• Title/Summary/Keyword: bilinear system

Search Result 197, Processing Time 0.028 seconds

마찰진자시스템의 강성중심 변화에 따른 면진된 원전 구조물의 지진응답평가 (Seismic Response Evaluation of Seismically Isolated Nuclear Power Plant with Stiffness Center Change of Friction Pendulum Systems)

  • 석철근;송종걸
    • 한국지진공학회논문집
    • /
    • 제21권6호
    • /
    • pp.265-275
    • /
    • 2017
  • In order to improve the seismic performance of structures, friction pendulum system (FPS) is the most commonly used seismic isolation device in addition to lead rubber bearing (LRB) in high seismicity area. In a nuclear power plant (NPP) with a large self weight, it is necessary to install a large number of seismic isolation devices, and the position of the center of rigidity varies depending on the arrangement of the seismic isolation devices. Due to the increase in the eccentricity, which is the difference between the center of gravity of the nuclear structure and the center of stiffness of the seismic isolators, an excessive seismic response may occur which could not be considered at the design stage. Three different types of eccentricity models (CASE 1, CASE 2, and CASE 3) were used for seismic response evaluation of seismically isolated NPP due to the increase of eccentricity (0%, 5%, 10%, 15%). The analytical model of the seismic isolation system was compared using the equivalent linear model and the bilinear model. From the results of the seismic response of the seismically isolated NPP with increasing eccentricity, it can be observed that the effect of eccentricity on the seismic response for the equivalent linear model is larger than that for the bilinear model.

부재의 이력모델에 따른 건축구조물의 내진성능 평가 (Evaluation of Seismic Performance for Building Structures by Hysteresis Model of Elements)

  • 한덕전;고현
    • 한국공간구조학회논문집
    • /
    • 제9권4호
    • /
    • pp.73-80
    • /
    • 2009
  • 성능에 기초한 내진설계에서 구조물의 지진에 대한 성능평가를 위하여 구조물의 비탄성 지진거동을 정확하게 예측하는 젓이 중요하다. 정확한 시스템의 연성능력 평가를 위해서는 각부재의 하중과 변형의 관계를 보다 실제적으로 규정하는 것이 중요하다. 비선형 해석에 의한 구조물의 비탄성 거동 파악을 위해서 단순화된 부재의 하중-변형 관계 모델을 적용한다면 구조물의 실제적이고 정확한 거동을 예측하기에는 어려움이 있다. 본 논문에서는 하중-변형 관계를 Backbone 이력모델을 적용하여 단순화된 하중-변형 관계를 적용한 모델과 시스템연성능력 및 층연성능력을 비교, 평가하였다. 해석결과로 이선형 이력모델의 경우에 시스템 및 층 연성도의 과소평가는 실제구조물의 소성거동을 과소평가하는 곁과를 초래하며 보다 정착한 비선형해석을 위하여 부재의 이력모델은 Backbone 이력모델을 사용하는 것이 바람직하다.

  • PDF

키프레임 얼굴영상을 이용한 시청각음성합성 시스템 구현 (Implementation of Text-to-Audio Visual Speech Synthesis Using Key Frames of Face Images)

  • 김명곤;김진영;백성준
    • 대한음성학회지:말소리
    • /
    • 제43호
    • /
    • pp.73-88
    • /
    • 2002
  • In this paper, for natural facial synthesis, lip-synch algorithm based on key-frame method using RBF(radial bases function) is presented. For lips synthesizing, we make viseme range parameters from phoneme and its duration information that come out from the text-to-speech(TTS) system. And we extract viseme information from Av DB that coincides in each phoneme. We apply dominance function to reflect coarticulation phenomenon, and apply bilinear interpolation to reduce calculation time. At the next time lip-synch is performed by playing the synthesized images obtained by interpolation between each phonemes and the speech sound of TTS.

  • PDF

Fixed-Order $H_{\infty}$ Controller Design for Descriptor Systems

  • Zhai, Guisheng;Yoshida, Masaharu;Koyama, Naoki
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.898-902
    • /
    • 2003
  • For linear descriptor systems, we consider the $H_{INFTY}$ controller design problem via output feedback. Both static output feedback and dynamic one are discussed. First, in the case of static output feedback, we reduce our control problem to solving a bilinear matrix inequality (BMI) with respect to the controller coefficient matrix, a Lyapunov matrix and a matrix related to the descriptor matrix. Under a matching condition between the descriptor matrix and the measured output matrix (or the control input matrix), we propose setting the Lyapunov matrix in the BMI as being block diagonal appropriately so that the BMI is reduced to LMIs. For fixed-order dynamic $H_{INFTY}$ output feedback, we formulate the control problem equivalently as the one of static output feedback design, and thus the same approach can be applied.

