• Title/Summary/Keyword: Behavior Generation Model

Search Result 330, Processing Time 0.028 seconds

Analysis of Unsteady Cavitating Flows in Fuel Injection Nozzle of Piezo-driven Injector by Eulerian-Lagrangian Multi-phase Method (Eulerian-Lagrangian 다상 유동해석법에 의한 피에조 인젝터의 노즐 내부 비정상 캐비테이션 유동해석)

  • Lee, Jin-Wook;Min, Kyung-Duk;Kang, Kern-Yong;Gavaises, M.;Arcoumanis, C.
    • Journal of ILASS-Korea
    • /
    • v.9 no.4
    • /
    • pp.38-45
    • /
    • 2004
  • This study describes the analysis results of unsteady cavitating flows behavior inside nozzle of the prototype piezo-driven injector. This piezo-driven injector has been recognised as one of the next generation diesel injector due to a higher driven efficiency than the conventional solenoid-driven injector. The three dimensional geometry model along the central cross-section regarding of one injection hole has been used to simulate the cavitating flows for injection time by at fully transient simulation with cavitation model. The cavitation model incorporates many of the fundamental physical processes assumed to take place in cavitating flows. The simulations performed were both fully transient and 'pseudo' steady state, even if under steady state boundary conditions. We could analyze the effect the pressure drop to the sudden acceleration of fuel, which is due to the fastest response of needle, on the degree of cavitation existed in piezo-driven injector nozzle

  • PDF

A Multivariate Model Development For Stream Flow Generation (다변량 모형에 의한 하천유량의 모의 발생)

  • 정상만
    • Water for future
    • /
    • v.24 no.4
    • /
    • pp.67-72
    • /
    • 1991
  • Various modeling approaches to study along term behavior of streamflow or groundwater storagge have been conducted. In this study, a Multivariate AR (1) Model has been applied to generate monthly flows of the one key station which has historical flows using monthly flows of the three subordinate stations. The Model performance was examined using statistical comparisons between the historical and generated monthly series such as mean, various, skewness. Also, the correlation coefficients(lag-zero, and lag-one)between the two monthly flows were compared. The results showed that the modeled generated flows were statistically similar to the historical flows.

  • PDF

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

Development of a Breast Feeding Adaptation Scale (BFAS) (모유수유 적응 측정 도구 개발)

  • Kim, Sun-Hee
    • Journal of Korean Academy of Nursing
    • /
    • v.39 no.2
    • /
    • pp.259-269
    • /
    • 2009
  • Purpose: The aim of this study was to develop a breast feeding adaptation scale (BFAS) to evaluate adaptation to breastfeeding for breastfeeding mothers and their infants and to test the validity and reliability of the instrument. Methods: The study was conducted as follows: application of the conceptual framework, identification of the content domains, items generation, and test of validity and reliability. In order to test validity and reliability, two panels of experts reviewed items and subcategories of the preliminary questionnaire and then data were collected from 329 mothers who were up to 4 weeks postpartum and breastfeeding. Descriptive statistics, t-test, factor analysis, and Cronbach's alpha were used to analyze the data. Results: The conceptual framework was based on the Roy adaptation model. The content domains were developed via literature review, review of instruments, and data acquired from the interviews of breastfeeding mothers and nurses. A total of 69 items belonging to 8 domains were generated. A reduction to 44 preliminary items was accomplished through content validity analysis. Factor analysis extracted 8 factors with a total of 27 items on a 5-point Likert scale. Content validity, construct validity, criterion validity, and reliability of the BFAS were established. Conclusion: The newly developed BFAS is a reliable and valid instrument with which the adaptation of breastfeeding mothers and their infants to the breastfeeding behavior can be evaluated.

Impacts of self-monitoring tendency and mobile phone dependency on salence of mobile phone case product attributes

