• Title/Summary/Keyword: 가상모델

Search Result 1,972, Processing Time 0.035 seconds

The Simulation for the Organization of Fishing Vessel Control System in Fishing Ground (어장에 있어서의 어선관제시스템 구축을 위한 모의실험)

  • 배문기;신형일
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.36 no.3
    • /
    • pp.175-185
    • /
    • 2000
  • This paper described on a basic study to organize fishing vessel control system in order to control efficiently fishing vessel in Korean offshore. It was digitalized ARPA image on the fishing processing of a fleet of purse seiner in conducting fishing operation at Cheju offshore in Korea as a digital camera and then simulated by used VTMS. Futhermore, it was investigated on the application of FVTMS which can control efficiently fishing vessels in fishing ground. The results obtained were as follows ; (1) It was taken 16 minutes and 35 minutes to casting and hauling net in fishing processing respectively. The length of rope pulled by scout boat was 200m, tactical diameter in casting net was 340.8m, turning speed was 6kts as well. (2) The processing of casting and hauling net was moved to SW, NE as results of simulation when the current direction and speed set into NE, 2kts and SW, 2kts respectively. Such as these results suggest that can predict to control the fishing vessel previously with information of fishing ground, fishery and ship's maneuvering, etc. (3) The control range of VTMS radar used in simulation was about 16 miles. Although converting from a radar of the control vessel to another one, it was continuously acquired for the vector and the target data. The optimum control position could be determined by measuring and analyzing to distance and direction between the control vessel and the fleet of fishing vessel. (4) The FVTMS(fishing vessel traffic management services) model was suggested that fishing vessels received fishing conditions and safety navigation information can operate safely and efficiently.

  • PDF

A Study on Developing a Model for Cancer Damage Cost Due to Risk from Benzene in Ulsan Metropolitan City (울산 지역에서 대기중 벤젠으로 인한 암 사망 손실비용 추정 모형에 관한 연구)

  • Lee, Yong-Jin;Kim, Ye-Shin;Shin, Dong-Chun;Shin, Young-Chul
    • Environmental and Resource Economics Review
    • /
    • v.13 no.1
    • /
    • pp.49-82
    • /
    • 2004
  • The study aimed to evaluate cancer damage cost due to risk from benzene inhalation. We performed health risk assessment based on US EPA guideline to estimate annual population risk in Ulsan metropolitan city. Also, we estimated a willingness-to-pay amount for reducing a cancer mortality rate to evaluate a value of statistical life. We combined the annual population risk and the value of statistical life to calculate the cancer damage cost. In the health risk assessment, we applied the benzene unit risk ($2.2{\times}10^{-6}{\sim}7.8{\times}10^{-6}$) in the US EPA'S Integrated Risk Information System to assess the annual population risk. Average concentration of benzene in ambient air is $7.88{\mu}g/m^3$(min: 1.16~max: $23.32{\mu}g/m^3$). We targeted an exposure population of 516,641 persons who aged over 30 years old. Using a Monte-Carlo simulation for uncertainty analysis, we evaluated that the population risk of benzene during ten years in Ulsan city is 2.90 persons (5 percentile: 0.32~95 percentile: 9.11persons). And the monthly average WTP for 5/1,000 cancer mortality reduction during ten years is 14,852 Won(95% C.I: 13,135~16,794 Won) and the implied VSL is 36 million Won(95% C.I: 30~40 million Won). Cancer damage cost due to risk from benzene inhalation during 10 years in Ulsan city is about 104 million Won(5 percentile: 13~95 percentile: 328 million Won). Health benefit cost to reduce a cancer mortality risk of benzene is about 50 million Won is Ulsan metropolitann city. But, it is very important that this cost is not for all health damage cost of cancer mortality in some area. We just recommended a model for evaluating a cancer risk reduction, so we must re-evaluate an integrated application of total VOCs damage cost including benzene.

