• 제목/요약/키워드: Checking Application

검색결과 285건 처리시간 0.027초

건축공법 내부 리스크 분석에 관한 연구 (A Study on the Risk Analysis of Construction Method)

  • 윤여완;양극영
    • 한국건축시공학회지
    • /
    • 제2권4호
    • /
    • pp.131-135
    • /
    • 2002
  • The purpose of this study was to Identification the Risk of construction method to protect and reduce the risk of construction period. For this study we are using the pre and during construction period Inspection list. The inspection list was used by construction company for check a flaw of Construction field. So we rearrange the individual item of inspection list to match the Risk factor. This inspection list usually has the difference of importance because this list is not made by Method which is not focused on Method. Therefore, To find the difference of these importance, We surveyed this matter by doing interview of specialist group. To find the application of field and the possibility of measurement of Risk status, We tested Risk occurring frequency and it's strength by checking the level of Risk. The results of this study were as follows; Each Method Check List made out through the rearrangement of Construction Inspection list which used in construction company. To solve and compensate the matter which happened by changing the each Method Check List to each General Inspection List, we added the each Method Check List by checking the importance of check list of each process. By doing this, The Check List for finding Risk level of Method was created by using the check list of each Method.

Using DSP Algorithms for CRC in a CAN Controller

  • Juan, Ronnie O. Serfa;Kim, Hi Seok
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제5권1호
    • /
    • pp.29-34
    • /
    • 2016
  • A controller area network (CAN) controller is an integral part of an electronic control unit, particularly in an advanced driver assistance system application, and its characteristics should always be advantageous in all aspects of functionality especially in real time application. The cost should be low, while maintaining the functionality and reliability of the technology. However, a CAN protocol implementing serial operation results in slow throughput, especially in a cyclical redundancy checking (CRC) unit. In this paper, digital signal processing (DSP) algorithms are implemented, namely pipelining, unfolding, and retiming the CAN controller in the CRC unit, particularly for the encoder and decoder sections. It must attain a feasible iteration bound, a critical path that is appropriate for a CAN system, and must obtain a superior design of a high-speed parallel circuit for the CRC unit in order to have a faster transmission rate. The source code for the encoder and decoder was formulated in the Verilog hardware description language.

Application Study on the View Points Analysis for National Roads Route using Digital Elevation Data

  • Yeon, Sang-Ho;Hong, Ill-Hwa
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2002년도 Proceedings of International Symposium on Remote Sensing
    • /
    • pp.292-296
    • /
    • 2002
  • This study has been accomplished as a experimental study for field application of 3D Perspective Image Map creation using Digital Topographical Map and based on the Ortho-Projection Image which is generated from Satellite Overlay Images and the precise Relative Coordinates of longitude, latitude and altitude which is corrected by GCP(Ground Control Point). AS to Contour Lines Map which is created by Coordinate conversion of 1:5,000 Topographical Map, we firstly made Satellite Image Map to substitute for Digital Topographical Map through overlapping the original images on top of each Ortho-Projection Image created and checking the accuracy. In addition to 3D Image Map creation for 3D Terrain analysis of a target district, Slope Gradient Analysis, Aspect Analysis and Terrain Elevation Model generation, multidirectional 3D Image generation by DEM can be carried out through this study. This study is to develop a mapping technology with which we can generate 3D Satellite Images of a target district through the composition of Digital Maps and Facility Blueprint and arbitrarily create 3D Perspective Images of the target district from any view point.

  • PDF

신용장거래관습 최적편성방안의 모색 : UCP 600 제14조 (b)항의 재해석 (A Study on the Implication for the Optimal Reorganization in Letter of Credit Transaction based on the Reappraisal of the UCP Article 14(b))

  • 김기선
    • 무역상무연구
    • /
    • 제49권
    • /
    • pp.111-137
    • /
    • 2011
  • UCP 600 Article 14(b), providing rules for the period of the examination of documents, is a radical reorganization of UCP Article 13(b). The provision changes the period of time to a maximum of five banking days instead of reasonable time. One of the critical problems giving rise to the difficulty in interpretation and application is the question of fact that there may be two possible conflicting options in determining the time of checking documents presented. The one doctrine is fixed time(safe harbor) standard, and the other is hidden reasonableness standard. This study analyzes which option should be adopted for the optimal application standard by welfare effect methodology using consumer surplus approach and suggests that safe harbor standard should be optimal solution to the determination of period of examination of documents presented in letter of credit regime.

  • PDF

전력시장 해석을 위한 3연 참여 게임의 해법 연구 (A Solution Method of a Three-Player Game for Application to an Electric Power Market)

  • 이광호
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제52권6호
    • /
    • pp.347-353
    • /
    • 2003
  • In models of imperfect competition of deregulated electricity markets, the key task is to find the Nash equilibrium(NE). The approaches for finding the NE have had two major bottlenecks: computation of mixed strategy equilibrium and treatment of multi-player games. This paper proposes a payoff matrix approach that resolves these bottlenecks. The proposed method can efficiently find a mixed strategy equilibrium in a multi-player game. The formulation of the m condition for a three-player game is introduced and a basic computation scheme of solving nonlinear equalities and checking inequalities is proposed. In order to relieve the inevitable burden of searching the subspace of payoffs, several techniques are adopted in this paper. Two example application problems arising from electricity markets and involving a Cournot and a Bertrand model, respectively, are investigated for verifying the proposed method.