  • Kim-Vick, Jihyun;Hahn, Kim H.Y.
    • The Research Journal of the Costume Culture
    • /
    • v.27 no.6
    • /
    • pp.666-680
    • /
    • 2019
  • Prevalent usage of mobile devices among consumers has been well recognized and this is especially imperative among young adult consumers. The mobile phone became the gateway of their communication, media consumption, retail transaction, education, and (virtual) social life. However, there is little empirical research explaining the dynamics behind the psychological underpinning of young adult consumers, specifically Generation Y, to understand their usages and dependency on mobile phones. This study, therefore, aims to unveil antecedents and consequences of Gen Y consumers' mobile phone dependency from a media psychological perspective. We developed a conceptual model based on theory of self-monitoring (Snyder 1974, 1987), extended self-concept (Belk, 1988), and media dependency theory (Ball-Rokeach & Defluer, 1976). Four hundred ninety-eight students in the U.S. provided usable responses to our pencil-and-paper survey. Causal modeling analysis results demonstrated that both ability to modify one's behavior and sensitivity to cues for social appropriate behavior dimensions of the self-monitoring tendency positively predicted one's level of fashion involvement, which in turn positively predicted his/her mobile phone dependency. Individual's mobile phone dependency, fashion involvement and self-monitoring's ability dimension exhibited positive and direct impact on one's perception of the salience of mobile phone case product attributes. Based on the findings, we provided pragmatic and theoretical implications for the industry and academia.

A preliminary study for numerical and analytical evaluation of surface settlement due to EPB shield TBM excavation (토압식 쉴드 TBM 굴착에 따른 지반침하 거동 평가에 관한 해석적 기초연구)

  • An, Jun-Beom;Kang, Seok-Jun;Kim, Jung Joo;Kim, Kyoung Yul;Cho, Gye-Chun
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.23 no.3
    • /
    • pp.183-198
    • /
    • 2021
  • The EPB (Earth Pressure Balanced) shield TBM method restrains the ground deformation through continuous excavation and support. Still, the significant surface settlement occurs due to the ground conditions, tunnel dimensions, and construction conditions. Therefore, it is necessary to clarify the settlement behavior with its influence factors and evaluate the possible settlement during construction. In this study, the analytical model of surface settlement based on the influence factors and their mechanisms were proposed. Then, the parametric study for controllable factors during excavation was conducted by numerical method. Through the numerical analysis, the settlement behavior according to the construction conditions was quantitatively derived. Then, the qualitative trend according to the ground conditions was visualized by coupling the numerical results with the analytical model of settlement. Based on the results of this study, it is expected to contribute to the derivation of the settlement prediction algorithm for EPB shield TBM excavation.

Change of Usage Behavior According to Advance of Mobile Phone Capability -Focused on Female University Students- (모바일 기기의 사용 행태 변화에 대한 탐색 연구 -20대 전반 여대생을 중심으로-)

  • Choi, Yoo-Me;Yu, Hyun-Jung;Lee, Hye-Sun;Kim, Eun-Jung;Jang, Ha-Ri
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.10
    • /
    • pp.92-102
    • /
    • 2013
  • The definition of mobile phone was a device that can make and receive telephone calls or messages for communication but it has rapidly developed from communication tool into multi-function device. Especially since release of smart phone, Korea is one of the highest country in the world and the statistics can be interpreted into people positively accept new technology. Therefore it's time to study on usage behavior according to different generation of mobile phone. Based on media richness theory and elaboration likelihood model, we analyzed factors affecting usage behavior of mobile phone. Case study methodology were constructed a survey to female university students from 20-24 years of age.

Validating the Structural Behavior and Response of Burj Khalifa: Synopsis of the Full Scale Structural Health Monitoring Programs

