• Title/Summary/Keyword: tracing set

Search Result 88, Processing Time 0.03 seconds

Goal-oriented multi-collision source algorithm for discrete ordinates transport calculation

  • Wang, Xinyu;Zhang, Bin;Chen, Yixue
    • Nuclear Engineering and Technology
    • /
    • v.54 no.7
    • /
    • pp.2625-2634
    • /
    • 2022
  • Discretization errors are extremely challenging conundrums of discrete ordinates calculations for radiation transport problems with void regions. In previous work, we have presented a multi-collision source method (MCS) to overcome discretization errors, but the efficiency needs to be improved. This paper proposes a goal-oriented algorithm for the MCS method to adaptively determine the partitioning of the geometry and dynamically change the angular quadrature in remaining iterations. The importance factor based on the adjoint transport calculation obtains the response function to get a problem-dependent, goal-oriented spatial decomposition. The difference in the scalar fluxes from one high-order quadrature set to a lower one provides the error estimation as a driving force behind the dynamic quadrature. The goal-oriented algorithm allows optimizing by using ray-tracing technology or high-order quadrature sets in the first few iterations and arranging the integration order of the remaining iterations from high to low. The algorithm has been implemented in the 3D transport code ARES and was tested on the Kobayashi benchmarks. The numerical results show a reduction in computation time on these problems for the same desired level of accuracy as compared to the standard ARES code, and it has clear advantages over the traditional MCS method in solving radiation transport problems with reflective boundary conditions.

Optical Simulation Study on the Performances of Collimating Films for LCD Backlight Applications (액정표시장치 백라이트용 집광필름의 광학특성 분석을 위한 시뮬레이션 기법 연구)

  • Park, Ji-Hee;Lee, Jung-Ho;Jeong, Jin-Ha;Nahm, Kie-Bong;Ko, Jae-Hyeon;Kim, Joong-Hyun
    • Korean Journal of Optics and Photonics
    • /
    • v.18 no.6
    • /
    • pp.432-440
    • /
    • 2007
  • Optical simulation methods such as a ray tracing technique have been widely used to predict the optical performances of collimating films for LCD backlight applications. It is necessary to optimize simulation conditions which have substantial effect on the simulation result in order to predict accurate performances of collimating films. We have set up a very simple backlight model consisting of a reflection film, a virtual flat light-source, and a prism film, which is a representative collimating film for backlight, in order to analyze the simulation conditions which are strongly correlated with the on-axis luminance gain and the viewing-angle characteristics of prism films. It was found that the dependence of the relative change in the on-axis luminance on the structure and material properties of collimating films can be derived from the above-mentioned simple BLU model and from simulation using it. However, the exact reflection property of the reflection film and the distribution of the incident light onto the optical film were found to be very important for revealing exact viewing-angle characteristics of collimating films.

Full mouth rehabilitation in partially edentulous patient with an unstable mandibular position (불안정한 하악위를 가진 부분 무치악 환자에서 전악 수복 증례)

  • Donghwi Yook;Younghoo Lee;Seoung-Jin Hong;Ahran Pae;Kwantae Noh;Hyeong-Seob Kim;Kung-Rock Kwon;Janghyun Paek
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.61 no.4
    • /
    • pp.308-315
    • /
    • 2023
  • In the case of a patients who have lost the centric stop and have a staggered occlusion of the residual teeth, various movements occur when the denture is loaded. Implant placement is necessary to reinforce the retention, support, and stabilization elements to reduce denture movement. However, in this case, considering the patient's age, aversion to surgery, and bone loss, implants were not placed and restoration was performed with a removable partial denture. In this case, it is important to set the correct mandibular position for restoration because the patient has a habit of chewing with the remaining teeth. In this case, a stable mandibular position was established using a gothic arch tracing, and good results were obtained by restoring with partial dentures, so this is reported.

