• Title/Summary/Keyword: Model Verification System

Search Result 1,238, Processing Time 0.025 seconds

Multidimensional Hydrodynamic and Water Temperature Modeling of Han River System (한강 수계에서의 다차원 시변화 수리.수온 모델 연구)

  • Kim, Eun-Jung;Park, Seok-Soon
    • Journal of Korean Society on Water Environment
    • /
    • v.28 no.6
    • /
    • pp.866-881
    • /
    • 2012
  • Han River is a complex water system consisting of many lakes. The water quality of Lake Paldang is significantly affected by incoming flows, which are the South and North branches of the Han River, and the Kyungan Stream. In order to manage the water quality of the Lake Paldang, we should consider the entire water body where the incoming flows are included. The objectives of this study are to develop an integrated river and lake modeling system for Han River system using a multidimensional dynamic model and evaluate the model's performance against field measurement data. The integrated model was calibrated and verified using field measurement data obtained in 2007 and 2008. The model showed satisfactory performance in predicting temporal variations of water level, flow rate and temperature. The Root Mean Square Error (RMSE) for water temperature simulation were $0.88{\sim}2.13^{\circ}C$ (calibration period) and $1.05{\sim}2.00^{\circ}C$ (verification period) respectively. And Nash-Sutcliffe Efficiency (NSE) for water temperature simulation were 1089~0.98 (calibration period) and 0.90~0.98 (verification period). Utilizing the validated model, we analyzed the spatial and temporal distributions of temperature within Han River system. The variations of temperature along the river reaches and vertical thermal profiles for each lakes were effectively simulated with developed model. The suggested modeling system can be effectively used for integrated water quality management of water system consisting of many rivers and lakes.

A Study on the relation of Vulnerability, FTA Barrier, Origin Verification and Origin Performance in Rules of Origin (원산지제도의 취약성, FTA 장벽 및 원산지검증 수준과 원산지성과에 대한 연구)

  • Kim, Chang-Bong;Hyun, Hwa-Jung
    • International Commerce and Information Review
    • /
    • v.16 no.5
    • /
    • pp.295-315
    • /
    • 2014
  • This paper attempts to reveal the relationships between vulnerability, FTA barrier, verification factors and origin performance. According to precedent studies, Our study analysed 104 cases from Korean companies which adopted a rules of origin and then developed a structural equation model. As a result of the model test, this empirical study found that vulnerability have a negatively significant influence on origin verification. Second, there was a positive relationship among origin verification and origin performance. Through the results of this study are the first company in order to enhance competitiveness, improve understanding of the rules of origin, must go to deal jointly with partner companies. Second, to establish a process for the origin of the goods to prove this systematic and should be managed in an orderly fashion. Country of origin verification system of corporate -level internal factors and external factors, separated by a study to assess the level of the enterprise for internal and external is determined that you need.

  • PDF

Chip Load Control Using a NC Verification Model Based on Z-Map (Z-map 기반 가공 검증모델을 이용한 칩부하 제어기)

  • Baek Dae Kyun;Ko Tae Jo;Park Jung Whan;Kim Hee Sool
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.4
    • /
    • pp.68-75
    • /
    • 2005
  • This paper presents a new method for the optimization of feed rate in sculptured surface machining. A NC verification model based on Z-map was utilized to obtain chip load according to feed per tooth. This optimization method can regenerate a new NC program with respect to the commanded cutting conditions and the NC program that was generated from CAM system. The regenerated NC program has not only the same data of the ex-NC program but also the updated feed rate in every block. The new NC data can reduce the cutting time and produce precision products with almost even chip load to the feed per tooth. This method can also reduce tool chipping and make constant tool wear.

The Analysis of Flow Circulation System for HANARO Flow Simulated Test Facility (하나로 유동모의 설비의 유체순환계통 해석)

  • Park, Yong-Chul
    • 유체기계공업학회:학술대회논문집
    • /
    • 2002.12a
    • /
    • pp.419-424
    • /
    • 2002
  • The HANARO, a multi-purpose research reactor of 30 MWth open-tank-in-pool type, has been under normal operation since its initial criticality In February, 1995. Many experiments should be safely performed to activate the utilization of the HANARO. A flow simulation facility is being developed for the endurance test of reactivity control units for extended life times and the verification of structural integrity of those experimental facilities prior to loading in the HANARO. This test facility is composed of three major parts; a half-core structure assembly, flow circulation system and support system. The flow circulation system is composed of a circulation pump, a core flow pipe, a core bypass flow pipe and instruments. The system is to be filled with de-mineralized water and the flow should be met the design flow to simulate similar flow characteristics in the core channel of the half-core test facility to the HANARO. This paper, therefore, describes an analytical analysis to study the flow behavior of the system. The computational flow analysis has been performed for the verification of system pressure variation through the three-dimensional analysis program with standard k-$\epsilon$ turbulence model and for the verification of the structural piping integrity through the finite element method. The results of the analysis are satisfied the design requirements and structural piping integrity of flow circulation system.