  • Abdelrazaq, Ahmad
    • International Journal of High-Rise Buildings
    • /
    • v.1 no.1
    • /
    • pp.37-51
    • /
    • 2012
  • New generation of tall and complex buildings systems are now introduced that are reflective of the latest development in materials, design, sustainability, construction, and IT technologies. While the complexity in design is being overcome by the availability and advances in structural analysis tools and readily advanced software, the design of these buildings are still reliant on minimum code requirements that yet to be validated in full scale. The involvement of the author in the design and construction planning of Burj Khalifa since its inception until its completion prompted the author to conceptually develop an extensive survey and real-time structural health monitoring program to validate all the fundamental assumptions mad for the design and construction planning of the tower. The Burj Khalifa Project is the tallest structure ever built by man; the tower is 828 meters tall and comprises of 162 floors above grade and 3 basement levels. Early integration of aerodynamic shaping and wind engineering played a major role in the architectural massing and design of this multi-use tower, where mitigating and taming the dynamic wind effects was one of the most important design criteria established at the onset of the project design. Understanding the structural and foundation system behaviors of the tower are the key fundamental drivers for the development and execution of a state-of-the-art survey and structural health monitoring (SHM) programs. Therefore, the focus of this paper is to discuss the execution of the survey and real-time structural health monitoring programs to confirm the structural behavioral response of the tower during construction stage and during its service life; the monitoring programs included 1) monitoring the tower's foundation system, 2) monitoring the foundation settlement, 3) measuring the strains of the tower vertical elements, 4) measuring the wall and column vertical shortening due to elastic, shrinkage and creep effects, 5) measuring the lateral displacement of the tower under its own gravity loads (including asymmetrical effects) resulting from immediate elastic and long term creep effects, 6) measuring the building lateral movements and dynamic characteristic in real time during construction, 7) measuring the building displacements, accelerations, dynamic characteristics, and structural behavior in real time under building permanent conditions, 8) and monitoring the Pinnacle dynamic behavior and fatigue characteristics. This extensive SHM program has resulted in extensive insight into the structural response of the tower, allowed control the construction process, allowed for the evaluation of the structural response in effective and immediate manner and it allowed for immediate correlation between the measured and the predicted behavior. The survey and SHM programs developed for Burj Khalifa will with no doubt pioneer the use of new survey techniques and the execution of new SHM program concepts as part of the fundamental design of building structures. Moreover, this survey and SHM programs will be benchmarked as a model for the development of future generation of SHM programs for all critical and essential facilities, however, but with much improved devices and technologies, which are now being considered by the author for another tall and complex building development, that is presently under construction.

Study on Algae Occurrence in Daecheong Reservoir (대청호의 조류발생 분석)

  • Cho, Wan Hee;Yum, Kyung Taek;Kim, Jin Soo;Ban, Yang Jin;Chung, Se Woong
    • Journal of Environmental Impact Assessment
    • /
    • v.21 no.3
    • /
    • pp.367-380
    • /
    • 2012
  • There are many long and round shape shores due to terrain characteristics in Daecheong reservoir. Therefore it is indicated different spatial distribution of algae every year since the stream is being regulated by these terrain characteristics and reservoir operation about inflow and outflow discharge. Also oversupply of nutrient salt from tributaries of Daecheong reservoir where pollutants were concentrated generates massive growth of algae and depending on hydrological, reservoir operation condition, those proliferated algae at the stagnant tributaries moves to the mainstream of Daecheong reservoir which could create problems of water quality. In this study, it was analyzed the tendency of algae generation by examining algae occurring status for the last 4 years since 2008, and implemented hydraulic analysis at Daecheong reservoir through numerical tracer simulation by applying 3-dimensional hydrodynamic model, ELCOM. Also it was implemented a quantitative analysis of causal relationship based on the algae generation tendency and hydraulic behavior at Daecheong reservoir. Through numerical tracer simulation in this study, it could be noticed the degree of spread of inflow indicated similar trend to the algae occurring status at Daecheong reservoir and verified the different tendency of algae generation in 2011 unlike previous year caused by the rise of water temperature.

Quantum Packet for the Next Generation Network/ISDN3

  • Lam, Ray Y. W.;Chan, Henry C. B.;Chen, Hui;Dillon, Tharam S.;Li, Victor O. K.;Leung, Victor C. M.
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.316-330
    • /
    • 2008
  • This paper proposes a novel method for transporting various types of user traffic effectively over the next generation network called integrated services digital network 3 (ISDN3) (or quantum network) using quantum packets. Basically, a quantum packet comprises one or more 53-byte quanta as generated by a "quantumization" process. While connection-oriented traffic is supported by fixed-size quantum packets each with one quantum to emulate circuit switching, connectionless traffic (e.g., IP packets and active packets) is carried by variable-size quantum packets with multiple quanta to support store-and-forward switching/routing. Our aim is to provide frame-like or datagram-like services while enabling cell-based multiplexing. The quantum packet method also establishes a flexible and extensible framework that caters for future packetization needs while maintaining backward compatibility with ATM. In this paper, we discuss the design of the quantum packet method, including its format, the "quantumization" process, and support for different types of user traffic. We also present an analytical model to evaluate the consumption of network resources (or network costs) when quantum packets are employed to transfer loss-sensitive data using three different approaches: cut-through, store-and-forward and ideal. Close form mathematical expressions are obtained for some situations. In particular, in terms of network cost, we discover two interesting equivalence phenomena for the cut-through and store-and-forward approaches under certain conditions and assumptions. Furthermore, analytical and simulation results are presented to study the system behavior. Our analysis provides valuable insights into the. design of the ISDN3/quantum network.