• Title/Summary/Keyword: Computational numerical analysis

Search Result 2,965, Processing Time 0.028 seconds

Design of a pilot-scale helium heating system to support the SI cycle (파이롯 규모 SI 공정 시험 설비에서의 헬륨 가열 장치 설계)

  • Jang, Se-Hyun;Choi, Yong-Suk;Lee, Ki-Young;Shin, Young-Joon;Lee, Tae-Hoon;Kim, Jong-Ho;Yoon, Seok-Hun;Choi, Jae-Hyuk
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.3
    • /
    • pp.157-164
    • /
    • 2016
  • In this study, researchers performed preliminary design and numerical analysis for a pilot-scale helium heating system intended to support full-scale construction for a sulfur-iodine (SI) cycle. The helium heat exchanger used a liquefied petroleum gas (LPG) combustor. Exhaust gas velocity at the heat exchanger outlet was approximately 40 m/s based on computational thermal and flow analysis. The maximum gas temperature was reached with six baffles in the design; lower gas temperatures were observed with four baffles. The amount of heat transfer was also higher with six baffles. Installation of additional baffles may reduce fuel costs because of the reduced LPG exhausted to the heat exchanger. However, additional baffles may also increase the pressure difference between the exchanger's inlet and outlet. Therefore, it is important to find the optimum number of baffles. Structural analysis, followed by thermal and flow analysis, indicated a 3.86 mm thermal expansion at the middle of the shell and tube type heat exchanger when both ends were supported. Structural analysis conditions included a helium flow rate of 3.729 mol/s and a helium outlet temperature of $910^{\circ}C$. An exhaust gas temperature of $1300^{\circ}C$ and an exhaust gas rate of 52 g/s were confirmed to achieve the helium outlet temperature of $910^{\circ}C$ with an exchanger inlet temperature of $135^{\circ}C$ in an LPG-fueled helium heating system.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

A Study on the Digital Drawing of Archaeological Relics Using Open-Source Software (오픈소스 소프트웨어를 활용한 고고 유물의 디지털 실측 연구)

  • LEE Hosun;AHN Hyoungki
    • Korean Journal of Heritage: History & Science
    • /
    • v.57 no.1
    • /
    • pp.82-108
    • /
    • 2024
  • With the transition of archaeological recording method's transition from analog to digital, the 3D scanning technology has been actively adopted within the field. Research on the digital archaeological digital data gathered from 3D scanning and photogrammetry is continuously being conducted. However, due to cost and manpower issues, most buried cultural heritage organizations are hesitating to adopt such digital technology. This paper aims to present a digital recording method of relics utilizing open-source software and photogrammetry technology, which is believed to be the most efficient method among 3D scanning methods. The digital recording process of relics consists of three stages: acquiring a 3D model, creating a joining map with the edited 3D model, and creating an digital drawing. In order to enhance the accessibility, this method only utilizes open-source software throughout the entire process. The results of this study confirms that in terms of quantitative evaluation, the deviation of numerical measurement between the actual artifact and the 3D model was minimal. In addition, the results of quantitative quality analysis from the open-source software and the commercial software showed high similarity. However, the data processing time was overwhelmingly fast for commercial software, which is believed to be a result of high computational speed from the improved algorithm. In qualitative evaluation, some differences in mesh and texture quality occurred. In the 3D model generated by opensource software, following problems occurred: noise on the mesh surface, harsh surface of the mesh, and difficulty in confirming the production marks of relics and the expression of patterns. However, some of the open source software did generate the quality comparable to that of commercial software in quantitative and qualitative evaluations. Open-source software for editing 3D models was able to not only post-process, match, and merge the 3D model, but also scale adjustment, join surface production, and render image necessary for the actual measurement of relics. The final completed drawing was tracked by the CAD program, which is also an open-source software. In archaeological research, photogrammetry is very applicable to various processes, including excavation, writing reports, and research on numerical data from 3D models. With the breakthrough development of computer vision, the types of open-source software have been diversified and the performance has significantly improved. With the high accessibility to such digital technology, the acquisition of 3D model data in archaeology will be used as basic data for preservation and active research of cultural heritage.

