• Title/Summary/Keyword: Operation Scenario

Search Result 450, Processing Time 0.023 seconds

A Research on Expandability of Cultural Assets Restoration Blend using Virtual Reality (가상현실을 통한 문화재복원 융합 확장성 연구)

  • Oh, Seung-Hwan
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.465-472
    • /
    • 2015
  • The virtual reality technology is currently used classifying functional types such as the observation operation type, the experimental activity type, the learning information type, the field problem-solving type, and other different types, based on the media's characteristics implementing 3D form of multi-sensory information. Using Virtual Reality, the restoration of the 'Doksu Palace' has been grafted onto J. Keller's ARCS model, suggesting a field restoration concept that reenacts the lives of the people that had been in the field with the cultural heritage and history based on a scenario based scene direction. This paper also summarizes 3 different types of implementation of the field restoration assorting multi-scene direction. Certain limitations exist, due to the fact that a completed prototype hasn't been suggested and that a detailed notion of the housing and 3D audio connection has been omitted.

Analysis of Hydraulic Characteristics of Yeongsan River and Estuary Using EFDC Model (EFDC-NIER 모델을 이용한 영산강 하구 물흐름 특성 분석)

  • Shin, Chang Min;Kim, Darae;Song, Yongsik
    • Journal of Korean Society on Water Environment
    • /
    • v.35 no.6
    • /
    • pp.580-588
    • /
    • 2019
  • The flow of the middle and downstream of the Yeongsan River is stagnant by two weirs of Seungchon and Juksan and the estuary dam and maintained in freshwater. In this study, the Environmental Fluid Dynamics Code-National Institute of Environment Research(EFDC-NIER) model was applied to the Yeongsan River to simulate water flow, temperature, and salinity stratification. The EFDC-NIER model is an improved model which can simulate multi-functional weirs operation, multiple algal species, and the vertical movement mechanism of algal based on the EFDC model. The simulation results for the water level, water temperature, velocity, and salinity reproduced the observed values well. The mean absolute error(MAE) of the model calibration in the annual variations of the water level was 0.1-0.3 m, water temperature was 0.8-1.7 ℃, velocity was 4.5-7.1 cm/sec, and salinity was 1.5 psu, respectively. In the case of scenario simulation for the full opening of the estuary dam, the water level of the estuary dam was directly impacted by the tide so it was predicted to rise - 1.35 m to 0.2 m on average sea level. The velocity was also predicted to increase from 2.7 cm/sec to 50.8 cm/sec, and the flow rate to increase from 53 ㎥/sec to 5,322 ㎥/sec.

Model-Prediction-based Collision-Avoidance Algorithm for Excavators Using the RLS Estimation of Rotational Inertia (회전관성의 순환최소자승 추정을 이용한 모델 예견 기반 굴삭기의 충돌회피 알고리즘 개발)

  • Oh, Kwang Seok;Seo, Jaho;Lee, Geun Ho
    • Journal of Drive and Control
    • /
    • v.13 no.4
    • /
    • pp.59-67
    • /
    • 2016
  • This paper proposes a model-prediction-based collision-avoidance algorithm for excavators for which the recursive-least-squares (RLS) estimation of the excavator's rotational inertia is used. To estimate the rotational inertia of the excavator, the RLS estimation with multiple forgetting and two updating rules for the nominal parameter and the forgetting factors was conducted based on the excavator-swing dynamics. The average value of the estimated rotational inertia that is for the minimizing effects of the estimation error was computed using the recursive-average method with forgetting. Based on the swing dynamics, the computed average of the rotational inertia, the damping coefficient for braking, and the excavator's braking angle were predicted, and the predicted braking angle was compared with the detected-object angle for a safety evaluation. The safety level defined in this study consists of the three levels safe, warning, and emergency braking. The analytical rotational-inertia-based performance evaluation of the designed estimation algorithm was conducted using a typical working scenario. The results of the safety evaluation show that the predictive safety-evaluation algorithm of the proposed model can evaluate the safety level of the excavator during its operation.

