• Title/Summary/Keyword: 다이어그램 특징

Search Result 34, Processing Time 0.019 seconds

Sensitivity Analysis for Unit Module Development of Hybrid tube Structural System (복합 튜브 구조시스템의 단위 모듈 개발에 대한 민감도 해석)

  • Lee, Yeon-Jong;Park, Sung-Soo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.1
    • /
    • pp.167-175
    • /
    • 2018
  • This research deals, The characteristics of mechanics and behavior of the tube structural systems, It has been investigated and considered conventional theory and case models, It has shown the suitability, The best location, And optimal shape of the unit module system, Considered variables materials of stiffness increase and decrease in hybrid tube structural systems this study carried out adapting analysis of statistical concepts. In a concrete way, This study exams the effect of reducing horizontal displacement and the shear lag phenomenon, Also, The purpose of this study is to utilize the basic data on the design and study of future high-rise hybrid structural system using this research. As a result, The framed- tube structural system does not effectively cope with horizontal behavior of high-rise buildings, The results of using varying material tested resistance factors and lateral loads in hybrid tube structural system, When each material is compared Bracing material is identified as a key factor in lateral behavior. In a ratio of material quantity framed-tube structural system, The level of sensitivity affecting the horizontal displacement is greater then the beam's column, In case of braced tube structural system, Braced appeared to be most sensitive in comparison of material quantity ratio in columns and beams.

Visual Representation of Temporal Properties in Formal Specification and Analysis using a Spatial Process Algebra (공간 프로세스 대수를 이용한 정형 명세와 분석에서의 시간속성의 시각화)

  • On, Jin-Ho;Choi, Jung-Rhan;Lee, Moon-Kun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.339-352
    • /
    • 2009
  • There are a number of formal methods for distributed real-time systems in ubiquitous computing to analyze and verify the behavioral, temporal and the spatial properties of the systems. However most of the methods reveal structural and fundamental limitations of complexity due to mixture of spatial and behavioral representations. Further temporal specification makes the complexity more complicate. In order to overcome the limitations, this paper presents a new formal method, called Timed Calculus of Abstract Real-Time Distribution, Mobility and Interaction(t-CARDMI). t-CARDMI separates spatial representation from behavioral representation to simplify the complexity. Further temporal specification is permitted only in the behavioral representation to make the complexity less complicate. The distinctive features of the temporal properties in t-CARDMI include waiting time, execution time, deadline, timeout action, periodic action, etc. both in movement and interaction behaviors. For analysis and verification of spatial and temporal properties of the systems in specification, t-CARDMI presents Timed Action Graph (TAG), where the spatial and temporal properties are visually represented in a two-dimensional diagram with the pictorial distribution of movements and interactions. t-CARDMI can be considered to be one of the most innovative formal methods in distributed real-time systems in ubiquitous computing to specify, analyze and verify the spatial, behavioral and the temporal properties of the systems very efficiently and effectively. The paper presents the formal syntax and semantics of t-CARDMI with a tool, called SAVE, for a ubiquitous healthcare application.

Petrological Study on Basaltic Rocks of the Daljeon-ri Columnar Joint and the Noeseongsan Noerok Site in Pohang, Korea (포항 달전리 주상절리와 뇌성산 뇌록산지의 현무암 비교 분석)

  • Kim, Jae hwan;Yu, Yeong-wan;Jung, Seung-Ho;Kim, Tae-Hyeong;Moon, Dong Hyeok;Kong, Dal-Yong
    • The Journal of the Petrological Society of Korea
    • /
    • v.27 no.4
    • /
    • pp.185-194
    • /
    • 2018
  • The basaltic rocks of Daljeon-ri columnar joint (Natural Monuments # 415) and Noeseongsan Noerok site (Natural Monuments # 547) were analysed in order to understand basalt types of two areas. The basaltic rocks of the Pohang Daljeon-ri columnar joint show a typical porphyritic texture containing phenocrysts (olivine and clinopyroxene) and groundmasses composed of clinopyroxene, plagioclase, and opaque minerals,. In contrast, basaltic rocks of Noeseongsan Noerok are characterized by fine-grained groundmass with large phenocrysts of plagioclase. Other analysis such as magnetic susceptibility, X-ray diffraction and X-ray fluorescence also support the petrological differences of two basalt rocks. The Daljeon-ri basaltic rocks are plotted on phonotephrite volcanic rocks of alkaline series in TAS(total alkali silica), and on within plate basalt in Zr-Ti diagram. The Noeseongsan basalts, on the other hand, are plotted on basaltic andesite to andesite of sub-alkaline series in TAS, and on volcanic arc basalt in Zr-Ti diagram. These results indicate that the original mantle materials between two basalt rocks were different each other, which probably originated from the change of a tectonic setting in the southeastern Korean peninsula during the Miocene.

A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment (클라우드 환경에서 공모 저항을 지원하는 이중 키 기반의 사용자 인증 모델)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.261-273
    • /
    • 2019
  • Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.