• Title/Summary/Keyword: 동시 시뮬레이션

Search Result 1,472, Processing Time 0.031 seconds

Development of Position Encoding Circuit for a Multi-Anode Position Sensitive Photomultiplier Tube (다중양극 위치민감형 광전자증배관을 위한 위치검출회로 개발)

  • Kwon, Sun-Il;Hong, Seong-Jong;Ito, Mikiko;Yoon, Hyun-Suk;Lee, Geon-Song;Sim, Kwang-Souk;Rhee, June-Tak;Lee, Dong-Soo;Lee, Jae-Sung
    • Nuclear Medicine and Molecular Imaging
    • /
    • v.42 no.6
    • /
    • pp.469-477
    • /
    • 2008
  • Purpose: The goal of this paper is to present the design and performance of a position encoding circuit for $16{\times}16$ array of position sensitive multi-anode photomultiplier tube for small animal PET scanners. This circuit which reduces the number of readout channels from 256 to 4 channels is based on a charge division method utilizing a resistor array. Materials and Methods: The position encoding circuit was simulated with PSpice before fabrication. The position encoding circuit reads out the signals from H9500 flat panel PMTs (Hamamatsu Photonics K.K., Japan) on which $1.5{\times}1.5{\times}7.0\;mm^3$ $L_{0.9}GSO$ ($Lu_{1.8}Gd_{0.2}SiO_{5}:Ce$) crystals were mounted. For coincidence detection, two different PET modules were used. One PET module consisted of a $29{\times}29\;L_{0.9}GSO$ crystal layer, and the other PET module two $28{\times}28$ and $29{\times}29\;L_{0.9}GSO$ crystal layers which have relative offsets by half a crystal pitch in x- and y-directions. The crystal mapping algorithm was also developed to identify crystals. Results: Each crystal was clearly visible in flood images. The crystal identification capability was enhanced further by changing the values of resistors near the edge of the resistor array. Energy resolutions of individual crystal were about 11.6%(SD 1.6). The flood images were segmented well with the proposed crystal mapping algorithm. Conclusion: The position encoding circuit resulted in a clear separation of crystals and sufficient energy resolutions with H9500 flat-panel PMT and $L_{0.9}GSO$ crystals. This circuit is good enough for use in small animal PET scanners.

Software Reliability Growth Modeling in the Testing Phase with an Outlier Stage (하나의 이상구간을 가지는 테스팅 단계에서의 소프트웨어 신뢰도 성장 모형화)

  • Park, Man-Gon;Jung, Eun-Yi
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.10
    • /
    • pp.2575-2583
    • /
    • 1998
  • The productionof the highly relible softwae systems and theirs performance evaluation hae become important interests in the software industry. The software evaluation has been mainly carried out in ternns of both reliability and performance of software system. Software reliability is the probability that no software error occurs for a fixed time interval during software testing phase. These theoretical software reliability models are sometimes unsuitable for the practical testing phase in which a software error at a certain testing stage occurs by causes of the imperfect debugging, abnornal software correction, and so on. Such a certatin software testing stage needs to be considered as an outlying stage. And we can assume that the software reliability does not improve by means of muisance factor in this outlying testing stage. In this paper, we discuss Bavesian software reliability growth modeling and estimation procedure in the presence of an imidentitied outlying software testing stage by the modification of Jehnski Moranda. Also we derive the Bayes estimaters of the software reliability panmeters by the assumption of prior information under the squared error los function. In addition, we evaluate the proposed software reliability growth model with an unidentified outlying stage in an exchangeable model according to the values of nuisance paramether using the accuracy, bias, trend, noise metries as the quantilative evaluation criteria through the compater simulation.

  • PDF

A Study on Significance Testing of Driver's Visual Behavior due to the VMS Message Display Forms on the Road (도로상 VMS 표출방식별 운전자 유의성 검증에 관한 연구)

