• Title/Summary/Keyword: Generate Data

Search Result 3,066, Processing Time 0.033 seconds

Mist Formation Characteristics in Turning (선삭 가공시의 미스트 발생 특성)

  • 오명석;고태조;박성호;김희술;정종운
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2002.10a
    • /
    • pp.147-152
    • /
    • 2002
  • The mechanism of the aerosol(mist) generation generally consists of spin-off, splash, and evaporation/condensation. Host researchers showed some theoretical model for predicting the particulate size and generation rate without real cutting in turning operation. These models were based on the spin-off mechanism, and verified good for modeling the process. However, in real machining, the cutting tool destroys the flow direction of the cutting fluid and generate the heat by the relative motion of between tool and workpicee, and so the mass loading of the mist is greatly increased as compared with non-cutting. In this paper, we show some experimental data that the mist formation characteristics of cutting is different from that of non-cutting.

  • PDF

Heat Recovery from a 1 MW Class Gas Engine CHP System: 100 kW Class Model Test (온수, 증기 동시 발생형 가스엔진 열병합발전의 배열회수 특성: 100 kW급 모형 실험)

  • Ahn, Joon;Kim, Hyouck-Ju;Choi, Kyu-Sung;Song, Dae-Seok
    • Proceedings of the SAREK Conference
    • /
    • 2008.11a
    • /
    • pp.345-350
    • /
    • 2008
  • The present study has been conducted to develop a heat recovery system for a 1 MW class gas engine based cogeneration system. In the cogeneration system, heat is recovered from two parts, which are jacket water and exhaust gas. The heat from the jacket water is recovered by a plate type heat exchanger and used for the room heating and/or hot water supply. The heat from the exhaust gas is used to generate steam. For both of the heat recovery devices, 1/5 scaled tests are performed and the data are compared to the conventional correlations for the design.

  • PDF

An Efficient Network Attack Visualization Using Security Quad and Cube

  • Chang, Beom-Hwan;Jeong, Chi-Yoon
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.770-779
    • /
    • 2011
  • Security quad and cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated in the security devices; however, it takes a lot of time to inspect and analyze them because the security devices generate an overwhelming amount of logs and security events. In this paper, we propose SQC, an efficient method for analyzing network security through visualization. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacks. In addition, by providing a detailed analysis of network attacks, this method can more precisely detect and distinguish them from normal events.

A Neuro-Fuzzy System Reconstructing Nonlinear functions from Chaotic Signals

  • Eguchi, Kei;Ueno, Fumio;Tabata, Toru;Zhu, Hong-Bin;Nagahama, Kaeko
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.1021-1024
    • /
    • 2000
  • In this paper, a neuro-fuzzy system for quantitative characterization of chaotic signals is proposed. The proposed system is differ from the previous methods in that the nonlinear functions of the nonlinear dynamical systems are calculated as the invariant factor. In the proposed neuro-fuzzy system, the nonlinear functions are determined by supervised learning. From the reconstructed nonlinear functions, the proposed system can generate extrapolated chaotic signals. This feature will help the study of nonlinear dynamical systems which require large number of chaotic data. To confirm the validity of the proposed system, nonlinear functions are reconstructed from 1-dimensional and 2-dimensional chaotic signals.

  • PDF

Frontal view face recognition using the hidden markov model and neural networks (은닉 마르코프 모델과 신경회로망을 이용한 정면 얼굴인식)

  • 윤강식;함영국;박래홍
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.9
    • /
    • pp.97-106
    • /
    • 1996
  • In this paper, we propose a face recognition algorithm using the hidden markov model and neural networks (HMM-NN). In the preprocessing stage, we find edges of a face using the locally adaptive threshold (LAT) scheme and extract features based on generic knowledge of a face, then construct a database with extracted features. In the training stage, we generate HMM parameters for each person by using the forward-backward algorithm. In the recognition stage, we apply probability vlaues calculated by the HMM to subsequent neural networks (NN) as input data. Computer simulation shows that the proposed HMM-NN algorithm gives higher recognition rate compared with conventional face recognition algorithms.

