• Title/Summary/Keyword: weak link

Search Result 116, Processing Time 0.023 seconds

A Study on Characteristic of Superconductivity and Microstructure of $Y_1Ba_2Cu_3O_{7-y}$-Ag ($Y_1Ba_2Cu_3O_{7-y}$-Ag의 초전도성과 미세구조의 특성 연구)

  • Kim, Chae-Ok;Park, Jeong-Su;Yu, Deok-Su
    • Korean Journal of Materials Research
    • /
    • v.5 no.7
    • /
    • pp.786-793
    • /
    • 1995
  • Ag-doped $Y_1$Ba$_2$Cu$_3$O$_{7-y}$ samples have been prepared by solid state reaction. High-Tc super conductivity, microstructure and mechanical property of the Ag-doped $Y_1$Ba$_2$Cu$_3$O$_{7-y}$ samples have been studied. As the Ag content increased, the grain size of $Y_1$Ba$_2$Cu$_3$O$_{7-y}$, increased and connectivity between the grains was improved, and the sample becomed denser and harder than the undoped. From the result, it is concluded that Ag addition reduced weak link and weak coupling between grains and led to the strong coupling. Furthermore, the anisotropy of crytstal structure was decreased and thermal stability, mechanical property of $Y_1$Ba$_2$Cu$_3$O$_{7-y}$-Ag were improved.mproved.

  • PDF

Selection of Input Nodes in Artificial Neural Network for Bankruptcy Prediction by Link Weight Analysis Approach (연결강도분석접근법에 의한 부도예측용 인공신경망 모형의 입력노드 선정에 관한 연구)

  • 이응규;손동우
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.19-33
    • /
    • 2001
  • Link weight analysis approach is suggested as a heuristic for selection of input nodes in artificial neural network for bankruptcy prediction. That is to analyze each input node\\\\`s link weight-absolute value of link weight between an input node and a hidden node in a well-trained neural network model. Prediction accuracy of three methods in this approach, -weak-linked-neurons elimination method, strong-linked-neurons selection method and integrated link weight model-is compared with that of decision tree and multivariate discrimination analysis. In result, the methods suggested in this study show higher accuracy than decision tree and multivariate discrimination analysis. Especially an integrated model has much higher accuracy than any individual models.

  • PDF

Fabrication of the weak link with the the Transistor Characteristics in 77 K (77K에서 트랜지스터 특성을 나타내는 링크의 제작)

  • 강형곤;임성훈;고석철;주철원;한병성
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2001.07a
    • /
    • pp.921-926
    • /
    • 2001
  • The link for the Superconducting Flux Flow Transistor (SFFT) which is based on the flux flow has been fabricated by the ICP etching methods. The channel width and the thickness of the SFFT were a 3 ${\mu}$m and about 300 nm, respectively. The superconducting characteristic of the link was measured by the x-ray diffraction and the E.D.S.. The SFFT etched by ICP showed an I-V characteristic like the three terminal transistor.

  • PDF

A Study on the Characteristics of Fast Distributed Power Control Schemes in Cellular Network under Dynamic Channel (셀룰러 네트워크의 동적채널에서 빠른 분산 전력 제어 기법의 특성에 대한 연구)

  • Lee, Young-Dae;Park, Hyun-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.49-55
    • /
    • 2008
  • To address the convergence issue of power control algorithms, a number of algorithms have been developed hat shape the dynamics of up-link power control for cellular network. Power algorithms based on fixed point iterations can be accelerated by the use of various methods, one of the simplest being the use of Newton iterations, however, this method has the disadvantage which not only needs derivatives of the cost function but also may be weak to noisy environment. we showed performance of the power control schemes to solve the fixed point problem under static or stationary channel. They proved goof performance to solve the fixed point problem due to their predictor based optimal control and quadratic convergence rate. Here, we apply the proposed power control schemes to the problem of the dynamic channel or to dynamic time varying link gains. The rigorous simulation results demonstrated the validity of our approach.

  • PDF

The Non-strang-definiteness Condition on Distributivity

  • Joh, Yoon-Kyoung
    • Language and Information
    • /
    • v.12 no.2
    • /
    • pp.77-93
    • /
    • 2008
  • This paper examines a condition that licenses distributivity. Choe (1987) and Link (1998) have proposed an indefiniteness condition on distributivity. However, detecting counter-examples, Zimmermann (2002) has argued for a non-specificity condition. This paper primarily revises the indefiniteness/non-specificity condition. Observing that the systematic class of the exceptions belongs to weak definites proposed by Poesio (1994), I claim that the property that constrains distributivity is non-strong-definiteness. Based on Landman (2000), I further explain the non-strong-definiteness condition and argue that the condition does not need to be imposed on the grammar independently. The new condition naturally accounts for Spector's (2003) scopal asymmetry. Even more, defining donkey pronouns as weak definites, I cope with various properties of donkey sentences.

