To develop the optimum drive control method is, first, grasped the static characteristics for the entire system combined each element which consists the machine and performed the dynamic characteristics explanation based on the satisfied result which acquires at the static characteristics explanation. According to this explanation, the response of the system shows same characteristics tendency and the increasing same quantify comparing to response change of each element. So the dynamic response of the entire system shows different. Therefore this study performs the static and the dynamic characteristic explanation of entire system and each element for using air-conditioning system of solar energy based on the performed result from now on, so for application of this result.

  • PDF

Design and Dynamic Analysis of LDM by using FE Analysis (부하를 고려한 LDM의 동특성 해석에 관한 연구)

  • Kang, Gyu-Hong;Yeom, Sang-Bu;Hong, Jung-Pyo;Kim, Gyu-Tak;Jung, Joong-Gi;Ha, Kyeun-Su
    • Proceedings of the KIEE Conference
    • /
    • 1999.07a
    • /
    • pp.164-166
    • /
    • 1999
  • In this study, dynamic analysis of Linear DC motor has been performed. Dynamic characteristic is carried out from coupling the electrical circuit equation and mechanical kinetic equation. Trust constant and circuit parameters are obtained by FE analysis and static characteristic experiment. From the previous results, dynamic analysis is performed and the appropriateness of analysed result is verified by comparing with experimental result.

  • PDF

A Study on Secure Routing Technique using Trust Value and Key in MANET (신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.69-77
    • /
    • 2015
  • MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.

Efficient Approximation Method for Constructing Quadratic Response Surface Model

  • Park, Dong-Hoon;Hong, Kyung-Jin;Kim, Min-Soo
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.7
    • /
    • pp.876-888
    • /
    • 2001
  • For a large scaled optimization based on response surface methods, an efficient quadratic approximation method is presented in the context of the trust region model management strategy. If the number of design variables is η, the proposed method requires only 2η+1 design points for one approximation, which are a center point and tow additional axial points within a systematically adjusted trust region. These design points are used to uniquely determine the main effect terms such as the linear and quadratic regression coefficients. A quasi-Newton formula then uses these linear and quadratic coefficients to progressively update the two-factor interaction effect terms as the sequential approximate optimization progresses. In order to show the numerical performance of the proposed method, a typical unconstrained optimization problem and two dynamic response optimization problems with multiple objective are solved. Finally, their optimization results compared with those of the central composite designs (CCD) or the over-determined D-optimality criterion show that the proposed method gives more efficient results than others.

  • PDF

Progressive Quadratic Approximation Method for Effective Constructing the Second-Order Response Surface Models in the Large Scaled System Design (대형 설계 시스템의 효율적 반응표면 근사화를 위한 점진적 이차 근사화 기법)

  • Hong, Gyeong-Jin;Kim, Min-Su;Choe, Dong-Hun
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.12
    • /
    • pp.3040-3052
    • /
    • 2000
  • For effective construction of second-order response surface models, an efficient quad ratic approximation method is proposed in the context of trust region model management strategy. In the proposed method, although only the linear and quadratic terms are uniquely determined using 2n+1 design points, the two-factor interaction terms are mathematically updated by normalized quasi-Newton formula. In order to show the numerical performance of the proposed approximation method, a sequential approximate optimizer is developed and solves a typical unconstrained optimization problem having 2, 6, 10, 15, 30 and 50 design variables, a gear reducer system design problem and two dynamic response optimization problems with multiple objectives, five objectives for one and two objectives for the other. Finally, their optimization results are compared with those of the CCD or the 50% over-determined D-optimal design combined with the same trust region sequential approximate optimizer. These comparisons show that the proposed method gives more efficient than others.

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

A Study on e-CRM in Fashion Internet Shopping Mall -Comparing groups by gender- (패션 제품의 e-CRM에 관한 연구 (제2보) -성별의 조절 효과-)

  • 이지현;이승희;임숙자
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.7
    • /
    • pp.809-818
    • /
    • 2003
  • The purpose of this study was to identify importance of gender in dynamic relationship structure in fashion internet shopping mall and to provide marketers e-CRM marketing strategy. Out of 473 customers, 470 who had purchased fashion products in fashion Internet shopping mall were surveyed for this study. The data was analyzed by factor analysis, 1-test, correlation analysis, Structural Equation Model(SEM) using AMOS program. As the results, both men and women had ‘relationship maintenance intention’ in e-CRM. However, only women had ‘intention to discontinue relationship’, when shopping mall made mistakes to them. Also, in men's group, ‘service’ only had effect on ‘Trust’, while ‘service’and ‘financial benefit’ had effects on‘Trust’ in women's group. If women would be dissatisfied with a shopping mall, they have a strong intention to disconnect with it. Based on these results, it could be concluded that men have more tolerance for shopping mall's mistakes than women have. Therefore, the results of this study provide e-CRM marketing strategy for fashion internet marketers.

Research on Secure Coding and Weakness for Implementation of Android-based Dynamic Class Loading (안드로이드 동적 클래스 로딩 기법을 이용한 개발단계에서의 보안약점 및 시큐어 코딩 연구)

  • Kim, Hyunjo;Choi, Jin-Young
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.10
    • /
    • pp.1792-1807
    • /
    • 2016
  • Android application is vulnerable to reverse engineering attack. And by this, it is easy to extract significant module from source code and repackage it. To prevent this problem, dynamic class loading technique, which is able to exclude running code from distributed source code and is able to load running code dynamically during runtime can be used. Recently, this technique was adapted on variety of fields and applications like updating pre-loaded android application, preventing from repacking malicious application, etc. Despite the fact that this technique is used on variety of fields and applications, there is fundamental lack on the study of potential weakness or related secure coding. This paper would deal with potential weaknesses during the implementation of dynamic class loading technique with analysing related international/domestic standard of weaknesses and suggest a secure way for the implementation of dynamic class loading technique. Finally, we believe that this technique described here could increase the level of trust by decreasing the weakness related to dynamic class loading technique.

Development of A Omni-directional Flying Robot (전방향 소형비행로봇의 개발)

  • 이호길;원대희;박윤수;양광웅
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.302-305
    • /
    • 2003
  • In this paper, dynamic behaviors of a small-sized flying robot with 4 rotors propelled by DC motor are discussed, and a control scheme based on the dynamic model to make stable flying motions, i.e., hovering, take-off, cruising behavior, etc. is proposed. The experimental results via some flying tests show good performances for practical use. The flying robot with 6DOF is controlled only 4 DOF, and the rest of two DOF are remained under the dynamic constraints. How to give the stability of all positions and orientations and to make the omni-directional motions in spite of such restrictions is analyzed. The proposed control scheme composes of two stages. First, PD control inputs for the trust-force and orientation are calculated, next the control inputs are distributed to each rotor by using a sort of Jacobian matrix. To design and control of a low cost - small sized flying robot, vibrated gyro sensor, cheap accelerometer, IR, and ultra sonic sensors are selected.

  • PDF