• Title/Summary/Keyword: Implicit methods

Search Result 289, Processing Time 0.02 seconds

Three-dimensional finite element simulation and application of high-strength bolts

  • Long, Liji;Yan, Yongsong;Gao, Xinlin;Kang, Haigui
    • Steel and Composite Structures
    • /
    • v.20 no.3
    • /
    • pp.501-512
    • /
    • 2016
  • High-strength structural bolts have been utilized for beam-to-column connections in steel-framed structural buildings. Failure of these components may be caused by the bolt shank fracture or threads stripping-off, documented in the literature. Furthermore, these structural bolts are galvanized for corrosion resistance or quenched-and-tempered in the manufacturing process. This paper adopted the finite element simulation to demonstrate discrete mechanical performance for these bolts under tensile loading conditions, the coated and uncoated numerical model has been built up for two numerical integration methods: explicit and implicit. Experimental testing and numerical methods can fully approach the failure mechanism of these bolts and their ultimate load capacities. Comparison has also been conducted for two numerical integration methods, demonstrating that the explicit integration procedure is also suitable for solving quasi-static problems. Furthermore, by using precise bolt models in T-Stub, more accurately simulate the mechanical behavior of T-Stub, which will lay the foundation of the mechanical properties of steel bolted joints.

A Study on Personalized Recommendation Method Based on Contents Using Activity and Location Information (이용자 이용행위 및 콘텐츠 위치정보에 기반한 개인화 추천방법에 관한 연구)

  • Kim, Yong;Kim, Mun-Seok;Kim, Yoon-Beom;Park, Jae-Hong
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.81-105
    • /
    • 2009
  • In this paper, we propose user contents using behavior and location information on contents on various channels, such as web, IPTV, for contents distribution. With methods to build user and contents profiles, contents using behavior as an implicit user feedback was applied into machine learning procedure for updating user profiles and contents preference. In machine learning procedure, contents-based and collaborative filtering methods were used to analyze user's contents preference. This study proposes contents location information on web sites for final recommendation contents as well. Finally, we refer to a generalized recommender system for personalization. With those methods, more effective and accurate recommendation service can be possible.

The Procedure Transformation using Data Dependency Elimination Methods (자료 종속성 제거 방법을 이용한 프로시저 변환)

  • Jang, Yu-Suk;Park, Du-Sun
    • The KIPS Transactions:PartA
    • /
    • v.9A no.1
    • /
    • pp.37-44
    • /
    • 2002
  • Most researches of transforming sequential programs into parallel programs have been based on the loop structure transformation method. However, most programs have implicit interprocedure parallelism. This paper suggests a way of extracting parallelism from the loops with procedure calls using the data dependency elimination method. Most parallelization of the loop with procedure calls have been conducted for extracting parallelism from the uniform code. In this paper, we propose interprocedural transformation, which can be apply to both uniform and nonuniform code. We show the examples of uniform, nonuniform, and complex code parallelization. We then evaluated the performance of the various transformation methods using the CRAY-T3E system. The comparison results show that the proposed algorithm out-performs other conventional methods.

A Comparative Study on Structural Reliability Analysis Methods (구조 신뢰성 해석방법의 고찰)

  • 양영순;서용석
    • Computational Structural Engineering
    • /
    • v.7 no.1
    • /
    • pp.109-116
    • /
    • 1994
  • In this paper, various reliability analysis methods for calculating a probability of failure are investigated for their accuracy and efficiency. Crude Monte Carlo method is used as a basis for the comparison of various numerical results. For the sampling methods, Importance Sampling method and Directional Simulation method are considered for overcoming a drawback of Crude Monte Carlo method. For the approximate methods, conventional Rackwitz-Fiessler method. 3-parameter Chen-Lind method, and Rosenblatt transformation method are compared on the basis of First order reliability method. As a Second-order reliability method, Curvature-Fitting paraboloid method, Point-fitting paraboloid method, and Log-likelihood function method are explored in order to verify the accuracy of the reliability calculation results. These methods mentioned above would have some difficulty unless the limit state equation is expressed explicitly in terms of random design variables. Thus, there is a need to develop some general reliability methods for the case where an implicit limit state equation is given. For this purpose, Response surface method is used where the limit state equation is approximated by regression analysis of the response surface outcomes resulted from the structural analysis. From the application of these various reliability methods to three examples, it is found that Directional Simulation method and Response Surface method are very efficient and recommendable for the general reliability analysis problem cases.

  • PDF

THE DEVELOPMENT AND ASSESSMENT STRATEGY OF A THERMAL HYDRAULICS COMPONENT ANALYSIS CODE (열수력 기기해석용 CUPID 코드 개발 및 평가 전략)

  • Park, I.K.;Cho, H.K.;Lee, J.R.;Kim, J.;Yoon, H.Y.;Lee, H.D.;Jeong, J.J.
    • Journal of computational fluids engineering
    • /
    • v.16 no.2
    • /
    • pp.30-48
    • /
    • 2011
  • A three-dimensional thermal-hydraulic code, CUPID, has been developed for the analysis of transient two-phase flows at component scale. The CUPID code adopts a two-fluid three-field model for two-phase flows. A semi-implicit two-step numerical method was developed to obtain numerical solutions on unstructured grids. This paper presents an overview of the CUPID code development and assessment strategy. The governing equations, physical models, numerical methods and their improvements, and the systematic verification and validation processes are discussed. The code couplings with a system code, MARS, and, a three-dimensional reactor kinetics code, MASTER, are also presented.

