• 제목/요약/키워드: Application method

검색결과 22,670건 처리시간 0.043초

판요소의 탄성 대처짐 거동해석에 관한 연구 -증분 Galerkin법의 개발 및 응용- (Analysis for Large Deflection Behaviour of Plate Elements -Development and Application of Incremental Galerkin Method-)

  • 백점기
    • 대한조선학회지
    • /
    • 제24권4호
    • /
    • pp.37-44
    • /
    • 1987
  • In order to perform a detailed analysis of large deflection behaviour of a rectangular plate, an efficient semi-analytical method is developed in this paper. The method is called Incremental Galerkin Method. This method is successfully applied to plates with initial deflection subjected to in-plane and out-of-plane loads to obtain the whole histories of the behaviour of these plates. Application of this method to rectangular plates with initial deflection is presented. Comparisons of results obtained by this method with those obtained by other methods are made and the validity of the method is demonstrated.

  • PDF

변분근사식과 연계된 산란체법에 의한 파랑변형 계산 (Computation of Wave Propagation by Scatter Method Associated with Variational Approximation)

  • 서승남
    • 한국해안·해양공학회논문집
    • /
    • 제20권6호
    • /
    • pp.553-563
    • /
    • 2008
  • 만일 임의의 지형을 다수의 계단으로 근사하면 이 지형 위를 지나는 선형 파랑의 변형을 계산하기 위해 변분근사법과 고유함수 전개법을 사용할 수 있다. 본 논문에서는 반사율과 투과율을 계산하기 위해 변분근사식과 연계된 산란체법을 제시하였다. 본 기법은 O'Hare and Davies의 변환행렬 축차법보다 간단하고 직접적인 방법임을 보였다. 또한 수 개의 수치실험을 실시하여 기존 결과와 거의 같은 결과를 얻었다.

스마트 폰 애플리케이션 서비스 품질의 개선 (Service Quality Improvement of Smart Phone Application)

  • 염다혜;강창욱
    • 산업경영시스템학회지
    • /
    • 제36권4호
    • /
    • pp.38-44
    • /
    • 2013
  • Smart phones have brought rapid changes in this competitive world. Smart phone application developers are trying their best to consider the customer requirements in the most efficient way while considering all its attributes. However smart phone service quality has been given less consideration comparatively during the last few years. This paper proposes a measurement method for improving service quality of smart phone application. This method combines the service quality performance model (SQPM) and process capability index (PCI). The service quality performance model is used to identify service items that require improvement. Process capability index is used as a measure for prioritization of those improvements. Case study was carried out to search out important communication application service attributes. customer satisfaction level data was collected for users who used the application service. A total of twenty four service attributes were found during this survey. Using the joint approach of SQPM and PCI, five significant service attributes were prioritized for service quality improvement.

A Review on the Application of Eye-tracking in Design Areas

  • Park, Hee-Sok
    • 대한인간공학회지
    • /
    • 제35권5호
    • /
    • pp.391-401
    • /
    • 2016
  • Objective: This study aims to examine domestic literature on eye-tracking in the design area, and to present new eye-tracking application directions. Background: Eye-tracking was introduced in the experimental psychology field for the first time in the 1950s. Eye-tracking has high utilization values in the design application area because eye-tracking can accumulate data on what people see, providing the quantitative values on eye movement. Method: This study examined the papers published in domestic journals, as well as the papers presented in conferences from 2000 to 2016 through DBPIA. Results: Although the use of eye-tracking technology was slightly meager in the product design area, it has been actively used for the evaluation analyses of preference and attention in architecture/public design. Eye-tracking also presented a method to design advertisement that is helpful to advertisement effect measurement, and product salesin the advertisement design area. Since detail psychological analysis is possible, the application of eye-tracking in the studies related with user interface has been active. Conclusion: The eye-tracking technology is projected to be actively used as a new interface means, such as in helping in disabled people's communication and in device control, in addition to conventional application areas. Application: This study would be of help to find future research areas of eye-tracking.

