• Title/Summary/Keyword: Repository Concept

Search Result 93, Processing Time 0.033 seconds

Analyses of the Double-Layered Repository Concepts for Spent Nuclear Fuels (사용후핵연료 심지층 처분장 복층개념 분석)

  • Lee, Jongyoul;Kim, Hyeona;Lee, Minsoo;Choi, Heui-Joo;Kim, Kyungsu
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.15 no.2
    • /
    • pp.151-159
    • /
    • 2017
  • A deep geological disposal at a depth of 500 m in stable host rock is considered to be the safest method with current technologies for disposal of spent fuels classified as high-level radioactive waste. The most important requirement is that the temperature of the bentonite buffer, which is a component of the engineered barrier, should not exceed $100^{\circ}C$. In Korea, the amount of spent fuel generated by nuclear power generation, which accounts for about 30% of the total electricity, is continuously increasing and accumulating. Accordingly, the area required to dispose of it is also increasing. In this study, various duplex disposal concepts were derived for the purpose of improving the disposal efficiency by reducing the disposal area. Based on these concepts, thermal analyses were carried out to confirm whether the critical disposal system requirements were met, and the thermal stability of the disposal system was evaluated by analyzing the results. The results showed that upward 75 m or downward 75 m apart from the reference disposal system location of 500 m depth would qualify for the double layered disposal concept. The results of this study can be applied to the establishment of spent fuel management policy and the design of practical commercial disposal system. Detailed analyses with data of a real disposal site are necessary.

Design of Two-Step Open System for Personalized Health Data Access (개인화된 건강 데이터 처리를 위한 2-Step 개방형 시스템의 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.177-183
    • /
    • 2015
  • The purpose of ICT Healing platform is the prevention of chronic disease. It is intended to early warning of the disease through the information such as the bio-signals and lifestyle. In this paper, we provide a 2-Step open system(TOS) for personalized health data access. TOS is connected between the personal health related data providers and service providers of individuals ICT Healing platform, a software engine for relaying personalized health data. The proposed system, to operate in isolation to 2 step in personal health document repository Inbound module and Outbound module to provide an inquiry service to external organizations. Therefore, we propose a personalized editable Manifest concept for defining data exchange between Step. This can be used as a reference model to collect the personal health information is scattered in many health related service institutions (Hospitals, Fitness Centers, Health Examination Centers, Personal Health Device, etc.) and under private-led liberalization.

A Framework for the IFC Interoperability Test Method to Support BIM (BIM 지원을 위한 IFC모델 호환성 검사 방법에 관한 기초 연구)

  • Kang, Hoon-Sig;Lee, Ghang;Shin, Yun-Ah
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.674-677
    • /
    • 2008
  • The Architecture, engineering, & construction (AEC) industry domains have grown more complex and larger, BIM is a digital representation of a building to facilitate the exchange and development of construction information integration and interoperability. Industry Foundation Classes (IFCs), under development by International Alliance for Interoperability (IAI), represent the part of buildings or elements of a process. IFC has been adopted as a central information repository in order to deliver integrated building information. Other BIM software could open the IFC file, recognize standard objects such as walls, window, and doors as building components. The IFC standard is generally agreed to be of high quality and is widely implemented in software. However, sometimes, information distortion or information toss occurrs during information exchang. The IAI Model Support Group (IAI-MSG) offers the opportunity to certify IFC-compliant applications based on a structuralized approach. However, IFC interoperability error also have occurred by using certificated tools. As project participants exchange BIM information by using BIM software they will need a reliable and efficient exchange of information. In this paper, previous interoperability tests were analyzed, and we propose a new concept in interoperability test.

  • PDF

Hand Gesture Recognition using Multivariate Fuzzy Decision Tree and User Adaptation (다변량 퍼지 의사결정트리와 사용자 적응을 이용한 손동작 인식)

  • Jeon, Moon-Jin;Do, Jun-Hyeong;Lee, Sang-Wan;Park, Kwang-Hyun;Bien, Zeung-Nam
    • The Journal of Korea Robotics Society
    • /
    • v.3 no.2
    • /
    • pp.81-90
    • /
    • 2008
  • While increasing demand of the service for the disabled and the elderly people, assistive technologies have been developed rapidly. The natural signal of human such as voice or gesture has been applied to the system for assisting the disabled and the elderly people. As an example of such kind of human robot interface, the Soft Remote Control System has been developed by HWRS-ERC in $KAIST^[1]$. This system is a vision-based hand gesture recognition system for controlling home appliances such as television, lamp and curtain. One of the most important technologies of the system is the hand gesture recognition algorithm. The frequently occurred problems which lower the recognition rate of hand gesture are inter-person variation and intra-person variation. Intra-person variation can be handled by inducing fuzzy concept. In this paper, we propose multivariate fuzzy decision tree(MFDT) learning and classification algorithm for hand motion recognition. To recognize hand gesture of a new user, the most proper recognition model among several well trained models is selected using model selection algorithm and incrementally adapted to the user's hand gesture. For the general performance of MFDT as a classifier, we show classification rate using the benchmark data of the UCI repository. For the performance of hand gesture recognition, we tested using hand gesture data which is collected from 10 people for 15 days. The experimental results show that the classification and user adaptation performance of proposed algorithm is better than general fuzzy decision tree.

