• Title/Summary/Keyword: tracing set

Search Result 88, Processing Time 0.026 seconds

Montecarlo Simulation of the thermal neutron reflectometer with horizontal sample geometry for surface characterization of nanostructured thin films (나노 박막의 표면분석을 위한 열중성자 기반 수평형 반사율 장치의 몬테카를로 시뮬레이션)

  • Lee Chong Oh;Shin Kwanwoo;Lee Jeong Soo;Cho Sang Jin;Lee Chang Hee;So Ji Yong
    • Journal of the Korean Vacuum Society
    • /
    • v.14 no.3
    • /
    • pp.119-125
    • /
    • 2005
  • The horizontal reflectometer, which uses a neutron beam in the reactor, provides scientists a set of unique tools offering destruction-free investigation of biological membranes in the native-like environments in nano-meter scale. As an intial stage for the development of the first Korean neutron reflectometer with a horizontal sample geometry, we performed the instrumental simulation using MCSTAS, Monte Carlo Simulations of Triple Axis Spectrometers for neutron ray-tracing simulation. The results indicated that modeling of the overall instrument geometry based on the thermal neutron source with a wavelength of 2.55 $2.5{\AA}$ at HANARO was successfully performed, and further the optimization of the individual components of the instrument, including the collimator, monochromators, filter and supermirror has been made.

ANALYSIS OF SHORT FACE TENDENCY AND IT'S DETERMINANT FACTORS AFTER BILATERAL SAGITTAL SPLIT RAMUS OSTEOTOMY OF MANDIBULAR PROGNATHISM (하악전돌증 환자의 하악지시상분할골절단술 후 단안모화 경향과 그 결정인자에 대한 분석)

  • Kang, Ji-Yeon;Choi, Hee-Won;Kim, Kyoung-Won
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.29 no.6
    • /
    • pp.407-420
    • /
    • 2003
  • Purpose : The purpose of this study was to analyse the facial changes and factors contributing to then after bilateral sagittal split ramus osteotomy of mandibular prognathism. Materials and Methods : Forty patients with Class III dental and skeletal malocclusion who were treated with bilateral sagittal split ramus osteotomy were reviewed. Frontal and lateral cephalometric radiographs were taken preoperatively, immediate postoperatively and more than six months postoperatively in each patient. After tracing the cephalometric radiographs, various parameters were measured. Results : 1. Gonial angle at postoperative two days was decreased about $10.4^{\circ}$ than preoperatively and gonial angle at postoperative six months was increased about $6.8^{\circ}$ than postoperative two days. So, gonial angle at postoperative six months was decreased about $3.6^{\circ}$ than preoperative gonial angle. 2. Facial height postoperative two days was decreased about 0.8mm than preoperatively and facial height at postoperative six months was decreased about 0.7mm than postoperative two days. So, facial height at postoperative six months was decreased about 1.5mm than preoperative facial height. 3. Mandibular width postoperative two days was decreased about 1.0mm than preoperatively and mandibular width at postoperative six months was increased about 1.8mm than postoperative two days. So, mandibular width at postoperative six months was decreased about 2.8mm than preoperative mandibular width. 4. Amount of set back and mandibular plane angle were not influencing on relapse degree. Conclusion : It is thought that bilateral sagittal split ramus osteotomy in mandibular prognathic patients is effective to improve long face and steep gonial angle. More prudent operation and careful postoperative management is required to maintain stable face postoperatively. Further research for soft tissue changes and factors which are related with relapse is needed.

Start Point Detection Method for Tracing the Injection Path of Steel Rebars (철근 사출 궤적 추적을 위한 시작지점 검출 방법)

  • Lee, Jun-Mock;Kang, Dae-Seong
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.6
    • /
    • pp.9-16
    • /
    • 2019
  • Companies that want to improve their manufacturing processes have recently introduced the smart factory, which is particularly noticeable. The ultimate goal is to maximize the area of the smart factory that performs the process of the production facility completely with minimal manual control and to minimize errors of reasoning. This research is a part of a project for unmanned production, management, packaging, and delivery management and the detection of the start point of rebars to perform the automatic calibration of the rollers through the tracking of the automated facilities of unmanned production. It must meet the requirement to accurately track the position from the start point to the end point. In order to improve the tracking performance, it is important to set the accurate start point. However, the probability of tracking errors is high depending on environments such as illumination and dust through the conventional time-based detection method. In this paper, we propose a starting point detection method using the average brightness change of high speed IR camera to reduce the errors according to the environments, As a result, its performance is improved by more than 15%.