EFFICIENT NUMERICAL METHODS FOR THE KDV EQUATION

  • Kim, Mi-Young;Choi, Young-Kwang
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.15 no.4
    • /
    • pp.291-306
    • /
    • 2011
  • We consider the second order Strang splitting method to approximate the solution to the KdV equation. The model equation is split into three sets of initial value problems containing convection and dispersal terms separately. TVD MUSCL or MUSCL scheme is applied to approximate the convection term and the second order centered difference method to approximate the dispersal term. In time stepping, explicit third order Runge-Kutta method is used to the equation containing convection term and implicit Crank-Nicolson method to the equation containing dispersal term to reduce the CFL restriction. Several numerical examples of weakly and strongly dispersive problems, which produce solitons or dispersive shock waves, or may show instabilities of the solution, are presented.

Design of Disturbance Observer Based on Structural Analysis (구조적 분석에 기초한 외란관측기의 설계)

  • 김봉근
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.3
    • /
    • pp.225-231
    • /
    • 2004
  • Disturbance observer (DOB) has been studied extensively and applied to many motion control fields during the last decades, but relatively few studies have been devoted to the development of analytic, systematic design methods for DOB itself, This paper thus aims to provide an analytic, systematic design method for DOB. To do this, DOB is structurally analyzed and the generalized disturbance compensation framework named robust internal-loop compensator (RIC) is introduced. Through this, the inherent equivalence between DOB and RIC is found, and the mixed sensitivity optimization problem of DOB is solved. Q-filter design is completely separated from the mixed sensitivity optimization problems of DOB although the proposed method has implicit .elation with Q-filter. Also, although the Q-fille. is separately designed with sensitivity function, the proposed DOB framework has the exactly same characteristic as the original DOB.

Preliminary Study on Utilization of Big Data from CCTV at Child Care Centers (어린이집 CCTV 빅데이터의 활용을 위한 기초 연구)

  • Shin, Nary;Yu, Aehyung
    • Korean Journal of Childcare and Education
    • /
    • v.13 no.6
    • /
    • pp.43-67
    • /
    • 2017
  • Objective: The purpose of this study was to explore the feasibility to utilize image data recorded and accumulated from CCTV at child care centers. Methods: Literature reviews, consultations and workshops with scholars studying child development, legal professionals, and engineers, focus group interviews with professionals working with young children, and surveys targeting parents, directors and teachers were implemented. Results: It was found the big data from CCTV at child care centers can be used to make policies and implement research as a secondary data set after anonymization. Extracting implicit and useful data from images stored on CCTV is technically feasible. Also, it can be legally guaranteed to analyze the data under the condition of acquiring informed consents. Conclusion/Implications: It was likely to utilize image data from CCTV at child care centers as a secondary data set in order for policy development and scholarly purposes, after overcoming obstacles of the budget for additional infrastructures and consents of information holders.

Development of an implicit filling algorithm (암시적 방법을 이용한 충전 알고리즘의 개발)

  • Im, Ik-Tae;Kim, U-Seung
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.22 no.1
    • /
    • pp.104-112
    • /
    • 1998
  • The mold filling process has been a central issue in the development of numerical methods to solve the casting processes. A mold filling which is inherently transient free surface fluid flow, is important because the quality of casting highly depends on such phenomenon, Most of the existing numerical schemes to solve mold filling process have severe limitations in time step restrictions or Courant criteria since explicit time integration is used. Therefore, a large computation time is required to analyze casting processes. In this study, the well known SOLA-VOF method has been modified implicitly to simulate the mold filling process. Solutions to example filling problems show that the proposed method is more efficient in computation time than the original SOLA -VOF method.

Knowledge-based Decision Making using System Dynamics (시스템 다이나믹스를 이용한 지식 기반 의사결정)

  • Kim, Hee-Woong;Kwak, Sang-Man
    • IE interfaces
    • /
    • v.13 no.1
    • /
    • pp.17-28
    • /
    • 2000
  • As knowledge has been recognized as a new resource in gaining organizational competitiveness, Knowledge Management (KM) is suggested as a method to manage and apply knowledge for business management. KM research, however, has focused on identifying, storing, and distributing the transaction-related knowledge in an organization. There has been little research on applying the knowledge to decision-making or strategy development that is the main task of business management. The application of knowledge to decision making has higher impact on organizational performance rather than just the knowledge management for process transaction. In this research, we suggest System Dynamics (SD) for the knowledge-based decision-making. Based on the modeling method of SD, we can translate partial and implicit knowledge resident in individual's mental model into organized explicit knowledge. The simulation test of the organized knowledge model enables decision-makers to understand the structure of the target problem and its behavior mechanism, which facilitates effective decision-making. We will compare the proposed method and other KM methods and discuss this research based on the application case to a real telecommunication company.

  • PDF