• Title/Summary/Keyword: Elliptic Model

Search Result 176, Processing Time 0.021 seconds

Incompressible Viscous Flow Analysis around a High-Speed Train Including Cross-Wind Effects (측풍영향을 고려한 고속전철 주위의 비압축성 점성 유동 해석)

  • Jung Y. R.;Park W. G.;Kim H. W.;Ha S. D.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.55-63
    • /
    • 1995
  • The flow field around a high-speed train including cross-wind effects has been simulated. This study solves 3-D unsteady incompressible Navier-Stokes equations in the inertial frame using the iterative time marching scheme. The governing equations are differenced with 1st-order accurate backward difference scheme for the time derivatives, 3th-order accurate QUICK scheme for the convective terms and 2nd-order accurate central difference scheme for the viscous terms. The Marker-and-Cell concept was applied to efficiently solve continuity equation, which is differenced with 2nd-order accurate central difference scheme. The 4th-order artificial damping is added to the continuity equation for numerical stability. A C-H type of elliptic grid system is generated around a high-speed train including ground. The Baldwin-Lomax turbulent model was implemented to simulate the turbulent flows. To validate the present procedure, the flow around a high speed train at constant yaw angle of $45^{\circ}\;and\;90^{\circ}$ has been simulated. The simulation shows 3-D vortex generation in the lee corner. The flow separation is also observed around the rear of the train. It has concluded that the results of present study properly agree with physical flow phenomena.

  • PDF

Film Cooling by a Row of Jets in a Gas Turbine Blade (가스터빈블레이드에서 일렬의 제트에 의한 막냉각특성 연구)

  • 이용덕;이재헌
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.7
    • /
    • pp.1851-1865
    • /
    • 1994
  • The objective of the present study is to predict the film cooling effectiveness by a row of holes at various injection ratios and injection angles. Numerical calculations have been performed to investigate the characteristics of flow and temperature distributions in a region near the down-stream of injection hole including the region of adverse pressure gradient. The elliptic turbulent 3-dimensional governing equations with variable thermal properties using the low-Reynolds number k-$\bar{varepsilon}$ model was solved by SIMPLE algorithm. The results showed that the presence of adverse pressure gradient and secondary vortex in the region near the downstream of injection hole induces large temperature gradent. The $45^{\circ}$ injection has higher averaged film cooling effectiveness than $60^{\circ}$ injection. But neverthless the $90^{\circ}$ injection has greater deviation from a flat plate than $45^{\circ}$ and $60^{\circ}$ injection, the $90^{\circ}$ injection has higher averaged film cooling effectiveness than $45^{\circ}$ and $60^{\circ}$ injection in the region near the downstream of injection hole.

Analysis of Certificateless Signcryption Schemes and Construction of a Secure and Efficient Pairing-free one based on ECC

  • Cao, Liling;Ge, Wancheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4527-4547
    • /
    • 2018
  • Signcryption is a cryptographic primitive that provides authentication (signing) and confidentiality (encrypting) simultaneously at a lower computational cost and communication overhead. With the proposition of certificateless public key cryptography (CLPKC), certificateless signcryption (CLSC) scheme has gradually become a research hotspot and attracted extensive attentions. However, many of previous CLSC schemes are constructed based on time-consuming pairing operation, which is impractical for mobile devices with limited computation ability and battery capacity. Although researchers have proposed pairing-free CLSC schemes to solve the issue of efficiency, many of them are in fact still insecure. Therefore, the challenging problem is to keep the balance between efficiency and security in CLSC schemes. In this paper, several existing CLSC schemes are cryptanalyzed and a new CLSC scheme without pairing based on elliptic curve cryptosystem (ECC) is presented. The proposed CLSC scheme is provably secure against indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) and existential unforgeability under adaptive chosen-message attack (EUF-CMA) resting on Gap Diffie-Hellman (GDH) assumption and discrete logarithm problem in the random oracle model. Furthermore, the proposed scheme resists the ephemeral secret leakage (ESL) attack, public key replacement (PKR) attack, malicious but passive KGC (MPK) attack, and presents efficient computational overhead compared with the existing related CLSC schemes.

An Optimal Design of Notch Shape of IPM BLDC Motor Using the Differential Evolution Strategy Algorithm (차분진화 알고리즘을 이용한 IPM형 BLDC전동기의 Notch 형상 최적화 설계 연구)

  • Shin, Pan Seok;Kim, Hong Uk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.2
    • /
    • pp.279-285
    • /
    • 2016
  • In this paper, a cogging torque of IPM(Interior Permanent Magnet)-type BLDC motor is analyzed by FE program and the optimized notch on the rotor surface is designed to minimize the torque ripple. A differential evolution strategy algorithm and a response surface method are employed to optimize the rotor notch. In order to verify the proposed algorithm, an IPM BLDC motor is used, which is 50 kW, 8 poles, 48 slots and 1200 rpm at the rated speed. Its characteristics of the motor is calculated by FE program and 4 design variables are set on the rotor notch. The initial shape of the notch is like a non-symmetric half-elliptic and it is optimized by the developed algorithm. The cogging torque of the final model is reduced to $1.5[N{\cdot}m]$ from $5.2[N{\cdot}m]$ of the initial, which is about 71 % reduction. Consequently, the proposed algorithm for the cogging torque reduction of IPM-type BLDC motor using the rotor notch design seems to be very useful to a mechanical design for reducing noise and vibration.