A Text Mining-based Intrusion Log Recommendation in Digital Forensics (디지털 포렌식에서 텍스트 마이닝 기반 침입 흔적 로그 추천)

  • Ko, Sujeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.6
    • /
    • pp.279-290
    • /
    • 2013
  • In digital forensics log files have been stored as a form of large data for the purpose of tracing users' past behaviors. It is difficult for investigators to manually analysis the large log data without clues. In this paper, we propose a text mining technique for extracting intrusion logs from a large log set to recommend reliable evidences to investigators. In the training stage, the proposed method extracts intrusion association words from a training log set by using Apriori algorithm after preprocessing and the probability of intrusion for association words are computed by combining support and confidence. Robinson's method of computing confidences for filtering spam mails is applied to extracting intrusion logs in the proposed method. As the results, the association word knowledge base is constructed by including the weights of the probability of intrusion for association words to improve the accuracy. In the test stage, the probability of intrusion logs and the probability of normal logs in a test log set are computed by Fisher's inverse chi-square classification algorithm based on the association word knowledge base respectively and intrusion logs are extracted from combining the results. Then, the intrusion logs are recommended to investigators. The proposed method uses a training method of clearly analyzing the meaning of data from an unstructured large log data. As the results, it complements the problem of reduction in accuracy caused by data ambiguity. In addition, the proposed method recommends intrusion logs by using Fisher's inverse chi-square classification algorithm. So, it reduces the rate of false positive(FP) and decreases in laborious effort to extract evidences manually.

A Robust Real-Time Lane Detection for Sloping Roads (경사진 도로 환경에서도 강인한 실시간 차선 검출방법)

  • Heo, Hwan;Han, Gi-Tae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.6
    • /
    • pp.413-422
    • /
    • 2013
  • In this paper, we propose a novel method for real-time lane detection that is robust for inclined roads and not require a camera parameter, the Inverse Perspective Transform of the image, and the proposed lane filter. After finding the vanishing point from the start frame of the image and storing the region surrounding the vanishing point as the Template Area(TA), our method predict the lanes by scanning toward the lower part from the vanishing point of the image and obtain the image removed the perspective effect using the Inverse Perspective Transform coefficients extracted based on the predicted lanes. To robustly determine lanes on inclined roads, the region surrounding the vanishing point is set up as the template area (TA), and, by recalculating the vanishing point by tracing the area similar to the TA (SA) in the input image through template matching, it responds to the changes on the road conditions. The proposed method for a more robust lane detection method for inclined roads is a lane detection method by applying a lane detection filter on an image removed of the perspective effect. Through this method, the processing region is reduced and the processing procedure is simplified to produce a satisfactory lane detection result of about 40 frames per second.

A study on improving the surface structure of solar cell and increasing the light absorbing efficiency - Applying the structure of leaves' surface - (태양전지 텍스처 표면구조 개선 및 빛 흡수효율 향상에 관한 연구 - 식물 잎의 표면구조 적용 -)

  • Kim, Taemin;Hong, Joopyo
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2010.11a
    • /
    • pp.38.2-38.2
    • /
    • 2010
  • Biomimetc is a new domain of learning that proposes a solution getting clues from nature. There seems to be a sign of this phenomenon in fields of Renewable Energy. Foe example, Wind power was imitate the whale's fin that was improve efficiency of generating energy. This study focused on the photovoltaic generation as the instance of applying biomimetic. Efficiency is the most important factor in field of Photovoltaic generation. When given solar cell taking the sun light, most important fields of the study are absorb more light and increase the quantity of generation. For improving efficiency, the solar cell were builded up textures of taking a pyramid form, such a surface structure taking a role for remaining the light. This effects do the role as increasing absorbing efficiency. Such phenomenon calls Light Trapping, locking up the light on the surface of solar cell for a long time. Light is a vital factor to plants in the nature. Plants grow up through the photosynthesis that absorbing light for growth and propagation. So, plants make a effort how can absorb more the light in poor surroundings. This study set up a goal that imitates the minute surface structure of plants and applies to the existing solar cells's surface structure, so it can improve the efficiency of absorbing light. We used Light Tools software analyzing geometrical optics to analyze efficiency about new designed textures on the computer. We made a comparison between existing textures and new designed textures. Consequently, new designed textures were advanced efficiency, absorbing rates of light increasing about 7 percent. In comparison with existing and new textures, advancing about 20 percent in the efficient aspect.

  • PDF

The Study on the Genealogy and Impact Factor of Papers by Citation Analysis (인용문헌 분석을 통한 학술 논문의 수명 및 계보에 관한 연구)

  • Chung, Jun-Min
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.2
    • /
    • pp.357-379
    • /
    • 2010
  • The citation analysis is not applied to group measurements but to individual papers finding their impact factors among citation chains which are created by tracing citing-cited relationship between any two papers in data set. The individual impact factor is measured by adding each value derived from citation chain. Each paper's impact factor index is calculated by adding the values of each index by direct citing-cited relationship, and the values of each impact factor made by indirectly influencing to the papers in the citation chain. The research introduces a grace period, in which the system holds the papers not cited by other papers yet, but are expected to be cited within this period. Eventually not cited papers after the grace period would be eliminated by the system. The experiment suggests a reasonable database in which the highly influenced papers are gathered, and could be serviced in stead of buying databases filled with worthless not-cited-papers.

