• Title/Summary/Keyword: discrete models

Search Result 626, Processing Time 0.047 seconds

Prediction of Broadband Noise for Non-cavitation Hydrofoils using Wall-Pressure Spectrum Models (벽면변동압력을 이용한 비공동 수중익의 광대역소음 예측 연구)

  • Choi, Woen-Sug;Jeong, Seung-Jin;Hong, Suk-Yoon;Song, Jee-Hun;Kwon, Hyun-Wung;Kim, Min-Jae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.6
    • /
    • pp.765-771
    • /
    • 2019
  • With the increase in the speed of ships and the size of ocean structures, the importance of flow noise has become increasingly critical in meeting regulatory standards. However, unlike active investigations in aeroacoustics fields for airplanes and trains, which are based on acoustic analogy methods for tonal and broadband frequency noise, only the discrete blade passing frequency noise from propellers is considered in marine fields. In this study, prediction methods for broadband noise in marine propellers and underwater appendages are investigated using FW-H Formulation1B, which can consider the mechanism of primary noise generation of trailing edge noise. The original FW-H Formulation 1B is based on the pressure correlation function tolackitsgeneralityandaccuracy. To overcome these limitations, wall-pressure spectrum models are adopted to improve the generality in fluid mediums. The comparison of the experimental results obtained in air reveals that the proposed model exhibits a higher accuracy within 5 dB. Furthermore, the prediction procedures for broadband noise for hydrofoils are established, and the estimation of broadband noise is conducted based on the results of the computational fluid dynamics.

Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.105-114
    • /
    • 2020
  • In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements.

Program Design and Implementation for Efficient Application of Heterogeneous Spatial Data Using GMLJP2 Image Compression Technique (GMLJP2 영상압축 기술을 이용한 다양한 공간자료의 효율적인 활용을 위한 프로그램 설계 및 구현)

  • Kim, Yoon-Hyung;Yom, Jae-Hong;Lee, Dong-Cheon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.24 no.5
    • /
    • pp.379-387
    • /
    • 2006
  • The real world is spatially modelled conceptually either as discrete objects or earth surface. The generated data models are then usually represented as vector and raster respectively. Although there are limited cases where only one data model is sufficient to solve the spatial problem at hand, it is now generally accepted that GIS should be able to handle various types of data model. Recent advances in spatial technology introduced even more variety of heterogeneous data models and the need is ever growing to handle and manage efficiently these large variety of spatial data. The OGC (Open GIS Consortium), an international organization pursuing standardization in the geospatial industry. recently introduced the GMLJP2 (Geographic Mark-Up Language JP2) format which enables store and handle heterogeneous spatial data. The GMLJP2 format, which is based on the JP2 format which is an abbreviation for JPEG2000 wavelet image compression format, takes advantage of the versatility of the GML capabilities to add extra data on top of the compressed image. This study takes a close look into the GMLJP2 format to analyse and exploit its potential to handle and mange hetergeneous spatial data. Aerial image, digital map and LIDAR data were successfully transformed end archived into a single GMLJP2 file. A simple viewing program was made to view the heterogeneous spatial data from this single file.

Change of Fractured Rock Permeability due to Thermo-Mechanical Loading of a Deep Geological Repository for Nuclear Waste - a Study on a Candidate Site in Forsmark, Sweden

