• Title/Summary/Keyword: Behavior pattern model

Search Result 425, Processing Time 0.034 seconds

Investigation of Operating Parameters on UCT Process for the Purpose of Nitrogen Removal Using Computer Simulation (하수의 질소제거시 컴퓨터 시뮬레이션을 이용한 UCT(University of Cape Town) 공정의 운영인자 검토)

  • 김병군;서인석;이해군;김창원
    • Journal of environmental and Sanitary engineering
    • /
    • v.13 no.2
    • /
    • pp.66-75
    • /
    • 1998
  • The computer simulation model was used to forecast the concentrations of COD$_{cr}$, NH$_{4}$$^{+}$-N and NO$_{3}$$^{-}$-N in each reactors. In the biological wastewater treatment system, the computer simulation model was used to observe the behavior of pollutants especially. In this research, effect of SRT, feeding pattern and recirculation rate on UCT(University of Cape Town) process was evaluated by computer simulation model. T-N removal was affected to the SRT. SRT for effective T-N removal was 15 days or longer. Feeding pattern in UCT process was affected to the T-N removal. Feeding pattern which 100% loading to the first reactor was most effective for T-N removal. The effect of recirculation rate was clear for T-N removal. The recirculation from anoxic reactor to anaerobic reactor was not need but the recirculation from oxic reactor to anoxic reactor was need. In aspect of nitrogen removal efficiency, A/O process was higher than UCT process.

  • PDF

Entrepreneurial Intention of Two Patterns of Planned Behaviour and Alertness: Empirical Evidence in China

  • Lu, Hong;Wang, Jiafure
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.5 no.2
    • /
    • pp.63-72
    • /
    • 2018
  • Researches based on the pattern of planned behavior holds that the three variables of entrepreneurial attitudes, subjective norms, and perceived behavior control influence each other and influence entrepreneurial intentions respectively. However, there are also different, even conflicting research conclusions that continue to emerge. Researches based on the pattern of alertness, believe that profit opportunities and individuals' pursuit to truth are the driving forces. Many scholars have demonstrated the impact of individual entrepreneurial alertness on entrepreneurial intentions. However, as an exogenous causal agent, profit opportunities have a logical problem: if there are no other assumptions, the mere existence of opportunities does not adequately explain entrepreneurial alertness. To address this gap, this study considered samples from mainland China, where entrepreneurial activities are very active currently, to test the role that entrepreneurial alertness is assumed to play in the planned behavior model. The results show that the three dimensions of alertness, individually partly intermediate the influence of entrepreneurial attitude on entrepreneurial intention, the influence of subjective norms on entrepreneurial intention, and that of perceived behavior control on entrepreneurial intention. This article studied the production of entrepreneurial intention by integrating the two patterns of planned behavior and alertness through empirical analysis, and opened up a new field for subsequent research on entrepreneurial intention.

DEVELOPMENT OF NUMERICAL MODEL FOR THE VISCO-PLASTIC BEHAVIOUR OF THE JOINTED ROCK MASS REINFORCED BY ROCKBOLTS (록볼트로 보강한 절리암반의 점소성거동에 관한 수치해석 모델 개발)

  • Lee, Yeon-Gyu;Lee, Jeong-In;Jo, Tae-Jin
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 1994.09a
    • /
    • pp.149-157
    • /
    • 1994
  • In this study two dimensional visco-plastic finite element model capable of handling the multi-step excavation was developed for investigating the effect of excavation support sequences on the behavior of underground openings in the jointed rock mass. First, the finite element model which is capable of handling the multi-step excavation is developed and verified. And then the model is combined with visco-plastic joint model. Ubiquitous joint pattern was considered in the model and joint properties in cach set were assumed to be indentical. Passive, full-grouted rockbolts were cosidered in the numerical model. The visco-plastic deformations of joints and rockbolts were assumed to be governed by Mohr-Conlomb and von Mises yield criteria, respectively. With the ability of removing elements, the model can simulate the multi-step excavation-suppport sequences. The reliability and applicability of the model to the stability analysis for the underground excavation in pratice was checked by simulating the behavior of underground crude oil storage caverns under construction.

