• 제목/요약/키워드: HELP 코드

검색결과 136건 처리시간 0.023초

Neutron Reflecting Effects by Water and Concrete (물과 콘크리트에 의한 중성자(中性子)의 반사효과(反射效果))

  • Min, Duck-Kee;Ro, Seung-Gy
    • Journal of Radiation Protection and Research
    • /
    • 제8권1호
    • /
    • pp.33-37
    • /
    • 1983
  • Neutron reflecting effects in terms of effective multiplication factor have been calculated with varying water or concrete thickness, and gap distance between concrete reflector and a fissile solution system. A numerical calculation of effective multiplication factors has been carried out by using the discrete ordinates method with the help of the computer code, ANISN. It is revealed that the reflecting .effect by thin concrete is lower than that of the identical thickness of water while the effect by thick water is low compared to that of the identical thickness of concrete. It seems that the effective multiplication factors are first decreasing rapidly with gap distance, which is filled with water, between concrete reflector and the fissile solution system, and then decrease slowly over the distance of about 15cm.

  • PDF

The Development and Application of Schedule Management Tools in Building Construction (건설 공정리스크 관리도구 개발 및 활용방안)

  • Jung Woo-Joon;Yoon You-Sang;Suh Sang-Wook
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 한국건설관리학회 2004년도 제5회 정기학술발표대회 논문집
    • /
    • pp.384-387
    • /
    • 2004
  • It is very important to manage the risk in building construction because construction process has too many internal risk compared with others. So construction managers need more developed risk management system than the Present. While the study for the solution and management of generated risk is comparatively enough, the effort to confirm the risk of construction phase on pre-construction phase haying an major effect on total duration, is insufficient. For supporting the schedule risk management of pre-construction, this study suggests the reclassified risk breakdown structure and the investigation form for advance preparations on pre-construction Phase, which help the Poorly experienced construction manager to make more correct decisions and efficiently to execute risk management.

  • PDF

Mixed LMSF Blind Multiuser Detector for DS-CDMA Systems (DS-CDMA 시스템을 위한 혼합 LMSF 블라인드 다중 사용자 검출)

  • Park, Sung-Wook;Park, Jong-Wook
    • 전자공학회논문지 IE
    • /
    • 제43권2호
    • /
    • pp.75-79
    • /
    • 2006
  • Blind techniques without the help of training sequences are able to detect the information signal which has the minimal information of desired user. In this paper, we proposed the blind multiuser detector using the hybrid cost function to cancel the multiple user interference in direct sequence code division multiple access systems. The cost function of proposed blind multiuser detector is the hybrid type which joints both least mean square(LMS) algorithm and least mean fourth(LMF) algorithm. We evaluate the bit error rate(BER) performance of proposed blind multiuser detector under additive white Gaussian noise channel. Simulation results show that the proposed blind detector has an about 3dB of signal to noise ratio more than blind minimum output energy(MOE) multiuser detector under existing active user 20.

Analysis on Spatial Sampling and Implementation for Primal Trees (Primal Tree의 공간 분할 샘플링 분석 및 구현)

  • Park, Taejung
    • Journal of Digital Contents Society
    • /
    • 제15권3호
    • /
    • pp.347-355
    • /
    • 2014
  • The general octree structure is common for various applications including computer graphics, geometry information analysis and query. Unfortunately, the general octree approach causes duplicated sample data and discrepancy between sampling and representation positions when applied to sample continuous spatial information, for example, signed distance fields. To address these issues, some researchers introduced the dual octree. In this paper, the weakness of the dual octree approach will be illustrated by focusing on the fact that the dual octree cannot access some specific continuous zones asymptotically. This paper shows that the primal tree presented by Lefebvre and Hoppe can solve all the problems above. Also, this paper presents a three-dimensional primal tree traversal algorithm based the Morton codes which will help to parallelize the primal tree method.

A Parallel Programming Environment using Graph Type Intermediate Representation Form (그래프 중간표현 형태를 기반으로 한 병렬 프로그래밍 환경)

  • 이원용;박두순
    • Journal of Internet Computing and Services
    • /
    • 제2권4호
    • /
    • pp.69-81
    • /
    • 2001
  • This paper describes a parallel programming environment to help programmer to write parallel programs. Parallel program must be write according to the character of the various hardware or program. So it is difficult for the programs to write the parallel programmer. In this paper, we propose and implement a parallel programming environment using graph type intermediate representation form, and graph user interface is provided for programmer to get parallel programs easily, This parallel environment supports special functions using graph type intermediate representation form. The special functions involve program editing. data dependence analysis, loop transformation. CFG, PDG, HTG. This parallel environment helps users make parallelism and optimization easy through showing the intermediate code with graph.