Corrosion of Containment Alloys in Molten Salt Reactors and the Prospect of Online Monitoring

  • Hartmann, Thomas;Paviet, Patricia
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.20 no.1
    • /
    • pp.43-63
    • /
    • 2022
  • The aim of this review is to communicate some essential knowledge of the underlying mechanism of the corrosion of structural containment alloys during molten salt reactor operation in the context of prospective online monitoring in future MSR installations. The formation of metal halide species and the progression of their concentration in the molten salt do reflect containment corrosion, tracing the depletion of alloying metals at the alloy salt interface will assure safe conditions during reactor operation. Even though the progress of alloying metal halides concentrations in the molten salt do strongly understate actual corrosion rates, their prospective 1st order kinetics followed by near-linearly increase is attributed to homogeneous matrix corrosion. The service life of the structural containment alloy is derived from homogeneous matrix corrosion and near-surface void formation but less so from intergranular cracking (IGC) and pitting corrosion. Online monitoring of corrosion species is of particular interest for molten chloride systems since besides the expected formation of chromium chloride species CrCl2 and CrCl3, other metal chloride species such as FeCl2, FeCl3, MoCl2, MnCl2 and NiCl2 will form, depending on the selected structural alloy. The metal chloride concentrations should follow, after an incubation period of about 10,000 hours, a linear projection with a positive slope and a steady increase of < 1 ppm per day. During the incubation period, metal concentration show 1st order kinetics and increasing linearly with time1/2. Ideally, a linear increase reflects homogeneous matrix corrosion, while a sharp increase in the metal chloride concentration could set a warning flag for potential material failure within the projected service life, e.g. as result of intergranular cracking or pitting corrosion. Continuous monitoring of metal chloride concentrations can therefore provide direct information about the mechanism of the ongoing corrosion scenario and offer valuable information for a timely warning of prospective material failure.

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

Analysis on the National R&D Portfolio of Food Safety in Korea from 2008 to 2010 (최근 3년(2008-2010)간 식품안전 분야 국가연구개발사업 운영 현황 분석)

  • Kwak, No-Seong;Jeong, Jiwon;Lee, Jong-Kyung
    • Journal of Food Hygiene and Safety
    • /
    • v.28 no.2
    • /
    • pp.115-123
    • /
    • 2013
  • Food safety management should be based on scientific evidences. FAO and WHO presented risk analysis as one of four principles in food safety management. WTO also admits the self safety regulation only when it is made on the basis of risk assessment. Without scientific analysis, tracing and eliminating the cause of food poisoning is impossible. Research and development plays a key role to produce scientific evidences. The Korean government ran over 40 programs in 11 agencies from 2008 to 2010. However, there is no statistics on food safety R&D at present. In this research, food safety projects conducted from 2008 to 2010 are listed up by means of analysing National Science and Technology Information Service (NTIS). The analytical criteria are the name of programs, national standard classification of science and technology, and keywords. As result, Korea Food and Drug Administration, Ministry for Food, Agriculture, Forestry and Fisheries, and Rural Development Administration play major role in the food safety R&D. The portion of more than one year projects should rise up in order to achieve the data for risk assessment, which is strongly required to improve. Besides, the research should be deeper so as to publish more SCI papers. The R&D portfolio should be changed in direction to raise up the portion of biological hazards such as norovirus. In order to do so, a large number of food safety programs should be emerged. The categories of food safety management and the hygiene/quality management of the agricultural and livestock products in the national standard classification of science and technology should be emerged because they are set up reflecting agencies' interests in spite of few differences between them.

Technology to create a 360-degree panorama of a square room using a single projector and a hemispherical mirror (1대의 프로젝터와 반구형 반사경을 이용한 사각방 360도 파노라마 생성 기법)

  • Lee, Jung-jik;Park, Yoen-yong;Lee, Yun-sang;Lee, Jun-yuep;Jung, Eun-yeong;Yu, Rim;Kang, Myongjin;Jung, Moon-ryul
    • Journal of the Korea Computer Graphics Society
    • /
    • v.26 no.3
    • /
    • pp.133-142
    • /
    • 2020
  • In this research, we describe the method of implementing a 360-degree panorama using one projector, in terms of hardware and in the production of projected pre-distortion images. We propose a method of installing a projector and a reflector on the central ceiling of the space to minimize the shadows generated based on the position of the spectators. We used a virtual camera and virtual space where the projector and hemisphere positions were set to the same as in the exhibition space in Unity. After the image projected on the screen was mapped on the wall of the virtual space, the pre-distortion image was created by the method of capturing from the virtual camera using the ray tracing technique. When the produced pre-distortion image is hemispherical reflected and projected by the projector installed at the same position as the virtual camera, the image is reflected and projected 360 degrees on the panoramic screen.