  • Min, Ki-Bok;Stephansson, Ove
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2009.06a
    • /
    • pp.187-187
    • /
    • 2009
  • Opening of fractures induced by shear dilation or normal deformation can be a significant source of fracture permeability change in fractured rock, which is important for the performance assessment of geological repositories for spent nuclear fuel. As the repository generates heat and later cools the fluid-carrying ability of the rocks becomes a dynamic variable during the lifespan of the repository. Heating causes expansion of the rock close to the repository and, at the same time, contraction close to the surface. During the cooling phase of the repository, the opposite takes place. Heating and cooling together with the, virgin stress can induce shear dilation of fractures and deformation zones and change the flow field around the repository. The objectives of this work are to examine the contribution of thermal stress to the shear slip of fracture in mid- and far-field around a KBS-3 type of repository and to investigate the effect of evolution of stress on the rock mass permeability. In the first part of this study, zones of fracture shear slip were examined by conducting a three-dimensional, thermo-mechanical analysis of a spent fuel repository model in the size of 2 km $\times$ 2 km $\times$ 800 m. Stress evolutions of importance for fracture shear slip are: (1) comparatively high horizontal compressive thermal stress at the repository level, (2) generation of vertical tensile thermal stress right above the repository, (3) horizontal tensile stress near the surface, which can induce tensile failure, and generation of shear stresses at the comers of the repository. In the second part of the study, fracture data from Forsmark, Sweden is used to establish fracture network models (DFN). Stress paths obtained from the thermo-mechanical analysis were used as boundary conditions in DFN-DEM (Discrete Element Method) analysis of six DFN models at the repository level. Increases of permeability up to a factor of four were observed during thermal loading history and shear dilation of fractures was not recovered after cooling of the repository. An understanding of the stress path and potential areas of slip induced shear dilation and related permeability changes during the lifetime of a repository for spent nuclear fuel is of utmost importance for analysing long-term safety. The result of this study will assist in identifying critical areas around a repository where fracture shear slip is likely to develop. The presentation also includes a brief introduction to the ongoing site investigation on two candidate sites for geological repository in Sweden.

  • PDF

Effective Response Time Verify of Active Decoy Against Anti-Ship Missile Using DEVS Simulation (DEVS 시뮬레이션을 사용한 능동기만기의 대함미사일에 대한 효과적인 대응시간 검증)

  • Choi, Soon-Ho;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.5
    • /
    • pp.495-501
    • /
    • 2015
  • Abroad warships are confronted with various menaces. The most critical threat of the warship is an Anti-Ship Missile (ASM). The ASM is able to be launched at a variety of environments and platforms. The ASM can evades conventional naval radar systems and electronic countermeasure techniques for providing a fatal damage to the warship. To cope with the ASM, an active decoy is an effective method to minimize the direct damage to the warship. The active decoy increases survivability of the warship because the ASM can lure pursuit of the active decoy instead of the warship. In this paper, our proposed method verifies an available response time of the active decoy to deal with the ASM using the active decoy of the warship in marine environments. We defined models of the warship, the ASM, and the active decoy, and executed simulation by combining the models. By the simulation result, the proposed method demonstrated the superiority of the mobile active decoy of the response time decoy among various active decoys, and estimated a protection area to prevent the ASM according the response time of the mobile active decoy against the ASM.

Genome-Wide Association Analyses on Blood Pressure Using Three Different Phenotype Definitions