  • PDF

A Development of Color Prototypes Based on Digital Color Image Analysis (한국 디지털 전통색채이미지를 이용한 배색유형 개발)

  • Lee, Hyun-Soo;Kim, Joon-Jl
    • Korean Institute of Interior Design Journal
    • /
    • 제16권6호
    • /
    • pp.240-249
    • /
    • 2007
  • The purpose of this paper is to produce color harmony code based on color harmony prototype in terms of environmental color design. This paper proposes ways of categorizing more accurate color harmony prototype through digital image processing by the computer program called the Color Syntax. The method of analysis adopted in this paper is pixel based color image processing. The study suggests color harmony prototype which are categorized by a color harmony angles. These angles represented internal relations between colors. This study describes development processes of color harmony prototype which is a basis for creating color harmony codes. Development processes of color harmony schema consists of color analysis, color codes generation and color selection. Also, how to analyze color images and to chose suitable harmony color codes among various codes are main research issues. As a final result, 109 color harmony codes have been obtained. These code numbers are suggested through rotating 2 color pairs in a 360-degree arc in the same color harmony angles, the codes which is applicable to the color harmony schema previously developed. This color harmony codes will produce better color environment in a sense that it will help designers to maximally reduce their time consumption, and the results of their designs will also be related to the use of proper color for regional environments.

A Study of QR-Code Security Method for Smart Phone (스마트폰에서의 QR-Code 보안기법에 대한 연구)

  • Byeon, Jin-Young;Ahn, Yo-Han;Lee, Jae-Woong;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2011년도 추계학술대회
    • /
    • pp.699-700
    • /
    • 2011
  • This paper shows the way to prevent the leaking of private information due to malicious codes or connections of invalid URL in QR-Codes, which is used in the present smart-phone. It is difficult to filter out the connections directly with decoding the QR-Codes, so before connecting, we construct servers which compare results of decoding the QR-Codes to a valid URL. The server notifies warning to Smart-phone users if the results were uncertain URLs which did not registered in the server. This paper would help the Smart-phone users to protect their privacy.

  • PDF

A Study on the LRE Thrust Chamber Regenerative Cooling Design (액체로켓엔진 추력실의 재생냉각 기관 설계)

  • Kim, Ji-Hoon;Park, Hee-Ho;Kim, Yoo;Hwang, Soo-Kwon
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • 제6권4호
    • /
    • pp.25-35
    • /
    • 2002
  • A calculation procedure for designing LRE regenerative cooling system is introduced. In LRE thrust chamber, heat is transfered from the hot gas to the wall by convection and radiation, then conduction through the wall and finally convection to the liquid coolant. A cooling channel is designed on the basis of heat transfer rate calculated by using criterial method and integral method. The result is compared with existing Russian cooling channel design code. Also a design logic and quantitative effect of various parameters were introduced to help better understanding for those who is not familiar to LRE system.

Secured Authentication Scheme and Charging & Discharging System Operation for Electric Vehicles (정보보호를 고려한 전기자동차 충방전 시스템의 인증과 운영에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • 제7권1호
    • /
    • pp.551-557
    • /
    • 2021
  • With increase of electric vehicle in the road, the number of charging/discharging infrastructure for electric vehicle in public space is also increased rapidly. To charge or discharge the electric vehicle the user of electric vehicle and service provider should verify the each other's identity to minimize security vulnerability. This paper proposes mutual authentication scheme between electric vehicle and charging/discharging service provider with help of hash function and Message Authentication Code(MAC). Also efficient operating scheme for charging/discharging service system is proposed. The analysis shows that the system has robustness against security vulnerability. Also this system can keep the sensitive personal information of service user safely.

Selection of Detection Measure using Traffic Analysis of Each Malicious Botnet (악성 봇넷 별 트래픽 분석을 통한 탐지 척도 선정)

  • Jang, Dae-Il;Kim, Min-Soo;Jung, Hyun-Chul;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제21권3호
    • /
    • pp.37-44
    • /
    • 2011
  • Recently malicious activities that is a DDoS, spam, propagation of malware, steeling person information, phishing on the Internet are related malicious botnet. To detect malicious botnet, Many researchers study a detection system for malicious botnet, but these applies specific protocol, action or attack based botnet. In this reason, we study a selection of measurement to detec malicious botnet in this paper. we collect a traffic of malicious botnet and analyze it for feature of network traffic. And we select a feature based measurement. we expect to help a detection of malicious botnet through this study.