• 제목/요약/키워드: Dynamic Threat

검색결과 80건 처리시간 0.023초

Ambient Vibration measurements and finite element modelling for the Hong Kong Ting Kau Bridge

  • Au, F.T.K.;Tham, L.G.;Lee, P.K.K.;Su, C.;Han, D.J.;Yan, Q.S.;Wong, K.Y.
    • Structural Engineering and Mechanics
    • /
    • 제15권1호
    • /
    • pp.115-134
    • /
    • 2003
  • The Ting Kau Bridge in Hong Kong is a cable-stayed bridge comprising two main spans and two side spans. The bridge deck is supported by three towers, an end pier and an abutment. Each of the three towers consists of a single reinforced concrete mast which reduces its section in steps, and it is strengthened by transverse cables and struts in the transverse vertical plane. The bridge deck is supported by four inclined planes of cables emanating from anchorages at the tower tops. In view of the threat from typhoons, the dynamic behaviour of long-span cable-supported bridges in the region is always an important consideration in their design. This paper is devoted to the ambient vibration measurements of the bridge for evaluation of dynamic characteristics including the natural frequencies and mode shapes. It also describes the modelling of the bridge. A few finite element models are developed and calibrated to match with the field data and the results of subsequent structural health monitoring of the bridge.

Effect of fly ash and plastic waste on mechanical and durability properties of concrete

  • Paliwal, Gopal;Maru, Savita
    • Advances in concrete construction
    • /
    • 제5권6호
    • /
    • pp.575-586
    • /
    • 2017
  • The disposal of polythene waste and fly ash is causing serious threat to the environment. Aim of this study is to decrease environmental pollution by using polythene waste and fly ash in concrete. In this study, cement was partially replaced with 0%, 5%, 10%, 15% and 20% fly ash (by weight) and plastic waste was added in shredded form at 0.6% by weight of concrete. The specimens were prepared for the concrete mix of M25 grade and water to cementitious material ratio (w/c) was maintained as 0.45. Fresh concrete property like workability was examined during casting the specimens. Hardened properties were found out by carrying out the experimental work on cubes, cylinders and beams which were cast in laboratory and their behavior under test were observed at 7 & 28 days for compressive strength and at 28 days for density, flexural strength, dynamic modulus of elasticity, abrasion resistance, water permeability and impact resistance. Overall results of this study show that addition of 0.6% (by weight of the concrete) plastic waste with 10% (by weight of cement) replacement of cement by fly ash result an improvement in properties of the concrete than conventional mix.

Lateral impact behaviour of concrete-filled steel tubes with localised pitting corrosion

  • Gen Li;Chao Hou;Luming Shen;Chuan-Chuan Hou
    • Steel and Composite Structures
    • /
    • 제47권5호
    • /
    • pp.615-631
    • /
    • 2023
  • Steel corrosion induces structural deterioration of concrete-filled steel tubes (CFSTs), and any potential extreme action on a corroded CFST would pose a severe threat. This paper presents a comprehensive investigation on the lateral impact behaviour of CFSTs suffering from localised pitting corrosion damage. A refined finite element analysis model is developed for the simulation of locally corroded CFSTs subjected to lateral impact loads, which takes into account the strain rate effects on concrete and steel materials as well as the random nature of corrosion pits, i.e., the distribution patterns and the geometric characteristics. Full-range nonlinear analysis on the lateral impact behaviour in terms of loading and deforming time-history relations, nonlinear material stresses, composite actions, and energy dissipations are presented for CFSTs with no corrosion, uniform corrosion and pitting corrosion, respectively. Localised pitting corrosion is found to pose a more severe deterioration on the lateral impact behaviour of CFSTs due to the plastic deformation concentration, the weakened confinement and the reduction in energy absorption capacity of the steel tube. An extended parametric study is then carried out to identify the influence of the key parameters on the lateral impact behaviour of CFSTs with localised pitting corrosion. Finally, simplified design methods considering the features of pitting corrosion are proposed to predict the dynamic flexural capacity of locally pitted CFSTs subjected to lateral impact loads, and reasonable accuracy is obtained.

전력시장체제하에서의 전력품질제어 메커니즘에 대한 모델링 (A Model for Power Quality Control Mechanism for Electric Power Market)

  • 이근준
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제52권7호
    • /
    • pp.381-386
    • /
    • 2003
  • To provide a specified power quality under electric market system is becoming an important issue for customers and utility company. However, there is no realistic infra-structure to design a power system for the specified power quality. Present electric market is operating under the economic point of view. The low power price could be attractive, but the effect of low price could result the lower power quality for the long time and threat power system security. This paper presents a model which conceptualize the dynamic power quality control mechanism to minimize total cost of a society which is affected electric power quality. This model aims to produce a basic infra-structure to balance cost and quality under the electric market system.

Efficient Anonymous Broadcast Encryption with Adaptive Security

  • Zhou, Fu-Cai;Lin, Mu-Qing;Zhou, Yang;Li, Yu-Xi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4680-4700
    • /
    • 2015
  • Broadcast encryption is an efficient way to distribute confidential information to a set of receivers using broadcast channel. It allows the broadcaster to dynamically choose the receiver set during each encryption. However, most broadcast encryption schemes in the literature haven't taken into consideration the receiver's privacy protection, and the scanty privacy preserving solutions are often less efficient, which are not suitable for practical scenarios. In this paper, we propose an efficient dynamic anonymous broadcast encryption scheme that has the shortest ciphertext length. The scheme is constructed over the composite order bilinear groups, and adopts the Lagrange interpolation polynomial to hide the receivers' identities, which yields efficient decryption algorithm. Security proofs show that, the proposed scheme is both secure and anonymous under the threat of adaptive adversaries in standard model.

