• 제목/요약/키워드: Network Closure

검색결과 56건 처리시간 0.025초

유동망 시스템 해석을 위한 경계처리에 대한 보존형 유한체적법 (CONSERVATIVE FINITE VOLUME METHOD ON BOUNDARY TREATMENTS FOR FLOW NETWORK SYSTEM ANALYSES)

  • 홍석우;김종암
    • 한국전산유체공학회지
    • /
    • 제14권1호
    • /
    • pp.35-44
    • /
    • 2009
  • To adequately analyze flows in pipe or duct network system, traditional node-based junction coupling methods require the junction loss which is specified by empirical or analytic correlations. In this paper, a new finite volume junction coupling method using a ghost junction cell is developed by considering the interchange of linear momentum as well as the important wall-effect at junction without requiring any correlation on the junction loss. Also, boundary treatment is modified to preserve the stagnation enthalpy across boundaries, such as pipe-end and the interface between junction and branch. Also, the computational accuracy and efficiency of the Godunov-type finite volume schemes are investigated by tracing the total mechanical energy of rapid transients due to sudden closure of valve at downstream end.

범죄예방 환경설계 관점에서 공동주택 단지 내 공공보행통로의 개선방안 연구 (Improvements of the Public Pedestrian Passage in the Apartment Complex from Crime Prevention Through Environmental Design Aspect)

  • 이승지
    • 대한건축학회논문집:계획계
    • /
    • 제34권6호
    • /
    • pp.135-142
    • /
    • 2018
  • A public pedestrian passage induces traffic into the apartment complex, and therefore, it requires the application of Crime Prevention Through Environmental Design(CPTED). This paper aims to analyze the conditions and to suggest the improvements of public pedestrian passages in apartment complexes, applying a 3-D approach from CPTED aspect. The first aspect is "Designation": 1)The linkage between the public pedestrian passages is weak, and their designated purpose becomes unclear. 2)When the designated purpose is not considered for each complex, the closure rate is high. 3)The closure rate of the "Through type" is high. It suggests that the pedestrian network should be built and vitalized at the local urban level. The second aspect is "Definition." The public pedestrian passage lacks a social, cultural, and legal definition and only has a passive physical definition. It suggests that a legal definition and specialized guildline be prepared. The third aspect is "Design": 1)Insufficient territoriality exists between the public pedestrian passage and the inside of the complex. Territoriality should be reinforced between the public pedestrian passage and the rest of the internal territory. 2)The landscaping adjacent to the public pedestrian passage lacks deliberation. Since this is where safety and privacy collide, detailed design and maintenance of the landscaping is required. 3)It lacks systematical crime prevention facilities and should compensate accordingly.

복재동맥 도서형 피판을 이용한 슬개골부의 재건 (Reconstruction on Patellar Area with the Saphenous Island Flap)

  • 김영준;이종욱;고장휴;서동국;오석준;장영철
    • Archives of Plastic Surgery
    • /
    • 제33권5호
    • /
    • pp.536-540
    • /
    • 2006
  • Purpose: The soft tissue injuries of the patellar area are difficult problems because of insufficient arterial blood supply and lack of muscle layer. There have been many methods for reconstructing the soft tissue injuries of the patellar area such as primary closure, skin graft, local flap and free tissue transfer. However, each method has some limitations in their application. After the first introduction, the fasciocutaneous flaps are widely used to reconstruct the soft tissue injuries. The saphenous nerve, one of the superficial sensory nerves in the lower leg, is supplied by the saphenous artery and its vascular network. We used the saphenous fasciocutaneous island flap to reconstruct the soft tissue injuries of the patellar area. Methods: From March 2002 to May 2005, we used the saphenous fasciocutaneous island flap to reconstruct the soft tissue injuries of the patellar area. The flap was elevated with saphenous nerve, saphenous vein and saphenous artery and its vascular network. The flap donor site was reconstructed with primary closure or split-thickness skin graft. Results: Five cases survived completely but 1 case developed partial necrosis of the skin on the upper margin of the flap. However, the necrosis was localized on skin layer, and we reconstructed with debridement and split-thickness skin graft only. After the operation, there was no contracture or gait disturbance in any patient. Conclusion: In conclusion, the saphenous fasciocutaneous island flap is safe, comfortable and effective method to reconstruct the soft tissue injuries of the patellar area.

