• 제목/요약/키워드: Evaluation Scheme

검색결과 1,523건 처리시간 0.022초

Hybrid-QUICK Scheme Using Finite-Volume Method

  • Choi, Jung-Eun
    • Journal of Hydrospace Technology
    • /
    • 제2권2호
    • /
    • pp.57-67
    • /
    • 1996
  • The formulation for hybrid-QUICK scheme of convective transport terms in finite-volume calculation procedure is presented. Source terms are modified to apply the hybrid-QUICK scheme. Test calculations are performed for wall-driven cavity flow at Re=$10_2$, $10_3$, and $10_4$. These include the evaluation of boundary conditions approximated by third-order finite difference scheme. The stable and converged solutions are obtained without unsteady terms in the momentum equations. The results using hybrid-QUICK scheme show no difference with those using hybrid scheme at low Re ($=10_2$) and are better at higher Re ($10_3$, and $10_4$).

  • PDF

Ahmed body 주위의 3차원 난류유동 해석-유한차분도식의 평가- (Simulation of Three-Dimensional Turbulent Flows around an Ahmed Body-Evaluation of Finite Differencing Schemes-)

  • 명현국;박희경;진은주
    • 대한기계학회논문집B
    • /
    • 제20권11호
    • /
    • pp.3589-3597
    • /
    • 1996
  • The Reynolds-averaged Navier-Stokes equations with the equations of the k-.epsilon. turbulence model are solved numerically in a general curvilinear system for a three-dimensional turbulent flow around an Ahmed body. The simulation is especially aimed at the evaluation of three finite differencing schemes for the convection term, which include the upwind differencing scheme(UDS), the second order upwind differencing scheme(SOU scheme) and the QUICK scheme. The drag coefficient, the velocity and pressure fields are found to be changed considerably with the adopted finite differencing schemes. It is clearly demonstrated that the large difference between computation and experiment in the drag coefficient is due to relatively high predicted values of pressure drag from both front part and vertical rear end base. The results also show that the simulation with the QUICK or SOU scheme predicts fairly well the flow field and gives more accurate drag coefficient than other finite differencing scheme.

소셜 시맨틱 웹 환경에서 프로버넌스 기반의 웹 데이터 신뢰도 평가 기법 (Trust Evaluation Scheme of Web Data Based on Provenance in Social Semantic Web Environments)

  • 윤상원;최기태;박재열;임종태;복경수;유재수
    • 정보과학회 논문지
    • /
    • 제43권1호
    • /
    • pp.106-118
    • /
    • 2016
  • 최근 사용자들 사이의 웹 데이터의 생성 및 공유가 활발해 지면서 시맨틱 웹과 소셜 웹이 결합한 소셜 시맨틱 웹에 대한 중요성이 증가되고 있다. 본 논문은 소셜 시맨틱 웹 환경에서 PROV 모델을 확장하여 프로버넌스 기반의 웹 데이터 신뢰성 평가 기법을 제안한다. 제안하는 기법은 소셜 시맨틱 웹 환경에서 웹 데이터의 프로버넌스를 관리하고 신뢰성 평가를 위해 W3C의 PROV 모델에 필요한 요소를 추가하였다. 이와 같이 확장된 PROV 모델은 웹 데이터의 관리 및 프로버넌스 추적을 지원한다. 제안하는 신뢰성 평가 기법은 사용자의 신뢰도, 원본 데이터의 신뢰도 그리고 사람들의 평가 등과 같은 다양한 파라미터를 고려한다. 평가된 신뢰도는 프로버넌스 정보로 관리되고 사용자의 질의를 처리할 때 이 신뢰도를 고려하여 결과를 생성한다. 따라서 제안하는 기법은 소셜 시맨틱 웹 데이터의 프로버넌스를 관리할 수 있고 다양한 파라미터를 이용하여 웹 데이터 신뢰도를 정확하게 계산할 수 있다. 평가된 신뢰도는 사용자가 질의 결과의 신뢰 여부를 판단할 수 있는 기준이 된다. 제안하는 기법의 타당성을 보이기 위해 SPARQL 질의를 이용하여 신뢰성 평가의 성능을 검증한다.

