• Title/Summary/Keyword: Implicit 방법

Search Result 360, Processing Time 0.023 seconds

A Three-Dimensional Numerical Model of Hydrodynamic Flow on σ-Coordinate (연직변환좌표(鉛直變換座標)에서 3차원(次元) 유동(流動) 수직모형(數値模型))

  • Jung, Tae Sung;Lee, Kil Seong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.14 no.5
    • /
    • pp.1145-1158
    • /
    • 1994
  • A three-dimensional, finite difference, numerical model with free surface was developed on ${\sigma}$-coordinate. A semi-implicit numerical scheme in time has been adopted for computational efficiency. The scheme is essentially independent of the stringent stability criteria (CFL condition) for explicit schemes of external surface gravity wave. Implicit algorithm was applied for vertical shear stress, Coriolis force and pressure gradient terms. The reliability of the model with vertically variable grid system was checked by the comparison of simulation results with analytic solution of wind-driven currents in a one-dimensional channel. Sensitivity analysis of differencing parameters was carried out by applying the model to the calculation of wind-driven currents in a square lake.

  • PDF

Structural Reliability Analysis via Response Surface Method (응답면 기법을 이용한 구조 신뢰성 해석)

  • Yang, Y.S.;Lee, J.O.;Kim, P.Y.
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.33 no.1
    • /
    • pp.98-108
    • /
    • 1996
  • In the reliability analysis of general structures, the limit state equations are implicit and cannot be described in closed form. Thus, sampling methods such as the Crude Monte-Carlo simulation, and probabilistic FEM are often used, but these methods are not so effective in view of computational cost, because a number of structural analysis are required and the derivatives must be calculated for probabilistic FEM. Alternatively the response surface approach, which approximates the limit state surface by using several results of structural analysis in the region adjacent to MPFP, could be applied effectively. In this paper, the central composite design, Bucher-Bourgund method and the approximation method using artificial neural network are studied for the calculation of probability of failure by the response surface method. Through the example comparisons, it is found that Bucher-Bourgund method is very effective and Neural network method for the reliability analysis is comparable with other methods. Specially, the central composite design method is found to be rational and useful in terms of mathematical consistency and accuracy.

  • PDF

Cognitive behavior intervention for critical incident stress management in fire fighters in Korea (소방공무원의 위기상황 스트레스 관리를 위한 인지행동 개입과 대책)

  • Lee, Eun-Jung;Kim, Jee-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.13-18
    • /
    • 2015
  • The purpose of the study is to investigate the predisposing factors of posttraumatic stress disorder (PTSD) in fire fighters in Korea and to suggest the program development and solution to the critical incident stress management (CISM) in the future. PTSD is characterized by invasion, withdrawal, negative change of cognition and mood, and hypersensitivity. Trauma memory includes explicit memory and implicit memory. The explicit memory is conscious, cognitive, and descriptive and is controlled by hippocampus. The data of explicit memory have inhibitive and narrative language structure. The implicit memory is inconscious, emotional, and remembered by the body. The implicit memory is controlled by amygdala and has inexpressive language structure. The deletion of implicit memory is the key point to trauma treatment. Critical incident stress management (CISM) is the approach for the solution of PTSD. In conclusion, the essential goal of CISM is the psychological cessation of PTSD. This study tried to suggest the education program development of PTSD.

A Study on Network Reliability Analysis for Information Security (정보 보호를 위한 네트워크 신뢰성 분석에 관한 연구)

  • Yu, Hyoung-Seok;Park, Hong-Keun;Ryu, In-Ho;Kim, Hyoung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3935-3941
    • /
    • 2010
  • With the advent of high-speed communications networks, many authentication and access control systems are being introduced to combat network security issues like system hacking. But the fact is that the security systems for protecting information used in these networks are themselves weak. In response to the mounting demands of existing users, there is a clear need for a new authentication system that provides both safety and reliability. This research presents an authentication method with excellent access authorization (explicit and implicit authentication) and safety performance, demonstrated through its use in online networks.

Dynamic Characteristics of Externally Pressurized Air Pad Bearings with Closed Loop Grooves (닫힌 그루브를 갖는 외부가압 공기 패드 베어링의 동특성 해석)

  • Park, Gwang Won;Park, Sang-Shin
    • Tribology and Lubricants
    • /
    • v.33 no.6
    • /
    • pp.309-314
    • /
    • 2017
  • This paper presents a theoretical investigation of the dynamic characteristics of externally pressurized air pad bearings with closed loop grooves. These grooves are made on the surface of bearings to reduce the number of supply holes so that manufacturing costs can be reduced. The semi-implicit method is applied to calculate the time varying pressure profile on the air bearing surface owing to the advantages of numerical stability and fast time tracing characteristics. The static pressure of the groove bearings is much higher than that without grooves, so the groove bearings can provide high load carrying capacity. The equation of motion considering vertical motion and tilting motion are also solved using the Runge-Kutta 4th order method. By combining the semi-implicit method and the Runge-Kutta method, fast calculations of the dynamic behavior of the air bearing can be achieved. The variations of bearing reaction force, air film reaction moment, height, and tilting angle are investigated for the step force input, which is 20% higher than the bearing reaction, when the nominal clearance is 6 mm. The effect of the groove width and the groove depth are investigated by calculating the dynamic behavior. The possibility of the air hammering with the depth of the groove is found and discussed.

