• Title/Summary/Keyword: 데이타 요소

Search Result 350, Processing Time 0.024 seconds

Prediction of Shear Strength Using Artificial Neural Networks for Reinforced Concrete Members without Shear Reinforcement (인공신경망을 이용한 전단보강근이 없는 철근콘크리트 보의 전단강도에 대한 예측)

  • Jung, Sung-Moon;Han, Sang-Eul;Kim, Kang-Su
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.18 no.2
    • /
    • pp.201-211
    • /
    • 2005
  • Due to the complex mechanism and various parameters that affect shear behavior of reinforced concrete (RC) members, models on shear tend to be complex and difficult to utilize for design of structural members, and empirical relationships formulated with limited test data often work lot members having a specific range of influencing parameters on shear. As an alternative approach tot solving this problem, artificial neural networks have been suggested by some researchers. In this paper, artificial neural networks were used to predict shear strengths of RC beams without shear reinforcement. Especially, a large database that consists of shear test results of 398 RC members without shear reinforcement was used for artificial neural network analysis. Three well known approaches for shear strength of RC members, ACI 318-02 shear provision, Zsutiy's equation, and Okamura's relationship, are also evaluated with test results in the shear database and compared with neural network approach. While ACI 318-02 provided inaccurate predictions for RC members without shear reinforcement, the empirical equations by Zsutty and Okamura provided more improved prediction of Shear strength than ACI 318-02. The artificial neural networks, however provided the best prediction of shear strengths of RC beams without shear reinforcement that was closest to test results.

Identification and Modification of Dynamic Characteristics of Engine Mount System using Sensitivity Analysis (감도해석법을 이용한 엔진 마운트계의 동특성 규명 및 개선)

  • Oh, Jae-Eung;Choe, Sang-Ryoul;Jo, Jun-Ho;Lee, Jung-Hwan;Pack, Ho
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1992.10a
    • /
    • pp.25-30
    • /
    • 1992
  • 최근 전자계산기를 이용한 진동해석 방법이 눈부시게 발달하여, 일반 구조물 이나 기계 구조물 등의 동특성을 설계 단계에서 정도 높게 예측하는 것이 가능하게 되었다. 그러나 종래의 구조해석은 주어진 시스템의 동특성을 위한 것으로 얻어진 동특성으로부터 질량, 관성제원 및 스프링상수값 등의 설계상 수값을 규명하는 연구는 미미한 실정이다. 이것에 대한 해결방법으로 크게 해석적인 방법과 실험적인 방법으로의 접근이 있어 왔다. 해석적인 방법으로 유한요소해석에서 얻은 모드좌표를 물리좌표로 변환하는 방법으로 Guyan의 정축소와 같은 절점축소를 행하는 방법이 고찰되었다. 실험적인 방법으로 가 진실험에서 얻은 전달함수나 모드파라미터로부터 [M], [K] 행렬을 결정하는 연구가 있었지만 어떤것도 질량, 스프링상수 등의 설계상수를 완전히 규명하 지는 못하였다. 또한, 설계 단계에서 필요한 질량, 관성제원 또는 스프링상수 등의 최적한 값이나, 원하는 시스템특성을 얻을 수 있는 설계상수의 적정한 폭을 구하는 연구는 설계자의 경험과 반복된 시행착오에 의존하는 실정이다. 감도해석은 이러한 문제점을 개선하는 수단으로 설계변수에 대한 동특성의 변화율을 구하는 것이다. 감도해석을 수행하는 것은 어느 설계변수를 수정하 는 것이 주어진 동특성에 부합되는 지를 알려주고, 어느 것을 수정하는 것이 원하는 방향의 동특성변화에 가장 효과적인지를 알려주는 것이다. 따라서 감 도해석을 이용하여 설계의 최적화 프로그램을 만들수 있고, 이것은 설계자가 요구하는 동특성을 목적함수로 하여 주어진 구조물을 최적화하는 설계상수 값을 얻을 수 있게 한다. 본 논문에서는 강체모델의 동특성으로부터 모델의 설계 상수를 규명하고, 동특성의 개선을 위하여 설계변수의 변경량을 물리좌 표계에서 얻는것을 목적으로 한다. 강체 마운트계의 관성제원 및 마운트강성 의 규명을 위하여 임으로 주어진 설계상수를 모델데이타로 하여 관성제원과 스프링 강성을 구하였다. 관성제원의 규명은 주어진 모델의 관성값을 모르는 것으로 하여 임의의 초기 관성값으로 감도해석에 의해 주어진 계의 관성값 을 물리 좌표계에서 규명하였다. 마운트 강성의 규명도 관성제원의 규명과 같은 방법으로 임의의 강성값으로 감도해석을 하여 강성값을 규명하였다. 또 한 감도해석에 의한 동특성 변경은 특정한 고유진동 수의 변경이 필요할 때, 고유진동수의 이동을 위한 관성제원의 변경 및 마운트 강성변경값을 예측할 수 있다. 본 연구수행의 기본적인 흐름도는 Fig.1.1과 같다. 위와 같은 작업 으로 엔진 마운트와 같은 강체 모델의 시스템 규명을 행하는 경우에 유한요 소해석 및 가진 실험으로 얻은 고유진동수의 정보 또는 원하는 고유진동수 의 특성을 기본으로 실제 설계에서 사용이 가능하도록 물리 좌표계에서 관 성 제원 및 스프링상수를 구할 수 있을 것이다.

