• 제목/요약/키워드: field verification

검색결과 1,256건 처리시간 0.022초

무선 통신망을 활용한 VR 시뮬레이션 관제상황 검증 시스템에 관한 연구 (A Study on the Virtual Reality Simulation Monitoring Verification System Available Wireless Communication Network)

  • 이양선;강희조
    • 디지털콘텐츠학회 논문지
    • /
    • 제7권3호
    • /
    • pp.193-197
    • /
    • 2006
  • 본 논문에서는 무선 통신망과 향후 발전 가능성이 예상되는 가상현실 기술을 이용하여 특수환경에 적용되는 관제분야에서 사고상황 검증 및 사후 교육용도로 적용이 가능한 가상현실 시뮬레이션 기법을 이용한 관제상황 검증 시스템을 제안하였다. 또한, 제안 시스템의 정의와 동작원리를 살펴보고 제안 시스템에서 요구되는 기술사항에 관하여 분석하였다. 본 논문에서 제안한 무선 통신망을 활용한 관제상황 검증 시스템은 이동 전동차량의 기관실 모니터링 뿐만 아니라 의료분야 혹은 특수 위험물 처리를 수행하는 관제실에서도 그 적용이 가능하리라 예상된다.

  • PDF

도형의 변환학습의 순차성 고찰 (A Study of the Sequence of Figure Transformation Learning)

  • 박성택
    • 한국수학교육학회지시리즈A:수학교육
    • /
    • 제17권2호
    • /
    • pp.1-13
    • /
    • 1979
  • This study aimed at studying the sequence of the Figure Transformation Learning, inquiring relationship among these transformations and then researching whether there is the difference of the learning ability or not between by teaching them as it is independent and by teaching them as it is contains. (Hypothesis 1) It may be more effective to teach The Sequence of Transformation Learning by beginning with peculiar field, ending with general field than vice versa At the result of verification-C $R_{M}$=2.59, 0.005$R_{M}$=5.19, p<0.005-significant difference appeared. It is proved more effective to teach the Figure Transformation Learning the way it contains than the way it is independent. Synthesizing two hypothesises of the above, the conclusion is following The Figure Transformation Learning should be taught by beginning with peculiar field. ending with general field (congruent transformationlongrightarrowsimilar transformationlongrightarrowprojective transformationlongrightarrowtopological transformation). To teach it the way it contains is more effective.ive.

  • PDF

An experimental study on the development and verification of NCC(new concrete cutting) system

  • Park, Jong-Hyup;Han, Jong-Wook
    • Structural Engineering and Mechanics
    • /
    • 제65권2호
    • /
    • pp.203-211
    • /
    • 2018
  • This paper introduces the development process of NCC(New Concrete Cutting) system and analyzes first verification test. Based on the first verification test results, some problems of NCC system have been newly modified. We carry out the second verification test. We tried to verify cutting performance and dust control efficiency of NCC system through the cutting test of concrete bridge piers. In particular, this verification test strives to solve the problem of concrete dust, which is the biggest problem of dry cutting method. The remaining dust problems in cutting section tried to solve through this verification test. This verification test of the NCC system shows that the dust problem of dry cutting method is closely controlled and solved. In conclusion, the proposed NCC method is superior to the dry cutting method in all aspects, including cutting performance, dust vacuum efficiency and cooling effect. The proposed NCC system is believed to be able to provide eco-friendly cutting technology to various industries, such as the removal of the SOC structures and the dismantling of nuclear plants, which have recently become a hot issue in the field of concrete cutting.

Safety Ontology Modeling and Verification on MIS of Ship-Building and Repairing Enterprise

  • Wu, Yumei;Li, Zhen;Zhao, LanJie;Yu, Zhengwei;Miao, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권4호
    • /
    • pp.1360-1388
    • /
    • 2021
  • Shipbuilding and repairing enterprise has the characteristics of many hazards and accidents. Therefore, the safety management ability of shipbuilding and repairing MIS (management information system) must be effectively guaranteed. The verification on safety management is the necessary measure to ensure and improve the safety management ability of MIS. Safety verification can not only increase the safety of MIS, but also make early warning of potential risks in management to avoid the accidents. Based on the authoritative standards in the field of safety in shipbuilding and repairing enterprise, this paper applied modeling and verification method based on ontology to safety verification of MIS, extracted the concepts and associations from related safety standards to construct axiom set to support safety verification on MIS of shipbuilding and repairing enterprise. Then, this paper developed the corresponding safety ontology modeling and verification tool-SOMVT. By the application and comparison of two examples, this paper effectively verified the safety of MIS to prove the modeling method and the SOMVT can improve the safety of MIS in a much more effective and stable way to traditional manual analysis.

