• Title/Summary/Keyword: S-Chain 모델

Search Result 209, Processing Time 0.04 seconds

Continuous Time Markov Process Model for Nuclide Decay Chain Transport in the Fractured Rock Medium (균열 암반 매질에서의 핵종의 붕괴사슬 이동을 위한 연속시간 마코프 프로세스 모델)

  • Lee, Y.M.;Kang, C.H.;Hahn, P.S.;Park, H.H.;Lee, K.J.
    • Nuclear Engineering and Technology
    • /
    • v.25 no.4
    • /
    • pp.539-547
    • /
    • 1993
  • A stochastic approach using continuous time Markov process is presented to model the one-dimensional nuclide transport in fractured rock media as a further extension for previous works[1-3]. Nuclide transport of decay chain of arbitrary length in the single planar fractured rock media in the vicinity of the radioactive waste repository is modeled using a continuous time Markov process. While most of analytical solutions for nuclide transport of decay chain deal with the limited length of decay chain, do not consider the case of having rock matrix diffusion, and have very complicated solution form, the present model offers rather a simplified solution in the form of expectance and its variance resulted from a stochastic modeling. As another deterministic way, even numerical models of decay chain transport, in most cases, show very complicated procedure to get the solution and large discrepancy for the exact solution as opposed to the stochastic model developed in this study. To demonstrate the use of the present model and to verify the model by comparing with the deterministic model, a specific illustration was made for the transport of a chain of three member in single fractured rock medium with constant groundwater flow rate in the fracture, which ignores the rock matrix diffusion and shows good capability to model the fractured media around the repository.

  • PDF

Development of the Deterioration Models for the Port Structures by the Multiple Regression Analysis and Markov Chain (다중 회귀분석 및 Markov Chain을 통한 항만시설물의 상태열화모델 개발)

  • Cha, Kyunghwa;Kim, Sung-Wook;Kim, Jung Hoon;Park, Mi-Yun;Kong, Jung Sik
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.28 no.3
    • /
    • pp.229-239
    • /
    • 2015
  • In light of the significant increase in the quantities of goods transported and the development of the shipping industry, the frequency of usage of port structures has increased; yet, the government's budget for the shipping & port of SOC has been reduced. Port structures require systematically effective maintenance and management trends that address their growing frequency of usage. In order to construct a productive maintenance system, it is essential to develop deterioration models of port structures that consider various characteristics, such as location, type, use, constructed level, and state of maintenance. Processes for developing such deterioration models include examining factors that cause the structures to deteriorate, collecting data on deteriorating structures, and deciding methods of estimation. The techniques used for developing the deterioration models are multiple regression analysis and Markov chain theory. Multiple regression analysis can reflect changes over time and Markov chain theory can apply status changes based on a probabilistic method. Along with these processes, the deterioration models of open-type and gravity-type wharfs were suggested.

Implementation of Tag Identification Process Model with Scalability for RFID Protecting Privacy on the Grid Environment (그리드환경에서 RFID 프라이버시 보호를 위한 확장성있는 태그판별처리 모델 구현)

  • Shin, Myeong Sook;Lee, Joon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.2 no.1
    • /
    • pp.81-87
    • /
    • 2009
  • Recently RFID system has been adopted in various fields rapidly. However, we ought to solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system To solve the problems, it is Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of increasing numbers of Tag. Therefore, in this paper we apply the previous method into the grid environment by analyzing Hash-Chain scheme in order to reduce processing time when Tags are identified. We'll implement the process by offering Tag Identification Process Model to divide SPs evenly by node.

  • PDF

Integrating Multiple Mathematical Models for Supply Chain Optimization (공급사슬 최적화를 위한 다중의 수리적 모델 활용 구조)

  • 한현수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.97-100
    • /
    • 2001
  • 제조 기업의 가치사슬 최적화를 위한 전략적, 운영상 의사결정 문제는 수리적 모델을 이용한 DSS의 효과적인 활용을 통하여 해결 될 수 있다. 의사결정 프로세스는 필연적으로 공급사슬의 여러 성과 목표와 관련 조직간의 Trade-off 및 연계관계(Interaction)가 고려되므로 복수의 DSS 활용이 필요하게 된다. 이와 관련하여 본 논문에서는 공급 사슬 전체의 최적화를 위한 다수의 전략적 목표 및 의사결정 프로세스, 연계된 수리적 모델들을 정의하고, 관련 조직 및 성과 지표 별 부분적 최적화(Local Optimality)를 지양하고 전체최적화 (Global Optimality)를 달성하기 위한 DSS Logic을 철강산업 프로세스를 대상으로 수리적 모델들의 분할(Decomposition) 및 통합개념을 통하여 제시하였다.

