• Title/Summary/Keyword: 기술적 성능평가시스템

Search Result 1,336, Processing Time 0.035 seconds

Evaluation of Thermal Performance and Mechanical Properties in the Cryogenic Environment of Basalt Fiber Reinforced Polyurethane Foam (현무암 섬유 보강 폴리우레탄폼의 열적 성능 및 극저온 환경에서의 기계적 특성 평가)

  • Jeon, Sung-Gyu;Kim, Jeong-Dae;Kim, Hee-Tae;Kim, Jeong-Hyeon;Kim, Seul-Kee;Lee, Jae-Myung
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.4
    • /
    • pp.207-213
    • /
    • 2022
  • LNG CCS which is a special type of cargo hold operated at -163℃ for transporting liquefied LNG is composed of a primary barrier, plywood, insulation panel, secondary barrier, and mastic. Currently, glass fiber is used to reinforce polyurethane foam. In this paper, we evaluated the possibility of replacing glass fiber-reinforced polyurethane foam with basalt fiber-reinforced polyurethane foam. We conducted a thermal conductivity test to confirm thermal performance at room temperature. To evaluate the mechanical properties between basalt and glass-fiber-reinforced polyurethane foam which is fiber content of 5 wt% and 10 wt%, tensile and an impact test was performed repeatedly. All of the tests were performed at room temperature and cryogenic temperature(-163℃) in consideration of the temperature gradient in the LNG CCS. As a result of the thermal conductivity test, the insulating performance of glass fiber reinforced polyurethane foam and basalt fiber reinforced polyurethane foam presented similar results. The tensile test results represent that the strength of basalt fiber-reinforced polyurethane foam is superior to glass fiber at room temperature, and there is a clear difference. However, the strength is similar to each other at cryogenic temperatures. In the impact test, the strength of PUR-B5 is the highest, but in common, the strength decreases as the weight ratio of the two fibers increases. In conclusion, basalt fiber-reinforced polyurethane foam has sufficient potential to replace glass fiber-reinforced polyurethane foam.

Behavior Analysis of Concrete Structure under Blast Loading : (II) Blast Loading Response of Ultra High Strength Concrete and Reactive Powder Concrete Slabs (폭발하중을 받는 콘크리트 구조물의 실험적 거동분석 : (II) 초고강도 콘크리트 및 RPC 슬래브의 실험결과)

  • Yi, Na Hyun;Kim, Sung Bae;Kim, Jang-Ho Jay;Cho, Yun Gu
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.5A
    • /
    • pp.565-575
    • /
    • 2009
  • In recent years, there have been numerous explosion-related accidents due to military and terrorist activities. Such incidents caused not only damages to structures but also human casualties, especially in urban areas. To protect structures and save human lives against explosion accidents, better understanding of the explosion effect on structures is needed. In an explosion, the blast load is applied to concrete structures as an impulsive load of extremely short duration with very high pressure and heat. Generally, concrete is known to have a relatively high blast resistance compared to other construction materials. However, normal strength concrete structures require higher strength to improve their resistance against impact and blast loads. Therefore, a new material with high-energy absorption capacity and high resistance to damage is needed for blast resistance design. Recently, Ultra High Strength Concrete(UHSC) and Reactive Powder Concrete(RPC) have been actively developed to significantly improve concrete strength. UHSC and RPC, can improve concrete strength, reduce member size and weight, and improve workability. High strength concrete are used to improve earthquake resistance and increase height and bridge span. Also, UHSC and RPC, can be implemented for blast resistance design of infrastructure susceptible to terror or impact such as 9.11 terror attack. Therefore, in this study, the blast tests are performed to investigate the behavior of UHSC and RPC slabs under blast loading. Blast wave characteristics including incident and reflected pressures as well as maximum and residual displacements and strains in steel and concrete surface are measured. Also, blast damages and failure modes were recorded for each specimen. From these tests, UHSC and RPC have shown to better blast explosions resistance compare to normal strength concrete.

An Experimental Study for the Shear Property and the Temperature Dependency of Seismic Isolation Bearings (지진격리받침의 전단특성 및 온도의존성에 대한 실험적 연구)

  • Cho, Chang-Beck;Kwahk, Im-Jong;Kim, Young-Jin
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.12 no.1
    • /
    • pp.67-77
    • /
    • 2008
  • Seismic isolation has been studied continuously as a solution of the seismic engineering to reduce the sectional forces and the damages of structures caused by earthquakes. To certify reliable design and installation of the seismic isolation systems, seismic isolation bearings should be fabricated under well planned quality control process, and proper evaluation tests for their seismic performance should be followed. In this study, shear property evaluation tests for the lead rubber bearings(LRB) and the rubber bearings(RB) were implemented and the temperature dependency tests were also implemented to evaluate the changes of shear properties according to the changes of temperature. After evaluation tests, the measured shear properties were compared to their design values and their deviation was analyzed comparing with the allowable error ranges specified in Highway Bridge Design Specifications. These results showed that a considerable number of isolation bearings have so large deviations from their design values that their error ranges were over or very close to the allowable ranges. And the test results for temperature dependency showed that the shear properties of isolation bearings would be changed in great degree by the change of temperature during their service period. If these two types of changes in their shear properties are superposed, it would possible that the changes of shear properties from their original design values are over than 50%.

