• Title/Summary/Keyword: equilibrium method

Search Result 1,962, Processing Time 0.037 seconds

NUMERICAL INVESTIGATION OF INTERACTION BEHAVIOR BETWEEN CAVITATION BUBBLE AND SHOCK WAVE

  • Shin, Byeong-Rog;An, Young-Joon
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.03a
    • /
    • pp.215-220
    • /
    • 2008
  • A numerical method for gas-liquid two-phase flow is applied to solve shock-bubble interaction problems. The present method employs a finite-difference Runge-Kutta method and Roe's flux difference splitting approximation with the MUSCL-TVD scheme. A homogeneous equilibrium cavitation model is used. By this method, a Riemann problem for shock tube was computed for validation. Then, shock-bubble interaction problems between cylindrical bubbles located in the liquid and incident liquid shock wave are computed.

  • PDF

NUMERICAL INVESTIGATION OF INTERACTION BEHAVIOR BETWEEN CAVITATION BUBBLE AND SHOCK WAVE

  • Shin, Byeong-Rog;An, Young-Joon
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.215-220
    • /
    • 2008
  • A numerical method for gas-liquid two-phase flow is applied to solve shock-bubble interaction problems. The present method employs a finite-difference Runge-Kutta method and Roe's flux difference splitting approximation with the MUSCL-TVD scheme. A homogeneous equilibrium cavitation model is used. By this method, a Riemann problem for shock tube was computed for validation. Then, shock-bubble interaction problems between cylindrical bubbles located in the liquid and incident liquid shock wave are computed.

  • PDF

A Study on the Methods for Finding Initial Equilibrium Position of a Lifting Block for the Safe Erection (블록의 탑재 안전성을 위한 초기 평형 자세 탐색 방법 연구)

  • Chun, Do-Hyun;Roh, Myung-Il;Ham, Seung-Ho;Lee, Hye-Won
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.4
    • /
    • pp.297-305
    • /
    • 2018
  • In a shipyard, block lifting is an important process in the production of ships and offshore structures. Block lifting is a sensitive process because lifting blocks have to be erected with exact positions and orientations. If we use a numerical method for the process, it is important to find tensions of wires and positions of equalizers to maintain the initial equilibrium position of the block. At this time, equations of motion of the block should be solved to calculate the initial equilibrium position of the block. Because the solving technique changes according to the number of equalizers, a suitable equation for the corresponding problem is required. In this study, three types of equations are proposed to find the initial equilibrium position of the block according to the number of equalizers. The Newton-Raphson's method is used to solve nonlinear simultaneous equations and the optimization method is used to determine the appropriate solution to the undetermined problem. To evaluate the applicability of the proposed methods, the dynamic simulations are performed using the tensions calculated from the proposed methods, and the results are discussed. The results show that the proposed methods can be effectively used to determine initial equilibrium position of the block for the block lifting.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

A Differential Privacy Approach to Preserve GWAS Data Sharing based on A Game Theoretic Perspective

  • Yan, Jun;Han, Ziwei;Zhou, Yihui;Lu, Laifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1028-1046
    • /
    • 2022
  • Genome-wide association studies (GWAS) aim to find the significant genetic variants for common complex disease. However, genotype data has privacy information such as disease status and identity, which make data sharing and research difficult. Differential privacy is widely used in the privacy protection of data sharing. The current differential privacy approach in GWAS pays no attention to raw data but to statistical data, and doesn't achieve equilibrium between utility and privacy, so that data sharing is hindered and it hampers the development of genomics. To share data more securely, we propose a differential privacy preserving approach of data sharing for GWAS, and achieve the equilibrium between privacy and data utility. Firstly, a reasonable disturbance interval for the genotype is calculated based on the expected utility. Secondly, based on the interval, we get the Nash equilibrium point between utility and privacy. Finally, based on the equilibrium point, the original genotype matrix is perturbed with differential privacy, and the corresponding random genotype matrix is obtained. We theoretically and experimentally show that the method satisfies expected privacy protection and utility. This method provides engineering guidance for protecting GWAS data privacy.

Investigation of the observed solar coronal plasma in EUV and X-rays in non-equilibrium ionization state

  • Lee, Jin-Yi;Raymond, John C.;Reeves, Katharine K.;Shen, Chengcai;Moon, Yong-Jae
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.1
    • /
    • pp.53.1-53.1
    • /
    • 2018
  • During a major solar eruption, the erupting plasma is possibly out of the equilibrium ionization state because of its rapid heating or cooling. The non-equilibrium ionization process is important in a rapidly evolving system where the thermodynamical time scale is shorter than the ionization or recombination time scales. We investigate the effects of non-equilibrium ionization on EUV and X-ray observations by the Atmospheric Imaging Assembly (AIA) on board Solar Dynamic Observatory and X-ray Telescope (XRT) on board Hinode. For the investigation, first, we find the emissivities for all the lines of ions of elements using CHIANTI 8.07, and then we find the temperature responses multiplying the emissivities by the effective area for each AIA and XRT passband. Second, we obtain the ion fractions using a time-dependent ionization model (Shen et al. 2015), which uses an eigenvalue method, for all the lines of ion, as a function of temperature, and a characteristic time scale, $n_et$, where $n_e$ and t are density and time, respectively. Lastly, the ion fractions are multiplied to the temperature response for each passband, which results in a 2D grid for each combination of temperature and the characteristic time scale. This is the set of passband responses for plasma that is rapidly ionized in a current sheet or a shock. We investigate an observed event which has a relatively large uncertainty in an analysis using a differential emission measure method assuming equilibrium ionization state. We verify whether the observed coronal plasmas are in non-equilibrium or equilibrium ionization state using the passband responses.