  • PDF

The Analysis for Flow Circulation System in HANARO Flow Simulation Facility (하나로 유동 모의 설비의 유체순환계통 해석)

  • Park, Yong-Chul
    • The KSFM Journal of Fluid Machinery
    • /
    • v.7 no.1 s.22
    • /
    • pp.30-35
    • /
    • 2004
  • The HANARO, a multi-purpose research reactor of 30 MWth open-tank-in-pool type, has been under normal operation since its initial criticality in February, 1995. Many experiments should be safely performed to activate the utilization of the HANARO. HANARO flow simulation facility is being developed for the endurance test of reactivity control units for extended life time and the verification of structural integrity of those experimental equipments prior to loading in the HANARO. This facility is composed of three major parts; a half-core structure assembly, a flow circulation system and a support system. The flow circulation system is composed of a circulation pump, a core flow piping, a core bypass flow piping and instruments. The system is to be filled with de-mineralized water and the flow should be met the design requirements to simulate a similar flow characteristics in the core channel of the half-core structure assembly to the HANARO. This paper, therefore, presents an analytical analysis to study the flow behavior of the system. Computational flow analysis has been performed for the verification of system pressure variation through the three-dimensional analysis program with the standard $k-{\epsilon}$ turbulence model and for the verification of the structural piping integrity through the finite element method. According to the analysis results, it could be said that the design requirements and the structural piping integrity of the flow circulation system are satisfied.

A Rule-Based Database Verification System Based on the Integrity Constranints (무결성 제약에 기초한 규칙 기반 데이타베이스 검증 시스템)

  • Ryu, Myeong-Chun;Park, Chang-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.77-86
    • /
    • 1996
  • In managing a certain database, the integrity of data is very important. The important. The integrity constrains thus should be considered carefully when a database is designed and, after the database is created, it is required for a database manager to check continuously if some data contained in the database violate the integrity constraints considered. It is however not easy to check the violateion of integrity constraints when the size and the complexity of database are increased. This paper suggests a rule-based database verification system to relax the difficulty of checking the integrity violation, in which a database is coupled with a rule-based system including the knowledge about the integrity constraints. The rule-database verification system suggested accepts the model descriptions of an application domain, generates the knowledge base consisting of rules and facts by analyzing the model description and proceeds the verification process to check the integrity of the database.

  • PDF

Open BIM-based Vertical Circulation Planning and Verifying Modules for Super-Tall Building at the Schematic Design Phase (계획설계 단계에서의 개방형 BIM 기반 초고층건축물 수직동선 계획 및 검증모듈 개발)

  • Kim, In-Han;Cho, Geun-Ha;Choi, Jung-Sik;Chun, Eui-Young
    • Korean Journal of Computational Design and Engineering
    • /
    • v.16 no.2
    • /
    • pp.156-164
    • /
    • 2011
  • The automation technology is able to enhance the business process more rapidly and effective. Open BIM technology which supports automation technology of building overcomes the limitations of two dimensions drawings system. The purpose of this study is on the development of open BIM based modules for creating and verifying the core model for super-tall building in the schematic design phase. The module is expected to create cases of core models automatically and it is expected to verify the requirement of building model. This module is anticipated to utilize for creating the core model rapidly in order to create the alternative plan and to make the model accurate by its verification.

A Study on Out-of-Vocabulary Rejection Algorithms using Variable Confidence Thresholds (가변 신뢰도 문턱치를 사용한 미등록어 거절 알고리즘에 대한 연구)

  • Bhang, Ki-Duck;Kang, Chul-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1471-1479
    • /
    • 2008
  • In this paper, we propose a technique to improve Out-Of-Vocabulary(OOV) rejection algorithms in variable vocabulary recognition system which is much used in ASR(Automatic Speech Recognition). The rejection system can be classified into two categories by their implementation method, keyword spotting method and utterance verification method. The utterance verification method uses the likelihood ratio of each phoneme Viterbi score relative to anti-phoneme score for deciding OOV. In this paper, we add speaker verification system before utterance verification and calculate an speaker verification probability. The obtained speaker verification probability is applied for determining the proposed variable-confidence threshold. Using the proposed method, we achieve the significant performance improvement; CA(Correctly Accepted for keyword) 94.23%, CR(Correctly Rejected for out-of-vocabulary) 95.11% in office environment, and CA 91.14%, CR 92.74% in noisy environment.

  • PDF

The Parameter Estimation of DC-DC Converter by System Identification Method (시스템 식별 기법을 이용한 DC-DC 컨버터 파라메터 추정)

  • Jeon, Jin-Hong;Kim, Tae-Jin;Kim, Kwang-Su;Kim, Kwang-Hwa
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.503-506
    • /
    • 2003
  • In this paper, we present the results of parameter estimation for do-dc converter model by system identification. The parameter estimation for dc-dc converter aims at the diagnosis of its operating status. we applied the system identification method for parameter estimation. For verification of estimated parameter, we compare bode plot of estimated system transfer function and measurement results of HP4194 instrument.

  • PDF

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.