• Title/Summary/Keyword: Code Distribution Method

Search Result 389, Processing Time 0.024 seconds

Numerical Study on the Performance Assessment for Defrost and De-Icing Modes (승용차의 제상 및 성에 제거 성능 평가를 위한 수치해석적 연구)

  • Kim, Yoon-Kee;Yang, Jang-Sik;Kim, Kyung-Chun;Ji, Ho-Seong
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.35 no.2
    • /
    • pp.161-168
    • /
    • 2011
  • The heating, ventilating, air conditioning (HVAC) system is a very important part of an automotive vehicle: it controls the microclimate inside the passenger's compartment and removes the frost or mist that is produced in cold/rainy weather. In this study, the numerical analysis of the defrost duct in an HVAC system and the de-icing pattern is carried out using commercial CFX-code. The mass flow distribution and flow structure at the outlet of the defrost duct satisfied the duct design specification. For analyzing the de-icing pattern, additional grid generation of solid domain of ice and glass is pre-defined for conductive heat transfer. The flow structure near the windshield, streakline, and temperature fields clearly indicate that the de-icing capacity of the given defrost duct configuration is excellent and that it can be operated in a stable manner. In this paper, the unsteady changes in temperature, water volume fraction, and static enthalpy at four monitoring points are discussed.

A Numerical Model to Evaluate Fire-Resistant Capacity of the Reinforced Concrete Members (화재에 손상된 철근콘크리트 부재의 수치모델 및 내화성능해석)

  • Hwang, Jin-Wook;Ha, Sang-Hee;Lee, Yong-Hoon;Kim, Wha-Jung;Kwak, Hyo-Gyoung
    • Journal of the Korea Concrete Institute
    • /
    • v.25 no.5
    • /
    • pp.497-508
    • /
    • 2013
  • This paper introduces a numerical model which can evaluate the fire-resistant capacity of reinforced concrete members. On the basis of the transient heat transfer considering the heat conduction, convection and radiation, time-dependent temperature distribution across a section is determined. A layered fiber section method is adopted to consider non-linear material properties depending on the temperature and varying with the position of a fiber. Furthermore, effects of non-mechanical strains of each fiber like thermal expansion, transient strain and creep strain are reflected on the non-linear structural analysis to take into account the extreme temperature variation induced by the fire. Analysis results by the numerical model are compared with experimental data from the standard fire tests to validate an exactness of the introduced numerical model. Also, time-dependent changes in the resisting capacities of reinforced concrete members exposed to fire are investigated through the analyses and, the resisting capacities evaluated are compared with those determined by the design code.

A Retrospective Clinical Analysis of 1,485 Patients Who Visited the Emergency Room of Korean Medical Hospital with Musculoskeletal Disorders (한방병원 응급실에 내원한 근골격계 질환 환자 1,485명에 대한 후향적 임상 분석)

  • Kwon, Min Soo;Kim, Jung Hwan;Jo, Dae Hyun;Choi, Ji Eun;Han, Ji Sun;Lee, Seung Min;Nam, Dong Woo;Choi, Do Young
    • Journal of Acupuncture Research
    • /
    • v.32 no.3
    • /
    • pp.95-105
    • /
    • 2015
  • Objectives : The purpose of this study is to review the characteristics of patients who visited the emergency room of a Korean medical hospital with musculoskeletal disorders during the last 5 years and to provide a potential basis for future studies and emergency medical practice. Methods : Patient visit records between May 1st, 2010 and February 28th, 2015 were reviewed and patients with musculoskeletal disorders were included in a retrospective analysis. Results : A total of 5,218 patient visit records were initially reviewed and 1,485 patients (28.46 %) were included in the analysis. S code group was the most frequently diagnosed coding group of Korean Standard Classification of Diseases. The male to female ratio was 1.05:1 and patients in their thirties represented the highest age group. When classified by time of visit, the distribution of patients was similar from 10:00 to 22:59. The most frequently visited day and month were Sunday and September. 879 patients (59.19 %) visited the emergency room within 24 hours from onset of symptoms. The most common symptom site was the low back (45.59 %), followed by ankle (13.94 %) and neck (13.80 %). The most frequently used treatment method was acupuncture (92.32 %), followed by infrared (45.45 %), TENS (30.03 %) and herbal medication (29.02 %). The follow-up and admission rates were 30.24 % and 13.00 % respectively. 343 patients (23.10 %) received Western medical treatment within a day before visiting the emergency room of the Korean medical hospital. Conclusions : This analysis provides the latest information on the characteristics of patients who visited the emergency room of a Korean medical hospital with musculoskeletal disorders. The results can provide the basis for further studies and for other attempts to improve the clinical setting of the emergency room.

Numerical Analysis on Wave Characteristics around Submerged Breakwater in Wave and Current Coexisting Field by OLAFOAM (파-흐름 공존장내 잠제 주변에서 OLAFOAM에 의한 파랑특성의 수치해석)

  • Lee, Kwang-Ho;Bae, Ju-Hyun;An, Sung-Wook;Kim, Do-Sam;Bae, Kee Seung
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.28 no.6
    • /
    • pp.332-349
    • /
    • 2016
  • OLAFOAM is the powerful CFD code and is an expanded version of $OpenFOAM^{(R)}$, for wave mechanics simulation. The $OpenFOAM^{(R)}$ does provide many solvers to correspond to each object of the numerical calculation in a variety of fields. OLAFOAM's governing equation bases on VARANS (Volume-Averaged Reynolds-Averaged Navier-Stokes) equation, and the finite volume method is applied to numerical techniques. The program is coded in C++ and run on the Linux operating system. First of all, in this study, OLAFOAM was validated for 1) wave transformation inside porous structure under bore and regular wave conditions, 2) wave transformation by submerged breakwater under regular wave condition, and 3) regular wave transformation and resultant vertical velocity distribution under current by comparison with existing laboratory measurements. Hereafter, this study, which is almost no examination carried out until now, analyzed closely variation characteristics of water surface level, wave height, frequency spectrum, breaking waves, averaged velocity and turbulent kinetic energy around porous submerged breakwater in the wave and current coexisting field for the case of permeable or impermeable rear beach. It was revealed that the wave height fluctuation according to current direction(following or opposing) was closely related to the turbulent kinetic energy, and others.

