• 제목/요약/키워드: Matching Strategy

검색결과 186건 처리시간 0.025초

스펙트럴 영역분할 격자 삽입법을 이용한 채널유동의 큰 에디 모사 (Large-eddy simulation of channel flow using a spectral domain-decomposition grid-embedding technique)

  • 강상모;변도영;백승욱
    • 대한기계학회논문집B
    • /
    • 제22권7호
    • /
    • pp.1030-1040
    • /
    • 1998
  • One of the main unresolved issues in large-eddy simulation(LES) of wall-bounded turbulent flows is the requirement of high spatial resolution in the near-wall region, especially in the spanwise direction. Such high resolution required in the near-wall region is generally used throughout the computational domain, making simulations of high Reynolds number, complex-geometry flows prohibitive. A grid-embedding strategy using a nonconforming spectral domain-decomposition method is proposed to address this limitation. This method provides an efficient way of clustering grid points in the near-wall region with spectral accuracy. LES of transitional and turbulent channel flow has been performed to evaluate the proposed grid-embedding technique. The computational domain is divided into three subdomains to resolve the near-wall regions in the spanwise direction. Spectral patching collocation methods are used for the grid-embedding and appropriate conditions are suggested for the interface matching. Results of LES using the grid-embedding strategy are promising compared to LES of global spectral method and direct numerical simulation. Overall, the results show that the spectral domain-decomposition grid-embedding technique provides an efficient method for resolving the near-wall region in LES of complex flows of engineering interest, allowing significant savings in the computational CPU and memory.

RLDB: Robust Local Difference Binary Descriptor with Integrated Learning-based Optimization

  • Sun, Huitao;Li, Muguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4429-4447
    • /
    • 2018
  • Local binary descriptors are well-suited for many real-time and/or large-scale computer vision applications, while their low computational complexity is usually accompanied by the limitation of performance. In this paper, we propose a new optimization framework, RLDB (Robust-LDB), to improve a typical region-based binary descriptor LDB (local difference binary) and maintain its computational simplicity. RLDB extends the multi-feature strategy of LDB and applies a more complete region-comparing configuration. A cascade bit selection method is utilized to select the more representative patterns from massive comparison pairs and an online learning strategy further optimizes descriptor for each specific patch separately. They both incorporate LDP (linear discriminant projections) principle to jointly guarantee the robustness and distinctiveness of the features from various scales. Experimental results demonstrate that this integrated learning framework significantly enhances LDB. The improved descriptor achieves a performance comparable to floating-point descriptors on many benchmarks and retains a high computing speed similar to most binary descriptors, which better satisfies the demands of applications.

공유경제 비즈니스 모델의 가치 요인 분석 (The Sharing Economy Business Model per the Analysis of Value Attributes)

  • 이준민;황준석;김종립
    • 한국IT서비스학회지
    • /
    • 제15권4호
    • /
    • pp.153-174
    • /
    • 2016
  • On account of multiple causes, including prolonged global economic crisis, addressing environmental pollution and the advent of hyper-connected society, a new paradigm called 'sharing economy' has rapidly emerged. Many startups have attempted to build promising business model based on the sharing economy concept. Nevertheless, successful cases are still very rare in the global level, except for Uber and Airbnb cases. Therefore, this study analyzes necessary causes and sufficient causes for successful settlements in the market through a comparative case analysis on digital matching firms in the sharing economy businesses. For the case study, we compare five successful cases (Uber, Airbnb, Kickstarter, TaskRabbit and DogVacay), three failure cases (Homejoy, Ridejoy and Tuterspree) and a platform cooperativism case (Juno) in accordance with six value attributes of business model including value proposition, market segment, value chain, cost structure and profit potential, value network and competitive strategy. We apply Boolean method to support controlled comparison and eliminate unnecessary attributes. The Boolean analysis result shows that value proposition, cost structure and profit potential, value network and competitive strategy are the essential attributes. Furthermore, the result indicates that each attribute is a necessary condition, where all four conditions should be met simultaneously in order to be successful. With this result, we discuss essential consideration for those who are planning startup based on the sharing economy business model.

Cyber attack taxonomy for digital environment in nuclear power plants

  • Kim, Seungmin;Heo, Gyunyoung;Zio, Enrico;Shin, Jinsoo;Song, Jae-gu
    • Nuclear Engineering and Technology
    • /
    • 제52권5호
    • /
    • pp.995-1001
    • /
    • 2020
  • With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG.5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs.

