• Title/Summary/Keyword: 정형회로

Search Result 295, Processing Time 0.023 seconds

Design of null lens for Alignment of the Unstable Laser Resonator (불안정형 레이저 공진기 정렬을 위한 null 렌즈 설계)

  • Kim, Hyun-Sook;Kim, Yeon-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.2
    • /
    • pp.186-190
    • /
    • 2006
  • The use of null optics is proposed as a new concept for the precise alignment of a confocal unstable resonator. The characteristics of the proposed null optics are investigated and analysed with the designed null lens for a real confocal unstable resonator of which the length is 3.5 m. As a result of the analysis, the pupil map data are shown about the despace error of 1.0 mm and tilt error of 1.0 mrad.

Semi-Microseoond Long pulse KrF 레이저 시스템 개발

  • 박홍진
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 1990.02a
    • /
    • pp.13-16
    • /
    • 1990
  • 코로나 예비전리를 이용한 KrF 레이저의 장펄스화를 위해 동축형 4단 펄스정형회로 (PFN)를 구성해서 용량이행형의 회로에 인덕턴스가 부가된 방식의 전류, 전압을 비교하여 PFN을 동축형으로 제작함으로 인한 Stray Capacitance (Cs)의 존재로 인해 좋은 효율의 장펄스화를 이루어짐을 밝혔다. 구성된 PFN을 절연유에 넣어 충전전압 15kV, N2 55Torr에서 330ns 펄스폭의 전류파형을 측정했다.

  • PDF

A Method for Instantiating Product Line Architecture using Formal Specifications (정형 명세를 이용한 제품계열 아키텍처의 인스턴스화 기법)

  • Shin, Suk-Kyung;Her, Jin-Sun;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.12
    • /
    • pp.1008-1021
    • /
    • 2006
  • Product line engineering(PLE) is one of the recent and effective reuse approaches that enables developing a number of applications by instantiating a core asset. Elements of a core asset are product line architecture(PLA), component, and decision model. Among these elements, PLA is the key element since it defines the overall structure of the core asset. Although numerous PLE methodologies have been introduced, it is still unclear what should be the elements of a PLA and how to systematically instantiate it for specific applications. Formal specifications can play a key role in defining detailed and precise instantiation process. In this paper, we first present a meta model of PLA and show how to specify PLA in a formal language, Object-Z. Then, we propose instantiation rules using formal specification and those rules precisely define constraints for instantiating PLA. By applying the proposed formal specification, we believe PLA instantiation can be carried out precisely and correctly, yielding high quality software development.

Formal Software Requirements Specification for Digital Reactor Protection Systems (디지털 원자로 보호 시스템을 위한 정형 소프트웨어 요구사항 명세)

  • 유준범;차성덕;김창회;오윤주
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.6
    • /
    • pp.750-759
    • /
    • 2004
  • The software of the nuclear power plant digital control system is a safety-critical system where many techniques must be applied to it in order to preserve safety in the whole system. Formal specifications especially allow the system to be clearly and completely specified in the early requirements specification phase therefore making it a trusted method for increasing safety. In this paper, we discuss the NuSCR, which is a qualified formal specification method for specifying nuclear power plant digital control system software requirements. To investigate the application of NuSCR, we introduce the experience of using NuSCR in formally specifying the plant protection system's software requirements, which is presently being developed at KNICS. Case study that shows that the formal specification approach NuSCR is very much qualified and specialized for the nuclear domain is also shown.

Biomechanics of Hip and Hip Replacement Arthroplasty (고관절 및 인공 고관절의 생역학)

  • Lee, Young-Kyun;Choi, Ji Hye;Won, Heejae;Koo, Kyung-Hoi
    • Journal of the Korean Orthopaedic Association
    • /
    • v.54 no.5
    • /
    • pp.377-383
    • /
    • 2019
  • The biomechanics study of the hip is aims to understand and explore the dynamic principles of weight transfer through the hip joint. This basic science knowledge can be applied in a variety of areas, including degenerative joint diseases and hip replacement arthroplasty. In particular, understanding of the biomechanics of the hip has led to the development of materials, design and fixation of implants, and it can be applied in various areas, such as the selection of surgical methods and the location of the implant. Moreover, it is essential to have good knowledge of the biomechanics of the hip to achieve better clinical results for patients. Therefore, this paper introduces the basic knowledge and biomechanical characteristics of a normal hip and hip replacement arthroplasty, which are needed to approach the biomechanics of the hip.

A CASE Tool for Automatic Generation of FBD Program from NuSCR Formal Specification (NuSCR 정형 요구사항 명세로부터 FBD 프로그램 자동생성을 위한 CASE 도구)

  • Back, Hyoung-Bu;Yoo, Jun-Beom;Cha, Sung-Deok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.4
    • /
    • pp.265-269
    • /
    • 2009
  • Formal specification plays important roles in guaranteeing software safety of safety-critical systems such as nuclear power plant's digital control systems. We had developed a technique [1] which synthesizes Function Block Diagram(FBD) programs from NuSCR formal requirements specifications, but it did not be used widely as it had no automatic tool support. FBD is one of the programming languages for Programmable Logic Controllers(PLC) based system. This paper introduces a CASE tool, NuSCRtoFBD, developed to automate the synthesis procedure. The CASE tool NuSCRtoFBD can reduce a number of errors occurred in the process of manual FBD programming.

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.