• Title/Summary/Keyword: construction delay

Search Result 623, Processing Time 0.025 seconds

A Study on Construction of Roundabouts considering the Effects for Adjacent Intersections in Urban Network (인접교차로 영향을 고려한 회전교차로 도입방안 연구)

  • Lee, Dong-Min;Kim, Do-Hun
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.5
    • /
    • pp.79-89
    • /
    • 2011
  • Though many studies regarding roundabout have been recently conducted, most of them have focused on operational aspect. Moreover, majority of the previous researches analyzes operational effects of single roundabout, but seldom investigate the effects of multi-roundabouts constructed on road networks. In this study, we seek ways to construct multiple roundabouts on road network maximizing their operational effects. The analysis investigate influence of both adjacent signalized and unsignalized intersections as well as influence of the distance from those intersections to roundabouts. The results show that the optimal distance between two adjacent intersections were calculated to be 150m, and any two intersections located within 150m apart influence each other thus imposing operational restrictions on each other. In addition, those results are confirmed using simulation analysis conducted on the real urban network in Nonheon regional area, Incheon City.

Sink-Initiated Geographic Multicasting Protocol for Mobile Sinks in Wireless Sensor Networks (무선 센서 망에서 이동 싱크를 위한 위치기반 멀티캐스팅 프로토콜)

  • Lee, Jeong-Cheol;Park, Ho-Sung;Oh, Seung-Min;Jung, Ju-Hyun;Yim, Yong-Bin;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4A
    • /
    • pp.377-385
    • /
    • 2010
  • In this paper, we propose a SInk-initiated geographic Multicast (SIM) protocol to reduce frequent location updates from mobile sinks to a source and to achieve fast multicast tree construction and data delivery. The proposed protocol allows sinks to construct their own data delivery paths to a source node and a multicast tree to be atomically constructed by merging the paths. Then, the source forwards data to the destinations down the multicast tree. This paper also propose a round-based virtual infrastructure with a radial shape for increasing the merging probability of data delivery paths and reducing reconstruction ratio of the multicast tree due to mobility of sinks. Simulation results show that the proposed protocol is superior to previous SOurce-initiated geographic Multicast (SOM) protocols in term of average data delivery delay and average energy consumption.

A Study on the Construction of Parallel Multiplier over GF2m) (GF(2m) 상에서의 병렬 승산기 설계에 관한 연구)

  • Han, Sung-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2012
  • A low-complexity Multiplication over GF(2m) and multiplier circuit has been proposed by using cyclic-shift coefficients and the irreducible trinomial. The proposed circuit has the parallel input/output architecture and shows the lower-complexity than others with the characteristics of the cyclic-shift coefficients and the irreducible trinomial modular computation. The proposed multiplier is composed of $2m^2$ 2-input AND gates and m (m+2) 2-input XOR gates without the memories and switches. And the minimum propagation delay is $T_A+(2+{\lceil}log_2m{\rceil})T_X$. The Proposed circuit architecture is well suited to VLSI implementation because it is simple, regular and modular.

Global Project Finance Trends and Commercial Risk Analysis (글로벌 프로젝트 파이낸스 최근 동향 및 상업위험 분석)

  • Kim, Sang Man
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.61
    • /
    • pp.273-302
    • /
    • 2014
  • Project finance ("PF") is a method of raising long-term debt financing based on lending against the cash flow generated by the project alone. Project finance is a nonrecourse or limited recourse financing structure against the sponsors(or the investors). The debt terms in a project finance are not based on the creditor's credit support or on the value of the assets of the project. Lenders rely on the future cash flow to be generated by the project for debt repayment and interest, rather than the value of the project or the credit ratings of the sponsors. The non-recourse or limited recourse financing usually prompt potential project finance lenders to assess carefully all possible risks that might arise in a project to ensure that those risks are mitigated and controlled. In this respect, project finance is a opposite financing method of corporate finance. Project finance has rapidly grown over the last 20 years due to the worldwide process of privatization of public sector and development of natural resources. Global project finance volume reached the record USD 406.5 billion in 2011. In 2012, however, Global project finance volume dropped 6% to USD 382.3 billion. Infrastructure overtook Energy to lead all sectors with USD 113.6 billion. It is generally recognized that there are more and higher risks in project finance compared with corporate finance. Project finance is exposed to commercial risks as well as political risks. The main commercial risks are completion risks, environmental risks, operating risks, input supply risks, revenue risks, etc, and the main political risks are currency convertibility and transfer risks, expropriation risks, war and civil disturbance risks, risks of breach of government concession agreement, etc. Completion risks include permits risks, risks relating to the EPC Contractor, construction cost overrun, delay in completion, inadequate performance on completion, etc.

