• Title/Summary/Keyword: 지연 모델

Search Result 1,475, Processing Time 0.027 seconds

Numerical Analysis of Off-Gas Flow in Hot Area of the Vitrification Plant (유리화공정 고온영역에서의 방사성 배기체 유동해석)

  • Park Seung-Chul;Kim Byong-Ryol;Shin Sang-Woon;Lee Jin Wook;Kang Won Gu;Hong Seok Jin
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2005.11a
    • /
    • pp.69-78
    • /
    • 2005
  • Appropriate numerical models for the simulation of off-gas flow in hot area of the vitrification plant have been developed in this study. The models have been applied to analyze the effect of design parameters of real plant and numerical analyses have been performed for CCM(Cold Crucible Melter), pipe cooler and HTF(High Temperature Filter) At first, the effect of excess oxygen and the ratio of oxygen distribution on combustion characteristics in the CCM has been studied. Next, solidification behavior of radio nuclide In the pipe tooler has been numerically modeled and scrutinized. Finally, flow pattern In accordance with the location of off-gas entrance of the HTF has been compared.

  • PDF

A Study on the Radio Wave Propagation Model in IMT-2000 (IMT-2000 주파수대역에서의 전파-전파 모델에 관한 연구)

  • Ra, Yoo-Chan;Lee, Seung-Woo;Shin, Hong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4A
    • /
    • pp.224-231
    • /
    • 2003
  • In this in this thesis, we have proposed the Kor-231 which compared with Hata by dividing 4 classes and 8 details, which based on that the area subdivision which is defined by the City planning Regulation of Korea classified on its rate of building-to-land, floor area and distance between buliding and botanical coefficient. The experiments are carried out at the point of the RMS delay spread and the recerived power in the two kinds of geographical areas, LOS(Line of Sight) and N-LOS(Non Line of Sight). When the measured result is compared with Kor-231 model, we can catch the result that received power are 25.5dB and 14.5dB, the RMS delay spread are 101ns and 35ns and N-LOS received power are 4.1dB and 1.6dB. So we have certified that it is well due to the result analyzed into the difference of the RMS delay spread from 74ns to 200ns.

User Signature Protection Model for Different Cloud Areas (이질적인 클라우드 환경에 적합한 사용자 서명 보호 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.23-28
    • /
    • 2019
  • Cloud services are services developed to serve a wider variety of users in different fields. However, although cloud services are designed to reflect the needs of different users, a variety of security damages resulting from them are increasing and technologies are needed to address them. This paper proposes a user signature management model that prevents third parties from exploiting the user's signature in a heterogeneous cloud The proposed model strengthens the functionality of the intermediate devices that make up the hierarchical cloud while also managing the signature information of the partitioned user. As a result of the performance assessment, the proposed model not only distributed user signature management, but also improved efficiency by 8.5% on average because intermediate devices distributed user signature processing, and reduced the user's signature latency by 13.3% on average when performing user authentication processing. On average, the overhead generated by intermediate devices processing a user's signature was 10.1 percent lower than that of conventional techniques.

Reliability Analysis for Fatigue Damage of Steel Bridge Details (강교 부재의 피로손상에 대한 신뢰성 해석)

  • Park, Yeon Soo;Han, Suk Yeol;Suh, Byoung Chal
    • Journal of Korean Society of Steel Construction
    • /
    • v.15 no.5 s.66
    • /
    • pp.475-487
    • /
    • 2003
  • This study developed an analysis model of estimating fatigue damage using the linear elastic fracture mechanics method. Stress history occurring to an element when a truck passed over a bridge was defined as block loading and crack closure theory explaining load interaction effect was applied. Stress range frequency analysis considering dead load stress and crack opening was done. Probability of stress range frequency distribution was applied and the probability distribution parameters were estimated. The Monte Carlo simulation of generating the probability various of distribution was performed. The probability distribution of failure block numbers was obtained. With this the fatigue reliability of an element not occurring in failure could be calculated. The failure block number divided by average daily truck traffic remains the life of a day. Fatigue reliability analysis model was carried out for the welding member of cross beam flange and vertical stiffener of steel box bridge using the proposed model. Consequently, a 3.8% difference was observed between the remaining life in the peak analysis method and in the proposed analysis model. The proposed analysis model considered crack closure phase and crack retard.

Estimation of Dormancy Breaking Time by Development Rate Model in 'Niitaka' Pear(Pyrus pirifolia Nakai) (발육속도 모델을 이용한 배 '신고' 자발휴면타파시기 추정)

  • Han, J.H.;Lee, S.H.;Choi, J.J.;Jung, S.B.;Jang, H.I.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.10 no.2
    • /
    • pp.58-64
    • /
    • 2008
  • This study was carried out to determine the availability of development rate(DVR) model for predicting bud break time of 'Niitaka' pear. In addition, the study also assessed the effect of an increase in temperature on predicting bud dormancy breaking time in winter season. The DVR model, which was developed for 'Kosui' pear, illustrated that the bud break time(e.g., Dec. 12-Dec. 19) of 'Niitaka' pear observed in the field corresponded to the predicted bud break time by DVR model. This result indicates that the bud break time of 'Niitaka' pear can be predicted by DVR model tuned for 'Kosui' pear. As the temperature increased during the winter season, the bud break time was delayed. Chilling requirement deficiency for the bud break time is expected in Jeju Province when the temperature increased above $4^{\circ}C$ in winter season.

