• Title/Summary/Keyword: Small Perturbation Model

Search Result 70, Processing Time 0.023 seconds

Impedance spectroscopy for lifetime analysis of OLED

  • Yoon, Chul-Oh;Kim, Hyun-Chul;Yi, Seok-Kyung;Kong, Ung-Gul;Lee, Nam-Heon;Lee, Chang-Hee
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2002.08a
    • /
    • pp.137-140
    • /
    • 2002
  • The frequency response analysis of complex impedance spectra using small perturbation ac impedance spectroscopy is an informative method of OLED performance characterization and lifetime analysis. Using simple RC equivalent circuit mode,l macroscopic nonliniear transport properties of semiconductive emission/transport layers can be analyzed and parameterized. We present the bias voltage dependence and aging effect in impedance spectra measured from an ITO/CuPC/TPD/$Alq_3$/LiF/Al OLED device, and discuss possible failure mechanism based on impedance model parameters.

  • PDF

Inverse estimation of boundary characteristics by using underwater reverberation signals (수중 잔향음신호를 이용한 경계면 상태 역추정 알고리즘)

  • 김상균
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1996.06a
    • /
    • pp.45-50
    • /
    • 1996
  • 천해에서 얻은 잔향음신호를 역추정 알고리즘으로 분석하여 자료수집 당시의 환경 변수인 해상풍의 세기와 해저면의 상태를 추정하는 방법에 대하여 기술하였다. 소오나 시스템과 잔향음신호 수집 당시의 환경 자료를 알고 있다면 음원에서 방사된 음파가 해수면에 처음 도달하는 시간과 수평입사각을 multipath eigenray model에 의해서 계산할 수 있고 이 정보를 이용하여 수신된 잔향음 신호를 분석하여 해수면에 의한 산란잔향음 준위와 시간을 계산할 수 있다. 해수면 후방산란강도는 수평입사각, 음원의 주파수, 해상풍의 세기 등에 의해 특징지어지며 계산된 잔향음 준위로부터 소오나 방정식을 이용하여 후방산란강도를 알아낼 수 있다. 이 후방산란강도를 입력자료로 하여 Method of Small Perturbation이론과 Chapman과 Harris가 유도한 실험식을 사용하여 입력된 값과 일치할 때까지 후방산란강도를 계산하여 이때의 환경변수를 찾아내었다. 한편 해저면 잔향음신호는 표준화된 후방산란강도값들의 PDF를 만들어 그 분포양상을 분석하였다. 본 논문에서 사용된 알고리즘의 검증을 위해서는 보다 다양한 환경하에서 실시된 많은 음향괸측자료를 필요로 한다.

  • PDF

Rotordynamic Analysis for Labyrinth Seals Used in Compressors (압축기용 라비린스 실의 동특성 해석)

  • 하태웅;이안성
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.138-144
    • /
    • 1997
  • The analysis of lateral hydrodynamic forces from the compressor labyrinth seals is presented. The basic equations are derived using a two-control-volume model for compressible flow. Blasius' wall friction-factor formula and jet flow theory are used for the calculation of the wall shear stresses and the recirculation velocity in the cavity. Linearized zeroth-order and first-order perturbation equations are developed for small motion about a centered position by an expansion in the eccentricity ratio. Integration of the resultant first-order pressure distribution along and around the seal defines the rotordynamic coefficients of the labyrinth seal. The rotordynamic analysis for the balance drum labyrinth seal of an ethylene refrigeration compressor is carried out. The results of rotordynamic characteristic of the labyrinth seal and comparisons with other types of seal, honeycomb seal and smooth seal, are presented.