  • PDF

A Study on Open API Security Protocol based on Multi-Channel (다중 채널 기반 오픈 API 보안 프로토콜에 관한 연구)

  • Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.40-46
    • /
    • 2020
  • Safe security technology is required for the startup ecosystem according to the construction and service of a joint open platform in the financial sector. Financial industry standard open API recommends that payment-related fintech companies develop/apply additional security technologies to protect core API authentication keys in the mutual authentication process. This study proposes an enhanced API security protocol using multiple channels. It was designed in consideration of the compatibility of heterogeneous platforms by further analyzing the problems and weaknesses of existing open API related research. I applied the method of concealment to remove the additional security channels into a single channel of the existing security protocols. As a result of the performance analysis, the two-way safety of the communication session of the multi-channel and the security of the man-in-the-middle attack of the enhanced authentication key were confirmed, and the computational performance of the delay time (less than 1 second) in the multi-session was confirmed.

A Construction and Operation Analysis of Group Management Network about Control Devices based on CIM Level 3 (CIM 계층 3에서 제어 기기들의 그룹 관리 네트워크 구축과 운영 해석)

  • 김정호
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.87-101
    • /
    • 1999
  • To operate the automatic devices of manufacturing process more effectively and to solve the needs of the resource sharing, network technology is applied to the control devices located in common manufacturing zone and operated by connecting them. In this paper, functional standard of the network layers are set as physical and data link layer of IEEE 802.2, 802.4, and VMD application layer and ISO-CIM reference model. Then, they are divided as minimized architecture, designed as group objects which perform group management and service objects which organizes and operates the group. For the stability in this network, this paper measures the variation of data packet length and node number and analyzes the variated value of the waiting time for the network operation. For the method of the analysis, non-exhausted service method are selected, and the arrival rates of the each data packet to the nodes that are assumed to form a Poission distribution. Then, queue model is set as M/G/1, and the analysis equation for waiting time is found. For the evalution of the performance, the length of the data packet varies from 10 bytes to 100 bytes in the operation of the group management network, the variation of the wating time is less than 10 msec. Since the waiting time in this case is less than 10 msec, response time is fast enough. Furthermore, to evaluate the real time processing of the group management network, it shows if the number of nodes is less than 40, and the average arrival time is less than 40 packet/sec, it can perform stable operation even taking the overhead such as software delay time, indicated packet service, and transmissin safety margin.

  • PDF

Application of Insulation Curing Method with Double Bubble Sheets Subjected to Cold Weather (이중 버블시트를 이용한 단열양생공법의 한중시공 적용 사례)

  • Hong, Seak-Min;Lee, Chung-Sub;Kim, Jong;Jeon, Chung-Kun;Han, Min-Cheol;Han, Cheon-Goo
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2008.04a
    • /
    • pp.1001-1004
    • /
    • 2008
  • This study reviewed the results of utilization of insulation heat curing method using double layer bubble sheet in slab concrete and mass concrete in cold weather environment. First of all, when double layer bubble sheets are applied, it was shown that slab concrete was protected from early freezing by remaining between 6 and $10^{\circ}C$ even in case outside temperature drops $10^{\circ}C$ below zero until the 2nd day from piling, and in the case of mass concrete, with the maximum temperature difference between the center and surface less than $6^{\circ}C$, crack occurrence index was close to 2 and no hydration heat crack occurred by internal constraint. The insulation heat preservation curing method using the double bubble sheet applied in this field prevented early freezing owing to stable curing temperature management, deterring concrete strength development delay at low temperature, and obtained the needed strength. Also, it was proven that the method is highly effective and economic for cold weather concrete quality maintenance through curing cost reduction like construction period shortening and labor cost reduction, etc by reducing the process of temporary equipment installation and disassembling.

