• Title/Summary/Keyword: Field Verification

Search Result 1,256, Processing Time 0.026 seconds

A Study on the Virtual Reality Simulation Monitoring Verification System Available Wireless Communication Network (무선 통신망을 활용한 VR 시뮬레이션 관제상황 검증 시스템에 관한 연구)

  • Lee, Yang-Sun;Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.193-197
    • /
    • 2006
  • In this paper, We proposed monitoring verification system using virtual reality simulation technology in monitoring fields for peculiar environment. Also, we analyzed the proposed system about required technology issues and operation process. The proposed monitoring verification system available wireless communication network is expected that application is possible in medical treatment field or special dangerous article processing filed as well as monitoring verification of mobile electric railcar

  • PDF

A Study of the Sequence of Figure Transformation Learning (도형의 변환학습의 순차성 고찰)

  • Park Sung Teak
    • The Mathematical Education
    • /
    • v.17 no.2
    • /
    • pp.1-13
    • /
    • 1979
  • This study aimed at studying the sequence of the Figure Transformation Learning, inquiring relationship among these transformations and then researching whether there is the difference of the learning ability or not between by teaching them as it is independent and by teaching them as it is contains. (Hypothesis 1) It may be more effective to teach The Sequence of Transformation Learning by beginning with peculiar field, ending with general field than vice versa At the result of verification-C $R_{M}$=2.59, 0.005$R_{M}$=5.19, p<0.005-significant difference appeared. It is proved more effective to teach the Figure Transformation Learning the way it contains than the way it is independent. Synthesizing two hypothesises of the above, the conclusion is following The Figure Transformation Learning should be taught by beginning with peculiar field. ending with general field (congruent transformationlongrightarrowsimilar transformationlongrightarrowprojective transformationlongrightarrowtopological transformation). To teach it the way it contains is more effective.ive.

  • PDF

An experimental study on the development and verification of NCC(new concrete cutting) system

  • Park, Jong-Hyup;Han, Jong-Wook
    • Structural Engineering and Mechanics
    • /
    • v.65 no.2
    • /
    • pp.203-211
    • /
    • 2018
  • This paper introduces the development process of NCC(New Concrete Cutting) system and analyzes first verification test. Based on the first verification test results, some problems of NCC system have been newly modified. We carry out the second verification test. We tried to verify cutting performance and dust control efficiency of NCC system through the cutting test of concrete bridge piers. In particular, this verification test strives to solve the problem of concrete dust, which is the biggest problem of dry cutting method. The remaining dust problems in cutting section tried to solve through this verification test. This verification test of the NCC system shows that the dust problem of dry cutting method is closely controlled and solved. In conclusion, the proposed NCC method is superior to the dry cutting method in all aspects, including cutting performance, dust vacuum efficiency and cooling effect. The proposed NCC system is believed to be able to provide eco-friendly cutting technology to various industries, such as the removal of the SOC structures and the dismantling of nuclear plants, which have recently become a hot issue in the field of concrete cutting.

Safety Ontology Modeling and Verification on MIS of Ship-Building and Repairing Enterprise

  • Wu, Yumei;Li, Zhen;Zhao, LanJie;Yu, Zhengwei;Miao, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1360-1388
    • /
    • 2021
  • Shipbuilding and repairing enterprise has the characteristics of many hazards and accidents. Therefore, the safety management ability of shipbuilding and repairing MIS (management information system) must be effectively guaranteed. The verification on safety management is the necessary measure to ensure and improve the safety management ability of MIS. Safety verification can not only increase the safety of MIS, but also make early warning of potential risks in management to avoid the accidents. Based on the authoritative standards in the field of safety in shipbuilding and repairing enterprise, this paper applied modeling and verification method based on ontology to safety verification of MIS, extracted the concepts and associations from related safety standards to construct axiom set to support safety verification on MIS of shipbuilding and repairing enterprise. Then, this paper developed the corresponding safety ontology modeling and verification tool-SOMVT. By the application and comparison of two examples, this paper effectively verified the safety of MIS to prove the modeling method and the SOMVT can improve the safety of MIS in a much more effective and stable way to traditional manual analysis.

