• Title/Summary/Keyword: Model-based verification

Search Result 1,515, Processing Time 0.03 seconds

Cutting Simulation of Mold & Die via Hybrid Model of DVM and Z-Map (DVM 및 Z-Map 복합모델을 이용한 금형의 모의가공)

  • 신양호;박정환;정연찬
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.5
    • /
    • pp.47-56
    • /
    • 2003
  • Geometric cutting-simulation and verification play an important role in detecting NC machining errors in mold & die manufacturing and thereby reducing correcting time & cost on the shop floor. Current researches in the area may be categorized into view-based, solid-based, and discrete vector-based methods mainly depending on workpiece models. Each methodology has its own strengths and weaknesses in terms of computing speed, representation accuracy, and its ability of numerical inspection. The paper proposes a hybrid modeling scheme for workpiece representation with z-map model and discrete vector model, which performs 3-axis and 5-axis cutting-simulation via tool swept surface construction by connecting a sequence of silhouette curves.

Establishment of AI-based composite sensor pre-verification system for energy management and composite sensor verification in water purification plant (정수장에서의 에너지 관리 및 복합센서 검증을 위한 AI 기반 복합센서 사전검증시스템 구축)

  • Kim, Kuk-Il;Sung, Min-Seok;An, Sang-Byung;Hong, Sung-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.43-46
    • /
    • 2022
  • The optimal operation of the water purification plant can be carried out only when the required flow rate is supplied in a timely manner using the minimum electrical energy by accurately predicting the pattern and amount of tap water used in the consumer. In order to ensure the stability of tap water production and supply, a system that can be pre-verified before applying AI-based composite sensors to the water purification plant was established to derive complementary matters through the pre-verification model for each composite sensor and improve the quality and operation stability of the composite sensor data.

  • PDF

Rayleigh-Ritz procedure for determination of the critical load of tapered columns

  • Marques, Liliana;Da Silva, Luis Simoes;Rebelo, Carlos
    • Steel and Composite Structures
    • /
    • v.16 no.1
    • /
    • pp.45-58
    • /
    • 2014
  • EC3 provides several methodologies for the stability verification of members and frames. However, when dealing with the verification of non-uniform members in general, with tapered cross-section, irregular distribution of restraints, non-linear axis, castellated, etc., several difficulties are noted. Because there are yet no guidelines to overcome any of these issues, safety verification is conservative. In recent research from the authors of this paper, an Ayrton-Perry based procedure was proposed for the flexural buckling verification of web-tapered columns. However, in order to apply this procedure, Linear Buckling Analysis (LBA) of the tapered column must be performed for determination of the critical load. Because tapered members should lead to efficient structural solutions, it is therefore of major importance to provide simple and accurate formula for determination of the critical axial force of tapered columns. In this paper, firstly, the fourth order differential equation for non-uniform columns is derived. For the particular case of simply supported web-tapered columns subject to in-plane buckling, the Rayleigh-Ritz method is applied. Finally, and followed by a numerical parametric study, a formula for determination of the critical axial force of simply supported linearly web-tapered columns buckling in plane is proposed leading to differences up to 8% relatively to the LBA model.

Verification and Validation of Web Applications (웹어플리케이션의 검증과 확인)

  • 권영직;나용화
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.73-82
    • /
    • 2002
  • The economic relevance of Web applications increases the importance of controlling and improving their quality. Moreover the new available technologies for the development allow the insertion of sophisticated functions, but often leave the developers responsible for the organization and evolution. As a consequence, a high demand is emerging for methodologies and tools for quality assurance of Web based systems. In this paper, a UML model of Web applications is introduced for their high level representation and concept of the verification and validation activities. In this paper proposed analysis algorithm that was based on Domestic Website and presented result through experiments.

  • PDF

Verification of Deployment Algorithms in Wireless Mobile Sensor Networks using SPIN (SPIN을 이용한 무선 이동 센서 네트워크의 배치 알고리즘 검증)

  • Oh Dong-Jin;Park Jae-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.391-398
    • /
    • 2006
  • This paper verifies deployment algorithms in wireless sensor networks using SPIN, a widely used model checking tool. In this paper, two deployment algorithms, DSSA(Distributed Self Spreading Algorithm) and TBDA(Tree Based Deployment Algorithm), are verified to check their stability against oscillation as well as energy consumption that is an important factor in wireless sensor networks.

