• Title/Summary/Keyword: open technique

Search Result 1,388, Processing Time 0.042 seconds

Effect of Opening Partition Length on Helium-Air Exchange Flow (개구부 삽입부의 길이가 헬륨 및 공기의 치환류에 미치는 영향)

  • 강태일
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.23 no.2
    • /
    • pp.192-200
    • /
    • 1999
  • This paper describes experimental investigations of helium-air exchange flow through parti-tioned opening. Such exchange flow may occur following rupture accident of stand pipe in high temperature gas cooled reactor. A test vessel with a opening on top of test cylinder is used for experiments. An estimation method of mass increment is developed and applied to measure the exchange flow rate. A technique of flow visualization by Mach-Zehnder interferometer is provided to recognize the exchange flows. Flow measurements are made with partitioned opening for parti-tion rations $H_p/H_1$ in the range 0 to 1 where $H_p$ and $H_1$ are partition length and height of the open-ing respecticely. In the case of $H_p/H_1$ of 0 flow passages of upward flow of the helium and down-ward flow of the air within the opening are unseparated (bidirectional) and the two flows interact exchange flow rate is minimum through range of the partition ratios, Two flow zones i.e. separat-ed(unidirectional)flow zone and unseparated(bidirectional) flow zone exist with increasing the partition. length, The exchange flow rate increases with increasing the separated flow zone. It is found that a maximum exchange flow rate exists at $H_p/H_1$ of 1. As a result fo comparison of the exchange flow rates by changing the partition ration the fluids interaction in the unseparated zone is found to be an important factor on the helium-air exchange flow rate.

  • PDF

A Study on Filament Winding Tension Control using a fuzzy-PID Algorithm (퍼지-PID 알고리즘을 이용한 필라멘트 와인딩 장력제어에 관한 연구)

  • 이승호;이용재;오재윤
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.21 no.3
    • /
    • pp.30-37
    • /
    • 2004
  • This thesis develops a fuzzy-PID control algorithm for control the filament winding tension. It is developed by applying classical PID control technique to a fuzzy logic controller. It is composed of a fuzzy-PI controller and a fuzzy-D controller. The fuzzy-PI controller uses error and integrated error as inputs, and the fuzzy-D controller uses derivative of error as input. The fuzzy-PI controller uses Takagi-Sugeno fuzzy inference system, and the fuzzy-D controller uses Mamdani fuzzy inference system. The fuzzy rule base for the fuzzy-PI controller is designed using 19 rules, and the fuzzy rule base for the fuzzy-D controller is designed using 5 rules. A test-bed is set-up for verifying the effectiveness of the developing control algorithm in control the filament winding tension. It is composed of a mandrel, a carriage, a force sensor, a driving roller, nip rollers, a creel, and a real-time control system. Nip rollers apply a vertical force to a filament, and the driving roller drives it. The real-time control system is developed by using MATLAB/xPC Target. First, experiments for showing the inherent problems of an open-loop control scheme in a filament winding are performed. Then, experiments for showing the robustness of the developing fuzzy-PID control algorithm are performed under various working conditions occurring in a filament winding such as mandrel rotating speed change, carriage traversing, spool radius change, and reference input change.

A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

  • Barakat, Tamer Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3231-3249
    • /
    • 2014
  • Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the real message. Sender - side deniable encryption scheme is considered to be one of the classification of deniable encryption technique which defined as resilient against coercing the sender. M. H. Ibrahim presented a sender - side deniable encryption scheme which based on public key and uncertainty of Jacobi Symbol [6]. This scheme has several problems; (1) it can't be able to derive the fake message $M_f$ that belongs to a valid message set, (2) it is not secure against Quadratic Residue Problem (QRP), and (3) the decryption process is very slow because it is based dramatically on square root computation until reach the message as a Quadratic Non Residue (QNR). The first problem is solved by J. Howlader and S. Basu's scheme [7]; they presented a sender side encryption scheme that allows the sender to present a fake message $M_f$ from a valid message set, but it still suffers from the last two mentioned problems. In this paper we present a new sender-side deniable public-key encryption scheme with fast decryption by which the sender is able to lie about the encrypted message to a coercer and hence escape coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which, when verified, gives the same ciphertext as the true message. Compared with both Ibrahim's scheme and J. Howlader and S. Basu's scheme, our scheme enjoys nice two features which solved the mentioned problems: (1) It is semantically secure against Quadratic Residue Problem; (2) It is as fast, in the decryption process, as other schemes. Finally, applying the proposed deniable encryption, we originally give a coercion resistant internet voting model without physical assumptions.

