• Title/Summary/Keyword: C-embedding

Search Result 139, Processing Time 0.027 seconds

Temperature History of the Slab Concrete applying Revised Bubble Sheet with Heating Cable (열선 매입과 열선 및 버블시트 조합의 개량형 버블시트를 포설한 슬래브 콘크리트의 온도이력 특성)

  • Jung, Eun-Bong;Ahn, Sang-Ku;Jung, Sang-Hyun;Ko, Kyung-Taek;Han, Min-Cheol;Han, Cheon-Goo
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.11a
    • /
    • pp.23-25
    • /
    • 2013
  • In this study, the results are compared with the case of the concrete with embedded heating wire to verify the performance of the IB made in order to improve the workability and affordability, and to determine the effectiveness of early frost damage prevention. The IB was made using the 5W heating wire and layed on the upper surface of the concrete. The temperature was reduced to below 0℃ approximately within 24 hours, then approached the external temperature thereafter. On the other hand, when the 20W heating wire was used to make the IB and applied the same way, the temperature remained around -2 to 3℃ on the average even through the temperature was reduced to below 0℃, due to the heating wire with relatively large heating capacity. It appeared to reach 85% of the direct heating by embedding the heating wire relatively deeper in the concrete. However, it was determined that using the IB made with the 20W heating wire will prevent the early frost damage to some degree in -10℃.

  • PDF

Internal Strain Monitoring of Filament Wound Pressure Tanks using Embedded Fiber Bragg Grating Sensors (삽입된 광섬유 브래그 격자 센서를 이용한 필라멘트 와인딩된 복합재료 압력탱크의 내부 변형률 모니터링)

  • Kim C. U.;Park S. W.;Kim C. G.;Kang D. H.
    • Composites Research
    • /
    • v.18 no.4
    • /
    • pp.1-7
    • /
    • 2005
  • In-situ structural health monitoring of filament wound pressure tanks were conducted during water-pressurizing test using embedded fiber Bragg grating (FBG) sensors. We need to monitor inner strains during working in order to verify the health condition of pressure tanks more accurately because finite element analyses on filament wound pressure tanks usually show large differences between inner and outer strains. Fiber optic sensors, especially FBG sensors can be easily embedded into the composite structures contrary to conventional electric strain gages (ESGs). In addition, many FBG sensors can be multiplexed in single optical fiber using wavelength division multiplexing (WDM) techniques. We fabricated a standard testing and evaluation bottle (STEB) with embedded FBG sensors and performed a water-pressurizing test. In order to increase the survivability of embedded FBG sensors, we suggested a revised fabrication process for embedding FBG sensors into a filament wound pressure tank, which includes a new protecting technique of sensor heads, the grating parts. From the experimental results, it was demonstrated that FBG sensors can be successfully adapted to filament wound pressure tanks for their structural health monitoring by embedding.

A Simultaneous Improvement in $CO_2$ Flux and $CO_2/N_2$ Separation Factor of Sodium-type FAU Zeolite Membranes through 13X Zeolite Beads Embedding (13X 제올라이트 흡착제 충진에 의한 Na형 Faujasite 제올라이트 분리막의 $CO_2/N_2$ 선택도 및 $CO_2$ 투과도 동시 증가 현상)

  • Cho, Churl-Hee;Yeo, Jeong-Gu;Ahn, Young-Soo;Han, Moon-Hee;Moon, Jong-Ho;Lee, Chang-Ha
    • Membrane Journal
    • /
    • v.17 no.3
    • /
    • pp.269-275
    • /
    • 2007
  • Sodium type faujasite(FAU) zeolite membranes with a thickness of 5${\mu}m$ and a Si/Al molar ratio of 1.5 were prepared by the secondary growth process. The $CO_2/N_2$ separation in the vacuum mode was investigated at $30^{\circ}C$ for an equimolar $CO_2-N_2$ mixed gas before and after embedding 13X zeolite beads in the permeate side. The embedded 13X zeolite beads improved both $CO_2$ permeance and $CO_2/N_2$ separation factor, simultaneously. The phenomenon was explained by an increment in the $CO_2$ desorption rate at the FAU zeolite/$\alpha-Al_2O_3$ phase boundary due to an enhanced $CO_2$ escaping through the pore channels of the $\alpha-Al_2O_3$ support layer. In the present paper, it will be emphasized that a hybridization of a membrane with an adsorbent can provide a key to break through the trade-off between permeance and separation factor, generally shown in a membrane separation.

