• Title/Summary/Keyword: Event Method

Search Result 2,160, Processing Time 0.025 seconds

Electromagnetic-thermal two-way coupling analysis and application on helium-cooled solid blanket

  • Kefan Zhang;Shuai Wang;Hongli Chen
    • Nuclear Engineering and Technology
    • /
    • v.55 no.3
    • /
    • pp.927-938
    • /
    • 2023
  • The blanket plays an important role in fusion reactor and stands extremely high thermal and electromagnetic loads during operation situation and plasma disruption event, brings the need for precise thermal and electromagnetic analysis. Since the thermal field and EM field interact with each other nonlinearly, we develop a method of electromagnetic-thermal two-way coupling by using finite element software COMSOL. The coupling analyses of blanket under steady state and MD event are implemented and the results are analyzed. For steady state, the influences of coupling effects are relatively small but still recommended to be considered for a high precision analysis. The influence of thermal field on EM field can't be ignored under MD events. The variation of force density could cause a significant change in stress in certain parts of blanket. The influence of Joule heat during MD event is negligible, yet the potential temperature rise caused by induced current after MD event still needs to be researched.

Retrieval of Player Event in Golf Videos Using Spoken Content Analysis (음성정보 내용분석을 통한 골프 동영상에서의 선수별 이벤트 구간 검색)

  • Kim, Hyoung-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.7
    • /
    • pp.674-679
    • /
    • 2009
  • This paper proposes a method of player event retrieval using combination of two functions: detection of player name in speech information and detection of sound event from audio information in golf videos. The system consists of indexing module and retrieval module. At the indexing time audio segmentation and noise reduction are applied to audio stream demultiplexed from the golf videos. The noise-reduced speech is then fed into speech recognizer, which outputs spoken descriptors. The player name and sound event are indexed by the spoken descriptors. At search time, text query is converted into phoneme sequences. The lists of each query term are retrieved through a description matcher to identify full and partial phrase hits. For the retrieval of the player name, this paper compares the results of word-based, phoneme-based, and hybrid approach.

A Study on Development of Standard Safety Operation Method Risk Analysis by Weight (가중치 적용에 의한 표준안전 작업방법 위험성평가 개발에 관한 연구)

  • Yang, Kwang-Mo
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.1
    • /
    • pp.23-35
    • /
    • 2007
  • Present time there are many risk analysis method in the world. A hazard is an exposure that has the potential to induce and adverse event. Risk is the probability of an adverse event given exposure to hazard. The evaluation of scientific information on the hazardous properties of environmental agents and the extent of exposure to these agents. But operation risk analysis method is not enough for manufacturing industry even if it is existence, it will be separated to improve Safety. In this paper, I will develop the AHP Weighted operation risk analysis method to improve Safety.

A top-down iteration algorithm for Monte Carlo method for probability estimation of a fault tree with circular logic

  • Han, Sang Hoon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.6
    • /
    • pp.854-859
    • /
    • 2018
  • Calculating minimal cut sets is a typical quantification method used to evaluate the top event probability for a fault tree. If minimal cut sets cannot be calculated or if the accuracy of the quantification result is in doubt, the Monte Carlo method can provide an alternative for fault tree quantification. The Monte Carlo method for fault tree quantification tends to take a long time because it repeats the calculation for a large number of samples. Herein, proposal is made to improve the quantification algorithm of a fault tree with circular logic. We developed a top-down iteration algorithm that combines the characteristics of the top-down approach and the iteration approach, thereby reducing the computation time of the Monte Carlo method.

Event-specific Detection Methods for Genetically Modified Maize MIR604 Using Real-time PCR

  • Kim, Jae-Hwan;Kim, Hae-Yeong
    • Food Science and Biotechnology
    • /
    • v.18 no.5
    • /
    • pp.1118-1123
    • /
    • 2009
  • Event-specific real-time polymerase chain reaction (PCR) detection method for genetically modified (GM) maize MIR604 was developed based on integration junction sequences between the host plant genome and the integrated transgene. In this study, 2 primer pairs and probes were designed for specific amplification of 100 and 111 bp DNA fragments from the zSSIIb gene (the maize endogenous reference gene) and MIR604. The quantitative method was validated using 3 certified reference materials (CRMs) with levels of 0.1, 1, and 10% MIR604. The method was also assayed with 14 different plants and other GM maize. No amplification signal was observed in real-time PCR assays with any of the species tested other than MIR604 maize. As a result, the bias from the true value and the relative deviation for MIR604 was within the range from 0 to 9%. Precision, expressed as relative standard deviation (RSD), varied from 2.7 to 10% for MIR604. Limits of detections (LODs) of qualitative and quantitative methods were all 0.1%. These results indicated that the event-specific quantitative PCR detection system for MIR604 is accurate and useful.

