• Title/Summary/Keyword: Individual code

Search Result 292, Processing Time 0.028 seconds

Numerical model of a tensioner system and riser guide

  • Huang, Han;Zhang, Jun;Zhu, Liyun
    • Ocean Systems Engineering
    • /
    • v.3 no.4
    • /
    • pp.257-273
    • /
    • 2013
  • Top tensioned riser (TTR) is often used in a floating oil/gas production system deployed in deep water for oil/gas transport. This study focuses on the extension of the existing numerical code, known as CABLE3D, to allow for static and dynamic simulation of a TTR connected to a floating structure through a tensioner system or buoyancy can, and restrained by riser guides at different elevations. A tensioner system usually consists of three to six cylindrical tensioners. Although the stiffness of individual tensioner is assumed to be linear, the resultant stiffness of a tensioner system may be nonlinear. The vertical friction between a TTR and the hull at its riser guide is neglected assuming rollers are installed there. Near the water surface, a TTR is forced to move horizontally due to the motion of the upper deck of a floating structure as well as related riser guides. The extended CABLE3D is then integrated into a numerical code, known as COUPLE, for the simulation of the dynamic interaction among the hull of a floating structure, such as spar or TLP, its mooring system and riser system under the impact of wind, current and waves. To demonstrate the application of the extended CABLE3D and its integration with COUPLE, the numerical simulation is made for a truss spar under the impact of Hurricane "Ike". The mooring system of the spar consists of nine mooring lines and the riser system consists of six TTRs and two steel catenary risers (SCRs).

A Study on the Acquisition of Usage Statistics based on SUSHI Project (SUSHI 기반 학술정보 이용통계 수집 모델 연구)

  • Kim, Sun-Tae;Lim, seok-Jong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.35-39
    • /
    • 2007
  • Recently Usage statistics are widely available from online content providers. However. the statistics are not yet available in a consistent data container and the administrative cost of individual provider-by-provider downloads is high. The Standardized Usage Statistics Harvesting Initiative (SUSHI) is developing an automated request and response protocol for moving Project COUNTER (Counting Online Usage of Networked Electronic Resources) Code of Practice usage statistics from providers to library electronic repositories. SUSHI will help libraries make better decisions by reducing the administrative overhead of using Project COUNTER statistics. Publishers in the recording and exchange of usage statistics for electronic resources, initially journals and databases. By following COUNTER's Code of Practice, vendors can provide library customers with Excel or CSV (comma delimited) files of usage data using COUNTER's standardized formats and data elements. The result is a consistent, credible, and compatible set of usage data from multiple content providers. On this study, We propose the acquisition model of usage data based on SUSHI for KESLI that is overseas electronic journal consortium in korea.

  • PDF

Design and Implementation of DHCP Supporting Network Attack Prevention (네트워크 공격 방지를 지원하는 DHCP의 설계 및 구현에 관한 연구)

  • Yoo, Kwon-joeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.747-754
    • /
    • 2016
  • DHCP(Dynamic Host Configuration Protocol) is a protocol for efficiency and convenience of the IP address management. DHCP automatically assigns an IP address and configuration information needed to run the TCP/IP communication to individual host in the network. However, existing DHCP is vulnerable for network attack such as DHCP spoofing, release attack because there is no mutual authentication systems between server and client. To solve this problem, we have designed a new DHCP protocol supporting the following features: First, ECDH(Elliptic Curve Diffie-Hellman) is used to create session key and ECDSA(Elliptic Curve Digital Signature Algorithm) is used for mutual authentication between server and client. Also this protocol ensures integrity of message by adding a HMAC(Hash-based Message Authentication Code) on the message. And replay attacks can be prevented by using a Nonce. As a result, The receiver can prevent the network attack by discarding the received message from unauthorized host.

The Evaluation of Method for Computerization of Clinical Informations of the Patients of the Department of Thoracic and Cardiovascular Surgery - About the practical method of coding and standardization of the structure of the database file(DBF) - (흉부외과환자 임상정보의 전산화 방법에 대한 고찰;데이터베이스 파일(DBF) 구조의 표준화및 코딩화 방안에 대하여)