노심 동특성 분석 정확도 및 성능 향상을 위한 Time Step 제어방법 개선

  • 김영일;김영진;주형국;김택겸
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1997.10a
    • /
    • pp.79-84
    • /
    • 1997
  • 동특성 분석 코드 시스템 PANBOX2는 시간에 대한 미분을 Implicit Euler 방법을 사용하여 근사한다. 이 경우 Local Truncation Error는 중성자속의 이차 미분에 비례한다. Time-Step-Doubling 기법을 이용하여 Local Truncation Error의 근사치를 구하고 이를 이용하여 Time Step Size를 조절해 주는 방법을 동특성 분석 코드 시스템 PANBOX2에 도입하였다. LRA와 NEACRP 제어봉 인출사고 검증문제에 대한 분석 결과, PANBOX2 시스템의 기존 방법에 비해 효과적으로 Time Step을 제어하였으며 보다 정확한 결과를 얻을 수 있었다.

  • PDF

Numerical Solutions for the Flow past a Cylinder (원주주위를 지나는 흐름에 관한 수치해석)

  • 조용식;윤태훈
    • Water for future
    • /
    • v.21 no.3
    • /
    • pp.291-291
    • /
    • 1988
  • The two dimensional time dependent flow past a circular cylinder is analyzed numerically. In the analysis, equations of conservation of mass and momentum are transformed to equations of stream function-vorticity and vorticity transport, and nondimensionalized by nondimensional parameters representing flow characteristics, The resulting stream function-vorticity equstion and vorticity transport equation are solved by successive over relaxation scheme and alternating direct implicit scheme. Numerical experments are performed for the flow in the range of Reynolds number 125 to 275. The time dependent streamlines, vorticities, pressure on cylinder surface, separation angle, and drag and lift coefficients are calculated, and the method for estimation of pressure on cylinder surface and the outer boundary limit are developed.

- Numerical Solutions for the Flow past a Cylinder- (원주주위를 지나는 흐름에 관한 수치해석)

  • 조용식;윤태훈
    • Water for future
    • /
    • v.31 no.4
    • /
    • pp.291-297
    • /
    • 1998
  • The two dimensional time dependent flow past a circular cylinder is analyzed numerically. In the analysis, equations of conservation of mass and momentum are transformed to equations of stream function-vorticity and vorticity transport, and nondimensionalized by nondimensional parameters representing flow characteristics, The resulting stream function-vorticity equation and vorticity transport equation are solved by successive over relaxation scheme and alternating direct implicit scheme. Numerical experiments are performed for the flow in the range of Reynolds number 125 to 275. The time dependent streamlines, vorticities, pressure on cylinder surface, separation angle, and drag and lift coefficients are calculated, and the method for estimation of pressure on cylinder surface and the outer boundary limit are developed.

  • PDF

Runoff and Unsteady Pipe Flow Computation (유출과 부정류 관수로 흐름 계산에 관한 연구)

  • Jeon, Byeong-Ho;Lee, Jae-Cheol;Gwon, Yeong-Ha
    • Water for future
    • /
    • v.23 no.2
    • /
    • pp.251-263
    • /
    • 1990
  • For surcharge flow in a sewer, the slot technique simulates surcharge flow as open - channel flow using a hypothetical narrow open piezometric slot at the sewer crown. The flow in a sewer is described mathematically using the unsteady open - channel Saint-Venant equations. In this study, the computer simulation model(USS-slot) using slot techniques is develeped to simulate the inlet hydrographs to manholes and the flow under pressure as well as free - surface flow in tree - type sewer networks of circular conduits. The inlet hydrographs are simulated by using the rational method or the ILSD progrm. The Saint-Venant equations for unsteady open - channel flow in seweres are solved by using a four - point implicit difference scheme. The flow equations of the sewers and the junction flow equations are solved simulaneously using a sparse matrix solution technique.

  • PDF

Exploiting Implicit Parallelism for Single Loops in Java Programming Language (JAVA 프로그래밍 언어에서 단일루프구조의 무시적 병렬성 검출)

  • Kwon, Oh-Jin
    • Journal of Information Management
    • /
    • v.29 no.3
    • /
    • pp.1-26
    • /
    • 1998
  • The loop is a fundamental for the parallelism exploiting as it has a large portion of execution time for sequential Java program on the parallel machine. This paper proposes the method of exploiting the implicit parallelism through the analysis of data dependence in the existing Java programming language having a single loop structure. The parallel code generation method through the restructuring compiler and the translation method of Java source program into multithread statement, which is supported in the level of the Java programming language, are also proposed here. The performance test of the program translated into the thread statement is conducted using the trip count of loop and the thread count as parameters. The restructuring compiler makes it possible for users to reduce overhead and exploit parallelism efficiently in the Java programming.

  • PDF