• Title/Summary/Keyword: Experimental verification

Search Result 1,663, Processing Time 0.028 seconds

Numerical Method for Calculating Fourier Coefficients and Properties of Water Waves with Shear Current and Vorticity in Finite Depth

  • JangRyong Shin
    • Journal of Ocean Engineering and Technology
    • /
    • v.37 no.6
    • /
    • pp.256-265
    • /
    • 2023
  • Many numerical methods have been developed since 1961, but unresolved issues remain. This study developed a numerical method to address these issues and determine the coefficients and properties of rotational waves with a shear current in a finite water depth. The number of unknown constants was reduced significantly by introducing a wavelength-independent coordinate system. The reference depth was calculated independently using the shooting method. Therefore, there was no need for partial derivatives with respect to the wavelength and the reference depth, which simplified the numerical formulation. This method had less than half of the unknown constants of the other method because Newton's method only determines the coefficients. The breaking limit was calculated for verification, and the result agreed with the Miche formula. The water particle velocities were calculated, and the results were consistent with the experimental data. Dispersion relations were calculated, and the results are consistent with other numerical findings. The convergence of this method was examined. Although the required series order was reduced significantly, the total error was smaller, with a faster convergence speed.

Derivation and verification of scenarios for underground logistics rolltainer (지하물류 운송용기 평가 시나리오 도출 및 검증)

  • U Ri Chae;Joo Uk Kim
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.20 no.spc1
    • /
    • pp.76-89
    • /
    • 2024
  • This study investigates the impact of standardized underground logistics conainers on lower body muscle activation during warehouse tasks, comparing conventional roll containers(A type) with newly developed ones(B type). Through a detailed experimental setup involving electromyography(EMG) and tensiomyography(TMG), muscle activities of the lower limbs were quantitatively analyzed during loading unloading and transporting tasks. Results indicated no significant difference in muscle activation patters between the two rolltainer types, suggesting that the dimensions of these containers do not critically affect the muscular strain and workload. Furthermore, the TMG analysis revealed that muscle contraction velocity(Vc) increased in certain muscles when using the B-type rolltainer, indicating a potential for more efficient muscle engagement without increasing fatigue. This research underscores the importance of ergonomic considerations in the design of logistics equipment and suggests that further studies should focus on optimizing the interaction between human operators and logistical systems to enhance safety and efficiency in warehouse operations.

Experimental Verification of the Versatility of SPAM-based Image Steganalysis (SPAM 기반 영상 스테그아날리시스의 범용성에 대한 실험적 검증)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.526-535
    • /
    • 2018
  • Many steganography algorithms have been studied, and steganalysis for detecting stego images which steganography is applied to has also been studied in parallel. Especially, in the case of the image steganalysis, the features such as ALE, SPAM, and SRMQ are extracted from the statistical characteristics of the image, and stego images are classified by learning the classifier using various machine learning algorithms. However, these studies did not consider the effect of image size, aspect ratio, or message-embedding rate, and thus the features might not function normally for images with conditions different from those used in the their studies. In this paper, we analyze the classification rate of the SPAM-based image stegnalysis against variety image sizes aspect ratios and message-embedding rates and verify its versatility.

A New Refined Truss Modeling for Shear-Critical RC Members (Pert II) - lts Verification - (전단이 지배하는RC 부재의 새로운 트러스 모델링 기법 연구 (후편) - 검증을 중심으로 -)

  • Kim Woo;Jeong Jae-Pyong;Kim Haeng-Joon
    • Journal of the Korea Concrete Institute
    • /
    • v.17 no.1 s.85
    • /
    • pp.59-68
    • /
    • 2005
  • This paper as Part II of the present study deals with the verification of the new truss model that has been conceptually derived and formulated in Part I. Since the model includes the arch coefficient-$\alpha$, the characteristics of this coefficient are examined, and it appears that the coefficient-$\alpha$ is a function of a/d, $\rho$ and $\rho_v$ After transforming the model Into a sectional approach, the formula for predicting the stirrup stress, the longitudinal steel force, and ultimate shear strength are derived. Then, the equations are applied to the test specimens available in literatures, and the predicted values are shown to be in excellent agreement with the experimental results.