Laser-Scanner-based Stochastic and Predictive Working-Risk-Assessment Algorithm for Excavators (굴삭기를 위한 레이저 스캐너 기반 확률 및 예견 작업 위험도 평가 알고리즘 개발)

  • Oh, Kwang Seok;Park, Sung Youl;Seo, Ja Ho;Lee, Geun Ho;Yi, Kyong Su
    • Journal of Drive and Control
    • /
    • v.13 no.4
    • /
    • pp.14-22
    • /
    • 2016
  • This paper presents a stochastic and predictive working-risk-assessment algorithm for excavators based on a one-layer laser scanner. The one-layer laser scanner is employed to detect objects and to estimate an object's dynamic behaviors such as the position, velocity, heading angle, and heading rate. To estimate the state variables, extended and linear Kalman filters are applied in consideration of laser-scanner information as the measurements. The excavator's working area is derived based on a kinematic analysis of the excavator's working parts. With the estimated dynamic behaviors and the kinematic analysis of the excavator's working parts, an object's behavior and the excavator's working area such as the maximum, actual, and predicted areas are computed for a working risk assessment. The four working-risk levels are defined using the predicted behavior and the working area, and the intersection-area-based quantitative-risk level has been computed. An actual test-data-based performance evaluation of the designed stochastic and predictive risk-assessment algorithm is conducted using a typical working scenario. The results show that the algorithm can evaluate the working-risk levels of the excavator during its operation.

Knowledge Sharing in the New World of Work : Effects of the New Way of Working

  • de Kok, Arjan;Esten, Roel;Helms, Remko W.
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.315-335
    • /
    • 2015
  • The New Way of Working (NWOW) is changing the world in which we work today. The principles of NWOW are based on freedom of time and place to work, and steering on output (results) instead of input (presence). As NWOW is a relatively new phenomenon, research on the effect of NWOW on knowledge sharing in organizations is scarce. In this research two multiple-case studies were performed to investigate the effect of the New Way of Working on knowledge. In the first study (A) different knowledge sharing scenarios were used at organizations that were in the process of implementing NWOW. This provided the opportunity to compare the sharing of knowledge between 'NWOW workers' and employees that still worked in the traditional way (non-NWOW workers). In total 216 scenario results were evaluated to determine differences in channel choice between the traditional and new work environment. For the second study (B) a Knowledge Sharing Framework was developed, based on the theories of Nonaka and Alavi & Leidner. This framework was used to determine the type of knowledge shared, e.g. tacit or explicit knowledge, in 84 situations. Additionally, to measure the level of NWOW adoption, a NWOW Analysis Monitor was used. The results show that NWOW workers use more different communication channels than traditional workers. When knowledge workers become more mobile, they will exchange knowledge less explicit (codified) and more tacit (personalized), use less face-to-face communication, but more video calls and e-mail. The adoption of the principles of NWOW seems to have a balancing effect on the knowledge that is shared in a tacit and explicit way, which in the view of Scheepers et al. is an effective knowledge sharing strategy. The research results show organizations need to realize that the New World of Working is affecting the way knowledge is shared. Missing out on this development may result in the loss of important knowledge and impact the operation of organizations.

Inter-space Interaction Issues Impacting Middleware Architecture of Ubiquitous Pervasive Computing

  • Lim, Shin-Young;Helal, Sumi
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.1
    • /
    • pp.42-51
    • /
    • 2008
  • We believe that smart spaces, offering pervasive services, will proliferate. However, at present, those islands of smart spaces should be joined seamlessly with each other. As users move about, they will have to roam from one autonomous smart space to another. When they move into the new island of smart space, they should setup their devices and service manually or not have access to the services available in their home spaces. Sometimes, there will conflicts between users when they try to occupy the same space or use a specific device at the same time. It will also be critical to elder people who suffer from Alzheimer or other cognitive impairments when they travel from their smart space to other visited spaces (e.g., grocery stores, museums). Furthermore our experience in building the Gator Tech Smart House reveals to us that home residents generally do not want to lose or be denied all the features or services they have come to expect simply because they move to a new smart space. The seamless inter-space interaction requirements and issues are raised automatically when the ubiquitous pervasive computing system tries to establish the user's service environment by allocating relevant resources after the user moves to a new location where there are no prior settings for the new environment. In this paper, we raise and present several critical inter-space interactions issues impacting middleware architecture design of ubiquitous pervasive computing. We propose requirements for resolving these issues on seamless inter-space operation. We also illustrate our approach and ideas via a service scenario moving around two smart spaces.

