• Title/Summary/Keyword: System Level Design

Search Result 4,217, Processing Time 0.03 seconds

Surface Deformation Using Guide Surfaces (가이드 곡면을 이용한 곡명의 변형)

  • Kim, Sung-Hwan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.6
    • /
    • pp.441-451
    • /
    • 2007
  • In this paper, the method to modify a surface through three dimensional vector field technique is presented, In this method two guide surfaces are required as a shape reference. One is the shape of original surface, the other is the target shape for the result surface. Proposed method is consists of two steps. The first step is to calculate the mapping points on original and target guide surfaces so that the shape error may be minimized. The second step is to construct the smooth vector field from mapping points of the first step. The developed method is applied to shoe design system which makes the surface modeling very easy and effective.

CHECKLIST FOR ENVIRONMENTAL FRIENDLY CONSTRUCTION MANAGEMENT IN DESIGN PHASE

  • In-Su Jung;Hyun-Su Park;Chan-Sik Lee
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.376-385
    • /
    • 2007
  • Construction project is necessary element for human life to upgrade the quality and convenience. However, due to its contradictory nature to the environment preservation, environmental pollution and damage, deterioration of natural scenery, noise/vibration, water quality pollution, etc. caused in the process of construction greatly affect the environment. For the building or construction project, its possible impact on environment during construction work and after completion must be predicted at its design phase, which will result in the completion of the architecture convenient for human being with its environmental pollution reduced to minimum level. In this study, the checklist of environmental factors was suggested, which should be taken into account at its design phase in conducting the construction work. Proposed checklist was linked with the developed web-based system for the convenience of users like designer and construction manager, etc. It is expected that the checklist suggested by this study will help the designer and construction manager to continue the steady development from the environmental viewpoint during the design phase.

  • PDF

Design Variable Analysis of Space Optical Tracking System Using Modeling and Simulation (모델링 및 시뮬레이션을 활용한 우주 광학 추적 시스템 설계 변수 분석)

  • Chul Hyun;Jae Deok Jang;Hojin Lee;Hyun Seung Kim
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.20 no.1
    • /
    • pp.76-84
    • /
    • 2024
  • This study investigates the design of an optical observation system for continuously tracking unknown space object targets within the telescope's field of view at a short cycle rate of several to tens of frames per second. Through modeling and integrated simulation by design variables, we aim to identify combinations that satisfy the performance effectiveness scale. The study demonstrates the effectiveness of a model-based simulation analysis approach in rapidly identifying design parameters that meet specific performance requirements. By leveraging numerical models tailored to the desired performance analysis level, the approach provides a robust foundation for decision-making, eliminating reliance on empirical methods or vague estimations.

Wing Optimization based on a Reduced System (축소시스템 기반 비행체 날개 최적화 연구)

  • Kim, Hyun-Gi;Choi, In-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4411-4417
    • /
    • 2012
  • The present study proposes the optimization of wing structure base on reduced model which assures the solution accuracy and computational efficiency. Well-constructed reduced model assures the accurate result in the eigenvalue problem, dynamic analysis or sensitivity of design optimization. Reduced system is classified into the reduce-order model based on structural modes and the reduced system based on degrees of freedom. Because this study uses the reduced system based on degrees of freedom, it is important to select the dominant degrees of freedom properly. For this work, robust selection method, two-level selection scheme, is employed and IRS(Improved Reduced System) is applied to construct the final reduced system. In the optimization process based on the reduced system, all of the equivalent stress, eigenvalue and design sensitivities are calculated from the reduced system. Through a numerical example, it is shown that the present optimization methodology based on the reduction method can provide an optimal results for objective function satisfying constraint condition.

Reliability Prediction Based Reliability Growth Management : Case Study of Surveillance System (신뢰도 예측 기반 신뢰도 성장 관리 : 감시체계 사례)

  • Kim, SB;Park, WJ;You, JW;Lee, JK;Yong, HY
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.1
    • /
    • pp.187-198
    • /
    • 2019
  • Purpose: In this study, a reliability prediction based reliability growth management is suggested especially for the early development phase of a system and the case study of surveillance system is given. Methods: The proposed reliability prediction based reliability growth management procedures consists of 7 Steps. In Step 1, the stages for reliability growth management are classified according to the major design changes. From Step 2 to Step 5, system reliability is predicted based on reliability structures and the predicted reliabilities of subsystems (Level 2) and modules (Level 3). At each stage, by comparing the predicted system reliability with that of the previous stage, the reliability growth of the system is checked in Step 6. In Step 7, when the predicted value of sustem reliability does not satisfy the reliability goal, some design alternatives are considered and suggested to improve the system reliability. Results: The proposed reliability prediction based reliability growth management can be an efficient alternative for managing reliability growth of a system in its early development phase. The case study shows that it is applicable to weapon system such as a surveillance system. Conclusion: In this study, the procedures for a reliability prediction based reliability growth management are proposed to satisfy the reliability goal of the system efficiently. And it is expected that the use of the proposed procedures would reduce, in the test and evaluation phase, the number of corrective actions and its cost as well.