  • PDF

Expansion of the equilibrium constants for the temperature range of 300K to 20,000K

  • Kim, Jae Gang
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.17 no.4
    • /
    • pp.455-466
    • /
    • 2016
  • Chemical-kinetic parameters of the equilibrium constants to evaluate the reverse rate coefficients in the shock layer of a blunt body and the expanding flows are derived for the temperature range from 300 K to 20,000 K. The expanded equilibrium constants for the chemical reactions of the dissociation, ionization, associative ionization, and neutral and charge exchange reactions of the atmospheric species and carbon materials are proposed in the present work. In evaluating the equilibrium constants, the inter-nuclear potential energies of the molecular species are calculated by the analytical potential function of the Hulburt-Hirschfelder model, and the parameters of the analytical model are determined from the semi-classically calculated RKR potentials. The electronic states and energies of the atoms are calculated by the electronic energy grouping model, and the rovibrational states and energies of each electronic states of the molecules are evaluated by the WKB method. The expanded equilibrium constants for 31 types of the reactions are provided for the best curve-fit functions, and the recombination reaction rate coefficients evaluated from the present equilibrium constants are compared with existing measured values.

Applying the Nash Equilibrium to Constructing Covert Channel in IoT

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.243-248
    • /
    • 2021
  • Although many different types of covert channels have been suggested in the literature, there are little work in directly applying game theory to building up covert channel. This is because researchers have mainly focused on tailoring game theory for covert channel analysis, identification, and covert channel problem solving. Unlike typical adaptation of game theory to covert channel, we show that game theory can be utilized to establish a new type of covert channel in IoT devices. More specifically, we propose a covert channel that can be constructed by utilizing the Nash Equilibrium with sensor data collected from IoT devices. For covert channel construction, we set random seed to the value of sensor data and make payoff from random number created by running pseudo random number generator with the configured random seed. We generate I × J (I ≥ 2, J ≥ 2) matrix game with these generated payoffs and attempt to obtain the Nash Equilibrium. Covert channel construction method is distinctly determined in accordance with whether or not to acquire the Nash Equilibrium.

Finite element formulations for free field one-dimensional shear wave propagation

  • Sun-Hoon Kim;Kwang-Jin Kim
    • Earthquakes and Structures
    • /
    • v.26 no.2
    • /
    • pp.163-174
    • /
    • 2024
  • Dynamic equilibrium equations for finite element analysis were derived for the free field one-dimensional shear wave propagation through the horizontally layered soil deposits with the elastic half-space. We expressed Rayleigh's viscous damping consisting of mass and stiffness proportional terms. We considered two cases where damping matrices are defined in the total and relative displacement fields. Two forms of equilibrium equations are presented; one in terms of total motions and the other in terms of relative motions. To evaluate the performance of new equilibrium equations, we conducted two sets of site response analyses and directly compared them with the exact closed-form frequency domain solution. Results show that the base shear force as earthquake load represents the simpler form of equilibrium equation to be used for the finite element method. Conventional finite element procedure using base acceleration as earthquake load predicts exact solution reasonably well even in soil deposits with unrealistically high damping.

Comparison Analysis of Factor of Safety on Rock Slope in Boeun Region Using Distinct Element Method and Limit Equilibrium Method (개별요소법과 한계평형법을 이용한 보은지역 암반사면 안전율 비교해석)

  • 이지수;유광호;박혁진;민경덕
    • Journal of the Korean Geotechnical Society
    • /
    • v.19 no.4
    • /
    • pp.33-41
    • /
    • 2003
  • The large planar failure has occurred in a rock cut slope of highway construction site in Boeun. This area is considered to be unstable since the discontinuity, whose orientation is similar to the orientation of the failure plane, is observed in many areas. Therefore, several analysis techniques such as SMR, stereographic analysis, limit equilibrium, numerical analysis, which are commonly used in rock slope stability analysis, are adopted in this area. In order to analyze the stress redistribution and nonlinear displacement caused by cut, which are not able to be obtained in limit equilibrium method, DEM and shear strength reduction technique were used in this study. Then the factors of safety evaluated by shear strength reduction technique and limit equilibrium were compared. In addition, the factor of safety under fully saturated slope condition was calculated and subsequently, the effect of the reinforcement was evaluated.