• Title/Summary/Keyword: critical target

Search Result 835, Processing Time 0.029 seconds

Durability Evaluation and Defect Pattern Analysis in Railway Bridge Through Field Investigation (현장조사를 통한 철도 고가교 구조물의 내구성 평가 및 결함 패턴 분석)

  • Kwon, Seung Jun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.1
    • /
    • pp.10-20
    • /
    • 2013
  • Because of the defect in design, damage in using period, and deterioration in long term exposure to severe environmental condition, degradation of performance in RC (Reinforced Concrete) structures has occurred. This paper contains durability performance evaluation in railway bridges which covers eight districts through field investigation. For the target structures, durability performance is evaluated and the critical problems in use are derived. Additionally, service lifes for the deteriorated structures are evaluated through Durability-Environment index method based on the results from field investigation, and the results are compared with those from the condition assuming the structures without defect, damage, and deterioration. The target structures which consist of RC T girder, PSC girder, RC box, and Rahmen are investigated and the critical damage patterns are derived. They are evaluated to be cracks in PSC girder end, flexural cracks in PSC girder, crack around EPT anchor, and flexural cracks in RC T girder and RC box. The reasons for the critical patterns are also investigated. This study can be utilized for the repair planning considering the different district and the structure types.

A method of inferring collision ratio based on maneuverability of own ship under critical collision conditions

  • You, Youngjun;Rhee, Key-Pyo;Ahn, Kyoungsoo
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.5 no.2
    • /
    • pp.188-198
    • /
    • 2013
  • In constructing a collision avoidance system, it is important to determine the time for starting collision avoidance maneuver. Many researchers have attempted to formulate various indices by applying a range of techniques. Among these indices, collision risk obtained by combining Distance to the Closest Point of Approach (DCPA) and Time to the Closest Point of Approach (TCPA) information with fuzzy theory is mostly used. However, the collision risk has a limit, in that membership functions of DCPA and TCPA are empirically determined. In addition, the collision risk is not able to consider several critical collision conditions where the target ship fails to take appropriate actions. It is therefore necessary to design a new concept based on logical approaches. In this paper, a collision ratio is proposed, which is the expected ratio of unavoidable paths to total paths under suitably characterized operation conditions. Total paths are determined by considering categories such as action space and methodology of avoidance. The International Regulations for Preventing Collisions at Sea (1972) and collision avoidance rules (2001) are considered to solve the slower ship's dilemma. Different methods which are based on a constant speed model and simulated speed model are used to calculate the relative positions between own ship and target ship. In the simulated speed model, fuzzy control is applied to determination of command rudder angle. At various encounter situations, the time histories of the collision ratio based on the simulated speed model are compared with those based on the constant speed model.

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.

Hsa_circ_0129047 sponges miR-665 to attenuate lung adenocarcinoma progression by upregulating protein tyrosine phosphatase receptor type B

  • Xiaofan Xia;Jinxiu Fan;Zhongjie Fan
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.27 no.2
    • /
    • pp.131-141
    • /
    • 2023
  • Compelling evidence has demonstrated the critical role of circular RNAs (circRNAs) during lung adenocarcinoma (LUAD) progression. Herein, we explored a novel circRNA, circ_0129047, and detailed its mechanism of action. The expression of circ 0129047, microRNA-665 (miR-665), and protein tyrosine phosphatase receptor type B (PTPRB) in LUAD tissues and cells was determined using reverse transcription quantitative polymerase chain reaction and Western blotting. Cell Counting Kit8 and colony formation assays were conducted to detect LUAD cell proliferation, and western blotting was performed to quantify apoptosis-related proteins (Bcl2 and Bax). Luciferase reporter and RNA immunoprecipitation assays were used to validate the predicted interaction between miR-665 and circ_0129047 or PTPRB. A xenograft assay was used for the in vivo experiments. Circ_0129047 and PTPRB were downregulated in LUAD tissues and cells, whereas miR-665 expression was upregulated. Overexpression of circ_0129047 suppresses LUAD growth in vivo and in vitro. Circ_0129047 is the target of miR-665, and the miR-665 mimic ablated the antiproliferative and pro-apoptotic phenotypes of LUAD cells by circ_0129047 augmentation. MiR-665 targets the 3'UTR of PTPRB and downregulates PTPRB expression. PTPRB overexpression offsets the pro-proliferative potential of miR-665 in LUAD cells. Circ_0129047 sequestered miR-665 and upregulated PTPRB expression, thereby reducing LUAD progression, suggesting a promising approach for preventing LUAD.

