• Title/Summary/Keyword: Static analysis method

Search Result 2,320, Processing Time 0.033 seconds

Dynamic Response of PSC I shape girder being used wide upper flange in Railway Bridge (확장된 상부플랜지 PSC I형 거더교의 동특성 및 동적안정성 분석)

  • Park, Jong-Kwon;Jang, Pan-Ki;Cha, Tae-Gweon;Kim, Chan-Woo;Jang, Il-Young
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2015
  • The tendency of more longer span length being required economical in railway bridges is studying about PSC I shaped girder. In this case, it is important to analyze and choose the effective girder section for stiffness of bridge. This study investigates the dynamic properties and safety of PSC I shaped girder being used wide upper flange whose selection based on radii and efficiency factor of flexure for railway bridge in different span type. In addition, 40m PSC Box girder bridge adopted in Honam high speed railway is further analyzed to compare dynamic performance of PSC I shaped girder railway bridge with same span length. Time history response is acquired based on the mode superposition method. Static analysis is also analyzed using standard train load combined with the impact factor. Consequently, the result met limit values in every case including vertical displacement, acceleration and distort.

Analysis of Hydrodynamic Similarity in Three-Phase Fluidized Bed Processes (삼상유동층 공정에서 수력학적 Similarity 해석)

  • Lim, Ho;Lim, Hyun-Oh;Jin, Hae-Ryoung;Lim, Dae-Ho;Kang, Yong
    • Korean Chemical Engineering Research
    • /
    • v.49 no.6
    • /
    • pp.790-797
    • /
    • 2011
  • Hydrodynamic similarity was analyzed by employing scaling factor in three phase fluidized beds. The scaling factor was defined based on the holdups of gas, liquid and solid particles and effectivity volumetric flux of fluids between the two kinds of fluidized beds with different column diameter. The column diameter of one was 0.102 m and that of the other was 0.152 m. Filtered compressed air, tap water and glass bead of which density was 2,500 kg/$m^3$ were used as gas, liquid and solid phases, respectively. The individual phase holdups in three phase fluidized beds were determined by means of static pressure drop method. Effects of gas and liquid velocities and particle size on the scaling factors based on the holdups of each phase and effective volumetric flux of fluids were examined. The deviation of gas holdup between the two kinds of three phase fluidized beds decreased with increasing gas or liquid velocity but increased with increasing fluidized particle size. The deviation of liquid holdup between the two fluidized beds decreased with increasing gas or liquid velocity or size of fluidized solid particles. The deviation of solid holdup between the two fluidized beds increased with increasing gas velocity or particle size, however, decreased with increasing liquid velocity. The deviation of effective volumetric flux of fluids between the two fluidized beds decreased with increasing gas velocity or particle size, but increased with increasing liquid velocity. The scaling factor, which was defined in this study, could be effectively used to analyze the hydrodynamic similarity in three phase fluidized processes.

Experimental investigation on flexural behaviour of HSS stud connected steel-concrete composite girders

  • Prakash, Amar;Anandavalli, N.;Madheswaran, C.K.;Lakshmanan, N.
    • Steel and Composite Structures
    • /
    • v.13 no.3
    • /
    • pp.239-258
    • /
    • 2012
  • In this paper, experimental investigations on high strength steel (HSS) stud connected steel-concrete composite (SCC) girders to understand the effect of shear connector density on their flexural behaviour is presented. SCC girder specimens were designed for three different shear capacities (100%, 85%, and 70%), by varying the number of stud connectors in the shear span. Three SCC girder specimens were tested under monotonic/quasi-static loading, while three similar girder specimens were subjected to non-reversal cyclic loading under simply supported end conditions. Details of casting the specimens, experimental set-up, and method of testing, instrumentation for the measurement of deflection, interface-slip and strain are discussed. It is found that SCC girder specimen designed for full shear capacity exhibits interface slip for loads beyond 25% of the ultimate load capacity. Specimens with lesser degree of shear connection show lower values of load at initiation of slip. Very good ductility is exhibited by all the HSS stud connected SCC girder specimens. It is observed that the ultimate moment of resistance as well as ductility gets reduced for HSS stud connected SCC girder with reduction in stud shear connector density. Efficiency factor indicating the effectiveness of high strength stud connectors in resisting interface forces is estimated to be 0.8 from the analysis. Failure mode is primarily flexure with fracturing of stud connectors and characterised by flexural cracking and crushing of concrete at top in the pure bending region. Local buckling in the top flange of steel beam was also observed at the loads near to failure, which is influenced by spacing of studs and top flange thickness of rolled steel section. One of the recommendations is that the ultimate load capacity can be limited to 1.5 times the plastic moment capacity of the section such that the post peak load reduction is kept within limits. Load-deflection behaviour for monotonic tests compared well with the envelope of load-deflection curves for cyclic tests. It is concluded from the experimental investigations that use of HSS studs will reduce their numbers for given loading, which is advantageous in case of long spans. Buckling of top flange of rolled section is observed at failure stage. Provision of lips in the top flange is suggested to avoid this buckling. This is possible in case of longer spans, where normally built-up sections are used.

