• Title/Summary/Keyword: Core schemes

Search Result 109, Processing Time 0.025 seconds

Simulation of Ice Ring Formation around Cryogenic Underground Storage Cavern using Hydro-Thermal Coupling Method (극저온 지하저장고 주변 ice ring 생성 모델링을 위한 열-수리 해석)

  • Jung Yong-Bok;Park Chan;Chung So-Keul;Jeong Woo-Cheol;Kim Ho-Yeong
    • Tunnel and Underground Space
    • /
    • v.16 no.3 s.62
    • /
    • pp.241-250
    • /
    • 2006
  • Ice ring formation, one of the core techniques in LNG storage in a lined rock cavern, is investigated through hydro-thermal coupled analysis. An ice ring acts as a secondary barrier in case of leakage of cryogenic liquid and as a primary barrier for groundwater intrusion into an LNG cavern. Therefore, the thickness and location of the ice ring are crucial factors for the safe operation of an LNG storage cavern, especially for maintaining the integrity of a primary barrier composed of concrete, PU foam, and steel membrane. Through numerical analyses, the position and thickness of the ice ring are estimated, and the temperature and groundwater level are compared with measured values. The temperature md groundwater level by numerical analyses show good agreement with the field measurements when temperature-dependent properties and phase change are taken into account. The schemes used in this paper can be applied for estimation of ice ring formation in designing a full-scale LNG cavern.

A Study on RFID System for Accessing Multiple Objects Using Encrypted ID (암호화된 ID를 이용한 다중 객체 접근 방식의 RFID 시스템 연구)

  • Jung, Jong-Jin;Kim, Ji-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.80-87
    • /
    • 2008
  • RFID systems are being studied and developed in the area of the industry and marketplace. Recently RFID systems are core element of the ubiquitous technologies in individual life and industry. However, RFID systems often cause some serious problems such as violation of privacy and information security because their contactless devices communicate each other by radio frequency In this paper, we propose multiple objects RFID tag scheme including tag structure and authentication protocol. The proposed RFID tag structure maintains several object IDs of different applications in a tag memory. The tag structure allows those applications to access object IDs simultaneously. The authentication protocol for multiple objects tag is designed ta overcome the problems of security and privacy. The protocol has robustness against various attacks in low cost RFID systems. We evaluate the efficiency of proposed scheme and compare security of our scheme with several traditional schemes.

  • PDF

A Framework for Multiple Wireless Services in Heterogeneous Wireless Networks (중첩된 이기종 무선망에서의 다중 무선 서비스 프레임워크)

  • Shin, Choong-Yong;Cho, Jin-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.85-94
    • /
    • 2008
  • As a variety of wireless network services, such as WLAN, WiBro, cdma2000, and HSDPA, are provided and the range of users' choices for the wireless services are broaden, MCoA (Multiple Car-of Address) concepts that enable users to use wireless interfaces simultaneously have been presented in IETF MONAMI6 WG. Through this scheme, users can access several networks simultaneously by using multiple wireless interfaces. Such various wireless connection technologies continue to advance as they are connected and integrated to All-IP-based core network, and at the same time, heterogeneous networks are being managed overlaid according to the coverage of the wireless connection technologies. Under such circumstances, needs for an integrated architecture have arisen, and thus Wireless service framework is required that effectively manages heterogeneous networks which coexist with next generation's networks for 4G. In this paper, a wireless service framework is suggested in the consideration of current wireless service environment, and the framework covers the schemes to minimize the packet loss caused by handover, and also modified Multiple Care-of Address that helps to select most effective network by considering characteristics of various interfaces as well as users' preferences.

