• Title/Summary/Keyword: Dynamic Threat

Search Result 80, Processing Time 0.027 seconds

Ambient Vibration measurements and finite element modelling for the Hong Kong Ting Kau Bridge

  • Au, F.T.K.;Tham, L.G.;Lee, P.K.K.;Su, C.;Han, D.J.;Yan, Q.S.;Wong, K.Y.
    • Structural Engineering and Mechanics
    • /
    • v.15 no.1
    • /
    • pp.115-134
    • /
    • 2003
  • The Ting Kau Bridge in Hong Kong is a cable-stayed bridge comprising two main spans and two side spans. The bridge deck is supported by three towers, an end pier and an abutment. Each of the three towers consists of a single reinforced concrete mast which reduces its section in steps, and it is strengthened by transverse cables and struts in the transverse vertical plane. The bridge deck is supported by four inclined planes of cables emanating from anchorages at the tower tops. In view of the threat from typhoons, the dynamic behaviour of long-span cable-supported bridges in the region is always an important consideration in their design. This paper is devoted to the ambient vibration measurements of the bridge for evaluation of dynamic characteristics including the natural frequencies and mode shapes. It also describes the modelling of the bridge. A few finite element models are developed and calibrated to match with the field data and the results of subsequent structural health monitoring of the bridge.

Effect of fly ash and plastic waste on mechanical and durability properties of concrete

  • Paliwal, Gopal;Maru, Savita
    • Advances in concrete construction
    • /
    • v.5 no.6
    • /
    • pp.575-586
    • /
    • 2017
  • The disposal of polythene waste and fly ash is causing serious threat to the environment. Aim of this study is to decrease environmental pollution by using polythene waste and fly ash in concrete. In this study, cement was partially replaced with 0%, 5%, 10%, 15% and 20% fly ash (by weight) and plastic waste was added in shredded form at 0.6% by weight of concrete. The specimens were prepared for the concrete mix of M25 grade and water to cementitious material ratio (w/c) was maintained as 0.45. Fresh concrete property like workability was examined during casting the specimens. Hardened properties were found out by carrying out the experimental work on cubes, cylinders and beams which were cast in laboratory and their behavior under test were observed at 7 & 28 days for compressive strength and at 28 days for density, flexural strength, dynamic modulus of elasticity, abrasion resistance, water permeability and impact resistance. Overall results of this study show that addition of 0.6% (by weight of the concrete) plastic waste with 10% (by weight of cement) replacement of cement by fly ash result an improvement in properties of the concrete than conventional mix.

Lateral impact behaviour of concrete-filled steel tubes with localised pitting corrosion

  • Gen Li;Chao Hou;Luming Shen;Chuan-Chuan Hou
    • Steel and Composite Structures
    • /
    • v.47 no.5
    • /
    • pp.615-631
    • /
    • 2023
  • Steel corrosion induces structural deterioration of concrete-filled steel tubes (CFSTs), and any potential extreme action on a corroded CFST would pose a severe threat. This paper presents a comprehensive investigation on the lateral impact behaviour of CFSTs suffering from localised pitting corrosion damage. A refined finite element analysis model is developed for the simulation of locally corroded CFSTs subjected to lateral impact loads, which takes into account the strain rate effects on concrete and steel materials as well as the random nature of corrosion pits, i.e., the distribution patterns and the geometric characteristics. Full-range nonlinear analysis on the lateral impact behaviour in terms of loading and deforming time-history relations, nonlinear material stresses, composite actions, and energy dissipations are presented for CFSTs with no corrosion, uniform corrosion and pitting corrosion, respectively. Localised pitting corrosion is found to pose a more severe deterioration on the lateral impact behaviour of CFSTs due to the plastic deformation concentration, the weakened confinement and the reduction in energy absorption capacity of the steel tube. An extended parametric study is then carried out to identify the influence of the key parameters on the lateral impact behaviour of CFSTs with localised pitting corrosion. Finally, simplified design methods considering the features of pitting corrosion are proposed to predict the dynamic flexural capacity of locally pitted CFSTs subjected to lateral impact loads, and reasonable accuracy is obtained.

A Model for Power Quality Control Mechanism for Electric Power Market (전력시장체제하에서의 전력품질제어 메커니즘에 대한 모델링)

  • 이근준
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.7
    • /
    • pp.381-386
    • /
    • 2003
  • To provide a specified power quality under electric market system is becoming an important issue for customers and utility company. However, there is no realistic infra-structure to design a power system for the specified power quality. Present electric market is operating under the economic point of view. The low power price could be attractive, but the effect of low price could result the lower power quality for the long time and threat power system security. This paper presents a model which conceptualize the dynamic power quality control mechanism to minimize total cost of a society which is affected electric power quality. This model aims to produce a basic infra-structure to balance cost and quality under the electric market system.

