• Title/Summary/Keyword: Upper Bounds

Search Result 417, Processing Time 0.027 seconds

Stability Condition for Discrete Interval Time-Varying System with Unstructured Uncertainty and Time-Varying Delay Time (비구조화된 불확실성과 시변 지연시간을 갖는 이산 시변 구간 시스템의 안정조건)

  • Hyung-seok Han
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.6
    • /
    • pp.504-509
    • /
    • 2022
  • In this paper, we deal with the stability condition of linear time-varying interval discrete systems with time-varying delays and unstructured uncertainty. For the time-varying interval discrete system which has interval matrix as its system matrices, time-varying delay time within some interval value and unstructured uncertainty which can include non-linearity and be expressed by only its magnitude, the stability condition is proposed. Compared with the previous result derived by using a upper bound solution of the Lyapunov equation, the new result is derived by the form of simple inequality based on Lyapunov stability condition and has the advantage of being more effective in checking stability. Furthermore, the proposed condition is very comprehensive, powerful and inclusive the previously published conditions of various linear discrete systems, and can be expressed by the terms of magnitudes of the time-varying delay time and uncertainty, and bounds of interval matrices. The superiority of the new condition is shown in the derivation, and the usefulness and advantage of the proposed condition are examined through numerical example.

Development of Modification Coefficient for Nonlinear Single Degree of Freedom System Considering Plasticity Range for Structures Subjected to Blast Loads (폭발 하중을 받는 구조물의 소성 범위를 고려한 비선형 단자유도 시스템의 수정계수 개발)

  • Tae-Hun Lim;Seung-Hoon Lee;Han-Soo Kim
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.37 no.3
    • /
    • pp.179-186
    • /
    • 2024
  • In this paper, a modification coefficient for equivalent single degree of freedom (SDOF), considering the plasticity range of the member subjected to shock wave type of blast load, was developed. The modification coefficient for the equivalent SDOF was determined through comparison with the analysis of a multi-degree of freedom (MDOF) system. The parameters influencing the equivalent SDOF system analysis were chosen as the boundary conditions of the member and the ratio of the duration of blast load to the natural period of the member. The modification coefficient was calculated based on the elastic load-mass transformation factor. The modification coefficient curve was derived using an elliptical equation to ensure it exists between the upper and lower parameter bounds. Using the modification coefficient on examples with varying cross sections and boundary conditions reduced the SDOF analysis error rate from 15% to 3%. This study shows that using the modification coefficient significantly improves the accuracy of SDOF analysis. The modification coefficient proposed in this study can be used for blast analysis.

Study on slope stability of waste dump with a weak layer using finite element limit analysis method

  • Chong Chen;Huayong Lv;Jianjian Zhao;Zhanbo Cheng;Huaiyuan Wang;Gao Xu
    • Structural Engineering and Mechanics
    • /
    • v.89 no.3
    • /
    • pp.253-263
    • /
    • 2024
  • Slope stability is generally paid more attention to in slope protection works, especially for slope containing weak layers. Two indexes of safety factor and failure model are selected to perform slope stability. Moreover, the finite element limit analysis method comprehensively combines the advantage of the limit analysis method and the finite element method obtaining the upper and lower bounds of the safety factor and the failure mode under the slope stability limit state. In this study, taking a waste dump containing a weak layer as an engineering background, the finite element limit analysis method is adopted to explore the potential failure mode. Meanwhile, the sensitivity analysis of slope stability is performed on geometrical and geotechnical parameters of the waste dump. The results show that the failure mode of the waste dump slope is two wedges if the weak layer is located on the ground surface (Model A), while the slope can be observed as three wedges failure if the weak layer is below the ground surface (Model B). In addition, both failure modes are highly sensitive to the friction angle of the weak layer and the shear strength of waste disposal, and moderately sensitive to the heap height, the dip angle and cohesion of the weak layer, while the toe cutting has limited effect on the slope stability. Moreover, the sensitivity to the excavation of the ground depends on the location of the weak layer and failure mode.

