• Title/Summary/Keyword: Linear Discrete-Time System

Search Result 298, Processing Time 0.029 seconds

On the particularities of the forced vibration of the hydro-elastic system consisting of a moving elastic plate, compressible viscous fluid and rigid wall

  • Akbarov, Surkay D.;Panakhli, Panakh G.
    • Coupled systems mechanics
    • /
    • v.6 no.3
    • /
    • pp.287-316
    • /
    • 2017
  • This paper studies the particularities of the forced vibration of the hydro-elastic system consisting of a moving elastic plate, compressible viscous fluid and rigid wall. This study is made by employing the discrete-analytical solution method proposed in the paper by the authors (Akbarov and Panakhli (2015)). It is assumed that in the initial state the fluid flow is caused by the axial movement of the plate and the additional lineally-located time-harmonic forces act on the plate and these forces cause additional flow field in the fluid and a stress-strain state in the plate. The stress-strain state in the plate is described by utilizing the exact equations and relations of the linear elastodynamics. However, the additional fluid flow field is described with linearized Navier-Stokes equations for a compressible viscous fluid. Numerical results related to the influence of the problem parameters on the frequency response of the normal stress acting on the plate fluid interface plane and fluid flow velocity on this plane are presented and discussed. In this discussion, attention is focused on the influence of the initial plate axial moving velocity on these responses. At the same, it is established that as a result of the plate moving a resonance type of phenomenon can take place under forced vibration of the system. Moreover, numerical results regarding the influence of the fluid compressibility on these responses are also presented and discussed.

Application of a Convolution Method for the Fast Prediction of Wind-Induced Surface Current in the Yellow Sea and the East China Sea (표층해류 신속예측을 위한 회선적분법의 적용)

  • 강관수;정경태
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.7 no.3
    • /
    • pp.265-276
    • /
    • 1995
  • In this Paper, the Performance of the convolution method has been investigated as an effort to develop a simple system of predicting wind-driven surface current on a real time basis. In this approach wind stress is assumed to be spatially uniform and the effect of atmospheric pressure is neglected. The discrete convolution weights are determined in advance at each point using a linear three-dimensional Galerkin model with linear shape functions(Galerkin-FEM model). Four directions of wind stress(e.g. NE, SW, NW, SE) with unit magnitude are imposed in the model calculation for the construction of data base for convolution weights. Given the time history of wind stress, it is then possible to predict with-driven currents promptly using the convolution product of finite length. An unsteady wind stress of arbitrary form can be approximated by a series of wind pulses with magnitude of 6 hour averaged value. A total of 12 pulses are involved in the convolution product To examine the accuracy of the convolution method a series of numerical experiments has been carried out in the idealized basin representing the scale of the Yellow Sea and the East China Sea. The wind stress imposed varies sinusoidally in time. It was found that the predicted surface currents and elevation fields were in good agreement with the results computed by the direct integration of the Galerkin model. A model with grid 1/8$^{\circ}$ in latitude, l/6$^{\circ}$ in longitude was established which covers the entire region of the Yellow Sea and the East China Sea. The numerical prediction in terms of the convolution product has been carried out with particular attention on the formation of upwind flow in the middle of the Yellow Sea by northerly wind.

  • PDF

A Study on Face Recognition using DCT/LDA (DCT/LDA 기반 얼굴 인식에 관한 연구)

  • Kim Hyoung-Joon;Jung Byunghee;Kim Whoi-Yul
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.55-62
    • /
    • 2005
  • This paper proposes a method to recognize a face using DCT/LDA where LDA is applied to DCT coefficients of an input face image. In the proposed method, SSS problem of LDA due to less number of training data than the size of feature space can be avoided by expressing an input image in low dimensional space using DCT coefficients. In terms of the recognition rate, both the proposed method and the PCA/LDA method have shown almost equal performance while the training time of the proposed method is much shorter than the other. This is because DCT has the fixed number of basis vectors while the property of energy compaction rate is similar to that of PCA. Although depending on the number of coefficients employed for the recognition, the experimental results show that the performance of the proposed method in terms of recognition rate is very comparable to PCA/LDA method and other DCT/LDA methods, and it can be trained 13,000 times faster than PCA/LDA method.

