• Title/Summary/Keyword: RelA

Search Result 140, Processing Time 0.023 seconds

Effect of Geometrical Parameters on Optimal Design of Synchronous Reluctance Motor

  • Nagarajan, V.S.;Kamaraj, V.;Balaji, M.;Arumugam, R.;Ganesh, N.;Rahul, R.;Lohit, M.
    • Journal of Magnetics
    • /
    • v.21 no.4
    • /
    • pp.544-553
    • /
    • 2016
  • Torque ripple minimization without decrease in average torque is a vital attribute in the design of Synchronous Reluctance (SynRel) motor. As the design of SynRel motor is an arduous task, which encompasses many design variables, this work first analyses the significance of the effect of varying the geometrical parameters on average torque and torque ripple and then proposes an extensive optimization procedure to obtain configurations with improved average torque and minimized torque ripple. A hardware prototype is fabricated and tested. The Finite Element Analysis (FEA) software tool used for validating the test results is MagNet 7.6.0.8. Multi Objective Particle Swarm Optimization (MOPSO) is used to determine the various designs meeting the requirements of reduced torque ripple and improved torque performance. The results indicate the efficacy of the proposed methodology and substantiate the utilization of MOPSO as a significant tool for solving design problems related to SynRel motor.

EVALUATION SUBGROUPS AND CELLULAR EXTENSIONS OF CW-COMPLEXES

  • Lee, Kee-Young;Woo, Moo-Ha
    • Bulletin of the Korean Mathematical Society
    • /
    • v.32 no.1
    • /
    • pp.45-56
    • /
    • 1995
  • D. H. Gottlieb [1, 2] studied the subgroups $G_n(X)$ of homotopy groups $\pi_n(X)$. In [5, 7, 10], the authors introduced subgroups $G_n(X, A)$ and $G_n^{Rel}(X, A) of \pi_n(X)$ and $\pi_n(X, A)$ respectively and showed that they fit together into a sequence $$ \cdots \to G_n(A) \longrightarrow^{i_*} G_n(X, A) \longrightarrow^{j_*} G_n^{Rel}(X, A) \longrightarrow^\partial $$ $$ \cdots \to G_1^{Rel}(X, A) \to G_0(A) \ to G_0(X, A) $$ where $i_*, j_*$ and \partial$ are restrictions of the usual homomorphisms of the homotopy sequence $$ \cdot \to^\partial \pi_n(A) \longrightarrow^{i_*} \pi_n(X) \longrightarrow^{j_*} \pi_n(X, A) \to \cdot \to \pi_0(A) \to \pi_0(X) $$.

  • PDF

Multimedia Statistic Post-office Box System using Fuzzy Filtering Structures (퍼지 필터링 구조를 이용한 멀티미디어 통계 사서함 시스템)

  • Lee Chong Deuk;Kim Dae Kyung
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.709-716
    • /
    • 2004
  • According to the current increase of the usefulness of information by Internet Communication network, several methods are proposed in which a specific domain information nay be efficiently constructed and serviced. This paper proposes Relationship Grouping of Fuzzy Filtering Objects for Multimedia Statistic Post-office Box Construction. The proposed method exploits RelCRO( $D_{omain}$, Gi), RelSRO( $D_{omain}$, Gi) and FAS in order to group using (equation omitted)-cut. To know how well the proposed method is able to work, this paper have test against the methods with 1600 items of multimedia type information, and our system are compared with Random-Key, OGM and the proposed method. The results shows that the proposed method provides the better performance than the other methods.

Design and Implementation of Tool Server and License Server for Protecting Digital Contents (디지털 콘텐츠의 저작권 관리를 위한 라이센스 서버와 툴 서버 설계 및 구현)

  • Hong Hyen-Woo;Ryu Kwang-Hee;Kim Kwang-Yong;Kim Jae-Gon;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.573-576
    • /
    • 2006
  • Recently, the standard work of the copyright of the Digital content is not completed. And the content providers are developing self's copyright protecting technique. here is some problem such as the confusion existed in the copyright protecting and management system. The reason is that the company using different technique when developing the Digital Contents. Now, there is a standard working leaded by the MPEG. It's called MPEG-21 Multimedia framework and the REL is parted of the Intellectual Property Management and Protection included the framework. And the REL's standard working is completed. The Intellectual Property Management and Protection system contain license server, tool server, metadate server and consume server. In this paper, In order to management and protect the Digital Content copyright, We applying the REL, One of the contents of the MPEG-21 framework to design and implementation the License Server manage the settlement and the consumption information and the Tool Server manage and transport the Tools used from Digital Contents formation to the Digital Contents consumption.