A Design of Point Scalar Multiplier for Binary Edwards Curves Cryptography (이진 에드워즈 곡선 암호를 위한 점 스칼라 곱셈기 설계)

  • Kim, Min-Ju;Jeong, Young-Su;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1172-1179
    • /
    • 2022
  • This paper describes a design of point scalar multiplier for public-key cryptography based on binary Edwards curves (BEdC). For efficient implementation of point addition (PA) and point doubling (PD) on BEdC, projective coordinate was adopted for finite field arithmetic, and computational performance was improved because only one inversion was involved in point scalar multiplication (PSM). By applying optimizations to hardware design, the storage and arithmetic steps for finite field arithmetic in PA and PD were reduced by approximately 40%. We designed two types of point scalar multipliers for BEdC, Type-I uses one 257-b×257-b binary multiplier and Type-II uses eight 32-b×32-b binary multipliers. Type-II design uses 65% less LUTs compared to Type-I, but it was evaluated that it took about 3.5 times the PSM computation time when operating with 240 MHz. Therefore, the BEdC crypto core of Type-I is suitable for applications requiring high-performance, and Type-II structure is suitable for applications with limited resources.

Plant-wide On-line Monitoring and Diagnosis Based on Hierarchical Decomposition and Principal Component Analysis (계층적 분해 방법과 PCA를 이용한 공장규모 실시간 감시 및 진단)

  • Cho Hyun-Woo;Han Chong-hun
    • Journal of the Korean Institute of Gas
    • /
    • v.1 no.1
    • /
    • pp.27-32
    • /
    • 1997
  • Continual monitoring of abnormal operating conditions i a key issue in maintaining high product quality and safe operation, since the undetected process abnormality may lead to the undesirable operations, finally producing low quality products, or breakdown of equipment. The statistical projection method recently highlighted has the advantage of easily building reference model with the historical measurement data in the statistically in-control state and not requiring any detailed mathematical model or knowledge-base of process. As the complexity of process increases, however, we have more measurement variables and recycle streams. This situation may not only result in the frequent occurrence of process Perturbation, but make it difficult to pinpoint trouble-making causes or at most assignable source unit due to the confusing candidates. Consequently, an ad hoc skill to monitor and diagnose in plat-wide scale is needed. In this paper, we propose a hierarchical plant-wide monitoring methodology based on hierarchical decomposition and principal component analysis for handling the complexity and interactions among process units. This have the effect of preventing special events in a specific sub-block from propagating to other sub-blocks or at least delaying the transfer of undesired state, and so make it possible to quickly detect and diagnose the process malfunctions. To prove the performance of the proposed methodology, we simulate the Tennessee Eastman benchmark process which is operated continuously with 41 measurement variables of five major units. Simulation results have shown that the proposed methodology offers a fast and reliable monitoring and diagnosis for a large scale chemical plant.

  • PDF

UA Tree-based Reduction of Speech DB in a Large Corpus-based Korean TTS (대용량 한국어 TTS의 결정트리기반 음성 DB 감축 방안)

  • Lee, Jung-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.91-98
    • /
    • 2010
  • Large corpus-based concatenating Text-to-Speech (TTS) systems can generate natural synthetic speech without additional signal processing. Because the improvements in the natualness, personality, speaking style, emotions of synthetic speech need the increase of the size of speech DB, it is necessary to prune the redundant speech segments in a large speech segment DB. In this paper, we propose a new method to construct a segmental speech DB for the Korean TTS system based on a clustering algorithm to downsize the segmental speech DB. For the performance test, the synthetic speech was generated using the Korean TTS system which consists of the language processing module, prosody processing module, segment selection module, speech concatenation module, and segmental speech DB. And MOS test was executed with the a set of synthetic speech generated with 4 different segmental speech DBs. We constructed 4 different segmental speech DB by combining CM1(or CM2) tree clustering method and full DB (or reduced DB). Experimental results show that the proposed method can reduce the size of speech DB by 23% and get high MOS in the perception test. Therefore the proposed method can be applied to make a small sized TTS.

