• Title/Summary/Keyword: Symmetric Scheme

Search Result 235, Processing Time 0.023 seconds

HIGH ORDER EMBEDDED RUNGE-KUTTA SCHEME FOR ADAPTIVE STEP-SIZE CONTROL IN THE INTERACTION PICTURE METHOD

  • Balac, Stephane
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.17 no.4
    • /
    • pp.238-266
    • /
    • 2013
  • The Interaction Picture (IP) method is a valuable alternative to Split-step methods for solving certain types of partial differential equations such as the nonlinear Schr$\ddot{o}$dinger equation or the Gross-Pitaevskii equation. Although very similar to the Symmetric Split-step (SS) method in its inner computational structure, the IP method results from a change of unknown and therefore do not involve approximation such as the one resulting from the use of a splitting formula. In its standard form the IP method such as the SS method is used in conjunction with the classical 4th order Runge-Kutta (RK) scheme. However it appears to be relevant to look for RK scheme of higher order so as to improve the accuracy of the IP method. In this paper we investigate 5th order Embedded Runge-Kutta schemes suited to be used in conjunction with the IP method and designed to deliver a local error estimation for adaptive step size control.

Identity-Based Key Management Scheme for Smart Grid over Lattice

  • Wangke, Yu;Shuhua, Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.74-96
    • /
    • 2023
  • At present, the smart grid has become one of the indispensable infrastructures in people's lives. As a commonly used communication method, wireless communication is gradually, being widely used in smart grid systems due to its convenient deployment and wide range of serious challenges to security. For the insecurity of the schemes based on large integer factorization and discrete logarithm problem in the quantum environment, an identity-based key management scheme for smart grid over lattice is proposed. To assure the communication security, through constructing intra-cluster and inter-cluster multi-hop routing secure mechanism. The time parameter and identity information are introduced in the relying phase. Through using the symmetric cryptography algorithm to encrypt improve communication efficiency. Through output the authentication information with probability, the protocol makes the private key of the certification body no relation with the distribution of authentication information. Theoretic studies and figures show that the efficiency of keys can be authenticated, so the number of attacks, including masquerade, reply and message manipulation attacks can be resisted. The new scheme can not only increase the security, but also decrease the communication energy consumption.

Numerical Solutions for Thick-Welled Laminated Composite Spheres under Impact Pressure (충격내압을 받는 복합적층 중공구의 수치해)

  • Oh Guen;Sim Woo-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.29 no.2 s.233
    • /
    • pp.293-302
    • /
    • 2005
  • In this paper, the thick-walled laminated, orthotropic as well as bimaterial, composite hollow spheres under impact pressure are analyzed in detail by using the semi-discrete finite element method with the Houbolt time-integration scheme which results in unconditionally stable transient numerical results. Numerical results are obtained by using the self-constructed spherically symmetric (one-dimensional) and axially symmetric (two-dimensional) finite element programs, and compared with the previous solutions by other researchers, being shown some of which are incorrect. The finite element package Nastran is also adopted for numerical comparison.

Optimization of LU-SGS Code for the Acceleration on the Modern Microprocessors

  • Jang, Keun-Jin;Kim, Jong-Kwan;Cho, Deok-Rae;Choi, Jeong-Yeol
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.14 no.2
    • /
    • pp.112-121
    • /
    • 2013
  • An approach for composing a performance optimized computational code is suggested for the latest microprocessors. The concept of the code optimization, termed localization, is maximizing the utilization of the second level cache that is common to all the latest computer systems, and minimizing the access to system main memory. In this study, the localized optimization of the LU-SGS (Lower-Upper Symmetric Gauss-Seidel) code for the solution of fluid dynamic equations was carried out in three different levels and tested for several different microprocessor architectures widely used these days. The test results of localized optimization showed a remarkable performance gain of more than two times faster solution than the baseline algorithm for producing exactly the same solution on the same computer system.

Thermopiezoelastic Nonlinear Dynamic Characteristics of Piezolaminated Plates (압전적층판의 열-압전-탄성 동적 비선형 작동특성)

  • Oh, Il-Kwon
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2005.05a
    • /
    • pp.662-667
    • /
    • 2005
  • Nonlinear dynamics of active piezolaminated plates are investigated with respect to the thermopiezoelastic behaviors. For largely deformed structures with small strain, the incremental total Lagrangian formulation is presented based on the virtual work principles. A multi field layer wise finite shell element is proposed for assuring high accuracy and non-linearity of displacement, electric and thermal fields. For dynamic consideration of thermopiezoelastic snap through phenomena, the implicit Newmark's scheme with the Newton-Raphson iteration is implemented for the transient response of various piezolaminated models with symmetric or eccentric active layers. The bifurcate thermal buckling of symmetric structural models is first investigated and the characteristics of piezoelectric active responses are studied for finding snap through piezoelectric potentials and the load path tracking map. The thermoelastic stable and unstable postbuckling, thermopiezoelastic snap through phenomena with several attractors are proved using the nonlinear time responses for various initial conditions and damping loss factors. Present results show that thermopiezoelastic snap through phenomena can result in the difficulty of buckling and postbuckling control of intelligent structures.