Cycle Extendability of Torus Sub-Graphs in the Enhanced Pyramid Network (개선된 피라미드 네트워크에서 토러스 부그래프의 사이클 확장성)

  • Chang, Jung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1183-1193
    • /
    • 2010
  • The pyramid graph is well known in parallel processing as a interconnection network topology based on regular square mesh and tree architectures. The enhanced pyramid graph is an alternative architecture by exchanging mesh into the corresponding torus on the base for upgrading performance than the pyramid. In this paper, we adopt a strategy of classification into two disjoint groups of edges in regular square torus as a basic sub-graph constituting of each layer in the enhanced pyramid graph. Edge set in the torus graph is considered as two disjoint sub-sets called NPC(represents candidate edge for neighbor-parent) and SPC(represents candidate edge for shared-parent) whether the parents vertices adjacent to two end vertices of the corresponding edge have a relation of neighbor or sharing in the upper layer of the enhanced pyramid graph. In addition, we also introduce a notion of shrink graph to focus only on the NPC-edges by hiding SPC-edges within the shrunk super-vertex on the resulting shrink graph. In this paper, we analyze that the lower and upper bounds on the number of NPC-edges in a Hamiltonian cycle constructed on $2^n{\times}2^n$ torus is $2^{2n-2}$ and $3{\cdot}2^{2n-2}$ respectively. By expanding this result into the enhanced pyramid graph, we also prove that the maximum number of NPC-edges containable in a Hamiltonian cycle is $4^{n-1}$-2n+1 in the n-dimensional enhanced pyramid.

Transmitter Beamforming and Artificial Noise with Delayed Feedback: Secrecy Rate and Power Allocation

  • Yang, Yunchuan;Wang, Wenbo;Zhao, Hui;Zhao, Long
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.374-384
    • /
    • 2012
  • Utilizing artificial noise (AN) is a good means to guarantee security against eavesdropping in a multi-inputmulti-output system, where the AN is designed to lie in the null space of the legitimate receiver's channel direction information (CDI). However, imperfect CDI will lead to noise leakage at the legitimate receiver and cause significant loss in the achievable secrecy rate. In this paper, we consider a delayed feedback system, and investigate the impact of delayed CDI on security by using a transmit beamforming and AN scheme. By exploiting the Gauss-Markov fading spectrum to model the feedback delay, we derive a closed-form expression of the upper bound on the secrecy rate loss, where $N_t$ = 2. For a moderate number of antennas where $N_t$ > 2, two special cases, based on the first-order statistics of the noise leakage and large number theory, are explored to approximate the respective upper bounds. In addition, to maintain a constant signal-to-interferenceplus-noise ratio degradation, we analyze the corresponding delay constraint. Furthermore, based on the obtained closed-form expression of the lower bound on the achievable secrecy rate, we investigate an optimal power allocation strategy between the information signal and the AN. The analytical and numerical results obtained based on first-order statistics can be regarded as a good approximation of the capacity that can be achieved at the legitimate receiver with a certain number of antennas, $N_t$. In addition, for a given delay, we show that optimal power allocation is not sensitive to the number of antennas in a high signal-to-noise ratio regime. The simulation results further indicate that the achievable secrecy rate with optimal power allocation can be improved significantly as compared to that with fixed power allocation. In addition, as the delay increases, the ratio of power allocated to the AN should be decreased to reduce the secrecy rate degradation.

Mapping Heterogenous Ontologies for the HLP Applications - Sejong Semantic Classes and KorLexNoun 1.5 - (인간언어공학에의 활용을 위한 이종 개념체계 간 사상 - 세종의미부류와 KorLexNoun 1.5 -)

  • Bae, Sun-Mee;Im, Kyoung-Up;Yoon, Ae-Sun
    • Korean Journal of Cognitive Science
    • /
    • v.21 no.1
    • /
    • pp.95-126
    • /
    • 2010
  • This study proposes a bottom-up and inductive manual mapping methodology for integrating two heterogenous fine-grained ontologies which were built by a top-down and deductive methodology, namely the Sejong semantic classes (SJSC) and the upper nodes in KorLexNoun 1.5 (KLN), for HLP applications. It also discusses various problematics in the mapping processes of two language resources caused by their heterogeneity and proposes the solutions. The mapping methodology of heterogeneous fine-grained ontologies uses terminal nodes of SJSC and Least Upper Bounds (LUB) of KLN as basic mapping units. Mapping procedures are as follows: first, the mapping candidate groups are decided by the lexfollocorrelation between the synsets of KLN and the noun senses of Sejong Noun Dfotionaeci(SJND) which are classified according to SJSC. Secondly, the meanings of the candidate groups are precisely disambiguated by linguistic information provided by the two ontologies, i.e. the hierarchicllostructures, the definitions, and the exae les. Thirdly, the level of LUB is determined by applying the appropriate predicates and definitions of SJSC to the upper-lower and sister nodes of the candidate LUB. Fourthly, the mapping possibility ic inthe terminal node of SJSC is judged by che aring hierarchicllorelations of the two ontologies. Finally, the ituorrect synsets of KLN and terminologiollocandidate groups are excluded in the mapping. This study positively uses various language information described in each ontology for establishing the mapping criteria, and it is indeed the advantage of the fine-grained manual mapping. The result using the proposed methodology shows that 6,487 LUBs are mapped with 474 terminal and non-terminal nodes of SJSC, excluding the multiple mapped nodes, and that 88,255 nodes of KLN are mapped including all lower-level nodes of the mapped LUBs. The total mapping coverage is 97.91% of KLN synsets. This result can be applied in many elaborate syntactic and semantic analyses for Korean language processing.