A Rapid Region-of-Interest Processing Technique using Mask Patterns for JPEG2000 (JPEG2000에서 마스크 패턴을 이용한 빠른 관심영역 처리 기법)

  • Lee, Jum-Sook;Ha, Seok-Woon;Park, Jae-Heung;Seo, Yeong-Geon;Kang, Ki-Jun;Hong, Seok-Won;Kim, Sang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.19-27
    • /
    • 2010
  • An region of interest processing technique is to handle preferentially some part of an image dynamically according to region of interest of the users in JPEG2000 image. A small image is not important, but in a big image the specified region that the user indicated has to be handled preferentially because it takes long time to display the whole image. If the user indicates a region of the outline image, the browser masks the region and sends the mask information to the source that transmitted the image. The server which got the mask information preferentially sends the code blocks matching the masks. Here, quickly generating mask information is important, so, in this paper using predefined 48 mask patterns, selecting one of the patterns according to the distribution of ROI(Region-of-Interest) and background, we remarkably reduced the time computing the mask region. Blocks that the patterns are applied are the blocks mixed of ROI and background in a block. If a whole block is an ROI or a background, these patterns are not applied. As results, comparing to the method that precisely handles ROI and background, the quality is unsatisfactory but the processing time remarkably reduced.

The Study for the Production of Rehmannia Glutinosa and the Import Movement and the Improving Methods of Distribution (국내 지황 생산 및 수입 동향과 유통 개선방안에 관한 연구)

  • Yeon Bok Kim;Kwang Jin Chang;Chang Ha Park;Sang Un Park
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.25 no.2
    • /
    • pp.5-11
    • /
    • 2023
  • Rehmannia glutinosa is a perennial herb belonging to the family Scrophulariaceae and is used in traditional oriental medicine. This study was carried out current status of breeding of R. glutinosa, its problems, and the matters to be improved were made. Based on the research data published so far, this study summarized the characteristics of breeds cultivated in Korea and compared and analyzed the status of cultivation area, production, import, and price changes for 15 years from 2008 to 2021. The cultivated area of R. glutinosa is gradually decreasing, and the amount of import is increasing and decreasing repeatedly. Amount of import has declined significantly. There was a lot of disinfection and disposal in the middle of import, and dried Jihwang and Sukjihwang were imported without distinction. R. glutinosa must be cultivated and supplied as a variety desired by the industry, cultivation techniques need to be taught to producers. In order to clearly identify the amount of import, import code of dried Jihwang and Sukjihwang must be classify. In addition, it is necessary to develop and supply harvesting agricultural machines for mechanization. For the stable income of producers, supply control through contract cultivation will ensure stable farm income.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

A Study of on the Method to Select Manufacturing Activities Sensitive to Regional Characteristics by Analyzing the Locational Hierarchy (입지계층분석을 활용한 산업단지 유치 업종 결정에 관한 연구)

  • So, Jin-Kwang;Lee, Hyeon-Joo;Kim, Sun-Woo
    • Land and Housing Review
    • /
    • v.2 no.4
    • /
    • pp.559-568
    • /
    • 2011
  • This study aims at listing up those manufacturing activities sensitive to regional characteristics by analyzing locational hierarchy designed on the urban rank-size rule. This locational hierarchy by manufacturing activities is expected to provide a ground for the proper supply of an industrial complex. The analysis of the locational hierarchy by manufacturing activities can work as a method of observing the characteristics of the distribution of location for each economic activity by analyzing the trend in the change of manufacturing location. Consequently, it can be used to determine the appropriate manufacturing activities for the industrial complex of a particular region. Here, the locational hierarchy is analyzed depending on the base of the basic local government such as Gun(district level) and Si(city level), and manufacturing activities are categorized by Korea Standard Industry Code. Those activities demonstrating growth pattern are Manufacture of Electronic Equipment(KSIC 26), Manufacture of Medical Precision Optical Instruments Watch(KSIC 27), Manufacture of Motor Vehicles (KSIC 30, 31), etc. With proper infrastructures, these activities can be located everywhere. Those sectors on the decline pattern in the locational hierarchy can be summarized as Manufacture of Tobacco Products(KSIC 12), Manufacture of wearing apparel Fur Articles(KSIC 14), etc. Those sectors scattered widely in the locational hierarchy are Manufacture of Food Products(KSIC 10), Manufacture of Coke Petroleum Products(KSIC 19), Manufacture of Chemical Products(KSIC 20), Manufacture of Electronic Equipment(KSIC 26). These particular manufacturing activities can be operated in those regions in a sufficient supply of unskilled workers regardless of proper infrastructures. Those activities that have a tendency to reconcentrate on larger cities are Manufacture of Textiles(KSIC 13), Manufacture of Wearing Apparel Clothing Fur Articles(KSIC 14), Manufacture of Other Transport Equiptmen(KSIC 31). In most cases, these sectors tend to favor their existing agglomerated areas and concentrate around large cities. Therefore, it is inefficient to promote these sectors in small or medium-sized cities or underdeveloped regions. The establishment of developmental strategies of an industrial complex can gain greater competitiveness by observing such characteristics of the locational hierarchy.