• Title/Summary/Keyword: Verification Software

Search Result 952, Processing Time 0.028 seconds

Evaluation of Meymeh Aquifer vulnerability to nitrate pollution by GIS and statistical methods

  • Tabatabaei, Javad;Gorji, Leila
    • Membrane and Water Treatment
    • /
    • v.10 no.4
    • /
    • pp.313-320
    • /
    • 2019
  • Increasing the concentration of nitrate ions in the soil solution and then leaching it to underground aquifers increases the concentration of nitrate in the water, and can cause many health and ecological problems. This study was conducted to evaluate the vulnerability of Meymeh aquifer to nitrate pollution. In this research, sampling of 10 wells was performed according to standard sampling principles and analyzed in the laboratory by spectrophotometric method, then; the nitrate concentration zonation map was drawn by using intermediate models. In the drastic model, the effective parameters for assessing the vulnerability of groundwater aquifers, including the depth of ground water, pure feeding, aquifer environment, soil type, topography slope, non-saturated area and hydraulic conductivity. Which were prepared in the form of seven layers in the ARC GIS software, and by weighting and ranking and integrating these seven layers, the final map of groundwater vulnerability to contamination was prepared. Drastic index estimated for the region between 75-128. For verification of the model, nitrate concentration data in groundwater of the region were used, which showed a relative correlation between the concentration of nitrate and the prepared version of the model. A combination of two vulnerability map and nitrate concentration zonation was provided a qualitative aquifer classification map. According to this map, most of the study areas are within safe and low risk, and only a small portion of the Meymeh Aquifer, which has a nitrate concentration of more than 50 mg / L in groundwater, is classified in a hazardous area.

A System Level Design of Heterogeneous Multiplication Server Farms (이종 곱셈 연산기 서버 팜의 시스템 레벨 설계)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.768-770
    • /
    • 2014
  • Due to increasing demand of new technology, the complexity of hardware and software consisting embedded systems is rapidly growing. Consequently, it is getting hard to design complex devices only with traditional methodology. In this contribution, I introduce a new approach of designing complex hardware with SystemVerilog. I adopted the idea of object oriented implementation of the SystemVerilog to the design of multiplication server farms. I successfully implemented the whole system including the test bench in one integrated environment, otherwise in the traditional way it would have cost Verilog simulation and C/SystemC verification which means much more time and effort.

  • PDF

A Systems Engineering Approach for Uncertainty Analysis of a Station Blackout Scenario

  • de Sousa, J. Ricardo Tavares;Diab, Aya
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.1
    • /
    • pp.51-59
    • /
    • 2019
  • After Fukushima Dai-ichi NPP accident, the need for implementation of diverse and flexible coping strategies (FLEX) became evident. However, to ensure the effectiveness of the safety strategy, it is essential to quantify the uncertainties associated with the station blackout (SBO) scenario as well as the operator actions. In this paper, a systems engineering approach for uncertainty analysis (UA) of a SBO scenario in advanced pressurized water reactor is performed. MARS-KS is used as a best estimate thermal-hydraulic code and is loosely-coupled with Dakota software which is employed to develop the uncertainty quantification framework. Furthermore, the systems engineering approach is adopted to identify the requirements, functions and physical architecture, and to develop the verification and validation plan. For the preliminary analysis, 13 uncertainty parameters are propagated through the model to evaluate the stability and convergence of the framework. The developed framework will ultimately be used to quantify the aleatory and epistemic uncertainties associated with an extended SBO accident scenario and assess the coping capability of APR1400 and the effectiveness of the implemented FLEX strategies.

Accuracy of digital and conventional dental implant impressions for fixed partial dentures: A comparative clinical study

  • Gedrimiene, Agne;Adaskevicius, Rimas;Rutkunas, Vygandas
    • The Journal of Advanced Prosthodontics
    • /
    • v.11 no.5
    • /
    • pp.271-279
    • /
    • 2019
  • PURPOSE. The newest technologies for digital implant impression (DII) taking are developing rapidly and showing acceptable clinical results. However, scientific literature is lacking data from clinical studies about the accuracy of DII. The aim of this study was to compare digital and conventional dental implant impressions (CII) in a clinical environment. MATERIALS AND METHODS. Twenty-four fixed zirconia restorations supported by 2 implants were fabricated using conventional open-tray impression technique with splinted transfers (CII group) and scan with Trios 3 IOS (3Shape) (DII group). After multiple verification procedures, master models were scanned using laboratory scanner D800 (3Shape). 3D models from conventional and digital workflow were imported to reverse engineering software and superimposed with high resolution 3D CAD models of scan bodies. Distance between center points, angulation, rotation, vertical shift, and surface mismatch of the scan bodies were measured and compared between conventional and digital impressions. RESULTS. Statistically significant differences were found for: a) inter-implant distance, b) rotation, c) vertical shift, and d) surface mismatch differences, comparing DII and CII groups for mesial and distal implant scan bodies ($P{\leq}.05$). CONCLUSION. Recorded linear differences between digital and conventional impressions were of limited clinical significance with two implant-supported restorations.

