• Title/Summary/Keyword: 물리기반 시뮬레이션

Search Result 394, Processing Time 0.022 seconds

Development of Monte Carlo Simulation Code for the Dose Calculation of the Stereotactic Radiosurgery (뇌 정위 방사선수술의 선량 계산을 위한 몬테카를로 시뮬레이션 코드 개발)

  • Kang, Jeongku;Lee, Dong Joon
    • Progress in Medical Physics
    • /
    • v.23 no.4
    • /
    • pp.303-308
    • /
    • 2012
  • The Geant4 based Monte Carlo code for the application of stereotactic radiosurgery was developed. The probability density function and cumulative density function to determine the incident photon energy were calculated from pre-calculated energy spectrum for the linac by multiplying the weighting factors corresponding to the energy bins. The messenger class to transfer the various MLC fields generated by the planning system was used. The rotation matrix of rotateX and rotateY were used for simulating gantry and table rotation respectively. We construct accelerator world and phantom world in the main world coordinate to rotate accelerator and phantom world independently. We used dicomHandler class object to convert from the dicom binary file to the text file which contains the matrix number, pixel size, pixel's HU, bit size, padding value and high bits order. We reconstruct this class object to work fine. We also reconstruct the PrimaryGeneratorAction class to speed up the calculation time. because of the huge calculation time we discard search process of the ThitsMap and used direct access method from the first to the last element to produce the result files.

An Efficient SLC Transition Method for Improving Defect Rate and Longer Lifetime on Flash Memory (플래시 메모리 상에서 불량률 개선 및 수명 연장을 위한 효율적인 단일 비트 셀 전환 기법)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.81-86
    • /
    • 2023
  • SSD (solid state disk), which is flash memory-based storage device, has the advantages of high density and fast data processing. Therefore, it is being utilized as a storage device for high-capacity data storage systems that manage rapidly increasing big data. However, flash memory, a storage media, has a physical limitation that when the write/erase operation is repeated more than a certain number of times, the cells are worn out and can no longer be used. In this paper, we propose a method for converting defective multi-bit cells into single-bit cells to reduce the defect rate of flash memory and extend its lifetime. The proposed idea distinguishes the defects and treatment methods of multi-bit cells and single-bit cells, which have different physical characteristics but are treated as the same defect, and converts the expected defective multi-bit cells into single-bit cells to improve the defect rate and extend the overall lifetime. Finally, we demonstrate the effectiveness of our proposed idea by measuring the increased lifetime of SSD through simulations.

A Study on Object Recognition Technique based on Artificial Intelligence (인공지능 기반 객체인식 기법에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, in order to build a cyber physical system(CPS) that is a technology related to the 4th industry, the construction of the virtual control system for physical model and control circuit simulation is increasingly required in various industries. It takes a lot of time and money to convert documents that are not electronically documented through direct input. For this, it is very important to digitize a large number of drawings that have already been printed through object recognition using artificial intelligence. In this paper, in order to accurately recognize objects in drawings and to utilize them in various applications, a recognition technique using artificial intelligence by analyzing the characteristics of objects in drawing was proposed. In order to improve the performance of object recognition, each object was recognized and then an intermediate file storing the information was created. And the recognition rate of the next recognition target was improved by deleting the recognition result from the drawing. In addition, the recognition result was stored as a standardized format document so that it could be utilized in various fields of the control system. The excellent performance of the technique proposed in this paper was confirmed through the experiments.

A Transaction Scheme for Managing Mobile Units in Wireless Environments: A Case of Airport Safety Control (무선환경에서의 이동객체 관리를 위한 통제기법: 공항 안전통제 업무를 중심으로)

  • Kim, Yong-Jae;Ahn, Hyun-Sup;Lee, Seog-Jun;Hyun, Doo-Woon;Choi, Yong-Goo;Lee, Sang-Won
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.309-327
    • /
    • 2008
  • This research is a byproduct of a project initiated by a major airport in Korea. The airport aimed to enhance airside safety and weighed a few IT options that may strengthen its current safety practices. In order to satisfy requirements unique to the airport and to inherit existing legacy systems, a PCS-based mobile database system was proposed. We first discuss technical aspects of the system as well as design issues in mobile systems before we compare two specific alternatives for transactional service handoff. A simulation study comparing two types of coordination follows before we present a scheme that manages transaction processing and locating service in mobile environments. Finally, we discuss the limitations of the scheme from the perspectives of the airport in question along with other research issues.

3D Spatial Distribution Modeling for Petrophysical Property of Gas Hydrate-Bearing Sediment using Well Data in Ulleung Basin (울릉분지 시추공 분석 자료를 이용한 가스하이드레이트 함유층의 3차원 공간 물성 분포 추정)

  • Lee, Dong-Gun;Shin, Hyo-Jin;Lim, Jong-Se
    • Journal of Energy Engineering
    • /
    • v.22 no.2
    • /
    • pp.156-168
    • /
    • 2013
  • Drilling expedition #1 in 2007 and drilling expedition #2 in 2010 were performed for gas hydrate resources evaluation and optimal site selection of pilot test in Ulleung basin, East Sea, Korea. This study presents to build the 3D spatial distribution models using the estimated sedimentary facies, porosity, and gas hydrate saturation derived by well logs and core analysis data from UBGH1-4, UBGH1-9, UBGH1-10, UBGH1-14, UBGH2-2-1, UBGH2-2-2, UBGH2-6, UBGH2-9, UBGH2-10 and UBGH2-11. The objective of 3D spatial distribution modeling is to build a geological representation of the gas hydrate-bearing sediment that honors the heterogeneity in 3D grid scale. The facies modeling is populating sedimentary facies into a geological grid using sequential indicator simulation. The porosity and gas hydrate saturation modeling used sequential Gaussian simulation to populate properties stochastically into grid cells.

