• Title/Summary/Keyword: Flaw Analysis

Search Result 156, Processing Time 0.022 seconds

ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET

  • Seo, Jae-Hong;Yoon, Hyo-Jin;Lim, Seong-An;Cheon, Jung-Hee;Hong, Do-Won
    • Journal of the Korean Mathematical Society
    • /
    • v.46 no.1
    • /
    • pp.59-69
    • /
    • 2009
  • The element reduction of a multiset S is to reduce the number of repetitions of an element in S by a predetermined number. Privacy-preserving element reduction of a multiset is an important tool in private computation over multisets. It can be used by itself or by combination with other private set operations. Recently, an efficient privacy-preserving element reduction method was proposed by Kissner and Song [7]. In this paper, we point out a mathematical flaw in their polynomial representation that is used for the element reduction protocol and provide its correction. Also we modify their over-threshold set-operation protocol, using an element reduction with the corrected representation, which is used to output the elements that appear over the predetermined threshold number of times in the multiset resulting from other privacy-preserving set operations.

A Numerical Study on the Flow Characteristics of Temperature Control Valve by Pressure Compensation (압력 평형식 온도조절 밸브 내부 유동 특성에 대한 수치적 연구)

  • Hwang, J.H.;Kim, T.A.;Kim, Youn-J.
    • 유체기계공업학회:학술대회논문집
    • /
    • 2005.12a
    • /
    • pp.448-453
    • /
    • 2005
  • Temperature Control Valve (TCV) is one of the useful temperature control devices, which is used to control constant temperature of working fluid in power and chemical plants and domestic water supply systems. TCV is composed of body, cylinder and piston, and the body shape has a symmetrical H-type. In general, it has several inlet and outlet holes, and its shape is like as tubular sleeve. The piston has three rings two rings of the end of piston have the function of controlling inlet flow rate with hot and cold working fluids, the center ring has the function of preventing hot and cold water from intermixing. Consequently, the shapes of piston and cylinder are the main design parameters in the performance of TCV. In this study, numerical analyses were carried out with two different piston and cylinder shapes to investigate the functions as a temperature control valve and the flow characteristics according to piston opening grade in TCV. Using a commercial code, FLUENT, velocity and pressure fields in TCV are obtained under steady, standard $k -{\epsilon}$ turbulence model and no-slip condition.

  • PDF

Nondestructive Evaluation of the Defects in Composite-sintered Bushes Using Ultrasonics

  • Im, Kwang-Hee;Kim, Ki-Youl;Shin, Ki-Taek;Lee, Han-Hee;Jung, Il-Woong;Kang, To;Cho, Hyun-Joon
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.21 no.6
    • /
    • pp.1013-1017
    • /
    • 2012
  • Advanced composite-sintered bushings are widely utilized in the areas of excavators and injection molding machines as a journal bearing. Since the bearings are mainly used under high loads, service life should be long and the stored oil of inner bushings has to be continually fed into the bearing. The composite-sintered bushings are consisted of the two different materials; outer steel materials and inner porous sintered materials respectively. High temperature diffusion bonding has been applied for holding the both materials of the bushing together. Therefore, it is very important that the bonding reliability has to be assured and evaluated in manufacturing process. Finite element method (FEM) is performed in order to evaluate the minimum allowable flaw sizes that are possibly generated in the composite-sintered bushings. Additionally, the composite-sintered bushings were undergone ultrasonic C-scan tests to find out the size of inherent flaws through artificially simulated UT signal analysis.

Introducing a new all steel accordion force limiting device for space structures

  • Poursharifi, Maryam;Abedi, Karim;Chenaghlou, Mohammadreza;Fleischman, Robert B.
    • Structural Engineering and Mechanics
    • /
    • v.74 no.1
    • /
    • pp.69-82
    • /
    • 2020
  • A significant defect of space structures is the progressive collapse issue which may restrict their applicability. Force limiting devices (FLDs) have been designed to overcome this deficiency, though they don't operate efficiently in controlling the force displacement characteristics. To overcome this flaw, a new type of FLD is introduced in the present study. The "all steel accordion force limiting device" (AFLD) which consists of three main parts including cylindrical accordion solid core, tubular encasing and joint system is constructed and its behavior has been studied experimentally. To improve AFLD's behavior, Finite element analysis has been carried out by developing models in ABAQUS software. A comprehensive parametric study is done by considering the effective design parameters such as core material, accordion wave length and accordion inner diameter. From the results, it is found that AFLD can obtain a perfect control on the force-displacement characteristics as well as attaining the elastic-perfect plastic behavior. Obtaining higher levels of ultimate load carrying capacity, dissipated energy and ductility ratio can be encountered as the main privileges of this device. Ease of construction and erection are found to be further advantages of AFLD. Based on the obtained results, a procedure for predicting AFLD's behavior is offered.

A Study on the Risk Analysis of Construction Method (건축공법 내부 리스크 분석에 관한 연구)

  • Yoon, Yer-Wan;Yang, Keek-Young
    • Journal of the Korea Institute of Building Construction
    • /
    • v.2 no.4
    • /
    • pp.131-135
    • /
    • 2002
  • The purpose of this study was to Identification the Risk of construction method to protect and reduce the risk of construction period. For this study we are using the pre and during construction period Inspection list. The inspection list was used by construction company for check a flaw of Construction field. So we rearrange the individual item of inspection list to match the Risk factor. This inspection list usually has the difference of importance because this list is not made by Method which is not focused on Method. Therefore, To find the difference of these importance, We surveyed this matter by doing interview of specialist group. To find the application of field and the possibility of measurement of Risk status, We tested Risk occurring frequency and it's strength by checking the level of Risk. The results of this study were as follows; Each Method Check List made out through the rearrangement of Construction Inspection list which used in construction company. To solve and compensate the matter which happened by changing the each Method Check List to each General Inspection List, we added the each Method Check List by checking the importance of check list of each process. By doing this, The Check List for finding Risk level of Method was created by using the check list of each Method.

