• Title/Summary/Keyword: time-distance function

Search Result 501, Processing Time 0.027 seconds

Effects of the irrigation Rate on Wetted Patterns in Sandy Loam Soil Under Trickle irrigation Condition (점적관개에서 관개율이 Sandy Loam토양의 습윤양상에 미치는 영향)

  • 김철수;이근후
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.31 no.2
    • /
    • pp.104-115
    • /
    • 1989
  • In an effort to clarify the wetted patterns of sandy loam soil under trickle irrigation conditions, the distance of wetted zone, infiltration capacity and soil wetted patterns, etc. were measured by gypsum block as soil moisture sensor located every 5 cm vertically and horizontaly in the soil bin under the such conditions as a). irrigation rates set to 2, 4, 6, 8 liters per hour b). total amount of water applied fixed to 14.62 liters per soil bin c) the hearing force of soil measured by plate penetrometer ranging from 1.04 to 1.22kg/cm$_2$ The results can be summarized as follows ; 1. The wetted distance in horizontal direction(H), the wetted distance in vertical direction(D), the horizontal infiltration capacity (iH) and the vertical infiltration capacity(in)could by explained as a function of time t. 2. The horizontal wetted distance (H) is explained by an exponetial function H= a$.$ t where b was found ranging from 021 to 026 under surface trickle irrigation, which was considered a lotlower than the classical value of 0.5 and these measurements were indifferent to the increasing irrigation rates. 3. As for the surface trickle irrigation where horizontal infiltration capacity(iH) is explained as iH = A $.$ t h, the coefficient A increases with respect to irrigation rates within the limits of 0.89~1.34. 4. In terms of surface trickle irrigation of the ratio of Dm Which is maximum vertical wetted distance to Hm, which is maximum horizontal wetted distance, found to be within range of 1.0 to 1.21. It was also noted that the value of Dm decreses when irrigation rates increases while the value of Hm changes the opposite direction. 5. The optimum location of sensors from emitter for surface trickle irrigation should he inside of hemisphere whose lateral radius is 28~30cm long and vertical radius is 10~12cm long. The distance between emitters should be within 60cm long. 6. In the study of vertical wetted distance( D) where D= a $.$ tb, the exponential coefficient b ranged from 0.61 to 0.75 in surface trickle irrigation, and from 0A9 to 0.68 for subsurface trickle irrigation. These measurements showed an increasing tendency to with respect to irrigation rates. 7. In case of vertical infiltration capacity( in), where iD= A $.$ t 1-h, the coefficient A for surface trickle irrigation found to be within range of 0.16 to 0.19 and did not show any relationships with varying degree of irrigation rates. However, the coefficient was varying from 0.09 to 0.22 and showed a tendency to increase vis-a-vis irrigation rates for subsurface trickle irrigation, in contrast. 8. In the observation of subsurface trickle irrigation, it was found that Dm/Hm ratio was within 1.52 to 1.91 and showed a decreasing tendency with respect to increasing rates of irrigation. 9. The location of sensors for subsurface trickle irrigation follows same pattern as above, with vertical distance from emitter being 10~17cm long and horizontal 22~25cm long. The location of emitter should be 50 cm. 10.The relationship between VS which is the volume of wetted soil and Q which is the total amount of water when soil is reached field capacity could be explained as VS= 2.914Q0.91and the irrigation rates showed no impacts on the above relationship.

  • PDF

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

Passenger Ship Evacuation Simulation using Algorithm for Determination of Evacuating Direction based on Walking Direction Potential Function (보행 방향 포텐셜 함수 기반의 탈출 경로 결정 알고리즘을 이용한 여객선 승객 탈출 시뮬레이션)

  • Ha, Sol;Cho, Yoon-Ok;Ku, Namkug;Park, Kwangphil;Lee, Kyu-Yeul;Roh, Myung-Il
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.50 no.5
    • /
    • pp.307-313
    • /
    • 2013
  • This paper presents a simulation for passenger ship evacuation considering determination of evacuating direction based on walking direction potential function. In order to determine walking direction of a passenger, his/her position in two dimensional plane was adopted as a design variable, and fixed boundaries such as walls and obstacles were adopted as constraints. To solve this optimum problem, a walking direction potential function was adopted as an objective function. This potential function was configured as a kind of penalty function and it contained two components. One is a potential function concerned with the distance to the destination, and other is a potential function based on the effect of walls and obstacles. To determine evacuating direction, this problem was solved by minimizing the walking direction potential function every unit time during the simulation. The crowd behavior of the passenger consisted of the flock behavior, a form of collective behavior of a large number of interacting passengers with a common group. With the proposed algorithm, the test problems in International Maritime Organization, Maritime Safety Committee/Circulation 1238(IMO MSC/Circ.1238) were implemented and the direction of passengers and total evacuation time was analyzed.

The Multiple Traveling Purchaser Problem for Minimizing the Maximal Acquisition Completion Time in Wartime (전시 최장 획득완료시간 최소화를 위한 복수 순회구매자 문제)

  • Choi, Myung-Jin;Moon, Woo-Bum;Choi, Jin-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.458-466
    • /
    • 2011
  • In war time, minimizing the logistics response time for supporting military operations is strongly needed. In this paper, i propose the mathematical formulation for minimizing the maximal acquisition completion time in wartime or during a state of emergency. The main structure of this formulation is based on the traveling purchaser problem (TPP), which is a generalized form of the well-known traveling salesman problem (TSP). In the case of the general TPP, an objective function is to minimize the sum of the traveling cost and the purchase cost. However, in this study, the objective function is to minimize the traveling cost only. That's why it's more important to minimize the traveling cost (time or distance) than the purchase cost in wartime or in a state of emergency. I generate a specific instance and find out the optimal solution of this instance by using ILOG OPL STUDIO (CPLEX version 11.1).