  • PDF

Wave Resistance of a Ship at Low Froude Numbers (비 Froude수에 있어서 선체의 조파저항)

  • 김인철
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.17 no.2
    • /
    • pp.109-113
    • /
    • 1981
  • Most existing theories on ship waves and wave resistance are based on the perturbation of the flow field by a small pararr.eter which specifies the slenderness of the ship hull. Since however, ship hulls in practice are neither so slender nor thin enough to secure the validity of the linearized theory, the agreen:ent between the theoretical prediction and the experimental result is not generally satisfactory. The author pointed out that the contribution by the non-linear term in the free surface condition can be represented by sorr.e source distribution over the still water plane. This paper leads to a forrr.ula for the wave resistance of not slender ships at low Froude nurr.bers. and deals with the asynptotic expression. As a nurr.erical example, the wave resistance of Wigley model is calculated, and the result is compared with experimental values. It is concluded that the wave resistance coefficient varies in the rate of Fn6 at low speed limit in general. A comparison with the result derived from the linearized free surface condition shows that the non-linearity of the free surface is irr portant at low speed.

  • PDF

FITTED OPERATOR ON THE CRANK-NICOLSON SCHEME FOR SOLVING A SMALL TIME DELAYED CONVECTION-DIFFUSION EQUATIONS

  • TEFERA, DAGNACHEW MENGSTIE;TIRUNEH, AWOKE ANDARGIE;DERESE, GETACHEW ADAMU
    • Journal of applied mathematics & informatics
    • /
    • v.40 no.3_4
    • /
    • pp.491-505
    • /
    • 2022
  • This paper is concerned with singularly perturbed convection-diffusion parabolic partial differential equations which have time-delayed. We used the Crank-Nicolson(CN) scheme to build a fitted operator to solve the problem. The underling method's stability is investigated, and it is found to be unconditionally stable. We have shown graphically the unstableness of CN-scheme without fitting factor. The order of convergence of the present method is shown to be second order both in space and time in relation to the perturbation parameter. The efficiency of the scheme is demonstrated using model examples and the proposed technique is more accurate than the standard CN-method and some methods available in the literature, according to the findings.

Identification of Stiffness Parameters of Nanjing TV Tower Using Ambient Vibration Records (상시진동 계측자료를 이용한 Nanjing TV탑의 강성계수 추정)

  • Kim Jae Min;Feng. M. Q.
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1998.04a
    • /
    • pp.291-300
    • /
    • 1998
  • This paper demonstrates how ambient vibration measurements at a limited number of locations can be effectively utilized to estimate parameters of a finite element model of a large-scale structural system involving a large number of elements. System identification using ambient vibration measurements presents a challenge requiring the use of special identification techniques, which ran deal with very small magnitudes of ambient vibration contaminated by noise without the knowledge of input farces. In the present study, the modal parameters such as natural frequencies, damping ratios, and mode shapes of the structural system were estimated by means of appropriate system identification techniques including the random decrement method. Moreover, estimation of parameters such as the stiffness matrix of the finite element model from the system response measured by a limited number of sensors is another challenge. In this study, the system stiffness matrix was estimated by using the quadratic optimization involving the computed and measured modal strain energy of the system, with the aid of a sensitivity relationship between each element stiffness and the modal parameters established by the second order inverse modal perturbation theory. The finite element models thus identified represent the actual structural system very well, as their calculated dynamic characteristics satisfactorily matched the observed ones from the ambient vibration test performed on a large-scale structural system subjected primarily to ambient wind excitations. The dynamic models identified by this study will be used for design of an active mass damper system to be installed on this structure fer suppressing its wind vibration.

  • PDF

The study of Controlling chaos for Bonhoeffer-van der Pol oscillation model by small parameter perturbation (Bonhoeffer - van der Pol 오실레이터 모델에서의 미소 파라미터 섭동에 의한 카오스 제어)