Insights into fuel behaviour during relatively fast thermal transients based on calculations for two tests of the Halden IFA-507 experiment

  • Grigori Khvostov
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3801-3807
    • /
    • 2023
  • Outcomes of the project "Comprehensive Verification of the FALCON Code for Calculation of Nuclear Fuel Temperature" relating to calculation of fuel temperature during relatively fast thermal transients are presented. Good prediction capabilities of the FALCON MOD01 code coupled with the GRSW-A code are shown as applied to the data of the TF3 and TF5 tests from the Transient Temperature Experiment IFA-507. The IFA-507 related dataset of the OECD/NEA International Fuel Performance Experiments (IFPE) Database is extended by the reconstructed dynamics of the axial power distribution in the rods during the transient phase of the experiment. Based on the code calculation, the time constant of the thermal fuel response to a power transient is estimated.

A GUI State Comparison Technique for Effective Model-based Android GUI Testing (효과적인 모델 기반 안드로이드 GUI 테스팅을 위한 GUI 상태 비교 기법)

  • Baek, Youngmin;Hong, Gwangui;Bae, Doo-hwan
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1386-1396
    • /
    • 2015
  • Graphical user interface testing (GUI testing) techniques have been widely used to test the functionality of Android applications (apps) and to detect faults for verification of the reliability and usability of apps. To adequately test the behaviors of apps, a number of studies on model-based GUI testing techniques have been performed on Android apps. However, the effectiveness of model-based techniques greatly depends on the quality of the GUI model, because model-based GUI testing techniques generate test inputs based on this model. Therefore, in order to improve testing effectiveness in model-based techniques, accurate and efficient GUI model generation has to be achieved using an improved model generation technique with concrete definition of GUI states. For accurate and efficient generation of a GUI model and test inputs, this study suggests a hierarchical GUI state comparison technique and evaluates this technique through comparison with the existing model-based techniques, considering activities as GUI states. Our results show that the proposed technique outperforms existing approaches and has the potential to improve the performance of model-based GUI testing techniques for Android apps.

Development of a Quantitative Model on Adolescent Cyberbullying Victims in Korea: A System Dynamics Approach (시스템다이내믹스를 활용한 국내청소년 사이버불링피해 모델 개발)

  • You, Mi Jin;Ham, Eun Mi
    • Journal of Korean Academy of Nursing
    • /
    • v.49 no.4
    • /
    • pp.398-410
    • /
    • 2019
  • Purpose: This study used a system dynamics methodology to identify correlation and nonlinear feedback structures among factors affecting adolescent cyberbullying victims (CV) in Korea and to construct and verify a simulation model. Methods: Factors affecting CV were identified by reviewing a theoretical background in existing literature and referencing various statistical data. Related variables were identified through content validity verification by an expert group, after which a causal loop diagram (CLD) was constructed based on the variables. A stock-flow diagram (SFD) using Vensim Professional 7.3 was used to establish a CV model. Results: Based on the literature review and expert verification, 22 variables associated with CV were identified and the CLD was prepared. Next, a model was developed by converting the CLD to an SFD. The simulation results showed that the variables such as negative emotions, stress levels, high levels of conflict in schools, parental monitoring, and time spent using new media had the strongest effects on CV. The model's validity was verified using equation check, sensitivity analysis for timestep and simulation with 4 CV adolescent. Conclusion: The system dynamics model constructed in this study can be used to develop intervention strategies in schools that are focused on counseling that can prevent cyberbullying and assist in the victims' recovery by formulating a feedback structure and capturing the dynamic changes observed in CV. To prevent cyberbullying, it is necessary to develop more effective strategies such as prevention education, counseling and treatment that considers factors pertaining to the individual, family, school, and media.

A Study on the Rejection Capability Based on Anti-phone Modeling (반음소 모델링을 이용한 거절기능에 대한 연구)

  • 김우성;구명완
    • The Journal of the Acoustical Society of Korea
    • /
    • v.18 no.3
    • /
    • pp.3-9
    • /
    • 1999
  • This paper presents the study on the rejection capability based on anti-phone modeling for vocabulary independent speech recognition system. The rejection system detects and rejects out-of-vocabulary words which were not included in candidate words which are defined while the speech recognizer is made. The rejection system can be classified into two categories by their implementation methods, keyword spotting method and utterance verification method. The keyword spotting method uses an extra filler model as a candidate word as well as keyword models. The utterance verification method uses the anti-models for each phoneme for the calculation of confidence score after it has constructed the anti-models for all phonemes. We implemented an utterance verification algorithm which can be used for vocabulary independent speech recognizer. We also compared three kinds of means for the calculation of confidence score, and found out that the geometric mean had shown the best result. For the normalization of confidence score, usually Sigmoid function is used. On using it, we compared the effect of the weight constant for Sigmoid function and determined the optimal value. And we compared the effects of the size of cohort set, the results showed that the larger set gave the better results. And finally we found out optimal confidence score threshold value. In case of using the threshold value, the overall recognition rate including rejection errors was about 76%. This results are going to be adapted for stock information system based on speech recognizer which is currently provided as an experimental service by Korea Telecom.

  • PDF