• Title/Summary/Keyword: Checking Application

Search Result 286, Processing Time 0.028 seconds

A Study on the Risk Analysis of Construction Method (건축공법 내부 리스크 분석에 관한 연구)

  • Yoon, Yer-Wan;Yang, Keek-Young
    • Journal of the Korea Institute of Building Construction
    • /
    • v.2 no.4
    • /
    • pp.131-135
    • /
    • 2002
  • The purpose of this study was to Identification the Risk of construction method to protect and reduce the risk of construction period. For this study we are using the pre and during construction period Inspection list. The inspection list was used by construction company for check a flaw of Construction field. So we rearrange the individual item of inspection list to match the Risk factor. This inspection list usually has the difference of importance because this list is not made by Method which is not focused on Method. Therefore, To find the difference of these importance, We surveyed this matter by doing interview of specialist group. To find the application of field and the possibility of measurement of Risk status, We tested Risk occurring frequency and it's strength by checking the level of Risk. The results of this study were as follows; Each Method Check List made out through the rearrangement of Construction Inspection list which used in construction company. To solve and compensate the matter which happened by changing the each Method Check List to each General Inspection List, we added the each Method Check List by checking the importance of check list of each process. By doing this, The Check List for finding Risk level of Method was created by using the check list of each Method.

Using DSP Algorithms for CRC in a CAN Controller

  • Juan, Ronnie O. Serfa;Kim, Hi Seok
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2016
  • A controller area network (CAN) controller is an integral part of an electronic control unit, particularly in an advanced driver assistance system application, and its characteristics should always be advantageous in all aspects of functionality especially in real time application. The cost should be low, while maintaining the functionality and reliability of the technology. However, a CAN protocol implementing serial operation results in slow throughput, especially in a cyclical redundancy checking (CRC) unit. In this paper, digital signal processing (DSP) algorithms are implemented, namely pipelining, unfolding, and retiming the CAN controller in the CRC unit, particularly for the encoder and decoder sections. It must attain a feasible iteration bound, a critical path that is appropriate for a CAN system, and must obtain a superior design of a high-speed parallel circuit for the CRC unit in order to have a faster transmission rate. The source code for the encoder and decoder was formulated in the Verilog hardware description language.

Application Study on the View Points Analysis for National Roads Route using Digital Elevation Data

  • Yeon, Sang-Ho;Hong, Ill-Hwa
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.292-296
    • /
    • 2002
  • This study has been accomplished as a experimental study for field application of 3D Perspective Image Map creation using Digital Topographical Map and based on the Ortho-Projection Image which is generated from Satellite Overlay Images and the precise Relative Coordinates of longitude, latitude and altitude which is corrected by GCP(Ground Control Point). AS to Contour Lines Map which is created by Coordinate conversion of 1:5,000 Topographical Map, we firstly made Satellite Image Map to substitute for Digital Topographical Map through overlapping the original images on top of each Ortho-Projection Image created and checking the accuracy. In addition to 3D Image Map creation for 3D Terrain analysis of a target district, Slope Gradient Analysis, Aspect Analysis and Terrain Elevation Model generation, multidirectional 3D Image generation by DEM can be carried out through this study. This study is to develop a mapping technology with which we can generate 3D Satellite Images of a target district through the composition of Digital Maps and Facility Blueprint and arbitrarily create 3D Perspective Images of the target district from any view point.

  • PDF

A Study on the Implication for the Optimal Reorganization in Letter of Credit Transaction based on the Reappraisal of the UCP Article 14(b) (신용장거래관습 최적편성방안의 모색 : UCP 600 제14조 (b)항의 재해석)

  • Kim, Ki-Sun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.49
    • /
    • pp.111-137
    • /
    • 2011
  • UCP 600 Article 14(b), providing rules for the period of the examination of documents, is a radical reorganization of UCP Article 13(b). The provision changes the period of time to a maximum of five banking days instead of reasonable time. One of the critical problems giving rise to the difficulty in interpretation and application is the question of fact that there may be two possible conflicting options in determining the time of checking documents presented. The one doctrine is fixed time(safe harbor) standard, and the other is hidden reasonableness standard. This study analyzes which option should be adopted for the optimal application standard by welfare effect methodology using consumer surplus approach and suggests that safe harbor standard should be optimal solution to the determination of period of examination of documents presented in letter of credit regime.

  • PDF

A Solution Method of a Three-Player Game for Application to an Electric Power Market (전력시장 해석을 위한 3연 참여 게임의 해법 연구)

  • 이광호
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.6
    • /
    • pp.347-353
    • /
    • 2003
  • In models of imperfect competition of deregulated electricity markets, the key task is to find the Nash equilibrium(NE). The approaches for finding the NE have had two major bottlenecks: computation of mixed strategy equilibrium and treatment of multi-player games. This paper proposes a payoff matrix approach that resolves these bottlenecks. The proposed method can efficiently find a mixed strategy equilibrium in a multi-player game. The formulation of the m condition for a three-player game is introduced and a basic computation scheme of solving nonlinear equalities and checking inequalities is proposed. In order to relieve the inevitable burden of searching the subspace of payoffs, several techniques are adopted in this paper. Two example application problems arising from electricity markets and involving a Cournot and a Bertrand model, respectively, are investigated for verifying the proposed method.