Efficient Anonymous Broadcast Encryption with Adaptive Security

  • Zhou, Fu-Cai;Lin, Mu-Qing;Zhou, Yang;Li, Yu-Xi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4680-4700
    • /
    • 2015
  • Broadcast encryption is an efficient way to distribute confidential information to a set of receivers using broadcast channel. It allows the broadcaster to dynamically choose the receiver set during each encryption. However, most broadcast encryption schemes in the literature haven't taken into consideration the receiver's privacy protection, and the scanty privacy preserving solutions are often less efficient, which are not suitable for practical scenarios. In this paper, we propose an efficient dynamic anonymous broadcast encryption scheme that has the shortest ciphertext length. The scheme is constructed over the composite order bilinear groups, and adopts the Lagrange interpolation polynomial to hide the receivers' identities, which yields efficient decryption algorithm. Security proofs show that, the proposed scheme is both secure and anonymous under the threat of adaptive adversaries in standard model.

Modelling the dynamic response and failure modes of reinforced concrete structures subjected to blast and impact loading

  • Ngo, Tuan;Mendis, Priyan
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.269-282
    • /
    • 2009
  • Responding to the threat of terrorist attacks around the world, numerous studies have been conducted to search for new methods of vulnerability assessment and protective technologies for critical infrastructure under extreme bomb blasts or high velocity impacts. In this paper, a two-dimensional behavioral rate dependent lattice model (RDLM) capable of analyzing reinforced concrete members subjected to blast and impact loading is presented. The model inherently takes into account several major influencing factors: the progressive cracking of concrete in tension, the inelastic response in compression, the yielding of reinforcing steel, and strain rate sensitivity of both concrete and steel. A computer code using the explicit algorithm was developed based on the proposed lattice model. The explicit code along with the proposed numerical model was validated using experimental test results from the Woomera blast trial.

Simulation of Fault-Arc using EMTP (EMTP를 이용한 아크 사고의 모의)

  • Byun, S.H.;Choi, H.S.;Chae, J.B.;Kim, C.H.;Han, K.N.;Kim, I.D.;Kim, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 1996.07b
    • /
    • pp.850-852
    • /
    • 1996
  • High impedance fault (HIF) is defined as fault that general overcurrent relay can't detect or interrupt, Especially when HIF occur under 15 kV, energized high voltage conductor results in fire hazard, equipment damage or personal threat. Because most HIF occur arc, HIF detection using arc is to increase. Numerical arc model can be applied in an electromagnetic transients program (EMTP) to reproduce the dynamic and random characteristic of arcs for any insulator arrangement, current and system voltage. It allows the representation of any network configuration to be investigated, so the digital simulation of arc faults through air can be substitute for demanding power arc test.

  • PDF

Future Trends of AI-Based Smart Systems and Services: Challenges, Opportunities, and Solutions

  • Lee, Daewon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.717-723
    • /
    • 2019
  • Smart systems and services aim to facilitate growing urban populations and their prospects of virtual-real social behaviors, gig economies, factory automation, knowledge-based workforce, integrated societies, modern living, among many more. To satisfy these objectives, smart systems and services must comprises of a complex set of features such as security, ease of use and user friendliness, manageability, scalability, adaptivity, intelligent behavior, and personalization. Recently, artificial intelligence (AI) is realized as a data-driven technology to provide an efficient knowledge representation, semantic modeling, and can support a cognitive behavior aspect of the system. In this paper, an integration of AI with the smart systems and services is presented to mitigate the existing challenges. Several novel researches work in terms of frameworks, architectures, paradigms, and algorithms are discussed to provide possible solutions against the existing challenges in the AI-based smart systems and services. Such novel research works involve efficient shape image retrieval, speech signal processing, dynamic thermal rating, advanced persistent threat tactics, user authentication, and so on.

Host-Pathogen Dialogues in Autophagy, Apoptosis, and Necrosis during Mycobacterial Infection

  • Jin Kyung Kim;Prashanta Silwal;Eun-Kyeong Jo
    • IMMUNE NETWORK
    • /
    • v.20 no.5
    • /
    • pp.37.1-37.15
    • /
    • 2020
  • Mycobacterium tuberculosis (Mtb) is an etiologic pathogen of human tuberculosis (TB), a serious infectious disease with high morbidity and mortality. In addition, the threat of drug resistance in anti-TB therapy is of global concern. Despite this, it remains urgent to research for understanding the molecular nature of dynamic interactions between host and pathogens during TB infection. While Mtb evasion from phagolysosomal acidification is a well-known virulence mechanism, the molecular events to promote intracellular parasitism remains elusive. To combat intracellular Mtb infection, several defensive processes, including autophagy and apoptosis, are activated. In addition, Mtb-ingested phagocytes trigger inflammation, and undergo necrotic cell death, potentially harmful responses in case of uncontrolled pathological condition. In this review, we focus on Mtb evasion from phagosomal acidification, and Mtb interaction with host autophagy, apoptosis, and necrosis. Elucidation of the molecular dialogue will shed light on Mtb pathogenesis, host defense, and development of new paradigms of therapeutics.

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.