A Study on Satisfaction with Makeup-kits and Makeup-kit Brand Development -Focused on Lifelong Education Centers of Colleges-

  • Kim, EunSil;Chung, Ju-Im
    • Journal of Fashion Business
    • /
    • v.19 no.3
    • /
    • pp.31-42
    • /
    • 2015
  • The purpose of this study is to develop a new makeup-kit brand for education, analyzing customer satisfaction of makeup-kits used in makeup lessons provided by lifelong education centers of colleges. The research method is as follows. In order to understand the current status of the kits used in makeup lessons offered by lifelong education centers of colleges in South Korea, the study conducted a survey from October 10 of 2014 to October 31 via fax, telephone and e-mail targeting these 98 colleges that were open makeup-courses available in October 2014. As for an analysis technique, the study used a frequency analysis. In order to develop a makeup-kit brand, the study investigated these makeup-kits as well and presented a BI draft and a makeup-kit design that the study had created for itself using Photoshop CS6 and Illustrator CS4. According to findings of the survey, the students were not satisfied with kits that had too many items, were high in price and had poor case design. In the light of that, the study conducted to develop a low to middle priced makeup-kit ranging from 110,000 KRW and 150,000 KRW with approximately 26 items. In terms of a case design, black was a dominant color which would make the case feel simple and modern. Dimensions of a small size makeup-kit container were 22cm*35cm*37cm with a sponge and rubber pad proposed as product ideas. The study also worked on a BI design.

Image Identifier based on Local Feature's Histogram and Acceleration Technique using GPU (지역 특징 히스토그램 기반 영상식별자와 GPU 가속화)

  • Jeon, Hyeok-June;Seo, Yong-Seok;Hwang, Chi-Jung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.9
    • /
    • pp.889-897
    • /
    • 2010
  • Recently, a cutting-edge large-scale image database system has demanded these attributes: search with alarming speed, performs with high accuracy, archives efficiently and much more. An image identifier (descriptor) is for measuring the similarity of two images which plays an important role in this system. The extraction method of an image identifier can be roughly classified into two methods: a local and global method. In this paper, the proposed image identifier, LFH(Local Feature's Histogram), is obtained by a histogram of robust and distinctive local descriptors (features) constrained by a district sub-division of a local region. Furthermore, LFH has not only the properties of a local and global descriptor, but also can perform calculations at a magnificent clip to determine distance with pinpoint accuracy. Additionally, we suggested a way to extract LFH via GPU (OpenGL and GLSL). In this experiment, we have compared the LFH with SIFT (local method) and EHD (global method) via storage capacity, extraction and retrieval time along with accuracy.

Transmission Line using Microstrip-Slotline Transition Technology and Its Application to Power Divider (마이크로스트립과 슬롯라인 천이기술을 이용한 전송선로 구현과 전력 분배기에 응용)

  • Kim, Young;Sim, Seok-Hyun;Yoon, Young-Chul
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.687-692
    • /
    • 2013
  • This paper presents a compact power divider using microstrip-slotline transition technology. By using the microstrip-slotline transition, the ${\lambda}/4$ transmission lines of the divider can be changed to two ${\lambda}/8$ transmission lines in the multilayer structure. In the microstrip-slotline transition, we have used via holes to make a short circuit at the microstrip line and embedded spiral configuration stubs to reduce the electrical length of an open circuit at the slotline end point. For validating the microstrip-slotline technique, we have simulated and implemented the power divider with embedded spiral and via hole configuration circuits at a frequency of 2 GHz. Good agreement between the simulation and the measurement results is obtained at the operating frequency.

A System of Mobile Device Information Processing (모바일 단말 정보 처리 시스템)

  • Bang, Jin-Suk;Lee, Seung-Yun;Lee, Kang-Chan;Lee, Won-Suk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2135-2142
    • /
    • 2007
  • Mobile device will be able to use the various contents from the advancement of the wireless Internet and mobile device manufacture technique. Each devices is HTTP headers about under using provides device information to contents provider in the provide the contents. However, There is no standard for device information provided, so interoperability problems, because external contents using mobile phone companies to provide the device information in a different way. International Organization for Standard OMA UAProf about under using it solved interoperability problems from outside. However, in using the UAProf can not provide for the complete device information, because MMS support information, smart card support, information and support for external storage is not specified. Thus, In this paper, we designed UAProf in base which provides the contents which has become optimize to the mobile device of domestic environment the mobile device description language which expresses device information which is necessar, and it used to design and implementation of the Contents Adaptation System.

Development of Technique for Real-time measurement of Water Elevation based on Open-source Hardware and Webservice (오픈소스 하드웨어와 웹서비스 기반 실시간 수위 관측기술 개발)