Visual Component Assembly and Tool Support Based on System Architecture

  • Lee, Seung-Yun;Kwon, Oh-Cheon;Shin, Gyu-Sang
    • ETRI Journal
    • /
    • v.25 no.6
    • /
    • pp.464-474
    • /
    • 2003
  • Component-based development leverages software reusability and reduces development costs. Enterprise JavaBeans (EJB) is a component model developed to reduce the complexity of software development and to facilitate reuse of components. However, EJB does not support component assembly by a plug-and-play technique due to the hard-wired composition at the code level. To cope with this problem, an architecture for EJB component assembly is defined at the abstract level and the inconsistency between the system architecture and its implementation must be eliminated at the implementation level. We propose a component-based application development tool named the COBALT assembler that supports the design and implementation of EJB component assembly by a plug-and-play technique based on the architecture style. The system architecture is first defined by the Architecture Description Language (ADL). The wrapper code and glue code are then generated for the assembly. After the consistency between the architecture and its implementation is checked, the assembled EJB components are deployed in an application server as a new composite component. We use the COBALT assembler for a shopping mall system and demonstrate that it can promote component reuse and leverage the system maintainability.

  • PDF

Development of Advanced Annunciator System for Nuclear Power Plants

  • Hong, Jin-Hyuk;Park, Seong-Soo;Chang, Soon-Heung
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1995.10a
    • /
    • pp.185-190
    • /
    • 1995
  • Conventional alarm system has many difficulties in the operator's identifying the plant status during special situations such as design basis accidents. To solve the shortcomings, an on-line alarm annunciator system, called dynamic alarm console (DAC), was developed. In the DAC, a signal is generated as alarm by the use of an adaptive setpoint check strategy based on operating mode, and time delay technique is used not to generate nuisance alarms. After alarm generation, if activated alarm is a level precursor alarm or a consequencial alarm, it would be suppressed, and the residual alarms go through dynamic prioritization which provide the alarms with pertinent priorities to the current operating mode. Dynamic prioritization is achieved by going through the system- and mode-oriented prioritization. The DAC has the alarm hierarchical structure based on the physical and functional importance of alarms. Therefore the operator can perceive alarm impacts on the safety or performance of the plant with the alarm propagation from equipment level to plant functional level. In order to provide the operator with the most possible cause of the event and quick cognition of the plant status even without recognizing the individual alarms, reactor trip status tree (RTST) was developed. The DAC and the RTST have been simulated with on-line data obtained from the full-scope simulator for several abnormal cases. The results indicated that the system can provide the operator with useful and compact information fur the earlier termination and mitigation of an abnormal state.

  • PDF

A Study on the Relationship between Company Performance and Production Management in Apparel Manufacture

  • Lee, Sun-Hee;Suh, Mi-A
    • The International Journal of Costume Culture
    • /
    • v.3 no.3
    • /
    • pp.235-245
    • /
    • 2000
  • The purposes of this study were 1) to investigate usage level of production strategies based on group of production environment, 2) to investigate usage level of production systems based on group of production strategy, and 3) to analyze each of company performance based on group of production strategy and system. For this study, the questionnaires were administered to 215 apparel manufactures in metropolitan area from Feb. to Mar. 1998. Employing a sample of 201, data were analyzed by factor analysis, descriptive statistics, cluster analysis, discriminant analysis, and multivariate analysis of variance. The following are the results of this study. 1. Concerning production strategy due to group of production environment, the stable group and the complicated group prefer to rice/quality centered strategy but the level of usage for strategies is so pretty that it is not significant to carry out them. 2. Concerning production system due to group of production strategy, the workers centered group is occupied high in the price/quality centered group & the complex group. And also the product centered system is occupied high in the flexibility centered group. 3. Concerning company performance due to group of production strategy and system, the price/quality centered group holds low position of performance comparing to another groups. And the performance of the managers centered group is higher than that of the workers.

  • PDF

Concept Design of Fire Safety Module for SV20 Service in the Korean e-Navigation System

  • Kim, Byeol;Moon, Serng-Bae;Hwang, Kwang-Il
    • Journal of Navigation and Port Research
    • /
    • v.42 no.5
    • /
    • pp.323-330
    • /
    • 2018
  • The Korean e-Navigation system is a Korean approach to correspond with implementation of IMO e-Navigation. It provides five services, among them SV20 service, a ship remote monitoring system that collects and processes sensor information related to fire, navigation, and seakeeping performance safety. The system also detects abnormal conditions such as fires, capsizing, sinking, navigation equipment failure during navigation, and calculates the safety index and determines the emergency level. According to emergency level, it provides appropriate emergency response guidance for the onboard operator. The fire safety module is composed of three sub-modules; each module is the safety index sub-module, the emergency level determination sub-module and emergency response guidance sub-module. In this study, operational concept of the fire safety module in SV20 service is explained, and fire safety assessment factors are estimated, to calculate the fire safety index. Fire assessment factors included 'Fire detector position factor,' 'Smoke diffusion rate factor,' and 'Fire-fighting facilities factor.'

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.