A Design and Simulation of Mobile RFID Contents Expression Language for Bus Guidance Services (버스 안내 서비스를 위한 모바일 RFID 컨텐츠 표현 언어 설계 및 시뮬레이션)

  • Yeon Dong-Hee;Kim Yong-Woon;Yoo Sang-Keun;Lee Jun-Seob;Kim Hyoung-Jun;Jung Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1432-1438
    • /
    • 2005
  • The RFID (Radio Frequency Identification) technology is a non-contact identification system which can wireless reading of information, by attaching tags on objects; various applications of the technology are feasible throughout a dive of industries, and researches are currently under way. Recently, in connection with the wireless communication industry, application service models conveying information to the users through mobile devices with RFID readers were suggested. Such application service based on mobile RFID technology requires schema that models the form of data. Therefore, this study analyzes the mobile RFID application service model that will be serviced in the mobile environment, functions and elements of the protocol, and the interface, designing a language to process the data and express contents in the said service models, and we simulated the service for test it.

Analyzing Traffic Impacts of the Utilitarian Robotic Autonomous Vehicle (자율주행차량의 윤리적 문제 점검을 위한 시뮬레이션 연구)

  • Im, I-Jeong;Kim, Kwan-Yong;Lee, Ja-Young;Hwang, Kee-Yeon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.2
    • /
    • pp.55-72
    • /
    • 2017
  • Autonomous Vehicles(AV) are considered as an alternative to solve various social problems. Many researches which are related to developing technologies and AV operations have been conducted vastly and on-going. However, there seem to be little studies on various influences of AI algorithm on driving installed in AV. This study aims to examine the impacts of the ethical decisions made by Utilitarianism-based AI in AV when the oncoming car crossed over the central line. It establishes scenarios about situation of encroaching a central line and analyzes traffic impacts of ethical decision made by AV. According to the results of the analyses, as th accident occurs, overall speed of traffic decrease. There is a negative impact on the traffic flow when AV made an Utilitarian-based ethical decision by changing the lane. However, when AV choose to collide head-on, there is a positive effect to relieve traffic flow with an assistance of CACC, equipped.

Physics-based Salvage Simulation for Wrecked Ship Considering Environmental Loads (환경 하중을 고려한 침몰 선체의 물리 기반 인양 시뮬레이션)

  • Ham, Seung-Ho;Roh, Myung-Il;Kim, Ju-Sung;Lee, Hye-Won;Ha, Sol
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.52 no.5
    • /
    • pp.387-394
    • /
    • 2015
  • Before salvaging a wrecked ship, the physics-based simulation is needed to predict lifting force before real operation by floating crane or barge. Procedures affecting lifting force for the salvage can be divided into three stages. At the first stage, the bottom breakout force for the wrecked ship to escape from seabed sediment should be calculated. At the second step, the current force acting on the wrecked ship while lifting from the seabed to near sea surface should be considered. Finally, buoyancy change near at the sea surface when the wrecked ship start to escape from the water should be considered. In the previous studies, only the breakout force at the first stage was calculated based on simple assumption of embedment depth and contact area of the wrecked ship. Therefore, we develop a program for salvage simulation including whole stages. It is composed of four modules such as the equations of motion, time integration, force calculation, and visualization. As a result, it is applied to simulate lifting the wrecked ship according to various environmental loads including seabed sediments.

SoFA: A Distributed File System for Search-Oriented Systems (SoFA: 검색 지향 시스템을 위한 분산 파일 시스템)

  • Choi, Eun-Mi;Tran, Doan Thanh;Upadhyaya, Bipin;Azimov, Fahriddin;Luu, Hoang Long;Truong, Phuong;Kim, Sang-Bum;Kim, Pil-Sung
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.229-239
    • /
    • 2008
  • A Distributed File System (DFS) provides a mechanism in which a file can be stored across several physical computer nodes ensuring replication transparency and failure transparency. Applications that process large volumes of data (such as, search engines, grid computing applications, data mining applications, etc.) require a backend infrastructure for storing data. And the distributed file system is the central component for such storing data infrastructure. There have been many projects focused on network computing that have designed and implemented distributed file systems with a variety of architectures and functionalities. In this paper, we describe a complete distributed file system which can be used in large-scale search-oriented systems.

  • PDF

A Key Redistribution Method for Enhancing Energy Efficiency in Dynamic Filtering based Sensor Networks (동적 여과 기법 기반 센서 네트워크의 에너지 효율을 높이기 위한 키 재분배 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.125-131
    • /
    • 2010
  • In wireless sensor networks application, sensor nodes are randomly deployed in wide and opened environment typically. Since sensor networks have these features, it is vulnerable to physical attacks in which an adversary can capture deployed nodes and use them to inject a fabricated report into the network. This threats of network security deplete the limited energy resource of the entire network using injected fabricated reports. A dynamic en-route filtering scheme is proposed to detect and drop the injected fabricated report. In this scheme, node executes the key redistribution to increases the detection power. It is very important to decide the authentication key redistribution because a frequent key redistribution can cause the much energy consumption of nodes. In this paper, we propose a key redistribution determining method to enhance the energy efficiency and maintain the detection power of network. Each node decides the authentication key redistribution using a fuzzy system in a definite period. The proposed method can provide early detection of fabricated reports, which results in energy-efficiency against the massive fabricated report injection attacks.