• Title/Summary/Keyword: Investigation codes

Search Result 180, Processing Time 0.024 seconds

A Standard Investigation of Commonly Used Data codes at National R&D-related Databases (국가 R&D 관련 데이터베이스에서 공통적으로 사용되는 데이터 코드의 표준 선행조사)

  • Lee, Byeong-Hee;Kim, Yun-Jeong;Chung, Taik-Yeong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.647-651
    • /
    • 2006
  • For the standardization of data codes at national R&D related organizations, this paper surveys commonly used data codes in national R&D-related databases and presents their standard investigations. The survey says the total number of the data codes in the four major R&D related organizations is 340. Among the 340, 150 data codes are general and interconnected. This paper classifies the 150 data codes into 18 ones by code meanings and checks the standard investigation of the 18 ones.

  • PDF

Design and Investigation of new composite code (새로운 주기 확장된 코드에 관한 연구)

  • 임지형;김운경;이경록
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.61-64
    • /
    • 2000
  • There are many methods of generating PN sequences. In this paper, we propose and examine a new class of composite shift register to generate PN sequences. The new composite generator, in comparison with the original LFSR which generates PN codes of period 2$^n$-1, when coupled with codes of period k, generates PN codes with (longer) period LCM(2$^n$-1,k).

  • PDF

Study of wind tunnel test results of high-rise buildings compared to different design codes

  • Badri, Abdulmonem A.;Hussein, Manar M.;Attia, Walid A.
    • Wind and Structures
    • /
    • v.20 no.5
    • /
    • pp.623-642
    • /
    • 2015
  • Several international codes have been developed for evaluating wind loads on structures; however, the wind structure interaction could not be accurately captured by these codes due to the gusty nature of wind and the dynamic behavior of structures. Therefore, the alternative wind tunnel testing was introduced. In this study, an introduction to the available approaches for wind load calculations for tall buildings was presented. Then, a comparative study between different codes: the Egyptian code, ECP 201-08, ASCE 7-05, BS 6399-2, and wind tunnel test results was conducted. An investigation has been carried out on two case studies tall buildings located within the Arabian Gulf region. Numerical models using (ETABS) software were produced to obtain the relation between codes analytical values and wind tunnel experimental test results for wind loads in the along and across wind directions. Results for the main structural responses including stories forces, shears, overturning moments, lateral displacements, and drifts were presented graphically in order to give clear comparison between the studied methods. The conclusions and recommendations for future works obtained from this research are finally presented to help improving Egyptian code provisions and show limitations for different cases.

Investigation into shear properties of medium strength reinforced concrete beams

  • Shah, Attaullah;Ahmad, Saeed;Khan, Salimullah
    • Structural Engineering and Mechanics
    • /
    • v.35 no.3
    • /
    • pp.265-282
    • /
    • 2010
  • The shear contribution of transverse steel in reinforced concrete beams is generally assumed as independent of the concrete strength by most of the building codes. The shear strength of RC beams with web reinforcement is worked out by adding the individual contributions of concrete and stirrups. In this research 70 beams of medium strength concrete in the range of 52-54 MPa, compressive strength were tested in two sets of 35 beams each. In one set of 35 beams no web reinforcement was used, whereas in second set of 35 beams web reinforcement was used to check the contribution of stirrups. The values have also been compared with the provisions of ACI, Eurocode and Japanese Code building codes. The results of two sets of beams, when compared mutually and provisions of the building codes, showed that the shear strength of beams has been increased with the addition of stirrups for all the beams, but the increase is non uniform and irregular. The comparison of observed values with the provisions of selected codes has shown that EC-02 is relatively less conservative for low values of longitudinal steel, whereas ACI-318 overestimates the shear strength of RC beams at higher values of longitudinal steel. The Japanese code of JSCE has given relatively good results for the beams studied.

