• Title/Summary/Keyword: 가상의

Search Result 12,350, Processing Time 0.039 seconds

A Numerical Study on the Effect of Pressure Relief Ducts on the Normal Pressure in a Preliminary Design of Honam-Jeju Subsea Tunnel (호남-제주 해저터널 가상설계의 공기압력 제어 덕트가 열차 주행에 미치는 영향에 대한 수치해석 연구)

  • Seo, Sangyeon;Ha, Heesang
    • Journal of the Korean GEO-environmental Society
    • /
    • v.17 no.8
    • /
    • pp.17-27
    • /
    • 2016
  • High-speed trains have been developed widely in European countries and Japan in order to transport large quantity of people and commodities in short time. Additionally, a high speed train is one of the most desirable and environmentally friendly transportation methods. When a high speed train enters a tunnel, aerodynamic resistance is generated suddenly. This resistance causes micro pressure wave and discomfort to passengers. Due to this aerodynamic pressure against the train, a large amount of traction is required for the operation of a train in a tunnel. Therefore, it is essential to incorporate a pressure relief system in a tunnel in order to reduce aerodynamic resistance caused by a high-speed train. A pressure relief duct and a vertical shaft are representative measures in a tunnel. This study represents the effect of pressure relief ducts in order to alleviate positive and negative normal pressures acting on a train. One-dimensional numerical simulations were carried out in order to estimate the effect of pressure relief systems.

Prediction of Evacuation Time for Emergency Planning Zone of Uljin Nuclear Site (울진원전 방사선비상계획구역에 대한 소개시간 예측)

  • Jeon, In-Young;Lee, Jai-Ki
    • Journal of Radiation Protection and Research
    • /
    • v.27 no.3
    • /
    • pp.189-198
    • /
    • 2002
  • The time for evacuation of residents in emergency planning zone(EPZ) of Uljin nuclear site in case of a radiological emergency was estimated with traffic analysis. Evacuees were classified into 4 groups by considering population density, local jurisdictions, and whether they ate residents or transients. The survey to investigate the behavioral characteristics of the residents was made for 200 households and included a hypothetical scenario explaining the accident situation and questions such as dwelling place, time demand for evacuation preparation transportation means for evacuation, sheltering place, and evacuation direction. The microscopic traffic simulation model, CORSIM, was used to simulate the behavior of evacuating vehicles on networks. The results showed that the evacuation time required for total vehicles to move out from EPZ took longer in the daytime than at night in spite that the delay times at intersections were longer at night than in the daytime. This was analyzed due to the differences of the trip generation time distribution. To validate whether the CORSIM model fan appropriately simulate the congested traffic phenomena assumable in case of emergency, a benchmark study was conducted at an intersection without an actuated traffic signal near Uljin site during the traffic peak-time in the morning. This study indicated that the predicted output by the CORSIM model was in good agreement with the observed data. satisfying the purpose of this study.

Importance Analysis of Radiological Exposure by Ground Deposition in Potential Accident Consequences for the Licensing Approval of a Nuclear Power Plant (원전 인허가승인을 위한 사고결말평가에서 지표침적에 의한 피폭의 민감도 분석)

  • Hwang, Won Tae;Jeong, Hae Sun;Jeong, Hyo Joon;Kim, Eun Han;Han, Moon Hee
    • Journal of Radiation Protection and Research
    • /
    • v.39 no.2
    • /
    • pp.89-95
    • /
    • 2014
  • In potential accident consequence assessments for the licensing approval of LWRs, the ground deposition of radionuclides released into the environment is not allowed into the models, as recommended in the U. S. Nuclear Regulatory Commission's regulatory guide. Meanwhile, it is allowed into the assessment models for the licensing approval of PHWRs with consideration of more detailed physical processes of radionuclides in the atmosphere. Under these backgrounds, importance of exposure dose by ground deposition was quantitatively evaluated and comprehensively discussed. For potential accidental releases of $^{137}Cs$ and $^{131}I$, total exposure doses were more conservative in case of without consideration of ground deposition than in case of with its consideration. It was because of that the depletion of air concentration resulting from ground deposition is more influential in the contribution to total exposure doses than additional doses from contaminated ground. The exposure doses by the inhalation of contaminated air showed the contribution of more than 90% in total exposure doses, depending on atmospheric stability, release period of radionuclides and distance from a release point. The exposure doses from contaminated ground showed less than 10% at most in contribution of total exposure doses. The ratios of total exposure doses in case of with consideration of deposition to without its consideration for $^{131}I$ were distinct than those for $^{137}Cs$. As the atmosphere is more stable, release duration of radionuclides is longer, distance from a release point is longer, it was more distinct.

