• Title/Summary/Keyword: Application Error

Search Result 2,447, Processing Time 0.03 seconds

Modification of Miller-Holzworth model for Korea (국내 적용을 위한 Miller-Holzworth 모델의 수정)

  • 장영기
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.11 no.3
    • /
    • pp.299-302
    • /
    • 1995
  • Many air quality models have been used for Environmental impact assessments. Miller-Holzworth model suggested by Holzworth is a simple air quality model is frequently used for air quality assessments in korea. Miller-Holzworth model suggested by Holzworth is a simple air quality model for the ground-level area source, The model estimates the pollutants concentration averaged over the wind centerline. An error involved in the Miller-Holzworth model was first indentified by Calder in 1977. But the model has been used without correction for unsuitable cases in Korea. This paper corrected that error and modified model formulation for application to urban and rural areas.

  • PDF

Fault Detection of Cutting Force in Turning Process using RBF/ART-1 (RBF/ART1을 이용한 선삭에서 절삭력을 이상신호 검출)

  • 임상만;이명재;유봉환
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1994.10a
    • /
    • pp.15-19
    • /
    • 1994
  • The application of neural network for fault dection of cutting force in turning was introduced. This monitoring system consist of a RBF predicton model and a ART-1 pattern classifier. RBF prediction model predict a cutting force signal. Prediction error of predictor is used for a input vector of ART-1 pattern classifier. Prediction error could be successfully performed to fault signal monitoring of ART-1 pattern classifier.

  • PDF

Application of Normality Test and Classification of Process Capability Index (공정능력지수의 유형화 및 정규성 검정의 응용)

  • Choe, Seong-Un
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2011.11a
    • /
    • pp.551-556
    • /
    • 2011
  • This research presents an implementation strategy of Process Capability Index (PCI) according to the types of process characteristics. The types of process feature are classified as four perspectives of variation range, time period, error position, and process stage. The paper examines short-term or long-term PCI, within or between variation, position of precision or accuracy, and inclusion of measurement or calibration stage. Moreover, the study proposes normality test of unilateral PCI.

  • PDF

Boundary stress resolution and its application to adaptive finite element analysis

  • Deng, Jianhui;Zheng, Hong;Ge, Xiurun
    • Structural Engineering and Mechanics
    • /
    • v.6 no.1
    • /
    • pp.115-124
    • /
    • 1998
  • A novel boundary stress resolution method is suggested in this paper, which is based upon the displacements of finite element analysis and of high precision with stress boundary condition strictly satisfied. The method is used to modify the Zienkiewicz-Zhu ($Z^2$) a posteriori error estimator and for the h-version adaptive finite element analysis of crack problems. Successful results are obtained.

On the pdf estimation of the intraframe DPCM prediction error and its application for the images (영상신호에 대한 DPCM예측오차신호의 확률분포추정과 그 응용에 관한 연구)

  • 안재형
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.1
    • /
    • pp.12-18
    • /
    • 1988
  • It is found that the estimation pdf of the real intraframe DPCM prediction error by $x^3$ goodness-of-fit test for the images is nearer gamma distribution that laplacian. Also the new pdf estimation method by NMAE is proposed and applied to the pdf adaptive DPCM system.

  • PDF

Profile based Web Application Attack Detection and Filtering Method (프로파일기반 웹 어플리케이션 공격탐지 및 필터링 기법)

  • Yun Young-Tae;Ryou Jae-Cheol;Park Sang-Seo;Park Jong-Wook
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.19-26
    • /
    • 2006
  • Recently, web server hacking is trending toward web application hacking which uses comparatively vulnerable web applications based on open sources. And, it is possible to hack databases using web interfaces because web servers are usually connected databases. Web application attacks use vulnerabilities not in web server itself, but in web application structure, logical error and code error. It is difficult to defend web applications from various attacks by only using pattern matching detection method and code modification. In this paper, we propose a method to secure the web applications based on profiling which can detect and filter out abnormal web application requests.

Application of Fuller's ideal curve and error function to making high performance concrete using rice husk ash

  • Hwang, Chao-Lung;Bui, Le Anh-Tuan;Chen, Chun-Tsun
    • Computers and Concrete
    • /
    • v.10 no.6
    • /
    • pp.631-647
    • /
    • 2012
  • This paper focuses on the application of Fuller's ideal gradation curve to theoretically design blended ratio of all solid materials of high performance concrete (HPC), with the aid of error function, and then to study the effect of rice husk ash (RHA) on the performance of HPC. The residual RHA, generated when burning rice husk pellets at temperatures varying from 600 to $800^{\circ}C$, was collected at steam boilers in Vietnam. The properties of fresh and hardened concrete are reviewed. It is possible to obtain the RHA concrete with comparable or better properties than those of the specimen without RHA with lower cement consumption. High flowing concrete designed by the proposed method was obtained without bleeding or segregation. The application of the proposed method for HPC can save over 50% of the consumption of cement and limit the use of water. Its strength efficiency of cement in HPC is 1.4-1.9 times higher than that of the traditional method. Local standards of durability were satisfied at the age of 91 days both by concrete resistivity and ultrasonic pulse velocity.

3D Printing Watermarking Method Based on Radius Curvature of 3D Triangle

  • Pham, Ngoc-Giao;Song, Ha-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1951-1959
    • /
    • 2017
  • Due to the fact that 3D printing is applied to many areas of life, 3D printing models are often used illegally without any permission from the original providers. This paper presents a novel watermarking algorithm for the copyright protection and ownership identification for 3D printing based on the radius curvature of 3D triangle. 3D triangles are extracted and classified into groups based on radius curvature by the clustering algorithm, and then the mean radius curvature of each group will be computed for watermark embedding. The watermark data is embedded to the groups of 3D triangle by changing the mean radius curvature of each group. In each group, we select a 3D triangle which has the nearest radius curvature with the changed mean radius curvature. Finally, we change the vertices of the selected facet according to the changed radius curvature has been embedded watermark. In experiments, the distance error between the original 3D printing model and the watermarked 3D printing model is approximate zero, and the Bit Error Rate is also very low. From experimental results, we verify that the proposed algorithm is invisible and robustness with geometric attacks rotation, scaling and translation.

Application of Disinfection Models on the Plasma Process (플라즈마 공정에 대한 소독 모델 적용)

  • Back, Sang-Eun;Kim, Dong-Seog;Park, Young-Seek
    • Journal of Environmental Science International
    • /
    • v.21 no.6
    • /
    • pp.695-704
    • /
    • 2012
  • The application of disinfection models on the plasma process was investigated. Nine empirical models were used to find an optimum model. The variation of parameters in model according to the operating conditions (first voltage, second voltage, air flow rate, pH) were investigated in order to explain the disinfection model. In this experiment, the DBD (dielectric barrier discharge) plasma reactor was used to inactivate Ralstonia Solanacearum which cause wilt in tomato plantation. Optimum disinfection models were chosen among the nine models by the application of statistical SSE (sum of squared error), RMSE (root mean sum of squared error), $r^2$ values on the experimental data using the GInaFiT software in Microsoft Excel. The optimum model was shown as Weibull+talil model followed by Log-linear+ Shoulder+Tail model. Two models were applied to the experimental data according to the variation of the operating conditions. In Weibull+talil model, Log10($N_o$), Log10($N_{res}$), ${\delta}$ and p values were examined. And in Log-linear+Shoulder+Tail model, the Log10($N_o$), Log10($N_{res}$), $k_{max}$, Sl values were calculated and examined.