Modelling the dynamic response and failure modes of reinforced concrete structures subjected to blast and impact loading

  • Ngo, Tuan;Mendis, Priyan
    • Structural Engineering and Mechanics
    • /
    • 제32권2호
    • /
    • pp.269-282
    • /
    • 2009
  • Responding to the threat of terrorist attacks around the world, numerous studies have been conducted to search for new methods of vulnerability assessment and protective technologies for critical infrastructure under extreme bomb blasts or high velocity impacts. In this paper, a two-dimensional behavioral rate dependent lattice model (RDLM) capable of analyzing reinforced concrete members subjected to blast and impact loading is presented. The model inherently takes into account several major influencing factors: the progressive cracking of concrete in tension, the inelastic response in compression, the yielding of reinforcing steel, and strain rate sensitivity of both concrete and steel. A computer code using the explicit algorithm was developed based on the proposed lattice model. The explicit code along with the proposed numerical model was validated using experimental test results from the Woomera blast trial.

EMTP를 이용한 아크 사고의 모의 (Simulation of Fault-Arc using EMTP)

  • 변성현;최해술;채종병;김철환;한경남;김일동;김영한
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1996년도 하계학술대회 논문집 B
    • /
    • pp.850-852
    • /
    • 1996
  • High impedance fault (HIF) is defined as fault that general overcurrent relay can't detect or interrupt, Especially when HIF occur under 15 kV, energized high voltage conductor results in fire hazard, equipment damage or personal threat. Because most HIF occur arc, HIF detection using arc is to increase. Numerical arc model can be applied in an electromagnetic transients program (EMTP) to reproduce the dynamic and random characteristic of arcs for any insulator arrangement, current and system voltage. It allows the representation of any network configuration to be investigated, so the digital simulation of arc faults through air can be substitute for demanding power arc test.

  • PDF

Future Trends of AI-Based Smart Systems and Services: Challenges, Opportunities, and Solutions

  • Lee, Daewon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.717-723
    • /
    • 2019
  • Smart systems and services aim to facilitate growing urban populations and their prospects of virtual-real social behaviors, gig economies, factory automation, knowledge-based workforce, integrated societies, modern living, among many more. To satisfy these objectives, smart systems and services must comprises of a complex set of features such as security, ease of use and user friendliness, manageability, scalability, adaptivity, intelligent behavior, and personalization. Recently, artificial intelligence (AI) is realized as a data-driven technology to provide an efficient knowledge representation, semantic modeling, and can support a cognitive behavior aspect of the system. In this paper, an integration of AI with the smart systems and services is presented to mitigate the existing challenges. Several novel researches work in terms of frameworks, architectures, paradigms, and algorithms are discussed to provide possible solutions against the existing challenges in the AI-based smart systems and services. Such novel research works involve efficient shape image retrieval, speech signal processing, dynamic thermal rating, advanced persistent threat tactics, user authentication, and so on.

Host-Pathogen Dialogues in Autophagy, Apoptosis, and Necrosis during Mycobacterial Infection

  • Jin Kyung Kim;Prashanta Silwal;Eun-Kyeong Jo
    • IMMUNE NETWORK
    • /
    • 제20권5호
    • /
    • pp.37.1-37.15
    • /
    • 2020
  • Mycobacterium tuberculosis (Mtb) is an etiologic pathogen of human tuberculosis (TB), a serious infectious disease with high morbidity and mortality. In addition, the threat of drug resistance in anti-TB therapy is of global concern. Despite this, it remains urgent to research for understanding the molecular nature of dynamic interactions between host and pathogens during TB infection. While Mtb evasion from phagolysosomal acidification is a well-known virulence mechanism, the molecular events to promote intracellular parasitism remains elusive. To combat intracellular Mtb infection, several defensive processes, including autophagy and apoptosis, are activated. In addition, Mtb-ingested phagocytes trigger inflammation, and undergo necrotic cell death, potentially harmful responses in case of uncontrolled pathological condition. In this review, we focus on Mtb evasion from phagosomal acidification, and Mtb interaction with host autophagy, apoptosis, and necrosis. Elucidation of the molecular dialogue will shed light on Mtb pathogenesis, host defense, and development of new paradigms of therapeutics.

효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석 (Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD)

  • 이민철;김정호
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제4권9호
    • /
    • pp.271-282
    • /
    • 2015
  • 비즈니스 환경에서 BYOD(Bring Your Own Device) 활용은 지속적으로 확대되고 있다. 시스코(Cisco)는 2012년 600개 기업을 대상으로 BYOD 활용에 관한 설문조사를 실시했다. 조사 결과 95%의 기업에서 이미 BYOD 사용을 허용하고 있으며, 업무 생산성이 향상된 것으로 나타났다. 가트너(Gartner)는 BYOD 도입으로 보안위협이 증가할 것으로 예측했으며, 보안위협 완화 방안으로 네트워크 접근통제(Network Access Control, NAC) 도입을 제안했다. 또한 접근통제 중요도에 따라 네트워크 영역을 나누고, 사용자 역할과 단말기 유형을 고려하여 접근통제 정책을 상세히 정의하고, 네트워크에 연결된 모든 단말기에 강제로 적용할 것을 주장했다. 본 논문에서는 IEEE 802.1X와 DHCP 핑거프린팅(fingerprinting)을 응용하여 네트워크 접근통제를 설계 구현하고, BYOD 환경에 적용하여 접근통제 성능을 해석하고자 한다.