• Title/Summary/Keyword: Design Environments

Search Result 3,133, Processing Time 0.029 seconds

Virtual In-situ Sensor Calibration and the Application in Unitary Air Conditioners (유닛형 공기조화기 센서의 가상보정 방법 및 적용 특성 분석)

  • Yoon, Sungmin;Kim, Yong-Shik
    • Journal of the Korean Solar Energy Society
    • /
    • v.38 no.6
    • /
    • pp.65-72
    • /
    • 2018
  • Since data-driven building technologies have been widely applied to building energy systems, the accuracy of building sensors has more impacts on the building performance and system performance analysis. Various building sensors, however, can have typical errors including a random error (noise) and a systematic error (bias). The systematic error is indicated by the difference between the mean of measurements and their true value. It may occur due to the sensor's physical condition, measured phenomena, working environments inside the systems. Unfortunately, a conventional calibration method has limitations in calibrating the systematic errors because of the difference between working environments and calibration conditions. In such situations, a novel sensor calibration method is needed to handle various sensor errors, especially for systematic errors, in building energy systems having various thermodynamic environments. This study proposes a building sensor calibration method named Virtual In-situ Calibration (VIC) and shows how it is applied into a real building system and how it solves the sensor errors.

Simulating and evaluating regolith propagation effects during drilling in low gravity environments

  • Suermann, Patrick C.;Patel, Hriday H.;Sauter, Luke D.
    • Advances in Computational Design
    • /
    • v.4 no.2
    • /
    • pp.141-153
    • /
    • 2019
  • This research is comprised of virtually simulating behavior while experiencing low gravity effects in advance of real world testing in low gravity aboard Zero Gravity Corporation's (Zero-G) research aircraft (727-200F). The experiment simulated a drill rig penetrating a regolith simulant. Regolith is a layer of loose, heterogeneous superficial deposits covering solid rock on surfaces of the Earth' moon, asteroids and Mars. The behavior and propagation of space debris when drilled in low gravity was tested through simulations and visualization in a leading dynamic simulation software as well as discrete element modeling software and in preparation for comparing to real world results from flying the experiment aboard Zero-G. The study of outer space regolith could lead to deeper scientific knowledge of extra-terrestrial surfaces, which could lead us to breakthroughs with respect to space mining or in-situ resource utilization (ISRU). These studies aimed to test and evaluate the drilling process in low to zero gravity environments and to determine static stress analysis on the drill when tested in low gravity environments. These tests and simulations were conducted by a team from Texas A&M University's Department of Construction Science, the United States Air Force Academy's Department of Astronautical Engineering, and Crow Industries

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 익명성을 보장하는 사용자 인증 및 키 동의 프로토콜 설계)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.3-12
    • /
    • 2006
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'smart space' augmented with intelligence and enhanced with services. However, unless privacy concerns are taken into account early in the design process of various ubiquitous devices(e.g. mobile devices, PDAs, sensors, etc.). we will end up crating ubiquitous surveillance infrastructure. Also, it may inappropriate to use public key techniques for computational constrained devices in ubiquitous computing environment. In this paper, we propose efficient user authentication and ky agreement protocol not only to preserve anonymity for protecting personal privacy but also to be suitable for computational constrained devices in ubiquitous computing environments.

ESD Design and Analysis Tools for LEO SAT (저궤도 위성의 ESD 설계 및 해석도구)

  • Lim, Seong-Bin;Kim, Tae-Youn;Jang, Jae-Woong
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.7 no.1
    • /
    • pp.68-78
    • /
    • 2009
  • In this paper, the electrostatic charging and discharging mechanism, and its effects in space plasma environment are reviewed and the system design control documents, ESD analysis tools and modelling techniques, and the SPIS program in Europe are introduced. A design of the satellite system against the electrostatic discharge (ESD) effects in space plasma environments is carefully taken into account at the early stage of development. In a view of the space system design, it really depended on the mission of system, electrical and mechanical configuration, system operation, and orbit condition. Behavior of the electrons and the ions in those environments may be occurred the sever problem to the satellite operation. So it is carefully understood for implementation of the satellite system. By this reason, the space environments and its effects have been comprehensively studied in U.S.A and Europe.

