• Title/Summary/Keyword: 설계 오류

Search Result 1,322, Processing Time 0.029 seconds

Development of Road Bridge Information Management System based on Internet (교량 현황정보 관리를 위한 인터넷 기반 정보시스템 개발)

  • Park, Kyung-Hoon;Sun, Jong-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.716-723
    • /
    • 2016
  • A computerized information management system of road bridges as a national key infrastructure is needed to effectively collect data of the current status, improve the reliability of data, and use the results from the analysis of the accumulated data as fundamental resources for supporting the establishment of policies. The Internet-based Bridge Information System (BIS), including a database and geographic information systems (GIS), was designed, and the data items were comprised of essential information, such as GIS-based location coordinates, bridge condition grade information and so on. The BIS was developed to be connected with a related information system, and it is possible to make the current information of traffic volume, address and so on by adopting the GIS. To enhance the reliability of the information of current bridge status, it is also possible to improve the accuracy of data through an information verifying function to prevent entry errors. In addition, the BIS can easily support the establishment of policies offering various types of knowledge information that were available in the past based on an analysis of the accumulated data. The intuitive identification and analysis of the current status is to be feasible through a GIS screen. Improvement of the business efficiency and data accuracy and time-series information analysis are available by managing the information of current status through BIS. In the future, it is expected that BIS can be used effectively for the establishment of reasonable maintenance policies of the nation.

Methods for Enhancing Reliability of On-Ground IoT Applications (지상용 IoT 애플리케이션의 신뢰성 향상 기법)

  • Shin, Dong Ha;Han, Seung Ho;Kim, Soo Dong;Her, Jin Sun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.151-160
    • /
    • 2015
  • Internet-of-Things(IoT) is the computing environment to provide valuable services by interacting with multiple devices, where diverse devices are connected within the existing Internet infrastructure and acquire context information by sensing. As the concern of IoT has been increased recently, most of the industries develop many IoT devices. And, many people are focused on the IoT application that is utilizing different technologies, which are sensor network, communication technologies, and software engineering. Developing on-ground IoT application is especially even more active in progress depending on increasing of on-ground IoT devices because it is possible for them to access dangerous and inaccessible situation. However, There are a few studies related IoT. Moreover, since on-ground IoT application, which is different from typical software application, has to consider device's characteristics, communication, and surround condition, it reveal challenges, decreasing reliability. Therefore, in this paper, we analyze reliability challenges related to maturity and fault tolerance, one of reliability attributes, occurring in developing on-ground IoT applications and suggest the effective solutions to resolve the challenges. To verify proposed the challenges and solutions, we show result that is applying the solutions to applications. By presenting the case study, we evaluate the effectiveness of applying the solutions to the application.

Improvement of Public Announcement of Topographical Drawing for Linear-Type Infrastructure (선형형태 사회기반시설물의 지형도면 고시 개선방안)

  • Moon, Jung Kyun;Kwon, Hun Yeong;Cho, Hyoung Sig;Sohn, Hong Gyoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.4
    • /
    • pp.1327-1334
    • /
    • 2014
  • Linear form of public works such as roads, railways and rivers, generally used as long work crossing administrative districts, can be several hundreds km length and narrow. These linear forms use SCM sheets, which do not include the quadrangle shape, to make a public announcement of topographical drawing in order to get the work approval. the Integrated measurement channel investigation and cadastral act that are established in 2009 apply the ITRF for the composition of design and construction books and coordinates of topographical map in order to get the work approval. However according to the article 5 of additional clause, while the cadastre is maintaining local coordinates, if there is a technical error in the content of the Public Announcement of Topographical Drawing that used the SCM, the question of responsibility of land borders and the efficacy or not of the announcement is raised as an administrative measure. After analysing the causes and enforcing coordinate conversion and correction taking into account linear form work's features, the result was reflected in the existing SCM. As a conclusion, the present study proposes the improvement of the procedures of the Public Announcement of Topographical Drawing.