MPEG-4 Based Multimedia Synchronization Model and Application (MPEG-4 기반의 멀티미디어 동기화 모델과 응용)

  • Sung, Seung-Kyu;Lee, Myeong-Won
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1159-1166
    • /
    • 2004
  • This paper describes a multimedia synchronization model based on the MPEG-4(Moving Picture Expert Group) system. It defines and modifies new nodes for representing temporal relationships between media objects in the BIFS(Binary Format for Scene) of MPEG-4 system which Integrates, manages and transfers multimedia objects such as audio, video, image, etc. The relationships are represented by using a multimedia temporal model during the start, play and delay time interval. In addition, we illustrate a multimedia authoring system that includes the Interface used for defining the temporal relationships. Differently from several contentional tools generally appropriate for professional users who can edit the BIFS nodes of themselves, the system provides end-users with the function that can define the temporal relationships of multimedia objects directly in the interface.

Classification Model for Cloud-based Public Service (클라우드 기반의 공공 서비스 유형 분류 모델)

  • Ra, Jong-Hei;Lee, Ji-Yeon;Shin, Sun-Young;Kim, Jeong-Yeop;Choi, Young-Jin
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.509-516
    • /
    • 2013
  • Cloud services are recognized the essential IT infrastructure in the optimal smart society which is changing rapidly as a low-cost and high-efficiency. This service of starting from prominent overseas companies such as Google, Amazon, had influenced on the introduction of the service for the various policies of foreign governments, including the United States and the United Kingdom. Such countries adopting to the cloud computing and make transform to the cloud service of existing public service for the effective management of information resources. In this study, we have proposed the main determining factors of cloud adoption, the model of cloud governance for the adoption of public cloud service.

Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System (혼합형 침입 탐지 시스템에서 데이터 및 정책 전달 통신 모델과 성능 평가)

  • Jang, Jung-Sook;Jeon, Yong-Hee;Jang, Jong-Soo;Sohn, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.727-738
    • /
    • 2003
  • Much research efforts are being exerted for the study of intrusion detection system(IDS). However little work has been for the communication medels and performance eveluation of the IDS. Here we present a communication framework for doing hybrid intrusion detection in which agents are used for local intrusion detections with a centralized data anaysis componenta for a global intrusion detection at multiple domains environment. We also assume the combination of host-based and network-based intrusion detection systems in the oberall framework. From the local domain, a set of information such as alert, and / or log data are reported to the upper level. At the root of the hierarchy, there is a global manager where data coalescing is performed. The global manager delivers a security policy to its lower levels as the result of aggregation and correlation of intrusion detection alerts. In this paper, we model the communication mechanisms for the hybrid IDS and develop a simular using OPNET modeller for the performance evaluation of transmission capabillities for the delivery of data and policy. We present and compare simulation results based on several scenarios focuding on communication delay.

Multiple-Silo Performance Assessment Model for the Wolsong LILW Disposal Facility in Korea - PHASE I: Model Development (월성 중저준위 처분시설 다중사일로 안정성 평가 모델 - 1단계: 모델개발)

  • Lim, Doo-Hyun;Kim, Jee-Yeon;Park, Joo-Wan
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.9 no.2
    • /
    • pp.99-105
    • /
    • 2011
  • An integrated model for groundwater flow and radionuclide transport analyses is being developed incorporating six underground silos, an excavated damaged zone (EDZ), and fractured host rock. The model considers each silo as an engineered barrier system (EBS) consisting of a waste zone comprising waste packages and disposal container, a buffer zone, and a concrete lining zone. The EDZ is the disturbed zone adjacent to silos and construction & operation tunnels. The heterogeneity of the fractured rock is represented by a heterogeneous flow field, evaluated from discrete fractures in the fractured host rock. Radionuclide migration through the EBS in silos and the fractured host rock is simulated on the established heterogeneous flow field. The current model enables the optimization of silo design and the quantification of the safety margin in terms of radionuclide release.

Security Model and Application of Persistent Object using Type Information in Integrated Environment of Distributed System (통합 분산환경에서 타입 정보를 이용한 지속성 객체의 보안 모델 및 응용)

  • 김영수;최흥식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.661-669
    • /
    • 2004
  • As a large number of distributed systems becoming more popular, interoperability, portability and security are becoming major concerns of modern computing. CORBA and object-oriented database which provide transparency of network and database are increasingly being used as the basis for distributed system to solve these problems. The two methods can help accomplish assurance of security by using a method-based access control technique or an attribute-based access control technique. These methods also enhance the unavailability or inefficiency caused by the delay of access process and bottleneck of the network due to the complex instance-based access control. We propose a security model on the type information based access control system that can enhance both security and availability by separating the functions delivered from CORBA and object-oriented databases. We apply the access control model specifically to enhancement of security system and also perform a test to verify the security and availability of our model.