• 제목/요약/키워드: $T^2$ approach

검색결과 1,227건 처리시간 0.027초

Crack-tip constraint analysis of two collinear cracks under creep condition

  • Jiao, Guang-Chen;Wang, Wei-Zhe;Jiang, Pu-Ning
    • Structural Engineering and Mechanics
    • /
    • 제43권3호
    • /
    • pp.311-320
    • /
    • 2012
  • The higher-order asymptotic C(t) - $A_2(t)$ approach was employed to investigate the crack-tip stress of two collinear cracks in a power-law creeping material under the plane strain conditions. A comprehensive calculation was made of the single crack, collinear crack model with S/a = 0.4 and 0.8, by using the C(t) - $A_2(t)$ approach, HRR-type field and the finite element analysis; the latter two methods were used to check the constraint significance and the calculation accuracy of the C(t) - $A_2(t)$ approach, respectively. With increasing the creep time, the constraint $A_2$ was exponentially increased in the small-scale creep stage, while no discernible dependency of the constraint $A_2$ on the creep time was found at the extensive creep state. In addition, the creep time and the mechanical loads have no distinct influence on accuracy of the results obtained from the higher-order asymptotic C(t) - $A_2(t)$ approach. In comparison with the HRR-type field, the higher-order asymptotic C(t) - $A_2(t)$ solution matches well with the finite element results for the collinear crack model.

CoAP 기반 센서네트워크를 위한 SWoT 서비스 탐색 (SWoT Service Discovery for CoAP-Based Sensor Networks)

  • 유명한;김상경
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제4권9호
    • /
    • pp.331-336
    • /
    • 2015
  • IoT 기반 센서네트워크에서 사용자 또는 센서노드가 원하는 서비스에 접근하기 위해서는 기본적으로 서비스 탐색이 요구된다. 기존의 서비스 탐색 관련 연구는 중앙집중적인 Resource Directory(RD) 서버나 P2P 방식을 이용한다. 그러나 이러한 방식들은 point-of-failure나 서비스 탐색 메시지 플러딩(flooding)을 초래한다. 따라서 본 논문에서는 기존의 CoAP 기반 서비스 탐색 방식에 Social Web of Things(SWoT) 개념을 접목함으로써 기존 방식의 단점을 극복하고 소셜 네트워크 서비스(SNS)를 바탕으로 키워드 기반 탐색과 위치 기반 탐색 등의 기능을 새롭게 추가하여 편의성을 제고하였다. 제안하는 SWoT 서비스 탐색 기술의 검증을 위해 테스트베드를 구축하여 시험하고 평가하였다.

Skeletal stability after 2-jaw surgery via surgery-first approach in facial asymmetry patients using CBCT

  • Hwang, Dae Seok;Seo, Jeong Seok;Choi, Hong Seok
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • 제42권
    • /
    • pp.11.1-11.8
    • /
    • 2020
  • Background: The purpose of this study is to compare the skeletal stability of two-jaw surgery via surgery-first approach with conventional two-jaw surgery in facial asymmetry patients by measuring the skeletal changes after surgery from a three-dimensional analysis. From January 2010 to January 2014, 40 patients with facial asymmetry who underwent two-jaw surgery in Pusan National University Hospital were included in this study. They were classified into experimental group (n = 20) who underwent two-jaw surgery via surgery-first approach and control group (n = 20) who underwent conventional two-jaw surgery. After selection of 24 landmarks and the construction of horizontal and sagittal, coronal reference planes, changes in 10 linear measurements and 2 angular measurements were compared between the surgery-first approach and conventional groups in the preoperative, immediate postoperative, and postoperative periods. The paired t test and Student t test were used for statistical analysis. The mean and standard deviation of the measurement were calculated for the experimental and control groups. Results: The statistical analysis showed that changes in skeletal measurements were similar between the surgery-first approach and conventional groups, according to each period. However, U1-SRP measurement showed statistically significant changes in surgery-first approach groups at postsurgical change (T1 to T2). Also, the mean treatment duration in the treatment group was 15.9 ± 5.48 months whereas that in the control group was 32.9 ± 14.05 months. Conclusion: In facial asymmetry patients, similar results were observed in the postoperative skeletal stability when 2-jaw surgery via surgery-first approach was compared with conventional 2-jaw surgery. However, significant lateral deviation of upper incisor midline was observed. In addition, a shorter average treatment duration was observed. To stabilize the unstable occlusion after surgery, increased wearing of the stent and proactive rubber guidance will be needed.

Improved Statistical Testing of Two-class Microarrays with a Robust Statistical Approach

  • Oh, Hee-Seok;Jang, Dong-Ik;Oh, Seung-Yoon;Kim, Hee-Bal
    • Interdisciplinary Bio Central
    • /
    • 제2권2호
    • /
    • pp.4.1-4.6
    • /
    • 2010
  • The most common type of microarray experiment has a simple design using microarray data obtained from two different groups or conditions. A typical method to identify differentially expressed genes (DEGs) between two conditions is the conventional Student's t-test. The t-test is based on the simple estimation of the population variance for a gene using the sample variance of its expression levels. Although empirical Bayes approach improves on the t-statistic by not giving a high rank to genes only because they have a small sample variance, the basic assumption for this is same as the ordinary t-test which is the equality of variances across experimental groups. The t-test and empirical Bayes approach suffer from low statistical power because of the assumption of normal and unimodal distributions for the microarray data analysis. We propose a method to address these problems that is robust to outliers or skewed data, while maintaining the advantages of the classical t-test or modified t-statistics. The resulting data transformation to fit the normality assumption increases the statistical power for identifying DEGs using these statistics.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