A study on extraction of optimized API sequence length and combination for efficient malware classification (효율적인 악성코드 분류를 위한 최적의 API 시퀀스 길이 및 조합 도출에 관한 연구)

  • Choi, Ji-Yeon;Kim, HeeSeok;Kim, Kyu-Il;Park, Hark-Soo;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.897-909
    • /
    • 2014
  • With the development of the Internet, the number of cyber threats is continuously increasing and their techniques are also evolving for the purpose of attacking our crucial systems. Since attackers are able to easily make exploit codes, i.e., malware, using dedicated generation tools, the number of malware is rapidly increasing. However, it is not easy to analyze all of malware due to an extremely large number of malware. Because of this, many researchers have proposed the malware classification methods that aim to identify unforeseen malware from the well-known malware. The existing malware classification methods used malicious information obtained from the static and the dynamic malware analysis as the criterion of calculating the similarity between malwares. Also, most of them used API functions and their sequences that are divided into a certain length. Thus, the accuracy of the malware classification heavily depends on the length of divided API sequences. In this paper, we propose an extraction method of optimized API sequence length and combination that can be used for improving the performance of the malware classification.

Proposan and Analysis of DR(Distributed Reflector)-LD/EA(electro-absorption)­Modulator Integrated Device (분포반사기 레이저 다이오드와 광흡수 변조기가 집적된 소자의 제안 및 해석)

  • 권오기;심종인
    • Korean Journal of Optics and Photonics
    • /
    • v.9 no.5
    • /
    • pp.333-341
    • /
    • 1998
  • The novel integrated device, 1.55 ${\mu}{\textrm}{m}$ DR-LD(distrbuted reflector laser diode) integrated EA-MOD (electro-absorption modulator) as light source, is proposed to improve the device yield and its operational performances. This device can be easily fabricated by the selective MOVPE technique and its fabrication processes are almost the same as the reported 1.55 ${\mu}{\textrm}{m}$ DFB-LD(distributed feedback laser diode) integrated EA-MOD except the asymmetric gratings. The static and dynamic properties are investigated simultaneously by solving the transfer matrix method for light propagation, the time-dependent rate equation for carrier change and schr$\"{o}$dinger equation for QCSE (Quantum-Confined Stark Effect). The performances of the proposed device such as output power, chirp, and extinction ratio are compared with those of DFB-LD integrated EA-MOD. Under 10Gb/s NRZ modulation, we obtain that DR-LD integrated EA-MOD. is 30% higher in output power on the on-state, about 50% lower in chirp, and slightly larger in extinction ratio than DFB-LD integrated EA-MOD.-MOD.

  • PDF

Construction of Mine Geospatial Information by Total Station and 3D Laser Scanner (토털스테이션과 3D 레이저 스캐너에 의한 광산공간정보 구축)

  • Park, Joon-Kyu;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.520-525
    • /
    • 2019
  • Mines are an important infrastructure for securing resources, but safety problems can arise in the course of operation. Recently, the mining process is very complicated due to the large scale and mechanization. Therefore, it is necessary to construct accurate geospatial information on mine for systematic and safe mine operation. The geospatial information construction using the existing total station has a disadvantage that a lot of work time is required because the target must be collimated and measured. In this study, the data of the mines were acquired with the total station and the 3D laser scanner, and the mine spatial information was constructed by using the shape based registration method. By using the static scanner data of some area applying the reference point surveying result of the total station, it was possible to construct the accurate result on the wide area acquired by the mobile scanner effectively. Also, the accuracy of the constructed geospatial information was evaluated and the deviation of mean 0.083m was shown. Point cloud products constructed through the research can contribute to the efficiency improvement of mine management by enabling quantitative analysis such as visualization of mine shape, distance, area and slope, and automation of drawing creation for cross section shape.

Privacy Preserving Data Publication of Dynamic Datasets (프라이버시를 보호하는 동적 데이터의 재배포 기법)

  • Lee, Joo-Chang;Ahn, Sung-Joon;Won, Dong-Ho;Kim, Ung-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.139-149
    • /
    • 2008
  • The amount of personal information collected by organizations and government agencies is continuously increasing. When a data collector publishes personal information for research and other purposes, individuals' sensitive information should not be revealed. On the other hand, published data is also required to provide accurate statistical information for analysis. k-Anonymity and ${\iota}$-diversity models are popular approaches for privacy preserving data publication. However, they are limited to static data release. After a dataset is updated with insertions and deletions, a data collector cannot safely release up-to-date information. Recently, the m-invariance model has been proposed to support re-publication of dynamic datasets. However, the m-invariant generalization can cause high information loss. In addition, if the adversary already obtained sensitive values of some individuals before accessing released information, the m-invariance leads to severe privacy disclosure. In this paper, we propose a novel technique for safely releasing dynamic datasets. The proposed technique offers a simple and effective method for handling inserted and deleted records without generalization. It also gives equivalent degree of privacy preservation to the m-invariance model.