3D Pose Estimation of a Human Arm for Human-Computer Interaction - Application of Mechanical Modeling Techniques to Computer Vision (인간-컴퓨터 상호 작용을 위한 인간 팔의 3차원 자세 추정 - 기계요소 모델링 기법을 컴퓨터 비전에 적용)

  • Han Young-Mo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.4 s.304
    • /
    • pp.11-18
    • /
    • 2005
  • For expressing intention the human often use body languages as well as vocal languages. Of course the gestures using arms and hands are the representative ones among the body languages. Therefore it is very important to understand the human arm motion in human-computer interaction. In this respect we present here how to estimate 3D pose of human arms by using computer vision systems. For this we first focus on the idea that the human arm motion consists of mostly revolute joint motions, and then we present an algorithm for understanding 3D motion of a revolute joint using vision systems. Next we apply it to estimating 3D pose of human arms using vision systems. The fundamental idea for this algorithm extension is that we may apply the algorithm for a revolute joint to each of the revolute joints of hmm arms one after another. In designing the algorithms we focus on seeking closed-form solutions with high accuracy because we aim at applying them to human computer interaction for ubiquitous computing and virtual reality.

A Study on Efficient Cell Queueing and Scheduling Algorithms for Multimedia Support in ATM Switches (ATM 교환기에서 멀티미디어 트래픽 지원을 위한 효율적인 셀 큐잉 및 스케줄링 알고리즘에 관한 연구)

  • Park, Jin-Su;Lee, Sung-Won;Kim, Young-Beom
    • Journal of IKEEE
    • /
    • v.5 no.1 s.8
    • /
    • pp.100-110
    • /
    • 2001
  • In this paper, we investigated several buffer management schemes for the design of shared-memory type ATM switches, which can enhance the utilization of switch resources and can support quality-of-service (QoS) functionalities. Our results show that dynamic threshold (DT) scheme demonstrate a moderate degree of robustness close to pushout(PO) scheme, which is known to be impractical in the perspective of hardware implementation, under various traffic conditions such as traffic loads, burstyness of incoming traffic, and load non-uniformity across output ports. Next, we considered buffer management strategies to support QoS functions, which utilize parameter values obtained via connection admission control (CAC) procedures to set tile threshold values. Through simulations, we showed that the buffer management schemes adopted behave well in the sense that they can protect regulated traffic from unregulated cell traffic in allocating buffer space. In particular, it was observed that dynamic partitioning is superior in terms of QoS support than virtual partitioning.

  • PDF

L-CAA : An Architecture for Behavior-Based Reinforcement Learning (L-CAA : 행위 기반 강화학습 에이전트 구조)

  • Hwang, Jong-Geun;Kim, In-Cheol
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.3
    • /
    • pp.59-76
    • /
    • 2008
  • In this paper, we propose an agent architecture called L-CAA that is quite effective in real-time dynamic environments. L-CAA is an extension of CAA, the behavior-based agent architecture which was also developed by our research group. In order to improve adaptability to the changing environment, it is extended by adding reinforcement learning capability. To obtain stable performance, however, behavior selection and execution in the L-CAA architecture do not entirely rely on learning. In L-CAA, learning is utilized merely as a complimentary means for behavior selection and execution. Behavior selection mechanism in this architecture consists of two phases. In the first phase, the behaviors are extracted from the behavior library by checking the user-defined applicable conditions and utility of each behavior. If multiple behaviors are extracted in the first phase, the single behavior is selected to execute in the help of reinforcement learning in the second phase. That is, the behavior with the highest expected reward is selected by comparing Q values of individual behaviors updated through reinforcement learning. L-CAA can monitor the maintainable conditions of the executing behavior and stop immediately the behavior when some of the conditions fail due to dynamic change of the environment. Additionally, L-CAA can suspend and then resume the current behavior whenever it encounters a higher utility behavior. In order to analyze effectiveness of the L-CAA architecture, we implement an L-CAA-enabled agent autonomously playing in an Unreal Tournament game that is a well-known dynamic virtual environment, and then conduct several experiments using it.

  • PDF

Research for the Element to Analyze the Performance of Modern-Web-Browser Based Applications (모던 웹 브라우저(Modern-Web-Browser) 기반 애플리케이션 성능분석을 위한 요소 연구)

  • Park, Jin-tae;Kim, Hyun-gook;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.278-281
    • /
    • 2018
  • The early Web technology was to show text information through a browser. However, as web technology advances, it is possible to show large amounts of multimedia data through browsers. Web technologies are being applied in a variety of fields such as sensor network, hardware control, and data collection and analysis for big data and AI services. As a result, the standard has been prepared for the Internet of Things, which typically controls a sensor via HTTP communication and provides information to users, by installing a web browser on the interface of the Internet of Things. In addition, the recent development of web-assembly enabled 3D objects, virtual/enhancing real-world content that could not be run in web browsers through a native language of C-class. Factors that evaluate the performance of existing Web applications include performance, network resources, and security. However, since there are many areas in which web applications are applied, it is time to revisit and review these factors. In this thesis, we will conduct an analysis of the factors that assess the performance of a web application. We intend to establish an indicator of the development of web-based applications by reviewing the analysis of each element, its main points, and its needs to be supplemented.