  • PDF

A Study on the Applicability of Facial Action Coding System for Product Design Process (제품 디자인 프로세스를 위한 표정 부호화 시스템(FACS) 적용성에 대한 연구)

  • Huang, Chao;Go, Jung-Wook
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.80-88
    • /
    • 2019
  • With more emphasis on emotional communication with users in product design field, designers' clear and prompt grasp of user's emotion has become the core activity in product design research. To increase the flexibility applying emotion measurement in the process of product design, this study has used Facial Action Coding System (FACS) of behavioral emotion measurement method in product design evaluation. To select specimens, it has flexibly used the emotional product Image Map. Then this study has selected six product irritants inducing positive, negative and neutral emotions, and conducted FACS experiment with ordinary product users of 20 generations as the experimental subject, and analyzed users' emotional state in response to the irritants through their facial expressions. It also analyzes the advantages and disadvantages of FACS in the process of product design, such as "recording users' unconscious facial expressions" and puts forward some applicable schemes, such as "choosing a product stimulus with high user response". It is expected that this paper can be helpful to the flexibility of FACS as a method to predict user's emotion in advance at the trial stage of product design before launching them to the market.

Couples relationship education program research in Korea: An analysis of program development in human ecology journals (국내 커플관계교육 연구의 프로그램 개발과정 분석: 생활과학분야 학술지 논문을 중심으로)

  • Park, Jisoo;Lee, Jeenkyoung;Lee, Jaerim
    • Journal of Family Relations
    • /
    • v.22 no.4
    • /
    • pp.81-105
    • /
    • 2018
  • Objective: The purpose of this study was to analyze how couples relationship education (CRE) programs in Korean scholarly journals have been developed since they first appeared in 1994. Method: We selected articles that were published in journals related to human ecology and that included information about how the authors developed CRE programs (premarital education, marriage education). Using coding schemes based on the theoretical frameworks of CRE, we quantitatively coded programs in four specific areas: (a) overall characteristics, (b) program planning, (c) program construction and implementation, and (d) program evaluation. Results: Although CRE programs have increased and evolved since the 1990s, the literature has been limited on testing long-term program efficacy, developing dissemination plans, and applying theories to program design. In terms of program participants and content, most programs had similar themes despite their differences in the target audience. We also found that few programs have been provided for diverse couples. As for evaluation, pre- and post-testing was the most common method of efficacy test. Conclusion: Our findings suggest that family researchers and practitioners develop more elaborate and systematic programs to advance CRE in Korea as a core topic of family life education and to provide evidence-informed practice.

A comprehensive examination of the linear and numerical stability aspects of the bubble collision model in the TRACE-1D two-fluid model applied to vertical disperse flow in a PWR core channel under loss of coolant accident conditions

  • Satya Prakash Saraswat;Yacine Addad
    • Nuclear Engineering and Technology
    • /
    • v.56 no.8
    • /
    • pp.2974-2989
    • /
    • 2024
  • The one-dimensional Two-Fluid concept uses an area-average approach to simplify the time and phase-averaged Two-Fluid conservation equations, making it more suitable for addressing difficulties at an industrial scale. Nevertheless, the mathematical framework has inherent weaknesses due to the loss of details throughout the averaging procedures. This limitation makes the conventional model inappropriate for some flow regimes, where short-wavelength perturbations experience uncontrolled amplification, leading to solutions that need to be physically accurate. The critical factor in resolving this problem is the integration of closure relations. These relationships play a crucial function in reintroducing essential physical characteristics, thus correcting the loss that occurs during averaging and guaranteeing the stability of the model. To improve the accuracy of predictions, it is essential to assess the stability and grid dependence of one-dimensional formulations, which are particularly affected by closure relations and numerical schemes. The current research presented in the text focuses on improving the well-posedness of the TFM, specifically within the TRACE code, which is widely utilized for nuclear reactor safety assessments. Incorporating a bubble collision model in the momentum equations is demonstrated to enhance the TFM's resilience, especially in scenarios with high void fractions where conventional TFMs may face challenges. The analysis presents a linear stability analysis performed for the transient one-dimensional Two-Fluid Model of system code TRACE within the framework of vertically dispersed flows. The main emphasis is on evaluating the stability characteristics of the model while also acknowledging its susceptibility to closure relations and numerical techniques.

