• Title/Summary/Keyword: Phase identification

Search Result 685, Processing Time 0.026 seconds

IDENTIFICATION OF TWO-DIMENSIONAL VOID PROFILE IN A LARGE SLAB GEOMETRY USING AN IMPEDANCE MEASUREMENT METHOD

  • Euh, D.J.;Kim, S.;Kim, B.D.;Park, W.M.;Kim, K.D.;Bae, J.H.;Lee, J.Y.;Yun, B.J.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.613-624
    • /
    • 2013
  • Multi-dimensional two-phase phenomena occur in many industrial applications, particularly in a nuclear reactor during steady operation or a transient period. Appropriate modeling of complicated behavior induced by a multi-dimensional flow is important for the reactor safety analysis results. SPACE, a safety analysis code for thermal hydraulic systems which is currently being developed, was designed to have the capacity of multi-dimensional two-phase thermo-dynamic phenomena induced in the various phases of a nuclear system. To validate the performance of SPACE, a two-dimensional two-phase flow test was performed with slab geometry of the test section having a scale of $1.43m{\times}1.43m{\times}0.11m$. The test section has three inlet and three outlet nozzles on the bottom and top gap walls, respectively, and two outlet nozzles installed directly on the surface of the slab. Various kinds of two-dimensional air/water flows were simulated by selecting combinations of the inlet and outlet nozzles. In this study, two-dimensional two-phase void fraction profiles were quantified by measuring the local gap impedance at 225 points. The flow conditions cover various flow regimes by controlling the flow rate at the inlet boundary. For each selected inlet and outlet nozzle combination, the water flow rate ranged from 2 to 20 kg/s, and the air flow rate ranged from 2.0 to 20 g/s, which corresponds to 0.4 to 4 m/s and 0.2 to 2.3 m/s of the superficial liquid and gas velocities based on the inlet port area, respectively.

Crystal Structure and Optical Property of Single-Phase (1210) Gallium Nitride Film ((1210) Gallium Nitride 단결정 박막의 결정구조 및 광학적 특성)

  • Hwang Jin Soo;Chong Paul Joe
    • Korean Journal of Crystallography
    • /
    • v.8 no.1
    • /
    • pp.33-37
    • /
    • 1997
  • The optical properties of (1210) GaN epitaxy films grown on the (1012) $\alpha-A1_2O_3$ substrates have been studied. The hetero-epitaxy films were grown by the halide vapor phase epitaxy (HVPE) method using $Ga/HC1/NH_3/He$ system at $990^{\circ}C$. XRD, RHEED and SEM are used for the identification of the hetero-epitaxy films structure and surface morphology. The confirmed (1210) GaN epitaxy films were characterized by PL and Raman. By the Raman scattering, the active phonon modes of single-phase GaN films are varied with the arrangement of both polarization and propagation directions of laser beam with reference to the axis in single-phase crystal films. The Y(Z, Y & Z) X geometry allows scattering pat-terns of $A_1(TO)=533\;cm^{-1},\;E_1(TO)=559\;cm^{-1}\;and\;E_2=568 cm^{-1}$ modes, whereas in the Z(Y, Y & Z) X geometry the only $E_2$ mode are observed.

  • PDF

Optical encryption and decryption technique using virtual image in frequency domain (가상 영상을 이용한 주파수 영역에서의 광학적 암호화 및 복호화 방법)

  • 서동환;조규보;박세준;김수중;김정우;노덕수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.3
    • /
    • pp.255-259
    • /
    • 2003
  • In this paper, we propose an improved image encryption and decryption method using a virtual image and a joint transform correlator (JTC). The encrypted image is obtained by the Fourier transform of the product of a virtual-phase image and a random-phase image, and a Fourier transform of the decrypting key generated by the proposed phase assignment rule is used as the Fourier decrypting key. Based on the solution, the original image is reconstructed using JTC in the frequency-domain. The proposed method using a virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting by unauthorized people. And also the auto-correlation terms, which are the drawback of a JTC system, contribute to reconstructing the original image rather than to disturbing its identification. But because phase-only encryptions are sensitive to noise and scratches, phase errors can be generated in fabricating the encrypted image or the Fourier decrypting key so the errors that are responsible for degradation of the quality of the reconstructed image are analyzed and the solution is demonstrated. Computer simulations show the solution, and the proposed method is very useful for JTC architecture.