  • PDF

Construction of High-Speed Parallel Multiplier on Finite Fields GF(3m) (유한체 GF(3m)상의 고속 병렬 승산기의 구성)

  • Choi, Yong-Seok;Park, Seung-Yong;Seong, Hyeon-Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.510-520
    • /
    • 2011
  • In this paper, we propose a new multiplication algorithm for primitive polynomial with all 1 of coefficient in case that m is odd and even on finite fields $GF(3^m)$, and compose the multiplier with parallel input-output module structure using the presented multiplication algorithm. The proposed multiplier is designed $(m+1)^2$ same basic cells that have a mod(3) addition gate and a mod(3) multiplication gate. Since the basic cells have no a latch circuit, the multiplicative circuit is very simple and is short the delay time $T_A+T_X$ per cell unit. The proposed multiplier is easy to extend the circuit with large m having regularity and modularity by cell array, and is suitable to the implementation of VLSI circuit.

A Study on the Formation of the 'Jeokbyeokdol (Red brick)' in Modern Korea (근대 적벽돌 생산사에 관한 연구)

  • Cho, Hong-Seok;Kim, Chung-Dong
    • Journal of architectural history
    • /
    • v.19 no.6
    • /
    • pp.99-120
    • /
    • 2010
  • According to it, a final goal of this study sets up 'Renovation of the Red brick architecture' and development of theoretical foundation and substantial conservation about Red brick architecture through historical records must be settled without delay. Firstly, it analyzes related terminology and adjusts brick architecture's history and features for architectural authenticity about Red brick architecture. It would study production and construction process of brick in korea. From analysis of records, brick of traditional meaning is 'Jeondol' and western brick of modern meaning is 'Red brick'. 'Brick' defines a common designation. This study shows definition of words based on documents published until 19th century and a korean language and architecture terms dictionary. In view of this results, the meaning of brick which combines different types extensively uses 'Chu', 'Jeon', 'Byeok' according to the purpose of use and the current of the times. In case of 'Jeon', it uses jointly different types such as '塼', '磚', '甎'. but '塼' is frequently used. Even though these words like 'byeok' used individual or combination types until the late 19th century, there is no use because of japanese terms in japanese colonial. After liberation, it was the term of the traditional brick. Brick is generally used through modern times. In an unabridged Korean language dictionary, it defines this term as orthodox korean '壁乭' and '?乭'. At that time of japanese colonial, 'Yeonwa(煉瓦)' used in combination with brick. Due to influence it, it partly uses until now but it is not in common use. Also, a Korean language dictionary contains transcription of 'Yeonwa' with same definition as 'Byeokdol'. In the other side, it results from translating japanese into Korean. It would make exact definition of 'Yeonwa'.

P2Patching : Effective Patching Scheme for On-Demand P2P Services (P2Patching : 주문형 P2P 서비스를 위한 효율적인 패칭 기법)

  • Kim Jong-Gyung;Lee Jae-Hyuk;Park Seung-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2B
    • /
    • pp.137-145
    • /
    • 2006
  • In this paper, we propose a multicast P2Patching technique in the application layer. The P2Patching technique serves VOD stream effectively with Patching in P2P environment. The P2Patching provides multicast tree construction technique that reduces the server load and minimizes the start delay with extended multicast technique. And we provide a fast recovery technique by tree failure and dynamic buffering scheme that guarantees the continuous streaming by frequent tree disconnections. Comparing the method with that of $P2Cast^{[12]}$, we obtained the better performance by our scheme in terms of average join count, service rejection probability, tree recovery failure and buffer starvation. The average about 16$\%$ of the improvement is shown by the simulation. Most of all, the performance of buffer starvation and average join count shows a significant improvement than that of P2Cast.