  • Park, Ji-Wan;Uhmm, Saan-Yong;Shin, Chol;Cho, Nam-H.;Cho, Yoon-Shin;Lee, Jong-Young
    • Genomics & Informatics
    • /
    • v.8 no.3
    • /
    • pp.108-115
    • /
    • 2010
  • Hypertension is the most prevalent disease worldwide and is itself a risk factor for cerebral, cardiac, and renal diseases. The inconsistency of candidate genes suggested by previous genomewide association studies (GWASs) may be due to not only differences in study design and genetic or environmental background but also the difference in the power of analysis between continuous traits and discrete traits. We analyzed 352,228 single nucleotide polymorphisms (SNPs) in 8842 unrelated Koreans obtained from Ansan and Ansung cohorts. We performed a series of GWA analyses using three different phenotype models; young hypertensive cases (278 subjects) versus elderly normotensive controls (680 subjects); the upper 25% (2211 hypertensive cases) versus the lower 25% of the SBP distribution (2211 hypotensive controls); and finally SBP and DBP as continuous traits (8842 subjects). The numbers of young hypertensive cases and elderly normotensive controls were not large enough to achieve genomewide significance. The model comparing the upper 25% subjects to the lower 25% of subjects showed a power that was approximate to that of QTL analysis. Two neighboring SNPs of the ATP2B1 gene, rs17249754 (SBP, p=$2.53^{-10}$; DBP, p=$1.28{\times}10^{-8}$) and rs7136259 (SBP, p=$1.30{\times}10^{-9}$; DBP, p=$6.41{\times}10^{-8}$), were associated with both SBP and DBP. Interestingly, a SNP of the RPL6 gene, rs11066280, revealed a significant genomewide association with SBP in men only (p=$3.85{\times}10^{-8}$), and four SNPs located near the MAN2A1 gene showed a strong association with DBP only in elderly men aged 60-70 years (e.g., rs6421827, p=$4.86{\times}10^{-8}$). However, we did not observe any gene variant attaining genomewide significance consistently in the three phenotype models except for the ATP2B1 gene variants. In general, the association signal with blood pressure was stronger in women than in men. Genes identified in GWASs are expected to open the way for prevention, early diagnosis, and personalized treatment of hypertension.

Setting limits for water use in the Wairarapa Valley, New Zealand

  • Mike, Thompson
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.227-227
    • /
    • 2015
  • The Wairarapa Valley occupies a predominantly rural area in the lower North Island of New Zealand. It supports a mix of intensive farming (dairy), dry stock farming (sheep and beef cattle) and horticulture (including wine grapes). The valley floor is traversed by the Ruamahanga River, the largest river in the Wellington region with a total catchment area of 3,430 km2. Environmental, cultural and recreational values associated with this Ruamahanga River are very high. The alluvial gravel and sand aquifers of the Wairarapa Valley, support productive groundwater aquifers at depths of up to 100 metres below ground while the Ruamahanga River and its tributaries present a further source of water for users. Water is allocated to users via resource consents by Greater Wellington Regional Council (GWRC). With intensifying land use, demand from the surface and groundwater resources of the Wairarapa Valley has increased substantially in recent times and careful management is needed to ensure values are maintained. This paper describes the approach being taken to manage water resources in the Wairarapa Valley and redefine appropriate limits of sustainable water use. There are three key parts: Quantifying the groundwater resource. A FEFLOW numerical groundwater flow model was developed by GWRC. This modelling phase provided a much improved understanding of aquifer recharge and abstraction processes. It also began to reveal the extent of hydraulic connection between aquifer and river systems and the importance of moving towards an integrated (conjunctive) approach to allocating water. Development of a conjunctive management framework. The FEFLOW model was used to quantify the stream flow depletion impacts of a range of groundwater abstraction scenarios. From this, three abstraction categories (A, B and C) that describe diminishing degrees of hydraulic connection between ground and surface water resources were mapped in 3 dimensions across the Valley. Interim allocation limits have been defined for each of 17 discrete management units within the valley based on both local scale aquifer recharge and stream flow depletion criteria but also cumulative impacts at the valley-wide scale. These allocation limits are to be further refined into agreed final limits through a community-led decision making process. Community involvement in the limit setting process. Historically in New Zealand, limits for sustainable resource use have been established primarily on the basis of 'hard science' and the decision making process has been driven by regional councils. Community involvement in limit setting processes has been through consultation rather than active participation. Recent legislation in the form of a National Policy Statement on Freshwater Management (2011) is reforming this approach. In particular, collaborative consensus-based decision making with active engagement from stakeholders is now expected. With this in mind, a committee of Wairarapa local people with a wide range of backgrounds was established in 2014. The role of this committee is to make final recommendations about resource use limits (including allocation of water) that reflect the aspirations of the communities they represent. To assist the committee in taking a holistic view it is intended that the existing numerical groundwater flow models will be coupled with with surface flow, contaminant transport, biological and economic models. This will provide the basis for assessing the likely outcomes of a range of future land use and resource limit scenarios.

