• Title/Summary/Keyword: Interference Pattern and Constant

Search Result 13, Processing Time 0.019 seconds

Inhomogeneous Deformation Between Construction Materials in the Cu/Al and Fe/Al Co-extrusion Processes (Cu/Al 및 Fe/Al 층상복합재료 압출공정에서 구성재료의 불균일 변형)

  • Seo, J.M.;Noh, J.H.;Min, K.H.;Hwang, B.B.;Ham, K.C.;Jang, D.H.
    • Transactions of Materials Processing
    • /
    • v.16 no.7
    • /
    • pp.530-537
    • /
    • 2007
  • This paper is concerned with the analysis of plastic deformation of bimetal co-extrusion process. Two sets of material combination have been adopted for analysis, i.e. combinations of Cu/Al and Fe/Al. In the first set of material combination, the selected materials are AA 1100 aluminum alloy as hard material and CDA 110 as soft one. This type of material selection is to examine the effect of hard core and soft sleeve and vice versa on the deformation pattern in terms of plastic zone and velocity discontinuity along the contact surface between construction materials. Four different cases of co-extrusion process in terms of material combination and interference bonding were simulated to investigate the effect of material arrangement between core and sleeve, and of bonding on the plastic zones and velocity discontinuity. In the other set of material combination, model materials used as core and sleeve were AA 1100 and AISI 1010, which are relatively soft and hard, respectively. Process parameters except diameter ratio of core to sleeve material such as semi-die angle, reduction in area in global sense and die comer radius have been set constant throughout the simulation to concentrate our effort on the analysis of influence of diameter ratio on deformation behavior such as deformation zone, surface expansion, exit velocity discontinuity between composite materials, and extrusion forces.

A Study on Characteristics of the Twin Tree Array Structure of the Triangular Patch Array Antenna (삼각형 패치 트윈 트리 배열 안테나의 특성 연구)

  • Chang, Tae-Soon;Kang, Sang-Won
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.372-377
    • /
    • 2020
  • This paper is based on the triangular inset patch antenna as the basic structure, and the array structure is the twin tree form to improve the antenna's main lobe gain and reduce the side lobe gain. A twin tree structure was implemented by placing two identical trees of 2-4-6 arrays of triangular inset patches side by side. The parametric analysis confirmed that the gap between tree structures arranged side by side is most effective for impedance matching. The fabricated antenna has a gain of 16.74 dBi at 24.15 GHz, and the beam width of the main lobe is 22° in the E-plane and 6° in the H-plane. The antenna size was 125 mm × 50 mm, and a Taconic TLC substrate with a dielectric constant of 3.2 was used. Although the main lobe gain is improved over the twin tree structure, The directivity in the beam pattern due to the mutual interference of the two tree array structure can be improved.

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.