• 제목/요약/키워드: Cost-distance Method

Search Result 395, Processing Time 0.035 seconds

A Study on the Development of High Sensitivity Collision Simulation with Digital Twin (디지털 트윈을 적용한 고감도 충돌 시뮬레이션 개발을 위한 연구)

  • Ki, Jae-Sug;Hwang, Kyo-Chan;Choi, Ju-Ho
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.4
    • /
    • pp.813-823
    • /
    • 2020
  • Purpose: In order to maximize the stability and productivity of the work through simulation prior to high-risk facilities and high-cost work such as dismantling the facilities inside the reactor, we intend to use digital twin technology that can be closely controlled by simulating the specifications of the actual control equipment. Motion control errors, which can be caused by the time gap between precision control equipment and simulation in applying digital twin technology, can cause hazards such as collisions between hazardous facilities and control equipment. In order to eliminate and control these situations, prior research is needed. Method: Unity 3D is currently the most popular engine used to develop simulations. However, there are control errors that can be caused by time correction within Unity 3D engines. The error is expected in many environments and may vary depending on the development environment, such as system specifications. To demonstrate this, we develop crash simulations using Unity 3D engines, which conduct collision experiments under various conditions, organize and analyze the resulting results, and derive tolerances for precision control equipment based on them. Result: In experiments with collision experiment simulation, the time correction in 1/1000 seconds of an engine internal function call results in a unit-hour distance error in the movement control of the collision objects and the distance error is proportional to the velocity of the collision. Conclusion: Remote decomposition simulators using digital twin technology are considered to require limitations of the speed of movement according to the required precision of the precision control devices in the hardware and software environment and manual control. In addition, the size of modeling data such as system development environment, hardware specifications and simulations imitated control equipment and facilities must also be taken into account, available and acceptable errors of operational control equipment and the speed required of work.

Grain-Size Trend Analysis for Identifying Net Sediment Transport Pathways: Potentials and Limitations (퇴적물 이동경로 식별을 위한 입도경향 분석법의 가능성과 한계)

  • Kim, Sung-Hwan;Rhew, Ho-Sahng;Yu, Keun-Bae
    • Journal of the Korean Geographical Society
    • /
    • v.42 no.4
    • /
    • pp.469-487
    • /
    • 2007
  • Grain-Size Trend Analysis is the methodology to identify net sediment transport pathways, based on the assumption that the movement of sediment from the source to deposit leaves the identifiable spatial pattern of mean, sorting, and skewness of grain size. It can easily be implemented with low cost, so it has great potentials to contribute to geomorphological research, whereas it can also be used inadequately without recognition of its limitations. This research aims to compare three established methods of grain-size trend analysis to search for the adequate way of application, and also suggest the research tasks needed in improving this methodology 1D pathway method can corporate the field experience into analyzing the pathway, provide the useful information of depositional environments through X-distribution, and identify the long-term trend effectively. However, it has disadvantage of the dependence on subjective interpretation, and a relatively coarse temporal scale. Gao-Collins's 2D transport vector method has the objective procedure, has the capability to visualize the transport pattern in 2D format, and to identify the pattern at a finer temporal scale, whereas characteristic distance and semiquantitative filtering are controversial. Le Roux's alternative 2D transport vector method has two improvement of Gao-Collins's in that it expands the empirical rules, considers the gradient of each parameters as well as the order, and has the ability to identify the pattern at a finer temporal scale, while the basic concepts are arbitrary and complicated. The application of grain sire trend analysis requires the selection of adequate method and the design of proper sampling scheme, based on the field knowledge of researcher, the temporal scale of sediment transport pattern targeted, and information needed. Besides, the relationship between the depth of sample and representative temporal scale should be systematically investigated in improving this methodology.

