• 제목/요약/키워드: C/A code

검색결과 1,648건 처리시간 0.031초

Effect of a Time Dependent Concrete Modulus of Elasticity on Prestress Losses in Bridge Girders

  • Singh, Brahama P.;Yazdani, Nur;Ramirez, Guillermo
    • International Journal of Concrete Structures and Materials
    • /
    • 제7권3호
    • /
    • pp.183-191
    • /
    • 2013
  • Prestress losses assumed for bridge girder design and deflection analyses are dependent on the concrete modulus of elasticity (MOE). Most design specifications, such as the American Association of State Highways and Transportation Officials (AASHTO) bridge specifications, contain a constant value for the MOE based on the unit weight of concrete and the concrete compressive strength at 28 days. It has been shown in the past that that the concrete MOE varies with the age of concrete. The purpose of this study was to evaluate the effect of a time-dependent and variable MOE on the prestress losses assumed for bridge girder design. For this purpose, three different variable MOE models from the literature were investigated: Dischinger (Der Bauingenieur 47/48(20):563-572, 1939a; Der Bauingenieur 5/6(20):53-63, 1939b; Der Bauingenieur, 21/22(20):286-437, 1939c), American Concrete Institute (ACI) 209 (Tech. Rep. ACI 209R-92, 1992) and CEB-FIP (CEB-FIP Model Code, 2010). A typical bridge layout for the Dallas, Texas, USA, area was assumed herein. A prestressed concrete beam design and analysis program from the Texas Department of Transportation (TxDOT) was utilized to determine the prestress losses. The values of the time dependent MOE and also specific prestress losses from each model were compared. The MOE predictions based on the ACI and the CEB-FIP models were close to each other; in long-term, they approach the constant AASHTO value. Dischinger's model provides for higher MOE values. The elastic shortening and the long term losses from the variable MOE models are lower than that using a constant MOE up to deck casting time. In long term, the variable MOE-based losses approach that from the constant MOE predictions. The Dischinger model would result in more conservative girder design while the ACI and the CEB-FIP models would result in designs more consistent with the AASHTO approach.

Utilization of Google Earth for Distribution Mapping of Cholangiocarcinoma: a Case Study in Satuek District, Buriram, Thailand

  • Rattanasing, Wannaporn;Kaewpitoon, Soraya J;Loyd, Ryan A;Rujirakul, Ratana;Yodkaw, Eakachai;Kaewpitoon, Natthawut
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제16권14호
    • /
    • pp.5903-5906
    • /
    • 2015
  • Background: Cholangiocarcinoma (CCA) is a serious public health problem in the Northeast of Thailand. CCA is considered to be an incurable and rapidly lethal disease. Knowledge of the distribution of CCA patients is necessary for management strategies. Objectives: This study aimed to utilize the Geographic Information System and Google $Earth^{TM}$ for distribution mapping of cholangiocarcinoma in Satuek District, Buriram, Thailand, during a 5-year period (2008-2012). Materials and Methods: In this retrospective study data were collected and reviewed from the OPD cards, definitive cases of CCA were patients who were treated in Satuek hospital and were diagnosed with CCA or ICD-10 code C22.1. CCA cases were used to analyze and calculate with ArcGIS 9.2, all of data were imported into Google Earth using the online web page www.earthpoint.us. Data were displayed at village points. Results: A total of 53 cases were diagnosed and identified as CCA. The incidence was 53.57 per 100,000 population (65.5 for males and 30.8 for females) and the majority of CCA cases were in stages IV and IIA. The average age was 67 years old. The highest attack rate was observed in Thung Wang sub-district (161.4 per 100,000 population). The map display at village points for CCA patients based on Google Earth gave a clear visual deistribution. Conclusions: CCA is still a major problem in Satuek district, Buriram province of Thailand. The Google Earth production process is very simple and easy to learn. It is suitable for the use in further development of CCA management strategies.