Multi-FNN Identification by Means of HCM Clustering and ITs Optimization Using Genetic Algorithms (HCM 클러스터링에 의한 다중 퍼지-뉴럴 네트워크 동정과 유전자 알고리즘을 이용한 이의 최적화)

  • 오성권;박호성
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.5
    • /
    • pp.487-496
    • /
    • 2000
  • In this paper, the Multi-FNN(Fuzzy-Neural Networks) model is identified and optimized using HCM(Hard C-Means) clustering method and genetic algorithms. The proposed Multi-FNN is based on Yamakawa's FNN and uses simplified inference as fuzzy inference method and error back propagation algorithm as learning rules. We use a HCM clustering and Genetic Algorithms(GAs) to identify both the structure and the parameters of a Multi-FNN model. Here, HCM clustering method, which is carried out for the process data preprocessing of system modeling, is utilized to determine the structure of Multi-FNN according to the divisions of input-output space using I/O process data. Also, the parameters of Multi-FNN model such as apexes of membership function, learning rates and momentum coefficients are adjusted using genetic algorithms. A aggregate performance index with a weighting factor is used to achieve a sound balance between approximation and generalization abilities of the model. The aggregate performance index stands for an aggregate objective function with a weighting factor to consider a mutual balance and dependency between approximation and predictive abilities. According to the selection and adjustment of a weighting factor of this aggregate abjective function which depends on the number of data and a certain degree of nonlinearity, we show that it is available and effective to design an optimal Multi-FNN model. To evaluate the performance of the proposed model, we use the time series data for gas furnace and the numerical data of nonlinear function.

  • PDF

Development of the GIS Method for Extracting a Specific Geomorphic Surface of Coastal Terrace at Gampo Area, Southeastern Coast in Korea (GIS를 이용한 해안단구 지형면 분류 기법 연구 - 감포지역을 사례로 -)

  • 박한산;윤순옥;황상일
    • Journal of the Korean Geographical Society
    • /
    • v.36 no.4
    • /
    • pp.458-473
    • /
    • 2001
  • The classified map of geomorphic surfaces is the most basic data for the geomorphological research. Up to recent days, the traditional methods extracting specific geomorphic surfaces are accomplished by analyzing the aerial photographs and topographical maps, and field works. Also it needs a lot of time and expertness. Furthermore it is difficult to gain the aerial photographs in Korea. Since digital maps in Korean Peninsula are almost completed recently, we tried to extract specific surfaces by analyzing the characteristics of marine terraces based on the level of paleoshoreline and slope analysis on the terrace surface using GIS. However, research used GIS was hardly found up to date, therefore many problems are not be solved yet. The aim of this study is to develop the more efficient and objective method for the extraction and classification of specific geomorphic surfaces by using GIS in Gampo-eup, Gyeongju city, Southeastem Coast in Korea, where a lot of traditional research has already accomplished. For this aim, we have designed the process of extracting specific geomorphic surfaces, chosen the factors that was Gyeongiu city, Southeastem Coast in Korea, where a lot of traditional research has already accomplished. For this aim, we have designed the process of extracting specific geomorphic surfaces, chosen the factors that was suitable for classification of specific geomorphic surface, and presented method of setting up optimum criteria of extraction. As last, effectiveness and problems of these methods were investigated through conincidence rate and error rate.

  • PDF

Design and Performance Analysis of a new MAC Protocol for Providing Real-time Traffic Information using USN (USN 기반 실시간 주행 상황 정보 제공을 위한 MAC 설계 및 성능 분석)

  • Park, Man-Kyu;So, Sang-Ho;Lee, Jae-Yong;Lim, Jae-Han;Son, Myung-Hee;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.5
    • /
    • pp.38-48
    • /
    • 2007
  • In ubiquitous environment, sensor networks that sense and transmit surrounding data without human intervention will become more important. If sensors are installed for detecting vehicles and measuring their speed in the road and that real-time information is given to drivers, it will be very effective for enhancing safety and controlling traffic in the road. In this paper, we proposed a new reliable and real-time sensor MAC protocol between AP and sensor nodes in order to provide real-time traffic flow information based on ubiquitous sensor networks. The proposed MAC allocates one TDMA slot for each sensor node on the IEEE 802.15.4 based channel structure, introduces relayed communication for distant sensors, and adopts a frame structure that supports retransmission for the case of errors. In addition, the proposed MAC synchronizes with AP by using beacon and adopts a hybrid tracking mode that supports economic power consumption according to various traffic situations, We implemented a simulator for the proposed MAC by using sim++ and evaluated various performances. The simulation results show that the proposed MAC reduces the power consumption and reveals excellent performance in real-time application systems.

