• Title/Summary/Keyword: systems approach method

Search Result 3,724, Processing Time 0.043 seconds

Modeling of the friction in the tool-workpiece system in diamond burnishing process

  • Maximov, J.T.;Anchev, A.P.;Duncheva, G.V.
    • Coupled systems mechanics
    • /
    • v.4 no.4
    • /
    • pp.279-295
    • /
    • 2015
  • The article presents a theoretical-experimental approach developed for modeling the coefficient of sliding friction in the dynamic system tool-workpiece in slide diamond burnishing of low-alloy unhardened steels. The experimental setup, implemented on conventional lathe, includes a specially designed device, with a straight cantilever beam as body. The beam is simultaneously loaded by bending (from transverse slide friction force) and compression (from longitudinal burnishing force), which is a reason for geometrical nonlinearity. A method, based on the idea of separation of the variables (time and metric) before establishing the differential equation of motion, has been applied for dynamic modeling of the beam elastic curve. Between the longitudinal (burnishing force) and transverse (slide friction force) forces exists a correlation defined by Coulomb's law of sliding friction. On this basis, an analytical relationship between the beam deflection and the sought friction coefficient has been obtained. In order to measure the deflection of the beam, strain gauges connected in a "full bridge" type of circuit are used. A flexible adhesive is selected, which provides an opportunity for dynamic measurements through the constructed measuring system. The signal is proportional to the beam deflection and is fed to the analog input of USB DAQ board, from where the signal enters in a purposely created virtual instrument which is developed by means of Labview. The basic characteristic of the virtual instrument is the ability to record and visualize in a real time the measured deflection. The signal sampling frequency is chosen in accordance with Nyquist-Shannon sampling theorem. In order to obtain a regression model of the friction coefficient with the participation of the diamond burnishing process parameters, an experimental design with 55 experimental points is synthesized. A regression analysis and analysis of variance have been carried out. The influence of the factors on the friction coefficient is established using sections of the hyper-surface of the friction coefficient model with the hyper-planes.

Criteria for processing response-spectrum-compatible seismic accelerations simulated via spectral representation

  • Zerva, A.;Morikawa, H.;Sawada, S.
    • Earthquakes and Structures
    • /
    • v.3 no.3_4
    • /
    • pp.341-363
    • /
    • 2012
  • The spectral representation method is a quick and versatile tool for the generation of spatially variable, response-spectrum-compatible simulations to be used in the nonlinear seismic response evaluation of extended structures, such as bridges. However, just as recorded data, these simulated accelerations require processing, but, unlike recorded data, the reasons for their processing are purely numerical. Hence, the criteria for the processing of acceleration simulations need to be tied to the effect of processing on the structural response. This paper presents a framework for processing acceleration simulations that is based on seismological approaches for processing recorded data, but establishes the corner frequency of the high-pass filter by minimizing the effect of processing on the response of the structural system, for the response evaluation of which the ground motions were generated. The proposed two-step criterion selects the filter corner frequency by considering both the dynamic and the pseudo-static response of the systems. First, it ensures that the linear/nonlinear dynamic structural response induced by the processed simulations captures the characteristics of the system's dynamic response caused by the unprocessed simulations, the frequency content of which is fully compatible with the target response spectrum. Second, it examines the adequacy of the selected estimate for the filter corner frequency by evaluating the pseudo-static response of the system subjected to spatially variable excitations. It is noted that the first step of this two-fold criterion suffices for the establishment of the corner frequency for the processing of acceleration time series generated at a single ground-surface location to be used in the seismic response evaluation of, e.g. a building structure. Furthermore, the concept also applies for the processing of acceleration time series generated by means of any approach that does not provide physical considerations for the selection of the corner frequency of the high-pass filter.