  • PDF

Controller Design for Cooperative Robots in Unknown Environments using a Genetic Programming (유전 프로그래밍을 이용한 미지의 환경에서 상호 협력하는 로봇 제어기의 설계)

  • 정일권;이주장
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.9
    • /
    • pp.1154-1160
    • /
    • 1999
  • A rule based controller is constructed for multiple robots accomplishing a given task in unknown environments by using genetic programming. The example task is playing a simplified soccer game, and the controller for robots that governs emergent cooperative behavior is successfully found using the proposed procedure A neural network controller constructed using the rule based controller is shown to be applicable in a more complex environment.

  • PDF

A CALS Integrated Database Design Utilizing CORBA (CORBA 기반의 CALS 통합 데이터베이스 설계)

  • 우훈식;정석찬
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.2
    • /
    • pp.155-169
    • /
    • 1997
  • The CALS integrated database is a key information technology in which CALS implements an information sharing system to enable digital data transfers for technical and non-technical information in distributed and heterogeneous environments. Such heterogeneously distributed CALS information needs to be systematically incorporated so that it can provide a global data view for CALS users. In this paper, we investigated the technologies of CALS integrated database, and proposed a system prototype to implement an integrated data environment (IDE) utilizing distributed object environments CORBA (Common Object Request Broker Architecture).

  • PDF

Deep Excavation-induced Building and Utility Damage Assessment (도심지 깊은굴착시 주변 건물 및 매설관 손상평가)

  • 유충식
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2002.10a
    • /
    • pp.85-95
    • /
    • 2002
  • A substantial portion of the cost of deep excavations in urban environments is devoted to prevent ground movements and their effects on adjacent buildings and utilites. Prediction of ground movements and assessment of the risk of damage to adjacent structures has become an essential part of the planning, design, and construction of a deep excavation project in the urban environments. This paper presents damage assessment techniques for buildings and utilities adjacent deep excavation, which can be readily used in practice.

  • PDF

A Study of Mathematics Educational Multimedia Development: Focused on the Jasper Series (수학교육용 멀티미디어 개발에 관한 연구 -Jasper 시리즈 사례를 중심으로-)

  • 김민경
    • The Mathematical Education
    • /
    • v.39 no.1
    • /
    • pp.59-69
    • /
    • 2000
  • In order to serve effective teaching and teaming environments with an appropriate harmony of hard technologies and soft technologies and to contribute to multimedia contents design and development this study shows that the theoretical backgrounds, producing backgrounds, contents scenario, and related research as well as their use and integration into realistic classroom. In our environments, it is believed that it is possible for us to develop effective mathematics educational multimedia development fitting to our culture and emotion. Thus it is urged that the government should support the professional multimedia development & production association enthusiastically.

  • PDF

Design of key Distribution Protocol with Mutual Authenticationi for Mobile Communication Environments (이동통신환경에 적합한 상호 인증을 제공하는 키분배 프로토콜의 설계)

  • 조동욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.21-30
    • /
    • 2000
  • 본 논문에서는 이동통신환경의 특징과 기존의 키분배 프로토콜들에서 발생할 수 있는 공격들을 프로토콜 수행전 수행중, 수행후로 나누어서 살펴보고 이를 기반으로 이동통신환경에 적합한 키분배 프로토콜 설계에 필요한 요구사항 들을 제시한다 또한 제시된 요구사항을 기반으로 이동통신환경에 적합한 상호인증을 제공하는 키분배 프로토콜을 제안하고 제안한 프로토콜을 분석한다.

Design and Implementation of Dynamic Peer Selection Scheme for Allocating Proxy-Server on Pure P2P Network Environments (순수 P2P 네트워크 환경에서 프락시-서버 할당을 위한 동적 피어 선정 기법 설계 및 구현)

  • Kim, Young-Jin;Kim, Moon-Jeong;Kim, Ung-Mo;Eom, Young-Ik
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.153-160
    • /
    • 2003
  • Recently, deployments of firewalls and NATs ire increasing to provide network security features or to solve the problem of public IP shortage. But, in these environments, peers in different firewall or NAT environments may get limited services because they cannot open direct communicate channels. This can be a significant problem in pure P2P environments where the peers should get or provide services by opening direct channels among themselves. In this paper, we propose a scheme for dynamically selecting a peer that fan be used as a proxy server. The proxy server supports the communication between the peers in different firewall or NAT environments. The proposed scheme is operating system independent and supports bidirectional communication among the peers in P2P environments. Additionally, the proposed scheme can distribute network traffic by dynamically allocating proxy servers to the peers that is not located in the firewall or NAT environments.