Shear Behavior and Performance of Deep Beams Made with Self-Compacting Concrete

  • Choi, Y.W.;Lee, H.K.;Chu, S.B.;Cheong, S.H.;Jung, W.Y.
    • International Journal of Concrete Structures and Materials
    • /
    • 제6권2호
    • /
    • pp.65-78
    • /
    • 2012
  • An experimental study was carried out to evaluate fresh properties of a moderately high-strength (high-flowing) self-compacting concrete (SCC) and to investigate shear behavior and performance of deep beams made with SCC. Fresh and hardened properties of normal concrete (NC) and SCC were evaluated. The workability and compacting ability were observed based on casting time and number of surface cavities, respectively. Four-point loading tests on four deep beams (two made with SCC and two with NC) were then conducted to investigate their shear behavior and performance. Shear behavior and performance of beams having two different web reinforcements in shear were systematically investigated in terms of crack pattern, failure mode, and load-deflection response. It was found from the tests that the SCC specimen having a normal shear reinforcement condition exhibited a slightly higher load carrying capacity than the corresponding NC specimen, while the SCC specimen having congested shear reinforcement condition showed a similar load carrying capacity to the corresponding NC specimen. In addition, a comparative study between the present experimental results and theoretical results in accordance with ACI 318 (Building Code Requirements for Reinforced Concrete (ACI 318-89) and Commentary-ACI 318R-89, 1999), Hsu-Mau's explicit method (Hsu, Cem Concr Compos 20:419-435, 1998; Mau and Hsu, Struct J Am Concr Inst 86:516-523, 1989) and strut-and-tie model suggested by Uribe and Alcocer (2002) based on ACI 318 Appendix A (2008) was carried out to assess the applicability of the aforementioned methods to predict the shear strength of SCC specimens.

기분안정제 (Mood Stabilizers)

  • 김영훈;장태섭
    • 생물정신의학
    • /
    • 제1권1호
    • /
    • pp.40-59
    • /
    • 1994
  • The introduction of lithium salts for the treatment of mood disorder by Code in 1949 was a major therapeutic breakthrough. Yet it is far from the universal therpeutic agent in the treatment of mood disorders. Indeed, some acutely manic patients do not respond adeqately to lithium and some individuals experience breakthrough affective episodes during lithium maintenance. In the last decode, it has become c1ear that a significant number of patients with more highly recurrent disorders may require alternative or enhanced forms of prophylactic treatment. For these reasons, a variety of other drugs hove been employed for the treatment and prophylaxis of mood disorders. Efforts to develop new pharmacologic strategies for mood disorder hove included a diverse array of medications, ranging from potent benzodiazepines to novel neuroleptics and from anticonvulsants to calcium channel blockers. The anticonvulsants appear particularly useful in cases of dysphoric mania and rapid cycling state, subforms of bipolar disorder that respond quite poorly to conventional treatments. Among all of these new pharmacologic strategy, carbamazepine and sodium valproate have received the broadest clinical applications as maintenance therapies. The data documenting the short-term antimanic effectiveness of the calcium channel blocker verapamil and benzodiazepins such as clonazepam and lorazepam appear also promising. A number of other theoretically interesting, as well as clinically relevant therapies, which are not presently employed routinly, hove also been studied, including 2 blocker clonidine, atypical antipsychotic clozapine, cholinomimetics, 5-HT enhancers, thyroid and magnesium preparations. Now prophylaxis in mood disorder remains a considerable therapeutic challenge. Controlled testing of the prophylactic efficacy of compounds such as carbamazepine, valproic acid, and the calcium channel blockers represent important next step in the clinical trials for mood disorder.

  • PDF

예열온도조건에 따른 알루미늄 합금 주조재의 응고특성에 관한 연구 (A Study on Solidification Characteristics of Aluminum Alloy Casting Material by Pre-heated Temperature Conditions)

  • 윤천한;윤희성;오율권
    • 한국안전학회지
    • /
    • 제27권4호
    • /
    • pp.7-12
    • /
    • 2012
  • In this study, the solidification characteristics inside the AC7A casting material was analyzed using the numerical analysis method and was verified using the experimental method by the pre-heated temperature conditions of metal casting device. For the numerical analysis, "COMSOL Multiphysics", the commercial code based on the finite element analysis(FEA), was used in order to predict the thermal deformation of the AC7A casting material including temperature, displacement and stress distribution. Also, in order to verify the results calculated by the numerical analysis, the experiment for temperature measurement inside the AC7A casting material was performed using the K-type thermocouple under the same condition of numerical analysis method. In the numerical results, thermal deformation inside AC7A casting material was well-suited for manufacturing products when the pre-heated temperatures of the metal casting device was $250^{\circ}C$. When the results of the temperature distribution were experimentally measured and were compared with those of the numerical result, it appeared that there was some temperature difference because of the latent heat by phase change heat transfer. However, the result of cooling temperature and patterns were almost similar except for the latent heat interval. The solidification characteristics was closely related to the temperature difference between the surface and inside of the casting.

