• Title/Summary/Keyword: 2차 신뢰성 기법

Search Result 104, Processing Time 0.031 seconds

Network Design and Measurement Frequency of Water Quality in Kyoung-An Stream Basin (경안천 유역의 수질관측망 구성과 적정 측정 빈도)

  • Kyoung, Min-Soo;Kim, Sang-Dan;Kim, Hung-Soo;Kim, Duck-Gil
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.2011-2015
    • /
    • 2006
  • 본 연구에서는 시공간을 고려하여 경안천유역의 최적 수질 측정망을 구성하였다. 분석을 위해서 필요한 수 질 데이터는 QUAL2E 모형을 이용하여 모의하였으며, 매개변수의 추정을 위하여 HEC-RAS모형과 민감도 분석 기법인 1차 신뢰성 분석(FORA)를 사용하였다. QUAL2E 모형의 모의 결과를 바탕으로 크리깅 기법과 Branch and Boundary Method를 이용하여 평수량 일때와 갈수량 일때로 구분하여 관측지점의 개수와 위치를 제시하였다. 선정된 지점을 기준으로 비례표본추출법(proportional sampling method)을 이용하여 각각의 지점별 측정 빈도를 제시하였다.

  • PDF

An analysis on the Importance of Introduction Factor of ASP-based Information system (ASP 기반의 정보시스템 구축요인의 중요도 분석)

  • Cho, Young-Yerl;Yi, Seon-Gyu
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.71-76
    • /
    • 2013
  • We analyzed the introduction factor of ASP-based information system on the order of importance using AHP techniques. We classified the introduction factors from previous studies into three categories : Organizational factors revealed organizational factors to be of highest importance, followed by environmental and Quality factors. The analysis on both primary and secondary hierarchical factors revealed CEO support as the most important, followed by IT capability, provider reliability, and cost-cutting expectation.

A study on the comparison of VPN with Dedicated Line Network on security (보안측면에서의 가상사설망과 전용회선망의 비교 연구)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.107-122
    • /
    • 2008
  • Communication is be classified into public network and private network. VPN is made by integrating the circuit cost reduction of public network and the reliable security support of public network. This paper analyzes the IPSec using three layer tunneling, MPLS(Multi Protocol Label Switching) integrating 2 layer switching and 3 layer routing techniques and dedicated line from the viewpoint of security. In conclusion, VPN is better than dedicated network line in cost and security. If IPSec VPN is compared with MPLS VPN, MPLS VPN is more excellent than IPSec VPN in safe data transmission, cost, QoS and management.

  • PDF

Study on Improving Learning Speed of Artificial Neural Network Model for Ammunition Stockpile Reliability Classification (저장탄약 신뢰성분류 인공신경망모델의 학습속도 향상에 관한 연구)

  • Lee, Dong-Nyok;Yoon, Keun-Sig;Noh, Yoo-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.374-382
    • /
    • 2020
  • The purpose of this study is to improve the learning speed of an ammunition stockpile reliability classification artificial neural network model by proposing a normalization method that reduces the number of input variables based on the characteristic of Ammunition Stockpile Reliability Program (ASRP) data without loss of classification performance. Ammunition's performance requirements are specified in the Korea Defense Specification (KDS) and Ammunition Stockpile reliability Test Procedure (ASTP). Based on the characteristic of the ASRP data, input variables can be normalized to estimate the lot percent nonconforming or failure rate. To maintain the unitary hypercube condition of the input variables, min-max normalization method is also used. Area Under the ROC Curve (AUC) of general min-max normalization and proposed 2-step normalization is over 0.95 and speed-up for marching learning based on ASRP field data is improved 1.74 ~ 1.99 times depending on the numbers of training data and of hidden layer's node.

3-D Frame Design Using Second-Order Plastic-Hinge Analysis Accounting for Lateral Torsional Buckling (횡비틀림좌굴을 고려하는 2차 소성힌지해석을 이용한 3차원 강뼈대 구조물 설케)

  • 김승억;박주수
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.15 no.1
    • /
    • pp.117-126
    • /
    • 2002
  • In this paper, 3-D fame design using second-orders plastic-hinge analysis accounting for lateral torsional buckling is developed. This analysis accounts for material and geometric nonlinearities of the structural system and its component members. Moreover, the problem associated with conventional second-order plastic-hinge analyses, which do not consider the degradation of the flexural strength caused by lateral torsional buckling, is overcome. Efficient ways of assessing steel frame behavior including gradual yielding associated with residual stresses and flexure, second-order effect, and geometric imperfections are presented. In this study, a model consisting of the unbraced length and cross-section shape is used to account for lateral torsional buckling. The proposed analysis is verified by the comparison of the LRFD results. A case studs shows that lateral torsional buckling is a very crucial element to be considered in second-order plastic-hinge analysis. The proposed analysis is shown to be an efficient reliable tool ready to be implemented into design practice.