Inscribed Approximation based Adaptive Tessellation of Catmull-Clark Subdivision Surfaces

  • Lai, Shuhua;Cheng, Fuhua(Frank)
    • International Journal of CAD/CAM
    • /
    • 제6권1호
    • /
    • pp.139-148
    • /
    • 2006
  • Catmull-Clark subdivision scheme provides a powerful method for building smooth and complex surfaces. But the number of faces in the uniformly refined meshes increases exponentially with respect to subdivision depth. Adaptive tessellation reduces the number of faces needed to yield a smooth approximation to the limit surface and, consequently, makes the rendering process more efficient. In this paper, we present a new adaptive tessellation method for general Catmull-Clark subdivision surfaces. Different from previous control mesh refinement based approaches, which generate approximate meshes that usually do not interpolate the limit surface, the new method is based on direct evaluation of the limit surface to generate an inscribed polyhedron of the limit surface. With explicit evaluation of general Catmull-Clark subdivision surfaces becoming available, the new adaptive tessellation method can precisely measure error for every point of the limit surface. Hence, it has complete control of the accuracy of the tessellation result. Cracks are avoided by using a recursive color marking process to ensure that adjacent patches or subpatches use the same limit surface points in the construction of the shared boundary. The new method performs limit surface evaluation only at points that are needed for the final rendering process. Therefore it is very fast and memory efficient. The new method is presented for the general Catmull-Clark subdivision scheme. But it can be used for any subdivision scheme that has an explicit evaluation method for its limit surface.

Bandwidth Management of WiMAX Systems and Performance Modeling

  • Li, Yue;He, Jian-Hua;Xing, Weixi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제2권2호
    • /
    • pp.63-81
    • /
    • 2008
  • WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, large service coverage, and flexible quality of services (QoS). Due to the large number of connections and flexible QoS supported by WiMAX, the uplink access in WiMAX networks is very challenging since the medium access control (MAC) protocol must efficiently manage the bandwidth and related channel allocations. In this paper, we propose and investigate a cost-effective WiMAX bandwidth management scheme, named the WiMAX partial sharing scheme (WPSS), in order to provide good QoS while achieving better bandwidth utilization and network throughput. The proposed bandwidth management scheme is compared with a simple but inefficient scheme, named the WiMAX complete sharing scheme (WCPS). A maximum entropy (ME) based analytical model (MEAM) is proposed for the performance evaluation of the two bandwidth management schemes. The reason for using MEAM for the performance evaluation is that MEAM can efficiently model a large-scale system in which the number of stations or connections is generally very high, while the traditional simulation and analytical (e.g., Markov models) approaches cannot perform well due to the high computation complexity. We model the bandwidth management scheme as a queuing network model (QNM) that consists of interacting multiclass queues for different service classes. Closed form expressions for the state and blocking probability distributions are derived for those schemes. Simulation results verify the MEAM numerical results and show that WPSS can significantly improve the network’s performance compared to WCPS.

CC기반에서 보증수준 및 제품유형을 동시에 고려한 평가업무량 모델 (An assurance level and product type based evaluation effort model for CC evaluation)

  • 최상수;최승;이완석;이강수
    • 정보보호학회논문지
    • /
    • 제14권1호
    • /
    • pp.25-34
    • /
    • 2004
  • CC(=ISO/IEC 15408)는 정보보호시스템의 국제표준이며 CC평가 및 인증체계에서는 평가기관 운영하며 평가기관에서는 적정한 평가비 산정을 위한 근거가 필요하다. 본 논문에서는 특정한 평가기관의 환경이 아니라, CC기준과 기존의 PP 및 ST만을 바탕으로 하여, 제품유형별 및 보증수준별 평가업무량 모델을 제시하였으며, 평가실무자득의 경험, 보안기능의 사용율 개념 및 기능점수방법 등을 이용하였다. 본 결과는 CC평가환경에서 정보보호제품의 평가비 및 기간의 산정을 위한 기본자료로 활용될 수 있을 것이다.

