• 제목/요약/키워드: Performance Verification

검색결과 2,543건 처리시간 0.032초

Assessment of post-earthquake serviceability for steel arch bridges with seismic dampers considering mainshock-aftershock sequences

  • Li, Ran;Ge, Hanbin;Maruyama, Rikuya
    • Earthquakes and Structures
    • /
    • 제13권2호
    • /
    • pp.137-150
    • /
    • 2017
  • This paper focuses on the post-earthquake serviceability of steel arch bridges installed with three types of seismic dampers suffered mainshock-aftershock sequences. Two post-earthquake serviceability verification methods for the steel arch bridges are compared. The energy-absorbing properties of three types of seismic dampers, including the buckling restrained brace, the shear panel damper and the shape memory alloy damper, are investigated under major earthquakes. Repeated earthquakes are applied to the steel arch bridges to examine the influence of the aftershocks to the structures with and without dampers. The relative displacement is proposed for the horizontal transverse components in such complicated structures. Results indicate that the strain-based verification method is more conservative than the displacement-base verification method in evaluating the post-earthquake serviceability of structures and the seismic performance of the retrofitted structure is significantly improved.

An experimental study on the development and verification of NCC(new concrete cutting) system

  • Park, Jong-Hyup;Han, Jong-Wook
    • Structural Engineering and Mechanics
    • /
    • 제65권2호
    • /
    • pp.203-211
    • /
    • 2018
  • This paper introduces the development process of NCC(New Concrete Cutting) system and analyzes first verification test. Based on the first verification test results, some problems of NCC system have been newly modified. We carry out the second verification test. We tried to verify cutting performance and dust control efficiency of NCC system through the cutting test of concrete bridge piers. In particular, this verification test strives to solve the problem of concrete dust, which is the biggest problem of dry cutting method. The remaining dust problems in cutting section tried to solve through this verification test. This verification test of the NCC system shows that the dust problem of dry cutting method is closely controlled and solved. In conclusion, the proposed NCC method is superior to the dry cutting method in all aspects, including cutting performance, dust vacuum efficiency and cooling effect. The proposed NCC system is believed to be able to provide eco-friendly cutting technology to various industries, such as the removal of the SOC structures and the dismantling of nuclear plants, which have recently become a hot issue in the field of concrete cutting.

서명자동검정을 위한 개인별 특징 세트 선택 (Customised feature set selection for automatic signature verification)

  • 배영래;조동욱;김지영
    • 한국통신학회논문지
    • /
    • 제21권7호
    • /
    • pp.1642-1653
    • /
    • 1996
  • This paper covers feature extraction for automatic handwritten signature verification. Several major feature selection techniques are investigated from a practical perspective to realise an optimal signature verification system, and customised feature set selection based on set-on-set distance measurement is presented. The experimental results have proved the proposed methods to be efficient, offering considerably improved verification performance compared to conventional methods. Also, they dramatically reduce the processing complexity in the verification system.

  • PDF

출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델 (An Access Code Key for Verification Service Model on the Blockchain in a Door Security)

  • 홍기현;이병문
    • 한국멀티미디어학회논문지
    • /
    • 제25권10호
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

Hidden LMS 적응 필터링 알고리즘을 이용한 경쟁학습 화자검증 (Speaker Verification Using Hidden LMS Adaptive Filtering Algorithm and Competitive Learning Neural Network)

  • 조성원;김재민
    • 대한전기학회논문지:시스템및제어부문D
    • /
    • 제51권2호
    • /
    • pp.69-77
    • /
    • 2002
  • Speaker verification can be classified in two categories, text-dependent speaker verification and text-independent speaker verification. In this paper, we discuss text-dependent speaker verification. Text-dependent speaker verification system determines whether the sound characteristics of the speaker are equal to those of the specific person or not. In this paper we obtain the speaker data using a sound card in various noisy conditions, apply a new Hidden LMS (Least Mean Square) adaptive algorithm to it, and extract LPC (Linear Predictive Coding)-cepstrum coefficients as feature vectors. Finally, we use a competitive learning neural network for speaker verification. The proposed hidden LMS adaptive filter using a neural network reduces noise and enhances features in various noisy conditions. We construct a separate neural network for each speaker, which makes it unnecessary to train the whole network for a new added speaker and makes the system expansion easy. We experimentally prove that the proposed method improves the speaker verification performance.

원산지제도의 취약성, FTA 장벽 및 원산지검증 수준과 원산지성과에 대한 연구 (A Study on the relation of Vulnerability, FTA Barrier, Origin Verification and Origin Performance in Rules of Origin)

  • 김창봉;현화정
    • 통상정보연구
    • /
    • 제16권5호
    • /
    • pp.295-315
    • /
    • 2014
  • 본 연구에서는 원산지제도의 취약성, FTA 장벽, 원산지검증 수준, 원산지성과 간의 구조적 관계를 규명하였다. 이를 위해서 원산지제도를 수행하고 있는 104개 기업들을 대상으로 설문조사를 수행하고, 구조방정식모형(Structural equation model)을 통해 가설을 검증하였다. 먼저, 원산지제도의 취약성, FTA 장벽 요인을 선행변수로 두고, 원산지검증 요인을 매개변수로 설정하였다. 기업의 원산지성과 요인과 함께 연구모형에 포함시켜 실증분석을 한 결과 다음과 같은 연구결과를 얻었다. 첫째, 원산지제도의 취약성은 원산지검증 수준 요인에 부(-)의 영향을 미쳤다. 둘째, 원산지검증 수준은 원산지성과 요인에 정(+)의 영향을 미쳤다. 본 연구 결과를 통하여 기업들은 경쟁력을 강화시키기 위해서 먼저, 원산지규정에 대한 이해력을 높이고, 파트너 기업들과 공동으로 협업하여 대처해 나가는 방법으로 연구성과를 거두었다. 둘째, 물품의 원산지를 증명에 대한 프로세스를 구축하여 이를 시스템화하여 체계적으로 관리해야 한다는 결론을 얻었다. 향후 원산지검증 수준에 관하여 기업내부 요인과 외부 요인을 도출하여 기업의 대 내외적 수준을 평가할 수 있는 연구가 필요할 것이라고 판단된다.