디지털 증거의 긴급한 보전을 위한 법제 개선 연구 (A Study on Improving the Legal System for the Expedited Preservation of Digital Evidence)

  • 노소형;지성우
    • 한국IT서비스학회지
    • /
    • 제19권3호
    • /
    • pp.57-73
    • /
    • 2020
  • The proportion of digital evidence in criminal cases has increased, while at the same time, the spread of the Internet has made it easy to delete information that is stored in another place and thus, the Internet is being used to delete online criminal evidence. To respond quickly and effectively to cybercrime, 29 countries signed the Convention on Cybercrime in 2001 through the Council of Europe. Article 16 of the Convention relates to the expedited preservation of stored computer data and requires signatories to adopt legislative measures to enable its competent authorities to order expeditious preservation of specified computer data where there are grounds to believe that the data is particularly vulnerable to loss or modification. More than 60 countries have joined the Convention since 2001 and have made efforts to improve their legal system in line with it. The United States legislated 18 U.S.C. § 2703(f) to preserve electronic evidence pending the issuance of a court order. The German Code of Criminal Procedure §§ 94~95 allows prosecution authorities to seize evidence or issue production orders without court control in urgent circumstances. A custodian shall be obliged to surrender evidence upon a request that evidence be preserved, and non-compliance results in punishment. Japan legislated the Criminal Procedure Act § 197(3) and (4) to establish a legal base for requesting that electronic records that are stored by an ISP not be deleted. The Korean Criminal Procedure Act § 184 outlines procedures for the preservation of evidence but does not adequately address the expeditious preservation of digital evidence that may be vulnerable to deletion. This paper analyzes nine considerations, including request subjects, requirements, and cost reimbursement to establish directions to improve the legal system for the expedited preservation of digital evidence. A new method to preserve online digital evidence in urgent cases is necessary.

컴퓨터 바이러스 분류를 위한 퍼지 클러스터 기반 진단시스템 (Fuzzy Cluster Based Diagnosis System for Classifying Computer Viruses)

  • 이현숙
    • 정보처리학회논문지B
    • /
    • 제14B권1호
    • /
    • pp.59-64
    • /
    • 2007
  • 중요한 정보를 저장하고 있는 컴퓨터를 위협하는 바이러스는 점점 현실적인 문제로 대두되고 있다. 이를 위하여 바이러스 침입 발견을 위한 소프트웨어 기술 또한 계속 발전되고 있으나, 현재까지의 표준 기술은 알려진 바이러스의 시그내쳐 패턴을 저장하여 이를 매치 검색하면서 바이러스를 찾아내는 방식을 채택하고 있다. 이는 알려진 바이러스에 대해서는 효과적이지만 새로운 바이러스를 찾아내지 못하고 손실을 당한 후 에야 찾을 수 있는 단점을 가지고 있다. 이를 위하여 바이러스 정보 구축과 탐색에 학습기능을 도입함으로 새로 발생하는 바이러스를 찾아내어 대처할 수 있는 방법이 필요하다. 본 논문에서는 컴퓨터 바이러스를 위한 퍼지 진단 시스템 FDS를 제안한다. FDS에서는 FCM 알고리즘을 사용하여 알려진 정보의 클러스터를 형성하고 대표정보를 추출하고 여기에 전문가의 지식을 포함하는 지식베이스를 구축한다. 진단을 위한 컴퓨터 파일에 대하여 그 파일의 결정 상태를 확인하고 이미 저장된 지식베이스를 바탕으로 바이러스 침입에 대한 정보를 보고하도록 설계되어있다. 이 시스템은 이미 알려진 테스트 데이터와 이전에 알려지지 않은 새로운 테스트 데이터를 실험데이터로 준비하여 널리 알려진 분류 알고리즘-KNN, RF, SVM-과 함께 성능을 비교하였다. 제안된 시스템이 알려지지 않은 컴퓨터 바이러스를 효과적으로 진단할 수 있는 타당성을 보이고 있다.

