• Title/Summary/Keyword: Recovery Technique

Search Result 942, Processing Time 0.027 seconds

Strong formulation finite element method for arbitrarily shaped laminated plates - Part I. Theoretical analysis

  • Fantuzzi, Nicholas;Tornabene, Francesco
    • Advances in aircraft and spacecraft science
    • /
    • v.1 no.2
    • /
    • pp.125-143
    • /
    • 2014
  • This paper provides a new technique for solving the static analysis of arbitrarily shaped composite plates by using Strong Formulation Finite Element Method (SFEM). Several papers in literature by the authors have presented the proposed technique as an extension of the classic Generalized Differential Quadrature (GDQ) procedure. The present methodology joins the high accuracy of the strong formulation with the versatility of the well-known Finite Element Method (FEM). The continuity conditions among the elements is carried out by the compatibility or continuity conditions. The mapping technique is used to transform both the governing differential equations and the compatibility conditions between two adjacent sub-domains into the regular master element in the computational space. The numerical implementation of the global algebraic system obtained by the technique at issue is easy and straightforward. The main novelty of this paper is the application of the stress and strain recovery once the displacement parameters are evaluated. Computer investigations concerning a large number of composite plates have been carried out. SFEM results are compared with those presented in literature and a perfect agreement is observed.

Concurrency Control and Recovery Methods for Multi-Dimensional Index Structures (다차원 색인구조를 위한 동시성제어 기법 및 회복기법)

  • Song, Seok-Il;Yoo, Jae-Soo
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.195-210
    • /
    • 2003
  • In this paper, we propose an enhanced concurrency control algorithm that maximizes the concurrency of multi-dimensional index structures. The factors that deteriorate the concurrency of index structures are node splits and minimum bounding region (MBR) updates in multi-dimensional index structures. The proposed concurrency control algorithm introduces PLC(Partial Lock Coupling) technique to avoid lock coupling during MBR updates. Also, a new MBR update method that allows searchers to access nodes where MBR updates are being performed is proposed. To reduce the performance degradation by node splits the proposed algorithm holds exclusive latches not during whole split time but only during physical node split time that occupies the small part of a whole split process. For performance evaluation, we implement the proposed concurrency control algorithm and one of the existing link technique-based algorithms on MIDAS-3 that is a storage system of a BADA-4 DBMS. We show through various experiments that our proposed algorithm outperforms the existing algorithm in terms of throughput and response time. Also, we propose a recovery protocol for our proposed concurrency control algorithm. The recovery protocol is designed to assure high concurrency and fast recovery.

A Compressed Sensing-Based Signal Recovery Technique for Multi-User Spatial Modulation Systems (다중사용자 공간변조시스템에서 압축센싱기반 신호복원 기법)

  • Park, Jeonghong;Ban, Tae-Won;Jung, Bang Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.424-430
    • /
    • 2014
  • In this paper, we propose a compressed sensing-based signal recovery technique for an uplink multi-user spatial modulation (MU-SM) system. In the MU-SM system, only one antenna among $N_t$ antennas of each user becomes active by nature. Thus, this characteristics is exploited for signal recovery at a base station. We modify the conventional orthogonal matching pursuit (OMP) algorithm which has been widely used for sparse signal recovery in literature for the MU-SM system, which is called MU-OMP. We also propose a parallel OMP algorithm for the MU-SM system, which is called MU-POMP. Specifically, in the proposed algorithms, antenna indices of a specific user who was selected in the previous iteration are excluded in the next iteration of the OMP algorithm. Simulation results show that the proposed algorithms outperform the conventional OMP algorithm in the MU-SM system.

Fuzzy Technique based Chopper Control for Slip Energy Recovery System with Twelve-Pulse Converter

  • Tunyasrirut, S.;Ngamwiwit, J.;Furuya, T.;Yamamoto, Y.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.509-514
    • /
    • 2004
  • This paper introduces the modified slip energy recovery system in order to improve its power factor and to reduce harmonics of line current waveforms. Twelve pulse line commutated converter with the chopper type IGBT is applied where the chopper is applied across the DC terminal and the chopped DC is fed to the converter operating as an inverter and then passed through the wye-wye and delta-wye transformer circuit. This scheme leads to be able to adjust the speed of the motor by the duty cycle of the chopper operating in PWM mode. The fuzzy logic controller is also introduced to the modified slip energy recovery system for keeping the motor speed to be constant when the load varies. The experimental results in testing the 0.22 kW wound rotor induction motor from no-load condition to rated condition show the effectiveness of the proposed control scheme.

  • PDF

Disaster Recovery Priority Decision of Total Information System for Port Logistics : Fuzzy TOPSIS Approach (항만물류종합정보시스템의 재난복구 우선순위결정 : 퍼지 TOPSIS 접근방법)

  • Kim, Ki-Yoon;Kim, Do-Hyeong
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.1-16
    • /
    • 2012
  • This paper is aimed to present a fuzzy decision-making approach to deal with disaster recovery priority decision problem in information system. We derive an evaluation approach based on TOPSIS(Technique for Order Performance by Similarity to Ideal Solution), to help disaster recovery priority decision of total information system for port logistics in a fuzzy environment where the vagueness and subjectivity are handled with linguistic terms parameterized by trapezoidal fuzzy numbers. This study applies the fuzzy multi-criteria decision-making method to determine the importance weight of evaluation criteria and to synthesize the ratings of candidate disaster recovery system. Aggregated the evaluators' attitude toward preference, then TOPSIS is employed to obtain a crisp overall performance value for each alternative to make a final decision. This approach is demonstrated with a real case study involving 4 evaluation criteria(system dependence, RTO, loss, alternative business support), 7 information systems for port logistics assessed by 5 evaluators from Maritime Affairs and Port Office.