Image Warping Using Vector Field Based Deformation and Its Application to Texture Mapping (벡터장 기반 변형기술을 이용한 이미지 와핑 방법 : 텍스쳐 매핑에의 응용을 중심으로)

  • Seo, Hye-Won;Cordier, Frederic
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.404-411
    • /
    • 2009
  • We introduce in this paper a new method for smooth foldover-free warping of images, based on the vector field deformation technique proposed by Von Funck et al. It allows users to specify the constraints in two different ways: positional constraints to constrain the position of a point in the image and gradient constraints to constrain the orientation and scaling of some parts of the image. From the user-specified constraints, it computes in the image domain a C1-continuous velocity vector field, along which each pixel progressively moves from its original position to the target. The target positions of the pixels are obtained by solving a set of partial derivative equations with the 4th order Runge-Kutta method. We show how our method can be useful for texture mapping with hard constraints. We start with an unconstrained planar embedding of a target mesh using a previously known method (Least Squares Conformal Map). Then, in order to obtain a texture map that satisfies the given constraints, we use the proposed warping method to align the features of the texture image with those on the unconstrained embedding. Compared to previous work, our method generates a smoother texture mapping, offers higher level of control for defining the constraints, and is simpler to implement.

Copyright Protection for Fire Video Images using an Effective Watermarking Method (효과적인 워터마킹 기법을 사용한 화재 비디오 영상의 저작권 보호)

  • Nguyen, Truc;Kim, Jong-Myon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.579-588
    • /
    • 2013
  • This paper proposes an effective watermarking approach for copyright protection of fire video images. The proposed watermarking approach efficiently utilizes the inherent characteristics of fire data with respect to color and texture by using a gray level co-occurrence matrix (GLCM) and fuzzy c-means (FCM) clustering. GLCM is used to generate a texture feature dataset by computing energy and homogeneity properties for each candidate fire image block. FCM is used to segment color of the fire image and to select fire texture blocks for embedding watermarks. Each selected block is then decomposed into a one-level wavelet structure with four subbands [LL, LH, HL, HH] using a discrete wavelet transform (DWT), and LH subband coefficients with a gain factor are selected for embedding watermark, where the visibility of the image does not affect. Experimental results show that the proposed watermarking approach achieves about 48 dB of high peak-signal-to-noise ratio (PSNR) and 1.6 to 2.0 of low M-singular value decomposition (M-SVD) values. In addition, the proposed approach outperforms conventional image watermarking approach in terms of normalized correlation (NC) values against several image processing attacks including noise addition, filtering, cropping, and JPEG compression.

Performance Evaluation of RSIP Gateway in Intranet Environment (인트라넷 환경에서 RSIP 게이트웨이의 성능분석)

  • Kim, Won;Lee, Young-Taek;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.683-688
    • /
    • 2004
  • NAT is a very useful IP address translation technique that allows two connected networks using different and incompatible IP address schemes. But it is impractical to use NAT for an application which uses the encrypted IP packet, embedding IP addresses inside of data payloads, to guarantee End-to-End Security such as IPSec. In addition to rewriting the source/destination IP addresses in the packet, NAT must modify IP checksum every time, which could lead to considerable performance decrease of the overall system in the process of the address translation. RSIP is an alternative to solve these disadvantages of NAT and the address shortage problems. Both NAT and RSIP divide networks into inside and outside addressing realms. NAT translates addresses between internal network and external network, but RSIP uses a borrowed external address for outside communications. RSIP server assigns a routable public address to a RSIP client temporarily to communicate with public net-work outside of the private network. In this paper, RSIP gateway for intranet environment is designed and its performance is evaluated. From the results of performance evaluation, we knew that RSIP is operated less sensitive to the data traffic. Also, the experiment shows that RSIP performs better than NAT when the transmission data grows larger.