  • PDF

Numerical Simulation of the Unsteady Flow Field Induced by a High-speed Train Passing through a Tunnel (터널을 통과하는 고속철도차량에 의해 형성되는 비정상 유동장의 수치해석)

  • 권혁빈;이동호;김문상
    • Journal of the Korean Society for Railway
    • /
    • v.3 no.4
    • /
    • pp.229-236
    • /
    • 2000
  • In this study, the unsteady flow field induced by a high-speed train passing through a tunnel is numerically simulated by using an axi-symmetric Euler Equation. The modified patched grid scheme applied to a structured grid system was used to handle the relative motion of a train. The hybrid-dimensional approach which mixed 1D and axi-symmetric dimension was used to reduce the computation time and memory storage. By employing the hybrid-dimensional approach, a long tunnel as much as 5 km was able to be simulated efficiently. The results show that the maximum pressure rise in the tunnel by the entrance of the train is a function of both train speed and train-tunnel cross-sectional area ratio. The unsteady pressure fluctuation in the tunnel and around the train was also investigated in the real condition; Korean high-speed train on the Seoul-Pusan line.

  • PDF

Study of the Weak Shock Wave Discharged from an Annular Tube (환형 관출구로부터 방출되는 약한 충격파에 관한 연구)

  • Kweon Yong-Hun;Lee Dong-Hoon;Kim Heuy-Dong
    • 한국가시화정보학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.113-116
    • /
    • 2002
  • The shock wave discharged from an annular duct leads to very complicated flow features, such as Mach stem, spherical waves, and vortex rings. In the current study, the merging phenomenon and propagation characteristics of the shock wave are numerically investigated using a CFD method. The Harten-Yee's total variation diminishing (TVD) scheme is used to the unsteady, axisymmetric, two-dimensional, compressible Euler equations. The Mach number of incident shock wave $M_s$ is varied in the range below 2.0. The computational results are visualized to observe the major features of the annular shock waves discharged from the tube. On the symmetric axis, the peak pressure produced by the shock wave and its location depend upon strongly the radius of the annular tubes. A Mach stem is generated along the symmetric axis of the annular tubes.

  • PDF

Stable activation-based regression with localizing property

  • Shin, Jae-Kyung;Jhong, Jae-Hwan;Koo, Ja-Yong
    • Communications for Statistical Applications and Methods
    • /
    • v.28 no.3
    • /
    • pp.281-294
    • /
    • 2021
  • In this paper, we propose an adaptive regression method based on the single-layer neural network structure. We adopt a symmetric activation function as units of the structure. The activation function has a flexibility of its form with a parametrization and has a localizing property that is useful to improve the quality of estimation. In order to provide a spatially adaptive estimator, we regularize coefficients of the activation functions via ℓ1-penalization, through which the activation functions to be regarded as unnecessary are removed. In implementation, an efficient coordinate descent algorithm is applied for the proposed estimator. To obtain the stable results of estimation, we present an initialization scheme suited for our structure. Model selection procedure based on the Akaike information criterion is described. The simulation results show that the proposed estimator performs favorably in relation to existing methods and recovers the local structure of the underlying function based on the sample.

Event Routing Scheme to Improve I/O Latency of SMP VM (SMP 가상 머신의 I/O 지연 시간 감소를 위한 이벤트 라우팅 기법)

  • Shin, Jungsub;Kim, Hagyoung
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1322-1331
    • /
    • 2015
  • According to the hypervisor scheduler, the vCPU (virtual CPU) operates under two states: the running state and the stop state. When the vCPU is in the stop state, incoming events are delayed until that vCPU's state changes to the running state. The latency in handling such events that are sent to the vCPU is regarded as the I/O latency. Since a SMP (symmetric multiprocessing) VM (virtual machine) incorporates multiple vCPUs, the event latency on a SMP VM can vary according to specific vCPU that receives the event. In this paper, we propose a new scheme named event routing that sends events according to the operation state of each vCPU to reduce the event latency on an SMP VM. We implemented the proposed event routing scheme in Xen ARM hypervisor and confirmed the reduction of I/O latency from measuring the network RTT (round trip time) and the TCP bandwidth under a variety of testing conditions. The network RTT decreases by up to 94% and the TCP bandwidth increases up to 35% when compare to native Xen ARM.

Public Key Authentication using(t, n) Threshold Scheme for WSN ((t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증)

  • Kim, Jun-Yop;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.58-70
    • /
    • 2008
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.