High Resolution Whole Genome Multilocus Sequence Typing (wgMLST) Schemes for Salmonella enterica Weltevreden Epidemiologic Investigations

  • Tadee, Pakpoom;Tadee, Phacharaporn;Hitchings, Matthew D.;Pascoe, Ben;Sheppard, Samuel K.;Patchanee, Prapas
    • Microbiology and Biotechnology Letters
    • /
    • v.46 no.2
    • /
    • pp.162-170
    • /
    • 2018
  • Non-typhoidal Salmonella is one of the main pathogens causing food-borne illness in humans, with up to 20% of cases resulting from consumption of pork products. Over the gastroenteritis signs, multidrug resistant Salmonella has arisen. In this study, pan-susceptible phenotypic strains of Salmonella enterica serotype Weltevreden recovered from pig production chain in Chiang Mai, Thailand during 2012-2014 were chosen for analysis. The aim of this study was to use whole genome sequencing (WGS) data with an emphasis on antimicrobial resistance gene investigation to assess their pathogenic potential and genetic diversity determination based on whole genome Multilocus Sequence Typing (wgMLST) to expand epidemiological knowledge and to provide additional guidance for disease control. Analyis using ResFinder 3.0 for WGS database tracing found that one of pan-susceptible phenotypic strain carried five classes of resistance genes: aminoglycoside, beta-lactam, phenicol, sulfonamide, and tetracycline associated genes. Twenty four and 36 loci differences were detected by core genome Multilocus Sequence Typing (cgMLST) and pan genome Multilocus Sequence Typing (pgMLST), respectively, in two matching strains (44/13 vs A543057 and A543056 vs 204/13) initially assigned by conventional MLST and Pulsed-field Gel Electrophoresis (PFGE). One hundread percent discriminant ability can be achieved using the wgMLST technique. WGS is currently the ultimate molecular technique for various in-depth studies. As the findings stated above, a new of "gold standard typing method era" for routine works in genome study is being set.

The weight analysis research in developing a similarity classification problem of malicious code based on attributes (속성기반 악성코드 유사도 분류 문제점 개선을 위한 가중치 분석 연구)

  • Chung, Yong-Wook;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.501-514
    • /
    • 2013
  • A grouping process through the similarity comparison is required to effectively classify and respond a malicious code. When we have a use of the past similarity criteria to be used in the comparison method or properties it happens a increased problem of false negatives and false positives. Therefore, in this paper we apply to choose variety of properties to complement the problem of behavior analysis on the heuristic-based of 2nd step in malicious code auto analysis system, and we suggest a similarity comparison method applying AHP (analytic hierarchy process) for properties weights that reflect the decision-making technique. Through the similarity comparison of malicious code, configured threshold is set to the optimum point between detection rates and false positives rates. As a grouping experiment about unknown malicious it distinguishes each group made by malicious code generator. We expect to apply it as the malicious group information which includes a tracing of hacking types and the origin of malicious codes in the future.

General Numerical Calculation Method for Paraxial Zoom Loci of Zoom Lenses with Finite Object Distance by Using Gaussian Bracket Method (가우스 괄호법을 이용한 유한 물점을 갖는 줌 렌즈에 대한 일반적인 수치해석적 근축광선 줌 궤적 추적)

  • Lee, Do-Kyung;Yoo, Nam-Jun;Jo, Jae-Heung;Ryu, Jae-Myung;Kang, Geon-Mo;Lee, Hae-Jin
    • Korean Journal of Optics and Photonics
    • /
    • v.20 no.3
    • /
    • pp.156-165
    • /
    • 2009
  • We theoretically derive the set of general paraxial zoom locus equations for all zoom lens systems with finite object distance, including the infinite object distance case, by using the Gaussian bracket method and matrix representation of paraxial ray tracing. We make the zoom locus program by means of a numerical calculation method according to these equations in Visual Basic Language. Consequently, the solutions of this method can be consistently and flexibly used in all types of zoom lens in the step of initial design about zoom loci. Finally, in order to verify the justification and usefulness of this method, we show that two examples, such as $M_{4a}$ and $M_{4h}$ types of 4 groups, and one example, $M_{5n}$ type of 5 groups, which are very complicated zoom lens systems, can be rapidly and diversely traced through various interpolations by using this program.