• Title/Summary/Keyword: Master Block

Search Result 93, Processing Time 0.026 seconds

Creep characteristics and instability analysis of concrete specimens with horizontal holes

  • Xin, Yajun;Hao, Haichun;Lv, Xin;Ji, Hongying
    • Computers and Concrete
    • /
    • v.22 no.6
    • /
    • pp.563-572
    • /
    • 2018
  • Uniaxial compressive strength test and uniaxial compression creep one were produced on four groups of twelve concrete specimens with different hole number by RLW-2000 rock triaxial rheology test system. The relationships between horizontal holes and instantaneous failure stress, the strain, and creep failure stress, the strain, and the relationships between stress level and instantaneous strain, creep strain were studied, and the relationship between horizontal holes and failure mode was determined. The results showed that: with horizontal hole number increasing, compressive strength of the specimens decreased whereas its peak strain increased, while both creep failure strength and its peak strain decreased. The relationships between horizontal holes and compressive strength of the specimens, the peak strain, were represented in quadratic polynomial, the relationships between horizontal holes and creep failure strength, the peak strain were represented in both linear and quadratic polynomial, respectively. Instantaneous strain decreased with stress level increasing, and the more holes in the blocks the less the damping of instantaneous strain were recorded. In the failure stress level, instantaneous strain reversally increased, creep strain showed three stages: decreasing, increasing, and sharp increasing; in same stress level, the less holes the less creep strain rate was recorded. The compressive-shear failure was produced along specimen diagonal line where the master surface of creep failure occurred, the more holes in a block, the higher chances of specimen failure and the more obvious master surface were.

An implementation of video transmission modes for MIPI DSI bridge IC (MIPI DSI 브릿지 IC의 비디오 전송모드 구현)

  • Seo, Chang-sue;Kim, Gyeong-hun;Shin, Kyung-wook;Lee, Yong-hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.291-292
    • /
    • 2014
  • High-speed video transmission modes of master bridge IC are implemented, which supports MIPI (Mobile Industry Processor Interface) DSI (Display Serial Interface) standard. MIPI DSI master bridge IC sends RGB data and various commands to display module (slave) in order to test it. The master bridge IC consists of buffers storing video data of two lines, packet generation block, and D-PHY layer that distributes packets to data lanes and transmits them to slave. In addition, it supports four bpp (bit per pixel) formats and three transmission modes including Burst and Non-Burst (Sync Events, Sync Pulses types). The designed bridge IC is verified by RTL simulations showing that it functions correctly for various operating parameters.

  • PDF

A philological Study on Qingwujing(靑烏經) (청오경(靑烏經)의 문헌적 연구)

  • Chang, Sung-Kyu
    • Journal of architectural history
    • /
    • v.18 no.2
    • /
    • pp.27-45
    • /
    • 2009
  • This study was to analyze the philological character of Qingwujing(靑烏經). Qingwujing is the oldest and representative documents of FengShui, especially famous for FengShui XingQi(形氣) theories. In spite of is fame, a systematic research for Qingwujing was not yet fulfilled up to now in Korea. In is the main reason why have to research the philological character of Qingwujing. The results from this research were described as following. Qingwujing(靑烏經) as knows of Qingwujing's writer is very famous already in Han 한(漢) dynasty for his accurate FengShui methods. His FengShui thories getting more powerfyl from WeiChen(魏晉) to Tang(唐) dynasty. In Tang(唐) dynasty Qingwujing was abolished by government rulers, but it recovered and retouched by some scholars from Tang(唐) and Song(宋) dynasty. In the process, the block book of Qingwujing were changed for four or five kinds. Qingwujing's block books of Ming(明) dynasty are Yimenguangdu(夷門廣牘), Xiaoshisanjing(小十三經), Jujiabibei(居家必備), and Shuofu(說郛). It's block books of Qing(淸) dynasty are Gujintushujicheng(古今圖書集成), Sikuquanshu(四庫全書), Xuejintaoyuan(學津討原), and Ershierziquanji(二十二子全集). It's block book of Choson(朝鮮) dynasty is KyujangKak(奎章閣). Among them distinctive characters been founded, but the basic contents and theories are almost same. In Korea, Qingwuzi's FengShui theories were confirmed in Silla(新羅) dynasty, and it recoreded in Soongboksa inscription written by Choi-CheeWon. Qingwu(靑烏) or Qingwuzi were known for a great FengShui master of a FengShui standing theories in Koryeo(高麗) and Choson dynasty among royal families and the aristocratic classes. And Qingwujing was a representative FengShui theory book in wh0.1ole period of Choson dynasty. Now for understanding traditional FengShui theories, we have to understand the main FengShui theories on Choson dynasty at first. For understanding Choson FengShui, the study on philological character of Qingwujing is the basic works. If those works fulfilled successfully, we can understand FengShui theories and FengShu itself more correctly.