  • PDF

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Analysis of the Elderly Travel Characteristics and Travel Behavior with Daily Activity Schedules (the Case of Seoul, Korea) (활동 스케줄 분석을 통한 고령자의 통행특성과 통행행태에 관한 연구)

  • Seo, Sang-Eon;Jeong, Jin-Hyeok;Kim, Sun-Gwan
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.5 s.91
    • /
    • pp.89-108
    • /
    • 2006
  • Korea has been entering the ageing society as the population of age over 65 shared over 7% since the year 2000. The ageing society needs to have transportation facility considering elderly people's travel behavior. This study aims to understand the elderly people's travel behavior using recent data in Korea. The activity schedule approach begins with travel outcomes are part of an activitv scheduling decision. For tho?e approach. used discrete choice models (especially. Nested Logit Model) to address the basic modeling problem capturing decision interaction among the many choice dimensions of the immense activity schedule choice set The day activity schedule is viewed as a sot of tours and at-home activity episodes tied togather with overarching day activity pattern using the Seoul Metropolitan Area Transportation Survey data, which was conducted in June, 2002. Decisions about a specific tour in the schedule are conditioned by the choice of day activity pattern. The day activity scheduling model estimated in this study consists of tours interrelated in a day activity pattern. The day activity pattern model represents the basic decision of activity participation and priorities and places each activity in a configuration of tours and at-home episodes. Each pattern alternative is defined by the primary activity of the day, whether the primary activity occurs at home or away, and the type of tour for the primary activity. In travel mode choice of the elderly and non-workers, especially, travel cost was found to be important in understanding interpersonal variations in mode choice behavior though, travel time was found to be less important factor in choosing travel mode. In addition, although, generally, the elderly was likely to choose transit mode, private mode was preferred for the elderly over 75 years old owing to weakened physical health for such things as going up and down of stairs. Therefore. as entering the ageing society, transit mode should be invested heavily in transportation facility Planning tor improving elderly transportation service. Although the model has not yet been validated in before-and-after prediction studies. this study gives strong evidence of its behavioral soundness, current practicality. and potential for improving reliability of transportation Projects superior to those of the best existing systems in Korea.

Proton Affinity Distributions of Humic Acid Extracted from Upland and Paddy Soils (논·밭토양으로부터 추출한 Humic Acid의 수소이온 친화력 분포)

  • Jeong, Chang-Yoon;Park, Chan-Won;Kim, Jeong-Gyu;Lim, Soo-Kil
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.32 no.4
    • /
    • pp.429-439
    • /
    • 1999
  • Potentiometric titration data were collected for some humic acids purified from Korean upland and paddy soils over a range of pH (3.0 - 11.0) with $NaNO_3$ background electrolyte concentrations (0.01, 0.10, 0.50 and 1.00 M). The data were applied to model A and V which included both intrinsic heterogeneity of humic materials and electrostatic interaction influences on binding sites. The elemental analysis were conducted for various type of humic samples. The $E_4/E_6$ ratio proposed negative correlation with the total carboxyl groups ($r^2$= 0.9988). The charge ($cmol_c\;kg^{-1}$) on the humic acids became more negative as the ionic strength increased. In both continuous and batch titrations, the ionic strength effect was greater in Namweon series (pH 6.39) than others at pH 5.00. The effect of ionic strength on surface charge appears to be greater in batch titrations. This could suggest that continuous titrations do not represent an equilibrium state and the effects of electrolyte concentration was not fully realized during the course of titrations. Both models described experimental data obtained from continuous and batch titrations well over a range of ionic strengths. Model A is more simpler than model V but adaptes more fitted parameters. Thus, the observed change in apparent binding constants with surface charge is regarded solely due to electrostatic influences rather than functional group heterogeneity. However, Model V is more mechanistically realistic in a number of discrete ligand binding sites.

  • PDF