  • PDF

An original device for train bogie energy harvesting: a real application scenario

  • Amoroso, Francesco;Pecora, Rosario;Ciminello, Monica;Concilio, Antonio
    • Smart Structures and Systems
    • /
    • v.16 no.3
    • /
    • pp.383-399
    • /
    • 2015
  • Today, as railways increase their capacity and speeds, it is more important than ever to be completely aware of the state of vehicles fleet's condition to ensure the highest quality and safety standards, as well as being able to maintain the costs as low as possible. Operation of a modern, dynamic and efficient railway demands a real time, accurate and reliable evaluation of the infrastructure assets, including signal networks and diagnostic systems able to acquire functional parameters. In the conventional system, measurement data are reliably collected using coaxial wires for communication between sensors and the repository. As sensors grow in size, the cost of the monitoring system can grow. Recently, auto-powered wireless sensor has been considered as an alternative tool for economical and accurate realization of structural health monitoring system, being provided by the following essential features: on-board micro-processor, sensing capability, wireless communication, auto-powered battery, and low cost. In this work, an original harvester device is designed to supply wireless sensor system battery using train bogie energy. Piezoelectric materials have in here considered due to their established ability to directly convert applied strain energy into usable electric energy and their relatively simple modelling into an integrated system. The mechanical and electrical properties of the system are studied according to the project specifications. The numerical formulation is implemented with in-house code using commercial software tool and then experimentally validated through a proof of concept setup using an excitation signal by a real application scenario.

A Study on Data Curation of University Libraries for Improving Teaching and Learning Support (교수학습활동 지원 개선을 위한 대학도서관의 데이터 큐레이션 연구)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.1
    • /
    • pp.175-195
    • /
    • 2020
  • The purpose of this study is to propose a data curation service to support teaching and learning activities of university libraries. To this end, the concept of data curation has been summarized, and how to understand information services and teaching-learning information data curation of university libraries. As a traditional extension of library information services, the use of university library data curation services has been proposed. As a result of research, data curation suggests that it is appropriate to understand the data by focusing more on the utilization of data. The university library emphasized that the data curation service is needed through the establishment of an institutional repository of teaching-learning activity materials for the visible effects that contribute to the educational service of the parent university. Finally, the research was completed by presenting five levels of teaching and learning information data curation framework.

Genetic Design of Granular-oriented Radial Basis Function Neural Network Based on Information Proximity (정보 유사성 기반 입자화 중심 RBF NN의 진화론적 설계)

  • Park, Ho-Sung;Oh, Sung-Kwun;Kim, Hyun-Ki
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.2
    • /
    • pp.436-444
    • /
    • 2010
  • In this study, we introduce and discuss a concept of a granular-oriented radial basis function neural networks (GRBF NNs). In contrast to the typical architectures encountered in radial basis function neural networks(RBF NNs), our main objective is to develop a design strategy of GRBF NNs as follows : (a) The architecture of the network is fully reflective of the structure encountered in the training data which are granulated with the aid of clustering techniques. More specifically, the output space is granulated with use of K-Means clustering while the information granules in the multidimensional input space are formed by using a so-called context-based Fuzzy C-Means which takes into account the structure being already formed in the output space, (b) The innovative development facet of the network involves a dynamic reduction of dimensionality of the input space in which the information granules are formed in the subspace of the overall input space which is formed by selecting a suitable subset of input variables so that the this subspace retains the structure of the entire space. As this search is of combinatorial character, we use the technique of genetic optimization to determine the optimal input subspaces. A series of numeric studies exploiting some nonlinear process data and a dataset coming from the machine learning repository provide a detailed insight into the nature of the algorithm and its parameters as well as offer some comparative analysis.

Real-Time Web Middleware Framework for Supporting Electronic Commerce (전자상거래를 지원하기 위한 실시간 웹 미들웨어 프레임워크)

  • Yoon, Eun-Young;Yoon, Yong-Ik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5S
    • /
    • pp.1666-1675
    • /
    • 2000
  • This paper proposes a RTWM (Real-Time Web Middleware) framework for real-time EC(Electronic Commerce) systems. RTWM system is extended the existing COS( CORBA Object Service) model added to the event monitoring, real-time scheduler, real-time event filtering for supporting real-time concept of EC systems. Especially, this paper is concentrated on providing suitable event filtering function for EC system in order to meed various user time requirements under distributed system environment. It stores time constraint requirements an interesting event information input from users into QoS repository, then processes the data through appropriate RTFA(Real-Time Filtering Agent) module when real-time events occur. From this method, users can get the filtered event result reflected their requirements about real-time filtering. It means this system provides thigh QoS to users. In addition, it results in decreasing network traffic as unnecessary event information is filtered from network.

  • PDF

Design and Implementation of Generation System for Storing Core Components (핵심 컴포넌트 저장을 위한 시스템 설계 및 구현)

  • Hwang, Jeong-Hee;Kim, Young-Gyun;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.361-370
    • /
    • 2004
  • ebXML(Electronic Business using extensible Markup Language) is an XML based new international standard framework of the electronic business. Interoperability among mutually different industry fields can be realized by reusing core component, as a infrastructure of data. For this interoperability, it is needed to define the concrete concept of core component, through analyzing the role and applicability of the core component in business process which defines the interoperability among different companies. Therefore, in this paper, we Inquire the role of the core component in the ebXML, and implement the core component storage system which generates core component to register in registry/repository. The designed system for storing the core component generates suitable core component structure to register in registry/repositor), which can be used to generate new business information entity in a modeling step of business process.

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.