• Title/Summary/Keyword: Experimental verification

Search Result 1,663, Processing Time 0.03 seconds

Analysis and Experimental Verification of Linear Motor Moment for Precision Machine Tools (정밀 공작기계용 리니어모터 모멘트의 해석 및 실험적 검증)

  • Cho, Young-Taek;Cho, Han-Wook;Lee, Seung-Han
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.884-885
    • /
    • 2015
  • This paper presents the characteristic analysis and experiment of pitching moment in permanent magnet linear synchronous motor (PMLSM) for precision machine tools. In this paper, we define force characteristics of the moment and the moment analysis by the finite element method. Manufacture experiment and we will compare the results of finite element analysis and experimental results.

  • PDF

Finite Element Analysis and Experiment of Combined Extrusion in Semi-Solid State (반용융 복합압출 제품의 성형실험 및 유한요소해석)

  • 최재찬;박준홍;김병민
    • Transactions of Materials Processing
    • /
    • v.8 no.3
    • /
    • pp.313-318
    • /
    • 1999
  • Many products related to automobile and airplane industry have been manufactured by semi-solid forging. In this paper finite element analysis of product by combined extrusion in semi-solid state was performed and its experimental verification using A356 was conducted. distribution of solid fraction was analyzed and compared with the experimental microstructure in the product. In addition, distribution of temperature in the product was analysed by finite element method.

  • PDF

Cable vibration control with a semiactive MR damper-numerical simulation and experimental verification

  • Wu, W.J.;Cai, C.S.
    • Structural Engineering and Mechanics
    • /
    • v.34 no.5
    • /
    • pp.611-623
    • /
    • 2010
  • Excessive stay cable vibrations can cause severe problems for cable-stayed bridges. In this paper a semiactive Magnetorheological (MR) damper is investigated to reduce cable vibrations. The control-oriented cable-damper model is first established; a computer simulation for the cable-damper system is carried out; and finally a MR damper is experimentally used to reduce the cable vibration in a laboratory environment using a semiactive control algorithm. Both the simulation and experimental results show that the semiactive MR damper achieves better control results than the corresponding passive damper.

A Review on Two-Phase Flow Analysis using Chaos Theory (카오스 이론을 이용한 2상 유동 해석)

  • Kwon, Jeong-Tae;Kwon, Young-Chul;Kim, Kyoung-Min
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.56 no.1
    • /
    • pp.23-27
    • /
    • 2007
  • This article presents a review on chaos analysis of two-phase flow. Chaos theory has recently been applied to two-phase flow analysis, and it gives promising measures to quantitatively identify two-phase flow patterns and pool boiling behaviors. But, consistency of the calculated chaotic measures were not completely confirmed yet. More experimental data are requested for chaos analysis of two-phase flow. Also, chaos analysis methodology should be developed by experimental verification.

Vibration Damping Analysis of Multi-Layered Viscoelastic Material (다층 점탄성재료의 진동감쇠 특성에 관한 연구)

  • 윤영식;황동환;이상조
    • Journal of KSNVE
    • /
    • v.4 no.4
    • /
    • pp.487-496
    • /
    • 1994
  • Recently, the application of viscoelastic material in the field of vibration isolation has gradually increased due to its achievement in structural damping capacity, and many of the theoretical and experimental study has been carried out. In this study, the dynamic characteristics of the visoelastically supported cantilever beam, of which govering equation is based on the Bernoulli- Euler equation, is analyzed theoretically and experimentally. Expression for stiffness of multi-layered viscoelastic materal has been developed using variables such as frequency and number of layers, and further, based on this expression, damping characteristic of the beam is investigated with experimental verification.

  • PDF

A Case Study on Model Checking Online-Game Server Party System Using SPIN (온라인 게임 서버의 파티 시스템 검증을 위한 스핀 모델 체커 적용에 관한 연구)

  • Kim, Goanghun;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.11
    • /
    • pp.479-486
    • /
    • 2015
  • Model checking method is able to check all possible cases automatically and is applicable to specifications or design before actual implementation so that some critical systems have adopted this method actively. However, the current practice of software verification is largely dependant on basic methods such as manual testing because of lack of understanding about this rigorous method and high verification cost. In this paper we conducted an experimental research for the automated verification using the SPIN model checker on an online-game server to study the applicability of the technique in this domain. The results show that we could verify major features of the online-game server party system with 5~7 GB memory and within 10 minutes execution time, and also found a hidden system error that passed existing testing process. This result shows the possibility of rigorous and effective verification with reasonable cost in comparison to manual testing.

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.