Post-earthquake fire performance-based behavior of reinforced concrete structures

  • Behnama, Behrouz;Ronagh, Hamid R.
    • Earthquakes and Structures
    • /
    • v.5 no.4
    • /
    • pp.379-394
    • /
    • 2013
  • Post-earthquake fire (PEF) can lead to a rapid collapse of buildings damaged partially as a result of prior earthquake. Almost all standards and codes for the design of structures against earthquake ignore the risk of PEF, and thus buildings designed using those codes could be too weak when subjected to a fire after an earthquake. An investigation based on sequential analysis inspired by FEMA356 is performed here on the Immediate Occupancy, Life Safety and Collapse Prevention performance levels of structures, designed to the ACI 318-08 code, after they are subjected to an earthquake level with PGA of 0.35g. This investigation is followed by a fire analysis of the damaged structures, examining the time taken for the damaged structures to collapse. As a point of reference, a fire analysis is also performed for undamaged structures and before the occurrence of earthquake. The results indicate that the vulnerability of structures increases dramatically when a previously damaged structure is exposed to PEF. The results also show that the damaging effects of post-earthquake fire are exacerbated when initiated from the second and third floor. Whilst the investigation is made for a certain class of structures (conventional buildings, intermediate reinforced structure, 3 stories), the results confirm the need for the incorporation of post-earthquake fire into the process of analysis and design, and provides some quantitative measures on the level of associated effects.

An Analysis of Blasting Accidents by Fault Tree Analysis (Fault Tree Analysis 기법을 이용한 발파사고 분석)

  • Seo, Seung-Rok;Lee, Jeong-Hun
    • Journal of the Ergonomics Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.61-76
    • /
    • 2001
  • This study is for analyzing the explosion accidents in the tunnels, roads, subways, streets and various kinds of building construction area with the use of Fault Tree Analysis(FTA). based on the police Department and Guns & Explosives Safety Technology Association's researching materials. the explosion accidents have been investigated and analyzed between 1988 and 1977. As the result, we can find out that the majority of the explosion accidents in Korea is the accidents by flown stones(45.7%), like in Japan. So we make the research chart which is needed for analyzing the explosion accident, and then analyze these accidents systematically. using the investigation codes of the industrial accidents. After that, the FTA was performed on the accidents by flown stones. They result fromm non-observance of the safety rules, and lees knowledge of the safety and so on. Moreover several causes are combined and then the accidents are apt to happen. So according to the results of this study, for the protection of the explosion accidents, the specialized safety education is badly needed and the enough investigation of the places before the work along with the management for safety in working must be planned.

  • PDF

Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C (Rustock B형과 C형의 감염절차 분석 및 은닉파일 추출)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.41-53
    • /
    • 2012
  • The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

The design of reinforced concrete beams for shear in current practice: A new analytical model

  • Londhe, R.S.
    • Structural Engineering and Mechanics
    • /
    • v.31 no.2
    • /
    • pp.225-235
    • /
    • 2009
  • The present paper reviews the shear design (of reinforced concrete beam) provisions of four different national codes and proposes a new but simplified shear strength empirical expression, incorporating variables such as compressive strength of concrete, percentage of longitudinal and vertical steel/s, depth of beam in terms of shear span-to-depth ratio, for reinforced concrete (RC) beams without shear reinforcement. The expression is based on the experimental investigation on RC beams without shear reinforcement. Further, the comparisons of shear design provisions of four National codes viz.: (i) IS 456-2000, (iii) BS 8110-1997, (iv) ACI 318-2002 (v) EuroCode-2-2002 and the proposed expression for the prediction of shear capacity of normal beam/s, have been made by solving a numerical example. The results of the numerical example worked out suggest that there is need for revision in the shear design procedure of different codes. Also, the proposed expression is less conservative among the IS, BS & Eurocode.

A Basic Study of Automatic Estimation Algorithm on the Rebar Length of Beam by Using BIM-Based Shape Codes Built in Revit (BIM 기반 형상코드를 이용한 보 철근길이 자동 산장 기초 연구)

  • Widjaja, Daniel Darma;Kim, Sunkuk
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.05a
    • /
    • pp.167-168
    • /
    • 2023
  • Construction of reinforced concrete structures required massive amounts of concrete and steel rebar. The current procedure to estimate the quantity of rebar requires tedious and time-consuming manual labor. Consequently, this circumstance made the engineers vulnerable to error and mistake, which led to the rebar waste. No system that is capable of automatically calculating rebar length has yet been developed Thus, this study proposes a preliminary investigation of automatic rebar length estimation of beam element by using BIM-based shape codes drawn in Revit. Beam is chosen due to its complexity in the rebar arrangement. In addition, the development of this study could assist engineers on the construction site and effectively contribute to the minimization of rebar waste in the future.

  • PDF