  • Kum, Ki-Jung;Son, Young-Tae;Bae, Deok-Mo;Son, Seung-Neo
    • International Journal of Highway Engineering
    • /
    • v.7 no.4 s.26
    • /
    • pp.151-162
    • /
    • 2005
  • Variable Message Sign (VMS), which provides drivers with direct information about state of traffic congestion and for prevent an accident, is the most effective method among the methods of providing information in Advanced Transportation Management System. Currently establishment and the VMS which is operated foundation lets in Guidelines on the use of Variable message sign (a book of the VMS) of 1999 November the Ministry Construction & Transportation, these contents mean main viewpoint on physical part such as message special quality variable (font, character size and line space, word interval) and position mainly among standard about establishment in general. But, it is true that using without effect verification on the character of VMS display and that using mode of stationary-centered. In this paper, it executed significance test to effort verification on the character of VMS display for more practical and effective information transmission based on the driver viewpoint For the researches; develop 3D-Simulation, select characteristics of driver's visual cognition behavior (the conspicuity, the legibility and the comprehensibility), evaluation each issue (day or night, 80km/h or 100km/h). Especially, that used the Eye Marker Recorder to measure of reading-time (legibility) thus, confirmed objectivity and reduce an observational error. The results showed that the conspicuity is Flashing> Stationary>Scroll. The legibility is not deference that Flashing between stationary form. Also the comprehensibility result showed that Flashing> Stationary>Stroll form.

  • PDF

A Study of the Roundabout Hump type Crosswalks Installation Criteria That Takes Into Account the Safety of Pedestrian Traffic (보행자 통행안전성을 고려한 회전교차로의 고원식횡단보도 설치기준 연구)

  • Lim, Chang-Sik;Choi, Yang-Won
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.36 no.6
    • /
    • pp.1075-1082
    • /
    • 2016
  • In order to calculate the optimum installation interval between a speed hump and hump type crosswalk that are installed continuously in succession, this study examined the speed of a vehicle that passes different intervals between speed humps and hump type crosswalks from the approach section of a roundabout having a maximum speed limit of 30km/h; analyzed the effects of speed humps and hump type crosswalks installed continuously in succession on vehicle driving speed; and simulated the optimum installation height of hump type crosswalk. As a result, the following conclusion was drawn. First, it was found that the optimum interval between a speed hump and hump type crosswalk, which are the representative traffic calming techniques for reducing vehicle speed, to control vehicle speed under 30km/h is 30m. Second, as a result of comparing the deceleration of a vehicle that pass hump type crosswalks, it was found that if the installation interval is 65 m and above, a speed hump and hump type crosswalk had no effect. Therefore, it is desirable that the maximum installation interval between a speed hump and hump type crosswalk for controlling vehicle speed within a fixed road section should not exceed 65m. Third, the analysis showed that the optimum installation height of hump type crosswalk is 6-8cm in case vehicle speed at the approach section is 20km/h or lower, 8-10cm in case of 30km/h, and 10cm in case of 30km/h or higher, respectively. Fourth, even at a road section on which a speed hump and hump type crosswalk are installed, speed reduction effects may sometimes be insignificant due to a driver's studying effect, traffic conditions and so on. Thus, it is judged that speed reduction effects will be greater if several traffic calming techniques such as speed hump, chicane, and choker are applied at the same time. Therefore, in case of applying traffic calming techniques for the purpose of reducing vehicle speed in order to promote pedestrian safety, the composite application of several techniques should be considered.

A Numerical Study on the CO2 Leakage Through the Fault During Offshore Carbon Sequestration (해양지중에 저장된 이산화탄소의 단층을 통한 누출 위험 평가에 관한 수치해석 연구)

  • Kang, Kwangu;Huh, Cheol;Kang, Seong-Gil
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.18 no.2
    • /
    • pp.94-101
    • /
    • 2015
  • To mitigate the greenhouse gas emission, many carbon capture and storage projects are underway all over the world. In Korea, many studies focus on the storage of $CO_2$ in the offshore sediment. Assurance of safety is one of the most important issues in the geological storage of $CO_2$. Especially, the assessment of possibility of leakage and amount of leaked $CO_2$ is very crucial to analyze the safety of marine geological storage of $CO_2$. In this study, the leakage of injected $CO_2$ through fault was numerically studied. TOUGH2-MP ECO2N was used to simulate the subsurface behavior of injected $CO_2$. The storage site was 150 m thick saline aquifer located 825 m under the continental shelf. It was assumed that $CO_2$ leak was happened through the fault located 1,000 m away from the injection well. The injected $CO_2$ could migrate through the aquifer by both pressure difference driven by injection and buoyancy force. The enough pressure differences made it possible the $CO_2$ to migrate to the bottom of the fault. The $CO_2$ could be leaked to seabed through the fault due to the buoyancy force. Prior to leakage of the injected $CO_2$, the formation water leaked to seabed. When $CO_2$ reached the seabed, leakage of formation water stopped but the same amount of sea water starts to flow into the underground as the amount of leaked $CO_2$. To analyze the effect of injection rate on the leakage behavior, the injection rate of $CO_2$ was varied as 0.5, 0.75, and $1MtCO_2/year$. The starting times of leakage at 1, 0.75 and $0.5MtCO_2/year$ injection rates are 11.3, 15.6 and 23.2 years after the injection, respectively. The leakage of $CO_2$ to the seabed continued for a period time after the end of $CO_2$ injection. The ratios of total leaked $CO_2$ to total injected $CO_2$ at 1, 0.75 and $0.5MtCO_2/year$ injection rates are 19.5%, 11.5% and 2.8%, respectively.

Dietary Risk Assessment for Pesticide Residues of Vegetables in Seoul, Korea (서울지역 유통 채소류 섭취에 따른 잔류 농약의 위해성 평가)

  • Jang, Mi-Ra;Moon, Hyun-Kyung;Kim, Tae-Rang;Yuk, Dong-Hyun;Kim, Jung-Hun;Park, Seog-Gee
    • Journal of Nutrition and Health
    • /
    • v.43 no.4
    • /
    • pp.404-412
    • /
    • 2010
  • This paper specifically discusses the risk assessment on the pesticide residues in vegetables collected from traditional markets, big marts and departments in the southern part of Seoul. Vegetable samples were 6,583 cases from January to December in 2009. Monte-Carlo simulation was used to calculate the uncertainty for the risk index using pesticide residues, average dietary intake for vegetables and acceptable daily intake. Deterministic risk indexes were 7.33% of diethofencarb, 5.13% of indoxacarb, 3.96% of EPN, 3.92% of diniconazole and 3.09% of chlorothalonil, respectively. And other pesticides were below 3%. Distributions of risk indexes obtained by the Monte-Carlo simulations were similar to the deterministic values, even though the confidence intervals for 95% were very wide. We confirmed that health risks caused by eating vegetables exceeded maximum residue limits of pesticide are very low and the population is generally safe, judging from the risk indexes located between 0.07 to 9.49%.

Diffusion equation model for geomorphic dating (지형연대 측정을 위한 디퓨젼 공식 모델)

  • Lee, Min Boo
    • Journal of the Korean Geographical Society
    • /
    • v.28 no.4
    • /
    • pp.285-297
    • /
    • 1993
  • For the application of the diffusion equation, slope height and maximum slope angle are calculated from the plotted slope profile. Using denudation rate as a solution for the diffusion equation, an apparent age index can be calculated, which is the total amount of denudation through total time. Plots of slope angle versus slope height and apparent age index versus slope height are useful for determining relative or absolute ages and denudation rates. Mathematical simulation plots of slope angle versus slope height can generate equal denudation-rate lines for a given age. Mathematical simulations of slope angle versus age for a given slope height, for equal denudation-rate at a particular profile site, and for comparing to other sites having controlled ages.

  • PDF

An Effectiveness Analysis of Landscape Management for the Historic and Cultural Environment Preservation Area of the Pungnammun Gate, Jeonju, by Applying 3D Visual Exposure (3차원 시각노출도를 이용한 전주 풍남문 역사문화환경보존지역의 경관 관리 효과 분석)

  • Lee, Jae-Yong
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.2
    • /
    • pp.30-37
    • /
    • 2018
  • The uniformed regulations for control of the height of buildings owned by individuals to protect landscape of cultural properties are causing serious social conflicts by limiting the development of landowners. It is urgent need of introducing indicators that can resolve such conflicts and evaluate the regulations of buildings, which can satisfy urban development as well as landscape management of cultural properties. Therefore, the purpose of this study is to simulate landscape changes according to the Cultural Heritage Protection Act and National Land Planning and Utilization Act by using Unity3D in the Pungnammun Gate(Treasure No. 308) of Jeonju and its surroundings, where architectural cultural property forms the symbolic landscape of the city. Then some items such as view points, target points were introduced and the quantitative evaluation of landscapes was attempted by applying the indicator of 3D Visual Exposure. As a result, the viewing opportunity and viewing area of Pungnammun Gate were not significantly influenced by changes in landscape according to the two laws. However, the change of the height of buildings by the National Land Planning and Utilization Act, which has the greatest development capacity, confirmed the possibility of weakening the identification of the Pungnammun Gate by increasing 3D Visual Exposure of the background buildings more than two times. Finally, it was confirmed that the skyline of Pungnammun Gate was clearly infringed upon development under the National Land Planning and Utilization Act, but the skyline was maintained similar to the current situation in the regulation by the Cultural Heritage Protection Act. Thus, this study is meaningful in that the application of 3D Visual Exposure showed the possibility of utilization as an indicator for quantitatively evaluating the protection of view on cultural property and skyline according to the changes of building heights.

Comparison of Acting Style Between 2D Hand-drawn Animation and 3D Computer Animation : Focused on Expression of Emotion by Using Close-up (2D 핸드 드로운 애니메이션과 3D 컴퓨터 애니메이션에서의 액팅(acting) 스타일 비교 -클로즈-업을 이용한 감정표현을 중심으로-)

  • Moon, Jaecheol;Kim, Yumi
    • Cartoon and Animation Studies
    • /
    • s.36
    • /
    • pp.147-165
    • /
    • 2014
  • Around the turn of 21st century, there has been a major technological shift in the animation industry. With development of reality-based computer graphics, major American animation studios replaced hand-drawn method with the new 3D computer graphics. Traditional animation was known for its simplified shapes such as circles and triangle that makes characters' movements distinctive from non-animated feature films. Computer-generated animation has largely replaced it, but is under continuous criticism that automated movements and reality-like graphics devaluate the aesthetics of animation. Although hand-drawn animation is still produced, 3D computer graphics have taken commercial lead and there has been many changes to acting of animated characters, which calls for detailed investigation. Firstly, the changes in acting of 3D characters can be traced from looking at human-like rigging method that mimics humanistic moving mechanism. Also, if hair and clothing was part of hand-drawn characters' acting, it has now been hidden inside mathematical simulation of 3D graphics, leaving only the body to be used in acting. Secondly, looking at "Stretch and Squash" method, which represents the distinctive movements of animation, through the lens of media, a paradox arises. Hand-drawn animation are produced frame-by-frame, and a subtle change would make animated frames shiver. This slight shivering acts as an aesthetic distinction of animated feature films, but can also require exaggerated movements to hide the shivering. On the contrary, acting of 3D animation make use of calculated movements that may seem exaggerated compared to human acting, but seem much more moderate and static compared to hand-drawn acting. Moreover, 3D computer graphics add the third dimension that allows more intuitive movements - maybe animators no longer need fine drawing skills; what they now need is directing skills to animate characters in 3D space intuitively. On the assumption that technological advancement and change of artistic expressionism are inseparable, this paper compares acting of 3D animation studio Pixar and classical drawing studio Disney to investigate character acting style and movements.

Adaptive Lock Escalation in Database Management Systems (데이타베이스 관리 시스템에서의 적응형 로크 상승)

  • Chang, Ji-Woong;Lee, Young-Koo;Whang, Kyu-Young;Yang, Jae-Heon
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.742-757
    • /
    • 2001
  • Since database management systems(DBMSS) have limited lock resources, transactions requesting locks beyond the limit mutt be aborted. In the worst carte, if such transactions are aborted repeatedly, the DBMS can become paralyzed, i.e., transaction execute but cannot commit. Lock escalation is considered a solution to this problem. However, existing lock escalation methods do not provide a complete solution. In this paper, we prognose a new lock escalation method, adaptive lock escalation, that selves most of the problems. First, we propose a general model for lock escalation and present the concept of the unescalatable look, which is the major cause making the transactions to abort. Second, we propose the notions of semi lock escalation, lock blocking, and selective relief as the mechanisms to control the number of unescalatable locks. We then propose the adaptive lock escalation method using these notions. Adaptive lock escalation reduces needless aborts and guarantees that the DBMS is not paralyzed under excessive lock requests. It also allows graceful degradation of performance under those circumstances. Third, through extensive simulation, we show that adaptive lock escalation outperforms existing lock escalation methods. The results show that, compared to the existing methods, adaptive lock escalation reduces the number of aborts and the average response time, and increases the throughput to a great extent. Especially, it is shown that the number of concurrent transactions can be increased more than 16 ~256 fold. The contribution of this paper is significant in that it has formally analysed the role of lock escalation in lock resource management and identified the detailed underlying mechanisms. Existing lock escalation methods rely on users or system administrator to handle the problems of excessive lock requests. In contrast, adaptive lock escalation releases the users of this responsibility by providing graceful degradation and preventing system paralysis through automatic control of unescalatable locks Thus adaptive lock escalation can contribute to developing self-tuning: DBMSS that draw a lot of attention these days.

  • PDF