• Title/Summary/Keyword: MB Model

Search Result 220, Processing Time 0.029 seconds

A Vulnerability Analysis for Armored Fighting Vehicle based on SES/MB Framework using Importance of Component (구성 부품의 중요도를 활용한 SES/MB 프레임워크 기반 전차 취약성 분석)

  • Kim, Hun-Ki;Hwang, Hun-Gyu;Lee, Jang-Se
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.59-68
    • /
    • 2015
  • In this paper, we proposed a methodology of vulnerability analysis for armored fighting vehicle based on modeling and simulation. The SES/MB framework serves hierarchical representation of the structure for a complex systems and is easy to conduct modeling for the armored fighting vehicle which consists of various components. When the armored fighting vehicle is hit by the shots from threat, the vulnerability of the armored fighting vehicle is decreased by damaged or penetrated level of armors and components. The penetration is determined by the result of comparing a penetration energy through penetration analysis equation and defence ability of armor and components. And the defence ability is determined in accordance with type and defined property of normal component and armor component, all components have a weighted values for the degree of importance. We developed a simulation program for verification proposed methodology. Thus, the program analyzes vulnerability for armored fighting vehicle SES/MB framework using importance.

Structural Studies upon the Interactive Effects between Organic Dyestuffs and Polyelectrolytes (Ⅱ). The Interaction of Methylene Blue and Acridine Orange with Chondroitin Sulfate (유기색소분자와 고분자전해질 사이의 상호작용 효과에 관한 구조론적 연구 (II). Methylene Blue 및 Acridine Orange의 Chondroitin Sulfate와의 상호작용)

  • Chong Hoe Park;Moo Soon Park;Hong Lee
    • Journal of the Korean Chemical Society
    • /
    • v.31 no.4
    • /
    • pp.295-300
    • /
    • 1987
  • Spectroscopic studies have been carried out on the metachromatic behavior of methylene blue(MB) and acridine orange(AO) in the presence of chondroitin sulfate A(CSA) and chondroitin sulfate C(CSC). The characteristic changes of the meta-band with the changes of P/D value are discussed in terms of the stacking theory. Quantitative studies on the stacking effect are made to calculate the number of bound molecules of dye per unit molecule of the polyanion. The result shows that MB has stronger stacking effect than AO. A stacking model and the dimension of the bound dyes on the surface of the polyanion are proposed, on the basis of the dimer model of planar aromatic dyes and the most stable conformation of the CSA chain. The model is found to be reasonable in accordance with the experimental results.

  • PDF

Structural Studies upon the Interactive Effects between Organic Dyestuffs and Polyelectrolytes (I). The Stacking Effect of Methylene Blue and Acridine Orange (유기색소분자와 전해질고분자 사이의 상호작용 효과에 관한 구조론적 연구 (I). Methylene Blue 및 Acridine Orange의 Stacking 효과)

  • Chong Hoe Park;Dae Hyun Shin;Sock Sung Yun;Moo Soon Park;Hong Lee
    • Journal of the Korean Chemical Society
    • /
    • v.30 no.3
    • /
    • pp.289-295
    • /
    • 1986
  • Spectroscopic studies have been carried out on the metachromatic behavior of methylene blue(MB) and acridine orange(AO) in the presence of polyvinylsulfate(PVS) and polystyrenesulfonate(PSS) The characteristic changes of meta-band with the change of P/D value are discussed in terms of stacking theory. It has been found that the stacking effect in the PVS-dye system is stronger than that in the PSS-dye system and that MB shows stronger stacking effect than AO. A stacking model and dimension of bound dyes on the surface of polymer chain is proposed on the basis of the previously suggested model of dimer found in the aqueous solution of planar aromatic dyes. The proposed model is found to be reasonable in accordance with the experimental results obtained by various workers.

  • PDF

Software Design Framework for Content Creation (콘텐츠 제작을 위한 소프트웨어 디자인 프레임워크)

  • Oh, Jung-Min;Moon, Nammee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.11
    • /
    • pp.815-822
    • /
    • 2013
  • Nowadays, the various kind of software packages that support content creation consumed in touch-type terminals as an application have come into the market. These softwares have a different style of user task compare to existing user task. The reason why difference style has been appeared for now is because interaction timing has a important role of both content creation and consumption. For this reason, in this paper, we propose a software UI design framework for content creation using MB-UID and UCD model based on task modeling. The proposed framework is made up of five steps: business rule model, creation role model, creation flow model, creation action model, presentation model. Through this framework, we handle the interaction between a content creator and software user interface at the content creation phase. At the same time, we consider a possible interaction type which can occur by consumers at the consumption phase in advance.

