• Title/Summary/Keyword: 기능 모델링

Search Result 1,156, Processing Time 0.031 seconds

Design and Implementation of the Quantity Surveying and Shop Drawing System for Structures (BIM 기반 골조 물량산출 및 도면생성 모듈의 설계와 구현)

  • Lee, Byung-Kwon;Kim, Chee-Kyeong
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2011.04a
    • /
    • pp.132-135
    • /
    • 2011
  • 최근 설계 단계에서 설계품질 향상과 시공 단계에서 비용 절감을 효과를 기대하며 3차원 BIM 관련 기술에 대한 관심이 높아가고 있으며, 또한 부분적으로 기술 도입 효과가 나타나고 있다. BIM 기술은 크게 BIM 도구를 활용하여 설계정보를 디지털화하는 모델링 단계 기술과 BIM 모델로부터 설계 정보를 추출하여 업무 진행에 필요한 형태로 가공, 변환하는 정보 활용 기술로 구분하여 생각할 수 있다. BIM 기술에 대한 근자의 높은 관심에도 불구하고 실제 현장에 적용되어 가시적인 성과를 내는 데에 한계를 보이고 있는 이유 중 하나로 후자의 정보 추출 및 활용 기술의 범위와 완성도의 한계를 들 수 있다. 즉 많은 노력을 통하여 BIM 모델을 구축하더라도 이를 기반으로 물량산출, 도면 생성 등 가장 기본적인 업무조차도 현장에서 바로 사용할 수 있는 수준의 기능이 제공되고 있지 않다. 본 연구에서는 건축 골조를 대상으로 3차원 골조 모델을 이용하여 골조 물량, 특히 정확한 물량산출이 상대적으로 어려운 철근에 대하여 철근의 이음, 정착 등이 고려된 실행물량을 산출할 수 있는 시스템을 설계하고 구현하였다. 또한 3차원 모델을 기반으로 철근 배근시공도와 가공일람표를 관련 기준에 따라 정확히 자동 작성함으로써 골조공사가 효율적으로 수행되고, 특히 정확한 이음 및 정착과 가공 계획을 통하여 철근 손실율을 최소화함이 기대된다. 본 논문에서는 이러한 BIM 기반 골조 물량산출 및 도면생성 시스템과 관련하여 주요 시스템 설계 내용과 구현 결과에 대하여 기술한다.

  • PDF

Functional Requirements about Modeling Methodology for CALS (CALS 구현을 위한 모델링 방법론의 기능조건)

  • 김철한;우훈식;김중인;임동순
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.2
    • /
    • pp.89-113
    • /
    • 1997
  • Modeling methodology has been widely used for analysis and design of a information system. Specially, under the CALS environments, modeling approach is more important because the enterprise functions are inter-related and information sharing speeds up the business. In this paper, we suggest functional requirements about modeling methodology for CALS by surveying the IDEF0 and ARIS. The former is FIPS 183 and the latter is basic methodology of SAP/R3 which is world-wide ERP system. The proposed functional requirements include all semantics of IDEF0 and adds some features. The first is adding modeling components which are semantic representations. In addition to ICOMs, we add the time and cost component which is required to execute the function. The second is tracing mechanism. When we need some information, we drive the functions related with the information by reverse tracing of the function which produces the information as a output and input. Through the tracing, we find out the bottleneck process or high cost process. This approach guarantees the integrity of data by designating the data ownership. Finally, we suggest the final decomposition level. We call the final decomposed function into unit function which has only one output data. We can combine and reconstruct some of functions such as 'lego block' combination.

  • PDF

Smart Mobile Blackbox DVR in Car Environment (자동차 환경에서 스마트 모바일 블랙박스 DVR)

  • Choi, Sun-O;Kim, Young-Po;Im, Yong-Soon;Kim, Young-Ja;Kang, Eun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.9-15
    • /
    • 2013
  • In this paper, automatic recognition of an accident and whether service delivery and risk driving through the giving of the driver to correct driving habits before and after the accident to reproduce highly scalable video Smart Mobile Blackbox DVR (SMBD, Smart Mobile Blackbox DVR) Computer of the model was designed. SMBD on embedded systems equipped with wireless capabilities to sleep in the car accident point and the image information by wireless communications, by notification in the control center, 24-hour emergency rescue service and traffic information can be provided. The vehicle ECU (Electronic Control Unit) of the vehicle information and sensor data in conjunction with wireless eCall (Emergency Call) services can be realized.

A Study of Optimal Modem Algorithm According to Various Channel Fluctuations (디지털 가전채널 변동특성을 반영한 최적 변복조 시스템에 관한 연구)

  • Cha, Jae-Sang
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.3
    • /
    • pp.20-27
    • /
    • 2006
  • Power line for digital home appliances has own property that transmitting power connected to loads. Especially, power line communication(PLC) for the home network which has characteristics of load fluctuation makes variable noise characteristics. It becomes serious problems to maintain efficient communication performance. Thus, in this paper, we present an optimal modulation and demodulation method through mathematical analysis of each measured load fluctuation based on PLC for home appliances. To analyze and compare various modem methods presented in this paper, we analyzed them normally via computer simulation under various noise channel environments according to various load fluctuations. In addition, we certified its availability through hardware implementation.