국방 군사시설의 BIM적용 및 활성화 방안 연구 (Research of Application and Facilitation of BIM on Military Facilities)

  • 공금록
    • 한국BIM학회 논문집
    • /
    • 제7권4호
    • /
    • pp.1-7
    • /
    • 2017
  • Since its beginning the military has continued updating its equipments and facilities by modernizing and expanding them. However, with rapidly growing technologies and business management skills, the time for military facilities' evolvement seems unavoidable. The Defense Installations Agency (DIA) has come to a conclusion that application of BIM is necessary. Since its decision, the DIA has been researching the use of BIM and developing guidelines for its application. Nevertheless, the speed of instructions and practical implementation of its model have been behind its plan due to various reasons. To overcome its limitations, the DIA has come up with three-step-solution: basic experience, budgeting, and expansion. Due to numerous number of projects of BIM, it is almost impractical to implement all of them concurrently. The methodological approach of the research employs the Delphi survey method to quantitatively analyze qualitative information drawn from experts' opinions. By applying the Delphi survey method, the first round of the survey drew lists of constraints, BIM application scenarios as well as BIM promotion measures. Afterwards, at the second round of the survey, criticality of each item collected at the 1st round was analyzed to reach a conclusion. Finally, constraints against BIM application were analyzed, and BIM application scenarios and promotion measures for the BIM were introduced.

교육용 전력조류계산 프로그램의 웹 서비스를 위한 시스템 구성 및 데이터 재가공 방법론 개발 (Development of System Architecture and Method to Reprocess Data for Web Service of Educational Power Flow Program)

  • 양광민;이기송;박종배;신중린
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제53권6호
    • /
    • pp.324-333
    • /
    • 2004
  • This paper discusses the development of an educational web-based power flow program for undergraduate students. The interaction between lectures and users can be much enhanced via the web-based programs which result in the student's learning effectiveness on the power flow problem. However the difficulties for developing web-based application programs are that there can be the numerous unspecified users to access the application programs. To overcome the aforementioned multi-users problem and to develope the educational web-based power flow program, we have revised the system architecture, the modeling of application programs, and database which efficiently and effectively manages the complex data sets related to the power flow analysis program. The developed application program is composed of the physical three tiers where the middle tier is logically divided into two kinds of application programs. The divided application programs are interconnected by using the Web-service based on XML (Extended Markup Technology) and HTTP (Hyper Text Transfer Protocol) which make it possible the distributed computing technology Also, this paper describes the method of database modeling to handle effectively when the numerous users change the parameters of the power system to compare the results of the base case.

모바일 애플리케이션 프로세서의 JTAG 보안 기법 (A JTAG Protection Method for Mobile Application Processors)

  • 임민수;박봉일;원동호
    • 전기학회논문지
    • /
    • 제57권4호
    • /
    • pp.706-714
    • /
    • 2008
  • In this paper, we suggest a practical and flexible system architecture for JTAG(Joint Test Action Group) protection of application processors. From the view point of security, the debugging function through JTAG port can be abused by malicious users, so the internal structures and important information of application processors, and the sensitive information of devices connected to an application processor can be leak. This paper suggests a system architecture that disables computing power of computers used to attack processors to reveal important information. For this, a user authentication method is used to improve security strength by checking the integrity of boot code that is stored at boot memory, on booting time. Moreover for user authorization, we share hard wired secret key cryptography modules designed for functional operation instead of hardwired public key cryptography modules designed for only JTAG protection; this methodology allows developers to design application processors in a cost and power effective way. Our experiment shows that the security strength can be improved up to $2^{160}{\times}0.6$second when using 160-bit secure hash algorithm.