  • PDF

A Transient Analysis in Bicycle Shifting using A Discrete Chain Model (이산화 체인 모델을 이용한 자전거 변속 과도상태 해석)

  • Kim, Jungyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.36 no.4
    • /
    • pp.25-30
    • /
    • 2013
  • This article deals with the transient analysis in bicycle shifting using a discrete chain model. Among the various components of a bicycle, we focused in the power-transmissions on the contact points between the chain element and sprocket. And by imposing kinematic motions on the front and rear derailleurs, we analyzed the shifting mechanism for increasing the rotational speed of rear wheel. In order to build the dynamic analysis model, we first tore down the real bicycle and measured each component's design parameters. Then we made 3-dimensional CAD models for each component related to the power transmission of a bicycle. Using the converted 3-dimensional dynamic model for the simulation program, we performed non-shifting and shifting dynamic analysis. As a result, we investigated the dynamic behaviors of a discrete chain model focused on the interaction between the chain and sprocket wheel.

Inhibitory Effect of Deer Antler Aqua-acupunture (DAA) on Cathepsin S Activity and Rheumatoid Arthritis in Rats (생쥐에서 녹용약침액이 자가항원제시형 Cathepsin S 활성의 저해와 류마티스 관절염 억제에 미치는 효과)

  • Abn, Hyung-jun;Kim, Kap-sung
    • Journal of Acupuncture Research
    • /
    • v.20 no.3
    • /
    • pp.104-116
    • /
    • 2003
  • 목적 : 시스테인 단백분해 효소인 cathepsin는 인간과 생쥐의 항원제시세포에서 II형 주적합항원 불변사슬(MHC class II invariant chain)의 분해에 관여한다. 본 연구는 녹용 약침액이 류마티스 관절염 생쥐 모델의 골조직(연골과 활액) 유래 cathepsin 활성에 미치는 영향을 검정하였다. 방법 : 관절염 동물모델은 BALb/c계 생쥐를 생후 3일에 흉선 적출(3d-Tx)을 하여 만들었다. 동물모델의 골조직, 임파절세포, 비장 등을 녹용처치군과 대조군으로 나누어 cathepsin의 활성도 및 자가항원 특이(C-II-specific) T-세포의 활성도를 비교 분석하였다. 결과 : 각 장기에서 cathepsin S의 활성은 녹용약침 처치군에서 농도 의존적으로 유의성 있게 억제되었고, T-세포 특이 자가항원반응은 녹용약침 처치군의 임파절 세포에서 유의성있게 억제되었다. 그리고 T-세포 특이 자가항원 반응의 불활성화에는 녹용 10~20ug/ml의 용량으로 충분하였다. 결론 : 이러한 실험결과는 녹용 약침액이 cathepsin S를 선택적으로 억제시켜 류마티스 관절염과 같은 자가면역 질환에 유효한 치료약물로 사용될 수 있음을 시사한다.

  • PDF

Force-Feedback Control of an Electrorheological Haptic Device in MIS Virtual Environment (ER 유체를 이용한 햅틱 마스터와 가상 MIS 환경의 연동제어)

  • Kang, Pil-Soon;Han, Young-Min;Choi, Seung-Bok
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2006.11a
    • /
    • pp.422-427
    • /
    • 2006
  • This paper presents force-feedback control performance of a haptic device in virtual environment of minimally invasive surgery(MIS). As a first step, based on an electrorheological(ER) fluid and spherical geometry, a new type of master device is developed and integrated with a virtual environment of MIS such as a surgical tool and human organ. The virtual object is then mathematically formulated by adopting the shape retaining chain linked(S-Chain) model. After evaluating reflection force, computational time, and compatibility with real time control, the virtual environment of MIS is formulated by interactivity with the ER haptic device in real space. Tracking control performances for virtual force trajectory are presented in time domain, and theirtrackingerrorsareevaluated.

  • PDF

Force-feedback Control of an Electrorheological Haptic Device in MIS Virtual Environment (전기유변 유체를 이용한 햅틱 마스터와 가상의 최소침습수술 환경과의 연동제어)

  • Kang, Pil-Soon;Han, Young-Min;Choi, Seung-Bok
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.16 no.12 s.117
    • /
    • pp.1286-1293
    • /
    • 2006
  • This paper presents force-feedback control performance of a haptic device in virtual environment of minimally invasive surgery(MIS). As a first step, based on an electrorheological (ER) fluid and spherical geometry, a new type of master device is developed and integrated with a virtual environment of MIS such as a surgical tool and human organ. The virtual object is then mathematically formulated by adopting the shape retaining chain linked(S-chain) model. After evaluating reflection force, computational time, and compatibility with real time control, the virtual environment of MIS is formulated by interactivity with the ER haptic device in real space. Tracking control performances for virtual force trajectory are presented in time domain.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

A Study on the Citation of Defense Cyber Protection Partnership for Safe Supply Chain Management (안전한 공급망 관리를 위한 국방사이버보호 파트너십 인증 방안 연구)

  • Kim, Jong-hwa;Kim, Yongchul;Kim, Kyoung Min;Kang, Jeongheung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.101-107
    • /
    • 2019
  • Our military's cyberspace is under constant threat from the enemy. These cyber threats are targeted at the information service assets held by the military, and securing the security of the organization's information service assets is critical. However, since Information assets can not be 100% selt-sufficient in any organization as well as the military, acquisition of information assets by the supply chain is an inevitable. Therefor, after reviewing supply chain protection measures to secure the safety of the military supply chain, we proposed a method for securing supply chain companies through the citation of partnership based on the validated trust model.