• 제목/요약/키워드: Missed Approach

검색결과 42건 처리시간 0.017초

B747-400 항공기의 Missed Approach 비행자료 분석 (The analysis of flight data of B747-400 aircraft with Missed Approach)

  • 신대원;박종혁;은희봉
    • 한국항공운항학회지
    • /
    • 제11권2호
    • /
    • pp.93-107
    • /
    • 2003
  • This study is performed to secure the safety of civil aviation by establishing systematic analysis ability of Flight Data Recorder. Through this study, readouting UFDR(Universal Flight Data Recorder) to personal computer, flight data numerical analysis and regulations of Missed Approach. In the analysis, the flight data of B747-400 model aircraft with Missed Approach in San Francisco(KSFO) was selected.

  • PDF

접근절차의 시계구간 보호 적용 연구 - 태안비행장을 중심으로 - (A Study on an Application of the Protection for the Visual Segment of the Approach Procedure focused on Taean Airport)

  • 김도현;홍승범
    • 한국항공운항학회지
    • /
    • 제22권2호
    • /
    • pp.9-15
    • /
    • 2014
  • 'Visual segment surface' means a surface that extends from the missed approach point of non precision approaches (or the decision altitude location for approaches with vertical guidance and precision approaches) to the threshold to facilitate the identification of and protection from obstacles in this visual segment of the approach. Validation is the necessary final quality assurance step in the procedure design process, prior to publication. The purpose of validation is the verification of all obstacle and navigation data, and assessment of flyability of the procedure. This paper shows how to apply the protection for the visual segment of the approach procedure, and the results of the validation for visual segment surface conducted at an airport.

지식 흐름 모델의 구현 아키텍처에 관한 연구 (An Implementation Architecture for Knowledge Flow Model)

  • 김수연;황현석
    • 지식경영연구
    • /
    • 제7권2호
    • /
    • pp.53-68
    • /
    • 2006
  • Knowledge has become an important resource for organization. The manufacturing industry is usually operated on the basis of business processes, and most workers are familiar with their own processes. The process-based approach, therefore, can provide an efficient way to capture and navigate knowledge. In this study, we focus on knowledge which may be missed during knowledge transfer among workers. For this, we propose a method for analyzing knowledge flow, which is passed among business processes. We propose a process-based knowledge management framework for analyzing knowledge flow, which employs a two-phase analysis: process analysis and knowledge flow analysis. A knowledge flow model, represented by Knowledge Flow Diagram, is proposed as a tool for representing knowledge. We formulate several semantics for knowledge flow modeling. We build the three-level schema: conceptual, logical, and physical in order to automate the knowledge model adaptive to knowledge management systems. The proposed approach is verified and illustrated through a case study on the manufacturing process of A Company.

  • PDF

An Improved Multi-resolution image fusion framework using image enhancement technique

  • Jhee, Hojin;Jang, Chulhee;Jin, Sanghun;Hong, Yonghee
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권12호
    • /
    • pp.69-77
    • /
    • 2017
  • This paper represents a novel framework for multi-scale image fusion. Multi-scale Kalman Smoothing (MKS) algorithm with quad-tree structure can provide a powerful multi-resolution image fusion scheme by employing Markov property. In general, such approach provides outstanding image fusion performance in terms of accuracy and efficiency, however, quad-tree based method is often limited to be applied in certain applications due to its stair-like covariance structure, resulting in unrealistic blocky artifacts at the fusion result where finest scale data are void or missed. To mitigate this structural artifact, in this paper, a new scheme of multi-scale fusion framework is proposed. By employing Super Resolution (SR) technique on MKS algorithm, fine resolved measurement is generated and blended through the tree structure such that missed detail information at data missing region in fine scale image is properly inferred and the blocky artifact can be successfully suppressed at fusion result. Simulation results show that the proposed method provides significantly improved fusion results in the senses of both Root Mean Square Error (RMSE) performance and visual improvement over conventional MKS algorithm.

실용적 접근 기반의 전력계통 해석 프로그램 상정고장, 해소방안 자동화 기법: 휴전검토 자동화 툴 개발 (A Study on Methodology for Automated Contingency and Remedial Action Analysis based on Practical Approach: Development of Automated Scheduled Outage Analysis Tool)

  • 송지영;고백경;신정훈;한상욱;남수철;이재걸;김태균
    • 전기학회논문지
    • /
    • 제63권9호
    • /
    • pp.1171-1179
    • /
    • 2014
  • ISO(Independent System Operator) or TSO(Transmission System Operator) use power system analysis program to simulate contingency analysis and remedial actions to operate power system stably. Generally, power system analysis program provides automated analysis functions(or modules) to deal with wide area power system. However, because of missed contingency cases, automated contingency analysis has no practical use or has limitation. And in case of remedial action, it doesn't support automated function or takes a lot of times to study, because of simulation in manual for each cases. This paper suggests that new relation with buses and transmission line properties of power system DB used for power system analysis program to simulate automated contingency including all contingency cases needed in the field without missed cases. And it proposes automated remedial action scheme based on practical approach analysis to alleviate overloading or voltage problems. Finally it deals with automated contingency/remedial action analysis(automated scheduled outage) program which is developed by KEPCO and its performance and proposed schemes are proven by case study for real Korean power system data.

