• Title/Summary/Keyword: batch verification

Search Result 52, Processing Time 0.025 seconds

Evaluation on the Mechanical Properties of Strain Hardening Cement Composite by Mixing Method for Application at Building Construction Site (건축시공 현장적용을 위한 비빔방법에 따른 SHCC의 역학적 성능 평가)

  • Jeon, Young-Seok;Kim, Gyu-Yong;Nam, Jeong-Soo;Kim, Young-Deok;Jeong, Jae-Hong;Lee, Seung-Hoon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.11 no.6
    • /
    • pp.530-537
    • /
    • 2011
  • The purpose of this study is to examine material performance of fiber reinforced cement composite for mass production. It is necessary to manufacture SHCC(Strain Hardening Cement Composite) by batch plant for field application and mass production. For the study, a mock-up test of SHCC manufactured in the batch plant was conducted, and the performance was compared with SHCC manufactured in the laboratory. Assessment items were freshness and hardening properties. Specifically, direct tensile test machine was used for performance verification of SHCC. As a result, there was a tendency of less satisfactory fiber dispersion and performance of strain hardening compared with the performance of SHCC manufactured in the laboratory. To address this, dry mixing and mortar mixing time should be increased compared to laboratory mixing, and injection time of an agent such as a water reducing agent should be properly controlled according to mixing combination, or the capacity to secure dispersion and homogeneity of material.

Verification of Transliteration Pairs Using Distance LSTM-CNN with Layer Normalization (Distance LSTM-CNN with Layer Normalization을 이용한 음차 표기 대역 쌍 판별)

  • Lee, Changsu;Cheon, Juryong;Kim, Joogeun;Kim, Taeil;Kang, Inho
    • Annual Conference on Human and Language Technology
    • /
    • 2017.10a
    • /
    • pp.76-81
    • /
    • 2017
  • 외국어로 구성된 용어를 발음에 기반하여 자국의 언어로 표기하는 것을 음차 표기라 한다. 국가 간의 경계가 허물어짐에 따라, 외국어에 기원을 두는 용어를 설명하기 위해 뉴스 등 다양한 웹 문서에서는 동일한 발음을 가지는 외국어 표기와 한국어 표기를 혼용하여 사용하고 있다. 이에 좋은 검색 결과를 가져오기 위해서는 외국어 표기와 더불어 사람들이 많이 사용하는 다양한 음차 표기를 함께 검색에 활용하는 것이 중요하다. 음차 표기 모델과 음차 표기 대역 쌍 추출을 통해 음차 표현을 생성하는 기존 방법 대신, 본 논문에서는 신뢰할 수 있는 다양한 음차 표현을 찾기 위해 문서에서 음차 표기 후보를 찾고, 이 음차 표기 후보가 정확한 표기인지 판별하는 방식을 제안한다. 다양한 딥러닝 모델을 비교, 검토하여 최종적으로 음차 표기 대역 쌍 판별에 특화된 모델인 Distance LSTM-CNN 모델을 제안하며, 제안하는 모델의 Batch Size 영향을 줄이고 학습 시 수렴 속도 개선을 위해 Layer Normalization을 적용하는 방법을 보인다.

  • PDF

A Study on the Pseudo-exhaustive Test using a Netlist of Multi-level Combinational Logic Circuits (다층 레벨 조합논리 회로의 Net list를 이용한 Pseudo-exhaustive Test에 관한 연구)

  • 이강현;김진문;김용덕
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.5
    • /
    • pp.82-89
    • /
    • 1993
  • In this paper, we proposed the autonomous algorithm of pseudo-exhaustive testing for the multi-level combinational logic circuits. For the processing of shared-circuit that existed in each cone-circuit when it backtracked the path from PO to PI of CUT at the conventional verification testing, the dependent relation of PI-P0 is presented by a dependence matrix so it easily partitioned the sub-circuits for the pseudo-exhaustive testing. The test pattern of sub-circuit's C-inputs is generated using a binary counter and the test pattern of I-inputs is synthesized using a singular cover and consistency operation. Thus, according to the test patterns presented with the recipe cube, the number of test pattrens are reduced and it is possible to test concurrently each other subcircuits. The proposed algorithm treated CUT's net-list to the source file and was batch processed from the sub-circuit partitioning to the test pattern generation. It is shown that the range of reduced ration of generated pseudo-exhaustive test pattern exhibits from 85.4% to 95.8% when the average PI-dependency of ISACS bench mark circuits is 69.4%.

