• Title/Summary/Keyword: $T^2$ approach

Search Result 1,227, Processing Time 0.033 seconds

Crack-tip constraint analysis of two collinear cracks under creep condition

  • Jiao, Guang-Chen;Wang, Wei-Zhe;Jiang, Pu-Ning
    • Structural Engineering and Mechanics
    • /
    • v.43 no.3
    • /
    • pp.311-320
    • /
    • 2012
  • The higher-order asymptotic C(t) - $A_2(t)$ approach was employed to investigate the crack-tip stress of two collinear cracks in a power-law creeping material under the plane strain conditions. A comprehensive calculation was made of the single crack, collinear crack model with S/a = 0.4 and 0.8, by using the C(t) - $A_2(t)$ approach, HRR-type field and the finite element analysis; the latter two methods were used to check the constraint significance and the calculation accuracy of the C(t) - $A_2(t)$ approach, respectively. With increasing the creep time, the constraint $A_2$ was exponentially increased in the small-scale creep stage, while no discernible dependency of the constraint $A_2$ on the creep time was found at the extensive creep state. In addition, the creep time and the mechanical loads have no distinct influence on accuracy of the results obtained from the higher-order asymptotic C(t) - $A_2(t)$ approach. In comparison with the HRR-type field, the higher-order asymptotic C(t) - $A_2(t)$ solution matches well with the finite element results for the collinear crack model.

SWoT Service Discovery for CoAP-Based Sensor Networks (CoAP 기반 센서네트워크를 위한 SWoT 서비스 탐색)

  • Yu, Myung-han;Kim, Sangkyung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.331-336
    • /
    • 2015
  • On the IoT-based sensor networks, users or sensor nodes must perform a Service Discovery (SD) procedure before access to the wanted service. Current approach uses a center-concentrated Resource Directory (RD) servers or P2P technique, but these can cause a point-of-failure or flooding of SD messages. In this paper, we proposes an improved SWoT SD approach for CoAP-based sensor networks, which integrates Social Web of Things (SWoT) concept to current CoAP-based SD approach that makes up for weak points of existing systems. This new approach can perform a function like a keyword or location-based search originated from SNS, which can enhances the usability. Finally, we implemented a real system to evaluate.

Skeletal stability after 2-jaw surgery via surgery-first approach in facial asymmetry patients using CBCT

  • Hwang, Dae Seok;Seo, Jeong Seok;Choi, Hong Seok
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.42
    • /
    • pp.11.1-11.8
    • /
    • 2020
  • Background: The purpose of this study is to compare the skeletal stability of two-jaw surgery via surgery-first approach with conventional two-jaw surgery in facial asymmetry patients by measuring the skeletal changes after surgery from a three-dimensional analysis. From January 2010 to January 2014, 40 patients with facial asymmetry who underwent two-jaw surgery in Pusan National University Hospital were included in this study. They were classified into experimental group (n = 20) who underwent two-jaw surgery via surgery-first approach and control group (n = 20) who underwent conventional two-jaw surgery. After selection of 24 landmarks and the construction of horizontal and sagittal, coronal reference planes, changes in 10 linear measurements and 2 angular measurements were compared between the surgery-first approach and conventional groups in the preoperative, immediate postoperative, and postoperative periods. The paired t test and Student t test were used for statistical analysis. The mean and standard deviation of the measurement were calculated for the experimental and control groups. Results: The statistical analysis showed that changes in skeletal measurements were similar between the surgery-first approach and conventional groups, according to each period. However, U1-SRP measurement showed statistically significant changes in surgery-first approach groups at postsurgical change (T1 to T2). Also, the mean treatment duration in the treatment group was 15.9 ± 5.48 months whereas that in the control group was 32.9 ± 14.05 months. Conclusion: In facial asymmetry patients, similar results were observed in the postoperative skeletal stability when 2-jaw surgery via surgery-first approach was compared with conventional 2-jaw surgery. However, significant lateral deviation of upper incisor midline was observed. In addition, a shorter average treatment duration was observed. To stabilize the unstable occlusion after surgery, increased wearing of the stent and proactive rubber guidance will be needed.

Improved Statistical Testing of Two-class Microarrays with a Robust Statistical Approach

  • Oh, Hee-Seok;Jang, Dong-Ik;Oh, Seung-Yoon;Kim, Hee-Bal
    • Interdisciplinary Bio Central
    • /
    • v.2 no.2
    • /
    • pp.4.1-4.6
    • /
    • 2010
  • The most common type of microarray experiment has a simple design using microarray data obtained from two different groups or conditions. A typical method to identify differentially expressed genes (DEGs) between two conditions is the conventional Student's t-test. The t-test is based on the simple estimation of the population variance for a gene using the sample variance of its expression levels. Although empirical Bayes approach improves on the t-statistic by not giving a high rank to genes only because they have a small sample variance, the basic assumption for this is same as the ordinary t-test which is the equality of variances across experimental groups. The t-test and empirical Bayes approach suffer from low statistical power because of the assumption of normal and unimodal distributions for the microarray data analysis. We propose a method to address these problems that is robust to outliers or skewed data, while maintaining the advantages of the classical t-test or modified t-statistics. The resulting data transformation to fit the normality assumption increases the statistical power for identifying DEGs using these statistics.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