Character Region Extraction Based on Texture and Depth Features (질감과 깊이 특징 기반의 문자영역 추출)

  • Jang, Seok-Woo;Park, Young-Jae;Huh, Moon-Haeng
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.2
    • /
    • pp.885-892
    • /
    • 2013
  • In this paper, we propose a method of effectively segmenting character regions by using texture and depth features in 3D stereoscopic images. The suggested method is mainly composed of four steps. The candidate character region extraction step extracts candidate character regions by using texture features. The character region localization step obtains only the string regions in the candidate character regions. The character/background separation step separates characters from background in the localized character areas. The verification step verifies if the candidate regions are real characters or not. In experimental results, we show that the proposed method can extract character regions from input images more accurately compared to other existing methods.

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence

  • Arshad, Humaira;Jantan, Aman Bin;Abiodun, Oludare Isaac
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.346-376
    • /
    • 2018
  • Digital forensics is a vital part of almost every criminal investigation given the amount of information available and the opportunities offered by electronic data to investigate and evidence a crime. However, in criminal justice proceedings, these electronic pieces of evidence are often considered with the utmost suspicion and uncertainty, although, on occasions are justifiable. Presently, the use of scientifically unproven forensic techniques are highly criticized in legal proceedings. Nevertheless, the exceedingly distinct and dynamic characteristics of electronic data, in addition to the current legislation and privacy laws remain as challenging aspects for systematically attesting evidence in a court of law. This article presents a comprehensive study to examine the issues that are considered essential to discuss and resolve, for the proper acceptance of evidence based on scientific grounds. Moreover, the article explains the state of forensics in emerging sub-fields of digital technology such as, cloud computing, social media, and the Internet of Things (IoT), and reviewing the challenges which may complicate the process of systematic validation of electronic evidence. The study further explores various solutions previously proposed, by researchers and academics, regarding their appropriateness based on their experimental evaluation. Additionally, this article suggests open research areas, highlighting many of the issues and problems associated with the empirical evaluation of these solutions for immediate attention by researchers and practitioners. Notably, academics must react to these challenges with appropriate emphasis on methodical verification. Therefore, for this purpose, the issues in the experiential validation of practices currently available are reviewed in this study. The review also discusses the struggle involved in demonstrating the reliability and validity of these approaches with contemporary evaluation methods. Furthermore, the development of best practices, reliable tools and the formulation of formal testing methods for digital forensic techniques are highlighted which could be extremely useful and of immense value to improve the trustworthiness of electronic evidence in legal proceedings.

Construction and Validation Test of Turbopump Real-propellant Test Facility (터보펌프 실매질 시험설비 구축 및 인증시험)

  • Kim, Jin-Sun;Han, Yeoung-Min;Ko, Youngsung
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.19 no.4
    • /
    • pp.85-93
    • /
    • 2015
  • Liquid rocket engines of KSLV-II employ a turbopump feed system for propellants. A turbopump real-propellant test facility based on liquid oxygen and kerosene has been constructed for the experimental verification of the turbopump performance using the real media of propellants(i.e., LOX/Kerosene). The verification tests of sub-systems were performed such as LOX/kerosene feed system and alcohol burner system. Finally, the performance of the whole system was executed and verified through a sets of validation tests with the development model of the KSLV-II turbopumps. It has been confirmed that the test facility satisfies the operating conditions and time of the turbopump at the design and off-design performance test using real-propellant.