  • PDF

Development of a Flexibly-reconfigurable Roll Forming Apparatus for Curved Surface Forming (곡면성형을 위한 비정형롤판재성형 장비 개발)

  • Yoon, J.S.;Park, J.W.;Son, S.E.;Kim, H.H.;Kim, J.;Kang, B.S.
    • Transactions of Materials Processing
    • /
    • v.25 no.3
    • /
    • pp.161-168
    • /
    • 2016
  • Sheet metals are often required to be formed into three dimensional curved shapes for use as skin structures. As a result various sheet metal forming methods, such as press die forming, stretch forming, and line heating have been used over the years in industrial production lines. Although they are extensively used in industry, these methods are not suitable for small quantity batch productions. Studies have been conducted to improve or replace these methods with plausible flexible forming technologies. As a part of these studies, we developed a new and more efficient forming device named flexibly-reconfigurable roll forming (FRRF). The current study presents the process development and experimental verification for the applicability of this device. To improve the efficiency of the FRRF apparatus, several hardware components were invented and a suitable operating program was developed using MFC of visual C++. The ways to make the FRRF apparatus fully functional are also described. Sheet metal was formed into three dimensional shapes using the FRRF apparatus and the final products are presented as evidence for the applicability of the developed device.

A Study on Manufacturing Resin-based Blow Mold using SLS Parts and Forming Prototype-car Parts (SLS 조형품을 이용한 수지형 블로우 몰드 제작 및 시작차 부품성형에 관한 연구)

  • 양화준;황보중;이석희
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.7
    • /
    • pp.124-131
    • /
    • 2000
  • Rapid Prototyping(RP) models are no longer used only for design verification. Currently, parts built utilizing layer manufacturing technology can be employed as functional prototypes and as patterns or tools for different manufacturing processes such as vacuum casting, investment casting, injection molding, precise casting and sand casting. This trend of Rapid Prototyping application meets the requirement of concurrent engineering and its range covers a more spreaded area. The aim of this paper is saving the manufacturing lead time and cost of plastic parts having hollow space shapes used by prototype-car. Using rapid prototype patterns, made by the Selective Laser Sintering(SLS) technique, a new approach of manufacturing resin-based blow mold is discussed. It has a great potential fur making prototype-car parts with the batch size of under 200 parts, in case of rapid modification due to a subsequent design changes in developing stage. So, the process proposed in this research shows reduction of process time and manufacturing cost when compared with the conventional process such as a Zinc Alloy fur Stamping(ZAS) mold.

  • PDF

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data

  • Shen, Wenting;Yu, Jia;Yang, Guangyang;Zhang, Yue;Fu, Zhangjie;Hao, Rong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3319-3338
    • /
    • 2016
  • Cloud storage is becoming more and more popular because of its elasticity and pay-as-you-go storage service manner. In some cloud storage scenarios, the data that are stored in the cloud may be shared by a group of users. To verify the integrity of cloud data in this kind of applications, many auditing schemes for shared cloud data have been proposed. However, all of these schemes do not consider the access authorization problem for users, which makes the revoked users still able to access the shared cloud data belonging to the group. In order to deal with this problem, we propose a novel public auditing scheme for shared cloud data in this paper. Different from previous work, in our scheme, the user in a group cannot any longer access the shared cloud data belonging to this group once this user is revoked. In addition, we propose a new random masking technique to make our scheme preserve both data privacy and identity privacy. Furthermore, our scheme supports to enroll a new user in a group and revoke an old user from a group. We analyze the security of the proposed scheme and justify its performance by concrete implementations.

Automated Ulna and Radius Segmentation model based on Deep Learning on DEXA (DEXA에서 딥러닝 기반의 척골 및 요골 자동 분할 모델)

  • Kim, Young Jae;Park, Sung Jin;Kim, Kyung Rae;Kim, Kwang Gi
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.12
    • /
    • pp.1407-1416
    • /
    • 2018
  • The purpose of this study was to train a model for the ulna and radius bone segmentation based on Convolutional Neural Networks and to verify the segmentation model. The data consisted of 840 training data, 210 tuning data, and 200 verification data. The learning model for the ulna and radius bone bwas based on U-Net (19 convolutional and 8 maximum pooling) and trained with 8 batch sizes, 0.0001 learning rate, and 200 epochs. As a result, the average sensitivity of the training data was 0.998, the specificity was 0.972, the accuracy was 0.979, and the Dice's similarity coefficient was 0.968. In the validation data, the average sensitivity was 0.961, specificity was 0.978, accuracy was 0.972, and Dice's similarity coefficient was 0.961. The performance of deep convolutional neural network based models for the segmentation was good for ulna and radius bone.

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation

  • Nithya, S. Mary V.;Rhymend Uthariaraj, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3322-3347
    • /
    • 2021
  • Cloud Storage is the primary component of many businesses on cloud. Majority of the enterprises today are adopting a multicloud strategy to keep away from vendor lock-in and to optimize cost. Auditing schemes are used to ascertain the integrity of cloud data. Of these schemes, only the Provable Data Possession schemes (PDP) are resilient to key-exposure. These PDP schemes are devised using Public Key Infrastructure (PKI-) based cryptography, Identity-based cryptography, etc. PKI-based systems suffer from certificate-related communication/computational complexities. The Identity-based schemes deal with the exposure of only the auditing secret key (audit key). But with the exposure of both the audit key and the secret key used to update the audit key, the auditing process itself becomes a complete failure. So, an Identity-based PDP scheme with Parallel Key-Insulation is proposed for multiple cloud storage. It reduces the risk of exposure of both the audit key and the secret key used to update the audit key. It preserves the data privacy from the Third Party Auditor, secure against malicious Cloud Service Providers and facilitates batch auditing. The resilience to key-exposure is proved using the CDH assumption. Compared to the existing Identity-based multicloud schemes, it is efficient in integrity verification.

Remediation of Petroleum-Contaminated Soil by a Directly-Heated Thermal Desorption Process (직접 가열식 열탈착 공정을 이용한 유류오염토양의 정화)

  • Min, Hyeong-Sik;Yang, In-Ho;Jeon, Sang-Jo;Kim, Han-S.
    • Journal of Soil and Groundwater Environment
    • /
    • v.14 no.5
    • /
    • pp.62-70
    • /
    • 2009
  • A field soil highly contaminated with petroleum hydrocarbons (JP-8 and diesel fuels) was employed for its remediation by a lab-scale thermal desorption process. The soil was collected in the vicinity of an underground storage tank in a closed military base and its contamination level was as high as 4,476 ppm as total petroleum hydrocarbon (TPH). A lab scale directly-heated low temperature thermal desorption (LTTD) system of 10-L capacity was developed and operated for the thermal treatment of TPH contaminated soils in this study. The desired operation temperature was found to be approximately $200-300^{\circ}C$ from the thermal gravimetric analysis of the contaminated field soils. The removal efficiencies higher than 90% were achieved by the LTTD treatment at $200^{\circ}C$ for 10 min as well as at $300^{\circ}C$ for 5 min. As the water content in the soils increased and therefore they were likely to be present as lumps, the removal efficiency noticeably decreased, indicating that a pre-treatment such as field drying should be required. The analysis of physical and chemical properties of soils before and after the LTTD treatment demonstrated that no significant changes occurred during the thermal treatment, supporting no needs for additional post-treatments for the soils treated by LTTD. The results presented in this study are expected to provide useful information for the field application and verification of LTTD for the highly contaminated geo-environment.

Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy

  • Yu, Haiyang;Cai, Yongquan;Kong, Shanshan;Ning, Zhenhu;Xue, Fei;Zhong, Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5039-5061
    • /
    • 2017
  • Cloud storage becomes a new trend that more and more users move their data to cloud storage servers (CSSs). To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users' cloud data. However, most of them are based on public key infrastructure, which leads to complex certificates management and verification. Besides, most existing auditing schemes are inefficient when user uploads a large amount of data or a third party auditor (TPA) performs auditing for multiple users' data on different CSSs. To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography. To relieve user's computation burden, we introduce a proxy, which is delegated to generate and upload homomorphic verifiable tags for user. We extend our auditing scheme to support auditing for dynamic data operations. We further extend it to support batch auditing in multiple users and multiple CSSs setting, which is practical and efficient in large scale cloud storage system. Extensive security analysis shows that our scheme is provably secure in random oracle model. Performance analysis demonstrates that our scheme is highly efficient, especially reducing the computation cost of proxy and TPA.