재료 동적영향을 고려한 주냉각재 배관 LBB 적용시 Dynamic Strain Aging의 영향 분석

  • 양준석;박치용;정우태;유기완;김진원
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1998.05b
    • /
    • pp.305-311
    • /
    • 1998
  • 최근들어 고려된 LBB(Leak Before Break) 적용요건중 동적파괴시힘 절차에는 울진 3&4호기 이후 파단전누설개념이 적용되는 배관이 탄소강으로 제작될 경우. 이 배관이 Dynamic Strain Aging (DSA)에 의해 파괴저항치가 감소되지 않는다는 것이 정량적으로 입증되지 않는 한, 동 배관의 파괴 물성치 결정시 DSA의 영향이 고려되어야 하며, DSA 영향을 평가하기 위해서는 동적과괴시험이 수행되어야 함을 요건화 하고 있다. 본 연구에서는 DSA 효과에 의한 파괴저항(J-R) 특성의 저하가차세대원전 원자로냉각재배관 파단전누설개넘(LBB) 적용시 설계 안전여유도에 영향을 미치지 않는 정도임을 평가하는데 있다. 따라서 ASME Section III에서 탄소강으로 분류하고 있는 강종별 파괴인성 변화를 고찰하고, 차세대원전 주냉각재배관 재료인 SA508 Class la의 최대 파괴인성 감소치를 예측하여, 울진 3&4호기에서 측정된 엘보우용 SA516-Gr.70 강의 DSA 영향 평가 결과와 비교 분석하여 차세대원전 주냉각재배관의 DSA영향을 평가하였다. 도출된 결론으로는 DSA 영향을 고려한 SA508 Class la의 J 및 dJ/dA 값은 극히 보수적으로 추정할 때 50% 이상 감소하는 것으로 예측된다. 이러한 DSA 영향을 고려하였을 경우 배관재 모재의 파괴인성치는 Weld-SAW의 J/T 값 수준으로 감소하였다. 그러나 현 LRB 해석이 가장 낮은 J/T값을 갖는 Weld-SAW Auto의 균열길이 2a인 J/T선도에 의거하여 수행되고 있다는 점을 고려한다면 비록 DSA가 배관재에 영향을 주는 가장 보수적인 값(J 및 dJ/dA값을 50% 이상)을 사용한다고 하더라도 차세대원전 LBB 적용에 문제가 되지 않음을 알 수 있다. 즉 차세대원자로 주냉각재배관에 LBB를 적용하는데는 DSA 영향은 상대적으로 중요하지 않다는 결론을 얻었다. 표면에 수소화물이 농축되어 있는 hydride layer가 형성됨을 관찰하였으며 ~5,000ppm 이상의 경우에는 수소화물의 방향성이 random하였으며 특히, ZIRLO$^{TM}$ 시편의 경우에서는 원주방향으로 길게 이어진 수소화물과 기계적 성질에 치명적인 반경방향의 수소화물이 평행하게 배열된 것을 관찰하였다.하였을 때는 Li$_2$O의 첨가에 의해 치밀화가 주로 일어났고, 반면에 $N_2$-7vol.%H$_2$ 분위기에서 소결하면 Li$_2$O의 첨가에 의해 작은 기공은 소멸되고 큰 기공이 생성되었다.지나치게 모국어의 영향만 강조하고 다른 요인들에 대해서는 다분히 추상적인 언급으로 끝났지만 이 분석을 통 해서 배경어, 목표어, 특히 중간규칙의 역할이 괄목할 만한 것임을 가시적으로 관찰할 수 있 다. 이와 같은 오류분석 방법은 학습자의 모국어 및 관련 외국어의 음운규칙만 알면 어느 학습대상 외국어에라도 적용할 수 있는 보편성을 지니는 것으로 사료된다.없다. 그렇다면 겹의문사를 [-wh]의리를 지 닌 의문사의 병렬로 분석할 수 없다. 예를 들어 누구누구를 [주구-이-ν가] [누구누구-이- ν가]로부터 생성되었다고 볼 수 없다. 그러므로 [-wh] 겹의문사는 복수 의미를 지닐 수 없 다. 그러면 단수 의미는 어떻게 생성되는가\ulcorner 본 논문에서는 표면적 형태에도 불구하고 [-wh]의미의 겹의문사는 병렬적 관계의 합성어가 아니라 내부구조를 지니지 않은 단순한 단어(minimal $X^{0}$ elements)로 가정한다. 즉, [+wh] 의미의 겹의문사는 동일한 구성요 소를 지닌 병렬적 합성어([$[W1]_{XO-}$ $[W1]_{XO}$ ]$_{XO}$)로