FEA for RC Beams Partially Flexural Reinforced with CFRP Sheets (CFRP 시트로 부분 휨 보강된 철근콘크리트 보의 유한요소해석)

  • Kim, Kun-Soo;Park, Ki-Tae;Kim, Byeong Cheol;Kim, Jaehwan;Jung, Kyu-San
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.5
    • /
    • pp.9-16
    • /
    • 2020
  • A CFRP sheet has been applied as a structural reinforcement in the field, and various studies are conducted to evaluate the effect of CFRP sheets on reinforced concrete. Although many experiments were performed from previous studies, there are still limitations to analyze structural behaviors with various parameters in experiments directly. This study shows the FEA on structural behaviors of RC beams reinforced with CFRP sheets using ABAQUS software. To simulate debonding failure of CFRP sheets which is a major failure mode of RC beam with CFRP sheets, a cohesive element was applied between the bottom surface of RC beam and CFRP sheets. Both quasi-static method and 2-D symmetric FE model technique were performed to solve nonlinear problems. Results obtained from the FE models show good agreements with experimental results. It was found that reinforcement level of CFRP sheets is closely related to structural behavior of reinforced concrete including maximum strength, initial stiffness and deflection at failure. Also, as over-reinforcement of CFRP sheets could give rise to the brittle failure of RCstructure using CFRP sheets, an appropriate measure should be required when installing CFRP sheets in the structure.

A Study on Blood Stasis Pattern for 159 Hysterectomy Patients (자궁절제술 시행 환자 159명의 어혈증 연구)

  • Choi, Jin-Young;Lee, Jin-Moo;Lee, Chang-Hoon;Cho, Jung-Hoon;Jang, Jun-Bock;Lee, Kyung-Sub
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.22 no.4
    • /
    • pp.122-134
    • /
    • 2009
  • Purpose: The purpose of this study is to know the blood stasis pattern for the patients who had hysterectomy. Methods: Among the patients who had hysterectomy in the department of obstetrics and gynecology, OO medical center from March 3rd 2009 to October 21st 2009, subjects who met inclusion criteria and submitted appropriate questionnaire. We compared blood stasis score and operational method, age, BMI, past operation history of abdominal and pelvic site, parity, whether adhesiolysis, oriental medicine intervention was done. For statistics, we used independent samples t-test, oneway analysis of variances(ANOVA) and SPSS version 13.0 for windows. Results: Blood stasis score of the subtotal hysterectomy group ($44.43{\pm}15.01$) is higher than that of the total hysterectomy group($39.04{\pm}12.46$). Blood stasis score under the age 40($51.88{\pm}12.68$) is higher than 40-49 age patients($40.34{\pm}14.24$) and over the age 50 patients($41.62{\pm}13.46$). There is no statistically significant difference between laparoscopic and abdominal trial, whether adhesiolysis, oriental medicine intervention was done, BMI, past operation history abdominal and pelvic site, parity, chief complaint before hysterectomy, oriental medicine intervention. Conclusion: Through the results showed, when traditional Korean medical doctors use static blood medication, history of hysterectomy and age should be considered as the history of subtotal hysterectomy and younger age tend to have a higher rate of a blood stasis pattern. We need a further study to develop blood stasis indicators with a validated questionnaire, and more subjects involved at multiple institutions.

A Study on Ransomware Detection Methods in Actual Cases of Public Institutions (공공기관 실제 사례로 보는 랜섬웨어 탐지 방안에 대한 연구)

  • Yong Ju Park;Huy Kang Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.499-510
    • /
    • 2023
  • Recently, an intelligent and advanced cyber attack attacks a computer network of a public institution using a file containing malicious code or leaks information, and the damage is increasing. Even in public institutions with various information protection systems, known attacks can be detected, but unknown dynamic and encryption attacks can be detected when existing signature-based or static analysis-based malware and ransomware file detection methods are used. vulnerable to The detection method proposed in this study extracts the detection result data of the system that can detect malicious code and ransomware among the information protection systems actually used by public institutions, derives various attributes by combining them, and uses a machine learning classification algorithm. Results are derived through experiments on how the derived properties are classified and which properties have a significant effect on the classification result and accuracy improvement. In the experimental results of this paper, although it is different for each algorithm when a specific attribute is included or not, the learning with a specific attribute shows an increase in accuracy, and later detects malicious code and ransomware files and abnormal behavior in the information protection system. It is expected that it can be used for property selection when creating algorithms.