Mobility Analysis Metric for Ad Hoc Network Using Pairwise Clustering (이진 Clustering을 이용한 Ad Hoc 망의 이동성 해석 측도)

  • Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.193-199
    • /
    • 2010
  • In this paper, we propose a new metric to measure the dynamic connection states of Ad Hoc network. The new metric measures the total path break up time $\sum_{i}T_i$, where $T_i$ is the time period during which maximum cluster distance exceeds the radio range. $T_i$ can be calculated from the maximum cluster distance function of time, which can be computed from the node position samples of mobility model. The proposed metric can be used as a total system metric as well as an individual connection metric.

Parameters of the Magnetic Field Waveform Radiated from Cloud Lightning Discharges (운방전에 의해서 방사된 자장 파형의 파라미터)

  • 이복희;안창환;장석훈
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.10 no.6
    • /
    • pp.917-926
    • /
    • 1999
  • In this paper, the recording device for measuring the magnetic field waveforms associated with the cloud lightning discharges was made by the loop-type magnetic field sensor, and the measuring system of a distance between lightning stroke point and observatory site was proposed. The parameters including the time interval of superimposed pulses, zero-to-zero crossing time and the percentage depth of the dip for the positive and the negative magnetic field waveforms were statistically analyzed as a function of the distance between the lightning discharge point and the observatory site. The results could be summarized as follows; Several superimposed pulses were observed at the initial front part of the magnetic field waveform produced by cloud lightning discharges, and the mean time interval between superimposed pulses was about $4\mu\textrm{s}$. Also, the bipolar characteristic appeared significantly and the percentage depth of the dip was about 57~65%. It was known that the zero-to-zero crossing time of the electromagnetic fields is gradually decreased as a distance between lightning discharge point and observatory site is increased.

  • PDF

Transformation of Mass Function and Joint Mass Function for Evidence Theory

  • Suh, Doug. Y.;Esogbue, Augustine O.
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.1 no.2
    • /
    • pp.16-34
    • /
    • 1991
  • It has been widely accepted that expert systems must reason from multiple sources of information that is to some degree evidential - uncertain, imprecise, and occasionally inaccurate - called evidential information. Evidence theory (Dempster/Shafet theory) provides one of the most general framework for representing evidential information compared to its alternatives such as Bayesian theory or fuzzy set theory. Many expert system applications require evidence to be specified in the continuous domain - such as time, distance, or sensor measurements. However, the existing evidence theory does not provide an effective approach for dealing with evidence about continuous variables. As an extension to Strat's pioneeiring work, this paper provides a new combination rule, a new method for mass function transffrmation, and a new method for rendering joint mass fuctions which are of great utility in evidence theory in the continuous domain.

  • PDF

Differential Game of Approach with an Inertial Evader and Two Noninertial Pursuers (한 관성 회피자와 두 비관성 추적자 간의 접근 미분 게임)

  • Nam, Dong-K.;Seo, Jin-H.
    • Proceedings of the KIEE Conference
    • /
    • 1995.11a
    • /
    • pp.213-215
    • /
    • 1995
  • This paper is concerned with a coplanar pursuit-evasion game of one inertial evader and two identical noninertial pursuers. The terminal time is fired and the payoff is the distance between the evader and the nearest pursuer when tile game is terminated. The value functions and the strategies is constructed for all the game surface. To get a value function, we use the generalization of the Bellman-Isaacs fundamental equation.

  • PDF

Analysis of Microwave-Induced Thermoacoustic Signal Generation Using Computer Simulation

  • Dewantari, Aulia;Jeon, Se-Yeon;Kim, Seok;Nikitin, Konstantin;Ka, Min-Ho
    • Journal of electromagnetic engineering and science
    • /
    • v.16 no.1
    • /
    • pp.1-6
    • /
    • 2016
  • Computer simulations were conducted to demonstrate the generation of microwave-induced thermoacoustic signal. The simulations began with modelling an object with a biological tissue characteristic and irradiating it with a microwave pulse. The time-varying heating function data at every particular point on the illuminated object were obtained from absorbed electric field data from the simulation result. The thermoacoustic signal received at a point transducer at a particular distance from the object was generated by applying heating function data to the thermoacoustic equation. These simulations can be used as a foundation for understanding how thermoacoustic signal is generated and can be applied as a basis for thermoacoustic imaging simulations and experiments in future research.

A New Approach to the Evaluation of Collision Risk using Sech Function (Sech 함수를 이용한 새로운 충돌위험도 평가법)

  • Jeong, Tae-Gweon
    • Journal of Navigation and Port Research
    • /
    • v.27 no.2
    • /
    • pp.103-109
    • /
    • 2003
  • Evaluating the risk of collision quantitatively plays a key role in developing the expert system of navigation and collision avoidance. This study analysed the existing methods of appraising the collision risk, examined the problem that are intrinsic to them, and developed a new approach to its evaluation by using the sech function as an alternative to them. This paper applied the new method in appraising the collision risk and suggested how to decide the safe range of ownship's action.