Effects of the Addition of Mn and $AB_5$ Type Alloy on the Electrochemical Characteristics of Ti-Cr-V BCC Type Alloys (BCC계 Ti-Cr-V 합금의 전기화학적 특성에 미치는 Mn 및 $AB_5$계 합금 첨가 효과)

  • Kim, J.Y.;You, J.H.;Park, C.N.;Park, C.J.;Choi, J.;Cho, S.W.
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.18 no.1
    • /
    • pp.52-59
    • /
    • 2007
  • We investigated the effects of the addition of Mn and $AB_5$ type alloy on the electrochemical characteristics of Ti-Cr-V BCC type alloys as anode materials for Ni-MH battery. The activation behavior and discharge capacity of the BCC type alloys were significantly improved by ball-milling with the $LmNi_{4.1}Al_{0.25}Mn_{0.3}Co_{0.65}$ alloy, because the $AB_5$ type alloy acted as hydrogen path on the surface of the BCC type alloy. Among the Mn substituted alloys($Mn=0.03%{\sim}0.08%$), the $Ti_{0.32}Cr_{0.38}Mn_{0.05}V_{0.25}$ alloy ball-milled with $AB_5$ type alloy exhibited the greatest discharge capacity of $336\;mAh{\cdot}g^{-1}$. In addition, Mn substituted alloys exhibited the lower plateau pressure in P-C- T curve, the better hydrogen storage capacity and faster surface activation compared with the alloy without Mn.

Design and Implementation of a Keyboard Input Security System for Safe md Trusted E-Commerce (안전하고 신뢰성있는 전자상거래를 위한 키보드 입력 보안 시스템의 설계 및 구현)

  • Choi Sung-Wook;Kim Ki-Tae
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.55-62
    • /
    • 2006
  • It is growing to use the E-Commerce, recently However, if a cracking tool that detects e keyboard input is set up, users' input values and personal information could be taken away. This paper shows the design and implementation of security system that prevent the keyboard input information leaking. The ideas of thus paper are encrypting the keyboard input values with using the keyboard interrupt hooking, the browser embedding program's decrypting the values in case of need and decrypting all values in the web server. The own input control was developed for direct attacks to the browser, and that the values of password fields which are showed as *(asterisk character) won't be decrypted in the client PC is different from other commercial keyboard input security systems. Consequently, this paper shows the chance of realizing a lot safer customer information protective system than before.

Secure Asymmetric Watermarking Based on Correlation Detection (상관도 검출기반의 안전한 비대칭 워터마킹)

  • Li De;Kim JongWeon;Choi JongUk
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.379-386
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, has method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At the results, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

A Digital Image Watermarking Scheme using ElGamal Function (ElGarnal함수를 사용하는 디지털 이미지 워터마킹 기법)

  • Lee, Jean-Ho;Kim, Tai-Yun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.1-8
    • /
    • 2002
  • Digital image watermarking is a technique for the purpose of protecting the ownership of the image by embedding proprietary watermarks in a digital image. It is required for the digital image watermarking scheme to pursue the robustness against water marking attacks and the perceptual Invisibility more than usual in steganography area, to guarantee not a hidden watermarking algorithm but the publicity of water-marking algorithm details and hidden use of key, which can protect the unauthorized user access from detection. In this paper we propose a new copyright watermarking scheme, which is barred on one-way hash functions using ElGamal functions and modular operations. ElGamal functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(least significant bit) attacks and gamma correction attack, and also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments. It is necessary to proceed as the future work the algorithm of achieving at the same time both the pseudo-randomness for the steno-key generation and the asymmetric-key generation.