• Title/Summary/Keyword: 안전블록

Search Result 570, Processing Time 0.026 seconds

Flexural Design and Ductile Capacity of Reinforced High Strength Concrete Beams (고강도 철근 콘크리트 보의 휨 설계 및 연성능력)

  • 신성우;유석형;안종문;이광수
    • Magazine of the Korea Concrete Institute
    • /
    • v.8 no.6
    • /
    • pp.141-149
    • /
    • 1996
  • The reinforced high-strength-concrete beam subjected to flexure moment behaves more brittly than the moderate-strength-concrete beam reinforced with equal reinforcement ratio($\rho$/$\rho_b$). Test results show that when the concrete strength exceeds 830kg/$cm^2$, the maximum reinforcement ratio should be less than $0.6{\rho}_b$ for ductile behavior (${\rho}_b$=balanced steel ratio). The ratio of flexural strength between experimental results and analytical results with rectangular stress block decrease as the compressive strength of concrete increase. The shape of the compressive stress block distributed triangularly. because the ascending part of the stress-strain curve shows fairly linear response up to maximum stress in contrast to the nonlinear behavior of the medium and low strength specimens.

Development and Evaluation of Module for Agricultural Reservoir Flood Simulation (저수지 홍수분석 모듈 개발 및 평가)

  • Lee, Jaenam;Shin, Hyungjin;Lee, Jaeju;Kang, Munsung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.382-382
    • /
    • 2019
  • 홍수시 홍수관리체계는 기상청 등 관련기관으로부터 수위, 강우 등 수문자료를 취득하고, 저수지의 실시간 저수지 수위자료와 강우예측정보를 이용하여 홍수 유입량 및 방류량을 계산하고 홍수 단계별로 홍수분석을 실시한 후 조기에 상황을 전파하고 선제적으로 대응할 수 있는 운영체계가 필요하다. 본 연구에서는 기상청 레이다 및 위성자료 기반의 실시간 강우예측 자료를 적용한 저수지 홍수예측 및 하류부 침수 안전성 분석에 활용하기 위한 저수지 홍수분석 모듈을 개발하였다. 홍수량 산정은 Clark 방법과 NRCS 단위도법을 적용하고, 하류하천 수리해석을 위해 미환경청의 SWMM EXTRAN 블록을 수리해석 모형을 적용하였다. 홍수 실시간분석은 기상청 발표 예측 강우량을 이용하여 유역의 유출량을 분석하고 저수지 유입량을 산정할 수 있도록 하였으며, 이때 유입량에 의하여 저수지 홍수관리 수위를 상회하게 되면 여수토를 통하여 하류 하천으로 방류하도록 설계하였다. 방류된 홍수량은 하천을 따라 홍수추적을 수행하고 하천의 주요 지점에서 하천기본계획에서 수립된 홍수위의 상회 여부를 판단하여 관리자가 침수여부를 판단할 수 있도록 모듈을 개발하였다. 개발모듈의 검증을 위해 ${{\bigcirc}{\bigcirc}}$용수구역에 적용하여 백곡지구 농업용저수지 둑 높이기사업 기본계획(2011)에서 산정한 가능최대강수량에 대한 6시간, 12시간, 18시간, 24시간 홍수량을 HEC-HMS, HEC-1 모형으로 산정한 결과 비교하였다. 본 모듈은 농촌지역 홍수관리체계를 구축하는데 활용될 것으로 기대된다.

  • PDF

Examination of Transaction Secure Safety of Block Chain (블록체인 안전성 확보를 위한 거래 검토)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2019
  • Comparative analysis to secure safety of Blockchain Many investors have invested in virtual currency such as bit coins as a new investment due to increased popularity of virtual currency around the world. Also, virtual currency such as bit coin has a security technology and it has been relatively proved. popularity of virtual currency is rising as a new investment alternative because of this reason. This paper focused on the block chain's transparency and security of distributed ledger technology, which is relatively safe without third party's intervention. Many governments and companies around the world are developing and working on block chain technological development to introduce due to these reasons However, there are some suggestion that block chain has minor risks to its security. In this paper, it will examine security vulnerabilities from importance of security of Blockchain which relates to transactions of Bitcoin which stored by governments and companies around the world. This paper will propose measure which will improve safety and efficiency of Blockchain technology such as the existing Blockchain method, Blockchain proposal, traceability and awareness about hacking.

A Study on Squeal Noise Robustness Analysis to Improve Composite Brake Stability of High Performance and Eco-Friendly Vehicles (고성능 및 친환경 차량의 복합재 브레이크 안정감 향상을 위한 스퀼 노이즈 강건성 분석에 관한 연구)

  • Shim, J.H.;Lee, J.H.;Shin, U.H.;Lim, D.W.;Hyun, E.J.;Jeo, T.H.
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.3
    • /
    • pp.32-40
    • /
    • 2021
  • Composite material is very attractive because it has excellent mechanical property and is possible to lightweight due to the low density. However, composite material is less used compared to other systems in the chassis system because it is very hard to solve NVH problem when composite material is applied to vehicle. Especially, reducing squeal noise of composite brake system is essential to apply it to vehicle successfully. In this paper, we present a new solution to reduce squeal noise of composite brake system. To achieve this goal, we analyze main causes of noise using RCA (Root Cause Analysis), CA (Contradiction Analysis) and sequentially get IFR (Ideal Final Result) to solve the problem. Next, we define the function of composite brake system and derive control factors and noise factors. A variety of tests for factors like chamfer, slot, damping shim, underlayer of brake pad are done. In addition, we analyze level of contribution for control factors theoretically. Finally, we get the effective solution for reducing squeal noise.

