• Title/Summary/Keyword: combined flaws

Search Result 11, Processing Time 0.028 seconds

An experimental study on fracture coalescence characteristics of brittle sandstone specimens combined various flaws

  • Yang, Sheng-Qi
    • Geomechanics and Engineering
    • /
    • v.8 no.4
    • /
    • pp.541-557
    • /
    • 2015
  • This research aims to analyze the fracture coalescence characteristics of brittle sandstone specimen ($80{\times}160{\times}30mm$ in size) containing various flaws (a single fissure, double squares and combined flaws). Using a rock mechanics servo-controlled testing system, the strength and deformation behaviours of sandstone specimen containing various flaws are experimentally investigated. The results show that the crack initiation stress, uniaxial compressive strength and peak axial strain of specimen containing a single fissure are all higher than those containing double squares, while which are higher than those containing combined flaws. For sandstone specimen containing combined flaws, the uniaxial compressive strength of sandstone increase as fissure angle (${\alpha}$) increases from $30^{\circ}$ to $90^{\circ}$, which indicates that the specimens with steeper fissure angles can support higher axial capacity for ${\alpha}$ greater than $30^{\circ}$. In the entire deformation process of flawed sandstone specimen, crack evolution process is discussed detailed using photographic monitoring technique. For the specimen containing a single fissure, tensile wing cracks are first initiated at the upper and under tips of fissure, and anti-tensile cracks and far-field cracks are also observed in the deformation process; moreover anti-tensile cracks usually accompanies with tensile wing cracks. For the specimen containing double squares, tensile cracks are usually initiated from the top and bottom edge of two squares along the direction of axial stress, and in the process of final unstable failure, more vertical splitting failures are observed in the ligament region. When a single fissure and double squares are formed together into combined flaws, the crack coalescence between the fissure tips and double squares plays a significant role for ultimate failure of the specimen containing combined flaws.

A Model Estimating the Propagation Behavior of through cracks in Aluminum alloy A5083-O for LNG Tank (LNG탱크용 알루미늄합금 A5083-O의 관통균열 전파거동 예측 모델)

  • 김영식;조상명;김종호
    • Journal of Ocean Engineering and Technology
    • /
    • v.12 no.1
    • /
    • pp.50-57
    • /
    • 1998
  • The leak before break(LBB) concept is generalized on the design of LNG tanks, pressure vessels and nuclear reactor in that any leakage of containment, in whatever amount, will not result in catastropic failure. For this purpose it is necessary to determine the surface crack shape, the opening displacement and the risk of catastropic brittle fracture when it becomes a through crack. In this study the crack propagation behavior of surface flaws and the crack opening displacement of through cracks under combined membrane and bending stresses were investigated with fatigue tests and fracture toughness test of aluminium alloy A5083-O. And fracture mechanics analysis of the crack opening displacement of through cracks were made in order to develop a new model expressing the behaviors of COD under combined membrane and bending stresses.

  • PDF

Side-Channel Attacks on Square Always Exponentiation Algorithm (Square Always 멱승 알고리듬에 대한 부채널 공격)

  • Jung, Seung-Gyo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.477-489
    • /
    • 2014
  • Based on some flaws occurred for implementing a public key cryptosystem in the embedded security device, many side-channel attacks to extract the secret private key have been tried. In spite of the fact that the cryptographic exponentiation is basically composed of a sequence of multiplications and squarings, a new Square Always exponentiation algorithm was recently presented as a countermeasure against side-channel attacks based on trading multiplications for squarings. In this paper, we propose Known Power Collision Analysis and modified Doubling attacks to break the Right-to-Left Square Always exponentiation algorithm which is known resistant to the existing side-channel attacks. And we also present a Collision-based Combined Attack which is a combinational method of fault attack and power collision analysis. Furthermore, we verify that the Square Always algorithm is vulnerable to the proposed side-channel attacks using computer simulation.

On a New Index for Research Assessment

  • Farid, Farid O.
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.56-75
    • /
    • 2021
  • We introduce a new research assessment measure, called the research excellence index. The measure, which we denote by RE-index, accurately assesses the research performance of a researcher. The methodology used in deriving the RE-index tackles many of the flaws of popular research performance indicators such as publication counts, citation counts, and the h and g indices. A dataset is introduced, which takes advantage of the wide coverage of Scopus and the Library of Congress, and, at the same time, deals with the Scopus database depth problem. For an academic publication x, a prestige-type and length scores are assigned, and if x is published in an academic periodical publication J, the stature of J is identified through a quartile score. The three scores are used to assign a value score to every academic publication, and cited academic publications are given citation scores that encompass both cases of including and excluding self-citations. The foregoing scores are used to derive another set of scores measuring the combined qualitative and quantitative aspects of the creative work, citations of creative work, informative work and citations of informative work of a researcher. The scores take into consideration co-authorship. From these scores, two versions of the RE-index for a researcher are derived, covering the cases of including and excluding self-citations. The new measure is calculated for two mathematicians.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

A Comparative Study on the Windchill Indices (체감온도이론의 비교 연구)

