• Title/Summary/Keyword: computational model

Search Result 7,086, Processing Time 0.044 seconds

Development of 460V/225A/50㎄ Contact System in Current Limiting Molded Case Circuit Breakers

  • Park, Young-Kil;Park, Chan-Kyo
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.3B no.4
    • /
    • pp.165-172
    • /
    • 2003
  • Low voltage circuit breakers are widely used in power distribution systems to interrupt fault current rapidly and to assure the reliability of the power supply. This paper is focused on understanding the interrupting capability, more specifically of the contacts and the arc runner, based on the shape of the contact system in the current molded case circuit breaker (hereafter MCCB). Moreover, in order to improve the interrupting capability of the circuit breaker, the estimation and analysis of the interrupting capability, based on the 3-D magnetic flux analysis, were developed. Furthermore, this paper also presents results of the estimation and analysis of the interrupting capability when applied to different model breakers. In addition, this paper analyzes the efficiency of the interrupting tests by forming false current paths consisting of a three-division cascade arc runner in the contact system. With regards to the interrupting test, there is a need to assure that the optimum design required to analyze the electromagnetic forces of the contact system generated by the current and flux density be present. Based on the results of this study, this paper presents both computational analysis and test results for the newly developed MCCB 460V/225A/50㎄ contact system.

Alternative approach for reproducing the in-plane behaviour of rubble stone walls

  • Tarque, Nicola;Camata, Guido;Benedetti, Andrea;Spacone, Enrico
    • Earthquakes and Structures
    • /
    • v.13 no.1
    • /
    • pp.29-38
    • /
    • 2017
  • Stone masonry is one of the oldest construction types due to the natural and free availability of stones and the relatively easy construction. Since stone masonry is brittle, it is also very vulnerable and in the case of earthquakes damage, collapses and causalities are very likely to occur, as it has been seen during the last Italian earthquake in Amatrice in 2016. In the recent years, some researchers have performed experimental tests to improve the knowledge of the behaviour of stone masonry. Concurrently, there is the need to reproduce the seismic behaviour of these structures by numerical approaches, also in consideration of the high cost of experimental tests. In this work, an alternative simplified procedure to numerically reproduce the diagonal compression and shear compression tests on a rubble stone masonry is proposed within the finite element method. The proposed procedure represents the stone units as rigid bodies and the mortar as a plastic material with compression and tension inelastic behaviour calibrated based on parametric studies. The validation of the proposed model was verified by comparison with experimental data. The advantage of this simplified methodology is the use of a limited number of degrees of freedom which allows the reduction of the computational time, which leaves the possibility to carry out parametric studies that consider different wall configurations.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Face Recognition Method Robust to Change in Lighting Condition (조명의 변화에 강건한 얼굴인식)

  • Nam, Kee-Hwan;Han, Jun-Hee;Park, Ho-Sik;Lee, Young-Sik;Jung, Yen-Gil;Ra, Sang-Dong;Bae, Cheol-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1137-1140
    • /
    • 2005
  • The work presented in this paper describes a Hidden Markov Model(HMM)-based framework for face recognition and face detection. The observation vectors used to characterize the statics of the HMM are obtained using the coefficients of the Karhuman-Loves Transform(KLT). The face recognition method presented in this paper reduces significantly the computational complexity of previous HMM-based face recognition systems, while slightly improving the recognition rate. In addition, the suggested method is more effective than the exiting ones in face extraction in terms of accuracy and others even under complex changes to the surroundings such as lighting.

  • PDF

A Passive Ranging Filter with Initial Range Error Compensation (초기 거리오차 보상 피동 거리 추정 필터)

  • 황익호;정상근
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.5 no.2
    • /
    • pp.185-194
    • /
    • 2002
  • To extract relative ranges from LOS(line of sight) information, we propose a passive ranging filter which is suitable for anti-ship missiles in HOJ(home on jam) mode. The proposed filter is devised to cope with the case that a passive ranging filter may include a large initial range estimation error since modem jammers are capable of very long range jamming. In addition, under the assumption that the missile motion is dominant over the HOJ engagement situation, the engagement geometry is modeled by a second order system. A new passive ranging filter is proposed by constructing an extended Kalman filter(EKF) based on the model. And then a least square initial state error estimation algorithm is attached to the EKF. Simulation results show that the proposed filter has a good range estimation performance with small computational load.

A Hybrid Heuristic Approach for Supply Chain Planningwith n Multi-Level Multi-Item Capacitated Lot Sizing Model (자원제약하의 다단계 다품목 공급사슬망 생산계획을 위한 휴리스틱 알고리즘)

  • Shin Hyun-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.1
    • /
    • pp.89-95
    • /
    • 2006
  • Planning distributed manufacturing logistics is one of main issues in supply chain management. This paper proposes a hybrid heuristic approach for the Multi-Level, multi-item Capacitated Lot Sizing Problem (MLCLSP) in supply chain network. MLCLSP corresponds to a mixed integer programming (MIP) problem. With integer variable solutions determined by heuristic search, this MIP problem becomes linear program (LP). By repeatedly solving the relaxed MIP problems with a heuristic search method in a hybrid manner, this proposed approach allocates finite manufacturing resources fur each distributed facilities and generates feasible production plans. Meta heuristic search algorithm is presented to solve the MIP problems. The experimental test evaluates the computational performance under a variety of problem scenarios.