ON A CHARACTERIZATION OF T-FUNCTIONS WITH ONE CYCLE PROPERTY

  • Rhee, Min Surp
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.21 no.2
    • /
    • pp.259-268
    • /
    • 2008
  • To the design of secret key, there are two types of basic approaches called the tame approach and the wild approach. In the tame approach we try to use only simple primitives such as linear feedback shift registers and to prove mathematical theorems about their cryptographic properties. In the wild approach we try to use crazy compositions of operations which mix a variety of domains in a nonlinear and nonalgebraic way. There are several papers which try to bridge this gap by considering semi-wild constructions. A T-function on n-bit words plays an important role in semi-wild constructions. In this paper we study the invertibility and the period of some T-functions. Especially we characterize some polynomials which has a single cycle property.

  • PDF

A locally refinable T-spline finite element method for CAD/CAE integration

  • Uhm, Tae-Kyoung;Kim, Ki-Seung;Seo, Yu-Deok;Youn, Sung-Kie
    • Structural Engineering and Mechanics
    • /
    • v.30 no.2
    • /
    • pp.225-245
    • /
    • 2008
  • T-splines are recently proposed mathematical tools for geometric modeling, which are generalizations of B-splines. Local refinement can be performed effectively using T-splines while it is not the case when B-splines or NURBS are used. Using T-splines, patches with unmatched boundaries can be combined easily without special techniques. In the present study, an analysis framework using T-splines is proposed. In this framework, T-splines are used both for description of geometries and for approximation of solution spaces. This analysis framework can be a basis of a CAD/CAE integrated approach. In this approach, CAD models are directly imported as the analysis models without additional finite element modeling. Some numerical examples are presented to illustrate the effectiveness of the current analysis framework.

The Attempt to Introduce Science-Technology-Society(S-T-S) Education to Korean Science Education (과학-기술-사회(S-T-S)교육 도입을 위한 시도)

  • Ha, Mi-Kyung
    • Journal of The Korean Association For Science Education
    • /
    • v.11 no.2
    • /
    • pp.79-85
    • /
    • 1991
  • According to the rapid change of the modern society, science & technology influences the society significantly. Thus, Korean education, especially the science education must be reviewed in the terms of that, the purpose of this article is to introduce social, environmental context's science education-STS education. STS education is to arise the ability of the democratic decision-making & participating in a discussion. The areas of this are knowledge, process, creativity, attitude, application. Also there are social issues approach & the social studies of science approach in the STS education. The social issues approach is the predominant approach to STS education; the social studies of science approach is often found in the form of goals & objectives for STS education. In order to introduce STS education to Korean science education,this author suggests the following; 1. The relation between science & society in science education must be emphasized more. 2. The study and development of STS education appropriate for Korean society must be preceded. 3. The new course about STS and technical education in the level of college must be developed.

  • PDF

Ternary Bose - Chaudhuri - Hocquenghem (BCH) with t = 2 code for steganography (3진 BCH (Bose - Chaudhuri - Hocquenghem) 코드를 이용하는 스테가노그라피 기법)

  • Sachnev, Vasily;Choi, Yong Soo
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.461-469
    • /
    • 2016
  • A novel steganography based on ternary BCH code with t = 2 is presented in this paper. Proposed method utilizes powerful BCH code with t = 2 for data hiding to the DCT coefficients from JPEG images. The presented data hiding technique uses a proposed look up table approach for searching multiple solutions for ternary BCH code with t = 2. The proposed look up table approach enables fast and efficient search for locations of DCT coefficients, which are necessary to modify for hiding data. Presented data hiding technique is the first steganography technique based on ternary BCH code. Experimental results clearly indicate advantages of using ternary BCH compared to binary BCH.

SINGULAR THIRD-ORDER 3-POINT BOUNDARY VALUE PROBLEMS

  • Palamides, Alex P.
    • Journal of applied mathematics & informatics
    • /
    • v.28 no.3_4
    • /
    • pp.697-710
    • /
    • 2010
  • In this paper, we prove existence of infinitely many positive and concave solutions, by means of a simple approach, to $3^{th}$ order three-point singular boundary value problem {$x^{\prime\prime\prime}(t)=\alpha(t)f(t,x(t))$, 0 < t < 1, $x(0)=x'(\eta)=x^{\prime\prime}(1)=0$, (1/2 < $\eta$ < 1). Moreover with respect to multiplicity of solutions, we don't assume any monotonicity on the nonlinearity. We rely on a combination of the analysis of the corresponding vector field on the phase-space along with Knesser's type properties of the solutions funnel and the well-known Krasnosel'ski$\breve{i}$'s fixed point theorem. The later is applied on a new very simple cone K, just on the plane $R^2$. These extensions justify the efficiency of our new approach compared to the commonly used one, where the cone $K\;{\subset}\;C$ ([0, 1], $\mathbb{R}$) and the existence of a positive Green's function is a necessity.