  • PDF

A Cryptoprocessor for AES-128/192/256 Rijndael Block Cipher Algorithm (AES-128/192/256 Rijndael 블록암호 알고리듬용 암호 프로세서)

  • 안하기;박광호;신경욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.257-260
    • /
    • 2002
  • This paper describes a design of cryptographic processor that implements the AES (Advanced Encryption Standard) block cipher algorithm“Rijndael”. To achieve high throughput rate, a sub-pipeline stage is inserted into the round transformation block, resulting that the second half of current round function and the first half of next round function are being simultaneously operated. For area-efficient and low-power implementation the round transformation block is designed to share the hardware resources in encryption and decryption. An efficient scheme for on-the-fly key scheduling, which supports the three master-key lengths of 128-b/192-b/256-b, is devised to generate round keys in the first sub-pipeline stage of each round processing. The cryptoprocessor designed in Verilog-HDL was verified using Xilinx FPGA board and test system. The core synthesized using 0.35-${\mu}{\textrm}{m}$ CMOS cell library consists of about 25,000 gates. Simulation results show that it has a throughput of about 520-Mbits/sec with 220-MHz clock frequency at 2.5-V supply.

  • PDF

An Efficient Hardware Implementation of Lightweight Block Cipher Algorithm CLEFIA for IoT Security Applications (IoT 보안 응용을 위한 경량 블록 암호 CLEFIA의 효율적인 하드웨어 구현)

  • Bae, Gi-chur;Shin, Kyung-wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.2
    • /
    • pp.351-358
    • /
    • 2016
  • This paper describes an efficient hardware implementation of lightweight block cipher algorithm CLEFIA. The CLEFIA crypto-processor supports for three master key lengths of 128/192/256-bit, and it is based on the modified generalized Feistel network (GFN). To minimize hardware complexity, a unified processing unit with 8 bits data-path is designed for implementing GFN that computes intermediate keys to be used in round key scheduling, as well as carries out round transformation. The GFN block in our design is reconfigured not only for performing 4-branch GFN used for round transformation and intermediate round key generation of 128-bit, but also for performing 8-branch GFN used for intermediate round key generation of 256-bit. The CLEFIA crypto-processor designed in Verilog HDL was verified by using Virtex5 XC5VSX50T FPGA device. The estimated throughput is 81.5 ~ 60 Mbps with 112 MHz clock frequency.

A Differential Fault Attack on Block Cipher SEED (블록 암호 SEED에 대한 차분 오류 공격)

  • Jeong, Ki-Tae;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.17-24
    • /
    • 2010
  • A differential fault attack(DFA) is one of the most efficient side channel attacks on block ciphers. Almost all block ciphers, such as DES, AES, ARIA, SEED and so on., have been analysed by this attack. In the case of the known DFAs on SEED, the attacker induces permanent faults on a whole left register of round 16. In this paper, we analyse SEED against DFA with differential characteristics and addition-XOR characteristics of the round function of SEED. The fault assumption of our attack is that the attacker induces 1-bit faults on a particular register. By using our attack, we can recover last round keys and the master key with about $2^{32}$ simple arithmetic operations. It can be simulated on general PC within about a couple of second.

Clinical Observation of Acupuncture and Nerve Block Treatment for Adhesive Capsulitis Patients (유착성 관절낭염에 대한 침 및 신경차단술 처치의 임상적 관찰)

  • Nam, Dong-Woo;Lim, Sabina;Kim, Jong-In;Kim, Keon-Sik;Lee, Doo-Ik;Lee, Jae-Dong;Lee, Yun-Ho;Choi, Do-Young
    • Journal of Acupuncture Research
    • /
    • v.24 no.4
    • /
    • pp.143-155
    • /
    • 2007
  • Objectives: To observe the effect of acupuncture and nerve block combination treatment on adhesive capsulitis patients. Methods : 59 voluntary patients were randomly assigned to acupuncture treatment group(E group, n=22), nerve block treatment group(W group, n=17) and acupuncture and nerve block combination treatment group(EW group, n=20). The E group received acupuncture treatment on LI15, $TE_{14}$, $GB_{21}$ and Master Dong's acupuncture points, Shin-gwan and Gyun-joong, twice a week for 4 weeks. The W group received suprascapular nerve block, subacromial injection and trigger point injection, twice a week for 4 weeks. The EW group received the same treatment as the W group and after 5minutes of rest, successively received the treatment identical to that of E group. All three groups were instructed to practice groups were instructed to practice self exercise during their daily lives. Evaluations were made before treatment and after 1, 2, 3 and 4week treatment. Constant Shoulder Assessment(CSA), Shoulder Pain and Disability Index(SPADI), Range of Motion(ROM), the patient's treatment satisfaction measured by Visual Analogue Scale(VAS) and Digital Infrared Thermographic Imaging(DITI) were used as assessment tools. The obtained data were analyzed and compared. Results : The E group showed significant improvement(p<0.05) on CSA, SPADI, VAS and DITI. As for ROM, Adduction and Extension improved significantly(p<0.05). The W group showed significant improvement(p<0.05) on CSA, SPADI, VAS and DITI. As for ROM, Abduction and Extension improved significantly. The EW group showed significant improvement(p<0.05) on CSA, SPADI and VAS. As for ROM, Adduction, Abduction, Extension and Flexion improved significantly. The improvement of CSA, VAS and Abduction ROM in the EW group was significantly(p<0.05) superior compared to the groups treated with single type of treatment. Conclusion : It is suggested that acupuncture and nerve block combination treatment for adhesive capsulitis patients is more effective than the two single treatments. Through further studies, the acupuncture and nerve block combination treatment model may be developed into East-West Collaboration Model in treating adhesive capsulitis.