  • PDF

프라이버시 보호를 위한 얼굴 인증이 가능한 비식별화 얼굴 이미지 생성 연구 (De-Identified Face Image Generation within Face Verification for Privacy Protection)

  • 이정재;나현식;옥도민;최대선
    • 정보보호학회논문지
    • /
    • 제33권2호
    • /
    • pp.201-210
    • /
    • 2023
  • 딥러닝 기반 얼굴 인증 모델은 높은 성능을 보이며 많은 분야에 이용되지만, 얼굴 이미지를 모델에 입력하는 과정에서 사용자의 얼굴 이미지가 유출될 가능성이 존재한다. 얼굴 이미지의 노출을 최소화하기 위한 방법으로 비식별화 기술이 존재하지만, 얼굴 인증이라는 특수한 상황에서 기존 기술을 적용할 때에는 인증 성능이 감소하는 문제점이있다. 본 논문에서는 원본 얼굴 이미지에 다른 인물의 얼굴 특성을 결합한 뒤, StyleGAN을 통해 비식별화 얼굴이미지를 생성한다. 또한, HopSkipJumpAttack을 활용해 얼굴 인증 모델에 맞춰 특징들의 결합 비율을 최적화하는 방법을 제안한다. 우리는 제안 방법을 통해 생성된 이미지들을 시각화하여 사용자 얼굴의 비식별화 성능을 확인하고, 실험을 통해 얼굴 인증 모델에 대한 인증 성능을 유지할 수 있음을 평가한다. 즉, 제안 방법을 통해 생성된 비식별화 이미지를 사용하여 얼굴 인증을 할 수 있으며, 동시에 얼굴 개인정보 유출을 방지할 수 있다.

Performance Based Fire Engineering in Japan

  • Kohno, Mamoru;Okazaki, Tomohito
    • 국제초고층학회논문집
    • /
    • 제2권1호
    • /
    • pp.23-30
    • /
    • 2013
  • This paper explains the Japanese present situations relevant to the fire resistance performance. Performance-based fire provisions was introduced in 1998 for the first time when the Building Standard Law was amended. However, performance-based fire resistance design had been used since long before the official introduction of performance-based provisions. A Comprehensive Technology Development Project of Ministry of Construction from 1982 to 1986 established a technical basis for performance-based fire safety engineering in Japan. A system of calculation methods for fire resistance verification was prescribed in the Ministry Notification in 2000 utilizing the results of this project as a background. This method, referred to as the Fire Resistance Verification Method (FRVM), is the standard method to verify the fire resistance performance of principal building parts such as columns, beams, and walls of steel, concrete, or wood structured buildings. For tall buildings, however, more advanced method for performance verification is often necessary because new building materials or structural systems are often used for these buildings. An example project of tall building owned by a major newspaper company is presented in this paper. Advanced thermal deformation analysis is executed to secure the fire resistance of the building.

추정모델에 의한 화력발전 플랜트 계측데이터의 검증 및 유효화 (Estimation Model-based Verification and Validation of Fossil Power Plant Performance Measurement Data)

  • 김성근;윤문철;최영석
    • 한국정밀공학회지
    • /
    • 제17권2호
    • /
    • pp.114-120
    • /
    • 2000
  • Fossil power plant availability is significantly affected by gradual degradations of equipment as operation of the plant continues. It is quite important to determine whether or not to replace some equipment and when to replace the equipment. Performance calculation and analysis can provide the information. Robustness in the performance calculation can be increased by using verification & validation of measured input data. We suggest new algorithm in which estimation relation for validated measurement can be obtained using correlation between measurements. Input estimation model is obtained using design data and acceptance measurement data of domestic 16 fossil power plant. The model consists of finding mostly correlated state variable in plant state and mapping relation based on the model and current state of power plant.

  • PDF

항공용 카메라 전방운동 보상기능의 실험실 입증방안 (Laboratory Test Method for the Forward Motion Compensation of Airborne Camera)

  • 송대범;윤용은
    • 한국군사과학기술학회지
    • /
    • 제15권4호
    • /
    • pp.507-512
    • /
    • 2012
  • Image blurring in airborne camera can be prevented through timely actuation of LOS(Line of Sight) into the opposite direction to the aircraft advancement, i.e. FMC(Forward motion compensation). Performance verification of FMC requires installation of camera to the aircraft. However, in many ways the verification process has little choice but to be implemented in the laboratory. In this paper verification method of FMC performance in the laboratory is introduced. With collimator target installed in the known reference position image obtained by actual mission plan naturally displays image blurring as well as LOS displacement by FMC effect. Through comparison of the amount of those image blurring and LOS displacement to the equivalent image distortion expected by the application of the FMC reference command can the performance be verified. In this paper we propose a new verification method of FMC performance in laboratory along with generalized solution of FMC reference command, and assess the validity of our proposition.