ON A CHARACTERIZATION OF T-FUNCTIONS WITH ONE CYCLE PROPERTY

  • Rhee, Min Surp
    • 충청수학회지
    • /
    • 제21권2호
    • /
    • pp.259-268
    • /
    • 2008
  • To the design of secret key, there are two types of basic approaches called the tame approach and the wild approach. In the tame approach we try to use only simple primitives such as linear feedback shift registers and to prove mathematical theorems about their cryptographic properties. In the wild approach we try to use crazy compositions of operations which mix a variety of domains in a nonlinear and nonalgebraic way. There are several papers which try to bridge this gap by considering semi-wild constructions. A T-function on n-bit words plays an important role in semi-wild constructions. In this paper we study the invertibility and the period of some T-functions. Especially we characterize some polynomials which has a single cycle property.

  • PDF

A locally refinable T-spline finite element method for CAD/CAE integration

  • Uhm, Tae-Kyoung;Kim, Ki-Seung;Seo, Yu-Deok;Youn, Sung-Kie
    • Structural Engineering and Mechanics
    • /
    • 제30권2호
    • /
    • pp.225-245
    • /
    • 2008
  • T-splines are recently proposed mathematical tools for geometric modeling, which are generalizations of B-splines. Local refinement can be performed effectively using T-splines while it is not the case when B-splines or NURBS are used. Using T-splines, patches with unmatched boundaries can be combined easily without special techniques. In the present study, an analysis framework using T-splines is proposed. In this framework, T-splines are used both for description of geometries and for approximation of solution spaces. This analysis framework can be a basis of a CAD/CAE integrated approach. In this approach, CAD models are directly imported as the analysis models without additional finite element modeling. Some numerical examples are presented to illustrate the effectiveness of the current analysis framework.

과학-기술-사회(S-T-S)교육 도입을 위한 시도 (The Attempt to Introduce Science-Technology-Society(S-T-S) Education to Korean Science Education)

  • 하미경
    • 한국과학교육학회지
    • /
    • 제11권2호
    • /
    • pp.79-85
    • /
    • 1991
  • According to the rapid change of the modern society, science & technology influences the society significantly. Thus, Korean education, especially the science education must be reviewed in the terms of that, the purpose of this article is to introduce social, environmental context's science education-STS education. STS education is to arise the ability of the democratic decision-making & participating in a discussion. The areas of this are knowledge, process, creativity, attitude, application. Also there are social issues approach & the social studies of science approach in the STS education. The social issues approach is the predominant approach to STS education; the social studies of science approach is often found in the form of goals & objectives for STS education. In order to introduce STS education to Korean science education,this author suggests the following; 1. The relation between science & society in science education must be emphasized more. 2. The study and development of STS education appropriate for Korean society must be preceded. 3. The new course about STS and technical education in the level of college must be developed.

  • PDF

3진 BCH (Bose - Chaudhuri - Hocquenghem) 코드를 이용하는 스테가노그라피 기법 (Ternary Bose - Chaudhuri - Hocquenghem (BCH) with t = 2 code for steganography)

  • ;최용수
    • 디지털콘텐츠학회 논문지
    • /
    • 제17권6호
    • /
    • pp.461-469
    • /
    • 2016
  • 본 논문에서는 t = 2인 3진 BCH 코드를 기반으로 하는 새로운 스테가노그라피 방법을 제시한다. 제안 된 방법에서는 JPEG 영상으로부터 추출된 DCT 계수들에 데이터 은닉을 하기 위해 t = 2인 강력한 BCH 코드를 사용하였다. 제안하는 데이터 은닉 기술은 삼진 BCH 코드(t=2인 경우)에서 다양한 해결책을 찾기 위한 접근으로 제안된 룩업테이블을 사용하였다. 고안된 룩업 테이블 접근법은 데이터 은닉을 위해 수정이 필요한 DCT 계수들의 위치를 빠르고 효율적으로 연산 가능하게 하였다. 제시된 데이터 은닉 기술은 삼진 BCH 코드를 이용하는 최초의 스테가노그라피 기술이다. 실험 결과를 통해 이진 BCH 코드에 비해 삼진 BCH 코드를 사용하는 것이 우수함을 명확하게 증명하였다.

SINGULAR THIRD-ORDER 3-POINT BOUNDARY VALUE PROBLEMS

  • Palamides, Alex P.
    • Journal of applied mathematics & informatics
    • /
    • 제28권3_4호
    • /
    • pp.697-710
    • /
    • 2010
  • In this paper, we prove existence of infinitely many positive and concave solutions, by means of a simple approach, to $3^{th}$ order three-point singular boundary value problem {$x^{\prime\prime\prime}(t)=\alpha(t)f(t,x(t))$, 0 < t < 1, $x(0)=x'(\eta)=x^{\prime\prime}(1)=0$, (1/2 < $\eta$ < 1). Moreover with respect to multiplicity of solutions, we don't assume any monotonicity on the nonlinearity. We rely on a combination of the analysis of the corresponding vector field on the phase-space along with Knesser's type properties of the solutions funnel and the well-known Krasnosel'ski$\breve{i}$'s fixed point theorem. The later is applied on a new very simple cone K, just on the plane $R^2$. These extensions justify the efficiency of our new approach compared to the commonly used one, where the cone $K\;{\subset}\;C$ ([0, 1], $\mathbb{R}$) and the existence of a positive Green's function is a necessity.