Determination of Target Position with BRW Stereoatic Frame in non-orthogonal CT scans (비직교성 전산화단층촬영에서 뇌정위수술용 좌표계를 이용한 표적위치 결정)

  • Park, Tae-Jin;Kim, Ok-Bae;Son, Eun-Ik
    • Progress in Medical Physics
    • /
    • v.3 no.1
    • /
    • pp.53-62
    • /
    • 1992
  • Stereotactic implantation of intracranial lesions, and the development of stereotactic convergent irradiation, radiosurgery, techniques have to obtain the accurate coordinates of the tumor locations and that of critical organ. Computed tomography(CT) provides relatively precise imformations of tumor localization and surround the normal organs for conventional radiotherapy. This CT image use to extend for stereotactic radiosurgery procedures. Since the convergent irradiation technique in linear accelerator requires the target center coincident with gantry isocenter or radosurgery frame, the target coordinates must be described in accurately. We used the BRW stereotactic system for describing the target position in CT images This algorithm provides the coordinate conversions for orthogonal or non-orthogonal CT scan image. In this experiments, the target positions have shown the small discripancy within :to.3mm uncertanty in several known target positions in the phantom through the provided programs and it compared to that of BRW stereotactic systems.

  • PDF

Triptolide Inhibits Histone Methyltransferase EZH2 and Modulates the Expression of Its Target Genes in Prostate Cancer Cells

  • Tamgue, Ousman;Chai, Cheng-Sen;Hao, Lin;Zambe, John-Clotaire Daguia;Huang, Wei-Wei;Zhang, Bin;Lei, Ming;Wei, Yan-Ming
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.10
    • /
    • pp.5663-5669
    • /
    • 2013
  • The histone methyltransferase EZH2 (enhancer of zeste homolog 2) plays critical roles in prostate cancer (PCa) development and is a potential target for PCa treatment. Triptolide possesses anti-tumor activity, but it is unknown whether its therapeutic effect relates with EZH2 in PCa. Here we described EZH2 as a target for Triptolide in PCa cells. Our data showed that Triptolide suppressed PCa cell growth and reduced the expression of EZH2. Overexpression of EZH2 attenuated the Triptolide induced cell growth inhibition. Moreover, Triptolide treatment of PC-3 cells resulted in elevated mRNA levels of target genes (ADRB2, CDH1, CDKN2A and DAB2IP) negatively regulated by EZH2 as well as reduced mRNA levelsan of EZH2 positively regulated gene (cyclin D1). Our findings suggest the PCa cell growth inhibition mediated by Triptolide might be associated with downregulation of EZH2 expression and the subsequent modulation of target genes.

Analysis of acoustic scattering characteristics of an aluminum spherical shell with different internal fluids and classification using pseudo Wigner-Ville distribution (구형 알루미늄 쉘 내부의 충전 유체에 따른 수중 음향 산란 특성 분석 및 유사 위그너-빌 분포를 이용한 식별 기법 연구)

  • Choo, Yeon-Seong;Byun, Sung-Hoon;Kim, Sea-Moon;Lee, Keunhwa
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.5
    • /
    • pp.549-557
    • /
    • 2019
  • The acoustical scattering characteristics of a target are influenced by the material properties and structural characteristics of the target, which are critical information for acoustic detection and identification of underwater target. In particular, for thin elastic target, unique scattered signals are generated around the target by the Lamb wave. In this paper, the results of scattered signal measurement of aluminum spherical shell in the water tank using the stepped frequency sweep sine signal are presented. In particular, the scattering of the water-filled aluminum spherical shell is compared with that of the air-filled one both theoretically and experimentally. The difference of the scattered signals are analyzed using the pseudo Wigner-Ville distribution in terms of average frequency, frequency distribution, and energy of the scattered signal. The result shows that all observed parameters increased when the aluminum sphere was water-filled, and it is well matched to the theoretical expectation.