A WTLS Handshake protocol against Active Attack (능동적 공격에 안전한 WTLS Handshake 프로토콜)

  • Han, Jong-Soo;Jung, Young-Seok;An, Ki-Bum;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.113-127
    • /
    • 2003
  • WTLS as secure protocol of WAP makes TLS that is used in wireless Intemet protocol for TCP security be appropriate for wireless environments. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of 4 protocols(Handshake, ChangeCipherSpec, Alert, Application Data etc.). In this papers we analyze properties of Handshake protocol and procedures of establishing master secret in detail. And then we analyze securities against several attacker models with them for a basis. Also we propose new Handshake protocol that is secure against active attacker model and can provide various security services.

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

Effectiveness of Wave Resonator for Secondary Undulation under Real Sea Conditions (실해역에서 공진장치를 이용한 부진동의 제어)

  • Jeong, Jin-Woo;Kim, Do-Sam;Park, Jong-Bae;An, Sung-Wook
    • Journal of Ocean Engineering and Technology
    • /
    • v.24 no.6
    • /
    • pp.51-60
    • /
    • 2010
  • In this study, the performance evaluation of a conventional wave resonator at the entrance of a port or a pier against secondary undulation has been performed using 2D hydrodynamic modeling within port. A wave resonator has been designed for the attenuation of the secondary undulation induced by the long-periodic waves. The controlled performance of the wave resonator has been numerically investigated for CGWAVE MODULE of finite-element model of SMS (Surface water Modeling System) based on the elliptic mild-slope wave equation. SMS was verified though the comparisons with analytical solution performed by Ippen and Goda (1963). Also, It was confirmed that a wave resonator of a rectangular model harbor is effective enough to control the secondary undulation when it compares variation of water level with the case of no resonance system. From the above results, amplification phenomenon induced by long-period waves transferred from 1900 sec to 2100 sec when it applied a wave resonator in Busan Gamcheon Port which is a deep-sea. And it was confirmed that a wave resonator of Pohang New Port attenuates largely long-period waves which are within the range of 300 sec induced by long-period motion of the moored ship.

Study on Optimization of Fatigue Damage Calculation Process Using Spectrum (스펙트럼을 이용한 피로손상도 계산과정 최적화 연구)

  • Kim, Sang Woo;Lee, Seung Jae;Choi, Sol Mi
    • Journal of Ocean Engineering and Technology
    • /
    • v.32 no.3
    • /
    • pp.151-157
    • /
    • 2018
  • Offshore structures are exposed to low- and high-frequency responses due to environmental loads, and fatigue damage models are used to calculate the fatigue damage from these. In this study, we tried to optimize the main parameters used in fatigue damage calculation to derive a new fatigue damage model. A total of 162 bi-modal spectra using the elliptic equation were defined to describe the response of offshore structures. To calculate the fatigue damage from the spectra, time series were generated from the spectra using the inverse Fourier transform, and the rain-flow counting method was applied. The considered optimization variables were the size of the frequency increments, ratio of the time increment, and number of repetitions of the time series. In order to obtain optimized values, the fatigue damage was calculated using the parameter values proposed in previous work, and the fatigue damage was calculated by increasing or decreasing the proposed values. The results were compared, and the error rate was checked. Based on the test results, new values were found for the size of the frequency increment and number of time series iterations. As a validation, the fatigue damage of an actual tension spectrum found using the new proposed values and fatigue damage found using the previously proposed method were compared. In conclusion, we propose a new optimized calculation process that is faster and more accurate than the existed method.

SURFACE RECONSTRUCTION FROM SCATTERED POINT DATA ON OCTREE

  • Park, Chang-Soo;Min, Cho-Hon;Kang, Myung-Joo
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.16 no.1
    • /
    • pp.31-49
    • /
    • 2012
  • In this paper, we propose a very efficient method which reconstructs the high resolution surface from a set of unorganized points. Our method is based on the level set method using adaptive octree. We start with the surface reconstruction model proposed in [20]. In [20], they introduced a very fast and efficient method which is different from the previous methods using the level set method. Most existing methods[21, 22] employed the time evolving process from an initial surface to point cloud. But in [20], they considered the surface reconstruction process as an elliptic problem in the narrow band including point cloud. So they could obtain very speedy method because they didn't have to limit the time evolution step by the finite speed of propagation. However, they implemented that model just on the uniform grid. So they still have the weakness that it needs so much memories because of being fulfilled only on the uniform grid. Their algorithm basically solves a large linear system of which size is the same as the number of the grid in a narrow band. Besides, it is not easy to make the width of band narrow enough since the decision of band width depends on the distribution of point data. After all, as far as it is implemented on the uniform grid, it is almost impossible to generate the surface on the high resolution because the memory requirement increases geometrically. We resolve it by adapting octree data structure[12, 11] to our problem and by introducing a new redistancing algorithm which is different from the existing one[19].

A Study on Input Multiplexer for Ku-Band Satellite Transponder (Ku 대역 위성 중계기용 입력 멀티플렉서에 관한 연구)

  • 이주섭;엄만석;염인복;이성팔
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.4
    • /
    • pp.393-400
    • /
    • 2003
  • This paper deals with the design and manufacturing technique of EQM(Engineering Qualification Model) of input multiplexer(IMUX) for the Ku-band satellite transponder. Channel dropping method by circulator chain structure is adopted for demultiplexing each channel. External equalizers are attached behind channel filters fur reduction of group delay variation and amplitude variation simultaneously. Both channel filters and equalizers adopted dual-mode technique in design f3r mass and volume reduction. Channel filters are designed to have 8-pole elliptic response and equalizers to be of 2-pole reflection type. For good temperature stability characteristics, INVAR36 material is used for channel filters and external equalizers. Vibration test, Thermal Vacuum Test, and EMC test have been performed on input multiplexer and it is shown to be suitable for Ku-band satellite transponder.