Assessment and Retrofitting of Existing Bridges (기존 교량의 평가 및 보강)

  • Kang, Su Tae;Kwon, Seung Hee
    • Magazine of the Korea Institute for Structural Maintenance and Inspection
    • /
    • v.16 no.2
    • /
    • pp.74-86
    • /
    • 2012
  • 이태리를 비롯한 대부분의 유럽 국가들에 건설된 많은 기존 도로 및 철도 교량들 중에는 현재의 구조설계기준이나 교통시스템, 유지관리비용 절감 등을 고려한 요구조건과 비교했을 때 구조적 안전성과 기능성을 만족시키지 못하는 경우가 종종 있다. 따라서 어떤 형식의 교량이든 특정 취약성을 평가할 수 있는 신속하고 신뢰성 있는 방법론이 필요하다. 이 논문의 앞부분은 이태리 내 도로 및 철도 구조물에 대해 그런 형태의 방법론의 적용에 대해 기술하였으며, 그 결과를 보면, 한 예로 조적조 아치 교량이 일반적으로 상당히 건전한 구조 시스템으로 나타났으며 RC 교량은 일반적으로 내구성 문제를 드러내며 지진하중에 대해서도 취약한 것으로 나타났다. 강교량은 내구성 문제 외에 피로에 특히 취약한 것으로 나타났다. 그리고 이 논문에서 고려한 전형적인 보강기법들에 대해 간략히 소개하였다. 뒷부분에서는 네 개의 기존 RC교량을 중심으로 주요 교량보강 사례연구들에 대해 좀 더 자세히 기술하였다. 이 교량들은 2차 세계대전 이후에 가장 일반적으로 채택되던 형식들 중의 한 예로 보강기법의 일반적 성질을 고찰하는데 있어 적합하다. 교량의 성능개선에 대해서는 방법론적 접근에 대해 개략적으로 나타내었으며, 여기에는 구조물의 유형적 특성, 유지관리 현황, 기능적 요구조건 및 보수 보강 시스템과 연계된 환경적인 면을 고려하고 있다.

  • PDF

Design of Multi-Level Abnormal Detection System Suitable for Time-Series Data (시계열 데이터에 적합한 다단계 비정상 탐지 시스템 설계)

  • Chae, Moon-Chang;Lim, Hyeok;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.1-7
    • /
    • 2016
  • As new information and communication technologies evolve, security threats are also becoming increasingly intelligent and advanced. In this paper, we analyze the time series data continuously entered through a series of periods from the network device or lightweight IoT (Internet of Things) devices by using the statistical technique and propose a system to detect abnormal behaviors of the device or abnormality based on the analysis results. The proposed system performs the first level abnormal detection by using previously entered data set, thereafter performs the second level anomaly detection according to the trust bound configured by using stored time series data based on time attribute or group attribute. Multi-level analysis is able to improve reliability and to reduce false positives as well through a variety of decision data set.

Data Deduplication Method using PRAM Cache in SSD Storage System (SSD 스토리지 시스템에서 PRAM 캐시를 이용한 데이터 중복제거 기법)

  • Kim, Ju-Kyeong;Lee, Seung-Kyu;Kim, Deok-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.117-123
    • /
    • 2013
  • In the recent cloud storage environment, the amount of SSD (Solid-State Drive) replacing with the traditional hard disk drive is increasing. Management of SSD for its space efficiency has become important since SSD provides fast IO performance due to no mechanical movement whereas it has wearable characteristics and does not provide in place update. In order to manage space efficiency of SSD, data de-duplication technique is frequently used. However, this technique occurs much overhead because it consists of data chunking, hasing and hash matching operations. In this paper, we propose new data de-duplication method using PRAM cache. The proposed method uses hierarchical hash tables and LRU(Least Recently Used) for data replacement in PRAM. First hash table in DRAM is used to store hash values of data cached in the PRAM and second hash table in PRAM is used to store hash values of data in SSD storage. The method also enhance data reliability against power failure by maintaining backup of first hash table into PRAM. Experimental results show that average writing frequency and operation time of the proposed method are 44.2% and 38.8% less than those of existing data de-depulication method, respectively, when three workloads are used.

Design Optimization of a Deep-sea Pressure Vessel by Reliability Analysis (신뢰성 해석을 이용한 심해용 내압용기의 설계 최적화)

  • JOUNG TAE-HWAN;NHO IN-SIK;LEE JAE-HWAN;HAN SEUNG-HO
    • Journal of Ocean Engineering and Technology
    • /
    • v.19 no.2 s.63
    • /
    • pp.40-46
    • /
    • 2005
  • In order to consider the statistical properties of probability variables which are used in structural analysis, the conventional approach of using safety factors based on past experience, are usually used to estimate the safety of a structure. The real structures could only be analyzed with the error in estimation of loads, materials and dimensional characteristics. Errors should be considered systematically in the structural analysis. In this paper, we estimated the probability of failure of two pressure vessels, simultaneously, using computational analysis. One pressure vessel, theoretically, had no stiffener whereas the other had. This paper also discusses sensitivity values of random variables in the rounded parts of the pressure vessel which had ring-style stiffener in the center of the external area which had ring-style stiffener. Finally, we show that the reliability index, and the probability of failure, can be calculated to particular tolerance limits.

A Workflow Enactment Model supporting Internet-scale Collaboration (인터넷 규모의 협업 지원을 위한 워크플로우 수행 모델)

  • 이이섭;박수현;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.662-673
    • /
    • 2003
  • This paper proposed a workflow enactment model to provide process management functions for the next generation Internet service environment such as Web Service and Grid Computing. The existing enterprise workflow enactment models could not meet the scalability and reliability requirements for aforementioned environments. To satisfy these requirements, this study addressed on applying P2P model to the workflow enactment model. Mathematical description and proof were employed to show the recovery based on set theory and we also showed performance enhancement through simulations, which demonstrated a comprehensive result giving more than 100 times fast response time than the existing centralized model on the same resources.