  • PDF

Health promoting behavior of adolescents (청소년의 건강증진 행위)

  • So Hee Young;Kim Hyun Li
    • Journal of Korean Public Health Nursing
    • /
    • v.12 no.2
    • /
    • pp.107-121
    • /
    • 1998
  • The purpose of this study was to test the revised Health Promotion Model of Pender and to determine the factors to promote health behavior for adolescents' smoking behavior. The subjects of the study was 783 boys of 4 high school students. among 39. schools locating in Daejeon metropolitan city. The data was collected from July 1st to 15th. 1997 by school health nurse The research tool were HPLP of Walker. Pender. General self-efficacy scale of Sherer. control scale was measured by subconcept of hardiness scale of Pollock. and perceived barrier. perceived benefit. activity-related-affect tool were made by researcher via literature review The data were analyzed by SAS program using frequency. t-test. ANOVA. Schefee test. regression. The results were as follows 1. The mean of total health promoting behavior was $2.27\pm.35$. Among sub domain of health promoting behavior, the highest score was interpersonal support$(2.72\pm.60)$. and the lowest was health responsibility $(1.58\pm.44)$. 2. There were statistically significant difference in total health promoting behavior according to religion. parenting style. school performance. girl friend. father's smoking of individual characteristics. 3. The socioeconomic status. smoking, parent pattern. family structure of individual characteristics and experience domain associated with perceived benefit. perceived barrier. activity-related affect. interpersonal influence of behavior-specific cognition and affect domain. The perceived barrier. self-efficacy. girl friend and father's smoking of interpersonal influence. and control explained $25.8\%$ of variance of health promoting behavior. From above results school health nurse has to emphasize on health responsibility for health promotion of adolescent. But they couldn't intervene for parent pattern. socioeconomic status. family structure of individual characteristics and experience domain. it could be possible for school health nurse to promote health of adolescents through improving perceived barrier. also develop program to increase self-efficacy and through parent health class for fathers. Above results point to the importance of including parents in smoking prevention effort targeting adolescents. Because increasing control also promotes health of adolescents. it should be studied further about the specific measure. To verify the variables for increasing the fitness of health promoting model. it needs further replication of the research.

  • PDF

Algorithmic GPGPU Memory Optimization

  • Jang, Byunghyun;Choi, Minsu;Kim, Kyung Ki
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.14 no.4
    • /
    • pp.391-406
    • /
    • 2014
  • The performance of General-Purpose computation on Graphics Processing Units (GPGPU) is heavily dependent on the memory access behavior. This sensitivity is due to a combination of the underlying Massively Parallel Processing (MPP) execution model present on GPUs and the lack of architectural support to handle irregular memory access patterns. Application performance can be significantly improved by applying memory-access-pattern-aware optimizations that can exploit knowledge of the characteristics of each access pattern. In this paper, we present an algorithmic methodology to semi-automatically find the best mapping of memory accesses present in serial loop nest to underlying data-parallel architectures based on a comprehensive static memory access pattern analysis. To that end we present a simple, yet powerful, mathematical model that captures all memory access pattern information present in serial data-parallel loop nests. We then show how this model is used in practice to select the most appropriate memory space for data and to search for an appropriate thread mapping and work group size from a large design space. To evaluate the effectiveness of our methodology, we report on execution speedup using selected benchmark kernels that cover a wide range of memory access patterns commonly found in GPGPU workloads. Our experimental results are reported using the industry standard heterogeneous programming language, OpenCL, targeting the NVIDIA GT200 architecture.

A model for the restrained shrinkage behavior of concrete bridge deck slabs reinforced with FRP bars

  • Ghatefar, Amir;ElSalakawy, Ehab;Bassuoni, Mohamed T.
    • Computers and Concrete
    • /
    • v.20 no.2
    • /
    • pp.215-227
    • /
    • 2017
  • A finite element model (FEM) for predicting early-age behavior of reinforced concrete (RC) bridge deck slabs with fiber-reinforced polymer (FRP) bars is presented. In this model, the shrinkage profile of concrete accounted for the effect of surrounding conditions including air flow. The results of the model were verified against the experimental test results, published by the authors. The model was verified for cracking pattern, crack width and spacing, and reinforcement strains in the vicinity of the crack using different types and ratios of longitudinal reinforcement. The FEM was able to predict the experimental results within 6 to 10% error. The verified model was utilized to conduct a parametric study investigating the effect of four key parameters including reinforcement spacing, concrete cover, FRP bar type, and concrete compressive strength on the behavior of FRP-RC bridge deck slabs subjected to restrained shrinkage at early-age. It is concluded that a reinforcement ratio of 0.45% carbon FRP (CFRP) can control the early-age crack width and reinforcement strain in CFRP-RC members subjected to restrained shrinkage. Also, the results indicate that changing the bond-slippage characteristics (sand-coated and ribbed bars) or concrete cover had an insignificant effect on the early-age crack behavior of FRP-RC bridge deck slabs subjected to shrinkage. However, reducing bar spacing and concrete strength resulted in a decrease in crack width and reinforcement strain.