  • Park, Jeon-Hwan;Han, Uk;Park, Rae-Seol
    • Journal of the Korean earth science society
    • /
    • v.23 no.8
    • /
    • pp.676-682
    • /
    • 2002
  • The concept of sensible temperature in winter is an attempt to quantify the sensation of cold by dry-bulb temperature combined with wind speed. Siple-Passel’s windchill equivalent temperature originated in experiments that are not conformable to various human conditions. Therefore, many investigators have found the flaws which are listed. Steadman’s model is based on the concept of thermal equilibrium and more sound and more representative of human conditions. But no classifications exist for Steadman’s windchill equivalent temperature, yet. The JAG/TI-model which was developed by US and Canada is more accurate, easy to understand and reflects human beings by conducting experiments using human volunteers but didn't take into account solar radiation, wet condition and physical state of the individual. Because of individual differences in people’s age, activity, health, metabolic rate, etc., no experimental evidence exists to suggest whether Siple-Passel’s, Steadman’s and JAG/TI-model’s windchill equivalent temperature is more applicable to the majority of people. Therefore we need the windchill model which is best applicable to Korean Army.

A Study on Secure Key Management Technology between Heterogeneous Networks in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 이기종 네트워크간 안전한 키 관리 기술에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.504-515
    • /
    • 2008
  • Fast transmission speeds and various wired network services have been combined with the convenience and mobility of wireless services. The combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security flaws. In existing homogeneous networks, user authentication and key management between heterogeneous networks are required for these new technologies. The establishment of security technologies for heterogeneous devices is a very important task between homogeneous networks. In this paper, we propose a secure and efficient key management system for a heterogeneous network environment. Our system provides secure communications between heterogeneous network devices.

  • PDF

The Design of the Integrated Module to Cope with Sudden Unintended Acceleration (자동차 급발진을 대비하기 위한 통합 모듈 설계)

  • Cha, Jea-Hui;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.221-223
    • /
    • 2016
  • Currently in the automobile market, models with many convenient functions combined with IT have been released. This change has a strength that there could be many convenient and useful functions related to driving while flaws of vehicles caused by malfunctions of these electronic equipments could trigger serious incidents. Among them, the sudden unintended acceleration considered as the most serious is a serious flaw that could threaten driver's life. However, the causes for sudden acceleration incidents have not been clearly investigated with no coping measures. As manufacturers shift the responsibility to drivers' carelessness, drivers' burden is continuously increasing. Thus, this paper designed the system to cope with sudden acceleration incidents by changing conditions of controlling parts like accelerator and brake, and internal image of the driver's seat into data through the integrated module.

  • PDF

Variation of Engineering Geological Characteristics of Jurassic Granite in Wonju Due to Freeze-Thaw Weathering (동결-융해 풍화에 의한 원주지역 쥬라기 화강암의 지질공학적 특성변화)

  • Um, Jeong-Gi;Woo, Ik;Park, Hyuck-Jin
    • Economic and Environmental Geology
    • /
    • v.42 no.3
    • /
    • pp.261-272
    • /
    • 2009
  • An experimental study of the accelerated weathering was performed to investigate the variations of physicomechanical properties of deteriorated rocks due to freeze-thaw weathering for the Jurassic granite specimens from Wonju, Gangwon-do. Each complete cycle of freeze and thaw was lasted 24 hours, comprising 2 hours saturating in vacuum chamber, 8 hours freezing at -20$\pm1^{\circ}C$ and 14 hours thawing at room temperature. Freeze-thaw cycles were implemented with measuring the index physical properties as well as geometries of microfractures. The seismic velocity was found to decrease with increasing freeze-thaw cycles. On the other hand, absorption tends to increase with freeze-thaw cycles. In the end, it was concluded that variations of the index properties of deteriorated specimen depend on its initial properties and flaws in rock. The size and density of the traces of the microfracture on slab specimen were changed continuously with increasing freeze-thaw weathering. The results obtained in this study show that the box fractal dimension($D_B$) has the strong capability of quantifying the combined effect of size and density of the microfractures.

The Design of the Obstacle Avoidances System for Unmanned Vehicle Using a Depth Camera (깊이 카메라를 이용한 무인이동체의 장애물 회피 시스템 설계)

  • Kim, Min-Joon;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.224-226
    • /
    • 2016
  • With the technical development and rapid increase of private demand, the new market for unmanned vehicle combined with the characteristics of 'unmanned automation' and 'vehicle' is rapidly growing. Even though the pilot driving is currently allowed in some countries, there is no country that has institutionalized the formal driving of self-driving cars. In case of the existing vehicles, safety incidents are frequently happening due to the frequent malfunction of the rear sensor, blind spot of the rear camera, or drivers' carelessness. Once such minor flaws are complemented, the relevant regulations for the commercialization of self-driving car and small drone could be relieved. Contrary to the ultrasonic and laser sensors used for the existing vehicles, this paper aims to attempt the distance measurement by using the depth sensor. A depth camera calculates the distance data based on the TOF method calculating the time difference by lighting laser or infrared light onto an object or area and then receiving the beam coming back. As this camera can obtain the depth data in the pixel unit of CCD camera, it can be used for collecting depth data in real-time. This paper suggests to solve problems mentioned above by using depth data in real-time and also to design the obstacle avoidance system through distance measurement.

  • PDF