A Theoretical Study on Acupuncture Methods(鍼法) Using Five Transport Points(五輸穴) (오수혈(五輸穴) 활용 침법(鍼法)에 관한 이론적 고찰)

  • Kye, Kangyoon;Kim, Byoungsoo
    • The Journal of Korean Medicine
    • /
    • v.42 no.1
    • /
    • pp.59-74
    • /
    • 2021
  • Objectives: This study is to analyze Acupuncture Methods(鍼法) using Five Transport Points(五輸穴) and to consider the direction of development. Methods: This study focuses on Acupuncture Methods(鍼法) using Five Transport Points(五輸穴) that Five Phase Theory(五行學說) has been applied as a compound and it is designated Five Phase-Five Transport Points-Acupuncture Method(FPT Acupuncture Method, 五行五輸穴鍼法). Principles, Acupuncture Points(經穴), standards of diagnosis and treatment subjects of FPT Acupuncture Methods used in practices of Korean Medicine (韓醫學) were analyzed through updated literature. Next, the theoretical issues of FPT Acupuncture Methods regarding the composition of selecting exclusively on Five Transport Points(五輸穴) and targeted treatment subjects were investigated. Based upon the investigation, the future direction of development was studied. Results & Conclusions: Firstly, pattern identification and treatment of FPT Acupuncture Methods targeted mostly on Viscera and Bowels(臟腑). However, some showed the tendency to Five Phases Reductionism(五行 還元主義) which attempts to apply Five Phase Theory(五行學說) to symptoms that were not related to Viscera and Bowels(臟腑). Secondly, Five Transport Points(五輸穴) are theoretically related to 'Viscera and Bowels in Concept of Visceral Manifestation(臟象臟腑)'. Thirdly, when the cause of the symptoms exceeds the main therapeutic range of FPT Acupuncture Methods, it is effective to add Acupuncture Points(經穴) excluding Five Transport Points(五輸穴). And also, it is efficient to use Acupuncture Methods(鍼法) that is not based on principles of Five Phase Theory(五行學說). For the accomplishment, further researches on the approaches to apply basic Korean Medical principles such as Three Yin and Three Yang(三陰三陽) into Acupuncture Methods(鍼法) and Acupuncture Points(經穴) are necessary.

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.

System Identification of Aerodynamic Coefficients of F-16XL (ICCAS 2004)

  • Seo, In-Yong;Pearson, Allan E.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.383-388
    • /
    • 2004
  • This paper presents the aerodynamic coefficient modeling with a new model structure explored by Least Squares using Modulating Function Technique (LS/MFT) for an F-16XL airplane using wind tunnel data supplied by NASA/LRC. A new model structure for aerodynamic coefficient was proposed, one that considered all possible combination terms of angle of attack ${\alpha}$(t) and ${\alpha}$(t) given number of harmonics K, and was compared with Pearson's model, which has the same number of parameters as the new model. Our new model harmonic results show better agreement with the physical data than Pearson's model. The number of harmonics in the model was extended to 6 and its parameters were estimated by LS/MFT. The model output of lift coefficient with K=6 correspond reasonably well with the physical data. In particular, the estimation performances of four aerodynamic coefficients were greatly improved at high frequency by considering all harmonics included in the input${\alpha}$(t), and by using the new model. In addition, the importance of each parameter in the model was analyzed by parameter reduction errors. Moreover, the estimation of three parameters, i.e., amplitude, phase and frequency, for a pure sinusoid and a finite sum of sinusoids- using LS/MFT is investigated.