Multi-Vector Document Embedding Using Semantic Decomposition of Complex Documents (복합 문서의 의미적 분해를 통한 다중 벡터 문서 임베딩 방법론)

  • Park, Jongin;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.19-41
    • /
    • 2019
  • According to the rapidly increasing demand for text data analysis, research and investment in text mining are being actively conducted not only in academia but also in various industries. Text mining is generally conducted in two steps. In the first step, the text of the collected document is tokenized and structured to convert the original document into a computer-readable form. In the second step, tasks such as document classification, clustering, and topic modeling are conducted according to the purpose of analysis. Until recently, text mining-related studies have been focused on the application of the second steps, such as document classification, clustering, and topic modeling. However, with the discovery that the text structuring process substantially influences the quality of the analysis results, various embedding methods have actively been studied to improve the quality of analysis results by preserving the meaning of words and documents in the process of representing text data as vectors. Unlike structured data, which can be directly applied to a variety of operations and traditional analysis techniques, Unstructured text should be preceded by a structuring task that transforms the original document into a form that the computer can understand before analysis. It is called "Embedding" that arbitrary objects are mapped to a specific dimension space while maintaining algebraic properties for structuring the text data. Recently, attempts have been made to embed not only words but also sentences, paragraphs, and entire documents in various aspects. Particularly, with the demand for analysis of document embedding increases rapidly, many algorithms have been developed to support it. Among them, doc2Vec which extends word2Vec and embeds each document into one vector is most widely used. However, the traditional document embedding method represented by doc2Vec generates a vector for each document using the whole corpus included in the document. This causes a limit that the document vector is affected by not only core words but also miscellaneous words. Additionally, the traditional document embedding schemes usually map each document into a single corresponding vector. Therefore, it is difficult to represent a complex document with multiple subjects into a single vector accurately using the traditional approach. In this paper, we propose a new multi-vector document embedding method to overcome these limitations of the traditional document embedding methods. This study targets documents that explicitly separate body content and keywords. In the case of a document without keywords, this method can be applied after extract keywords through various analysis methods. However, since this is not the core subject of the proposed method, we introduce the process of applying the proposed method to documents that predefine keywords in the text. The proposed method consists of (1) Parsing, (2) Word Embedding, (3) Keyword Vector Extraction, (4) Keyword Clustering, and (5) Multiple-Vector Generation. The specific process is as follows. all text in a document is tokenized and each token is represented as a vector having N-dimensional real value through word embedding. After that, to overcome the limitations of the traditional document embedding method that is affected by not only the core word but also the miscellaneous words, vectors corresponding to the keywords of each document are extracted and make up sets of keyword vector for each document. Next, clustering is conducted on a set of keywords for each document to identify multiple subjects included in the document. Finally, a Multi-vector is generated from vectors of keywords constituting each cluster. The experiments for 3.147 academic papers revealed that the single vector-based traditional approach cannot properly map complex documents because of interference among subjects in each vector. With the proposed multi-vector based method, we ascertained that complex documents can be vectorized more accurately by eliminating the interference among subjects.

MNFS: Design of Mobile Multimedia File System based on NAND FLASH Memory (MNFS : NAND 플래시메모리를 기반으로 하는 모바일 멀티미디어 파일시스템의 설계)

