• Title/Summary/Keyword: S598S

Search Result 320, Processing Time 0.023 seconds

Computational evaluation of wind loads on a standard tall building using LES

  • Dagnew, Agerneh K.;Bitsuamlak, Girma T.
    • Wind and Structures
    • /
    • v.18 no.5
    • /
    • pp.567-598
    • /
    • 2014
  • In this paper, wind induced aerodynamic loads on a standard tall building have been evaluated through large-eddy simulation (LES) technique. The flow parameters of an open terrain were recorded from the downstream of an empty boundary layer wind tunnel (BLWT) and used to prescribe the transient inlet boundary of the LES simulations. Three different numerically generated inflow boundary conditions have been investigated to assess their suitability for LES. A high frequency pressure integration (HFPI) approach has been employed to obtain the wind load. A total of 280 pressure monitoring points have been systematically distributed on the surfaces of the LES model building. Similar BLWT experiments were also done to validate the numerical results. In addition, the effects of adjacent buildings were studied. Among the three wind field generation methods (synthetic, Simirnov's, and Lund's recycling method), LES with perturbation from the synthetic random flow approach showed better agreement with the BLWT data. In general, LES predicted peak wind loads comparable with the BLWT data, with a maximum difference of 15% and an average difference of 5%, for an isolated building case and however higher estimation errors were observed for cases where adjacent buildings were placed in the vicinity of the study building.

A Study for PKI Based Home Network System Authentication and Access Control Protocol (PKI 기반 홈 네트워크 시스템 인증 및 접근제어 프로토콜에 관한 연구)

  • Lee, Young-Gu;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.592-598
    • /
    • 2010
  • A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

An Effective Urbanized Area Monitoring Method Using Vegetation Indices

  • Jeong, Jae-Joon;Lee, Soo-Hyun
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.598-601
    • /
    • 2007
  • Urban growth management is essential for sustainable urban growth. Monitoring physical urban built-up area is a task of great significance to manage urban growth. Detecting urbanized area is essential for monitoring urbanized area. Although image classifications using satellite imagery are among the conventional methods for detecting urbanized area, they requires very tedious and hard work, especially if time-series remote sensing data have to be processed. In this paper, we propose an effective urbanized area detecting method based on normalized difference vegetation index (NDVI) and normalized difference built-up index (NDBI). To verify the proposed method, we extract urbanized area using two methods; one is conventional supervised classification method and the other is the proposed method. Experiments shows that two methods are consistent with 98% in 1998, 99.3% in 2000, namely the consistency of two methods is very high. Because the proposed method requires no more process without band operations, it can reduce time and effort. Compared with the supervised classification method, the proposed method using vegetation indices can serve as quick and efficient alternatives for detecting urbanized area.

  • PDF

A Study on the Functional Sleeve Pattern of Sports Climbing Wear (스포츠 클라이밍 웨어의 기능성 소매패턴 연구)

  • Im, Ga Bin;Park, Ju Hee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.41 no.4
    • /
    • pp.585-598
    • /
    • 2017
  • Sports climbing requires more maximum body motion range than any other sport. This study examined what element affects the actions of sports climbers and suggest an ideal pattern archetype to maximize function based on motion. The theoretical background included abstracted elements influencing clothing design by researching the body type of sports climbers and the motion of sports climbing. Along with the characteristic of climbing wear, this study also conducted a comparative analysis of sleeve patterns for sports climbing wear and general sports jackets, abstracting comparative parts that influence sports climbing wear design. To develop the final research archetype, research was done on 107 sports climbers in their 20s-30s that selected the top 3 brands and collected patterns as well. A research archetype was selected based on 3-D virtual clothing and developed into 4 different patterns with different sleeve cap heights. Appearance evaluation and a motion functionality evaluation were then conducted in order to select a final research archetype adequate for sports climbing based on evaluation findings. In addition, this study identified aesthetical problems of the final research archetype produced based on functionality that could suggest an archetype for a climbing jacket that could be visually satisfying through appearance evaluations and motion functionality evaluations.

Vibration-mode-based story damage and global damage of reinforced concrete frames

  • Guo, Xiang;He, Zheng
    • Earthquakes and Structures
    • /
    • v.14 no.6
    • /
    • pp.589-598
    • /
    • 2018
  • An attempt is conducted to explore the relationship between the macroscopic global damage and the local damage of shear-type RC frames. A story damage index, which can be expressed as multi-variate functions of modal parameters, is deduced based on the tridiagonal matrix of the shear-type frame. The global damage model is also originated from structural modal parameters. Due to the connection of modal damage indexes, the relationship between the macroscopic global damage and the local story damage is reasonably established. In order to validate the derivation, a case study is carried out via an 8-story shear-type frame. The sensitivities of modal damage indexes to the location and severity of local story damages are studied. The evolution of the global damage is investigated as well. Results show that the global damage is sensitive to the degree of story damage, but it's not sensitive to its location. As the number of the damaged stories increases, more and more modes will be involved. Meanwhile, the global damage evolution curve changes from the concave shape to the S-type and then finally transforms into the convex shape. Through the proposed story damage, modal damage and global damage model, a multi-level damage assessment method is established.