Walking test for assessing lung function and exercise performance in patients with cardiopulmonary disease (심폐질환 환자에서 걷기검사를 이용한 폐기능 및 운동기능의 평가)

  • Jung, Hye Kyung;Chang, Jung Hyun;Cheon, Seon Hee
    • Tuberculosis and Respiratory Diseases
    • /
    • v.43 no.6
    • /
    • pp.976-986
    • /
    • 1996
  • BACKGROUND : Dyspnea is common among patients with cardiopulmonary disease, and "daily disability" is defined as a functional impairment resulting from exercise intolerance. The maximal oxygen uptake(VO2max) during exhausting work is not only the best single physical indicator of the capacity of a man for sustaining hard muscular work, but also the most objective method by which one can determine the physical fitness of an individual as reflected by his cardiovascular system. However, the expense, time and personnel requirements make this procedure prohibitive for testing large group. The walking test is well-known type of exercise and it cost nothing to perform and have good reproducibility. Thus we performed the walking test and investigated correlations with spirometry, ABG and exercise test. METHOD: We observed the walking test and exercise test by cycle ergometer in 37 patients who visited our hospital because of dyspnea. Arterial blood gas analysis and spiromety, dyspnea index were performed, too. RESULT : (1) The VO2max was significantly lower in patients with COPD and cardiovascular disease than asthma and dyspnea on exertion group(p<0.05). The walking test distance was also lower in former. (2) The 12 minute walking test was significantly correlated with VO2max, PaCO2, FVC(%), FEV1(%) in all patients(p<0.05), and the walking test was only conelated with VO2max in patients with COPD(p<0.05). (3) In COPD patients, the VO2max was best correlated with FEV1(%) and FVC(%) and significantly correlated with walking test. But there was no correlation between walking test and FEV1(%) & FVC(%). (4) The 6 minute walking test was well correlated with 12 minute walking test(r=0.92. p<0.01). CONCLUSION : The walking test is the simple method for assessing exercise performance in patient with cardiopulmonary disease and a reliable indicator for VO2max. And the walking test is practical method for assessing on everyday disability rather than maximal exercise capacity. The 6 minute walking test is highly correlated with 12 minute walking test and a less exhausting for the patients and a time-saving for the investigator.

  • PDF

Enhanced Production of Carboxymethylcellulase by a Newly Isolated Marine Microorganism Bacillus atrophaeus LBH-18 Using Rice Bran, a Byproduct from the Rice Processing Industry (미강을 이용한 해양미생물 Bacillus atrophaeus LBH-18 유래의 carboxymethylcellulase 생산의 최적화)

  • Kim, Yi-Joon;Cao, Wa;Lee, Yu-Jeong;Lee, Sang-Un;Jeong, Jeong-Han;Lee, Jin-Woo
    • Journal of Life Science
    • /
    • v.22 no.10
    • /
    • pp.1295-1306
    • /
    • 2012
  • A microorganism producing carboxymethylcellulase (CMCase) was isolated from seawater and identified as Bacillus atrophaeus. This species was designated as B. atrophaeus LBH-18 based on its evolutionary distance and the phylogenetic tree resulting from 16S rDNA sequencing and the neighbor-joining method. The optimal conditions for rice bran (68.1 g/l), peptone (9.1 g/l), and initial pH (7.0) of the medium for cell growth was determined by Design Expert Software based on the response surface method; conditions for production of CMCase were 55.2 g/l, 6.6 g/l, and 7.1, respectively. The optimal temperature for cell growth and the production of CMCase by B. atrophaeus LBH-18 was $30^{\circ}C$. The optimal conditions of agitation speed and aeration rate for cell growth in a 7-l bioreactor were 324 rpm and 0.9 vvm, respectively, whereas those for production of CMCase were 343 rpm and 0.6 vvm, respectively. The optimal inner pressure for cell growth and production of CMCase in a 100-l bioreactor was 0.06 MPa. Maximal production of CMCase under optimal conditions in a 100-l bioreactor was 127.5 U/ml, which was 1.32 times higher than that without an inner pressure. In this study, rice bran was developed as a carbon source for industrial scale production of CMCase by B. atrophaeus LBH-18. Reduced time for the production of CMCase from 7 to 10 days to 3 days by using a bacterial strain with submerged fermentation also resulted in increased productivity of CMCase and a decrease in its production cost.