  • Kim, Hyo-Jin;Won, You-Jip;Kim, Yo-Hwan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.11
    • /
    • pp.497-508
    • /
    • 2008
  • Mobile Multimedia File System, MNFS, is a file system which extensively exploits NAND FLASH Memory, Since general Flash file systems does not precisely meet the criteria of mobile devices such as MP3 Player, PMP, Digital Camcorder, MNFS is designed to guarantee the optimal performance of FLASH Memory file system. Among many features MNFS provides, there are three distinguishable characteristics. MNFS guarantees, first, constant response time in sequential write requests of the file system, second, fast file system mounting time, and lastly least memory footprint. MNFS implements four schemes to provide such features, Hybrid mapping scheme to map file system metadata and user data, manipulation of user data allocation to fit allocation unit of file data into allocation unit of NAND FLASH Memory, iBAT (in core only Block Allocation Table) to minimize the metadata, and bottom-up representation of directory. Prototype implementation of MNFS was tested and measured its performance on ARM9 processor and 1Gbit NAND FLASH Memory environment. Its performance was compared with YAFFS, NAND FLASH File system, and FAT file system which use FTL. This enables to observe constant request time for sequential write request. It shows 30 times faster mounting time to YAFFS, and reduces 95% of HEAP memory consumption compared to YAFFS.

A Study on the Seismic Response of a Non-earthquake Resistant RC Frame Using Inelastic Dynamic Analyses (비선형 동적 해석을 이용한 비내진 상세 RC 골조의 지진거동 특성 분석)

  • Jeong, Seong-Hoon;Lee, Kwang-Ho;Lee, Soo-Kueon
    • Journal of the Korea Concrete Institute
    • /
    • v.22 no.3
    • /
    • pp.381-388
    • /
    • 2010
  • In this study, characteristics of the seismic response of the non-earthquake resistant reinforced concrete (RC) frame were identified. The test building is designed to withstand only gravity loads and not in compliance with modern seismic codes. Smooth bars were utilized for the reinforcement. Members are provided with minimal amount of stirrups to withstand low levels of shear forces and the core concrete is virtually not confined. Columns are slender and more flexible than beams, and beam-column connections were built without stirrups. Through the modeling of an example RC frame, the feasibility of the fiber elementbased 3D nonlinear analysis method was investigated. Since the torsion is governed by the fundamental mode shape of the structure under dynamic loading, pushover analysis cannot predict torsional response accurately. Hence, dynamic response history analysis is a more appropriate analysis method to estimate the response of an asymmetric building. The latter method was shown to be accurate in representing global responses by the comparison of the analytical and experimental results. Analytical models without rigid links provided a good estimation of reduced stiffness and strength of the test structure due to bond-slip, by forming plastic hinges closer to the column ends. However, the absence of a proper model to represent the bond-slip poased the limitations on the current inelastic analysis schemes for the seismic analysis of buildings especially for those with round steel reinforcements. Thus, development of the appropriate bond-slip model is in need to achieve more accurate analysis.

Moving Object Tracking Scheme based on Polynomial Regression Prediction in Sparse Sensor Networks (저밀도 센서 네트워크 환경에서 다항 회귀 예측 기반 이동 객체 추적 기법)

  • Hwang, Dong-Gyo;Park, Hyuk;Park, Jun-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.3
    • /
    • pp.44-54
    • /
    • 2012
  • In wireless sensor networks, a moving object tracking scheme is one of core technologies for real applications such as environment monitering and enemy moving tracking in military areas. However, no works have been carried out on processing the failure of object tracking in sparse sensor networks with holes. Therefore, the energy consumption in the existing schemes significantly increases due to plenty of failures of moving object tracking. To overcome this problem, we propose a novel moving object tracking scheme based on polynomial regression prediction in sparse sensor networks. The proposed scheme activates the minimum sensor nodes by predicting the trajectory of an object based on polynomial regression analysis. Moreover, in the case of the failure of moving object tracking, it just activates only the boundary nodes of a hole for failure recovery. By doing so, the proposed scheme reduces the energy consumption and ensures the high accuracy for object tracking in the sensor network with holes. To show the superiority of our proposed scheme, we compare it with the existing scheme. Our experimental results show that our proposed scheme reduces about 47% energy consumption for object tracking over the existing scheme and achieves about 91% accuracy of object tracking even in sensor networks with holes.