Robustness Analysis of Flash Memory Software using Fault Injection Tests (폴트 삽입 테스트를 이용한 플래시 메모리 소프트웨어의 강건성 분석)

  • Lee, Dong-Hee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.4
    • /
    • pp.305-311
    • /
    • 2005
  • Flash memory software running on cellular phones and PDAs need to be tested extensively to cope with abrupt power and media faults. For those tests, we designed and implemented a Flash memory emulator with fault injection features. The fault injection tester has provided a helpful framework for designing fault recovery schemes and also for analyzing fault damages to the FTL (Flash Translation Layer) and file system for a Flash memory based system. In this paper, we discuss Plash memory fault types and fault injection features implemented on this Flash memory emulator. We then discuss in detail a design flaw revealed during fault injection tests. Specifically, it was revealed that a scheme that was believed to improve reliability instead, turned out to be harmful. In addition, we discuss post-fault behaviors of the FTL and the file system.

Analysis of various composite patches effect on mechanical properties of notched Al-Mg plate

  • Meran, Ahmad P.;Samanci, Ahmet
    • Steel and Composite Structures
    • /
    • v.25 no.6
    • /
    • pp.685-692
    • /
    • 2017
  • In this study, the effect of various adhesively bonded composite patches on mechanical properties of notched Al-Mg alloy plates was analyzed. For this purpose firstly, the un-notched and notched specimens were fabricated from 5086 Al-Mg alloys which have been used in armor-plated military vehicles. The surface notches as a flaw were machined with circular cutting tool to form notch aspect ratio a/c=0.15 and notch-to-thickness ratios a/t=0.5 in the radial direction on the test specimens. Then, various composite patches which reinforced by glass, carbon and Kevlar fibers were bonded adhesively at elliptically surface notches. Finally, experimental measurements conducted by applying tensile static loading. The experimental results showed that repairing with composite patches with order of carbon, glass and Kevlar fibers have remarkable effect on tensile strength of the notched plate. Also the finite element models were developed using Abaqus/Explicit code to predict the tensile strength and elongation of unrepaired notched specimen and specimen repaired by carbon fiber composite patch. The comparison between numerical and experimental results showed good agreement between them and proved the accuracy of numerical modeling.

A Development of Analysis Tool and the Analysis of Vulnerabilities on the Program Source Code (프로그램 소스코드 취약성 분석 및 분석도구의 개발)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.27-34
    • /
    • 2004
  • The recent explosive use of the Internet and the development of computer communication technologies reveal serious computer security problem. Inspite of many studies on secure access to the system, generally, the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the Program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

Effect of tack of Fusion Defects on Short-Term Performance of Polyethylene Electrofusion Joints (폴리에틸렌 배관 전기융착부 단기성능 평가를 위한 융합물량 영향 평가)

  • Kil, Seong-Hee;Kwon, Jeong-Rock;Jo, Ji-Hwan
    • Journal of Energy Engineering
    • /
    • v.14 no.2 s.42
    • /
    • pp.153-158
    • /
    • 2005
  • In order to investigate the short-term performance of polyethylene electrofusion joints, the mechanical tests and stress analysis have been conducted to the artificially defected weld joints. The defects of lack of fusion with a square-type were fabricated with 10, 20, 30, 40, 50, 60$\%$ size of the width of heat-ing wire zone, respectively. In this defect sires range, both tensile and bending test results showed the dependence of defect size to the electrofusion joints performance, but both sustained pressure and crush test results didn't. The numerical stress analysis results including the soil and internal pressures, tensile and bend-ing stresses clearly showed the dependence of fusion defect size. Based on both mechanical test and stress analysis results, the maximum acceptable defect size in polyethylene electrofusion joints is discussed.

Numerical Analysis of Scattered Fields of Ultrasonic SH-Wave by Multi-Defects (재료내 다중결함에 의한 SH형 초음파 산란장의 수치해석)

  • Lee, Joon-Hyun;Lee, Seo-Il;Cho, Youn-Ho
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.18 no.4
    • /
    • pp.304-312
    • /
    • 1998
  • In order to assure the reliability and integrity of structures such as bridges, Power and petrochemical plants, nondestructive evaluation techniques are recently playing more important roles. Among the various kinds of nondestructive evaluation techniques, ultrasonic technique is one of the most widely used methods for nondestructive inspection of internal defects in structures. For the reliable quantitative evaluation of internal defects from the experimental ultrasonic signals, a numerical analysis of ultrasonic scattering field due to a defect distribution is absolutely required. In this paper, the SH-wave scattering by multi-cavity defects using elastodynamic boundary element method is studied. The effects of shape of defects on transmitted and reflected fields are considered. The interaction of multi-cavity defects in 50-wave scattering is also investigated. Numerical calculation by the boundary element method has been carried out to predict near field solution of scattered fields of ultrasonic SH-wave. The presented results would be useful to improve the sensitivity of flaw defection for inverse analysis and pursue quantitative nondestructive evaluation for inverse problem.

  • PDF