Explicit Nonlinear Finite Element Analysis for Flexure Behavior of FRP-Concrete Composite Beam (FRP-콘크리트 합성보의 휨거동에 관한 외연적 비선형 유한요소해석 연구)

  • Yoo, Seung Woon;Kang, Ga Ram
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.2
    • /
    • pp.269-276
    • /
    • 2017
  • In order to study ultimate flexure behavior of FRP-concrete composite structures which can replace reinforced concrete structures, ABAQUS, a general purpose analysis program, was utilized for numerical nonlinear analysis of structural performance and behavior characteristics of FRP-concrete composite beams. Explicit nonlinear finite element analysis was conducted and the numerical results were compared with previous experiments. Concrete damaged plasticity model was adopted as material properties of concrete and Euro code was used as compressive stress state. Nonlinear analysis was performed for four different types of FRP-concrete composite beams, and ultimate load and cracking pattern was compared and analyzed. The model suggested in this research was able to simulate ultimate load and cracking pattern properly, it is expected to be utilized in study of precise structural and behavioral characteristics of various FRP-concrete composite structures.

Life Cycle of Index Derivatives and Trading Behavior by Investor Types (주가지수 파생상품 Life Cycle과 투자자 유형별 거래행태)

  • Oh, Seung-Hyun;Hahn, Sang-Buhm
    • The Korean Journal of Financial Management
    • /
    • v.25 no.2
    • /
    • pp.165-190
    • /
    • 2008
  • The degree of informational asymmetry relating to the expiration of index derivatives is usually increased as an expiration day of index derivatives approaches. The increase in the degree of informational asymmetry may have some effects on trading behavior of investors. To examine what the effects look like, 'life cycle of index derivatives' in this study is defined as three adjacent periods around expiration day: pre-expiration period(a week before the expiration day), post-expiration period(a week after the expiration day), and remaining period. It is inspected whether stock investor's trading behavior is changed according to the life cycle of KOSPI200 derivatives and what the reason of the changing behavior is. We have four results. First, trading behavior of each investor group is categorized into three patterns: ㄱ-pattern, L-pattern and U-pattern. The level of trading activity is low for pre-expiration period and normal for other periods in the ㄱ-pattern. L-pattern means that the level of trading activity is high for post-expiration period and normal for other periods. In the U-pattern, the trading activity is reduced for remaining period compared to other periods. Second, individual investors have ㄱ-pattern of trading large stocks according to the life cycle of KOSPI200 index futures while they show U-pattern according to the life cycle of KOSPI200 index options. Their trading behavior is consistent with the prediction of Foster and Viswanathan(1990)'s model for strategic liquidity investors. Third, trading pattern of foreign investors in relation to life cycle of index derivatives is partially explained by the model, but trading pattern of institutional investors has nothing to do with the predictions of the model.

  • PDF

Graph Database based Malware Behavior Detection Techniques (그래프 데이터베이스 기반 악성코드 행위 탐지 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.55-63
    • /
    • 2021
  • Recently, the incidence rate of malicious codes is over tens of thousands of cases, and it is known that it is almost impossible to detect/respond all of them. This study proposes a method for detecting multiple behavior patterns based on a graph database as a new method for dealing with malicious codes. Traditional dynamic analysis techniques and has applied a method to design and analyze graphs of representative associations malware pattern(process, PE, registry, etc.), another new graph model. As a result of the pattern verification, it was confirmed that the behavior of the basic malicious pattern was detected and the variant attack behavior(at least 5 steps), which was difficult to analyze in the past. In addition, as a result of the performance analysis, it was confirmed that the performance was improved by about 9.84 times or more compared to the relational database for complex patterns of 5 or more steps.

A Study on the visco-plastic behavior of the jointed rock mass reinforced by rockbolts during excavation (굴착과정에서 록볼트로 보강된 절리암반의 점소성 거동 분석)

  • 이연구;이정인;조태진
    • Tunnel and Underground Space
    • /
    • v.5 no.2
    • /
    • pp.123-133
    • /
    • 1995
  • A two dimensional visco-plastic finite element model capable of handling the multistep excavaton was developed for investigating the effect of excavation-support sequences on the behaviour of underground openings in the jointed rock mass. Ubiquitous joint pattern was considered in the model and joint properties in each set were assumed to be identical. Passive, fully-grouted rockbolts were considered in the model. Visco-plastic deformations of joints and rockbolts were assumed to be governed by Mohr-Coulomb and von Mises yield criteria, respectively. With the ability of removing elements, the model can von Mises yield criteria, respectively. With the ability of removing elements, the model can simulate the multi-step excavation-support sequences. The reliability of the model to the stability analysis for the underground excavation in practice was checked by simulating the behavior of underground crude oil storage caverns under construction.

  • PDF