  • PDF

Debelppment of C++ Compiler and Programming Environment (C++컴파일러 및 프로그래밍 환경 개발)

  • Jang, Cheon-Hyeon;O, Se-Man
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.831-845
    • /
    • 1997
  • In this paper,we proposed and developed a compiler and interactive programming enviroments for C++ wich is mostly worth of nitice among the object -oriented languages.To develope the compiler for C++ we took front=end/back-end model using EM virtual machine.In develpoing Front-End,we formailized C++ gram-mar with the context semsitive tokens which must be manipulated by dexical scanner and designed a AST class li-brary which is the hierarchy of AST node class and well defined interface among them,In develpoing Bacik-End,we proposed model for three major components :code oprtimizer,code generator and run-time enviroments.We emphasized the retargatable back-end which can be systrmatically reconfigured to genrate code for a variety of distinct target computers.We also developed terr pattern matching algorithm and implemented target code gen-erator which produce SPARC code.We also proposed the theroy and model for construction interative pro-gramming enviroments. To represent language features we adopt AST as internal reprsentation and propose uncremental analysis algorithm and viseal digrams.We also studied unparsing scheme, visual diagram,graphical user interface to generate interactive environments automatically Results of our resarch will be very useful for developing a complier and programming environments, and also can be used in compilers for parallel and distributed enviroments.

  • PDF

Performance Improvement of an Energy Efficient Cluster Management Based on Autonomous Learning (자율학습기반의 에너지 효율적인 클러스터 관리에서의 성능 개선)

  • Cho, Sungchul;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.11
    • /
    • pp.369-382
    • /
    • 2015
  • Energy aware server clusters aim to reduce power consumption at maximum while keeping QoS(quality of service) compared to energy non-aware server clusters. They adjust the power mode of each server in a fixed or variable time interval to activate only the minimum number of servers needed to handle current user requests. Previous studies on energy aware server cluster put efforts to reduce power consumption or heat dissipation, but they do not consider energy efficiency well. In this paper, we propose an energy efficient cluster management method to improve not only performance per watt but also QoS of the existing server power mode control method based on autonomous learning. Our proposed method is to adjust server power mode based on a hybrid approach of autonomous learning method with multi level thresholds and power consumption prediction method. Autonomous learning method with multi level thresholds is applied under normal load situation whereas power consumption prediction method is applied under abnormal load situation. The decision on whether current load is normal or abnormal depends on the ratio of the number of current user requests over the average number of user requests during recent past few minutes. Also, a dynamic shutdown method is additionally applied to shorten the time delay to make servers off. We performed experiments with a cluster of 16 servers using three different kinds of load patterns. The multi-threshold based learning method with prediction and dynamic shutdown shows the best result in terms of normalized QoS and performance per watt (valid responses). For banking load pattern, real load pattern, and virtual load pattern, the numbers of good response per watt in the proposed method increase by 1.66%, 2.9% and 3.84%, respectively, whereas QoS in the proposed method increase by 0.45%, 1.33% and 8.82%, respectively, compared to those in the existing autonomous learning method with single level threshold.

A Study on the Realization of Diskless and Stateless Security Policy Based High-speed Synchronous Network Infrastructure (Diskless와 Stateless 보안정책 기반의 고속화 동기 네트워크 인프라 구현에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.673-681
    • /
    • 2011
  • Among the network information services combined with a number of security technologies and required security policies, Infrastructure as a Service, a hardware plat-form service of Cloud Computing, has been provided since 2011. It is more or less similar to the existing central concentration method services, in terms of the specifications and technical aspects for given hardware category, but it is entirely different from them in that it overcomes the spatial limitations of specific network and targets the public network. Information security technology has also been prospering so that it could ensure the stability of offered hardware plat-forms. As currently supported hardware, Internet Data Center has been provided by virtualizing the previously offered servers and discs (backup discs), but the hardware plat-forms offered are somewhat limited. Meanwhile, the areas of security fields for offered services are confined to the center or include the TCP/IP-based SSL (Secure Sockets Layer) for the public network connected with clients, which shows that microscopic access security policies have been used. Therefore, this study was aimed to provide a realistic security mechanism for realizing defense policy, by expanding service areas into security devices and suggesting Diskless and Stateless security policy based high-speed synchronous network infrastructure.