무선공유기 웹 보안 설정 점검을 위한 모바일 앱 개발 (Development of Mobile Apps for Checking Web Security Configurations of Wireless Access Points)

  • 윤희주;김지혜;이해영
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2016년도 제53차 동계학술대회논문집 24권1호
    • /
    • pp.101-102
    • /
    • 2016
  • 사물인터넷(Internet of Things)의 도래와 함께, 무선공유기(wireless access point)들의 보안이 심각한 문제로 대두되고 있다. 연구진은 대부분의 무선공유기들이 제공하는 웹 기반 관리 인터페이스들에 웹 어플리케이션 취약점(web application vulnerability)들이 존재할 수 있다는 점을 착안, 국내 주요 무선공유기들에 대한 웹 어플리케이션 취약점 점검을 수행하였으며, 악용이 가능한 여러 취약점들이 존재함을 확인하였다. 본 논문에서는 연구진이 무선공유기 대상 웹 어플리케이션 취약점 점검에 보조적으로 사용하기 위하여 개발한 3종의 모바일 앱(mobile app)들을 설명한다.

  • PDF

자동차 가상생산 기술 적용 (I) - 생산준비 업무 분석 및 적용 전략 수립 (Virtual Manufacturing for an Automotive Company (I) - Workflow Analysis and Strategic Planning of Manufacturing Preparation Activities)

  • 노상도;이창호;한형상
    • 산업공학
    • /
    • 제14권2호
    • /
    • pp.120-126
    • /
    • 2001
  • Virtual manufacturing is a technology facilitating effective development and agile manufacturing of products via sophisticated computer models representing physical and logical schema and behavior of real manufacturing systems including manufacturing resources, environments, and products. Based on these models, virtual manufacturing supports decision making and error checking in the entire manufacturing processes from design to mass production. At first, we analyzed manufacturing preparation activities of the four major production shops such as press, body assembly, painting and final assembly, of a Korean automotive company. We then developed the workflow models out of the analysis by the IDEF methodology, and generated a strategic plan for the systematic application of the virtual manufacturing technologies. We identified many manufacturing preparation activities that can be improved by the application of virtual manufacturing technologies. Finally, we estimated the effect of improvement including time savings in car development processes and corresponding cost savings.

  • PDF

Structural reliability estimation using Monte Carlo simulation and Pearson's curves

  • Krakovski, Mikhail B.
    • Structural Engineering and Mechanics
    • /
    • 제3권3호
    • /
    • pp.201-213
    • /
    • 1995
  • At present Level 2 and importance sampling methods are the main tools used to estimate reliability of structural systems. But sometimes application of these techniques to realistic problems involves certain difficulties. In order to overcome the difficulties it is suggested to use Monte Carlo simulation in combination with two other techniques-extreme value and tail entropy approximations; an appropriate Pearson's curve is fit to represent simulation results. On the basis of this approach an algorithm and computer program for structural reliability estimation are developed. A number of specially chosen numerical examples are considered with the aim of checking the accuracy of the approach and comparing it with the Level 2 and importance sampling methods. The field of application of the approach is revealed.

스마트폰 보안 취약 요소에 따른 분석 연구 (The Research of Security Vulnerabilities of Smartphone)

  • 최희식;조양현;주헌식
    • 디지털산업정보학회논문지
    • /
    • 제9권3호
    • /
    • pp.119-127
    • /
    • 2013
  • The merits of Smartphone are portability, convenience and especially a lot of information can be stored in the device. Especially in Smartphone, users can install programs that cannot install to normal cell phone and users can use many different services through these Smartphone programs. Also Smartphone can connect to Internet through network, so it can access information anytime, anywhere easily. Security of personal information and variety of information which stored in Smartphone are in risk. In Chapter 2 of thesis, it will discuss the definition and features of the Smartphone and market trends. In Chapter 3 of thesis, it will discuss security vulnerabilities of Smartphone and it will analyze and research security vulnerabilities of Smartphone in Chapter 4. In conclusion, it will check users' identification twice in useful application especially application that relate to finance and mobile payment. By checking users' identification several times, it will help to defend from security threats. Users can use Smartphone safely and convenience by know how to prevent from mobile hacking for personal and private information. the quality of APIs matching by the clustering and hierarchical relationships mechanism.

장애우 및 고령자 측면에서의 모바일 SNS 앱접근성 평가 (Mobile SNS Application Accessibility Evaluation for the Disabled and the Aged)

  • 홍미희;박화진
    • 디지털콘텐츠학회 논문지
    • /
    • 제13권4호
    • /
    • pp.575-582
    • /
    • 2012
  • 페이스북과 같은 모바일 SNS는 모든 사용자들이 시간과 장소에 구애받지 않고 타인과 협력하고 정보를 공유하기 위한 앱으로 유명하다. 그러나 일반인외에도 앱을 사용하는데 어려움을 가지고 있는 장애인과 고령자가 사용하기에 적절한 인터페이스를 제공하고 있는지에 대한 실태를 확인하기 위해 모바일 앱 접근성을 평가할 필요가 있다. 모바일 앱 접근성은 인지적, 신체적 특징에 상관없이 모든 사람에게 동등하게 모바일 애플리케이션에 대한 기회를 제공하고 있는가를 나타내는 지표이다. 이에 본 논문에서는 행정안전부에서 고시한 '모바일 애플리케이션 접근성 지침'과 한국정보화진흥원의 '모바일 애플리케이션(안드로이드) 접근성 점검 매뉴얼 (v1.0)'을 기반으로 페이스북과 카카오톡인 모바일 SNS의 모바일 앱 접근성을 평가하여, 모바일 앱 접근성 준수 현황을 파악하고, 개선방향을 제안하고자 한다.