  • PDF

발전기 과열기의 증기 온도 제어기 설계 (Steam Temperature Controller Design of Power Plant Superheater)

  • 홍현문;전병석;김종근;강금부;이봉섭
    • 한국조명전기설비학회:학술대회논문집
    • /
    • 한국조명전기설비학회 2005년도 춘계학술대회논문집
    • /
    • pp.412-414
    • /
    • 2005
  • In this paper, we present a method of fuzzy controller design for the power plant superheater in the form of bilinear system. For the steam temperature control, the input variables are constructed by the area of difference between the profiles estimated from bilinear observer and reference profiles, and the time rate of change. We estimate the control rules by T. Takagi and M. Sugeno's fuzzy model. The feasibilities of the suggested method are illustrated via the computer simulation result.

  • PDF

2차 재귀 다항식 시스템을 이용한 수직 자기 기록 채널 등화 기법 (Perpendicular Magnetic Recording Channel Equalization Using a Bilinear Recursive Polynomial System)

  • 조현민;공규열;최수용
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.279-280
    • /
    • 2008
  • In order to improve the performance and simplify the structure of the conventional detectors in high density magnetic channels, a new equalizer based on bilinear recursive polynomial (BRP) models, which uses the previously estimated sequence, is proposed. The performance is compared with the conventional equalizers and the maximum likelihood sequence detection (MLSD) bound.

  • PDF

ON EFFICIENT TWO-FLOW ZERO-KNOWLEDGE IDENTIFICATION AND SIGNATURE

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • 제29권3_4호
    • /
    • pp.869-877
    • /
    • 2011
  • In this paper, we propose an efficient two-flow zero-knowledge blind identification protocol on the elliptic curve cryptographic (ECC) system. A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. But our protocol is secure under such attacks because of using the hash function. In particular, it is fast because we don't use the pairing operation and consists of only two message flows. It does not rely on any underlying signature or encryption scheme. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Ducted Marine Propeller의 점성 유동 수치 해석 (Numerical Viscous Flow Analysis of Ducted Marine Propeller)

  • 유혜란;정영래;박원규
    • 한국전산유체공학회:학술대회논문집
    • /
    • 한국전산유체공학회 2003년도 추계 학술대회논문집
    • /
    • pp.188-193
    • /
    • 2003
  • The present work solved 3D incompressible RANS equation on a rotating, non-orthogonal multi-blocked grid system to efficiently analyze ducted marine propulsor with rotor-stator interaction. To handle the interface boundary between a rotor and a stator maintaining the conservative property, the sliding multiblock technique using the cubic spline interpolation and the bilinear interpolation technique were applied. To validate present code, a turbine flow having rotor- stator interaction was simulated. Time averaged pressure coefficients were compared with experiments and good agreement was obtained. After the code validation, the flowfield around a single-stage ducted marine propulsor was simulated.

  • PDF

Nakazato-Wang-Yamamura '07의 프라이버시가 강화된 크레덴셜 시스템에 대한 크레덴셜 위조 공격 (Credential Forging Attack against Privacy Enhancing Credential System in Nakazato-Wang-Yamamura '07)

  • 양대헌;이경희
    • 정보보호학회논문지
    • /
    • 제18권5호
    • /
    • pp.195-199
    • /
    • 2008
  • 이 논문에서는 ASIAN 2007에서 Nakazato, Wang, Yamamura 등이 발표한 프라이버시가 강화된 크레덴셜 시스템에서 크레덴셜 발급자인 서버의 도움 없이도 사용자와 검증자가 공모하는 경우에 크레덴셜을 위조할 수 있음을 보인다. 이 공격은 크레덴셜의 생성과정에서 사용하는 서버의 비밀키를 겹선형 사상의 성질을 이용해서 우회하는 방법을 이용한다. 또한, 이 공격방법의 이론적인 영향과 실질적인 영향을 고찰해 본다.