  • Bae, Yeong-Chul;Ko, Jae-Ho;Yim, Wha-Yeong
    • Proceedings of the KIEE Conference
    • /
    • 1995.07b
    • /
    • pp.817-819
    • /
    • 1995
  • Applied by periodic Stimulating Currents in Bonhoeffer-Van der Pol(BVP) model, chaotic and periodic phenomena occured at specific conditions. The conditions of the chaotic motion in BVP comprised 0.7182< $A_{1}$ <0.792 and 1.09< $A_{1}$ <1.302 proved by the analysis of phase plane, bifurcation diagram, and lyapunov exponent. To control the chaotic motion, two methods were suggested by the first used the amplitude parameter $A_{1}$,$A_{1}={\varepsilon}((x-x_{s})-(y-y_{s}))$ and the second used the temperature parameter c, c=c$(1+ {\eta}cos{\Omega}t)$ which the values of $\eta$, ${\Omega}$ varied respectlvly, and $x_{s}$, $y_{s}$ are the periodic signal. As a result of simulating these methods, the chaotic phenomena was controlled with the periodic motion of periodisity. The feasibilities of the chaotic and the periodic phenomena were analysed by phase plane and lyapunov exponent.

  • PDF

Improving Adversarial Robustness via Attention (Attention 기법에 기반한 적대적 공격의 강건성 향상 연구)

  • Jaeuk Kim;Myung Gyo Oh;Leo Hyun Park;Taekyoung Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.621-631
    • /
    • 2023
  • Adversarial training improves the robustness of deep neural networks for adversarial examples. However, the previous adversarial training method focuses only on the adversarial loss function, ignoring that even a small perturbation of the input layer causes a significant change in the hidden layer features. Consequently, the accuracy of a defended model is reduced for various untrained situations such as clean samples or other attack techniques. Therefore, an architectural perspective is necessary to improve feature representation power to solve this problem. In this paper, we apply an attention module that generates an attention map of an input image to a general model and performs PGD adversarial training upon the augmented model. In our experiments on the CIFAR-10 dataset, the attention augmented model showed higher accuracy than the general model regardless of the network structure. In particular, the robust accuracy of our approach was consistently higher for various attacks such as PGD, FGSM, and BIM and more powerful adversaries. By visualizing the attention map, we further confirmed that the attention module extracts features of the correct class even for adversarial examples.

Analysis of Electromagnetic Wave Scattering From a Perfectly Conducting One Dimensional Fractal Surface Using the Monte-Carlo Moment Method (몬테칼로 모멘트 방법을 이용한 1차원 프랙탈 완전도체 표면에서의 전자파 산란 해석)

  • 최동묵;김채영
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.12
    • /
    • pp.566-574
    • /
    • 2002
  • In this paper, the scattered field from a perfectly conducting fractal surface by the Monte-Carlo moment method was computed. An one-dimensional fractal surface was generated by using the fractional Brownian motion model. Back scattering coefficients are calculated with different values of the spectral parameter(S$\_$0/), and fractal dimension(D) which determine characteristics of the fractal surface. The number of surface realization for the computed field, the point number, and the width of surface realization are set to be 80, 2048, and 64L, respectively. In order to verify the computed results these results are compared with those of small perturbation methods, which show good agreement between them.

ShareSafe: An Improved Version of SecGraph

  • Tang, Kaiyu;Han, Meng;Gu, Qinchen;Zhou, Anni;Beyah, Raheem;Ji, Shouling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5731-5754
    • /
    • 2019
  • In this paper, we redesign, implement, and evaluate ShareSafe (Based on SecGraph), an open-source secure graph data sharing/publishing platform. Within ShareSafe, we propose De-anonymization Quantification Module and Recommendation Module. Besides, we model the attackers' background knowledge and evaluate the relation between graph data privacy and the structure of the graph. To the best of our knowledge, ShareSafe is the first platform that enables users to perform data perturbation, utility evaluation, De-A evaluation, and Privacy Quantification. Leveraging ShareSafe, we conduct a more comprehensive and advanced utility and privacy evaluation. The results demonstrate that (1) The risk of privacy leakage of anonymized graph increases with the attackers' background knowledge. (2) For a successful de-anonymization attack, the seed mapping, even relatively small, plays a much more important role than the auxiliary graph. (3) The structure of graph has a fundamental and significant effect on the utility and privacy of the graph. (4) There is no optimal anonymization/de-anonymization algorithm. For different environment, the performance of each algorithm varies from each other.