Change Acceptable In-Depth Searching in LOD Cloud for Efficient Knowledge Expansion (효과적인 지식확장을 위한 LOD 클라우드에서의 변화수용적 심층검색)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.171-193
    • /
    • 2018
  • LOD(Linked Open Data) cloud is a practical implementation of semantic web. We suggested a new method that provides identity links conveniently in LOD cloud. It also allows changes in LOD to be reflected to searching results without any omissions. LOD provides detail descriptions of entities to public in RDF triple form. RDF triple is composed of subject, predicates, and objects and presents detail description for an entity. Links in LOD cloud, named identity links, are realized by asserting entities of different RDF triples to be identical. Currently, the identity link is provided with creating a link triple explicitly in which associates its subject and object with source and target entities. Link triples are appended to LOD. With identity links, a knowledge achieves from an LOD can be expanded with different knowledge from different LODs. The goal of LOD cloud is providing opportunity of knowledge expansion to users. Appending link triples to LOD, however, has serious difficulties in discovering identity links between entities one by one notwithstanding the enormous scale of LOD. Newly added entities cannot be reflected to searching results until identity links heading for them are serialized and published to LOD cloud. Instead of creating enormous identity links, we propose LOD to prepare its own link policy. The link policy specifies a set of target LODs to link and constraints necessary to discover identity links to entities on target LODs. On searching, it becomes possible to access newly added entities and reflect them to searching results without any omissions by referencing the link policies. Link policy specifies a set of predicate pairs for discovering identity between associated entities in source and target LODs. For the link policy specification, we have suggested a set of vocabularies that conform to RDFS and OWL. Identity between entities is evaluated in accordance with a similarity of the source and the target entities' objects which have been associated with the predicates' pair in the link policy. We implemented a system "Change Acceptable In-Depth Searching System(CAIDS)". With CAIDS, user's searching request starts from depth_0 LOD, i.e. surface searching. Referencing the link policies of LODs, CAIDS proceeds in-depth searching, next LODs of next depths. To supplement identity links derived from the link policies, CAIDS uses explicit link triples as well. Following the identity links, CAIDS's in-depth searching progresses. Content of an entity obtained from depth_0 LOD expands with the contents of entities of other LODs which have been discovered to be identical to depth_0 LOD entity. Expanding content of depth_0 LOD entity without user's cognition of such other LODs is the implementation of knowledge expansion. It is the goal of LOD cloud. The more identity links in LOD cloud, the wider content expansions in LOD cloud. We have suggested a new way to create identity links abundantly and supply them to LOD cloud. Experiments on CAIDS performed against DBpedia LODs of Korea, France, Italy, Spain, and Portugal. They present that CAIDS provides appropriate expansion ratio and inclusion ratio as long as degree of similarity between source and target objects is 0.8 ~ 0.9. Expansion ratio, for each depth, depicts the ratio of the entities discovered at the depth to the entities of depth_0 LOD. For each depth, inclusion ratio illustrates the ratio of the entities discovered only with explicit links to the entities discovered only with link policies. In cases of similarity degrees with under 0.8, expansion becomes excessive and thus contents become distorted. Similarity degree of 0.8 ~ 0.9 provides appropriate amount of RDF triples searched as well. Experiments have evaluated confidence degree of contents which have been expanded in accordance with in-depth searching. Confidence degree of content is directly coupled with identity ratio of an entity, which means the degree of identity to the entity of depth_0 LOD. Identity ratio of an entity is obtained by multiplying source LOD's confidence and source entity's identity ratio. By tracing the identity links in advance, LOD's confidence is evaluated in accordance with the amount of identity links incoming to the entities in the LOD. While evaluating the identity ratio, concept of identity agreement, which means that multiple identity links head to a common entity, has been considered. With the identity agreement concept, experimental results present that identity ratio decreases as depth deepens, but rebounds as the depth deepens more. For each entity, as the number of identity links increases, identity ratio rebounds early and reaches at 1 finally. We found out that more than 8 identity links for each entity would lead users to give their confidence to the contents expanded. Link policy based in-depth searching method, we proposed, is expected to contribute to abundant identity links provisions to LOD cloud.