A Sensitivity Study of a Steam Generator Tube Rupture for the SMART-P (SMART 연구로의 증기발생기 전열관 파열사고 민감도 분석)

  • Kim Hee-Kyung;Chung Young-Jong;Yang Soo-Hyung;Kim Hee-Cheol;Zee Sung Quun
    • Journal of the Korean Society of Safety
    • /
    • v.20 no.2 s.70
    • /
    • pp.32-37
    • /
    • 2005
  • The purpose of this study is for the sensitivity study f9r a Steam Generator Tube Rupture (SGTR) of the System-integrated Modular Advanced ReacTor for a Pilot (SMART-P) plant. The thermal hydraulic analysis of a SGIR for the Limiting Conditions for Operation (LCO) is performed using TASS/SMR code. The TASS/SMR code can calculate the core power, pressure, flow, temperature and other values of the primary and secondary system for the various initiating conditions. The major concern of this sensitivity study is not the minimum Critical Heat Flux Ratio(CHFR) but the maximum leakage amount from the primary to secondary sides at the steam generator. Therefore the break area causing the maximum accumulated break flow is researched for this reason. In the case of a SGIR for the SMART-p, the total integrated break flow is 11,740kg in the worst case scenario, the minimum CHFR is maintained at Over 1.3 and the hottest fuel rod temperature is below 606"I during the transient. It means that the integrity of the fuel rod is guaranteed. The reactor coolant system and the secondary system pressures are maintained below 18.7MPa, which is system design pressure.

Driving Performance Evaluation Using Foot Operated Steering System in the Virtual Driving Simulator (가상 운전 시뮬레이터를 이용한 족동 조향 시스템의 운전 성능 평가)

  • Song, Jeongheon;Kim, Yongchul
    • Journal of Biomedical Engineering Research
    • /
    • v.38 no.4
    • /
    • pp.197-204
    • /
    • 2017
  • The aim of this study was to evaluate driving performance of normal subjects for controlling the steering wheel by using foot operated steering devices in the driving simulator. Many people with complete bilateral loss or loss of use of upper limbs but with normal lower limbs are frequently left without use and/ or control of their hands, arms, or the upper extremities of their bodies. As a result, persons disabled in this manner have problems in operation an automobile because they cannot grasp and manipulate a conventional steering wheel. Therefore, if foot operated steering devices are used for controlling the vehicle on in people with disabilities, the disabled people could improve their community mobility by driving a car safely. Ten normal subjects were involved in this research to evaluate steering performance by using three types of steering devices(conventional steering wheel, pedal type foot steering, circular type foot steering) in driving simulator. STISim Drive 3 program was used for testing the driving performance in two road scenarios: straight road and curved road at low and high speed of vehicle (40 km/h and 80 km/h). This study used two-way ANOVA to compare the influences of two factors(type of foot steering device and road scenario) in the three dependent variables of steering performance(standard deviation of lateral position, the lateral position of vehicle and the number of line crossing). The average values of the three dependent variables(standard deviation of lateral position, lateral position and the number of line crossing) of driving performance were significantly smaller for conventional steering wheel or pedal type foot steering than circular type foot steering.

Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems

  • Idriss, Rim;Loukil, Adlen;Khalgui, Mohamed;Li, Zhiwu;Al-Ahmari, Abdulrahman
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.5
    • /
    • pp.2051-2066
    • /
    • 2017
  • This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.

A Study on Integrated Fire Protection System for high-rise Building (초고층빌딩 통합 화재방재시스템 설계 및 구현에 관한 연구)

  • Lee, Jeong-Bae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.2
    • /
    • pp.39-47
    • /
    • 2020
  • The fire protection system for high-rise buildings is currently confined to the preparation of sprinklers, emergency stairs, and exit and monitoring systems. On the other hand, an integrated system, including the model with scenario-based actions, is required for effective fire protection. An integrated fire protection system is needed to operate and manage the total cycle of the fire protection. In this study, an integrated fire protection system, which included sensing and consequent processes related to fire emergencies, was designed and implemented. The designed scheme can gather and analyze the data of the production, operation, and consumption patterns as it integrates fire protection systems for fire fighters and evacuating people. The integrated fire protection technology and system, which has target performance with satisfied 1/2 sec transaction response time and 1.2 transactions per second, is expected to contribute to market creation in converged technology-based fire protection fields.