• Title/Summary/Keyword: state sets

Search Result 448, Processing Time 0.033 seconds

Axial behavior of steel-jacketed concrete columns

  • Rupp, J.;Sezen, H.;Chaturvedi, S.
    • Steel and Composite Structures
    • /
    • v.16 no.1
    • /
    • pp.59-75
    • /
    • 2014
  • A new concrete confinement model is developed to predict the axial load versus displacement behavior of circular columns under concentric axial load. The new confinement model is proposed for concrete filled steel tube columns as well as circular reinforced concrete columns with steel tube jacketing. Existing confinement models were evaluated and improved using available experimental data from different sets of columns tested under similar loading conditions. The proposed model is based on commonly used confinement models with an emphasis on modifying the effective confining pressure coefficient utilizing the strength of the unconfined concrete and the steel tube, the length of the column, and the thickness of the steel tube. The proposed model predicts the ultimate axial strength and the corresponding strain with an acceptable degree of accuracy while also highlighting the importance of the manner in which the steel tube is used.

A Study on The Protection Organization for The Chief of State in North and South Korea (${\cdot}$북한의 국가원수 경호조직에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.17-50
    • /
    • 1997
  • I study on the security organization for the chief of state in North and South Korea. The paper, purporting to analyze security system in comparative prospectives, comprise four chapters. Chapter I Which sets out purpose, scope and method, is followed by Chapter II , dealing largely with the power structure on The Socialist Constitution of Democratic People's Republic of Korea, the protection organization and security activities for the chief of state in North Korea. Chapter III concerns the security environment - terrorist groups, firearms, explosives, suspects, movements of hostile countries and orthers - and the protection organization on The Presidential Security Service for the president in South Korea, culminating in projection of certain problem area. It is followed by concluding observation made in Chapter IV. To be operated security systems effectively, these need to be regulated according to a protective scale, function, authority of a existing.

  • PDF

Identification of Leverage Points for Power System State Estimation (전력개통 상태추정을 위한 leverage point 판별에 관한 연구)

  • Lee, Koang-Kee;Lim, Jae-Sub;Kwon, Hyung-Seok;Kim, Hong-Rae
    • Proceedings of the KIEE Conference
    • /
    • 2002.11b
    • /
    • pp.212-214
    • /
    • 2002
  • Existence of leverage points was claimed to be the reason for the WLAV estimator failing to reject bad data in the measurements. This paper presents an impact of leverage points on the result of power system state estimation. State estimator is run with measurement sets with gross error and leverage point. Three test cases are performed and the results are presented using IEEE 30 bus system.

  • PDF

Addition Reaction of Cyclopropane with Magnesium Dihydride (MgH2): A Theoretical Study

  • Singh, Satya Prakash;Meena, Jay Singh;Thankachan, Pompozhi Protasis
    • Journal of the Korean Chemical Society
    • /
    • v.57 no.6
    • /
    • pp.697-702
    • /
    • 2013
  • The addition reaction of cyclopropane with $MgH_2$ has been investigated using the B3LYP density functional method employing several split-valence basis sets. Both along the and perpendicular to the cyclopropane ring approach has been reported. It is shown that the reaction proceeds via a four-centered transition state. Calculations at higher levels of theory were also performed at the geometries optimized at the B3LYP level, but only slight changes in the barriers were observed. Structural parameters for the transition state are also reported.

Load and Mutual Inductance Identification Method for Series-Parallel Compensated IPT Systems

  • Chen, Long;Su, Yu-Gang;Zhao, Yu-Ming;Tang, Chun-Sen;Dai, Xin
    • Journal of Power Electronics
    • /
    • v.17 no.6
    • /
    • pp.1545-1552
    • /
    • 2017
  • Identifying the load and mutual inductance is essential for improving the power transfer capability and power transfer efficiency of Inductive Power Transfer (IPT) systems. In this paper, a steady-state load and mutual inductance identification method focusing on series-parallel compensated IPT systems is proposed. The identification model is established according to the steady-state characteristics of the system. Furthermore, two sets of identification results are obtained, and then they are analyzed in detail to eliminate the untrue one. In addition, the identification method can be achieved without extra circuits so that it does not increase the complexity of the system or the control difficulty. Finally, the feasibility of the proposed method has been verified by simulation and experimental results.