Study on bidirectional fluid-solid coupling characteristics of reactor coolant pump under steady-state condition

  • Wang, Xiuli;Lu, Yonggang;Zhu, Rongsheng;Fu, Qiang;Yu, Haoqian;Chen, Yiming
    • Nuclear Engineering and Technology
    • /
    • v.51 no.7
    • /
    • pp.1842-1852
    • /
    • 2019
  • The AP1000 reactor coolant pump is a vertical shielded-mixed flow pump, is the most important coolant power supply and energy exchange equipment in nuclear reactor primary circuit system, whose steadystate and transient performance affect the safety of the whole nuclear island. Moreover, safety demonstration of reactor coolant pump is the most important step to judge whether it can be practiced, among which software simulation is the first step of theoretical verification. This paper mainly introduces the fluid-solid coupling simulation method applied to reactor coolant pump, studying the feasibility of simulation results based on workbench fluid-solid coupling technology. The study found that: for the unsteady calculations of the pure liquid media, the average head of the reactor coolant pump with bidirectional fluid-solid coupling decreases to a certain extent. And the coupling result is closer to the real experimental value. The large stress and deformation of rotor under different flow conditions are mainly distributed on impeller and idler, and the stress concentration mainly occurs at the junction of front cover plate and blade outlet. Among the factors that affect the dynamic stress change of rotor, the pressure load takes a dominant position.

Evaluation of availability of nuclear power plant dynamic systems using extended dynamic reliability graph with general gates (DRGGG)

  • Lee, Eun Chan;Shin, Seung Ki;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.2
    • /
    • pp.444-452
    • /
    • 2019
  • To assess the availability of a nuclear power plant's dynamic systems, it is necessary to consider the impact of dynamic interactions, such as components, software, and operating processes. However, there is currently no simple, easy-to-use tool for assessing the availability of these dynamic systems. The existing method, such as Markov chains, derives an accurate solution but has difficulty in modeling the system. When using conventional fault trees, the reliability of a system with dynamic characteristics cannot be evaluated accurately because the fault trees consider reliability of a specific operating configuration of the system. The dynamic reliability graph with general gates (DRGGG) allows an intuitive modeling similar to the actual system configuration, which can reduce the human errors that can occur during modeling of the target system. However, because the current DRGGG is able to evaluate the dynamic system in terms of only reliability without repair, a new evaluation method that can calculate the availability of the dynamic system with repair is proposed through this study. The proposed method extends the DRGGG by adding the repair condition to the dynamic gates. As a result of comparing the proposed method with Markov chains regarding a simple verification model, it is confirmed that the quantified value converges to the solution.

An Efficient Energy Charging Scheme for Wireless Sensor Networks Using a Mobile Sink Capable of Wireless Power Transmission

  • Park, Kyoung nam;Yoon, Ikjune
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.1-9
    • /
    • 2019
  • In this paper, we propose the algorithms which determine 1) the efficient anchor-node visiting route of mobile sink in terms of energy supply and 2) the efficient energy amount to be charged to each anchor node, by using the information of each anchor node and the mobile sink. Wireless sensor networks (WSNs) using mobile sinks can be deployed in more challenging environments such as those that are isolated or dangerous, and can also achieve a balanced energy consumption among sensors which leads to prolong the network lifetime. Most mobile sinks visit only some anchor nodes which store the data collected by the nearby sensor nodes because of their limited energy. The problem of these schemes is that the lifetime of the anchor nodes can be shorten due to the increased energy consumption, which rapidly reduces the overall lifetime of WSN. This study utilizes a mobile sink capable of wireless power transmission to solve this problem, so a mobile sink can gather data from anchor nodes while charging energy to them. Through the performance verification, it is confirmed that the number of blackout nodes and the amount of collected data are greatly improved regardless of the size of the network.

An advanced technique to predict time-dependent corrosion damage of onshore, offshore, nearshore and ship structures: Part I = generalisation

  • Kim, Do Kyun;Wong, Eileen Wee Chin;Cho, Nak-Kyun
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.657-666
    • /
    • 2020
  • A reliable and cost-effective technique for the development of corrosion damage model is introduced to predict nonlinear time-dependent corrosion wastage of steel structures. A detailed explanation on how to propose a generalised mathematical formulation of the corrosion model is investigated in this paper (Part I), and verification and application of the developed method are covered in the following paper (Part II) by adopting corrosion data of a ship's ballast tank structure. In this study, probabilistic approaches including statistical analysis were applied to select the best fit probability density function (PDF) for the measured corrosion data. The sub-parameters of selected PDF, e.g., the largest extreme value distribution consisting of scale, and shape parameters, can be formulated as a function of time using curve fitting method. The proposed technique to formulate the refined time-dependent corrosion wastage model (TDCWM) will be useful for engineers as it provides an easy and accurate prediction of the 1) starting time of corrosion, 2) remaining life of the structure, and 3) nonlinear corrosion damage amount over time. In addition, the obtained outcome can be utilised for the development of simplified engineering software shown in Appendix B.

Numerical study on the deflections of steel-concrete composite beams with partial interaction

  • Mirambell, Enrique;Bonilla, Jorge;Bezerra, Luciano M.;Clero, Beatriz
    • Steel and Composite Structures
    • /
    • v.38 no.1
    • /
    • pp.67-78
    • /
    • 2021
  • The use of composite beams with partial interaction, with less shear connectors than those required for full interaction, may be advantageous in many situations. However, these beams tend to show higher deflections compared to beams with full interaction, and codified expressions for the calculation of such deflections are not fully developed and validated. Thus, this paper presents a comprehensive numerical study on the deflections of steel-concrete composite beams with partial interaction. Efficient numerical models of full-scale composite beams considering material nonlinearities and contact between their parts have been developed by means of the advanced software ABAQUS, including a damage model to simulate the concrete slab. The FE models were validated against experimental results, and subsequently parametric studies were developed to investigate the influence of the shear connection degree and the coefficient of friction in the deflection of composite beams. The comparison of predicted deflections using reference codes (AISC, Eurocode-4 and AS-2327.1) against numerical results showed that there are still inaccuracies in the estimation of deflections for the verification of the serviceability limit state, according to some of the analyzed codes.

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.