A Study on the Characteristic of Heat Transfer of PCM(Phase Change Material) at the Simultaneous Charging and Discharging Condition (동시 축·방열 조건에서 PCM의 열전달 특성에 관한 연구)

  • Lee, Donggyu;Park, Sechang;Chung, Dong-yeol;Kang, Cheadong
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.28 no.8
    • /
    • pp.305-310
    • /
    • 2016
  • A thermal storage systems was designed to correspond to the temporal or quantitative variation in the thermal energy demand, and most of its heat is stored using the latent and sensible heat of the heat storage material. The heat storage method using latent heat has a very complex phenomenon for heat transfer and thermal behavior because it is accompanied by a phase change in the course of heating/cooling of the heat storage material. Therefore, many studies have been conducted to produce an experimentally accessible as well as numerical approach to confirm the heat transfer and thermal behavior of phase change materials. The purpose of this study was to investigate the problems encountered during the actual heat transfer from an internal storage tank through simulation of the process of storing and utilizing thermal energy from the thermal storage tank containing charged PCM. This study used analysis methods to investigate the heat transfer characteristics of the PCM with simultaneous heating/cooling conditions in the rectangular space simulating the thermal storage tank. A numerical analysis was carried out in a state considering natural convection using the ANSYS FLUENT(R) program. The result indicates that the slope of the liquid-solid interface in the analysis field changed according to the temperature difference between the heating surface and cooling surface.

An optimization method for variable length information messages (가변 길이 정보 메시지 최적화 방법)

  • Kim, Jingyu;Kang, Sungwon;Jung, Pilsu;Kim, Jungmin;Baek, Haeun;Kwon, Koo Hyung;Kim, Sang Soo
    • Journal of Software Engineering Society
    • /
    • v.26 no.1
    • /
    • pp.1-16
    • /
    • 2013
  • Variable length information message is a communication protocol standard in order for computer network systems to provide efficient delivery of information. The variable length information messages were developed for varying and controlling details of information in accordance with message receiver's required information level or information access level. In the previous studies, data compressing techniques have been in use for information message optimization technologies in order to reduce physical sizes of information messages. In optimization technologies for information messages, accuracy of information is considered as the most important factor; therefore, only non-loss compression techniques are applied to the optimization technologies. However, the non-loss compression based information message optimization methods are not efficient in data compression, and these are limited to efficient delivery of information in wireless network environments that have constraint bandwidth. In this paper, we attempt to optimize information in the variable length information messages at message fields in order to reduce physical sizes of messages more efficiently. To demonstrate the efficiency of our approach, we conduct optimization experiments for variable length information messages.

  • PDF

A Study on the Analysis Method of Technology Trend on Tactical Data Link Using Intellectual Property Information (지식재산 정보를 이용한 전술데이터링크 기술동향 분석방법 연구)

  • Noh, Giseop
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.539-544
    • /
    • 2021
  • The tactical data link is a military data network to improve the ability to recognize battlefield situations. The ROK military is promoting the tactical data link performance improvement programs. Tactical data link is essential to combine and integrate various platforms, sensor data, and command and control (C2) systems. Therefore, the research on related technical fields is required. However, the tactical data link has not disclosed detailed technical information due to the characteristics of military operation. In this paper, we propose a data-based automated analysis methodology using intellectual property information to understand the technology trend of tactical data link. In this paper, data related to intellectual property is automatically collected and pre-processed, and analyzed in terms of time series. In addition, the current status of each institution of patent technology information was generated, and the process of identifying key-researchers through network analysis was presented with providing results of our approach in this paper.

A Secure Active Packet Transfer using Cryptographic Techniques (암호 기술을 이용한 안전한 능동 패킷 전송)

  • 김영수;나중찬;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme

Stability Characteristics of Supercritical High-Pressure Turbines Depending on the Designs of Tilting Pad Journal Bearings