국가간 데이터직무 인력 규모 비교 연구 (Research on Comparing the Size of the Data Workforce Across Countries)

  • 엄혜미
    • Journal of Information Technology Applications and Management
    • /
    • 제31권1호
    • /
    • pp.79-95
    • /
    • 2024
  • In modern society, as data plays a crucial role at the levels of businesses, industries, and nations, the utilization of data becomes increasingly important. Consequently, governments are prioritizing the development and implementation of plans to cultivate data workforce, viewing the data industry as a cornerstone of national strategy. To enhance domestic capabilities and nurture workforce in the data industry, it is deemed necessary to conduct an objective comparative analysis with major foreign countries. Therefore, this study aims to analyze cases of domestic and international data industries and explore methods for quantitatively comparing data industry workforce across nations. Initially, the study distinguishes between "data industry workforce" and "data job-related workforce," particularly focusing on professionals handling data-related tasks. Subsequently, it compares the workforce sizes of data job-related workforce across nations, utilizing standardized occupational classification codes based on the International Standard Classification of Occupations(ISCO). However, it should be noted that countries employing their own unique occupational classification systems often require matching job titles with similar meanings for accurate comparison. Through this study, it is anticipated that policymakers will be able to establish future directions for cultivating data workforce based on comparable status.

IPA를 활용한 제조기업의 중대재해처벌법 대응방안 수립 (Establish Manufacturing Firms' Response Strategy to the Serious Accident Punishment Act Using IPA)

  • 서준혁;배성민
    • 품질경영학회지
    • /
    • 제51권4호
    • /
    • pp.607-618
    • /
    • 2023
  • Purpose: In this study, we proposed a plan to establish and implement a safety and health management system by utilizing corporate resources so that manufacturing companies can effectively respond to the Serious Accident Punishment Act. Methods: We identified critical factors and response strategies necessary for manufacturing companies to respond to the Severe Accident Punishment Act effectively and surveyed employees working at the company regarding their importance and performance. Results: In this study, we presented a method of strategically constructing the response strategies (20) shown in previous studies by matching them with the company's resources (leadership, organization, budget, education, and awareness). In particular, leadership refers to the ability of managers who can prevent serious accidents by carrying out safety and health security obligations to avoid safety and health hazards or risks to employees in the business or workplace that is controlled, operated, and managed. Conclusion: Based on the manager's firm leadership, the system's purpose and direction must be accurately set and sufficiently communicated to members. In addition, for companies to identify and improve risk factors on their own, a Process approach must be established to improve execution by referring to legal standards together with field managers and supervisors.

A Strategy for Multi-target Paths Coverage by Improving Individual Information Sharing

  • Qian, Zhongsheng;Hong, Dafei;Zhao, Chang;Zhu, Jie;Zhu, Zhanggeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5464-5488
    • /
    • 2019
  • The multi-population genetic algorithm in multi-target paths coverage has become a top choice for many test engineers. Also, information sharing strategy can improve the efficiency of multi-population genetic algorithm to generate multi-target test data; however, there is still space for some improvements in several aspects, which will affect the effectiveness of covering the target path set. Therefore, a multi-target paths coverage strategy is proposed by improving multi-population genetic algorithm based on individual information sharing among populations. It primarily contains three aspects. Firstly, the behavior of the sub-population covering corresponding target path is improved, so that it can continue to try to cover other sub-paths after covering the current target path, so as to take full advantage of population resources; Secondly, the populations initialized are prioritized according to the matching process, so that those sub-populations with better path coverage rate are executed firstly. Thirdly, for difficultly-covered paths, the individual chromosome features which can cover the difficultly-covered paths are extracted by utilizing the data generated, so as to screen those individuals who can cover the difficultly-covered paths. In the experiments, several benchmark programs were employed to verify the accuracy of the method from different aspects and also compare with similar methods. The experimental results show that it takes less time to cover target paths by our approach than the similar ones, and achieves more efficient test case generation process. Finally, a plug-in prototype is given to implement the approach proposed.

심리적 거리로서의 가상성 : 가상성에 따른 광고메시지 전략 (Virtuality as a Psychological Distance : The Strategy for Advertisement Message Appeal Depending on Virtuality)

  • 박도형
    • Journal of Information Technology Applications and Management
    • /
    • 제24권2호
    • /
    • pp.39-54
    • /
    • 2017
  • At present, various technologies are rapidly advancing, centering on the concept of virtuality. From the technology of virtual reality, which allows us to experience the senses as if they existed, to the technology of augmented reality, which provides new information or services based on reality, they are no longer strange things for ourselves because we experience them every day and night. Even though the concept of virtual is very familiar in terms of technology, it is not known how individuals accept the concept of virtuality, how they change our way of thinking, and how their behavior changes. This study aims to approach virtuality perceived by the individual from the viewpoint of individual's information processing. Virtuality is defined as the degree to which the situation facing an individual is far from actual reality. An individual can judge the degree of virtuality easily, which is considered to be a psychological distance which is an important factor in personal information processing. In this study, we have confirmed whether the argument is applied to the real world in the context of advertisement. According to the construal level theory, when an individual feels virtuality at a high level, the individual thinks that the situation they are facing is psychologically distant and accordingly has a high level construal. Therefore, it is more influenced by 'advertisement emphasizing symbolic appeal' which is matching with higher level. On the other hand, when an individual feels a low level of virtuality, the individual thinks that the situation they are facing is psychologically near and thus has a low level construal. Therefore, respondents are more sensitive to functional appeal, which is related to lower level. This study has the theoretical contribution in terms that the degree of virtuality affects the psychological distance of the individual. In addition, the results of this study have practical contribution in terms of being able to be actively used in the information delivery strategy centered on the advertisement.

수요응답형 자율주행 대중교통 서비스의 잠재적 이용자 집단 간 서비스 요소별 중요도에 관한 분석 (Analysis on the Importance Rank of Service Components of Autonomous Mobility-on-Demand Service by Potential User Groups)

  • 서성주;김진희;이재형;양병수
    • 한국ITS학회 논문지
    • /
    • 제21권6호
    • /
    • pp.177-193
    • /
    • 2022
  • 장차 자율주행 기술이 접목된 수요응답형 서비스가 새로운 교통수단으로써 널리 퍼질것으로 예측된다. 차량 편의성, 이동/배차 신속성, 플랫폼 편리성 등 여러 서비스 요인을 내포하는 만큼 성공적인 정착을 위해서는 서비스 요소별 우선순위가 파악될 필요가 있다. 이에 본 연구에서는 수요응답형 자율주행 대중교통 서비스의 잠재적 이용자를 대상으로 온라인 설문조사를 통해 서비스 요소별 중요도 순위를 도출하였다. 상위 항목에 대하여 AHP(분석적 계층화과정) 분석 결과, 이동/배차 신속성, 플랫폼 편리성, 차량 편의성 순으로 중요한 것으로 드러났다. 하위 항목에 대하여 평균 순위 분석 결과, 차량 편의성은 차내 혼잡도가, 이동/배차 신속성은 대기시간이, 플랫폼 편리성은 이용시간 예약 가능성이 가장 중요한 것으로 나타났다. 이용자 집단별로 차별화된 접근 전략을 수립하기 위해 집단별 분석도 수행하였다. 그 결과, 고령자층이 많은 지역에 서비스를 도입할 때는 모바일 플랫폼보다 차량에 더 중점을 두고, 자가용 보유자가 많은 지역에서는 기존 대중교통 대비 이동과 배차를 빠르게 처리하고, 차내 혼잡도를 낮추며, 이용시간을 예약할 수 있도록 하는 것이 바람직하다.

최적화 기법을 이용한 대형 증기터빈 유로설계 (Flow Path Design of Large Steam Turbines Using An Automatic Optimization Strategy)

  • 임홍식;김영상;조상현;권기범
    • 대한기계학회:학술대회논문집
    • /
    • 대한기계학회 2001년도 춘계학술대회논문집D
    • /
    • pp.771-776
    • /
    • 2001
  • By matching a well established fast throughflow code, with standard loss correlations, and an efficient optimization algorithm, a new design system has been developed, which optimizes inlet and exit flow-field parameters for each blade row of a multistage axial flow turbine. The compressible steady state inviscid throughflow code based on streamline curvature method is suitable for fast and accurate flow calculation and performance prediction of a multistage axial flow turbine. A general purpose hybrid constrained optimization package, iSIGHT has been used, which includes the following modules: genetic algorithm, simulated annealing, modified method of feasible directions. The design system has been demonstrated using an example of a 5-stage low pressure steam turbine for 800MW thermal power plant previously designed by HANJUNG. The comparison of computed performance of initial and optimized design shows significant improvement in the turbine efficiency.

  • PDF