An Identity-based Ring Signcryption Scheme: Evaluation for Wireless Sensor Networks

  • Sharma, Gaurav;Bala, Suman;Verma, Anil K.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권2호
    • /
    • pp.57-66
    • /
    • 2013
  • Wireless Sensor Networks consist of small, inexpensive, low-powered sensor nodes that communicate with each other. To achieve a low communication cost in a resource constrained network, a novel concept of signcryption has been applied for secure communication. Signcryption enables a user to perform a digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a lower cost than that of the sign-then-encrypt approach. Ring signcryption maintains the signer's privacy, which is lacking in normal signcryption schemes. Signcryption can provide confidentiality and authenticity without revealing the user's identity of the ring. This paper presents the security notions and an evaluation of an ID-based ring signcryption scheme for wireless sensor networks. The scheme has been proven to be better than the existing schemes. The proposed scheme was found to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA). The proposed scheme was found to be more efficient than scheme for Wireless Sensor Networks reported by Qi. et al. based on the running time and energy consumption.

  • PDF

온라인 시험 및 평가 시스템 설계 방안 (A Design Scheme of Online Test and Evaluation System)

  • 최경수;이길흥
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.13-21
    • /
    • 2017
  • This paper describes a design scheme of a system that tests or polls from the students at online class. By online test, the teacher can test the pre-knowledge level of the students and know how much students understand the lecture of the class. As the number of test increases, the burden of the preparation of setting question, evaluation of the test, and management of the test results is increased. In this environments, an online test management system make it easy to test and evaluate, and thus it would be a good tool for maintaining and managing the total procedure of the test or poll of the students. For evaluating the design of the system, we made a test system prototype and performed evaluations of the online test system. The online test and evaluation system provides a good tool for testing and evaluation of student's knowledge at the class with easy and fast way.

Fundamental Considerations: Impact of Sensor Characteristics, Application Environments in Wireless Sensor Networks

  • Choi, Dongmin;Chung, Ilyong
    • 한국멀티미디어학회논문지
    • /
    • 제17권4호
    • /
    • pp.441-457
    • /
    • 2014
  • Observed from the recent performance evaluation of clustering schemes in wireless sensor networks, we found that most of them did not consider various sensor characteristics and its application environment. Without considering these, the performance evaluation results are difficult to be trusted because these networks are application-specific. In this paper, for the fair evaluation, we measured several clustering scheme's performance variations in accordance with sensor data pattern, number of sensors per node, density of points of interest (data density) and sensor coverage. According to the experiment result, we can conclude that clustering methods are easily influenced by POI variation. Network lifetime and data accuracy are also slightly influenced by sensor coverage and number of sensors. Therefore, in the case of the clustering scheme that did not consider various conditions, fair evaluation cannot be expected.

아동의 문제해결능력 : 표상과 평가능력의 역할 (Young Children's Problem-solving : The role of representation and evaluation)

  • 김경미
    • 영재교육연구
    • /
    • 제5권2호
    • /
    • pp.17-36
    • /
    • 1995
  • The present study examined preschooler's (3-5yrs) representation and evaluation skills in a puzzle completion task. The puzzle contained panels of four children dressed for each seacon and the key to success was using a body scheme to reconstruct the panels (head, torso, legs, feet and sky on top). Baseline data (Study 1) revealed a developmental pattern of increasing bydy scheme representation along with more careful attention to season consitent construction. Spontaneous verbalization also shifted from more guiding statements (where'the head?) to move evaluative statements (this isn't right). Study 2 examined different intervention techniques for increasing representation (verbal laveling) and evaluative processes (error detection practice), along with a control group that had unassisted practice. Three year olds benefited from verbal labeling, four year olds from both types of training. Verbalizations also showed appropriated shifts toward increasing evaluation, particularly for the older children. These findings are discussed in terms of a developmental hypothesis that representation precedes evaluation skills and that training techniques should take into account the relative balance between representation and evaluation skills in the individual for the task at hand.

  • PDF