  • PDF

A MINIMUM THEOREM FOR THE RELATIVE ROOT NIELSEN NUMBER

  • Yang, Ki-Yeol;Zhao, Xuezhi
    • Communications of the Korean Mathematical Society
    • /
    • v.19 no.1
    • /
    • pp.159-167
    • /
    • 2004
  • In [1], a relative root Nielsen number $N_{rel}(f;\;c)$ is introduced which is a homotopy invariant lower bound for the number of roots at $c\;{\in}\;Y$ for a map of pairs of spaces $f\;:\;(X,\;A)\;{\rightarrow}\;(Y,\;B)$. In this paper, we obtain a minimum theorem for $N_{rel}(f;\;c)$ under some new assumptions on the spaces and maps which are different from those in [1].

Structures of Fuzzy Relations

  • Min, K.C
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.17-21
    • /
    • 1992
  • In this paper we consider the notion of fuzzy relation as a generalization of that of fuzzy set. For a complete Heyting algebra L. the category set(L) of all L-fuzzy sets is shown to be a bireflective subcategory of the category Rel(L) of all L-fuzzy relations and L-fuzzy relation preserving maps. We investigate categorical structures of subcategories of Rel(L) in view of quasitopos. Among those categories, we include the category L-fuzzy similarity relations with respect to both max-min and max-product compositions, respectively, as a cartesian closed topological category. Moreover, we describe exponential objects explicitly in terms of function space.

  • PDF

Relativistic Molecular Theory

  • Nakajima, Takahito
    • Bulletin of the Korean Chemical Society
    • /
    • v.24 no.6
    • /
    • pp.809-811
    • /
    • 2003
  • This brief review contains surveys of both four-component and two-component relativistic molecular theories. First the four-component relativistic approach is reviewed. Emphasis is placed on efficient computational schemes for the four-component Dirac-Hartree-Fock and Dirac-Kohn-Sham methods. Next, in the twocomponent relativistic framework, two relativistic Hamiltonians, RESC and higher-order Douglas-Kroll (DK), are introduced. An illustrative application is shown for the relativistic study on valence photoelectron spectrum of OsO₄. The developing four-component relativistic and approximate quasi-relativistic methods have been packed in a program suite named REL4D.

Induction of Inos Gene Expression by Polysaccharide Isolated from Poria Cocos Sclerotium

  • Jeon, Young-Jin
    • Proceedings of the Korean Society of Toxicology Conference
    • /
    • 2003.10b
    • /
    • pp.164-164
    • /
    • 2003
  • We show that PCSC, a polysaccharide isolated from the sclerotium of Poria cocos with one percent sodium carbonate, significantly induces nitric oxide (NO) production and inducible NO synthase (iNOS) transcription through the activation of nuclear factor-$\kappa$B/Rel (NF-$\kappa$B/Rel).(omitted)

  • PDF

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

Performance analysis of Downlink Multi-user MIMO based on TM9 in Rel.10 (Rel.10 의 TM9 기반 다운링크 Multi-user MIMO 성능분석)

  • Song, Hua Yue;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.47-53
    • /
    • 2014
  • LTE-Advanced is the evolved version of LTE which is currently in progress at the 3GPP. At present, as the number of smart phone users is rapidly increasing, the demand for ever more capacity is driven largely by video usage and high quality data communication and so on, this let more researchers study about LTE-A all over the world. LTE-A aims to achieve improved service and communication quality over 3G system at the aspect of throughput, peak data rate, latency, and spectral efficiency. Among various features in LTE-A, the multi-user MIMO(MU-MIMO), in which the base station transmits several streams to multiple receivers, has expected to give better quality for system. In this paper, we investigate performances of various types of downlink receivers with fixed number of antennas. we first review the development process from LTE to LTE-A. Second we introduce TM9 which is adopted in Rel.10 for MU-MIMO system, including the MU-MIMO system model and the explanation on the algorithm used in system. We also have brief introduction about sub-blocking in turbo decoding, finally we compare the performance between the uncoded case and coded case which is using turbo encoding.