Augmentation of Hidden Markov Chain for Complex Sequential Data in Context

  • Sin, Bong-Kee
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.31-34
    • /
    • 2021
  • The classical HMM is defined by a parameter triple �� = (��, A, B), where each parameter represents a collection of probability distributions: initial state, state transition and output distributions in order. This paper proposes a new stationary parameter e = (e1, e2, …, eN) where N is the number of states and et = P(|xt = i, y) for describing how an input pattern y ends in state xt = i at time t followed by nothing. It is often said that all is well that ends well. We argue here that all should end well. The paper sets the framework for the theory and presents an efficient inference and training algorithms based on dynamic programming and expectation-maximization. The proposed model is applicable to analyzing any sequential data with two or more finite segmental patterns are concatenated, each forming a context to its neighbors. Experiments on online Hangul handwriting characters have proven the effect of the proposed augmentation in terms of highly intuitive segmentation as well as recognition performance and 13.2% error rate reduction.

Input Constrained Receding Horizon Control Using Complex Polyhedral Invariant Region (복소형 다각형 불변영역을 이용한 입력제한 예측제어)

  • 이영일;방대인;윤태웅;김기용
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.12
    • /
    • pp.991-997
    • /
    • 2002
  • The concept of feasible & invariant region plays an important role to derive closed loop stability and achie adequate performance of constrained receding horizon predictive control. In this paper, we define a complex polyhedral feasible & invariant set for all stabilizable input-constrained linear systems by using a complex transform and propose a one-norm based receding horizon control scheme using these invariant sets. In order to get a larger stabilizable set, a convex hull of invariant sets which are defined for different state feedback gains is used as a target invariant set of the constrained receding horizon control. The proposed constrained receding horizon control scheme is formulated so that it can be solved via linear programming.

Reliability Analysis of Multistate Systems with Multistate Components (다항상태 부품으로 구성된 다항상태 시스템의 신뢰도 분석에 관한 연구)

  • Lee, Chong-Hyung
    • Journal of Korean Society for Quality Management
    • /
    • v.35 no.2
    • /
    • pp.99-105
    • /
    • 2007
  • Most of systems used in real fields are considered as multistate systems with multistate components. As one of methods for performance evaluation of the system, reliability analysis has been popularly used. In this paper, we propose an improved reliability analysis method which is based on state space decomposition method of Aven (1985). In deriving upper bounds, our method uses sets of unspecified states whereas Aven (1985) excludes sets of unacceptance states. Also, closer lower bounds to an exact reliability are obtained by considering of importance of min-path vectors.

Improved Convective Heat Transfer Correlations for Two-Phase Two-Component Pipe Flow

  • Kim, Dongwoo
    • Journal of Mechanical Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.403-422
    • /
    • 2002
  • In this study, six two-phase nonboiling heat transfer correlations obtained from the recommendations of our previous work were assessed. These correlations were modified using seven extensive sets of two-phase flow experimental data available from the literature, for vertical and horizontal tubes and different flow patterns and fluids. A total of 524 data points from five available experimental studies (which included the seven sets of data) were used for improvement of the six identified correlations. Based on the tabulated and graphical results of the comparisons between the predictions of the modified heat transfer correlations and the available experimental data, appropriate improved correlations for different flow patterns, tube orientations, and liquid-gas combinations were recommended.

An Optimization Algorithm for the Maximum Lifetime Coverage Problems in Wireless Sensor Network

  • Ahn, Nam-Su;Park, Sung-Soo
    • Management Science and Financial Engineering
    • /
    • v.17 no.2
    • /
    • pp.39-62
    • /
    • 2011
  • In wireless sensor network, since each sensor is equipped with a limited power, efficient use of the energy is important. One possible network management scheme is to cluster the sensors into several sets, so that the sensors in each of the sets can completely perform the monitoring task. Then the sensors in one set become active to perform the monitoring task and the rest of the sensors switch to a sleep state to save energy. Therefore, we rotate the roles of the active set among the sensors to maximize the network lifetime. In this paper, we suggest an optimal algorithm for the maximum lifetime coverage problem which maximizes the network lifetime. For comparison, we implemented both the heuristic proposed earlier and our algorithm, and executed computational experiments. Our algorithm outperformed the heuristic concerning the obtained network lifetimes, and it found the solutions in a reasonable amount of time.