상수관망의 부분적 격리를 위한 제수밸브 탐색 알고리듬 (An Algorithm for Searching On-Off Valves to Isolate a Subsystem in a Water Distribution System)

  • 전환돈;김중훈
    • 상하수도학회지
    • /
    • 제20권1호
    • /
    • pp.35-43
    • /
    • 2006
  • Concerns related to protecting, identifying, and isolating of subsystems of a water distribution network have led to the realization of the increased importance of valves in the system. The most important purpose of valves in water distribution systems is to isolate a subsystem due to breakage, maintenance activities, or contamination. A subsystem called segment is isolated by the closure of adjacent valves. Minimizing the pipe failure impact, an efficient algorithm is required to identify adjacent valves quickly. In this paper, an algorithm to identify adjacent valves to be closed to isolate a subsystem from the remainder of a network when a pipe failure is presented. The algorithm is operated on a matrix called the valve location matrix containing the information of valve locations. An application to an existing water distribution system demonstrates the developed algorithm efficiently locates the adjacent valves for the isolation of a broken pipe.

익형의 형상최적화를 통한 고효율 축류송풍기 설계 (High-Efficiency Design of Axial Flow Fan through Shape Optimization of Airfoil)

  • 이기상;김광용;최재호
    • 한국유체기계학회 논문집
    • /
    • 제11권2호
    • /
    • pp.46-54
    • /
    • 2008
  • This study presents a numerical optimization to optimize an axial flow fan blade to increase the efficiency. The radial basis neural network is used as an optimization method with the numerical analysis by Reynolds-averaged Navier-Stokes equations using SST model as turbulence closure. Four design variables related to airfoil maximum camber, maximum camber location, leading edge radius and trailing edge radius, respectively, are selected, and efficiency is considered as objective function which is to be maximized. Thirty designs are evaluated to get the objective function values of each design used to train the neural network. Optimum shape shows the efficiency increased by 1.0%.

Energy-Efficient Quorum-Based MAC Protocol for Wireless Sensor Networks

  • Annabel, L. Sherly Puspha;Murugan, K.
    • ETRI Journal
    • /
    • 제37권3호
    • /
    • pp.480-490
    • /
    • 2015
  • The reliability of sensor networks is generally dependent on the battery power of the sensor nodes that it employs; hence it is crucial for the sensor nodes to efficiently use their battery resources. This research paper presents a method to increase the reliability of sensor nodes by constructing a connected dominating tree (CDT), which is a subnetwork of wireless sensor networks. It detects the minimum number of dominatees, dominators, forwarder sensor nodes, and aggregates, as well as transmitting data to the sink. A new medium access control (MAC) protocol, called Homogenous Quorum-Based Medium Access Control (HQMAC), is also introduced, which is an adaptive, homogenous, asynchronous quorum-based MAC protocol. In this protocol, certain sensor nodes belonging to a network will be allowed to tune their wake-up and sleep intervals, based on their own traffic load. A new quorum system, named BiQuorum, is used by HQMAC to provide a low duty cycle, low network sensibility, and a high number of rendezvous points when compared with other quorum systems such as grid and dygrid. Both the theoretical results and the simulation results proved that the proposed HQMAC (when applied to a CDT) facilitates low transmission latency, high delivery ratio, and low energy consumption, thus extending the lifetime of the network it serves.

Effect of Energy Harvesting on Stable Throughput in Cooperative Relay Systems

  • Pappas, Nikolaos;Kountouris, Marios;Jeon, Jeongho;Ephremides, Anthony;Traganitis, Apostolos
    • Journal of Communications and Networks
    • /
    • 제18권2호
    • /
    • pp.261-269
    • /
    • 2016
  • In this paper, the impact of energy constraints on a two-hop network with a source, a relay and a destination under random medium access is studied. A collision channel with erasures is considered, and the source and the relay nodes have energy harvesting capabilities and an unlimited battery to store the harvested energy. Additionally, the source and the relay node have external traffic arrivals and the relay forwards a fraction of the source node's traffic to the destination; the cooperation is performed at the network level. An inner and an outer bound of the stability region for a given transmission probability vector are obtained. Then, the closure of the inner and the outer bound is obtained separately and they turn out to be identical. This work is not only a step in connecting information theory and networking, by studying the maximum stable throughput region metric but also it taps the relatively unexplored and important domain of energy harvesting and assesses the effect of that on this important measure.