  • PDF

Efficient Skew Estimation for Document Images Based on Selective Attention (선택적 주의집중에 의한 문서영상의 효율적인 기울어짐 추정)

  • Gwak, Hui-Gyu;Kim, Su-Hyeong
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.10
    • /
    • pp.1193-1203
    • /
    • 1999
  • 본 논문에서는 한글과 영문 문서 영상들에 대한 기울어짐 추정(skew estimation) 알고리즘을 제안한다. 제안 방법은 전체 문서 영상에서 텍스트 요소들이 밀집되어 있는 영역을 선별하고, 선별된 영역에 대해 허프 변환을 적용하는 선택적 주의집중(selective attention) 방식을 채택한다. 제안 방법의 기울기 추정 과정은 2단계로 구성되는데, coarse 단계에서는 전체 영상을 몇 개의 영역으로 나누고 동일한 영역에 속하는 데이타들간의 연결 각도를 계산하여 각 영역별 accumulator에 저장한다. accumulator에 저장된 빈도치를 기준으로 $\pm$45$^{\circ}$범위 내에서 최대 $\pm$1$^{\circ}$의 오차를 가진 각 영역별 기울기를 계산한 후, 이들 중 최대 빈도값을 갖는 영역을 선정하고 그 영역의 기울기 각도를 문서 영상의 대략적인 기울기 각도로 결정한다. Refine 단계에서는 coarse 단계에서 선정된 영역에 허프 변환을 적용하여 정확한 기울기를 계산하는데, coarse 단계에서 추정한 기울기의 $\pm$1$^{\circ}$범위 내에서 0.1$^{\circ}$간격으로 측정한다. 이와 같은 선택적 주의집중 방식을 통해 기울기 추정에 소요되는 시간 비용은 최소화하고, 추정의 정확도는 최대화 할 수 있다.제안 방법의 성능 평가를 위한 실험은 다양한 형태의 영문과 한글 문서 영상 2,016개에 적용되었다. 제안 방법의 평균 수행 시간은 Pentium 200MHz PC에서 0.19초이고 평균 오차는 $\pm$0.08$^{\circ}$이다. 또한 기존의 기울기 추정 방법과 제안 방법의 성능을 비교하여 제안 방법의 우수성을 입증하였다.Abstract In this paper we propose a skew estimation algorithm for English and Korean document images. The proposed method adopts a selective attention strategy, in which we choose a region of interest which contains a cluster of text components and then apply a Hough transform to this region. The skew estimation process consists of two steps. In the coarse step, we divide the entire image into several regions, and compute the skew angle of each region by accumulating the slopes of lines connecting any two components in the region. The skew angle is estimated within the range of $\pm$45 degree with a maximum error of $\pm$1 degree. Next we select a region which has the most frequent slope in the accumulators and determine the skew angle of the image roughly as the angle corresponding to the most frequent slope. In the refine step, a Hough transform is applied for the selected region within the range of $\pm$1 degree along the angle computed from the coarse step, with an angular resolution of 0.1 degree. Based on this selective attention strategy, we can minimize the time cost and maximize the accuracy of the skew estimation.We have measured the performance of the proposed method by an experiment with 2,016 images of various English and Korean documents. The average run time is 0.19 second on a Pentium 200MHz PC, and the average error is $\pm$0.08 degree. We also have proven the superiority of our algorithm by comparing the performance with that of other well-known methods in the literature.