  • PDF

Transmission Dose Estimation Algorithm for Tissue Deficit (조직 결손에 대한 투과선량 계산 알고리즘 보정)

  • Yun Hyong Geun;Chie Eui Kyu;Huh Soon Nyung;Lee Hyoung Koo;Woo Hong Gyun;Shin Kyo Chul;Ha Sung Whan
    • Radiation Oncology Journal
    • /
    • v.20 no.2
    • /
    • pp.186-192
    • /
    • 2002
  • Purpose : Measurement of transmission dose is useful for in vivo dosimetry. In this study, previous algorithm for estimation of transmission dose was modified for use in cases with tissue deficit. Materials and Methods : The beam data was measured with flat solid phantom in various conditions of tissue deficit. New algorithm for correction of transmission dose for tissue deficit was developed by physical reasoning. The algorithm was tested in experimental settings with irregular contours mimicking breast cancer patients using multiple sheets of solid phantoms. Results : The correction algorithm for tissue deficit could accurately reflect the effect of tissue deficit with errors within ${\pm}1.0\%$ in most situations and within ${\pm}3.0\%$ in experimental settings with irregular contours mimicking breast cancer treatment set-up. Conclusion : Developed algorithm could accurately reflect the effect of tissue deficit and irregularly shaped body contour on transmission dosimetry.

Assessing Relative Importance of Laver Attributes for Infants Using Conjoint Analysis (컨조인트 분석을 이용한 영유아 김 선택 속성의 상대적 중요도 분석)

  • Lee, Ho-Jin;Lee, Min-A;Park, Hye-Kyung
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.45 no.6
    • /
    • pp.894-902
    • /
    • 2016
  • The purpose of this study was to analyze the attributes considered as important by parents in the selection of laver for infants through conjoint analysis techniques. A total of 917 questionnaires were distributed in January 2016, of which 211 were completed (23.0%). Statistical data analyses were performed using SPSS/Win 21.0 for descriptive statistics and conjoint analysis. The conjoint design was applied to evaluate the hypothetical laver for infants. According to the analysis of attributes and levels of laver for infants, the relative importance of each attribute was follows: seasoning (26.55%), flavor (19.33%), texture (18.75%), oil (15.15%), size (10.61%), and certification (9.61%). The results of the conjoint analysis indicate that parents raising infants preferred laver with the characteristics of non-seasoning, general flavor, softness, half-size, organic certification, and perilla oil. The most preferred laver for infants gained a 53.7% potential market share from choice simulation compared with laver being sold. Using utility and relative importance, the laver market for infants was classified into two segments. As a result of market segmentation, parents of cluster 1 preferred the laver model being sold (soy seasoning) while parents of cluster 2 preferred the optimized laver model (non-seasoning).

Database Security System supporting Access Control for Various Sizes of Data Groups (다양한 크기의 데이터 그룹에 대한 접근 제어를 지원하는 데이터베이스 보안 시스템)

  • Jeong, Min-A;Kim, Jung-Ja;Won, Yong-Gwan;Bae, Suk-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1149-1154
    • /
    • 2003
  • Due to various requirements for the user access control to large databases in the hospitals and the banks, database security has been emphasized. There are many security models for database systems using wide variety of policy-based access control methods. However, they are not functionally enough to meet the requirements for the complicated and various types of access control. In this paper, we propose a database security system that can individually control user access to data groups of various sites and is suitable for the situation where the user's access privilege to arbitrary data is changed frequently. Data group(s) in different sixes d is defined by the table name(s), attribute(s) and/or record key(s), and the access privilege is defined by security levels, roles and polices. The proposed system operates in two phases. The first phase is composed of a modified MAC (Mandatory Access Control) model and RBAC (Role-Based Access Control) model. A user can access any data that has lower or equal security levels, and that is accessible by the roles to which the user is assigned. All types of access mode are controlled in this phase. In the second phase, a modified DAC(Discretionary Access Control) model is applied to re-control the 'read' mode by filtering out the non-accessible data from the result obtained at the first phase. For this purpose, we also defined the user group s that can be characterized by security levels, roles or any partition of users. The policies represented in the form of Block(s, d, r) were also defined and used to control access to any data or data group(s) that is not permitted in 'read ' mode. With this proposed security system, more complicated 'read' access to various data sizes for individual users can be flexibly controlled, while other access mode can be controlled as usual. An implementation example for a database system that manages specimen and clinical information is presented.