  • Song, U-Cheol;Kim, Byeong-Ju;Hong, Gi-U
    • Journal of Chest Surgery
    • /
    • v.25 no.10
    • /
    • pp.989-1000
    • /
    • 1992
  • The concepts of modern type computer are so called "General purpose, stored program and digital computer" that is proposed by Charles Babbage. ENIAC, the initial operational electronic digital computer model, was produced in 1946. During the last 50 years, an epoch-making development of the personal computer was marked. The computerization of all levels of society is going on and also computerization of the general hospital and medical college is developing. But patient data management system for clinician is not used generally. We suggest the use of computer aided data management application programs for the clinical informations of the patients of the Department of Thoracic and Cardiovascular Surgery for better management and to make best of medical informations, to co-operate with the current of this times, and to prepare against the Hospital Information Systems[HIS], actively. Also, we suggest to standardize the format and structure of database files to store the clinical data of the patients By standardization of the database files, we can integrate and relate the data of the individual department or hospital, build up the regional or national statistics of the patients easily, and promote the generation of application programs. The medical network by the communication and computer would be utilized to collect the database files. And finally, we suggest the use of code system to input and search the informations about the diagnosis and operation such as the code system of International Classfication of Disease[WHO] and the table of the classfication of operation of the Ministry of Health and Social Affairs, Korea. In this article, we tried to show the new standards, the essential items for computerization of clinical informations of the patients of the Department of Thoracic and Cardiovascular Surgery.r Surgery.

  • PDF

Attorney's Duty to Protect Personal Information (변호사의 개인정보 보호의무)

  • Hah, Jung Chul
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.1-10
    • /
    • 2014
  • In February 2014 Korean Bar Association has amended Professional Ethics Code as to stipulate attorney's duty to protect personal information. While existing Korean law and Professional Ethics Code has made attorney to keep client's confidential information, attorney's newly promulgated obligation has its meaning in that personal information of subject other than client is not protected through confidentiality rules, given that confidentiality obligation is interpreted to protect only client's information relating to representation. Moreover, duty to protect personal information deals with not only disclosure and use of information, which confidentiality rules is about, but also collection and retention process, access to and correction and care of information and even destruction of information. Amid unprecedented theft of personal data in several national banks and other serious leakage reported recently, this paper is going to contemplate the scope and application of the duty to protect personal information with hope to contribute to starting discussion on it.

The Study on RFID Traceability System for Animal Identification (동물식별 개체이력정보 추적을 위한 RFID 검색 시스템 구현에 관한 연구)

  • Paek, Min-Ho;Ko, Sung-Seok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.1
    • /
    • pp.116-123
    • /
    • 2008
  • Food and Agriculture Organization (FAO) and many countries make an effort to conserve and utilization of animal genetic resources to prepare for our unpredictable future. In order to protect the customer and the producer from the animal diseases and unjust distribution, many country seek to appropriate solution. Among the solutions, RFID technology can be used as a basic technology, since this technology can be applied in the conservancy and utilization of animal genetic resources, object management for improved animal and traceability of animal's distribution flow. There are two main issues in making the efficient RFID environment. The first issue is the standardization of code system for object identification. International Organization for Standard (ISO) published the standard which regulates RFID of animal (ISO 11784 and ISO 11785). Based on these standards, many countries have tried to establish their national standard. In Korea, National Institute of Animal Science (NIAS) playa main role in establishing the standard of object identification code based on ISO 11784. Even though the standard format of object's identification is well established, the RFID system may not be operated well without the standardization of RFID network and related equipment. In Korea, National Internet Development Agency of Korea (NIDA) has proposed the RFID Network at 2006, which can be applied in the different kind of system at each phase. But, the implementation case of this RFID Network does not reported yet, since many company or agency who introduce RFID technology, implemented as an isolated individual system. In our study, we show that RFID network can be utilized for any kind of system at each phase, and propose the improvement point in order to be widely used.

A Multiple Database-Enabled Design Module with Embedded Features of International Codes and Standards

  • Kwon, Dae Kun;Kareem, Ahsan
    • International Journal of High-Rise Buildings
    • /
    • v.2 no.3
    • /
    • pp.257-269
    • /
    • 2013
  • This study presents the development of an advanced multiple database-enabled design module for high-rise buildings (DEDM-HR), which seamlessly pools databases of multiple high frequency base balance measurements from geographically dispersed locations and merges them together to expand the number of available building configurations for the preliminary design. This feature offers a new direction for the research and professional communities that can be utilized to efficiently pool multiple databases therefore expanding the capability of an individual database and improving the reliability of design estimates. This is demonstrated, in this study, by the unprecedented fusion of two major established databases, which facilitates interoperability. The DEDM-HR employs a cyberbased on-line framework designed with user-friendly/intuitive web interfaces for the convenient estimation of wind-induced responses in the alongwind, acrosswind and torsional directions with minimal user input. In addition, the DEDM-HR embeds a novel feature that allows the use of wind characteristics defined in a code/standard to be used in conjunction with the database. This supplements the provisions of a specific code/standard as in many cases guidance on the acrosswind and torsional response estimates is lacking. Through an example, results from several international codes and standards and the DEDM-HR with the embedded features are compared. This provision enhances the scope of the DEDM-HR in providing an alternative design tool with nested general provisions of various international codes and standards.