An Efficient Scheduling Method Taking into Account Resource Usage Patterns on Desktop Grids (데스크탑 그리드에서 자원 사용 경향성을 고려한 효율적인 스케줄링 기법)

  • Hyun Ju-Ho;Lee Sung-Gu;Kim Sang-Cheol;Lee Min-Gu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.7
    • /
    • pp.429-439
    • /
    • 2006
  • A desktop grid, which is a computing grid composed of idle computing resources in a large network of desktop computers, is a promising platform for compute-intensive distributed computing applications. However, due to reliability and unpredictability of computing resources, effective scheduling of parallel computing applications on such a platform is a difficult problem. This paper proposes a new scheduling method aimed at reducing the total execution time of a parallel application on a desktop grid. The proposed method is based on utilizing the histories of execution behavior of individual computing nodes in the scheduling algorithm. In order to test out the feasibility of this idea, execution trace data were collected from a set of 40 desktop workstations over a period of seven weeks. Then, based on this data, the execution of several representative parallel applications were simulated using trace-driven simulation. The simulation results showed that the proposed method improves the execution time of the target applications significantly when compared to previous desktop grid scheduling methods. In addition, there were fewer instances of application suspension and failure.

A Study on the Application Method of 3-Dimensional Modeling Data (3차원 모델 링 데이터의 활용방법에 관한 연구)

  • 김현성;김낙권
    • Archives of design research
    • /
    • v.14
    • /
    • pp.109-119
    • /
    • 1996
  • One of the most important factors in the work environment of the industrial design is the design process which can systematically synthesize the informations of related fields. Because the computer technology is being radically developed, industrial should not only positively be able to cope with new technologies, but also should positively be able to take part in the development of the integrated system for the process by the new technologies. Recently in the industrial design field, designers are often using the computer~applied-3D modeling techniques in the development process of industrial design products, especially in the visualization level of the design development. In this paper, we studied the workstation modeling process to understand the computer~applied-3D modeling and presented the methods of transfer of the 3D-modeling data of a workstation(SGI) to the AutoCAD data of a personal computer which is generally being used as a drawing tool in mechanism parts. Through the development process of an electronic taxi meter as a practical case study, we check the possibility whether the 3D-modeling data transferred from an industrial design part to a mechanism part can directly be used as the mechanism data. For this, we transferred the 3D-modeling data of an electronic taxi meter created with a workstation(SGI) to the AutoCAD data of a personal computer and checked the usefulness of data transferred from an industrial design part to a mechanism part. Through these processes of data transfer, we aimed to find out the basic principles which can be rationally applied to a mechanism part or a production part.

  • PDF

A Defect Prevention Model based on SW-FMEA (SW-FMEA 기반의 결함 예방 모델)

  • Kim Hyo-Young;Han Hyuk-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.7
    • /
    • pp.605-614
    • /
    • 2006
  • The success of a software development project can be determined by the use of QCD. And as a software's size and complexity increase, the importance of early quality assurance rises. Therefore, more effort should be given to prevention, as opposed to correction. In order to provide a framework for the prevention of defects, defect detection activities such as peer review and testing, along with analysis of previous defects, is required. This entails a systematization and use of quality data from previous development efforts. FMEA, which is utilized for system safety assurance, can be applied as a means of software defect prevention. SW-FMEA (Software Failure Mode Effect Analysis) attempts to prevent defects by predicting likely defects. Presently, it has been applied to requirement analysis and design. SW-FMEA utilizes measured data from development activities, and can be used for defect prevention on both the development and management sides, for example, in planning, analysis, design, peer reviews, testing, risk management, and so forth. This research discusses about related methodology and proposes defect prevention model based on SW-FMEA. Proposed model is extended SW-FMEA that focuses on system analysis and design. The model not only supports verification and validation effectively, but is useful for reducing defect detection.