Application of Borehole Radar to Tunnel Detection (시추공 레이다 탐사에 의한 지하 터널 탐지 적용성 연구)

  • Cho, Seong-Jun;Kim, Jung-Ho;Kim, Chang-Ryol;Son, Jeong-Sul;Sung, Nak-Hun
    • Geophysics and Geophysical Exploration
    • /
    • v.9 no.4
    • /
    • pp.279-290
    • /
    • 2006
  • The borehole radar methods used to tunnel detection are mainly classified into borehole radar reflection, directional antenna, crosshole scanning, and radar tomography methods. In this study, we have investigated the feasibility and limitation of each method to tunnel detection through case studies. In the borehole radar reflection data, there were much more clear diffraction signals of the upper wings than lower wings of the hyperbolas reflected from the tunnel, and their upper and lower wings were spreaded out to more than 10m higher and lower traces from the peaks of the hyperbolas. As the ratio of borehole diameter to antenna length increases, the ringing gets stronger on the data due to the increase in the impedance mismatching between antennas and water in the boreholes. It is also found that the reflection signals from the tunnel could be enhanced using the optimal offset distance between transmitter and receiver antennas. Nevertheless, the borehole radar reflection data could not provide directional information of the reflectors in the subsurface. Direction finding antenna system had a advantage to take a three dimensional location of a tunnel with only one borehole survey even though the cost is still very high and it required very high expertise. The data from crosshole scanning could be a good indicator for tunnel detection and it could give more reliable result when the borehole radar reflection survey is carried out together. The images of the subsurface also can be reconstructed using travel time tomography which could provide the physical property of the medium and would be effective for imaging the underground structure such as tunnels. Based on the results described above, we suggest a cost-effective field procedure for detection of a tunnel using borehole radar techniques; borehole radar reflection survey using dipole antenna can firstly be applied to pick up anomalous regions within the borehole, and crosshole scanning or reflection survey using directional antenna can then be applied only to the anomalous regions to detect the tunnel.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

Wavelet Transform-based Face Detection for Real-time Applications (실시간 응용을 위한 웨이블릿 변환 기반의 얼굴 검출)

  • 송해진;고병철;변혜란
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.829-842
    • /
    • 2003
  • In this Paper, we propose the new face detection and tracking method based on template matching for real-time applications such as, teleconference, telecommunication, front stage of surveillance system using face recognition, and video-phone applications. Since the main purpose of paper is to track a face regardless of various environments, we use template-based face tracking method. To generate robust face templates, we apply wavelet transform to the average face image and extract three types of wavelet template from transformed low-resolution average face. However template matching is generally sensitive to the change of illumination conditions, we apply Min-max normalization with histogram equalization according to the variation of intensity. Tracking method is also applied to reduce the computation time and predict precise face candidate region. Finally, facial components are also detected and from the relative distance of two eyes, we estimate the size of facial ellipse.

A Study on measurement of scattery ray of Computed Tomography (전산화 단층촬영실의 산란선 측정에 대한 연구)

