• Title/Summary/Keyword: common use

Search Result 4,253, Processing Time 0.034 seconds

Conducted EMI reduction of Induction Motor Drive System by PWM Switching Technique (PWM 스위칭 기법에 의한 유도전동기 구동시스템의 전도노이즈 저감)

  • Kim H. J.;Lee W. C.;Kim L. H.;Won C. Y.;Choi S. Y.;Kim G. S.;Jeong D. H.
    • Proceedings of the KIPE Conference
    • /
    • 2004.07b
    • /
    • pp.769-773
    • /
    • 2004
  • Conventional SVPWM method has null switching vectors. Null switching vectors cause high common-mode voltage in induction motor drive system. The newly developed common mode voltage reduction PWM technique don't use zero switching state for inverter control. It is realized by changing software without additional hardware. Simulation and experimental results show that proposed method are reduced common mode voltage more than conventional method.

  • PDF

(DS)-WEAK COMMUTATIVITY CONDITION AND COMMON FIXED POINT IN INTUITIONISTIC MENGER SPACES

  • Sharma, Sushil;Deshpande, Bhavana;Chouhan, Suresh
    • The Pure and Applied Mathematics
    • /
    • v.18 no.3
    • /
    • pp.201-217
    • /
    • 2011
  • The aim of this paper is to define a new commutativity condition for a pair of self mappings i.e., (DS)-weak commutativity condition, which is weaker that compatibility of mappings in the settings of intuitionistic Menger spaces. We show that a common fixed point theorem can be proved for nonlinear contractive condition in intuitionistic Menger spaces without assuming continuity of any mapping. To prove the result we use (DS)-weak commutativity condition for mappings. We also give examples to validate our results.

Design of Generalized Distributed Architecture for Applications Development in VANETs (VANETs에서의 어플리케이션 개발을 위한 분산 구조 설계)

  • Kanize, Thamina;Lee, Mee-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.190-195
    • /
    • 2010
  • Vehicular ad hoc networks (VANETs) have a number of interesting applications to preserve road safety, notify users about changed road/traffic condition, handling post accident hazards and moreover service oriented applications to make the travel convenient to the drivers. Use of common information format for diverse applications enables the application developers to easily design flexible information dissemination system for new applications or add new features to existing application. This paper introduces a common information format for various applications in VANETs. The main goal of the paper is to design generalized distributed architectures for vehicular networks, which considers diverse application development scenarios and uses common information format. The proposed architectures enable the application developers to flexibly disseminate information to affected or interested user. In this paper, we have given a detail description of each component of the architectures and how they communicate with each other. In future, we will implement the proposed architecture using suitable simulator.

  • PDF

Comparison Density Representation of Traditional Test Statistics for the Equality of Two Population Proportions

  • Jangsun Baek
    • Communications for Statistical Applications and Methods
    • /
    • v.2 no.1
    • /
    • pp.112-121
    • /
    • 1995
  • Let $p_1$ and $p_2$ be the proportions of two populations. To test the hypothesis $H_0 : p_1 = p_2$, we usually use the $x^2$ statistic, the large sample binomial statistic Z, and the Generalized Likelihood Ratio statistic-2log $\lambda$developed based on different mathematical rationale, respectively. Since testing the above hypothesis is equivalent to testing whether two populations follow the common Bernoulli distribution, one may also test the hypothesis by comparing 1 with the ratio of each density estimate and the hypothesized common density estimate, called comparison density, which was devised by Parzen(1988). We show that the above traditional test statistics ate actually estimating the measure of distance between the true densities and the common density under $H_0$ by representing them with the comparison density.

  • PDF

Maximizing Use of Common Parts in Complex System Design through Organizing 3D Design Process (3D 설계 프로세스 정립을 통한 복잡한 시스템 설계에서의 공용부품 사용 극대화)

  • Choi, Y.W.;Park, K.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.3
    • /
    • pp.209-219
    • /
    • 2007
  • Designing a complex system such as an LCD developing system becomes inefficient when many designers are involved and create their own parts even though they can be used repeatedly in other sections. Thus, this paper proposes a new design process that can maximize the number of common parts in complex system design by organizing the 3D design process. The proposed design process consists of 5 stages: analysis of design intention, definition of initial product structure, definition of skeleton model, sharing design intention with all assembles, control of correlation between components. The proposed design process can maximize common parts in design process, which results in shorter lead time, less production cost, and greater economic benefits.