  • PDF

Notes on identifying source of out-of-control signals in phase II multivariate process monitoring (다변량 공정 모니터링에서 이상신호 발생시 원인 식별에 관한 연구)

  • Lee, Sungim
    • The Korean Journal of Applied Statistics
    • /
    • v.31 no.1
    • /
    • pp.1-11
    • /
    • 2018
  • Multivariate process control has become important in various applied fields. For instance, there are many situations in which the simultaneous monitoring of multivariate quality characteristics is necessary for the manufacturing industry. Despite its importance, its practical usage is not as convenient because it is difficult to identify the source of the out-of-control signal in a multivariate control chart. In this paper, we will introduce how to detect the source of the out-of-control by using confidence intervals for new observations, and will discuss the identification and interpretation of the out-of-control variable through simulation studies.

Identification of Beauveria spp. Isolated from Mulberry Longicorn Beetle (Apriona germari Hope) using Polymerase Chain Reaction (뽕나무 하늘소(Apriona germari Hope)로부터 Beauveria속 사상균의 분리 및 PCR에 의한 동정)

  • 서종복;진병래
    • Journal of Sericultural and Entomological Science
    • /
    • v.37 no.2
    • /
    • pp.167-171
    • /
    • 1995
  • To develope a microbial pesticide for the control of mulberry longicorn beetle, Apriona germari, Beauveria spp. were isolated from the infected Apriona germari larvae. The morphology of Beauveria spp. was observed by phase contrast and scanning electron microscope. In addition, the Beauveria spp. isolated from Apriona germari were identified by the random amplification of polymorphic DNA using polymerase chain reaction. The results showed that the Beauveria spp., SFB-1A and SFB-3A, isolated from Apriona germari were identified with B. bassiana and B. brongniartii, respectively, suggesting that the random amplification of polymorphic DNA is effective for the identification of Beauveria spp.

  • PDF

Design of UHF RFID Tag Considering Chip Characteristic (칩 특성을 고려한 UHF RFID 태그 설계)

  • Lee, Hong-Joo;Hwang, Gun-Yong;Lee, Eung-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.194-200
    • /
    • 2011
  • Recently, RFID(Radio Frequency IDentification) market spread in industry region is entering a phase of stagnation due to cost issue. RFID tag inlay cost has become relatively more expensive due to the recent decrease in chip price. Therefore, a simple and rapid design technique for RFID tag has yet to be implemented to achieve low cost. This paper presents a design technique considering chip impedance for antenna design for improved accuracy and computation time. As a result, it is confirmed that analysis error for resonance ranges within 20MHz and readable range error falls within 1.5m.

Studies on the Separation of Major Bile Acids in Commercial Crude Bile Drugs (시판(市販) 담즙(膽汁) 생약(生藥)중 주요(主要) 담즙산(膽汁酸)의 분리(分離)에 관한 연구(硏究))

  • Park, Jong-Dae;Yoo, Seung-Jo
    • Korean Journal of Pharmacognosy
    • /
    • v.15 no.3
    • /
    • pp.139-146
    • /
    • 1984
  • High performance liquid chromatographic separation is described for the analysis of bile acids after hydrolysis in seven commercial crude bile drugs and ox and pig galls. They are simultaneously separated with HPLC mobile phase of acetonitrile/0.5% ammonium carbonate (pH 6.7) (25.5 : 74.5) at a flow rate $(1.0{\rightarrow}1.5ml/min.)$ and differential refractometer. The linearity of calibration curve and recovery test are good by using the method. The analysis of major bile acids in seven commercial crude bile drugs using the described method is presented. Sample no. 1 of them is similar to separation pattern of ox gall. Sample no. 6 of them is supposed to be genuine bear gall on the basis of identification of ursodeoxycholic acid. Sample $no.\;2{\sim}5$ and 7 of them are supposed to be pig gall on the basis of identification of hyodeoxycholic acid which is a characteristic component of pig gall.

  • PDF