Development of Mobile Apps for Checking Web Security Configurations of Wireless Access Points (무선공유기 웹 보안 설정 점검을 위한 모바일 앱 개발)

  • Yoon, Heeju;Kim, Ji Hye;Lee, Hae Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.101-102
    • /
    • 2016
  • 사물인터넷(Internet of Things)의 도래와 함께, 무선공유기(wireless access point)들의 보안이 심각한 문제로 대두되고 있다. 연구진은 대부분의 무선공유기들이 제공하는 웹 기반 관리 인터페이스들에 웹 어플리케이션 취약점(web application vulnerability)들이 존재할 수 있다는 점을 착안, 국내 주요 무선공유기들에 대한 웹 어플리케이션 취약점 점검을 수행하였으며, 악용이 가능한 여러 취약점들이 존재함을 확인하였다. 본 논문에서는 연구진이 무선공유기 대상 웹 어플리케이션 취약점 점검에 보조적으로 사용하기 위하여 개발한 3종의 모바일 앱(mobile app)들을 설명한다.

  • PDF

Virtual Manufacturing for an Automotive Company (I) - Workflow Analysis and Strategic Planning of Manufacturing Preparation Activities (자동차 가상생산 기술 적용 (I) - 생산준비 업무 분석 및 적용 전략 수립)

  • Noh, Sang-Do;Lee, Chang-Ho;Hahn, Hyung-Sang
    • IE interfaces
    • /
    • v.14 no.2
    • /
    • pp.120-126
    • /
    • 2001
  • Virtual manufacturing is a technology facilitating effective development and agile manufacturing of products via sophisticated computer models representing physical and logical schema and behavior of real manufacturing systems including manufacturing resources, environments, and products. Based on these models, virtual manufacturing supports decision making and error checking in the entire manufacturing processes from design to mass production. At first, we analyzed manufacturing preparation activities of the four major production shops such as press, body assembly, painting and final assembly, of a Korean automotive company. We then developed the workflow models out of the analysis by the IDEF methodology, and generated a strategic plan for the systematic application of the virtual manufacturing technologies. We identified many manufacturing preparation activities that can be improved by the application of virtual manufacturing technologies. Finally, we estimated the effect of improvement including time savings in car development processes and corresponding cost savings.

  • PDF

Structural reliability estimation using Monte Carlo simulation and Pearson's curves

  • Krakovski, Mikhail B.
    • Structural Engineering and Mechanics
    • /
    • v.3 no.3
    • /
    • pp.201-213
    • /
    • 1995
  • At present Level 2 and importance sampling methods are the main tools used to estimate reliability of structural systems. But sometimes application of these techniques to realistic problems involves certain difficulties. In order to overcome the difficulties it is suggested to use Monte Carlo simulation in combination with two other techniques-extreme value and tail entropy approximations; an appropriate Pearson's curve is fit to represent simulation results. On the basis of this approach an algorithm and computer program for structural reliability estimation are developed. A number of specially chosen numerical examples are considered with the aim of checking the accuracy of the approach and comparing it with the Level 2 and importance sampling methods. The field of application of the approach is revealed.

The Research of Security Vulnerabilities of Smartphone (스마트폰 보안 취약 요소에 따른 분석 연구)

  • Choi, Hee Sik;Cho, Yang Hyun;Joo, Heon Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.119-127
    • /
    • 2013
  • The merits of Smartphone are portability, convenience and especially a lot of information can be stored in the device. Especially in Smartphone, users can install programs that cannot install to normal cell phone and users can use many different services through these Smartphone programs. Also Smartphone can connect to Internet through network, so it can access information anytime, anywhere easily. Security of personal information and variety of information which stored in Smartphone are in risk. In Chapter 2 of thesis, it will discuss the definition and features of the Smartphone and market trends. In Chapter 3 of thesis, it will discuss security vulnerabilities of Smartphone and it will analyze and research security vulnerabilities of Smartphone in Chapter 4. In conclusion, it will check users' identification twice in useful application especially application that relate to finance and mobile payment. By checking users' identification several times, it will help to defend from security threats. Users can use Smartphone safely and convenience by know how to prevent from mobile hacking for personal and private information. the quality of APIs matching by the clustering and hierarchical relationships mechanism.

Mobile SNS Application Accessibility Evaluation for the Disabled and the Aged (장애우 및 고령자 측면에서의 모바일 SNS 앱접근성 평가)

  • Hong, Mee-Hee;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.575-582
    • /
    • 2012
  • Mobile SNS like facebook is famous as an app which users cooperate others and share information without regard to time and place. But it is necessary to evaluate the mobile app accessibility in view of the disabled and the aged to check if they get appropriate interface service to use such a popular app. Mobile app accessibility is an indicator of equal opportunity to mobile app for all users regardless of cognitive and physical attribute. Therefore, this paper evaluates accessibility of facebook and kakaotalk mobile SNS, apprehend the status of conform to the manual, and suggest an improving way, based on 'mobile application accessibility guideline' announced by government and 'mobile application (Android) accessibiliy checking manual(v1.0)' by National Information society agency.