The structure of ATM Switch with the Shared Buffer Memory and The Construction of Switching Network for Large Capacity ATM (대용량 ATM을 위한 공유 버퍼 메모리 스위치 구조 및 교환 망의 구성 방안)

  • 양충렬;김진태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.1
    • /
    • pp.80-90
    • /
    • 1996
  • The efficienty of ATM is based on the statical multiplexing of fixed-length packets, which are called cells. The most important technical point for realizing ATM switching network is an arrangement of the buffers and switches. Current most ATM switching networks are being achieved by using the switching modules based on the unit switch of $8{\times}8$ 150Mb/s or $16{\times}16$ 150Mb/s, the unit switch of $32{\times}32$150Mb/s for a large scale system is under study in many countries. In this paper, we proposed a new $32{\times}32$(4.9Gb/s throughput) ATM switch using Shared buffer memory switch which provides superior traffic characteristics in the cell loss, delay and throughput performance and easy LSI(Large Scale Integrated circuit). We analytically estimated and simulated by computer the buffer size into it. We also proposed the configuration of the large capacity ATM switching network($M{\times}M$.M>1,000) consisting of multistage to improve the link speed by non-blocking.

  • PDF

MB-OFDM UWB Technology for Increasing Transmission Reach of Wireless Speaker Systems (차세대 무선 스피커 시스템의 전송거리 증대를 위한 MB-OFDM UWB 기술)

  • Kim, Do-Hoon;Wee, Jung-Wook;Lee, Hyeon-Seok;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.6
    • /
    • pp.1-5
    • /
    • 2011
  • We present the Multi-band orthogonal frequency division multiplexing ultra-wideband (MB-OFDM UWB) technology for increasing the transmission reach of wireless speaker systems. The proposed scheme adopts the Reed-Solomon coding for preventing the random error perfectly and shows the SNR gain in low bit error rate (BER) especially. So, we can increase the maximum reach of MB-OFDM UWB technology since the receiver sensitivity is improved. The simulation environment includes most effects of realistic channel environments such as Additive White Gaussian Noise (AWGN), CM1 channel model, Sampling frequency offset (SFO), Carrier frequency offset (CFO) to improve the simulation accuracy. The simulation results show that the proposed scheme can give a maximum 2 dB SNR gain and increase the transmission reach up to 12.6m.

Forecasting Technique of Line Utilization based on SNMP MIB-II Using Time Series Analysis (시계열 분석을 이용한 SNMP MIB-II 기반의 회선 이용률 예측 기법)

  • Hong, Won-Taek;An, Seong-Jin;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2470-2478
    • /
    • 1999
  • In this paper, algorithm is proposed to forecast line utilization using SNMP MIB-II. We calculate line utilization using SNMP MIB-II on TCP/IP based Internet and suggest a method for forecasting a line utilization on the basis of past line utilization. We use a MA model taking difference transform among ARIMA methods. A system for orecasting is proposed. To show availability of this algorithm, some results are shown and analyzed about routers on real environments. We get a future line utilization using this algorithm and compare it ot real data. Correct results are obtained in case of being few data deviating from mean value. This algorithm for forecasting line utilization can give effect to line c-apacity plan for a manager by forecasting the future status of TCP/IP network. This will also help a network management of decision making of performance upgrade.

  • PDF

Simulation-based Network Vulnerability Analysis Using the SIMVA (SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석)

  • 유용준;이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.13-19
    • /
    • 2004
  • 본 논문은 SIMVA(Simulation Vulnerability Analyzer)를 이용한 시뮬레이션 기반의 네트워크 취약성 분석을 주목적으로 한다 SIMVA는 네트워크 상태를 감시하고, 이를 토대로 취약성을 분석하기 위하여 개발된 S/W로서, SES/MB (System Entity Structure / Model Base) 프레임워크 및 DEVS(Discrete Event System Specification) 이론을 적용하여 네트워크 보안 모델링을 수행할 수 있으며, 취약성 메트릭스를 통하여 정량적으로 취약성을 분석할 수 있다. 본 연구에서는 SIMVA를 이용하여 최근 네트워크 보안 문제에 심각한 영향을 미치는 슬래머 웜 공격 시나리오에 대한 취약성 분석을 수행함으로써 SIMVA의 검증 및 적용 가능성을 제시한다.

  • PDF

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

Fractal equations to represent optimized grain size distributions used for concrete mix design

  • Sebsadji, Soumia K.;Chouicha, Kaddour
    • Computers and Concrete
    • /
    • v.26 no.6
    • /
    • pp.505-513
    • /
    • 2020
  • Grading of aggregate influences significantly almost all of the concrete performances. The purpose of this paper is to propose practicable equations that express the optimized total aggregate gradation, by weight or by number of particles in a concrete mix. The principle is based on the fractal feature of the grading of combined aggregate in a solid skeleton of concrete. Therefore, equations are derived based on the so-called fractal dimension of the grain size distribution of aggregates. Obtained model was then applied in such a way a correlation between some properties of the dry concrete mix and the fractal dimension of the aggregate gradation has been built. This demonstrates that the parameter fractal dimension is an efficacious tool to establish a unified model to study the solid phase of concrete in order to design aggregate gradation to meet certain requirements or even to predict some characteristics of the dry concrete mixture.