Damage detection in beam-like structures using deflections obtained by modal flexibility matrices

  • Koo, Ki-Young;Lee, Jong-Jae;Yun, Chung-Bang;Kim, Jeong-Tae
    • Smart Structures and Systems
    • /
    • v.4 no.5
    • /
    • pp.605-628
    • /
    • 2008
  • In bridge structures, damage may induce an additional deflection which may naturally contain essential information about the damage. However, inverse mapping from the damage-induced deflection to the actual damage location and severity is generally complex, particularly for statically indeterminate systems. In this paper, a new load concept, called the positive-bending-inspection-load (PBIL) is proposed to construct a simple inverse mapping from the damage-induced deflection to the actual damage location. A PBIL for an inspection region is defined as a load or a system of loads which guarantees the bending moment to be positive in the inspection region. From the theoretical investigations, it was proven that the damage-induced chord-wise deflection (DI-CD) has the maximum value with the abrupt change in its slope at the damage location under a PBIL. Hence, a novel damage localization method is proposed based on the DI-CD under a PBIL. The procedure may be summarized as: (1) identification of the modal flexibility matrices from acceleration measurements, (2) design for a PBIL for an inspection region of interest in a structure, (3) calculation of the chord-wise deflections for the PBIL using the modal flexibility matrices, and (4) damage localization by finding the location with the maximum DI-CD with the abrupt change in its slope within the inspection region. Procedures from (2)-(4) can be repeated for several inspection regions to cover the whole structure complementarily. Numerical verification studies were carried out on a simply supported beam and a three-span continuous beam model. Experimental verification study was also carried out on a two-span continuous beam structure with a steel box-girder. It was found that the proposed method can identify the damage existence and damage location for small damage cases with narrow cuts at the bottom flange.

Fragile Watermarking for Image Authentication and Detecting Image Modification (영상 인증과 변형 검출을 위한 Fragile 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.459-465
    • /
    • 2009
  • Digital watermarking is a technique to insert a visually imperceptible information into an image so that the information can be extracted for the purposes of ownership verification or authentication. And watermarking techniques can be classified as either fragile or robust. Robust watermarks are useful for copyright and ownership assertion purposes. They cannot be easily removed and should resist common image manipulation procedures such as rotation, scaling, cropping, etc. On the other hand, fragile watermarks are easily corrupted by any image processing procedure, it can detect any change to an image as well as localizing the areas that have been changed. In this paper, we propose a fragile watermarking algorithm using a special hierarchical structure for integrity verification of image and detection of manipulated location. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in this hierarchy. The proposed method thwarts the cut-and-paste attack and the experimental results to demonstrate the effectiveness of the proposed method.

  • PDF

Verification of SPACE Code with MSGTR-PAFS Accident Experiment (증기발생기 전열관 다중파단-피동보조급수냉각계통 사고 실험 기반 안전해석코드 SPACE 검증)

  • Nam, Kyung Ho;Kim, Tae Woo
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.4
    • /
    • pp.84-91
    • /
    • 2020
  • The Korean nuclear industry developed the SPACE (Safety and Performance Analysis Code for nuclear power plants) code and this code adpots two-phase flows, two-fluid, three-field models which are comprised of gas, continuous liquid and droplet fields and has a capability to simulate three-dimensional model. According to the revised law by the Nuclear Safety and Security Commission (NSSC) in Korea, the multiple failure accidents that must be considered for accident management plan of nuclear power plant was determined based on the lessons learned from the Fukushima accident. Generally, to improve the reliability of the calculation results of a safety analysis code, verification work for separate and integral effect experiments is required. In this reason, the goal of this work is to verify calculation capability of SPACE code for multiple failure accident. For this purpose, it was selected the experiment which was conducted to simulate a Multiple Steam Generator Tube Rupture(MSGTR) accident with Passive Auxiliary Feedwater System(PAFS) operation by Korea Atomic Energy Research Institute (KAERI) and focused that the comparison between the experiment results and code calculation results to verify the performance of the SPACE code. The MSGR accident has a unique feature of the penetration of the barrier between the Reactor Coolant System (RCS) and the secondary system resulting from multiple failure of steam generator U-tubes. The PAFS is one of the advanced safety features with passive cooling system to replace a conventional active auxiliary feedwater system. This system is passively capable of condensing steam generated in steam generator and feeding the condensed water to the steam generator by gravity. As the results of overall system transient response using SPACE code showed similar trends with the experimental results such as the system pressure, mass flow rate, and collapsed water level in component. In conclusion, it could be concluded that the SPACE code has sufficient capability to simulate a MSGTR accident.