  • Cho, Pyong-Kon;Lee, Joon-Hyup;Kim, Yoon-Sik;Lee, Chang-Yeop
    • Journal of radiological science and technology
    • /
    • v.26 no.2
    • /
    • pp.37-42
    • /
    • 2003
  • Purpose : Computed tomographic equipment is essential for diagnosis by means of radiation. With passage of time and development of science computed tomographic was developed time and again and in future examination by means of this equipment is expected to increase. In this connection these authors measured rate of scatter ray generation at front of lead glass for patients within control room of computed tomographic equipment room and outside of entrance door for exit and entrance of patients and attempted to ind out method for minimizing exposure to scatter ray. Material and Method : From November 2001 twenty five units of computed tomographic equipments which were already installed and operation by 13 general hospitals and university hospitals in Seoul were subjected to this study. As condition of photographing those recommended by manufacturer for measuring exposure to sauter ray was use. At the time objects used DALI CT Radiation Dose Test Phantom fot Head (${\oint}16\;cm$ Plexglas) and Phantom for Stomache(${\oint}32\;cm$ Plexglas) were used. For measurement of scatter ray Reader (Radiation Monitor Controller Model 2026) and G-M Survey were used to Survey Meter of Radical Corporation, model $20{\times}5-1800$, Electrometer/Ion Chamber, S/N 21740. Spots for measurement of scatter ray included front of lead glass for patients within control room of computed tomographic equipment room which is place where most of work by gradiographic personnel are carried out and is outside of entrance door for exit and entrance of patients and their guardians and at spot 100 cm off from isocenter at the time of scanning the object. The results : Work environment within computed tomography room which was installed and under operation by each hospital showed considerable difference depending on circumstances of pertinent hospitals and status of scatter ray was as follows. 1) From isocenter of computed tomographic equipment to lead glass for patients within control room average distance was 377 cm. At that time scatter ray showed diverse distribution from spot where no presence was detected to spot where about 100 mR/week was detected. But it met requirement of weekly tolerance $2.58{\times}10^{-5}\;C/kg$(100 mR/week). 2) From isocenter of computed tomographic equipment to outside of entrance door where patients and their guardians exit and enter was 439 cm in average, At that time scatter ray showed diverse distribution from spot where almost no presence was detected to spot with different level but in most of cases it satisfied requirement of weekly tolerance of $2.58{\times}10^{-6}\;C/kg$(100 mR/week). 3) At the time of scanning object amount of scatter ray at spot with 100 cm distance from isocenter showed considerable difference depending on equipments. Conclusion : Use of computed tomographic equipment as one for generation of radiation for diagnosis is increasing daily. Compared to other general X-ray photographing field of diagnosis is very high but there is a high possibility of exposure to radiation and scatter ray. To be free from scatter ray at computed tomographic equipment room even by slight degree it is essential to secure sufficient space and more effort should be exerted for development of variety of skills to enable maximum photographic image at minimum cost.

  • PDF

Development and Experimental Performance Evaluation of Steel Composite Girder by Turn Over Process (단면회전방법을 적용한 강합성 소수주거더 개발 및 실험적 성능 평가)

  • Kim, Sung Jae;Yi, Na Hyun;Kim, Sung Bae;Kim, Jang-Ho Jay
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.5A
    • /
    • pp.407-415
    • /
    • 2010
  • In Korea, more than 90% of the total number of steel bridges built for 40~70 m span length is a steel box-girder bridge type. A steel box-girder bridge is suitable for long span or curved bridges with outstanding flexural and torsional rigidity as well as good constructability and safety. However, a steel box-girder bridge is uneconomical, requiring many secondary members and workmanship such as stiffeners and ribs requiring welding attachments to flanges or webs. Therefore, in US and Japan, a plate girder bridge, which is relatively cheap and easy to construct is generally used. One type of the plate girder bridge is the two- or three-main girder plate bridge, which is a composite plate girder bridge that minimizes the number of required main girders by increasing the distance between the adjacent girders. Also, for the simplification of girder section, the stiffener which requires attachment to the web is not required. The two-main steel girder plate bridge is a representative type of plate girder bridges, which is suitable for bridges with 10 m effective width and has been developed in the early 1960s in France. To ensure greater safety of two- or three-main girder plate bridges, a larger steel section is used in the bridge domestically than in Europe or Japan. Also, the total number of two- or three-main girder plate bridge constructed in Korea is significantly less than the steel box girder bridge due to a lack of designers' familiarity with more complex design detailing of the bridge compare to that of a steel box girder bridge design. In this study, a new construction method called Turn Over method is proposed to minimize the steel section size used in a two- or three-main girder plate bridge by applying prestressing force to the member using confining concrete section's weight to reduce construction cost. Also, a full scale 20 m Turn Over girder specimen and a Turn Over girder bridge specimen were tested to evaluate constructability and structural safety of the members constructed using Turn Over process.

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF