• Title/Summary/Keyword: 연결된 구성요소

Search Result 741, Processing Time 0.023 seconds

Modal Characteristics of Control Element Assembly Shroud for Korean Standard Nuclear Power Plant(II : Test and Post-Test Analysis) (한국표준형 원자력발전소 제어봉집합체 보호구조물의 모우드 특성 II)

  • Jhung, Myung-Jo;Park, Keun-Bae;Song, Heuy-Gap;Choi, Suhn
    • Computational Structural Engineering
    • /
    • v.5 no.4
    • /
    • pp.93-102
    • /
    • 1992
  • The design of reactor internals requires the accurate vibration characteristics of each component for subsequent dynamic structural response analyses. For Korean standard nuclear power plant some modifications on the Control Element Assembly shroud from the reference design have been made, Since the shroud is complex in geometry having an array of vertical round tubes and webs in a square grid pattern, and being tied down by preloaded tie rods into position, it is planned to perform a vibration measurement program consisting of both experimental and analytical modal studies upon that component. The shroud modal testing was performed on the low frequency global survey to measure the first several modes. The analysis using the finite element model was also performed for the as-tested conditions. The natural frequencies and mode shapes from both test and analysis have been acquired and compared to be in good agreement. It is concluded that finite element model generated is good enough to be used in the design for the dynamic response analysis under various loading conditions.

  • PDF

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

Development of the Shortest Route Search Algorithm Using Fuzzy Theory (퍼지 추론을 이용한 최단 경로 탐색 알고리즘의 개발)

  • Jung, Yung-Keun;Park, Chang-Ho
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.8 s.86
    • /
    • pp.171-179
    • /
    • 2005
  • This paper presents the algorithm using fuzzy inference that preestimates each link speed changed by different kinds of road situations. The elements we are considered are time zone, rainfall probability information and lane control information. This paper is consists of three parts. First of all we set up the fuzzy variables, and preestimate link speed changed by various road situations. For this process, we build the membership functions for each fuzzy variable and establish the fuzzy inference relations to find how fuzzy variables influence on link speed. Second, using backtracking method, we search the shortest route influenced by link speed changed by fuzzy inference. Third, we apply this algorithm to hypothetical network and find the shortest path. As a result, it is shown that this algorithm choose appropriate roundabout path according to the changing road situations.

A Study on the Space Composition of Library as a Multicultural Institution (복합문화기관으로서 도서관의 공간 구성 연구)

  • Kwak, Seung-Jin;Noh, Younghee;Shin, Jae-Min
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.3
    • /
    • pp.7-25
    • /
    • 2017
  • The problem of library space has long been discussed in various aspects such as library relations, architecture, and space design. The purpose of this study is to examine the change of the concept of the complex space of the library according to the development of advanced technology and the social paradigm, and to present the direction of constructing the complex space of the future library by analyzing each case. All concepts such as mediatheque, information commons, larchiveum, and the maker space that is recently introduced into the library are important elements of the complex space presented as a problem of library construction and space. The future library reflects these concepts and serves as a mediator between information and users, users and users, users and media to support reading, information, learning, rest, community-oriented culture and creation, start-up and collaboration. It should be constructed as a multi-space platform to create new value through.

Postal Envelope Image Recognition System for Postal Automation (서장 우편물 자동처리를 위한 우편영상 인식 시스템)

  • Kim, Ho-Yon;Lim, Kil-Taek;Kim, Doo-Sik;Nam, Yun-Seok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.429-442
    • /
    • 2003
  • In this paper, we describe an address image recognition system for automatic processing of standard- size letter mail. The inputs to the system are gray-level mail piece images and the outputs are delivery point codes with which a delivery sequence of carrier can be generated. The system includes five main modules; destination address block location, text line separation, character segmentation, character recognition and finally address interpretation. The destination address block is extracted on the basis of experimental knowledge and the line separation and character segmentation is done through the analysis of connected components and vortical runs. For recognizing characters, we developed MLP-based recognizers and dynamical programming technique for interpretation. Since each module has been implemented in an independent way, the system has a benefit that the optimization of each module is relatively easy. We have done the experiment with live mail piece images directly sampled from mail sorting machine in Yuseong post office. The experimental results prove the feasibility of our system.

An Experimental Evaluation of Structural Performance for the Beam to Column Joints in Unit Modular System (유닛 모듈러 기둥-보 조인트의 구조 성능에 대한 실험적 평가)

  • Lee, Sang Sup;Bae, Kyu Woong;Park, Keum Sung;Hong, Sung Yub
    • Journal of Korean Society of Steel Construction
    • /
    • v.25 no.3
    • /
    • pp.255-265
    • /
    • 2013
  • The major goal of this study is to develop the industrialized structural system that can build high-rise buildings using the box-shaped steel frames such as a unit module system. In order to achieve such a goal, we need the advanced details for joints that consist in a single unit. Furthermore we also need to commercialize the unit modular building system through the basic experiments, research of theoretical analysis and the achievement of seismic performance. This study derived to develop the derails in the beam-to-column joint and to carry out structural performance test. Test results, a joint with thickness of 6.0T can be possible to maintain the plastic rotational angle for strength and seismic performance. Therefore, joint with thickness of 6.0T is able to apply when considering reinforcement in the local of stress concentration.