A-team Based Approach for Reactive Power/Voltage Control Considering Steady State Security Assessment (정태 안전성 평가를 고려한 무효전력 전압제어를 위한 A-team기반 접근법)

  • Kim, Doo-Hyun
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.2
    • /
    • pp.150-159
    • /
    • 1996
  • In this paper, an A-team(Asynchronous Team ) based approach for Reactive power and volage control considering static security assessment in a power system with infrastructural deficiencies is proposed. Reactive power and voltage control problem is the one of optimally establishing voltage level given several constraints such as reactive generation, voltage magnitude, line flow, and other switchable reactive power sources. It can be formulated as a mixed-integer linear programming(MILP) problem without deteriorating of solution accuracy to a certain extent. The security assessment is to estimate the relative robustness of the system in Its present state through the evaluation of data provided by security monitoring. Deterministic approach based on AC load flow calculations is adopted to assess the system security, especially voltage security. A security metric, as a standard of measurement for power system security, producting a set of discrete values rather than binary values, is employed. In order to analyze the above two problems, reactive power/voltage control problem and static security assessment problem, in an integrated fashion for real-time operations, a new organizational structure, called an A-team, is adopted. An A-team is an organization for agents which ale all autonomeus, work in parallel and communicate asynchronously, which is well-suited to the development of computer-based, multi-agent systems for operations. This A-team based approach, although it is still in the beginning stage, also has potential for handling other difficult power system problems.

  • PDF

An Adaptive Information Hiding Technique of JPEG2000-based Image using Chaotic System (카오스 시스템을 이용한 JPEG2000-기반 영상의 적응적 정보 은닉 기술)

  • 김수민;서영호;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.4
    • /
    • pp.9-21
    • /
    • 2004
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method and the random changing method using the chaotic system. For ciphering the quantization index we use a novel image encryption algerian of cyclically shifted in the right or left direction and encrypts two quantization assignment method (Top-down/Reflection code), made change of data less. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the proposed methods implemented in software for about 500 images. consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

Fuzzy sliding mode controller design for improving the learning rate (퍼지 슬라이딩 모드의 속도 향상을 위한 제어기 설계)

  • Hwang, Eun-Ju;Cho, Young-Wan;Kim, Eun-Tai;Park, Mignon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.6
    • /
    • pp.747-752
    • /
    • 2006
  • In this paper, the adaptive fuzzy sliding mode controller with two systems is designed. The existing sliding mode controller used to $approximation{\^{u}}(t)$ with discrete sgn function and sat function for keeping the state trajectories on the sliding surface[1]. The proposed controller decrease the disturbance for uncertain control gain and This paper is concerned with an Adaptive Fuzzy Sliding Mode Control(AFSMC) that the fuzzy systems ate used to approximate the unknown functions of nonlinear system. In the adaptive fuzzy system, we adopt the adaptive law to approximate the dynamics of the nonlinear plant and to adjust the parameters of AFSMC. The stability of the suggested control system is proved via Lyapunov stability theorem, and convergence and robustness properties ate demonstrated. Futhermore, fuzzy tuning improve tracking abilities by changing some sliding conditions. In the traditional sliding mode control, ${\eta}$ is a positive constant. The increase of ${\eta}$ has led to a significant decrease in the rise time. However, this has resulted in higher overshoot. Therefore the proposed ${\eta}$ tuning AFSMC improve the performances, so that the controller can track the trajectories faster and more exactly than ordinary controller. The simulation results demonstrate that the performance is improved and the system also exhibits stability.

A Encryption Technique of JPEG2000 Image Using 3-Dimensional Chaotic Cat Map (3차원 카오스 캣맵을 이용한 JPEG2000 영상의 암호화 기술)

  • Choi, Hyun-Jun;Kim, Soo-Min;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.173-180
    • /
    • 2005
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform(DWT) and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system and cat map which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the Proposed methods implemented in software for about 500 images. Consequently, we are sure that the proposed is efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas.

A study on the connected-digit recognition using MLP-VQ and Weighted DHMM (MLP-VQ와 가중 DHMM을 이용한 연결 숫자음 인식에 관한 연구)

  • Chung, Kwang-Woo;Hong, Kwang-Seok
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.8
    • /
    • pp.96-105
    • /
    • 1998
  • The aim of this paper is to propose the method of WDHMM(Weighted DHMM), using the MLP-VQ for the improvement of speaker-independent connect-digit recognition system. MLP neural-network output distribution shows a probability distribution that presents the degree of similarity between each pattern by the non-linear mapping among the input patterns and learning patterns. MLP-VQ is proposed in this paper. It generates codewords by using the output node index which can reach the highest level within MLP neural-network output distribution. Different from the old VQ, the true characteristics of this new MLP-VQ lie in that the degree of similarity between present input patterns and each learned class pattern could be reflected for the recognition model. WDHMM is also proposed. It can use the MLP neural-network output distribution as the way of weighing the symbol generation probability of DHMMs. This newly-suggested method could shorten the time of HMM parameter estimation and recognition. The reason is that it is not necessary to regard symbol generation probability as multi-dimensional normal distribution, as opposed to the old SCHMM. This could also improve the recognition ability by 14.7% higher than DHMM, owing to the increase of small caculation amount. Because it can reflect phone class relations to the recognition model. The result of my research shows that speaker-independent connected-digit recognition, using MLP-VQ and WDHMM, is 84.22%.

  • PDF