연장급전 전압강하 계산을 위한 전기철도 급전 시뮬레이터의 검증에 관한 연구 (A Study on Verification of PowerRail based on Voltage Drop under Extended Feeding Condition)

  • 김주락
    • 전기학회논문지
    • /
    • 제64권2호
    • /
    • pp.331-337
    • /
    • 2015
  • The power flow analysis of electrified railway is required complicated calculation, because of variable load. Train runs trough rail supplied by electric power therefore, the load value in electrified railway system fluctuates along time. The power flow algorithm in electrified railway system is different from general power system, and the power flow simulation is peformed by the particular simulation software. Powerail is simulation software for analysis of traction power supply system developed by KRRI, in 2008. This consists of load forecasting module, including TPS and time scheduling, and power flow module. This software was verified by measured current under normal feeding condition, however, has not been verified by voltage on the condition of extended feeding. This paper presents the verification of PowerRail based on voltage drop under extended feeding condition. This is performed by comparing simulation result with field test. Field test and simulation is done in commercial railway line.

비평지 및 먼지 환경에서 1차원 가상힘장 알고리즘의 실험적 검증 (Experimental Verification of 1D Virtual Force Field Algorithm on Uneven and Dusty Environment)

  • 최덕선;주상현;박용운;박진배
    • 한국군사과학기술학회지
    • /
    • 제20권5호
    • /
    • pp.647-653
    • /
    • 2017
  • In this paper, we deal with the experimental verification of 1D virtual force field algorithm based reflexive local path planning on uneven and dusty environment. The existing obstacle detection method on uneven and dusty environment and 1D virtual force field based reflexive local path planning algorithm simply are introduced. Although the 1D virtual force field algorithm is verified by various simulations, additional efforts are needed to verify this algorithm in the real-world. The introduced methods are combined with each other, installed to real mobile platforms and verified by various real experiments.

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • 제28권3호
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

Feasibility study of a novel hash algorithm-based neutron activation analysis system for arms control treaty verification

  • Xiao-Suo He;Yao-Dong Dai;Xiao-Tao He;Qing-Hua He
    • Nuclear Engineering and Technology
    • /
    • 제56권4호
    • /
    • pp.1330-1338
    • /
    • 2024
  • Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel Hash encryption algorithm, this paper presents a Monte Carlo-based design of a neutron activation analysis verification module. The verification module employs a thermal neutron source, a non-uniform mask (physically encrypting information about isotopic composition and geometric structure), a gamma detector array, and a Hash encryption algorithm (for electronic encryption). In the physical field, a non-uniform mask is designed to distort the characteristic gamma rays emitted by the inspected item. Furthermore, as part of the Hash algorithm, a key is introduced to encrypt the data and improve the system resolution through electronic design. In order to quantify the difference between items, Hamming distance is used, which allows data encryption and analysis simultaneously. Simulated inspections of simple objects are used to quantify system performance. It is demonstrated that the method retains superior resolution even with 1% noise level. And the performances of anti-statistical attack and anti-brute force cracking are evaluated and found to be very excellent. The verification method lays a solid foundation for nuclear disarmament verification in the upcoming era.

스마트폰용 동적 서명인증의 모바일 구현 (Mobile Implementation of Enhanced Dynamic Signature Verification for the Smart-phone)

  • 김진환;조혁규;서창진;차의영
    • 한국정보통신학회논문지
    • /
    • 제11권9호
    • /
    • pp.1781-1785
    • /
    • 2007
  • 본 논문에서는 스마트폰에서 사용 가능한 동적서명 인증기술의 사용자 인터페이스와 알고리즘을 제안하고, 제안된 시스템의 성능을 기술하였다. 개인 서명의 모양, 쓰는 속도, 기울기, 획수와 획순서 등의 정보를 활용함으로써 인증 여부를 결정하게 되며, 컴퓨터와 무선인터 넷이 발달하고 관련 산업이 급성장함에 따라서 폭 넓은 산업 분야에 활용될 것으로 기대된다.