A Study on Verification of PowerRail based on Voltage Drop under Extended Feeding Condition (연장급전 전압강하 계산을 위한 전기철도 급전 시뮬레이터의 검증에 관한 연구)

  • Kim, Joorak
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.2
    • /
    • pp.331-337
    • /
    • 2015
  • The power flow analysis of electrified railway is required complicated calculation, because of variable load. Train runs trough rail supplied by electric power therefore, the load value in electrified railway system fluctuates along time. The power flow algorithm in electrified railway system is different from general power system, and the power flow simulation is peformed by the particular simulation software. Powerail is simulation software for analysis of traction power supply system developed by KRRI, in 2008. This consists of load forecasting module, including TPS and time scheduling, and power flow module. This software was verified by measured current under normal feeding condition, however, has not been verified by voltage on the condition of extended feeding. This paper presents the verification of PowerRail based on voltage drop under extended feeding condition. This is performed by comparing simulation result with field test. Field test and simulation is done in commercial railway line.

Experimental Verification of 1D Virtual Force Field Algorithm on Uneven and Dusty Environment (비평지 및 먼지 환경에서 1차원 가상힘장 알고리즘의 실험적 검증)

  • Choe, Tok Son;Joo, Sang-Hyun;Park, Yong-Woon;Park, Jin-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.647-653
    • /
    • 2017
  • In this paper, we deal with the experimental verification of 1D virtual force field algorithm based reflexive local path planning on uneven and dusty environment. The existing obstacle detection method on uneven and dusty environment and 1D virtual force field based reflexive local path planning algorithm simply are introduced. Although the 1D virtual force field algorithm is verified by various simulations, additional efforts are needed to verify this algorithm in the real-world. The introduced methods are combined with each other, installed to real mobile platforms and verified by various real experiments.

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

Feasibility study of a novel hash algorithm-based neutron activation analysis system for arms control treaty verification

  • Xiao-Suo He;Yao-Dong Dai;Xiao-Tao He;Qing-Hua He
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1330-1338
    • /
    • 2024
  • Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel Hash encryption algorithm, this paper presents a Monte Carlo-based design of a neutron activation analysis verification module. The verification module employs a thermal neutron source, a non-uniform mask (physically encrypting information about isotopic composition and geometric structure), a gamma detector array, and a Hash encryption algorithm (for electronic encryption). In the physical field, a non-uniform mask is designed to distort the characteristic gamma rays emitted by the inspected item. Furthermore, as part of the Hash algorithm, a key is introduced to encrypt the data and improve the system resolution through electronic design. In order to quantify the difference between items, Hamming distance is used, which allows data encryption and analysis simultaneously. Simulated inspections of simple objects are used to quantify system performance. It is demonstrated that the method retains superior resolution even with 1% noise level. And the performances of anti-statistical attack and anti-brute force cracking are evaluated and found to be very excellent. The verification method lays a solid foundation for nuclear disarmament verification in the upcoming era.

Mobile Implementation of Enhanced Dynamic Signature Verification for the Smart-phone (스마트폰용 동적 서명인증의 모바일 구현)

  • Kim, Jin-Whan;Cho, Hyuk-Gyu;Seo, Chang-Jin;Cha, Eui-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1781-1785
    • /
    • 2007
  • We propose a new enhanced graphical user interface and algorithm for dynamic signature verification using Smart-phone. Also, we describe the performance results of our dynamic signature verification system, which determine the authentication of signatures by comparing and analyzing various dynamic data shape of the signature, writing speed, slant of shape, and the order and number of strokes for personal signatures using an electronic pen, expecting the system to be understood and utilized widely in the industrial field.