Comparison between Gel Pad Cooling Device and Water Blanket during Target Temperature Management in Cardiac Arrest Patients

  • Jung, Yoon Sun;Kim, Kyung Su;Suh, Gil Joon;Cho, Jun-Hwi
    • Acute and Critical Care
    • /
    • v.33 no.4
    • /
    • pp.246-251
    • /
    • 2018
  • Background: Target temperature management (TTM) improves neurological outcomes for comatose survivors of out-of-hospital cardiac arrest. We compared the efficacy and safety of a gel pad cooling device (GP) and a water blanket (WB) during TTM. Methods: We performed a retrospective analysis in a single hospital, wherein we measured the time to target temperature ($<34^{\circ}C$) after initiation of cooling to evaluate the effectiveness of the cooling method. The temperature farthest from $33^{\circ}C$ was selected every hour during maintenance. Generalized estimation equation analysis was used to compare the absolute temperature differences from $33^{\circ}C$ during the maintenance period. If the selected temperature was not between $32^{\circ}C$ and $34^{\circ}C$, the hour was considered a deviation from the target. We compared the deviation rates during hypothermia maintenance to evaluate the safety of the different methods. Results: A GP was used for 23 patients among of 53 patients, and a WB was used for the remaining. There was no difference in baseline temperature at the start of cooling between the two patient groups (GP, $35.7^{\circ}C$ vs. WB, $35.6^{\circ}C$; P=0.741). The time to target temperature (134.2 minutes vs. 233.4 minutes, P=0.056) was shorter in the GP patient group. Deviation from maintenance temperature (2.0% vs. 23.7%, P<0.001) occurred significantly more frequently in the WB group. The mean absolute temperature difference from $33^{\circ}C$ during the maintenance period was $0.19^{\circ}C$ (95% confidence interval [CI], $0.17^{\circ}C$ to $0.21^{\circ}C$) in the GP group and $0.76^{\circ}C$ (95% CI, $0.71^{\circ}C$ to $0.80^{\circ}C$) in the WB group. GP significantly decreased this difference by $0.59^{\circ}C$ (95% CI, $0.44^{\circ}C$ to $0.75^{\circ}C$; P<0.001). Conclusions: The GP was superior to the WB for strict temperature control during TTM.

A Study on Major Countries's Level of Cybersecurity for Critical Infrastructure (주요기반시설에 대한 주요국 사이버보안 수준 비교·분석 연구)

  • Park, Hyang-mi;Yoo, Ji-yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.163-176
    • /
    • 2017
  • Recently, the critical infrastructure is changing from the existing closed environment to an open environment, and it is becoming a new target of cyber-threats by expanding into cyberspace. In addition, due to the development of information and communications technology(ICT), the interdependence among critical infrastructure is increasing. Previous studies ranged from trend investigation and policy discussions to protection, but separate studies on the diagnosis of the current status and appropriateness judgment for efficient policy implementation were not performed. Therefore, this study compares and analyzes three international indicators that measure the level of cyber security in each country in order to build a new index to measure the level of cyber security of critical infrastructure in the USA, Japan, UK, Germany, Norway, and Korea. It is hoped that this study will serve as a basis for expanding Korean influence and building trust among countries in future cyberspace.

Characteristics of Static Buckling Load of the Hexagonal Spatial Truss Models using Timber (목재를 이용한 육각형 공간 트러스 모델의 정적좌굴하중 특성)

  • Ha, Hyeonju;Shon, Sudeok;Lee, Seungjae
    • Journal of Korean Association for Spatial Structures
    • /
    • v.22 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • In this paper, the instability of the domed spatial truss structure using wood and the characteristics of the buckling critical load were studied. Hexagonal space truss was adopted as the model to be analyzed, and two boundary conditions were considered. In the first case, the deformation of the inclined member is only considered, and in the second case, the deformation of the horizontal member is also considered. The materials of the model adopted in this paper are steel and timbers, and the considered timbers are spruce, pine, and larch. Here, the inelastic properties of the material are not considered. The instability of the target structure was observed through non-linear incremental analysis, and the buckling critical load was calculated through the singularities and eigenvalues of the tangential stiffness matrix at each incremental step. From the analysis results, in the example of the boundary condition considering only the inclined member, the critical buckling load was lower when using timber than when using steel, and the critical buckling load was determined according to the modulus of elasticity of timber. In the case of boundary conditions considering the effect of the horizontal member, using a mixture of steel and timber case had a lower buckling critical load than the steel case. But, the result showed that it was more effective in structural stability than only timber was used.