  • PDF

Estimation of Maximum Typhoon Intensity Considering Climate Change Scenarios and Simulation of Corresponding Storm Surge (기후변화 시나리오에 따른 최대 가능 태풍강도 추정 및 이에 따른 폭풍해일고 양상 모의)

  • Yoon, Jong-Joo;Jun, Ki-Cheon;Shim, Jae-Seol;Park, Kwang-Soon
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.15 no.4
    • /
    • pp.292-301
    • /
    • 2012
  • The rise in sea surface temperature (SST) as a global warming enhance overall typhoon activity. We assumed that there exist thermodynamic limits to intensity that apply in the absence of significant interaction between storms and their environment. The limit calculations depend on SST and atmospheric profiles of temperature and moisture. This approach do appear to provide resonable upper bounds on the intensities of observed storms and may even be useful for predicting the change in intensity over a long period time. The maximum storm intensities was estimated through the global warming scenarios from IPCC-AR4 report over the North-East Asia. The result shows stronger intensities according to scenarios for increase of carbon dioxide levels. And storm surge simulations was performed with the typhoons which were combined route of the typhoon Maemi (2003) and intensity as climate change scenarios. The maximum increase of storm surge heights was shown about 29~110 cm (36~65%) regionally. Especially at Masan, the result of simulated maximum surge height exceed the 200 years return period surge.

Barrier Option Pricing with Binomial Trees Applying Generalized Catalan Numbers (이항분포모형에 일반화된 카탈란 수를 적용한 배리어 옵션의 가격 산정)

  • Choi, Seung-il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.226-231
    • /
    • 2016
  • Binomial trees are used to price barrier options. Since barrier options are path dependent, option values of each node are calculated from binomial trees using backward induction. We use generalized Catalan numbers to determine the number of cases not reaching a barrier. We will generalize Catalan numbers by imposing upper and lower bounds. Reaching a barrier in binomial trees is determined by the difference between the number of up states and down states. If we count the cases that the differences between the up states and down states remain in a specific range, the probability of not reaching a barrier is obtained at a final node of the tree. With probabilities and option values at the final nodes of the tree, option prices are computable by discounting the expected option value at expiry. Without calculating option values in the middle nodes of binomial trees, option prices are computable only with final option values. We can obtain a probability distribution of exercising an option at expiry. Generalized Catalan numbers are expected to be applicable in many other areas.

Optimal Design of Batch-Storage Network Including Uncertainty and Waste Treatment Processes (불확실한 공정과 불량품 처리체계를 포함하는 공정-저장조 망 최적설계)

  • Yi, Gyeongbeom;Lee, Euy-Soo
    • Korean Chemical Engineering Research
    • /
    • v.46 no.3
    • /
    • pp.585-597
    • /
    • 2008
  • The aim of this study was to find an analytic solution to the problem of determining the optimal capacity (lot-size) of a batch-storage network to meet demand for a finished product in a system undergoing random failures of operating time and/or batch material. The superstructure of the plant considered here consists of a network of serially and/or parallel interlinked batch processes and storage units. The production processes transform a set of feedstock materials into another set of products with constant conversion factors. The final product demand flow is susceptible to short-term random variations in the cycle time and batch size as well as long-term variations in the average trend. Some of the production processes have random variations in product quantity. The spoiled materials are treated through regeneration or waste disposal processes. All other processes have random variations only in the cycle time. The objective function of the optimization is minimizing the total cost, which is composed of setup and inventory holding costs as well as the capital costs of constructing processes and storage units. A novel production and inventory analysis, the PSW (Periodic Square Wave) model, provides a judicious graphical method to find the upper and lower bounds of random flows. The advantage of this model is that it provides a set of simple analytic solutions while also maintaining a realistic description of the random material flows between processes and storage units; as a consequence of these analytic solutions, the computation burden is significantly reduced.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.