Function Optimization and Event Clustering by Adaptive Differential Evolution (적응성 있는 차분 진화에 의한 함수최적화와 이벤트 클러스터링)

  • Hwang, Hee-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.5
    • /
    • pp.451-461
    • /
    • 2002
  • Differential evolution(DE) has been preyed to be an efficient method for optimizing real-valued multi-modal objective functions. DE's main assets are its conceptual simplicity and ease of use. However, the convergence properties are deeply dependent on the control parameters of DE. This paper proposes an adaptive differential evolution(ADE) method which combines with a variant of DE and an adaptive mechanism of the control parameters. ADE contributes to the robustness and the easy use of the DE without deteriorating the convergence. 12 optimization problems is considered to test ADE. As an application of ADE the paper presents a supervised clustering method for predicting events, what is called, an evolutionary event clustering(EEC). EEC is tested for 4 cases used widely for the validation of data modeling.

ECA Rule-Based Timely Collaboration of Web-Based Distributed Business Systems (웹기반 분산 기업 시스템을 위한 ECA 규칙 기반 적기 협력방법)

  • Lee, Dong-Woo;Lee, Seong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.345-354
    • /
    • 2005
  • In this paper collaboration of web-based distributed business systems is analyzed and the need of timely collaboration is derived and described in terms of inter-organizational contracts. A method of event-condition-action (ECA) rule based timely collaboration to meet the need and an active functionality component (AFC) to provide the method are proposed. The proposed method supports high level rule programming and event-based immediate processing so that system administrators and programmers can easily maintain the timely collaboration independently to the application logic. The proposed AFC uses HTTP protocol to be applied through firewalls. It is implemented using basic trigger facilities of a commercial DBMS for practical purpose.

  • PDF

A Hierarchical Checklist to Automatically Generate Test Scripts (테스트 스크립트 자동 생성을 위한 계층 구조 체크리스트)

  • Kim, Dae Joon;Chung, Ki Hyun;Choi, Kyung Hee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.5
    • /
    • pp.245-256
    • /
    • 2017
  • This paper proposes a method to generate test scripts for testing embedded system in an easy manner by using hierarchical checklist. In the proposed method, a checklist is constructed with event, component and command dictionaries. And the test scripts are hierarchically generated based on the dictionaries. Since the physical layer of system input becomes abstract with component layer and event layer by virtue of the hierarchy, It is possible to generate test scripts without complicated system input information. It is easy to generate test scripts for embedded systems with similar inputs using the highly reusable dictionaries. The effectiveness of the proposed method is demonstrated with experiments.

Study on the Improvement of Event Data Recorders through Accident Analysis (사고분석 사례를 통한 사고기록장치 개선방안에 대한 고찰)

  • Park, Giok;Kang, Heejin;Jun, Joonho;Kim, Heejune
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.4
    • /
    • pp.66-72
    • /
    • 2021
  • This study was initiated to improve of the defect investigation method using event data recorders (EDR) and suggested a solution through the regulation and system analysis of EDR. The EDR data has been used for various purposes such as the vehicle defect investigation and the traffic accident investigation. However the EDR regulation has not been updated since the implementation in 2012. "Trigger Threshold" can be used to analyze a single accident such as the frontal crash, the side crash, and the rollover. In the case of a complex accident in which a rollover accident and a crash accident occur simultaneously, it is difficult to analyze a complex accident due to current "Trigger Threshold". This study proposed the method of separating the "Trigger Threshold" into a crash accident and a rollover accident so that accidents can be analyzed using the EDR data even when a complex accident occurs. In addition, it proposed the improvement method to quickly use the data of EDR in accident reconstruction software.

Preventing Mobile Game Client Memory Manipulation Based on Event Sourcing Patterns and Blockchain (이벤트 소싱 패턴과 블록 체인을 활용한 모바일 게임 클라이언트 메모리 조작 방지 방안)

  • Park, Jihun;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.477-486
    • /
    • 2022
  • This study aims to present a method using event sourcing patterns and blockchain as a way to cope with vulnerabilities in memory manipulation at the client level. To verify the plan, the method of running the memory operation application was analyzed, and the performance was compared and analyzed when the memory operation prevention plan was applied by fabricating a test application. As a result of the analysis, the usage of memory increased compared to the method of XOR operation by storing major data in one memory, but it was possible to prevent the operation of the memory operation program without significantly affecting the performance of the game.