스마트 팩토리 망에서 DPI와 자기 유사도 기술 기반의 OPC-UA 프로토콜 게이트웨이 융합 보안 기술 (Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network)

  • 심재윤;이준경
    • 정보보호학회논문지
    • /
    • 제26권5호
    • /
    • pp.1305-1311
    • /
    • 2016
  • 스마트 팩토리는 제품의 전 생산 과정에 정보통신기술(ICT: Information and Communications Technologies)을 접목하여, 생산 비용의 절감 및 공정 개선 등을 이룰 수 있는 지능형 공장을 의미한다. 스마트 팩토리를 구현하기 위해서는 필연적으로 내부 설비들이 외부 네트워크와 연결되어야 하며, 이는 기존 폐쇄 망으로 운영되던 설비들이 외부 네트워크에 노출됨으로써 보안 취약성 증가하게 된다. 이러한 문제점을 해결하기 위해서 일반 네트워크에 사용하고 있는 보안 장비를 적용할 수는 있으나 이 방법만 가지고는 스마트 팩토리 망에서의 보안 위협을 완벽하게 차단하는 것은 불가능하며 보안 침해 사고가 발생 시 물리적, 경제적 피해는 산정할 수 없을 정도로 클 것이다. 이에 본 논문에서는 스마트 팩토리에 적용 가능한 보안 기법들을 알아보며 안전한 스마트 팩토리를 위한 전용 보안 게이트웨이 및 보안 게이트웨이가 가져야할 주요 융합 보안 기술을 제안한다.

On a Question of Closed Maps of S. Lin

  • Chen, Huaipeng
    • Kyungpook Mathematical Journal
    • /
    • 제50권4호
    • /
    • pp.537-543
    • /
    • 2010
  • Let X be a regular $T_1$-space such that each single point set is a $G_{\delta}$ set. Denot 'hereditarily closure-preserving' by 'HCP'. To consider a question of closed maps of S. Lin in [6], we improve some results of Foged in [1], and prove the following propositions. Proposition 1. $D\;=\;\{x{\in}X\;:\;\mid\{F{\in}\cal{F}:x{\in}F\}\mid{\geq}{\aleph}_0\}$ is discrete and closed if $\cal{F}$ is a collection of HCP. Proposition 2. $\cal{H}\;=\;\{{\cup}\cal{F}'\;:\;F'$ is an fininte subcolletion of $\cal{F}_n\}$ is HCP if $\cal{F}$ is a collection of HCP. Proposition 3. Let (X,$\tau$) have a $\sigma$-HCP k-network. Then (X,$\tau$) has a $\sigma$-HCP k-network F = ${\cup}_n\cal{F}_n$ such that such tat: (i) $\cal{F}_n\;\subset\;\cal{F}_{n+1}$, (ii) $D_n\;=\;\{x{\in}X\;:\;\mid\{F{\in}\cal{F}_n\;:\;x{\in}F\}\mid\;{\geq}\;{\aleph}_0\}$ is a discrete closed set and (iii) each $\cal{F}_n$ is closed to finite intersections.

A Comparative Evaluation of $K_{op}$ Determination and $\Delta{K}_{eff}$ Estimation Methods

  • Kang, Jae-Youn;Song, Ji-Ho;Koo, Ja-Suk;Park, Byung-Ik
    • Journal of Mechanical Science and Technology
    • /
    • 제18권6호
    • /
    • pp.961-971
    • /
    • 2004
  • Methods for determination of the crack opening stress intensity factor ($K_{op}$) and for estimation of the effective stress intensity factor range ($\Delta{K}_{eff}$) are evaluated for crack growth test data of aluminum alloys. Three methods of determining $K_{op}$, visual measurement, ASTM offset compliance method, and the neural network method proposed by Kang and Song, and three methods of estimating $\Delta{K}_{eff}$, conventional, the 2/PIO and 2/PI methods proposed by Donald and Paris, are compared in a quantitative manner by using evaluation criteria. For all $K_{op}$ determination methods discussed, the 2/PI method of estimating $\Delta{K}_{eff}$ provides good results. The neural network method of determining $K_{op}$ provides good correlation of crack growth data. It is recommended to use 2/PI estimation with the neural $K_{op}$ determination method. The ASTM offset method used in conjunction with 2/PI estimation shows a possibility of successful application. It is desired to improve the ASTM method.