An Optimal Implementation of Object Tracking Algorithm for DaVinci Processor-based Smart Camera (다빈치 프로세서 기반 스마트 카메라에서의 객체 추적 알고리즘의 최적 구현)

  • Lee, Byung-Eun;Nguyen, Thanh Binh;Chung, Sun-Tae
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.17-22
    • /
    • 2009
  • DaVinci processors are popular media processors for implementing embedded multimedia applications. They support dual core architecture: ARM9 core for video I/O handling as well as system management and peripheral handling, and DSP C64+ core for effective digital signal processing. In this paper, we propose our efforts for optimal implementation of object tracking algorithm in DaVinci-based smart camera which is being designed and implemented by our laboratory. The smart camera in this paper is supposed to support object detection, object tracking, object classification and detection of intrusion into surveillance regions and sending the detection event to remote clients using IP protocol. Object tracking algorithm is computationally expensive since it needs to process several procedures such as foreground mask extraction, foreground mask correction, connected component labeling, blob region calculation, object prediction, and etc. which require large amount of computation times. Thus, if it is not implemented optimally in Davinci-based processors, one cannot expect real-time performance of the smart camera.

  • PDF

An Approach to Interoperability Test using an RTO Model (실시간 객체 모형을 이용한 상호운용성 시험 접급 방법)

  • Choe, Jin-Yeong;Min, Byeong-Jun;Kim, Mun-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1211-1220
    • /
    • 1997
  • Testing ineroperability among various impiementations provided by multi- vendors is not only cistly costly but also inpossible in many real situations. The comformance testing and it's extended testing methodologies are not suf- ficient to effectively guarantee the interoperability.This paper proposes an approach to the protocol interperability test based on a real-time object model which successfully abstracts compunents of real-time systens such as communication networks.In this approach,IUT (Implementation Under Test)and the testing environment are represented by means of the RTO.k model and the resultant objests are executed on the DREAM kemel with local monitors and s global monitor.The local monitors obeserve and control the events,and the global monitor manages the call control protocol of B-ISDN UNI Q.2931 as an example.It indicated that high fault coverage could be obtained with this approach.

  • PDF

A study of product development with the storytelling technique as one factor of brand image reinforcement (브랜드 이미지 강화의 한 요인으로써 스토리텔링 기법을 적용한 제품 개발에 관한 연구)

  • Kyoun, Jun-Hyouk;Kim, Hyun
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.18-23
    • /
    • 2008
  • Enterprise's executives who believe methodologies the theories prescribe consideration of consumer as rational and reasonable behavior. However, by recent investigation, consideration of consumer can be defined behavior that is occurred by sensibility. These consideration of consumer affect to a process that purchase a product, consumer's purchase decision process. Consumer make a purchasing decision with sensible criterion, respective of quality after all rather than various rational criterion like price, efficiency and usefulness. Brand image has sensible value to thought in the mind about a product and affect to purchase products. Hence building brand image through positive sensitivity is significant point in strengthening. Research from this point of view makes a content advance with improving product process along storytelling method which kind of affective, sensible communication way as a factor of strengthening brand image.

  • PDF

On Pattern Kernel with Multi-Resolution Architecture for a Lip Print Recognition (구순문 인식을 위한 복수 해상도 시스템의 패턴 커널에 관한 연구)

  • 김진옥;황대준;백경석;정진현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.2067-2073
    • /
    • 2001
  • Biometric systems are forms of technology that use unique human physical characteristics to automatically identify a person. They have sensors to pick up some physical characteristics, convert them into digital patterns, and compare them with patterns stored for individual identification. However, lip-print recognition has been less developed than recognition of other human physical attributes such as the fingerprint, voice patterns, retinal at blood vessel patterns, or the face. The lip print recognition by a CCD camera has the merit of being linked with other recognition systems such as the retinal/iris eye and the face. A new method using multi-resolution architecture is proposed to recognize a lip print from the pattern kernels. A set of pattern kernels is a function of some local lip print masks. This function converts the information from a lip print into digital data. Recognition in the multi-resolution system is more reliable than recognition in the single-resolution system. The multi-resolution architecture allows us to reduce the false recognition rate from 15% to 4.7%. This paper shows that a lip print is sufficiently used by the measurements of biometric systems.

  • PDF