Motion Analysis of Light Buoys Combined with 7 Nautical Mile Self-Contained Lantern (7마일 등명기를 결합한 경량화 등부표의 운동 해석)

  • Son, Bo-Hun;Ko, Seok-Won;Yang, Jae-Hyoung;Jeong, Se-Min
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.5
    • /
    • pp.628-636
    • /
    • 2018
  • Because large buoys are mainly made of steel, they are heavy and vulnerable to corrosion by sea water. This makes buoy installation and maintenance difficult. Moreover, vessel collision accidents with buoys and damage to vessels due to the material of buoys (e.g., steel) are reported every year. Recently, light buoys adopting eco-friendly and lightweight materials have come into the spotlight in order to solve the previously-mentioned problems. In Korea, a new lightweight buoy with a 7-Nautical Mile lantern adopting expanded polypropylene (EPP) and aluminum to create a buoyant body and tower structure, respectively, was developed in 2017. When these light buoys are operated in the ocean, the visibility and angle of light from the lantern installed on the light buoys changes, which may cause them to function improperly. Therefore, research on the performance of light buoys is needed since the weight distribution and motion characteristics of these new buoys differ from conventional models. In this study, stability estimation and motion analyses for newly-developed buoys under various environmental conditions considering a mooring line were carried out using ANSYS AQWA. Numerical simulations for the estimation of wind and current loads were performed using commercial CFD software, Siemens STAR-CCM+, to increase the accuracy of motion analysis. By comparing the estimated maximum significant motions of the light buoys, it was found that waves and currents were more influential in the motion of the buoys. And, the estimated motions of the buoys became larger as the sea state became worser, which might be the reason that the peak frequencies of the wave spectra got closer to those of the buoys.

Comparison of Algorithms for Generating Parametric Image of Cerebral Blood Flow Using ${H_2}^{15}O$ PET Positron Emission Tomography (${H_2}^{15}O$ PET을 이용한 뇌혈류 파라메트릭 영상 구성을 위한 알고리즘 비교)

  • Lee, Jae-Sung;Lee, Dong-Soo;Park, Kwang-Suk;Chung, June-Key;Lee, Myung-Chul
    • The Korean Journal of Nuclear Medicine
    • /
    • v.37 no.5
    • /
    • pp.288-300
    • /
    • 2003
  • Purpose: To obtain regional blood flow and tissue-blood partition coefficient with time-activity curves from ${H_2}^{15}O$ PET, fitting of some parameters in the Kety model is conventionally accomplished by nonlinear least squares (NLS) analysis. However, NLS requires considerable compuation time then is impractical for pixel-by-pixel analysis to generate parametric images of these parameters. In this study, we investigated several fast parameter estimation methods for the parametric image generation and compared their statistical reliability and computational efficiency. Materials and Methods: These methods included linear least squres (LLS), linear weighted least squares (LWLS), linear generalized least squares (GLS), linear generalized weighted least squares (GWLS), weighted Integration (WI), and model-based clustering method (CAKS). ${H_2}^{15}O$ dynamic brain PET with Poisson noise component was simulated using numerical Zubal brain phantom. Error and bias in the estimation of rCBF and partition coefficient, and computation time in various noise environments was estimated and compared. In audition, parametric images from ${H_2}^{15}O$ dynamic brain PET data peformed on 16 healthy volunteers under various physiological conditions was compared to examine the utility of these methods for real human data. Results: These fast algorithms produced parametric images with similar image qualify and statistical reliability. When CAKS and LLS methods were used combinedly, computation time was significantly reduced and less than 30 seconds for $128{\times}128{\times}46$ images on Pentium III processor. Conclusion: Parametric images of rCBF and partition coefficient with good statistical properties can be generated with short computation time which is acceptable in clinical situation.