  • PDF

A Study of Isolation-Effect of Surface Wave Using Open or In-filled Trenches (진동차단 구조물에 의한 표면파의 진동차단효과에 관한 연구)

  • 김문겸
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 1999.04a
    • /
    • pp.100-108
    • /
    • 1999
  • rectangular open or in-filled trenches(concrete and rubber) are often used to reduce the ground vibrations caused by propagating surface(Rayleigh) waves. This paper presents the experimental data for estimating the vibration screening effectiveness of open or in-filled trenches Field dynamic tests using the exciter which can generate the 100kN vertical cyclic load in the range of 100-250 Hz were performed. One hundred and twenty accelerometers to measure the ground response are used in 6 radial direction. To compare the effectiveness of the vibration isolation the contours of the amplitude ratio with the dimensionless parameters dividing by Rayleight wave lengths were presented.

  • PDF

Automatic 3D Head Pose-Normalization using 2D and 3D Interaction (자동 3차원 얼굴 포즈 정규화 기법)

  • Yu, Sun-Jin;Kim, Joong-Rock;Lee, Sang-Youn
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.211-212
    • /
    • 2007
  • Pose-variation factors present a significant problem in 2D face recognition. To solve this problem, there are various approaches for a 3D face acquisition system which was able to generate multi-view images. However, this created another pose estimation problem in terms of normalizing the 3D face data. This paper presents a 3D head pose-normalization method using 2D and 3D interaction. The proposed method uses 2D information with the AAM(Active Appearance Model) and 3D information with a 3D normal vector. In order to verify the performance of the proposed method, we designed an experiment using 2.5D face recognition. Experimental results showed that the proposed method is robust against pose variation.

  • PDF

Reconstructing 3-D Facial Shape Based on SR Imagine

  • Hong, Yu-Jin;Kim, Jaewon;Kim, Ig-Jae
    • Journal of International Society for Simulation Surgery
    • /
    • v.1 no.2
    • /
    • pp.57-61
    • /
    • 2014
  • We present a robust 3D facial reconstruction method using a single image generated by face-specific super resolution technique. Based on the several consecutive frames with low resolution, we generate a single high resolution image and a three dimensional facial model based on it. To do this, we apply PME method to compute patch similarities for SR after two-phase warping according to facial attributes. Based on the SRI, we extract facial features automatically and reconstruct 3D facial model with basis which selected adaptively according to facial statistical data less than a few seconds. Thereby, we can provide the facial image of various points of view which cannot be given by a single point of view of a camera.

Strong Accretion Shock Waves in Cluster Outskirts and Possibility of Cosmic-Ray Population Inversion

  • Hong, Sungwook E.;Ryu, Dongsu;Kang, Hyesung
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.2
    • /
    • pp.72.2-72.2
    • /
    • 2012
  • We analyzed the properties of shock waves in galaxy clusters, by using the data of simulations for the large-scale structure of the universe with the spatial resolution of up to 25 kpc/h. In a substantial fraction of clusters, we found that strong shocks with Mach number of several or larger exist in outskirts within the virial radius. They are produced by the accretion of warm gas flowing from filaments to clusters, and generate large cosmic-ray fluxes. The cosmic rays advect into cluster cores, but may temporally induce the population inversion, that is, larger population at larger radius, suggested by recent radio and ${\gamma}$-ray observations.

  • PDF

Acceleration of Delaunay Refinement Algorithm by Geometric Hashing (기하학적 해싱을 이용한 딜러니 개선 알고리듬의 가속화)

  • Kim, Donguk
    • Korean Journal of Computational Design and Engineering
    • /
    • v.22 no.2
    • /
    • pp.110-117
    • /
    • 2017
  • Delaunay refinement algorithm is a classical method to generate quality triangular meshes when point cloud and/or constrained edges are given in two- or three-dimensional space. It computes the Delaunay triangulation for given points and edges to obtain an initial solution, and update the triangulation by inserting steiner points one by one to get an improved quality triangulation. This process repeats until it satisfies given quality criteria. The efficiency of the algorithm depends on the criteria and point insertion method. In this paper, we propose a method to accelerate the Delaunay refinement algorithm by applying geometric hashing technique called bucketing when inserting a new steiner point so that it can localize necessary computation. We have tested the proposed method with a few types of data sets, and the experimental result shows strong linear time behavior.