AE32000B: a Fully Synthesizable 32-Bit Embedded Microprocessor Core

  • Kim, Hyun-Gyu;Jung, Dae-Young;Jung, Hyun-Sup;Choi, Young-Min;Han, Jung-Su;Min, Byung-Gueon;Oh, Hyeong-Cheol
    • ETRI Journal
    • /
    • 제25권5호
    • /
    • pp.337-344
    • /
    • 2003
  • In this paper, we introduce a fully synthesizable 32-bit embedded microprocessor core called the AE32000B. The AE32000B core is based on the extendable instruction set computer architecture, so it has high code density and a low memory access rate. In order to improve the performance of the core, we developed and adopted various design options, including the load extension register instruction (LERI) folding unit, a high performance multiply and accumulate (MAC) unit, various DSP units, and an efficient coprocessor interface. The instructions per cycle count of the Dhrystone 2.1 benchmark for the designed core is about 0.86. We verified the synthesizability and the area and time performances of our design using two CMOS standard cell libraries: a 0.35-${\mu}m$ library and a 0.18-${\mu}m$ library. With the 0.35-${\mu}m$ library, the core can be synthesized with about 47,000 gates and operate at 70 MHz or higher, while it can be synthesized with about 53,000 gates and operate at 120 MHz or higher with the 0.18-${\mu}m$ library.

  • PDF

2차원 쐐기형 몰수체의 비정상 공동 와류에 대한 수치해석 (Numerical Analysis of Unsteady Cavitating Vortex around Two-dimensional Wedge-shaped Submerged Body)

  • 김지혜;정소원;안병권;박철수;김건도
    • 한국해양공학회지
    • /
    • 제32권1호
    • /
    • pp.36-42
    • /
    • 2018
  • Unlike a slender body, vortices are shed off alternately in the wake of a blunt body. In the case of liquid flows, when the pressure falls below the vapor pressure, cavitation occurs in the vortex core and affects the formation of the vortex street. This phenomenon is of major importance in many practical cases because the alternate shedding of vortices creates imbalanced forces on the body. Hence, it is very important to determine the shedding frequency of cavitating vortices. In this paper, the unsteady cavitating flow around a two-dimensional wedge-shaped submerged body was simulated using the commercial code STAR-CCM+. A numerical investigation of the structure of cavitating vortices was performed for a model with an apex angle of $20^{\circ}C$. The results were validated by comparing them with experimental measurements carried out at a cavitation tunnel of Chungnam National University (CNU-CT). It was found that the shedding frequency of the vortex increased by up to 18%, which was strongly affected by the development of cavitation.

커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구 (Study on a Secure Authentication and Authorization Protocol based on Kerberos)

  • 김은환;김명희;전문석
    • 한국통신학회논문지
    • /
    • 제29권5C호
    • /
    • pp.737-749
    • /
    • 2004
  • 분산 네트워크 환경에서 커버로스는 시스템간의 신뢰를 바탕으로 대칭키를 사용하여 사용자를 인증한다. 그러나, 인증(authentication)과 함께 허가(authorization)는 보안의 필수적인 요소다. 본 논문에서는 기존의 커버로스에 프록시 권한 서버(proxy privilege server)를 두고 공개키/개인키를 적용하여 효율적이고 안전한 인증 및 허가 메커니즘을 설계하였다. 제안한 메커니즘에서는 사용자 인증을 위해 미리 정해진 long-term 키와 공개키를 통해 교환한 랜덤 수에 MAC 알고리즘을 적용하여 암호화에 사용하는 세션키 값을 매번 바꾸어주기 때문에 안전성을 높였다. 또한, 전체적인 인증 절차를 간소화하여 사용하는 키의 수를 줄였다. 프록시 권한 서버는 사용자의 권한 요구를 확인하고 권한 속성 인증서(privilege attribute certificate)를 발행한다. 권한 속성 인증서는 사용자의 권한 요구를 응용 서버에 전달하고 권한 위임에 사용된다. 제안한 메커니즘을 사용하여 기존의 커버로스에서 동작하는 효율적이고 안전한 인증 및 허가 알고리즘을 설계한다.