심미치과에 있어서의 Interdisciplinary approach (Interdisciplinary approach in esthetic dentistry)

  • 김일영
    • 대한심미치과학회지
    • /
    • 제9권1호
    • /
    • pp.38-41
    • /
    • 2000
  • 매일의 임상에서 흔히 접하게 되면서도 항상 갈등을 야기하는 증례들이 있다. 그러나 많은 경우에 있어서 그 어려움 들은 우리가 치과 학문의 여러 분야들을 종합적으로 활용하지 못하고 단편적으로 접근을 하기 때문에 반복적으로 경험하는 것일 수도 있다. 현대의 치의학은 어느 특정한 한 분야를 선도적으로 주도해나가는 치과의사뿐 아니라, Super GP 로서 치의학의 모든 분야를 종합적으로 활용해 나갈 줄 이는 치과의사를 요구한다. Super GP를 추구하는 많은 치과의사들이 치주, 보존, 보철 등의 여러 전문적인 분야의 Interdisciplinary Approach를 통해 훌륭한 결과를 얻어내고 있지만 교정은 그중에서도 심미치료를 지향하는 치과의사들에게는 결코 빼놓을 수 없는 분야 중 하나일 것이다. 다음의 증례들은 치주, 보존, 보철 등의 분야와 함께 교정의 도움이 없이는 결코 얻을 수 없는 심미적인 결과였기에 함께 나누고자 한다.

  • PDF

자바 객체의 스택 저장 가능성 판별을 위한 정적 분석 기법 (Escape Analysis for Stack Allocation in Java)

  • 조은선
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제31권6호
    • /
    • pp.840-848
    • /
    • 2004
  • 자바에서 사용이 끝난 객체의 수집(garbage collection)은 프로그래머의 메모리 관리 부담을 덜어준다는 장점이 있다. 그러나, 수행 속도에 영향을 미치게 되므로 정적 분석 기법을 사용하여 이를 극복하는 기법이 제안되어왔다. 이 중 하나인 스택 저장 기법은, 힙메모리 대신 메소드 스택에 저장될 수 있는 객체들을 수행 전에 분석하여 파악해두는 방식을 따른다. 본 논문에서는 메소드의 호출/반환에 대해 직접 분석하여 자신을 생성한 메소드의 반환 후에도 접근될 소지가 있는 객체들을 판별하는 정적 분석 기법을 제시한다. 이로써 객체와 변수의 지정(assignment) 관계 분석을 기준으로 하는 기존의 스택 저장 기법들에서 간과되었던 객체들 중에서도 스택에 저장할 수 있는 대상을 발견할 수 있도록 한다.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

Unified Psycholinguistic Framework: An Unobtrusive Psychological Analysis Approach Towards Insider Threat Prevention and Detection

  • Tan, Sang-Sang;Na, Jin-Cheon;Duraisamy, Santhiya
    • Journal of Information Science Theory and Practice
    • /
    • 제7권1호
    • /
    • pp.52-71
    • /
    • 2019
  • An insider threat is a threat that comes from people within the organization being attacked. It can be described as a function of the motivation, opportunity, and capability of the insider. Compared to managing the dimensions of opportunity and capability, assessing one's motivation in committing malicious acts poses more challenges to organizations because it usually involves a more obtrusive process of psychological examination. The existing body of research in psycholinguistics suggests that automated text analysis of electronic communications can be an alternative for predicting and detecting insider threat through unobtrusive behavior monitoring. However, a major challenge in employing this approach is that it is difficult to minimize the risk of missing any potential threat while maintaining an acceptable false alarm rate. To deal with the trade-off between the risk of missed catches and the false alarm rate, we propose a unified psycholinguistic framework that consolidates multiple text analyzers to carry out sentiment analysis, emotion analysis, and topic modeling on electronic communications for unobtrusive psychological assessment. The user scenarios presented in this paper demonstrated how the trade-off issue can be attenuated with different text analyzers working collaboratively to provide more comprehensive summaries of users' psychological states.