Bond Orbital Theory of Chemical Reactivity (反應性의 結合 Orbital 理論)

  • Yang, Kang;Ree, Tai-Kyue
    • Journal of the Korean Chemical Society
    • /
    • v.8 no.1
    • /
    • pp.20-24
    • /
    • 1964
  • The linear combination of bond orbitals method is used to investigate the reactivity of halomethanes in abstraction reactions by atoms. The activation energy is evaluated on the assumption that, in an activated complex, two electrons in a bond to be broken become completely isolated from the rest of the ${\sigma}$-electron systems. Such a model leads to an intuitively attractive concept that the interactions between the reactive bond and the neighboring bonds govern the reactivity of ${\sigma}$-electron systems. The resulting equation for the activation energy, ${\varepsilon},\;is:\;{\narepsilon}= ${\varepsilon}={\zeta}+$$${\sum}_{i=1}^3$${\eta}c-I,$ c-4 Here, subscript C-4 indicates the bond to be broken, while C-i represents the other three bonds surrounding the reactive bond; ξ is the activation energy of a hypothetical reaction of an isolated C-4 bond and an attacking atom; and ${\eta}$C-i,C-4 stems from the stabilizing interacting of C-4 bond with neighboring C-i bonds. A choie of η′s consistent with bond strength data simplifies the above equation to a form ${\varepsilon}={\zeta}\;+\;N{\eta}c$-H, C-4 where N denotes the number of C-H plus C-F bond in halomethanes. In agreement with this equation, experimental -values increase linearly with increasing N.

  • PDF

Study(V) on Development of Charts and Equations Predicting Allowable Compressive Bearing Capacity for Prebored PHC Piles Socketed into Weathered Rock through Sandy Soil Layers - Analysis of Results and Data by Parametric Numerical Analysis - (사질토를 지나 풍화암에 소켓된 매입 PHC말뚝에서 지반의 허용압축지지력 산정도표 및 산정공식 개발에 관한 연속 연구(V) - 매개변수 수치해석 자료 분석 -)

  • Park, Mincheol;Kwon, Oh-Kyun;Kim, Chae Min;Yun, Do Kyun;Choi, Yongkyu
    • Journal of the Korean Geotechnical Society
    • /
    • v.35 no.10
    • /
    • pp.47-66
    • /
    • 2019
  • A parametric numerical analysis according to diameter, length, and N values of soil was conducted for the PHC pile socketed into weathered rock through sandy soil layers. In the numerical analysis, the Mohr-Coulomb model was applied to PHC pile and soils, and the contacted phases among the pile-soil-cement paste were modeled as interfaces with a virtual thickness. The parametric numerical analyses for 10 kinds of pile diameters were executed to obtain the load-settlement relationship and the axial load distribution according to N-values. The load-settlement curves were obtained for each load such as total load, total skin friction, skin friction of the sandy soil layer, skin friction of the weathered rock layer and end bearing resistance of the weathered rock. As a result of analysis of various load levels from the load-settlement curves, the settlements corresponding to the inflection point of each curve were appeared as about 5~7% of each pile diameter and were estimated conservatively as 5% of each pile diameter. The load at the inflection point was defined as the mobilized bearing capacity ($Q_m$) and it was used in analyses of pile bearing capacity. And SRF was appeared above average 70%, irrespective of diameter, embedment length of pile and N value of sandy soil layer. Also, skin frictional resistance of sandy soil layers was evaluated above average 80% of total skin frictional resistance. These results can be used in calculating the bearing capacity of prebored PHC pile, and also be utilized in developing the bearing capacity prediction method and chart for the prebored PHC pile socketed into weathered rock through sandy soil layers.