  • PDF

Optimization for Xenon Oscillation in Load Following Operation of PWR (가압경수형 원자로 부하추종 운전시 제논진동 최적화)

  • 김건중;오성헌;박인용
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.38 no.11
    • /
    • pp.861-869
    • /
    • 1989
  • The optimization problems, based on Pontryagin's Maximum Principle, for minimizing (damping) Xenon spatial oscillations in Load Following operations of Pressurized Water Reactor (PWR) is presented. The optimization model is formulated as an optimal tracking problem with quadratic objective functional. The oen-group diffusion equations and Xe-I dynamic equations are defined as equality constraints. By applying the maximum principle, the original problem is decomposed into a single time problem with no constraints. The resultant subproblems are optimized by using the conjugate Gradient Method. The computational results show that the Xenon spatial oscillation is minimized, and the reactor follows the load demand of the electrical power systems while maintaining the desired power distribution.

A New Distribution System Power Flow Method Using Symmetrical Components (대칭성분을 이용한 3상 배전계통 조류계산 기법)

  • Choe, Jeong-Hwan;Jeong, Seong-Il;Park, Je-Yeong;Kim, Gwang-Ho;Kim, Jae-Eon;Park, Jong-Geun
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.51 no.1
    • /
    • pp.15-22
    • /
    • 2002
  • This paper proposes a new power flow method for distribution system analysis by modifying the conventional back/forward sweep method using symmetrical components. Since the proposed method backward and forward sweeps with the variables expressed by symmetrical components, this method reduces computation time for matrix calculations; therefore, it is able to reduce the computational burden for real-time distribution network analysis. The proposed method was also developed to effectively analyze the unbalanced distribution system installing AVR(Auto Voltage Regulator), shunt capacitors. The proposed algorithm was compared with the conventional Back/forward Sweep method by applying both methods to three phase unbalanced distribution system of IEEE 123-bus model, and the test results showed that the proposed method would outperformed the conventional method in real-time distribution system analysis.

Singularity Avoidance Algorithms for Controlling Robot Manipulator: A Comparative Study (로봇 메니퓰레이터의 제어를 위한 특이점 회피 알고리즘의 비교 연구)

  • Kim, Sanghyun;Park, Jaeheung
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.1
    • /
    • pp.42-54
    • /
    • 2017
  • Using an inverse of the geometric Jacobian matrix is one of the most popular ways to control robot manipulators, because the Jacobian matrix contains the relationship between joint space velocities and operational space velocities. However, the control algorithm based on Jacobian matrix has algorithmic singularities: The robot manipulator becomes unstable when the Jacobian matrix loses rank. To solve this problem, various methods such as damped and filtered inverse have been proposed, but comparative studies to evaluate the performance of these algorithms are insufficient. Thus, this paper deals with a comparative analysis of six representative singularity avoidance algorithms: Damped Pseudo Inverse, Error Damped Pseudo Inverse, Scaled Jacobian Transpose, Selectively Damped Inverse, Filtered Inverse, and Task Transition Method. Especially, these algorithms are verified through computer simulations with a virtual model of a humanoid robot, THORMANG, in order to evaluate tracking error, computational time, and multiple task performance. With the experimental results, this paper contains a deep discussion about the effectiveness and limitations of each algorithm.

Analysis of Coal Combustion and Particle Temperature Profiles in a Rotary Kiln for Production of Light-weight Aggregate (경량골재 로타리킬른의 운전최적화를 위한 석탄연소 및 원료입자 승온특성 해석)

  • Park, Jong-Keun;Ryu, Changkook;Kim, Young-Ju
    • Journal of the Korean Society of Combustion
    • /
    • v.19 no.3
    • /
    • pp.18-25
    • /
    • 2014
  • Bottom ash from a coal-fired power plant is usually landfilled to a nearby site, which causes a growing environmental concern and increased operating costs. One way of recycling the bottom ash is to produce light-weight aggregate (LWA) using a rotary kiln. This study investigated the temperature profiles of raw LWA particles in a rotary kiln to identify the range of operating conditions appropriate for ideal bloating. For this purpose, a new simulation method was developed to integrate a 1-dimensional model for the bed of LWA particles and the computational fluid dynamics (CFD) for the fuel combustion and gas flow. The temperature of LWA particles was found very sensitive to the changes in the air preheating temperature and excess air ratio. Therefore, an accurate control of the operation parameters was essential to achieve the bloating of LWA particles without excessive sintering or melting.