• Title/Summary/Keyword: inspect

Search Result 896, Processing Time 0.026 seconds

Study on the Property of Guided Wave Signal Analysis according to Defect Shape of Small Size (소구경 튜브 결함 형태에 따른 유도초음파 신호 해석 특성에 관한 연구)

  • Gil, Doo-Song;Ahn, Yeon-Shik;Jung, Gye-Jo;Park, Sang-Gi;Kim, Yong-Gun
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.32 no.4
    • /
    • pp.410-417
    • /
    • 2012
  • Currently domestic thermal and nuclear power plants are comprised of many type's condenser and steam generator tubes to produce the electricity of good quality. There are some methods to inspect these tubes in the event that several defects were discovered in these facilities. Among many non-destructive methods, we used guided wave to inspect the soundness of tubes, because this method is very fast to detect the defect and very simple to install the equipment and also, can inspect up to the long range at a fixed point. Also, this method has a drawback that does not detect a very small size defect. So, we made an effort to overcome this drawback through the experimentation and signal analysis according to the size and shape of the defect through the manufacture of various artificial cracks capable to generate within the small size tube in the study and we anticipate that these detect limits can be overcome along with the development of the signal processing and manufacturing technology of the sensor for the inspection.

The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy (개인정보보호 관점에서의 웹 트래픽 수집 및 분석 서비스에 대한 타당성 연구)

  • Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.121-134
    • /
    • 2009
  • Consumer-centric marketing business is surely one of the most successful emerging business but it poses a threat to personal privacy. Between the service provider and the user there are many contrary issues to each other. The enterprise asserts that to abuse the privacy data which is anonymous there is not a problem. The individual only will not be able to willingly submit the problem which is latent. Web traffic analysis technology itself doesn't create issues, but this technology when used on data of personal nature might cause concerns. The most criticized ethical issue involving web traffic analysis is the invasion of privacy. So we need to inspect how many and what kind of personal informations being used and if there is any illegal treatment of personal information. In this paper, we inspect the operation of consumer-centric marketing tools such as web log analysis solutions and data gathering services with web browser toolbar. Also we inspect Microsoft explorer-based toolbar application which records and analyzes personal web browsing pattern through reverse engineering technology. Finally, this identified and explored security and privacy requirement issues to develop more reliable solutions. This study is very important for the balanced development with personal privacy protection and web traffic analysis industry.

Compensation of torque ripple of brushless DC motor using feedforward method (Feedforwad 방법을 이용한 BLDC 모터의 토크리플 보상)

  • 장호연;박기철;장평훈
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.736-739
    • /
    • 1997
  • In recent years, there has been a renewed interest in the BLDC motor as a research subject. In this paper we inspect sources of the torque ripple, which is one of the elements causing performance depreciation of BLDC motors. Based on the inspected sources of the torque ripple, feedforward compensation methods are proposed to reduce the size of torque ripple. The effectiveness of the proposed methods is verified with experiments.

  • PDF

3D Vision Inspection Algorithm Using the Geometrical Pattern Matching (기하학적 패턴 매칭을 이용한 3차원 비전 검사 알고리즘)

  • 정철진;허경무
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2533-2536
    • /
    • 2003
  • In this paper, we suggest the 3D Vision Inspection Algorithm which is based on the external shape feature, and is able to recognize the object. Because many objects made by human have the regular shape, if we posses the database of pattern and we recognize the object using the database of the object's pattern, we could inspect the objects of many fields. Thus, this paper suggest the 3D Vision inspection Algorithm using the Geometrical Pattern Matching by making the 3D database.

  • PDF

Nuclear Material Containment/Surveillance System for Nuclear Facility (핵물질 취급 시설의 격납/감시 시스템)

  • Song, D.Y.;Lee, S.Y.;Kim, H.D.
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.490-492
    • /
    • 2005
  • Unattended continuous containment/surveillance systems for safeguards of nuclear facility result in large amounts of image and radiation data, which require much time and effort to inspect. Therefore, it is necessary to develop system that automatically pinpoints and diagnoses the anomalies from data. In this regards, this paper presents the nuclear material containment/surveillance system that integrates visual image and radiation data.

  • PDF

High-speed Image Processing for Blurred Image for an Object Detection (블러가 심한 물체 검출을 위한 고속 MMX 영상처리)

  • Lee, Jae-Hyeok
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.177-179
    • /
    • 2005
  • This paper suggests a high-speed blurred blob image inspection algorithm. When we inspect some products using high-resolution camera, the detected blob images usually have severe blur. And the blur makes it hard to detect an object. There are many blur-processing algorithms, but most of them have no real-time property for high-speed applications at all. In this paper, an MMX technology based algorithm is suggested. The suggested algorithm was found to be effective to detect the blurred blob images via many simulations and long time real-plant experiments.

  • PDF

Weighted Neighbor-node Distribution Localization for Large-scale Wireless Sensor Networks (대규모 무선 센서 네트워크에서 이웃 노드 분포를 이용한 분산 위치인식 기법 및 구현)

  • Lee, Sang-Hoon;Lee, Ho-Jae;Lee, Sang-Hoon
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.255-256
    • /
    • 2008
  • Distributed localization algorithms are required for large-scale wireless sensor network applications. In this paper, we introduce an efficient algorithm, termed weighted neighbor-node distribution localization(WNDL), which emphasizes simple refinement and low system-load for low-cost and low-rate wireless sensors. We inspect WNDL algorithm through MATLAB simulation.

  • PDF

Tool Condition Monitoring Based on Wavelet Transform

  • Doyoung Jeon;Lee, Gun;Kim, Kyungho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.95.5-95
    • /
    • 2002
  • Tool condition monitoring is recognized important in CNC machining processes since the excessive wear or breakage of tool has to be noticed immediately in an automated manufacturing system to keep the quality and productivity. In this research, as an economic way of detecting the status of tool change, the wavelet transform has been applied to the measurement of spindle motor current. The energy of a specific level shows the difference between a normal tool and worn one. By setting a limit on the change of energy, it is possible to notify the time to inspect the tool.

  • PDF

Successive kings of Chosun period took hot spring-bath to heal their diseases (조선시대(朝鮮時代) 임금들의 온천욕(溫泉浴)과 질병(疾病))

  • Kim, Hoon
    • The Journal of Korean Medical History
    • /
    • v.14 no.1
    • /
    • pp.61-78
    • /
    • 2001
  • Time and places of hot spring-bath were diverse such as at succeeding to the throne, after abdication, during Crown Prince and etc. Generally, average staying time was about 20 days. Beside the healing purpose, hot spring-bath was taken to inspect the people's conditions, to reduce compulsory labor or tax, to carry out "Kwagoh", the old state examination or to console the people.

  • PDF