Development of a smart cane concept for guiding the visually impaired - focused on design thinking learning practices for students - (시각장애인을 위한 길 안내용 스마트 지팡이 콘셉트 개발)

  • Park, Hae Rim;Lee, Min Sun;Yang, Ho Jung
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.186-200
    • /
    • 2023
  • This study aims to improve the usability of the white cane, which is walking equipment that most local visually impaired people use and carry when going out, and to contribute to the prevention of safety accidents and the walking rights of visually impaired people by providing improvement and resolution measures for the problems identified. Also, this study is a study on the visually impaired, primarily targeting the 1st to 2nd degree visually impaired people, who cannot go out on their own without walking equipment such as a white cane, corresponding to 20% among approximately 250,000 blind and low vision people in the Korean population. In the study process, the concept has been developed from the user's point of view in order that the white cane becomes a real help in the walking step of the visually impaired and the improvement of usability of the white cane, the main walking equipment for the visually impaired, are done by problem identification through the Double Diamond Model of Design Thinking (Empathize → Define → Ideate → Prototype → Test (verify)). As a result of the investigation in the process of Empathy, a total of five issues was synthesized, including an increase in the proportion of the visually impaired people, an insufficient workforce situation to help all the visually impaired, an improvement and advancement of assistive devices essential for the visually impaired, problems of damage, illegal occupation, demolition, maintenance about braille blocks, making braille block paradigms for the visually impaired and for everyone. In Ideate and Prototype steps, situations derived from brainstorming were grouped and the relationship were made through the KJ method, and specific situations and major causes were organized to establish the direction of the concept. The derived solutions and major functions are defined in four categories, and representative situations requiring solutions and major functions are organized into two user scenarios. Ideas were visualized by arranging the virtual Persona and Customer Journey Map according to the situation and producing a prototype through 3D modeling. Finally, in the evaluation, the final concept derived is a device such a smart cane for guidance for the visually impaired as ① a smart cane emphasizing portability + ② compatibility with other electronic devices + ③ a product with safety and convenience.

End to End Model and Delay Performance for V2X in 5G (5G에서 V2X를 위한 End to End 모델 및 지연 성능 평가)

  • Bae, Kyoung Yul;Lee, Hong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.107-118
    • /
    • 2016
  • The advent of 5G mobile communications, which is expected in 2020, will provide many services such as Internet of Things (IoT) and vehicle-to-infra/vehicle/nomadic (V2X) communication. There are many requirements to realizing these services: reduced latency, high data rate and reliability, and real-time service. In particular, a high level of reliability and delay sensitivity with an increased data rate are very important for M2M, IoT, and Factory 4.0. Around the world, 5G standardization organizations have considered these services and grouped them to finally derive the technical requirements and service scenarios. The first scenario is broadcast services that use a high data rate for multiple cases of sporting events or emergencies. The second scenario is as support for e-Health, car reliability, etc.; the third scenario is related to VR games with delay sensitivity and real-time techniques. Recently, these groups have been forming agreements on the requirements for such scenarios and the target level. Various techniques are being studied to satisfy such requirements and are being discussed in the context of software-defined networking (SDN) as the next-generation network architecture. SDN is being used to standardize ONF and basically refers to a structure that separates signals for the control plane from the packets for the data plane. One of the best examples for low latency and high reliability is an intelligent traffic system (ITS) using V2X. Because a car passes a small cell of the 5G network very rapidly, the messages to be delivered in the event of an emergency have to be transported in a very short time. This is a typical example requiring high delay sensitivity. 5G has to support a high reliability and delay sensitivity requirements for V2X in the field of traffic control. For these reasons, V2X is a major application of critical delay. V2X (vehicle-to-infra/vehicle/nomadic) represents all types of communication methods applicable to road and vehicles. It refers to a connected or networked vehicle. V2X can be divided into three kinds of communications. First is the communication between a vehicle and infrastructure (vehicle-to-infrastructure; V2I). Second is the communication between a vehicle and another vehicle (vehicle-to-vehicle; V2V). Third is the communication between a vehicle and mobile equipment (vehicle-to-nomadic devices; V2N). This will be added in the future in various fields. Because the SDN structure is under consideration as the next-generation network architecture, the SDN architecture is significant. However, the centralized architecture of SDN can be considered as an unfavorable structure for delay-sensitive services because a centralized architecture is needed to communicate with many nodes and provide processing power. Therefore, in the case of emergency V2X communications, delay-related control functions require a tree supporting structure. For such a scenario, the architecture of the network processing the vehicle information is a major variable affecting delay. Because it is difficult to meet the desired level of delay sensitivity with a typical fully centralized SDN structure, research on the optimal size of an SDN for processing information is needed. This study examined the SDN architecture considering the V2X emergency delay requirements of a 5G network in the worst-case scenario and performed a system-level simulation on the speed of the car, radius, and cell tier to derive a range of cells for information transfer in SDN network. In the simulation, because 5G provides a sufficiently high data rate, the information for neighboring vehicle support to the car was assumed to be without errors. Furthermore, the 5G small cell was assumed to have a cell radius of 50-100 m, and the maximum speed of the vehicle was considered to be 30-200 km/h in order to examine the network architecture to minimize the delay.