  • Lee, An Sung;Jang, Sun-Yong
    • Tribology and Lubricants
    • /
    • v.37 no.3
    • /
    • pp.99-105
    • /
    • 2021
  • In this study, for a high-pressure turbine (HPT) of 800 MW class supercritical thermal-power plant, considering aerodynamic cross-coupling, we performed a rotordynamic logarithmic decrement (LogDec) stability analysis with various tilting pad journal bearing (TPJB) designs, which several steam turbine OEMs (original equipment manufacturers) currently apply in their supercritical and ultra-supercritical HPTs. We considered the following TPJB designs: 6-Pad load on pad (LOP)/load between pad (LBP), 5-Pad LOP/LBP, Hybrid 3-Pad LOP (lower 3-Pad tilting and upper 1-Pad fixed), and 5-Pad LBPs with the design variables of offset and preload. We used the API Level-I method for a LogDec stability analysis. Following results are summarized only in a standpoint of LogDec stability. The Hybrid 3-Pad LOP TPJBs most excellently outperform all the other TPJBs over nearly a full range of cross-coupled stiffness. In a high range of cross-coupled stiffness, both the 6-Pad LOP and 5-Pad LOP TPJBs may be recommended as a practical conservative bearing design approach for enhancing a rotordynamic stability of the HPT. As expected, in a high range of cross-coupled stiffness, the 6-Pad LBP TPJBs exhibit a better performance than the 5-Pad LBP TPJBs. However, contrary to one's expectation, notably, the 5-Pad LOP TPJBs exhibit a slightly better performance than the 6-Pad LOP TPJBs. Furthermore, we do not recommend any TPJB design efforts of either increasing a pad offset from 0.5 or a pad preload from 0 for the HPT in a standpoint of stability.

An Intelligent Bluetooth Intrusion Detection System for the Real Time Detection in Electric Vehicle Charging System (전기차 무선 충전 시스템에서 실시간 탐지를 위한 지능형 Bluetooth 침입 탐지 시스템 연구)

  • Yun, Young-Hoon;Kim, Dae-Woon;Choi, Jung-Ahn;Kang, Seung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.11-17
    • /
    • 2020
  • With the increase in cases of using Bluetooth devices used in the electric vehicle charging systems, security issues are also raised. Although various technical efforts have beed made to enhance security of bluetooth technology, various attack methods exist. In this paper, we propose an intelligent Bluetooth intrusion detection system based on a well-known machine learning method, Hidden Markov Model, for the purpose of detecting intelligently representative Bluetooth attack methods. The proposed approach combines packet types of H4, which is bluetooth transport layer protocol, and the transport directions of the packet firstly to represent the behavior of current traffic, and uses the temporal deployment of these combined types as the final input features for detecting attacks in real time as well as accurate detection. We construct the experimental environment for the data acquisition and analysis the performance of the proposed system against obtained data set.

PGA: An Efficient Adaptive Traffic Signal Timing Optimization Scheme Using Actor-Critic Reinforcement Learning Algorithm

  • Shen, Si;Shen, Guojiang;Shen, Yang;Liu, Duanyang;Yang, Xi;Kong, Xiangjie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4268-4289
    • /
    • 2020
  • Advanced traffic signal timing method plays very important role in reducing road congestion and air pollution. Reinforcement learning is considered as superior approach to build traffic light timing scheme by many recent studies. It fulfills real adaptive control by the means of taking real-time traffic information as state, and adjusting traffic light scheme as action. However, existing works behave inefficient in complex intersections and they are lack of feasibility because most of them adopt traffic light scheme whose phase sequence is flexible. To address these issues, a novel adaptive traffic signal timing scheme is proposed. It's based on actor-critic reinforcement learning algorithm, and advanced techniques proximal policy optimization and generalized advantage estimation are integrated. In particular, a new kind of reward function and a simplified form of state representation are carefully defined, and they facilitate to improve the learning efficiency and reduce the computational complexity, respectively. Meanwhile, a fixed phase sequence signal scheme is derived, and constraint on the variations of successive phase durations is introduced, which enhances its feasibility and robustness in field applications. The proposed scheme is verified through field-data-based experiments in both medium and high traffic density scenarios. Simulation results exhibit remarkable improvement in traffic performance as well as the learning efficiency comparing with the existing reinforcement learning-based methods such as 3DQN and DDQN.

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.