Design of Self-Adapted Controller for Unstable System in Variable Environment (가변환경하의 불안정 시스템에 대한 자율적응 제어기 설계)

  • Kim Sung-Hoe
    • The Journal of Information Technology
    • /
    • v.5 no.4
    • /
    • pp.57-64
    • /
    • 2002
  • The system that is thermal test system for elements has been controlled generally by PID algorithm because of its characteristic. There is not a mathematical model for the system. So the system that is use the PID controller is not properly operated. To solve this problem, we propose a fuzzy algorithm that parameters and rule base is selected by self-searched algorithm for each system. The input fuzzy membership function is adapted based on the set stable range. Output membership function is nearly fixed but some parameter is adjustable. The rule base is changed under basis on the system response. The output value computed through inference and defuzzification is mapped into a value that is proper for the system operation. Through this regulation, it will be possible to prevent the temperature of system to go into the unstable temperature.

  • PDF

Analysis of the congestion control scheme with the discard eligibility bit for frame relay networks (프레임 릴레이망에서의 DE 비트를 사용하는 혼잡제어 방식의 성능해석에 관한 연구)

  • 이현우;우상철;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.2027-2034
    • /
    • 1997
  • Frame relay is a fast packet switching technology that performs relaying and multiplexing frames with variable lengths over a wide area link at the T1 or E1 speed, by elminating error and flow control in the network. In frame relay networks, congestion control is typically performed through the rate enforcement with a discard eligibility (DE) bit, and the explicit negative feedback meachanisms using explicit congetion notification bits. In this paper, we consider the congestiong control scheme using the rate enforcement mechanism with DE bit for frame relay network. Assuming that each frame with exponentially distributed length arrives according to the Poission fashion, we can treat the frame relay switch as an M/M/1/K priority queueing system with pushout basis. We analyze and present the blocking probabilities and waiting time distributions of frames.

  • PDF

Modeling and Simulation of Firewall System and Security Functions of Operating System for Network Security (네트워크 보안을 위한 침입차단 시스템과 운영체제 보안 기능 모델링 및 시뮬레이션)

  • 김태헌;이원영;김형종;김홍근;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.2
    • /
    • pp.1-16
    • /
    • 2002
  • The need for network security is being increasing due to the development of information communication and internet technology. In this paper, firewall models, operating system models and other network component models are constructed. Each model is defined by basic or compound model, referencing DEVS formalism. These models and the simulation environment are implemented with MODSIM III, a general purpose, modular, block-structured high-level programming language which provides direct support for object-oriented programming and discrete-event simulation. In this simulation environment with representative attacks, the following three attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service, Mail bomb attack as an attack type of e-mail. The simulation is performed with the models that exploited various security policies against these attacks. The results of this study show that the modeling method of packet filtering system, proxy system, unix and windows NT operating system. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF

Modeling for New Type Backlight Units (신개념 백라이트유닛 모델링)

  • Lee, Kwang-Hoon;Jee, Seung-Hyun;Kim, Soo-Hyun;Yoon, Young-Soo;Kim, Soo-Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.21 no.2
    • /
    • pp.41-45
    • /
    • 2010
  • In order to obtain thinner and brighter backlight units (BLU), we simulated a new-type backlight unit. A micro-lens array sheet was formed on the upper plane of the light guide plate (LGP) comprising the backlight unit. Also, in order to match with the LGP, we simulated a functional optical sheet. The conventional BLU uses one LGP and four optical sheets, but we simulated a BLU that uses one optical sheet. Simulation results have revealed that our BLU can achieve the same luminance and 30% better view angle as compared with conventional ones.

Throughput Capacity of a Wireless Multi-hop Relay Network using Cognitive Radio (Cognitive Radio 무선 다중홉 릴레이 네트워크의 Throughput 용량)

  • Hassan, Md. Imrul;Song, Ju-Bin;Kim, Young-Il
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.5
    • /
    • pp.33-39
    • /
    • 2007
  • In this paper, we investigate the throughput capacity of a multi-hop relay with cognitive radio (CR) enabled relay stations (RS). We suggest a TDMA/FDMA based frame structure where RSs dynamically select unused channels to communicate with the base station (BS) using CR techniques to analyze the throughput capacity. We develop the throughput capacity model for the proposed system based on utilization factor. The analytical results based on those equations show significant improvement in throughput capacity for CR enabled multi-hop relay system.

Sharing Ship Design Model Based on STEP methodology (STEP 방법론을 이용한 선박설계 모델의 공유)

  • Yong-Jae Shin;Soon-Hung Han
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.35 no.4
    • /
    • pp.98-108
    • /
    • 1998
  • Hull design data is currently prepared by a 2D CAD system and re-input to 3D CAD systems specialized for detail design or to a structural analysis system. In this paper, sharing design data among different CAD systems has been studied. Based on STEP methodology, a neutral model is generated from 2D AutoCAD drawings. To handle a geometric data of this model, the non-manifold model of ACIS is used because it can support various CAD data representation such as 2D graphic entities, 3D wireframe, 3D surface model, and solid B-Rep/CSG model. It is observed that a mon-manifold model can easily be transformed to a 3-D wireframe model for the hull detail design system AutoDef or a FE model for the structural analysis system Nastran.

  • PDF