The Role of Control Transparency and Outcome Feedback on Security Protection in Online Banking (계좌 이용 과정과 결과의 투명성이 온라인 뱅킹 이용자의 보안 인식에 미치는 영향)

  • Lee, Un-Kon;Choi, Ji Eun;Lee, Ho Geun
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.75-97
    • /
    • 2012
  • Fostering trusting belief in financial transactions is a challenging task in Internet banking services. Authenticated Certificate had been regarded as an effective method to guarantee the trusting belief for online transactions. However, previous research claimed that this method has some loopholes for such abusers as hackers, who intend to attack the financial accounts of innocent transactors in Internet. Two types of methods have been suggested as alternatives for securing user identification and activity in online financial services. Control transparency uses information over the transaction process to verify and to control the transactions. Outcome feedback, which refers to the specific information about exchange outcomes, provides information over final transaction results. By using these two methods, financial service providers can send signals to involved parties about the robustness of their security mechanisms. These two methods-control transparency and outcome feedback-have been widely used in the IS field to enhance the quality of IS services. In this research, we intend to verify that these two methods can also be used to reduce risks and to increase the security protections in online banking services. The purpose of this paper is to empirically test the effects of the control transparency and the outcome feedback on the risk perceptions in Internet banking services. Our assumption is that these two methods-control transparency and outcome feedback-can reduce perceived risks involved with online financial transactions, while increasing perceived trust over financial service providers. These changes in user attitudes can increase the level of user satisfactions, which may lead to the increased user loyalty as well as users' willingness to pay for the financial transactions. Previous research in IS suggested that the increased level of transparency on the process and the result of transactions can enhance the information quality and decision quality of IS users. Transparency helps IS users to acquire the information needed to control the transaction counterpart and thus to complete transaction successfully. It is also argued that transparency can reduce the perceived transaction risks in IS usage. Many IS researchers also argued that the trust can be generated by the institutional mechanisms. Trusting belief refers to the truster's belief for the trustee to have attributes for being beneficial to the truster. Institution-based trust plays an important role to enhance the probability of achieving a successful outcome. When a transactor regards the conditions crucial for the transaction success, he or she considers the condition providers as trustful, and thus eventually trust the others involved with such condition providers. In this process, transparency helps the transactor complete the transaction successfully. Through the investigation of these studies, we expect that the control transparency and outcome feedback can reduce the risk perception on transaction and enhance the trust with the service provider. Based on a theoretical framework of transparency and institution-based trust, we propose and test a research model by evaluating research hypotheses. We have conducted a laboratory experiment in order to validate our research model. Since the transparency artifact(control transparency and outcome feedback) is not yet adopted in online banking services, the general survey method could not be employed to verify our research model. We collected data from 138 experiment subjects who had experiences with online banking services. PLS is used to analyze the experiment data. The measurement model confirms that our data set has appropriate convergent and discriminant validity. The results of testing the structural model indicate that control transparency significantly enhances the trust and significantly reduces the risk perception of online banking users. The result also suggested that the outcome feedback significantly enhances the trust of users. We have found that the reduced risk and the increased trust level significantly improve the level of service satisfaction. The increased satisfaction finally leads to the increased loyalty and willingness to pay for the financial services.

  • PDF