• Title/Summary/Keyword: Rule based solution

Search Result 186, Processing Time 0.021 seconds

The surface stress effects on the buckling analysis of porous microcomposite annular sandwich plate based on HSDT using Ritz method

  • Mohsen Emdadi;Mehdi Mohammadimehr;Borhan Rousta Navi
    • Computers and Concrete
    • /
    • v.32 no.5
    • /
    • pp.439-454
    • /
    • 2023
  • In this article, the surface stress effects on the buckling analysis of the annular sandwich plate is developed. The proposed plate is composed of two face layers made of carbon nanotubes (CNT) reinforced composite with assuming of fully bonded to functionally graded porous core. The generalized rule of the mixture is employed to predict the mechanical properties of the microcomposite sandwich plate. The derived potentials energy based on higher order shear deformation theory (HSDT) and modified couple stress theory (MCST) is solved by employing the Ritz method. An exact analytical solution is presented to calculate the critical buckling loads of the annular sandwich plate. The predicted results are validated by carrying out the comparison studies for the buckling analysis of annular plates with those obtained by other analytical and finite element methods. The effects of various parameters such as material length scale parameter, core thickness to total thickness ratio (hc/h), surface elastic constants based on surface stress effect, various boundary condition and porosity distributions, size of the internal pores (e0), Skempton coefficient and elastic foundation on the critical buckling load have been studied. The results can be served as benchmark data for future works and also in the design of materials science, injunction high-pressure micropipe connections, nanotechnology, and smart systems.

An Analysis of the Student's Algebra Word Problem Solving Process (대수 문장제 해결을 위한 학생들의 풀이 과정 분석: 일련의 표시(Chain of signification) 관점의 사례연구)

  • Park, Hyun-Jeong;Lee, Chong-Hee
    • School Mathematics
    • /
    • v.9 no.1
    • /
    • pp.141-160
    • /
    • 2007
  • The purpose of this paper was to evaluate how students apply prior knowledge or experience in solving algebra word problems from the chain of signification-based perspective. Three middle school students were evaluated in this case study. The results showed that the subjects formed similarities in the process of applying knowledge needed for solving a problem. The student A and C used semi-open-end formulas and closed formulas as solutions. They then formed concrete shape for each solution using the chain of signification that was applied for solution by forming procedural similarity. At this time, the chain of signification could be the combination of numbers, words, and pictures (such as diagrams or graphs) or just numbers or words. On the other hand, the student C who recognized closed formulas and her own rule as a solution method could not formulate completely procedural similarity due to many errors arising from number information. Nonetheless, all of the subjects showed something in common in the process of coming up with a algorithm that was semi-open-end formula or closed formula.

  • PDF

Optical encryption and decryption technique using virtual image in frequency domain (가상 영상을 이용한 주파수 영역에서의 광학적 암호화 및 복호화 방법)

  • 서동환;조규보;박세준;김수중;김정우;노덕수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.3
    • /
    • pp.255-259
    • /
    • 2003
  • In this paper, we propose an improved image encryption and decryption method using a virtual image and a joint transform correlator (JTC). The encrypted image is obtained by the Fourier transform of the product of a virtual-phase image and a random-phase image, and a Fourier transform of the decrypting key generated by the proposed phase assignment rule is used as the Fourier decrypting key. Based on the solution, the original image is reconstructed using JTC in the frequency-domain. The proposed method using a virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting by unauthorized people. And also the auto-correlation terms, which are the drawback of a JTC system, contribute to reconstructing the original image rather than to disturbing its identification. But because phase-only encryptions are sensitive to noise and scratches, phase errors can be generated in fabricating the encrypted image or the Fourier decrypting key so the errors that are responsible for degradation of the quality of the reconstructed image are analyzed and the solution is demonstrated. Computer simulations show the solution, and the proposed method is very useful for JTC architecture.

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

  • Siddiqui, Isma Farah;Lee, Scott Uk-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2016
  • Pervasive computing and Internet of Things (IoT) have recently received considerable interest to deploy solutions for the future Internet. Smart environments are integrated with Semantic Web to provide context-awareness to the processed information. Self-learning techniques have been adopted within smart solutions for efficient retrieval of data but do not process data with privacy parameters for in-place authorization. To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML). The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment. In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.

Time-dependent creep analysis and life assessment of 304 L austenitic stainless steel thick pressurized truncated conical shells

  • Kashkoli, Mosayeb Davoudi;Nejad, Mohammad Zamani
    • Steel and Composite Structures
    • /
    • v.28 no.3
    • /
    • pp.349-362
    • /
    • 2018
  • This paper presents a semi-analytical solution for the creep analysis and life assessment of 304L austenitic stainless steel thick truncated conical shells using multilayered method based on the first order shear deformation theory (FSDT). The cone is subjected to the non-uniform internal pressure and temperature gradient. Damages are obtained in thick truncated conical shell using Robinson's linear life fraction damage rule, and time to rupture and remaining life assessment is determined by Larson-Miller Parameter (LMP). The creep response of the material is described by Norton's law. In the multilayer method, the truncated cone is divided into n homogeneous disks, and n sets of differential equations with constant coefficients. This set of equations is solved analytically by applying boundary and continuity conditions between the layers. The results obtained analytically have been compared with the numerical results of the finite element method. The results show that the multilayered method based on FSDT has an acceptable amount of accuracy when one wants to obtain radial displacement, radial, circumferential and shear stresses. It is shown that non-uniform pressure has significant influences on the creep damages and remaining life of the truncated cone.