  • PDF

Numerical analysis of pre-reinforced zones in tunnel considering the time-dependent grouting performance (터널 사전보강영역의 경시효과를 고려한 수치해석 기법에 관한 연구)

  • Song, Ki-Il;Kim, Joo-Won;Cho, Gye-Chun
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.9 no.2
    • /
    • pp.109-120
    • /
    • 2007
  • Auxiliary support systems such as the reinforced protective umbrella method have been applied before tunnel excavation to increase ground stiffness and to prevent the large deformation. However, determination procedure of geotechnical parameters along the construction sequence contains various errors. This study suggests a method to characterize the time-dependent behavior of pre-reinforced zones around the tunnel using elastic waves. Experimental results show that shear strength as well as elastic wave velocities increase with the curing time. Shear strength and strength parameters can be uniquely correlated to elastic wave velocities. Obtained results from the laboratory tests are applied to numerical simulation of tunnel considering its construction sequences. Based on numerical analysis, initial installation part of pre-reinforcement and portal of tunnel are critical for tunnel stability. Result of the time-dependent condition is similar to the results of for $1{\sim}2$ days of the constant time conditions. Finally, suggested simple analysis method combining experimental and numerical procedure which considering time-dependent behavior of pre-reinforced zone on tunnel would provide reliable and reasonable design and analysis for tunnel.

  • PDF

Automatic Merging of Distributed Topic Maps based on T-MERGE Operator (T-MERGE 연산자에 기반한 분산 토픽맵의 자동 통합)

  • Kim Jung-Min;Shin Hyo-Pil;Kim Hyoung-Joo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.9
    • /
    • pp.787-801
    • /
    • 2006
  • Ontology merging describes the process of integrating two ontologies into a new ontology. How this is done best is a subject of ongoing research in the Semantic Web, Data Integration, Knowledge Management System, and other ontology-related application systems. Earlier research on ontology merging, however, has studied for developing effective ontology matching approaches but missed analyzing and solving methods of problems of merging two ontologies given correspondences between them. In this paper, we propose a specific ontology merging process and a generic operator, T-MERGE, for integrating two source ontologies into a new ontology. Also, we define a taxonomy of merging conflicts which is derived from differing representations between input ontologies and a method for detecting and resolving them. Our T-MERGE operator encapsulates the process of detection and resolution of conflicts and merging two entities based on given correspondences between them. We define a data structure, MergeLog, for logging the execution of T-MERGE operator. MergeLog is used to inform detailed results of execution of merging to users or recover errors. For our experiments, we used oriental philosophy ontologies, western philosophy ontologies, Yahoo western philosophy dictionary, and Naver philosophy dictionary as input ontologies. Our experiments show that the automatic merging module compared with manual merging by a expert has advantages in terms of time and effort.

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.