Security Analysis of AES for Related-Key Rectangle Attacks (AES의 연관키 렉탱글 공격에 대한 안전성 분석)

  • Kim, Jong-Sung;Hong, Seok-Hie;Lee, Chang-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.39-48
    • /
    • 2009
  • In this paper we improve previous related-key rectangle attacks on AES from 9 rounds to 10 rounds: Our attacks break the first 10 rounds of 12-round AES-192 with 256 related keys, a data complexity of $2^{124}$ and a time complexity of $2^{183}$, and also break the first 10 rounds of 12-round AES-192 with 64 related keys, a data complexity of $2^{122}$ and a time complexity of $2^{183.6}$, Our attacks are the best knoown attacks on AES-192.

Classification of Exponent Permutations over finite fields GF($2^n$) and its applications (유한체 상의 지수 함수의 분류와 암호학에의 응용)

  • Park, Sang-Woo;Kim, Kwang-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.97-106
    • /
    • 1996
  • In this paper, we define an equivalence relation on the group of all permutations over the finite field GF($2^n$) and show each equivalence class has common cryptographic properties. And, we classify all exponent permutations over GF($2^7$) and GF($2^8$). Then, three applications of our results are described. We suggest a method for designing $n\;{\times}\;2n$ S(ubstitution)-boxes by the concatenation of two exponent permutations over GF($2^n$) and study the differential and linear resistance of them. And we can easily indicate that the conjecture of Beth in Eurocrypt '93 is wrong, and discuss the security of S-box in LOKI encryption algorithm.

On the Security of Rijndael-like Structures against Differential and Linear Cryptanalysis (Rijndael 유사 구조의 차분 공격과 선형 공격에 대한 안전성에 관한 연구)

  • 박상우;성수학;지성택;윤이중;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.3-14
    • /
    • 2002
  • Rijndael-like structure is the special case of SPN structure. The linear transformation of Rijndael-like structure consisits of linear transformations of two types, the one is byte permutation $\pi$ and the other is linear tranformation $\theta$= ($\theta_1, \theta_2, \theta_3, \theta_4$), where each of $\theta_i$ separately operates on each of the four rows of a state. The block cipher, Rijndael is an example of Rijndael-like structures. In this paper. we present a new method for upper bounding the maximum differential probability and the maximum linear hull probability for Rijndael-like structures.

A Study on Analysis of Development Effectiveness of Composite Brake through Real Car Comparison and Verification (실차 비교 및 검증을 통한 복합재 브레이크의 개발 효용성 분석에 관한 연구)

  • Shim, J.H.;Kwon, Y.U.;Lee, J.H.;Shin, U.H.
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.3
    • /
    • pp.41-47
    • /
    • 2022
  • Composite material is recently very important material for eco-friendly vehicles because of its excellent mechanical property and lightweight effect. So, many research results have been recently published for developing the composite material to apply vehicles. In this paper, new brake system is presented using composite material to response this situation. And advantages in terms of performance compared to competitive company will be discussed in depth to verify superiorities of the new composite brake. To do so, composite brake systems which have the same size as the competitive company to the same vehicle is applied. And superiorities through a variety of test results are presented. First, normal braking performances are compared with competitive company through braking effect, heat capacity and friction test, Second, circuit driving and high speed fade test are also verified with competitive company to confirm harsh braking performances for the new composite brake system. Finally, the effects of applying the composite brake to automobile industry like electric car are analyzed.

메타버스의 진화에 따른 ID 관리 기술 현황

  • Jeong, Soo Yong;Seo, Chang Ho;CHO, in-Man;Jin, Seung-Hun;Kim, Soo Hyung
    • Review of KIISC
    • /
    • v.32 no.4
    • /
    • pp.49-59
    • /
    • 2022
  • 메타버스는 가상, 초월을 의미하는 '메타(meta)'와 세계, 우주를 의미하는 '유니버스(universe)'의 합성어로 현실 세계를 초월한 디지털 세계라고 정의할 수 있다. 이러한 메타버스는 현실 세계와 평행한 디지털 세계의 구축을 시작으로 블록체인(Blockchain), 인공지능(AI) 등의 기술과 고성능 웨어러블 디바이스(Wearable Device) 기반의 높은 몰입감을 제공하여 현실과 상호 작용하는 디지털 세계로 진화하고 있다. 이에 따라, 현재의 메타버스는 기존의 디지털 세계를 구축하고 활용하는 다양한 서비스가 포함된 개념으로 확장되고 있으며, 최종적으로는 현실과 디지털 세계의 경계가 없는 초현실적인 세계로 발전할 것이다. 이러한 메타버스 발전의 뒤에는 많은 보안 기술들이 필요하며, 실제 개인의 프라이버시 문제 및 보안 위협에 대한 우려가 증가하고 있다. 특히, 높은 몰입감을 제공하기 위해 이전보다 더욱 다양한 생체정보를 포함한 개인정보가 사용될 것이며, 이러한 데이터는 개인을 특정하는 ID(Identity)로 활용될 수 있다. 이에, 개인정보에 대한 보안 위협은 더욱 다양해질 것이고, 동시에 안전한 개인정보 활용이 가능한 ID 관리 기술개발의 필요성도 높아질 것이다. 따라서, 본 논문에서는 메타버스의 개념과 함께 진화 과정을 제시하고, 메타버스의 진화에 따라 다양해지는 ID 관련 보안 위협 및 대응 기술을 분석을 통해 ID 관리 기술의 현황을 정리한다.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF