• Title/Summary/Keyword: 시뮬레이션 기반 획득

Search Result 274, Processing Time 0.051 seconds

Finite Element Model Updating Based on Data Fusion of Acceleration and Angular Velocity (가속도 및 각속도 데이터 융합 기반 유한요소모델 개선)

  • Kim, Hyun-Jun;Cho, Soo-Jin;Sim, Sung-Han
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.19 no.2
    • /
    • pp.60-67
    • /
    • 2015
  • The finite element (FE) model updating is a commonly used approach in civil engineering, enabling damage detection, design verification, and load capacity identification. In the FE model updating, acceleration responses are generally employed to determine modal properties of a structure, which are subsequently used to update the initial FE model. While the acceleration-based model updating has been successful in finding better approximations of the physical systems including material and sectional properties, the boundary conditions have been considered yet to be difficult to accurately estimate as the acceleration responses only correspond to translational degree-of-freedoms (DOF). Recent advancement in the sensor technology has enabled low-cost, high-precision gyroscopes that can be adopted in the FE model updating to provide angular information of a structure. This study proposes a FE model updating strategy based on data fusion of acceleration and angular velocity. The usage of both acceleration and angular velocity gives richer information than the sole use of acceleration, allowing the enhanced performance particularly in determining the boundary conditions. A numerical simulation on a simply supported beam is presented to demonstrate the proposed FE model updating approach.

Stopping Power Ratio Estimation Method Based on Dual-energy Computed Tomography Denoising Images for Proton Radiotherapy Planning (양성자치료계획을 위한 이중에너지 전산화단층촬영 잡음 제거 영상 기반 저지능비 추정 방법)

  • Byungdu Jo
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.2
    • /
    • pp.207-213
    • /
    • 2023
  • Computed tomography (CT) images are used as the basis for proton Bragg peak position estimation and treatment plan simulation. During the Hounsfield Unit (HU) based proton stopping power ratio (SPR) estimation, small differences in the patient's density and elemental composition lead to uncertainty in the Bragg peak positions along the path of the proton beam. In this study, we investigated the potential of dual-energy computed tomography image-based proton SPRs prediction accuracy to reduce the uncertainty of Bragg peak position prediction. Single- and dual-energy images of an electron density phantom (CIRS Model 062M electron density phantom, CIRS Inc., Norfolk, VA, USA) were acquired using a computed tomography system (Somatom Definition AS, Siemens Health Care, Forchheim, Germany) to estimate the SPRs of the proton beam. To validate the method, it was compared to the SPRs estimated from standard data provided by the National Institute of Standards and Technology (NIST). The results show that the dual-energy image-based method has the potential to improve accuracy in predicting the SPRs of proton beams, and it is expected that further improvements in predicting the position of the proton's Bragg peak will be possible if a wider variety of substitutes with different densities and elemental compositions of the human body are used to predict the SPRs.

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.

Power Allocation and Splitting Algorithm for SWIPT in Energy Harvesting Networks with Channel Estimation Error (채널 추정 오차가 존재하는 에너지 하베스팅 네트워크에서 SWIPT를 위한 파워 할당 및 분할 알고리즘)

  • Lee, Kisong;Ko, JeongGil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1277-1282
    • /
    • 2016
  • In the next generation wireless communication systems, an energy harvesting from radio frequency signals is considered as a method to solve the lack of power supply problem for sensors. In this paper, we try to propose an efficient algorithm for simultaneous wireless information and power transfer in energy harvesting networks with channel estimation error. At first, we find an optimal channel training interval using one-dimensional exhaustive search, and estimate a channel using MMSE channel estimator. Based on the estimated channel, we propose a power allocation and splitting algorithm for maximizing the data rate while guaranteeing the minimum required harvested energy constraint, The simulation results confirm that the proposed algorithm has an insignificant performance degradation less than 10%, compared with the optimal scheme which assumes a perfect channel estimation, but it can improve the data rate by more than 20%, compared to the conventional scheme.

Bio-Inspired Routing Protocol for Mobile Ad Hoc Networks (이동 애드혹 네트워크를 위한 생체모방 라우팅 프로토콜)

  • Choi, Hyun-Ho;Roh, Bongsoo;Choi, HyungSeok;Lee, Jung-Ryun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2205-2217
    • /
    • 2015
  • Bio-inspired routing protocol uses a principle of swarm intelligence, which finds the optimal path to the destination in a distributed and autonomous way in dynamic environments, so that it can maximize routing performances, reduce control overhead, and recover a path failure quickly according to the change of network topology. In this paper, we propose a bio-inspired routing protocol for mobile ad hoc networks. The proposed scheme uses a function of overhearing via wireless media in order to obtain the routing information without additional overhead. Through overhearing, the pheromone is diffused around the shortest path between the source and destination. Based on this diffused pheromone, a probabilistic path exploration is executed and the useful alternative routes between the source and destination are collected. Therefore, the proposed routing protocol can ensure the up-to-date routing information while reducing the control overhead. The simulation results show that the proposed scheme outperforms the typical AODV and AntHocNet protocols in terms of routing performances and significantly decreases the routing overhead against the AntHocNet.

An End-to-End Mobility Support Mechanism based on mSCTP (mSCTP를 이용한 종단간 이동성 지원 방안)

  • 장문정;이미정;고석주
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.393-404
    • /
    • 2004
  • Recently, mSCTP (Mobile SCTP) has been proposed as a transport layer approach for supporting mobility. mSCTP is based on the ‘multi-homing’ feature of Stream Control Transmission Protocol(SCTP), and utilize the functions to dynamically add or delete IP addresses of end points to or from the existing connectionin order to support mobility. In this paper, we propose a mechanism to determine when to add or delete an W address, utilizing the link layer radio signal strength information in order to enhance the performance of mSCTP We also propose a mechanism for a mobile node to initiate the change of data delivery path based on link layer radio signal strength information. In addition, if it takes long time to acquire new data path, we propose an approach for reducing handover latency. The simulation results show that the performance of proposed transport layer mobility support mechanism is competitive compared to the traditional network layer mobility supporting approach. Especially, when the moving speed of mobile node is fast, it shows better performance than the traditional network layer approaches.

A Study on the Implementation and Operation of an Architecture-Based M&S System for Ministry of National Defense (아키텍처 기반의 국방 Modeling & Simulation 체계 구축 및 운영에 관한 연구)

  • Kim, Hyoung Jin;Park, Chan Uk
    • Informatization Policy
    • /
    • v.18 no.1
    • /
    • pp.73-99
    • /
    • 2011
  • The Korean military has developed and operated computer, network, communication technologies as well as war game models to strengthen the national defense M&S continuously. In particular, lots of projects for developing models for drill/training, analyses, and acquired fields are being conducted in the military. However, it needs to look into the actual conditions and seek for strategies to develop the national defense M&S. First of all, in the field of war games, various national defense architectures have been built, including war and information environment architectures starting from the resource architecture in 2006. However, the function of drill and training is limited, so additional war game architectures are required to be built. To build joint war game architectures available as an effective verification tool to implement plans of the national defense and war architectures, this study examines the actual conditions of the current war game systems and suggested building joint war game architectures.

  • PDF

Smoke Detection Based on RGB-Depth Camera in Interior (RGB-Depth 카메라 기반의 실내 연기검출)

  • Park, Jang-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.155-160
    • /
    • 2014
  • In this paper, an algorithm using RGB-depth camera is proposed to detect smoke in interrior. RGB-depth camera, the Kinect provides RGB color image and depth information. The Kinect sensor consists of an infra-red laser emitter, infra-red camera and an RGB camera. A specific pattern of speckles radiated from the laser source is projected onto the scene. This pattern is captured by the infra-red camera and is analyzed to get depth information. The distance of each speckle of the specific pattern is measured and the depth of object is estimated. As the depth of object is highly changed, the depth of object plain can not be determined by the Kinect. The depth of smoke can not be determined too because the density of smoke is changed with constant frequency and intensity of infra-red image is varied between each pixels. In this paper, a smoke detection algorithm using characteristics of the Kinect is proposed. The region that the depth information is not determined sets the candidate region of smoke. If the intensity of the candidate region of color image is larger than a threshold, the region is confirmed as smoke region. As results of simulations, it is shown that the proposed method is effective to detect smoke in interior.

Spyware detection system related to wiretapping based on android power consumption and network traffics (안드로이드 소비 전력 및 네트워크 트래픽을 기반으로 한 도청 관련 스파이웨어 탐지 시스템)

  • Park, Bum-joon;Lee, Ook;Cho, Sung-phil;Choi, Jung-woon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.829-838
    • /
    • 2015
  • As the number of smartphone users have increased, many kinds of malwares have emerged. Unlike existing malwares, spyware can be installed normally after user authentication and agreement according to security policy. For this reason, it is not easy to catch spywares involving harmful functionalities to users by using existing malware detection system. Therefore, our paper focuses on study about detecting mainly wiretapping spywares among them by developing a new wiretapping detection model and application. Specifically, this study conducts to find out power consumption on each application and modular and network consumption to detect voice wiretapping so Open Source Project Power Tutor is used to do this. The risk assessment of wiretapping is measured by gathered all power consumption data from Open Source Project Power Tutor. In addition, developed application in our study can detect at-risk wiretapping spyware through collecting and analyzing data. After we install the application to the smartphone, we collect needed data and measure it.

An Adaptive Vehicle Platoon Formation Mechanism for Road Capacity Improvement (도로 용량 증대를 위한 적응적 차량 플라툰 형성 기법)

  • Su, Dongliang;Ahn, Sanghyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.327-330
    • /
    • 2016
  • In the road environment with lots of vehicles, we can increase the number of vehicles on the road (i.e., road capacity) and enhance the comfortability of drivers if vehicles are organized into platoons. In the traditional vehicle platooning mechanisms, a pre-determined set of vehicles are allowed to form a platoon and, among them, a specific vehicle is designated as the platoon leader. In this type of platoon mechanisms, platoon is limited in improving the road capacity because the vehicles allowed to involve into platooning are restricted. Therefore, in this paper, we propose an adaptive platoon formation mechanism that allows any vehicle to be a platoon leader from which a platoon is formed. In the proposed mechanism, a platoon leader is elected based on the relative velocity and location information of neighboring vehicles obtained through the periodic exchange of beacon messages among vehicles. Through the NS-3 based simulations, we show the performance of our proposed mechanism in terms of road capacity improvement.