  • You, Ho Jun;Kim, Dong Su
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.64-64
    • /
    • 2018
  • 하천에서 수위는 가장 기본적인 수리 수문학적 자료로서, 홍수나 가뭄 등의 피해를 막기 위한 치수와 물을 잘 통하게 하거나 물을 이용하기 위한 이수에 주로 사용된다. 예를 들면, 댐, 보, 저수지 등의 하천시설물 설계 및 관리를 위해 수위를 이용하며, 유량 산정을 위해서 수위-유량 관계 곡선식을 구축하여 수위를 이용한다. 따라서 하천에서 수위는 현재 국내에서 수자원분야에서 사용되는 자료 중에서 가장 중요하며, 동시에 광범위하게 사용되고 있으므로 수위를 관측하는 것이 수자원의 기초라 할 수 있다. 수위 관측의 필요성과 확장 필요성에 대한 인식에도 불구하고, 국내의 수위 관측소는 한강, 낙동강, 금강 등 대하천 위주로 설치되어 있어, 중소규모 하천에서 발생하는 다양한 수문사상에 대한 분석 및 예측이 어려운 실정이다. 특히, 홍수의 경우 같은 강우 사상에도 대하천보다는 중소규모의 하천이 더 극단적으로 유출이 발생하기 때문에, 즉각적인 수위의 계측이 필요한 실정이다. 하지만 한정된 예산 및 인프라의 부족은 중소규모 하천에 대한 수위 관측 시스템의 적용이 대하천에 비해 그 우선수위가 밀리는 원인이 되고 있으며, 지속적으로 중소규모 하천에 대한 수위 관측시스템 적용에 대한 수요가 증가를 야기 시키고 있다. 최근, 과거에 제품을 만들기 위한 전자회로, 자재명세서, 기판도면 등의 정보를 공개하지 않는 폐쇄적인 환경을 벗어나 제품을 만들기 위한 하드웨어 정보를 공개하고, 공개된 정보를 통해 기술을 개발하기 위한 움직임이 활발하다. 이러한 개념을 오픈소스 하드웨어라는 개념으로서, 하드웨어의 제작 없이 간단한 코딩을 통해 하드웨어를 컨트롤 하는 기술이다. 즉, 오픈소스 하드웨어는 초소형화된 PC를 활용하여 센서를 작동하는 것이라 할 수 있다. 이를 통해 기존의 기술을 저렴한 가격으로 제품으로 생산할 수 있다. 또한 사물인터넷(IOT)를 활용하여 온라인 상에서 이러한 오픈소스 하드웨어를 컨트롤 할 수 있으며, 웹서비스와 결합할 경우 센서를 통해 수집된 결과를 인터넷 상에서 확인 할 수 있는 기술들이 지속적으로 개발하고 있다. 이러한 기술이 접목되면 과거에 비해 적은 비용으로 고효율의 자료 수집을 수행 할 수 있다. 본 연구에서는 지속적으로 증가하고 있는 중소규모 하천에 대한 수위 관측시스템 적용에 대한 수요를 해결하기 위해서 기존의 시스템이 가지고 있는 경제적, 기술적 한계를 극복하기 위하여 오픈소스 하드웨어 플랫폼인 아두이노와 사물인터넷 기반 기술을 활용하기 위한 웹서비스를 이용하여 실시간 수위 관측기술을 개발하고, 적용성을 검토하고자 한다.

  • PDF

Automated Vision-based Construction Object Detection Using Active Learning (액티브 러닝을 활용한 영상기반 건설현장 물체 자동 인식 프레임워크)

  • Kim, Jinwoo;Chi, Seokho;Seo, JoonOh
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.5
    • /
    • pp.631-636
    • /
    • 2019
  • Over the last decade, many researchers have investigated a number of vision-based construction object detection algorithms for the purpose of construction site monitoring. However, previous methods require the ground truth labeling, which is a process of manually marking types and locations of target objects from training image data, and thus a large amount of time and effort is being wasted. To address this drawback, this paper proposes a vision-based construction object detection framework that employs an active learning technique while reducing manual labeling efforts. For the validation, the research team performed experiments using an open construction benchmark dataset. The results showed that the method was able to successfully detect construction objects that have various visual characteristics, and also indicated that it is possible to develop the high performance of an object detection model using smaller amount of training data and less iterative training steps compared to the previous approaches. The findings of this study can be used to reduce the manual labeling processes and minimize the time and costs required to build a training database.

Measurement of rivulet movement and thickness on inclined cable using videogrammetry

  • Jing, Haiquan;Xia, Yong;Xu, Youlin;Li, Yongle
    • Smart Structures and Systems
    • /
    • v.18 no.3
    • /
    • pp.485-500
    • /
    • 2016
  • Stay cables in some cable-stayed bridges suffer large amplitude vibrations under the simultaneous occurrence of rain and wind. This phenomenon is called rain-wind-induced vibration (RWIV). The upper rivulet oscillating circumferentially on the inclined cable surface plays an important role in this phenomenon. However, its small size and high sensitivity to wind flow make measuring rivulet size and its movement challenging. Moreover, the distribution of the rivulet along the entire cable has not been measured. This paper applies the videogrammetric technique to measure the movement and geometry dimension of the upper rivulet along the entire cable during RWIV. A cable model is tested in an open-jet wind tunnel with artificial rain. RWIV is successfully reproduced. Only one digital video camera is employed and installed on the cable during the experiment. The camera records video clips of the upper rivulet and cable movements. The video clips are then transferred into a series of images, from which the positions of the cable and the upper rivulet at each time instant are identified by image processing. The thickness of the upper rivulet is also estimated. The oscillation amplitude, equilibrium position, and dominant frequency of the rivulet are presented. The relationship between cable and rivulet variations is also investigated. Results demonstrate that this non-contact, non-intrusive measurement method has good resolution and is cost effective.