  • PDF

Case studies : Security issues of IT products in terms of supply chain (사례 위주로 본 공급자망을 중심으로 한 IT제품 보안 위험)

  • Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.89-96
    • /
    • 2016
  • Before an IT product is used, there is a sequence of the process such as the components supply-demand of the product, their assembly and production, their logistics and delivery, and then finally, the product can be used by a user. During this sequence of the process, there can be many security exposures and risks. In this paper, we show, by examining security cases of various IT products, that there are many security exposures in the process of IT products from their production to their delivery to end users and in their use, and also show how critical the security exposures are. Even though there are various security theories, technologies and security controls, there is still weak link from the production of an IT product to its use, and this weak link can lead to security vulnerabilities and risks. This paper tries to call attention to the importance of the execution of the security control and the control components. We examine the practical cases to find out how the security control is paralyzed, and to show how it is compromised by asymmetric security resources. Lastly, from the cases, we examine and review the possible domestic security issues and their countermeasures.

A study on the Reliability Experiment and the Structural Improvement of Sliding Cover (슬라이딩 커버의 신뢰성 시험 및 구조개선 연구)

  • Song Jun Yeob;Kang Jae Hun;Kim Tae Hyung;Kim Ok Koo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.7 s.172
    • /
    • pp.146-154
    • /
    • 2005
  • Recently, the high-speed and intelligence technology of machine tools are developed for the high efficiency of productivity Under the operating condition from the high-speed of machine tools, the various failure modes can occur in core units of manufacturing system. Therefore it is for the reliability concept of machine tool to be required in a design level. And the above-stated technology must be accommodated in the feeding and spindle subsystem, etc those are the core units of machine tools. In this study, we are developed the test-bed of sliding cover (C-plate) in order to evaluating reliability and estimating failure modes of feeding subsystem under operating conditions. The reliability experiment using the developed test-bed and the additional structural analysis executed on single and double structure. We found out the weak parts of sliding cover and were able to predict a life cycle from the experiment results. In this study, we propose the new C-plate model with double link structure to apply the high-speed machine tool in the fundamental guideline.

A Study to Efficiently Overcome GPS Jamming and GPS Spoofing by using Data Link System (데이터링크를 사용하는 체계에서 GPS 재밍(Jamming)과 GPS 기만(Spoofing)을 효과적으로 극복하기 위한 방안 연구)

  • Jee, Seungbae;Kim, Sangjun;Lee, Jungsik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.1
    • /
    • pp.37-45
    • /
    • 2015
  • These days many systems use the gps signal to get their own position. Because it's cheap and accurate and convenient. But, the strength of gps signal is very weak and can be easily interrupted by GPS jamming and GPS spoofing. Normally, fighter can use DME, TACAN, etc to correct their position error when GPS is not working. But, many aircraft which does not have those kinds of hardware need to pay additional cost to get it. In this paper, we propose how to overcome GPS jamming and GPS spoofing by only using data link system. The main purpose of this paper is to make the data link protocol to get an exact position information of own unit at gps error environment.

An Improvement of the P2P Streaming Network Topology Algorithm Using Link Information (연결 정보를 이용한 P2P 스트리밍 네트워크 구조의 개선)

  • Lee, Sang-Hoon;Han, Chi-Geun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.49-57
    • /
    • 2012
  • In P2P streaming management, peer's churning and finding efficient topology architecture optimization algorithm that reduces streaming delay is important. This paper studies a topology optimization algorithm based on the P2P streaming using peer's link information. The proposed algorithm is based on the estimation of peer's upload bandwidth using peer's link information on mesh-network. The existing algorithm that uses the information of connected links is efficient to reduce message overload in the point of resource management. But it has a risk of making unreliable topology not considering upload bandwidth. And when some network error occurs in a server-closer-peer, it may make the topology worse. In this paper we propose an algorithm that makes up for the weak point of the existing algorithm. We compare the existing algorithm with the proposed algorithm using test data and analyze each simulation result.

Establishment for Efficiency Air-To-Ground Air Operation Model in Link-16 (Link-16 기반의 효율적인 공대지 항공작전 모델 설계)

  • Lee, Hyeong-Heon;Jang, Hyeong-Jun;Kim, Yeong-Gu;Lim, Jae-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.861-868
    • /
    • 2010
  • As CAS, X-ATK, and INT models considered as the most typical Air-to-Ground operation models in ROKAF are mainly designed as the voice-centered system between aircraft and ground control facilities, it is critical to newly develop the Link-16 based model for the ROK-US combined operation between F-15K, AWACS, M-SAM, and KDX-III equipped with Link-16. Former studies had been limited to the CAS operation, and they had mainly focused on reducing the voice transmission time to exchange the information between each mission step with maintaining existing operation steps. Therefore, this paper makes up the weak point in former studies, thereby designing new Air-to-Ground operation model for CAS, X-ATK, INT mission using Enterprise Architecture OV6c, which enables both aircraft and ground control facilities or between aircraft to obtain the real-time information on the location, identification, armament and the real-time image data through the broadcasting function. Based on the analysis of new operation model, we come to a conclusion that by simultaneously exchanging the information on mission between nodes concerned through the broadcasting function of Link-16. It is possible to cut down superfluous steps among the mission steps, and to reduce the mission time. It is clear that it gives rise to improve the battle efficiency and the decision-making tempo as well as the battlefield situational awareness.