• Title/Summary/Keyword: solution verification

Search Result 441, Processing Time 0.031 seconds

A Fuel Cell Simulator for Control Logic Verification and Operator Training (제어로직 검증 및 운전원 훈련용 연료전지 시뮬레이터)

  • Maeng, Jwayoung;Kim, Sungho;Jung, Wonhee;Kang, Seungyup;Hong, Sukkyu;Lee, Sekyoung;Yook, Simkyun
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2010.11a
    • /
    • pp.75.1-75.1
    • /
    • 2010
  • This research presents a fuel cell simulator for control logic verification and operator training. Nowadays, power industries are focusing on clean energy as a response to new policy. The fuel cell can be the solution for clean energy, but operating technology is not well developed compared to other conventional power plans because of its short history. Therefore we need a simulator to verify the new control strategy and train operators, because the price of a real fuel cell system is too high and mechanically weak to be used for these kind of purposes. To develop the simulator, a 300 KW MCFC(Molten Carbonate Fuel Cell) system was modeled with stack, BOPs(pre-reformer, steam generator, etc) and mechanical components(valves, pipes, pumps, blowers, etc). The process model was integrated to emulated control system and HMI(Human Machine Interface). A static load and open loop tests were conducted for verifying the accuracy of the process model, since it is the most important part in the simulation. After verifying the process model, an automatic load change and start-up tests were conducted to verify the performance of a new control strategy(logic and functional loops).

  • PDF

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

A New Similarity Measure Based on Intraclass Statistics for Biometric Systems

  • Lee, Kwan-Yong;Park, Hye-Young
    • ETRI Journal
    • /
    • v.25 no.5
    • /
    • pp.401-406
    • /
    • 2003
  • A biometric system determines the identity of a person by measuring physical features that can distinguish that person from others. Since biometric features have many variations and can be easily corrupted by noises and deformations, it is necessary to apply machine learning techniques to treat the data. When applying the conventional machine learning methods in designing a specific biometric system, however, one first runs into the difficulty of collecting sufficient data for each person to be registered to the system. In addition, there can be an almost infinite number of variations of non-registered data. Therefore, it is difficult to analyze and predict the distributional properties of real data that are essential for the system to deal with in practical applications. These difficulties require a new framework of identification and verification that is appropriate and efficient for the specific situations of biometric systems. As a preliminary solution, this paper proposes a simple but theoretically well-defined method based on a statistical test theory. Our computational experiments on real-world data show that the proposed method has potential for coping with the actual difficulties in biometrics.

  • PDF

Verification of Thermal Characteristics and Overturning Moment for Lateral Vibration System (수평가진 시스템의 열 특성 및 모멘트 성능 검증)

  • Eun, Hee-Kwang;Im, Jong-Min;Moon, Sang-Moo;Moon, Nam-Jin;Lee, Dong-Woo;Choi, Seok-Weon
    • Aerospace Engineering and Technology
    • /
    • v.8 no.2
    • /
    • pp.113-121
    • /
    • 2009
  • Shaker system is used to simulate the vibration from the launch environment. The vibration tests are performed in the vertical and lateral direction. For the lateral vibration test, the slip table system is used with shaker system. For the latest large satellite, vibration test adaptor is made of the steel. But slip table of lateral vibration is made of magnesium, so there is big difference of thermal expansion ratio between slip table and vibration test adaptor. This paper encompasses the following items; verification process of thermal characteristics and overturning moment and a solution for lateral vibration test with steel vibration test adaptor.

  • PDF

An Activity Analysis Method for Workflow Visual Verification and Mining (워크플로우 가시적 검증 및 마이닝을 위한 액티비티 분석 방법)

  • Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.133-142
    • /
    • 2008
  • This paper conceives and implements an activity analysis method as a tool to be used for workflow visual verification and mining. One of the recent issues in the workflow and business process literature is to refine and to improve the deployed workflows and business processes. The activity analysis method proposed in this paper provides a way to fine a set of activities being directly affected by the specific activity that a user tries to change its properties. I would strongly believe that the method can be a useful solution for the dynamic changes and visual verifications problems of workflow models as well as the workflow process mining problems. Finally, to prove the possibility of the proposed method and its applicability, we apply to a workflow model of the electronic approval system run by a real corporation.

  • PDF

Dynamic behavior analysis of the high speed EMC(Electric Multiple Unit) (동력분산형 고속철도의 주행성능 해석기술 연구)

  • Yoon, Ji-Won;Park, Tae-Won;Lee, Moon-Gu;Jun, Kab-Jin;Park, Sung-Moon;Kim, Jung-Bum
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1160-1165
    • /
    • 2008
  • The development of a new railway vehicle is under progress through the Next Generation High-Speed Rail Development Project in Korea. Its aim is to develope fundamental technology of the vehicle that can run over 400km/h. The new distributed traction bogie system, 'HEMU'(High-speed Electric Multiple Unit), will be used and is different from previously developed high speed railway vehicles. Previous vehicles adopted push-pull type system, which means one traction-car drives rest of the vehicle. Due to the difference, investigation on dynamic behavior and its safety evaluation are necessary, as a part of verification of the design specification. In this paper, current progresses of researches are presented. And the High-Speed Railway vehicle system is evaluated for a dynamic characteristic simulation. Proper models including air-suspension system, wheel-rail, bogie and car-body will be developed according to the vehicle simulation scenario. International safety standard will be applied for final verification of the system. This research can propose a better solution when test running shows a problem in the parts and elements. Finally, the vehicle that has excellent performance will be developed, promoting academic achievement and technical development.