A Secure Operating System Architecture Based on Linux against Communication Offense with Root Exploit for Unmanned Aerial Vehicles

  • Koo, KwangMin;Lee, Woo-yeob;Cho, Sung-Ryung;Joe, Inwhee
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.42-48
    • /
    • 2020
  • This paper proposes an operating system architecture for unmanned aerial vehicle (UAV), which is secure against root exploit, resilient to connection loss resulting in the control loss, and able to utilize common applications used in Linux. The Linux-based UAVs are exposed to root exploit. On the other hand, the microkernel-based UAVs are not able to use the common applications utilized in Linux, even though which is secure against root exploit. For this reason, the proposed architecture uses a virtualized microkernel on the Linux operating system to isolate communication roles and prevent root exploit. As a result, the suggested Operating system is secure against root exploit and is able to utilize the common applications at the same time.

A History of the Common Logarithmic Table with Proportional Parts (상용로그표의 비례부분에 대한 역사적 고찰)

  • Kim, Tae Soo
    • Journal for History of Mathematics
    • /
    • v.27 no.6
    • /
    • pp.409-419
    • /
    • 2014
  • In school mathematics, the logarithmic function is defined as the inverse function of an exponential function. And the natural logarithm is defined by the integral of the fractional function 1/x. But historically, Napier had already used the concept of logarithm in 1614 before the use of exponential function or integral. The calculation of the logarithm was a hard work. So mathematicians with arithmetic ability made the tables of values of logarithms and people used the tables for the estimation of data. In this paper, we first take a look at the mathematicians and mathematical principles related to the appearance and the developments of the logarithmic tables. And then we deal with the confusions between mathematicians, raised by the estimation data which were known as proportional parts or mean differences in common logarithmic tables.

A Study on the Origin of "Myeongnyundang(明倫堂)", the Common Name of the Main Lecture Halls at Confucian Schools -Based on Chinese Historical Documents- ("명륜당(明倫堂)" 명칭의 유래에 관한 연구 -중국의 역대 고문헌을 중심으로-)

  • Baik, So-Hun
    • Journal of architectural history
    • /
    • v.30 no.2
    • /
    • pp.7-18
    • /
    • 2021
  • This paper studied the origin of Myeongnyundang(明倫堂), the common name of the main lecture halls at confucian schools in ancient China. Through an extensive investigation of local chronicles, biographies, decrees and construction essays, it found the first Myeongnyundang were titled on the main hall of a local school in the early Southern Song(南宋) period, and it might become the most popular name due to Zhuxi (朱熹), a famous confucian scholar in the Southern Song dynasty. In Yuan(元) period, it almost become the fixed name for the main lecture hall at local confucian schools, and even the official government documents began to use it as a common noun since the beginning of Ming(明) dynasty.

Performance Comparison of Common-Mode Voltage Reduction PWM Methods in Terms of Modulation Index (변조지수에 따른 공통모드 전압 저감 PWM 기법 성능 비교)

  • Heo, Geon;Park, Yongsoon
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.26 no.2
    • /
    • pp.135-140
    • /
    • 2021
  • This study introduces a new pulse width modulation (PWM) method to reduce common-mode voltages (CMVs) and then compares its performance with other reduced CMV-PWM (RCMV-PWM) methods. CMVs should be reduced to ensure the electromagnetic compatibility and safety of grid-connected inverters. RCMV-PWM methods attempt to synthesize voltage references without zero vectors, which cause high CMV peaks. In these methods, the peak-to-peak magnitude of CMVs can be reduced by one-third of the conventional space-vector PWM. The introduced method splits every reference vector into two vectors to avoid the use of zero vectors. The performances of the RCMV-PWM methods are analyzed in accordance with the modulation index through simulation and experiment.

Spring Boot-based Web Application Development for providing information on Security Vulnerabilities and Patches for Open Source Software (Spring Boot 기반의 오픈소스 소프트웨어 보안 취약점 및 패치 정보 제공 웹 어플리케이션 개발)

  • Sim, Wan;Choi, WoongChul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.77-83
    • /
    • 2021
  • As Open Source Software(OSS) recently invigorates, many companies actively use the OSSes in their business software. With such OSS invigoration, our web application is developed in order to provide the safety in using the OSSes, and update the information on the new vulnerabilities and the patches at all times by crawling the web pages of the relevant OSS home pages and the managing organizations of the vulnerabilities. By providing the updated information, our application helps the OSS users and developers to be aware of such security issues, and gives them to work in the safer environment from security risks. In addition, our application can be used as a security platform to greatly contribute to preventing potential security incidents not only for companies but also for individual developers.