Color Code Detection and Recognition Using Image Segmentation Based on k-Means Clustering Algorithm (k-평균 클러스터링 알고리즘 기반의 영상 분할을 이용한 칼라코드 검출 및 인식)

  • Kim, Tae-Woo;Yoo, Hyeon-Joong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1100-1105
    • /
    • 2006
  • Severe distortions of colors in the obtained images have made it difficult for color codes to expand their applications. To reduce the effect of color distortions on reading colors, it will be more desirable to statistically process as many pixels in the individual color region as possible, than relying on some regularly sampled pixels. This process may require segmentation, which usually requires edge detection. However, edges in color codes can be disconnected due tovarious distortions such as zipper effect and reflection, to name a few, making segmentation incomplete. Edge linking is also a difficult process. In this paper, a more efficient approach to reducing the effect of color distortions on reading colors, one that excludes precise edge detection for segmentation, was obtained by employing the k-means clustering algorithm. And, in detecting color codes, the properties of both six safe colors and grays were utilized. Experiments were conducted on 144, 4M-pixel, outdoor images. The proposed method resulted in a color-code detection rate of 100% fur the test images, and an average color-reading accuracy of over 99% for the detected codes, while the highest accuracy that could be achieved with an approach employing Canny edge detection was 91.28%.

  • PDF

Estimating uncertainty in limit state capacities for reinforced concrete frame structures through pushover analysis

  • Yu, Xiaohui;Lu, Dagang;Li, Bing
    • Earthquakes and Structures
    • /
    • v.10 no.1
    • /
    • pp.141-161
    • /
    • 2016
  • In seismic fragility and risk analysis, the definition of structural limit state (LS) capacities is of crucial importance. Traditionally, LS capacities are defined according to design code provisions or using deterministic pushover analysis without considering the inherent randomness of structural parameters. To assess the effects of structural randomness on LS capacities, ten structural parameters that include material strengths and gravity loads are considered as random variables, and a probabilistic pushover method based on a correlation-controlled Latin hypercube sampling technique is used to estimate the uncertainties in LS capacities for four typical reinforced concrete frame buildings. A series of ten LSs are identified from the pushover curves based on the design-code-given thresholds and the available damage-controlled criteria. The obtained LS capacities are further represented by a lognormal model with the median $m_C$ and the dispersion ${\beta}_C$. The results show that structural uncertainties have limited influence on $m_C$ for the LSs other than that near collapse. The commonly used assumption of ${\beta}_C$ between 0.25 and 0.30 overestimates the uncertainties in LS capacities for each individual building, but they are suitable for a building group with moderate damages. A low uncertainty as ${\beta}_C=0.1{\sim}0.15$ is adequate for the LSs associated with slight damages of structures, while a large uncertainty as ${\beta}_C=0.40{\sim}0.45$ is suggested for the LSs near collapse.

The development of encoded porous silicon nanoparticles and application to forensic purpose (코드화 다공성 실리콘 나노입자의 개발 및 법과학적 응용)

  • Shin, Yeo-Ool;Kang, Sanghyuk;Lee, Joonbae;Paeng, Ki-Jung
    • Analytical Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.247-253
    • /
    • 2009
  • Porous silicon films are electrochemically etched from crystalline silicon wafers in an aqueous solution of hydrofluoric acid(HF). Careful control of etching conditions (current density, etch time, HF concentration) provides films with precise, reproducible physical parameters (morphology, porosity and thickness). The etched pattern could be varied due to (1) current density controls pore size (2) etching time determines depth and (3) complex layered structures can be made using different current profiles (square wave, triangle, sinusoidal etc.). The optical interference spectrum from Fabry-Perot layer has been used for forensic applications, where changes in the optical reflectivity spectrum confirm the identity. We will explore a method of identifying the specific pattern code and can be used for identities of individual code with porous silicon based encoded nanosized smart particles.