  • PDF

Re-establishment of Park Nature Conservation Area in Bukhansan (Mt.) National Park Using Marxan with Zones (Marxan with Zones 적용을 통한 북한산국립공원 공원자연보존지구 재설정 방안 연구)

  • Yeum, Jung-Hun;Han, Bong-Ho
    • Journal of Environmental Science International
    • /
    • v.26 no.2
    • /
    • pp.133-146
    • /
    • 2017
  • This study aimed to develop strategies to re-establish the Park Nature Conservation Area in Bukhansan National Park, reflecting landscape ecological value by using the zonation program Marxan with Zones. Planning unit was set by watershed, and the basic data were mapped, considering topographical and ecological values. Mapped indicators were analyzed with the application framework of Marxan with Zones by indexing some indicators. The zones divided into Park Nature Conservation Area (Zone A), Park Nature Environment Area I(Zone B) which is reflected on the concept of Potential Park Nature Conservation Area and Park Nature Environment Area II(Zone C). The best solution for each of the scenarios was fixed through the sensitiveness analysis. From these, the final solution was selected considering five criteria including area ratio of conservation area and grouping. Lastly, the final solution was verified in the overlapped analysis with recent zonation. According to the results, the number of watersheds was 77, with an average area of $1,007,481m^2$. In terms of basic mapping and indexation, the slope index and number of landscape resources for topographical property were average 0.22 and 38 places, respectively. Biotope index was average 0.69 and legally protected species was 14 species, reflecting ecological values. As the social and economic indicators, trail index was average 0.04, and the number of tour and management facilities was 43 places. Through the framework of Marxan with Zones, the best solution for scenario 1 which was set by the highest conservation criteria was selected as the final solution, and the area ratio of Park Nature Conservation Area and grouping was excellent. As the result of overlapped analysis, suggested zonation of the Park Nature Conservation was better than the recent zonation in the area raito (28.3%), biotope grade I(15.4%) and the distribution points (10 places) of legally protected species with verification of proper distribution of conservation features according to the zone.

Optimization of Ingot Mold Design Parameters for Austenite Heat-resistant Steel Through Computational Simulation (전산모사를 통한 오스테나이트계 내열강용 잉곳 몰드 설계 파라미터 최적화)

  • Hwang, SooBeen;Park, JongHwa;Jo, SangHyun;Park, SeongIk;Kim, YunJae;Kim, Donggyu
    • Journal of Korea Foundry Society
    • /
    • v.42 no.1
    • /
    • pp.3-11
    • /
    • 2022
  • In this study, the parameters on the shrinkage defect of HR3C alloy was secured through computer simulation research, and the ingot mold with greater than 85% of sound area was designed and manufactured. Moreover, the optimized coagulation was proposed at design stage through computer simulation and test was performed upon ingot manufactured. After the test, the defect pattern was analyzed through cutting and non-destructive inspection to verify the parameter and ingot mold design. Based on the verification results, shrinkage defect parameters such as Niyama, Feed Efficiency, and Hot Tear Intensity of HR3C Alloys were obtained. In addition, through the secured parameters, a plan for designing ingot mold with a Non-defect area of 85% or more was secured.

Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools (사설 클라우드 환경에서 수집된 VM 데이터의 무결성 입증과 관련 포렌식 도구의 신뢰성 검증)

  • Kim, Deunghwa;Jang, Sanghee;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.223-230
    • /
    • 2013
  • Recently, a large number of corporations are adopting cloud solution in order to reduce IT-related costs. By the way, Digital Trace should have admissibility to be accepted as digital evidence in court, and integrity is one of the factors for admissibility. In this context, this research implemented integrity verification test to VM Data which was collected by well-known private cloud solutions such as Citrix, VMware, and MS Hyper-V. This paper suggests the effective way to verify integrity of VM data collected in private cloud computing environment based on the experiment and introduces the error that EnCase fails to mount VHD (Virtual Hard Disk) files properly.

A Study of Verification Methods for File Carving Tools by Scenario-Based Image Creation (시나리오 기반 이미지 개발을 통한 파일 카빙 도구 검증 방안 연구)

  • Kim, Haeni;Kim, Jaeuk;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.835-845
    • /
    • 2019
  • File Carving is a technique for attempting to recover a file without metadata, such as a formated storage media or a damaged file system, and generally looks for a specific header / footer signature and data structure of the file. However, file carving is faced with the problem of recovering fragmented files for a long time, and it is very important to propose a solution for digital forensics because important files are relatively fragmented. To overcome these limitations, various carving techniques and tools are continuously being developed, and data sets from various researches and institutions are provided for functional verification. However, existing data sets are ineffective in verifying tools because of their limited environmental conditions. Therefore, this paper refers to the importance of fragmented file carving and develops 16 images for carving tool verification based on scenarios. The developed images' carving rate and accuracy of each media is shown through Foremost which is well known as a commercial carving tool.