Reordering Scheme of Location Identifiers for Indexing RFID Tags (RFID 태그의 색인을 위한 위치 식별자 재순서 기법)

  • Ahn, Sung-Woo;Hong, Bong-Hee
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.198-214
    • /
    • 2009
  • Trajectories of RFID tags can be modeled as a line, denoted by tag interval, captured by an RFID reader and indexed in a three-dimensional domain, with the axes being the tag identifier (TID), the location identifier (LID), and the time (TIME). Distribution of tag intervals in the domain space is an important factor for efficient processing of a query for tracing tags and is changed according to arranging coordinates of each domain. Particularly, the arrangement of LIDs in the domain has an effect on the performance of queries retrieving the traces of tags as times goes by because it provides the location information of tags. Therefore, it is necessary to determine the optimal ordering of LIDs in order to perform queries efficiently for retrieving tag intervals from the index. To do this, we propose LID proximity for reordering previously assigned LIDs to new LIDs and define the LID proximity function for storing tag intervals accessed together closely in index nodes when a query is processed. To determine the sequence of LIDs in the domain, we also propose a reordering scheme of LIDs based on LID proximity. Our experiments show that the proposed reordering scheme considerably improves the performance of Queries for tracing tag locations comparing with the previous method of assigning LIDs.

Cognitive Behavioral Therapy for Primary Insomnia: A Meta-analysis (만성 일차성 불면증 환자에게 적용한 인지행동중재의 효과: 메타분석)

  • Kim, Ji-Hyun;Oh, Pok-Ja
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.407-421
    • /
    • 2016
  • This paper reports a meta-analysis of sixteen studies that evaluated the efficacy of cognitive behavioral therapy (CBT) for persistent primary insomnia. PubMed, Cochrane Library, EMBASE, CINAHL and several Korean databases were searched between January 2015 and June 2015. The main search strategy involved the terms that indicate CBT-I (Cognitive Behavioral Therapy-Insomnia) and presence of insomnia. Methodological quality was assessed using Cochrane's Risk of Bias. Data were analyzed by the RevMan 5.3 program of Cochrane Library. Sixteen clinical trials met the inclusion criteria, resulting in a total of 1503 participants. Stimulus control, sleep restriction, sleep hygiene education, and cognitive restructuring were the main treatment components. CBT-I was conducted for a mean of 5.4 weeks, 5.5 sessions, and an average of 90 minutes per session. The effects of CBT-i on total sleep time (d=-0.31), sleep onset latency (d=-0.29), awakening time after sleep onset (d=-0.55), sleep efficiency (d=-0.70), insomnia severity (d=-0.77) and sleep belief (d=-0.64) were significant. Overall, we found a range from small to moderate effect size. CBT-I also was effective for anxiety (d=-0.30) and depression (d=-0.35). The findings demonstrate that CBT-I interventions will lead to the improvement of both sleep quality and quantity in patients with insomnia.

Assessment of BiomassProduction and Potential Energy of Major Bioenergy Crops (바이오에너지 작물의 에너지자원으로서 잠재적 가치 평가)

  • Ko, Byong-Gu;Kang, Kee-Kyung;Lee, Deog-Bae;Kim, Gun-Yeob;Hong, Suk-Young;Kim, Min-Kyeong;So, Kyu-Ho;Seo, Myung-Chul;Seo, Jong-Ho
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.42 no.6
    • /
    • pp.486-491
    • /
    • 2009
  • To evaluate the potential value of the major bioenergy crops which are wheat, canola, barley, corn, and sweet potato in Korea, we investigated the production of biomass and calorific value of crops, and also compared input and output factors among bioenergy crops during the cultivation period. There was difference between the biomass values in Agricultural and Forestry statistical yearbook(2006) and the one investigated in this experiment, also there was difference in crops and in species. Among the crops investigated, sweet potato(Jinhongmi, Yulmi) was shown the highest amount of biomass production and corn(Gangdaok) was shown the highest amount of the total biomass which is the total aboveground biomass at harvest. Oilseed canola which is presently a major source of bio-diesel had highest calorific value as $6,673{\sim}6,725cal\;g^{-1}$. Wheat and corn grains which are source of bio-ethanol were in the range of $3,879{\sim}4,317cal\;g^{-1}$. Gangdaok(Corn) produce the highest total calorific value in unit cultivating area among the crops as $8,263kcal\;m^{-2}$. Corn was shown that the input and output factors were the highest level among bioenergy crops during cultivation period. Sweet potato also was shown that output factor was the highest level though its input factors were average level. It is needed to be investigated more crops for collecting the higher potential value of bioenergy production further considering small land area and its effective utilization in Korea.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.