A pilot study of a new fingerprint powder application method for the reduction of health risk

  • Kim, Eun-Ji;Lee, Da-Eun;Park, Suk-Won;Seo, Kyung-Suk;Choi, Sung-Woon
    • 분석과학
    • /
    • 제32권5호
    • /
    • pp.196-209
    • /
    • 2019
  • As a traditional method to apply fingerprint powder, brush method ("dusting") can create a risk to the health of crime scene investigators due to the inhalation toxicity of harmful and fine powders. Therefore, as a new method of applying powders, we tried to evaluate the potential of a chamber method for the development of latent fingerprint using fans in a closed chamber with a fixed capacity that can prevent the powders from being blown outside and exposed to the users, by comparing with the development results of the conventional brush method. Fingerprints on glass and plastic (PET) were extracted with black powder and green fluorescent powder, and the sharpness and minutiae of the developed fingerprints were compared for each method. The results of the black powder showed similar results, but the effect of the chamber method was slightly decreased when the green fluorescent powder was used. In order to improve the development with the green fluorescent powder, the mixture (50 : 50) of the fluorescent powder with the silica gel was tested and the results were similar to those of the brush method. It is expected that the chamber method has a high potential as a new powder application method considering the health of the crime scene investigator after fine tuning of development conditions with additional studies.

계열별 프로그래밍 언어의 활용도에 관한 차이분석 -경영계열을 중심으로- (Difference Analysis on Application Level of Programming Language in Major : focused on non-business administration group and business administration group)

  • 박재용
    • 경영과정보연구
    • /
    • 제2권
    • /
    • pp.237-266
    • /
    • 1998
  • The purpose of this study was to analyze the differences of application level the computer programming languages in major. The method of this study is the empirical method based on theoretical one with the previous bibliographical suduies. The sample consists of 268 listed university disclosing over the period of Dec. 1. 1997 to Du. 15. 1997. The samples were 10 university in university of Seoul, Pusan, Masan City, Korea. The data were collected by questionnaire research through interview with each person. The analysis data was carried to 268 samples by using SPSS/PC for Windows Version 7.5 statistical package. Statistical methods such as frequency analysis, chi-square test, ANOVA test, correlation analysis were used to test the research questions. This paper focuses on the design of the hypothesis test show that the 2 type are significantly different in major of university students. Before the test of research questions performed it frequency analysis by using the factor score that bring each items. The research type of 2 guoups, that is, BA Group(business administration group) and NBA Group(non-business administration guoup). To summarize the result of this study is as follows ; (1) Hypothesis 1 : Concerning about computer programming language in major, the significant difference is application the present condition. (2) Hypothesis 2 : Concerning about computer programming language in major, the significant difference is application level. (3) Hypothesis 3 : Concerning about each application software in major, the significant difference is application level. According to the results of this study, it is found that (1) Hypothesis 1 related In application the present condition of computer programming language was accepted its all at 0.05 % significance level. (2) Hypothesis 2 related to application level of computer programming language was accepted its all at 0.05 % significance level. (3) Hypothesis 3 related to application level of each application software was rejected its all. at 0.05 % significance level.

  • PDF

A Novel Battery State of Health Estimation Method Based on Outlier Detection Algorithm

  • Piao, Chang-hao;Hu, Zi-hao;Su, Ling;Zhao, Jian-fei
    • Journal of Electrical Engineering and Technology
    • /
    • 제11권6호
    • /
    • pp.1802-1811
    • /
    • 2016
  • A novel battery SOH estimation algorithm based on outlier detection has been presented. The Battery state of health (SOH) is one of the most important parameters that describes the usability state of the power battery system. Firstly, a battery system model with lifetime fading characteristic was established, and the battery characteristic parameters were acquired from the lifetime fading process. Then, the outlier detection method based on angular distribution was used to identify the outliers among the battery behaviors. Lastly, the functional relationship between battery SOH and the outlier distribution was obtained by polynomial fitting method. The experimental results show that the algorithm can identify the outliers accurately, and the absolute error between the SOH estimation value and true value is less than 3%.