  • PDF

A Design of PRESENT Crypto-Processor Supporting ECB/CBC/OFB/CTR Modes of Operation and Key Lengths of 80/128-bit (ECB/CBC/OFB/CTR 운영모드와 80/128-비트 키 길이를 지원하는 PRESENT 암호 프로세서 설계)

  • Kim, Ki-Bbeum;Cho, Wook-Lae;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1163-1170
    • /
    • 2016
  • A hardware implementation of ultra-lightweight block cipher algorithm PRESENT which was specified as a standard for lightweight cryptography ISO/IEC 29192-2 is described. The PRESENT crypto-processor supports two key lengths of 80 and 128 bits, as well as four modes of operation including ECB, CBC, OFB, and CTR. The PRESENT crypto-processor has on-the-fly key scheduler with master key register, and it can process consecutive blocks of plaintext/ciphertext without reloading master key. In order to achieve a lightweight implementation, the key scheduler was optimized to share circuits for key lengths of 80 bits and 128 bits. The round block was designed with a data-path of 64 bits, so that one round transformation for encryption/decryption is processed in a clock cycle. The PRESENT crypto-processor was verified using Virtex5 FPGA device. The crypto-processor that was synthesized using a $0.18{\mu}m$ CMOS cell library has 8,100 gate equivalents(GE), and the estimated throughput is about 908 Mbps with a maximum operating clock frequency of 454 MHz.

An Efficient Hardware Implementation of ARIA Block Cipher Algorithm (블록암호 알고리듬 ARIA의 효율적인 하드웨어 구현)

  • Kim, Dong-Hyeon;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.91-94
    • /
    • 2012
  • This paper describes an efficient implementation of ARIA crypto algorithm which is a KS (Korea Standards) block cipher algorithm. The ARIA crypto-processor supports three master key lengths of 128/192/256-bit specified in the standard. To reduce hardware complexity, a hardware sharing is employed, which shares round function in encryption/decryption module with key initialization module. It reduces about 20% of gate counts when compared with straightforward implementation. The ARIA crypto-processor is verified by FPGA implementation, and synthesized with a 0.13-${\mu}m$ CMOS cell library. It has 33,218 gates and the estimated throughput is about 640 Mbps at 100 MHz.

  • PDF

Enduring Threads of Tradition : The Block Printed Cottons of Rural Rajasthan

  • Ronald, Emma
    • The International Journal of Costume Culture
    • /
    • v.13 no.1
    • /
    • pp.1-4
    • /
    • 2010
  • The hand printed cottons of India are historically world-renowned for their rich fast colours, elaborate designs, and matchless quality. Until the discovery of synthetic dyestuffs in the latter part of the nineteenth century, the unsurpassed master dyers of cotton were the craftsmen of India-birthplace of cultivated cotton. The Indian printers and dyers monopolised this arcane art of permeating cotton cloth with richly hued, colour-fast designs, and the fruits of their labour proved hugely influential in international trade and the development of modern textile technologies. This paper focuses on a lesser-known body of hand printed cottons, traditionally produced in rural Rajasthan for everyday use by the local pastoral communities. Drawing on extensive research carried out with the region's Chhipa community of hereditary cloth printers, the complex and multiple applications of mordant, dye and resist are illustrated. Often taking months to complete, the enduring popularity of these labour-intensive hand printed cottons is then discussed, particularly in the light of the hugesocial importance borne by cloth in Rajasthan. Cloth and clothing are widely recognised as indicators of social status, gender, rank, and individual and group affiliations. In addition, cloth and clothing have been established as indicators of social, economic, political and technological change. The paper concludes by drawing attention to the recent influx of machine-printed polyester textiles, often replicating the designs or colours of the traditional locally produced cottons. Thus women of the region, whilst using these modern synthetic textiles as part of newer ways of expressing their identity, also visibly retain the values associated with hand printed cottons and traditional dress codes.

  • PDF