Effect of Polymer Shielding on Elution of G3PDH Bound to Dye-ligand Adsorbent

  • Ling Tau Chuan;Lyddiatt Andrew
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.11 no.1
    • /
    • pp.84-87
    • /
    • 2006
  • Batch binding experiments were performed to assess the recovery performance of glyceraldehyde 3-phosphate dehydrogenase (G3PDH) bound to the unshielded and polymer (polyvinyl pyrrolidone. PVP)-shielded dye-ligand (Cibacron Blue 3GA) adsorbent. The adoption of a polymer-shielded, dye-ligand technique facilitated the elution efficiency of bound G3PDH. It was demonstrated that the recovery of G3PDH using polymer-shielded dye-ligand adsorption yielded higher elution efficiency, at 60.5% and a specific activity of 42.3 IU/mg, after a low ionic strength elution (0.15 M NaCl). The unshielded dye-ligand yielded lower elution efficiency. at 6.5% and a specific activity of 10.2 IU/mg.

Lost Block Recovery Using Energy Ratio (에너지 비를 이용한 손실 블록)

  • Hyun, Seung-Hwa;Eom, Il-Kyu;Kim, Yoo-Shin
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.329-330
    • /
    • 2006
  • This paper presents a recovery technique for images with block-based corruption by transmission losses. Conventional methods that do not consider edge directions can cause blocked blurring artifacts. In this paper, we present a block recovery scheme using Haar wavelet features. The adaptive selection of neighboring blocks is performed based on the energy ratio f wavelet subbands. The lost blocks are recovered by linear interpolation in the spatial domain using selected block pairs. The proposed directional recovery method is effective for the strong edge because it exploits the varying neighboring blocks adaptively according to the edges and the directional information in the image. The proposed method outperforms the previous methods that used only a predefined set of neighboring blocks.

  • PDF

A fault detection and recovery mechanism for the fault-tolerance of a Mini-MAP system (Mini-MAP 시스템의 결함 허용성을 위한 결함 감지 및 복구 기법)

  • Mun, Hong-Ju;Kwon, Wook-Hyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.4 no.2
    • /
    • pp.264-272
    • /
    • 1998
  • This paper proposes a fault detection and recovery mechanism for a fault-tolerant Mini-MAP system, and provides detailed techniques for its implementation. This paper considers the fault-tolerant Mini-MAP system which has dual layer structure from the LLC sublayer down to the physical layer to cope with the faults of those layers. For a good fault detection, a redundant and hierarchical fault supervision architecture is proposed and its implementation technique for a stable detection operation is provided. Information for the fault location is provided from data reported with a fault detection and obtained by an additional network diagnosis. The faults are recovered by the stand-by sparing method applied for a dual network composed of two equivalent networks. A network switch mechanism is proposed to achieve a reliable and stable network function. A fault-tolerant Mini-MAP system is implemented by applying the proposed fault detection and recovery mechanism.

  • PDF

File Signature's Automatic Calculation Algorithm Proposal for Digital Forensic

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.118-123
    • /
    • 2021
  • Recently, digital crime is becoming more intelligent, and efficient digital forensic techniques are required to collect evidence for this. In the case of important files related to crime, a specific person may intentionally delete the file. In such a situation, data recovery is a very important procedure that can prove criminal charges. Although there are various methods to recover deleted files, we focuses on the recovery technique using HxD editor. When recovering a deleted file using the HxD editor, check the file structure and access the file data area through calculation. However, there is a possibility that errors such as arithmetic errors may occur when a file approach through calculation is used. Therefore, in this paper, we propose an algorithm that automatically calculates the header and footer of a file after checking the file signature in the root directory for efficient file recovery. If the algorithm proposed in this paper is used, it is expected that the error rate of arithmetic errors in the file recovery process can be reduced.

Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT

  • Yi, Wen-Tan;Chen, Shao-Zhen;Wei, Kuan-Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.280-295
    • /
    • 2015
  • Block cipher ARIA was first proposed by some South Korean experts in 2003, and later, it was established as a Korean Standard block cipher algorithm by Korean Agency for Technology and Standards. In this paper, we focus on the security evaluation of ARIA block cipher against the recent zero-correlation linear cryptanalysis. In addition, Partial-sum technique and FFT (Fast Fourier Transform) technique are used to speed up the cryptanalysis, respectively. We first introduce some 4-round linear approximations of ARIA with zero-correlation, and then present some key-recovery attacks on 6/7-round ARIA-128/256 with the Partial-sum technique and FFT technique. The key-recovery attack with Partial-sum technique on 6-round ARIA-128 needs $2^{123.6}$ known plaintexts (KPs), $2^{121}$ encryptions and $2^{90.3}$ bytes memory, and the attack with FFT technique requires $2^{124.1}$ KPs, $2^{121.5}$ encryptions and $2^{90.3}$ bytes memory. Moreover, applying Partial-sum technique, we can attack 7-round ARIA-256 with $2^{124.6}$ KPs, $2^{203.5}$ encryptions and $2^{152}$ bytes memory and 7-round ARIA-256 employing FFT technique, requires $2^{124.7}$ KPs, $2^{209.5}$ encryptions and $2^{152}$ bytes memory. Our results are the first zero-correlation linear cryptanalysis results on ARIA.