Subgraph Searching Scheme Based on Path Queries in Distributed Environments (분산 환경에서 경로 질의 기반 서브 그래프 탐색 기법)

  • Kim, Minyoung;Choi, Dojin;Park, Jaeyeol;Kim, Yeondong;Lim, Jongtae;Bok, Kyoungsoo;Choi, Han Suk;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.141-151
    • /
    • 2019
  • A network of graph data structure is used in many applications to represent interactions between entities. Recently, as the size of the network to be processed due to the development of the big data technology is getting larger, it becomes more difficult to handle it in one server, and thus the necessity of distributed processing is also increasing. In this paper, we propose a distributed processing system for efficiently performing subgraph and stores. To reduce unnecessary searches, we use statistical information of the data to determine the search order through probabilistic scoring. Since the relationship between the vertex and the degree of the graph network may show different characteristics depending on the type of data, the search order is determined by calculating a score to reduce unnecessary search through a different scoring method for a graph having various distribution characteristics. The graph is sequentially searched in the distributed servers according to the determined order. In order to demonstrate the superiority of the proposed method, performance comparison with the existing method was performed. As a result, the search time is improved by about 3 ~ 10% compared with the existing method.

The Negotiation Model of Negotiation Agents for m-Commerce (모바일 전자상거래를 위한 협상 에이전트의 협상모델)

  • 정진국;이순근;조근식
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.155-175
    • /
    • 2003
  • In context of e-commerce, negotiation is a procedure to help negotiate between buyer and seller by adjusting their negotiation issues such as price and in terms of payment. We used intelligent agent and mobile device to promote new framework of e-commerce. Moreover, this framework can help buyers and sellers to carry their commercial transactions effectively. In regard to that issue, we need to carry out the research of negotiation agent that can be used in e-commerce fields. In this paper, we modeled the negotiation using CSP for the performance of agent in m-commerce environment. Furthermore we implemented interface for mobile device to extract buyer's requirement and preference easily Besides that we used utility function to make a decision for various evaluation functions and suggestions that are used for evaluation of negotiation issues. A difficulty of generating offer is dependent on the number of negotiation issues and the range of the values. Therefore, if any offer has a number of negotiation issues and the range of values are wide, the search space will be exponentially expanded. There have been many studies fur solving this problem, we applied those techniques to improve the agent's ability of negotiation. For example, a contract can be accomplished by exchanging seller and buyer's offer that is generated by agent to adjust the requisite profit for each party. Finally, we show the improvement of satisfaction as the negotiation is processed.

  • PDF

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Application of MicroPACS Using the Open Source (Open Source를 이용한 MicroPACS의 구성과 활용)

  • You, Yeon-Wook;Kim, Yong-Keun;Kim, Yeong-Seok;Won, Woo-Jae;Kim, Tae-Sung;Kim, Seok-Ki
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.13 no.1
    • /
    • pp.51-56
    • /
    • 2009
  • Purpose: Recently, most hospitals are introducing the PACS system and use of the system continues to expand. But small-scaled PACS called MicroPACS has already been in use through open source programs. The aim of this study is to prove utility of operating a MicroPACS, as a substitute back-up device for conventional storage media like CDs and DVDs, in addition to the full-PACS already in use. This study contains the way of setting up a MicroPACS with open source programs and assessment of its storage capability, stability, compatibility and performance of operations such as "retrieve", "query". Materials and Methods: 1. To start with, we searched open source software to correspond with the following standards to establish MicroPACS, (1) It must be available in Windows Operating System. (2) It must be free ware. (3) It must be compatible with PET/CT scanner. (4) It must be easy to use. (5) It must not be limited of storage capacity. (6) It must have DICOM supporting. 2. (1) To evaluate availability of data storage, we compared the time spent to back up data in the open source software with the optical discs (CDs and DVD-RAMs), and we also compared the time needed to retrieve data with the system and with optical discs respectively. (2) To estimate work efficiency, we measured the time spent to find data in CDs, DVD-RAMs and MicroPACS. 7 technologists participated in this study. 3. In order to evaluate stability of the software, we examined whether there is a data loss during the system is maintained for a year. Comparison object; How many errors occurred in randomly selected data of 500 CDs. Result: 1. We chose the Conquest DICOM Server among 11 open source software used MySQL as a database management system. 2. (1) Comparison of back up and retrieval time (min) showed the result of the following: DVD-RAM (5.13,2.26)/Conquest DICOM Server (1.49,1.19) by GE DSTE (p<0.001), CD (6.12,3.61)/Conquest (0.82,2.23) by GE DLS (p<0.001), CD (5.88,3.25)/Conquest (1.05,2.06) by SIEMENS. (2) The wasted time (sec) to find some data is as follows: CD ($156{\pm}46$), DVD-RAM ($115{\pm}21$) and Conquest DICOM Server ($13{\pm}6$). 3. There was no data loss (0%) for a year and it was stored 12741 PET/CT studies in 1.81 TB memory. In case of CDs, On the other hand, 14 errors among 500 CDs (2.8%) is generated. Conclusions: We found that MicroPACS could be set up with the open source software and its performance was excellent. The system built with open source proved more efficient and more robust than back-up process using CDs or DVD-RAMs. We believe that the operation of the MicroPACS would be effective data storage device as long as its operators develop and systematize it.

  • PDF