A STUDY HO THE PREDICTION OF DURATION OF ORTHODONTIC TREATMENT IN MALOCCLUSION (부정교합 치료기간의 예측에 관한 연구)

  • Kim, Hyuk-Jae;Lee, Dong-Joo
    • The korean journal of orthodontics
    • /
    • v.18 no.1 s.25
    • /
    • pp.105-112
    • /
    • 1988
  • To predict duration of orthodontic treatment of malocclusion, 304 male and female patients whose orthodontic treatment was finished in department of orthodontics, Infirmary of dental college, Chosun University were studied. The duration of treatment was studied according to types of malocclusion, beginning ages of treatment, Hellman's dental ages, the determination of tooth extraction, types of tooth extraction and types of orthodontic appliance. The following results were obtained. 1. The duration of treatment was 18 months in Class I malocclusion, 20 months in Class II malocclusion and 24 months in Class III malocclusion. 2. The more early treatment was done, the more duration of treatment was needed according to beginning age of treatment and Hellman's dental ages. 3. Treatment of tooth extraction case was needed for 78 days more than that of non-extraction case. 4. The duration of treatment with unilateral extraction of premolars was the shortest (598 days) and that with single arch extraction of premolars was the longest (685 days) according to types of tooth extraction. 5. The duration of treatment by removable appliance was the shortest (237 days) and the combination of removable appliance, headgear and full banded appliance was the longest (1425 days) according to types of orthodontic appliance. 6. The duration of treatment was 18 months in typical orthodontic treatment with 4 extraction of premolar and full banded appliance.

  • PDF

A Study on the Machining Characteristics for Micro Endmilling by using Ultrahigh-Speed Air Turbine Spindle (초고속 스핀들에 의한 마이크로 엔드밀링의 가공특성에 관한 연구)

  • Kwon D.H.;Kang I.S.;Kim J.H.;Kang M.C.;Kim J.S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.10a
    • /
    • pp.598-603
    • /
    • 2005
  • Recently, the advanced industries using micro parts are rapidly growing. The appearance of ultra-precision feed mechanism and the development of control system make it possible to process parts in sub millimeter scale by mechanical methods. Micro endmilling is one of the prominent technology that has wide spectrum of application field ranging from macro parts to micro products. So, micro stairs have been trying to cut by using high revolution air turbine spindle and micro-endmill, and studying for magnitude of cutting force. This investigation deals removal characteristics of burr generated by micro endmilling process. Also, decreasing of burr is significant problem in making smooth and precise parts in micro endmilling. In micro endmilling, the material removal rate(MRR) and cutting forces are very small. This paper presents an investigation on the machining characteristics for micro stairs by using ultrahigh-speed air turbine spindle in machining.

  • PDF

Merleau-Ponty's Intertwining as a Theory of Communion (교감 이론으로서 메를로퐁티의 '상호 엮임')

  • Kwon, Teckyoung
    • Journal of English Language & Literature
    • /
    • v.57 no.4
    • /
    • pp.581-598
    • /
    • 2011
  • The recent revival of phenomenology and aesthetics is deeply connected to the development of neuroscience which studies the nervous system and the brain with particular regard to cognition and memory. How are those fields gathered into building up the basis for the communication not only between human beings but also between humanity and its environment? This paper examines the human mind considered unseparable from the body, with reference to Merleau-Ponty's two major works: Phenomenology of Perception (1962) and The Visible and the Invisible (1968). While reading these texts, I investigate the way he overturns the Cartesian cogito and establishes the body as the ground of perception. According to him, human perception is chiefly obtained through the body rather than consciousness. Influenced by William James, who produced the unique concept of cognition and memory through his experiments with the brain, Merleau-Ponty extends Heideggerian Desein to the field of the embodied mind. James also anticipates Bergson, who regards memory as the product of interaction between consciousness and matter (or the body). The intervention of the body which stores the past experiences makes it impossible for us to capture the present moment in itself. This failure, however, is viewed as positive by Merleau-Ponty because the human body is not only a medium of social interaction, but also that of ecological communion.

A Display Method of Image Information and URL Using the Message Structures of Emergency Alert Broadcasts for 5G Cellular Communications (5G 이동통신 용 재난경보 방송의 메시지 구조를 이용한 이미지 정보 및 URL 표출기법)

  • Chang, Sekchin
    • Journal of Broadcast Engineering
    • /
    • v.26 no.5
    • /
    • pp.592-598
    • /
    • 2021
  • Current cellular systems rely on a CBS protocol for emergency alert broadcast services. However, the CBS protocol just specifies the delivery of a limited text message. Therefore, foreigners, who are unfamiliar with local characters, may have some difficulties in understanding the received CBS text message. The CBS protocol also reveals a distinct restriction in delivering abundant information because of a limited number of text characters. In order to overcome the weak points of the current CBS protocol, we propose a display method of image information and URL on the screens of mobile terminals for the received CBS text message in this paper. The presented approach effectively utilizes the message structure of CBS for 5G cellular systems.

Congenital Cardiovascular Anomalies in Adults : A report 266 surgical cases (성인 심장기형 266예 수술 예)

  • Lee, Yung-Kyoon;Yang, Gi-Min
    • Journal of Chest Surgery
    • /
    • v.13 no.4
    • /
    • pp.414-417
    • /
    • 1980
  • During the period from 1958 to July 31, 1980, there were 1764 Cardiovascular Surgical cases consisting of 1166 congenital and 598 acquired lesions in the Department of Cardiothoracic Surgery, Seoul National University Hospital. For 1764 cases 1162 open heart surgery and 602 conventional operations were performed. Among 1166, congenital lesions 266 adult cases were found. Adult cases occupy 15.1% of the total cases consisting of 24.5% of acyanotic and 19.9% of cyanotic group. Over all operative mortality of adult cases was 6.8% compared with 12.4% of total cases. Left over congenital cardiovascular anomalies in Korea can be safely operated at the present time. The oldest operated patient among adult congenital cardiovascular anomalies was 57 years old female atrial septal defect case. For 1162 cases open heart surgery bubble oxygenators were utilized except 2 membrane oxygenators. Various kinds of bubble oxygenators have been used but recently Shiley**** oxygenators are being used exclusively with satisfactory results.

  • PDF