Prediction of Lower Explosion Limits of Binary Liquid Mixtures by Means of Solution Thermodynamics (용액열역학에 의한 2성분계 혼합물의 폭발하한계 예측)

  • Ha, Dong-Myeong;Lee, Sung-Jin
    • Journal of the Korean Institute of Gas
    • /
    • v.13 no.5
    • /
    • pp.20-25
    • /
    • 2009
  • Low explosion limits of flammable liquid mixtures can be calculated with the appropriate use of the fundamental laws of Raoult, Dalton, Le Chatelier and activity coefficient models. In this paper, Raoult's law, van Laar equation and Wilson equation are shown to be applicable for the prediction of the lower explosion limits for ethylacetate+ethanol and ethanol+toluene systems. The calculated values based on Raoult's law were found to be better than those based on van Laar and Wilson equations.

  • PDF

The Multi-Agent Simulation of Archaic State Formation (다중 에이전트 기반의 고대 국가 형성 시뮬레이션)

  • S. Kim;A. Lazar;R.G. Reynolds
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.91-100
    • /
    • 2003
  • In this paper we investigate the role that warfare played In the formation of the network of alliances between sites that are associated with the formation of the state in the Valley of Oaxaca, Mexico. A model of state formation proposed by Marcos and Flannery (1996) is used as the basis for an agent-based simulation model. Agents reside in sites and their actions are constrained by knowledge extracted from the Oaxaca Surface Archaeological Survey (Kowalewski 1989). The simulation is run with two different sets of constraint rules for the agents. The first set is based upon the raw data collected in the surface survey. This represents a total of 79 sites and constitutes a minimal level of warfare (raiding) in the Valley. The other site represents the generalization of these constraints to sites with similar locational characteristics. This set corresponds to 987 sites and represents a much more active role for warfare in the Valley. The rules were produced by a data mining technique, Decision Trees, guided by Genetic Algorithms. Simulations were run using the two different rule sets and compared with each other and the archaeological data for the Valley. The results strongly suggest that warfare was a necessary process in the aggregations of resources needed to support the emergence of the state in the Valley.

  • PDF

Thermo-mechanical vibration analysis of curved imperfect nano-beams based on nonlocal strain gradient theory

  • Ebrahimi, Farzad;Daman, Mohsen;Mahesh, Vinyas
    • Advances in nano research
    • /
    • v.7 no.4
    • /
    • pp.249-263
    • /
    • 2019
  • In the current paper, an exact solution method is carried out for analyzing the thermo-mechanical vibration of curved FG nano-beams subjected to uniform thermal environmental conditions, by considering porosity distribution via nonlocal strain gradient beam theory for the first time. Nonlocal strain gradient elasticity theory is adopted to consider the size effects in which the stress for not only the nonlocal stress field but also the strain gradients stress field is considered. It is perceived that during manufacturing of functionally graded materials (FGMs) porosities and micro-voids can be occurred inside the material. Material properties of curved porous FG nanobeam are assumed to be temperature-dependent and are supposed to vary through the thickness direction of beam which modeled via modified power-law rule. Since variation of pores along the thickness direction influences the mechanical and physical properties, porosity play a key role in the mechanical response of curved FG nano-structures. The governing equations and related boundary condition of curved porous FG nanobeam under temperature field are derived via the energy method based on Timoshenko beam theory. An analytical Navier solution procedure is utilized to achieve the natural frequencies of porous FG curved nanobeam supposed to thermal loading. The results for simpler states are confirmed with known data in the literature. The effects of various parameters such as nonlocality parameter, porosity volume fractions, thermal effect, gradient index, opening angle and aspect ratio on the natural frequency of curved FG porous nanobeam are successfully discussed. It is concluded that these parameters play key roles on the dynamic behavior of porous FG curved nanobeam. Presented numerical results can serve as benchmarks for future analyses of curve FG nanobeam with porosity phases.

Using rough set to develop the optimization strategy of evolving time-division trading in the futures market (러프집합을 활용한 캔들스틱 트레이딩 최적화 전략)

  • Kim, Hyun-Ho;Oh, Kyong-Joo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.5
    • /
    • pp.881-893
    • /
    • 2012
  • This paper proposes to develop system trading strategy using rough set, decision tree in futures market. While there is a great deal of literature about the analysis of data mining, there is relatively little work on developing trading strategies in futures markets. There are three objectives in this paper. The first objective is to analysis performance of decision tree in rule-based system trading. The second objective is to find proper profitable trading interval. The last objective is to find optimized training period of trading rule training. The results of this study show that proposed model is useful trading strategy in foreign exchange market and can be desirable solution which gives lots of investors an important investment information.

A Fuzzy Linear Programming Problem with Fuzzy Convergent Equality Constraints (퍼지 융합 등식 제약식을 갖는 퍼지 선형계획법 문제)

  • Oh, Se-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.227-232
    • /
    • 2015
  • The fuzzy linear programming(FLP) is the useful approach to many real world problems under uncertainty. This paper deals with a FLP whose objective value is fuzzy. And the right hand sides of convergent equality constraints are fuzzy numbers. We assume that the membership function of the objective value is piecewise linear and those of the right hand side are trapezoidal. Each of these trapezoidal functions can be algebraically replaced with three linear functions. Then the FLP problem is transformed into the Zimmermann's symmetric model. The fuzzy solution based on the max-min rule can be obtained by solving the crisp linear programming problem derived from the symmetric model. A numerical example has illustrated our approach. The application of our approach to the inconsistent linear system can enable generate us to get define the useful and flexible inexact solutions within acceptable tolerance. Further research is required to generalize the membership function.