• Title/Summary/Keyword: design envelope

Search Result 300, Processing Time 0.025 seconds

Re-establishing Method of Stability Margin Airworthiness Certification Criteriafor Flight Control System (비행제어시스템 안정성 여유 감항인증 기준 재정립 방안)

  • Kim, Dong-hwan;Kim, Chong-sup;Lim, Sangsoo;Koh, Gi-oak;Kim, Byoung soo
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.1
    • /
    • pp.17-27
    • /
    • 2022
  • A certain level of stability margin airworthiness criteria should be met to secure robustness against uncertainties between the real plant and the model in a flight control system design. The U.S. Department of Defense (DoD) specification of MIL-F-9490D and airworthiness certification standard of MIL-HDBK-516B uses gain and phase margin criteria of flight control system. However, the same stability margin criteria is applied at all development phases without considering the design maturity of each development phase of the aircraft. Ultimately, a problem arises when the aircraft operation envelope is excessively restricted. This paper proposes the relation of handling qualities and stability margin, and presents re-established stability margin criteria as a development phases and verification methods. The results of the research study are considered to contribute to the verification of the stability margin criteria more flexibly and effectively by applying the method to not only the currently manned developing aircrafts but also the unmanned vehicle to be developed in the future.

Study on the Variation of Energy Dissipation Factor of Reinforced Concrete Beam under Cyclic Loading (반복하중을 받는 철근콘크리트 보의 에너지소산계수 변화 특성 고찰)

  • Suk-Hyeong Yoo;Dae-Young Kang
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.27 no.6
    • /
    • pp.86-93
    • /
    • 2023
  • As the hysteretic behavior of reinforced concrete members under cyclic loading progresses, the energy dissipation ability decreases due to a decrease in stiffness and strength and pinching effects. However, the guideline "Nonlinear Analysis Model for Performance-Based Seismic Design of Reinforced Concrete Building Structures, 2021" requires calculating a single energy dissipation factor for each member and all histeric step, so the decrease in energy dissipation capacity according to histeric step cannot be considered. It is judged that Therefore, in this study, the energy dissipation factor according to the histeric step was examined by comparing the existing experimental results and the nonlinear time history analysis results for a general beam under cyclic loading. The energy dissipation factor was calculated as the ratio of the energy dissipation amount of the actual specimen to the energy dissipation amount of the idealized elastoplastic behavior obtained as a result of nonlinear time history analysis. In the existing experiment results, the energy dissipation factor was derived by calculating one cycle for each histeric step, and the energy dissipation factor was derived based on the nonlinear modeling process in the guidelines. In the existing experimental study, the energy dissipation factor was calculated by setting each histeric step (Y-L-R), and the energy dissipation factor was found to be 0.36 in the Y-L step and 0.28 in the L-R step, and the energy dissipation factor in the guideline was found to be 0.31. This shows that the energy dissipation factor calculation formula in the guidelines does not indicate a decrease in the energy dissipation capacity of reinforced concrete members.

A Study on Decision of Cut Rock Slope Angle Applied Shear Strength of Continuum Rock Mass Induced from Hoek-Brown Failure Criterion (Hoek-Brown 파괴기준에서 유도된 연속체암반의 전단강도를 적용한 깎기 암반사면 경사 결정 연구)

  • Kim, Hyungmin;Lee, Byokkyu;Woo, Jaegyung;Hur, Ik;Lee, Junki;Lee, Sugon
    • Journal of the Korean GEO-environmental Society
    • /
    • v.20 no.5
    • /
    • pp.13-21
    • /
    • 2019
  • There are many cuts or natural rock slopes that remain stable for a long time in the natural environment with steep slopes ($65^{\circ}$ to $85^{\circ}$). In terms of design practice, the rock mass consisting of similar rock condition and geological structures is defined as a good continuum rock slope, and during the process of decision making angle of this rock slope, it will be important to establish the geotechnical properties estimating method of the continuum rock on the process of stability analysis in the early stages of design and construction. In this study, the stability analysis of a good continuum rock slope that can be designed as a steep slope proposed a practical method of estimating the shear strength by induced from the Hoek-Brown failure criterion, and in addition, the design applicability was evaluated through the stability analysis of steep rock slope. The existing method of estimating the shear strength was inadequate for practical use in the design, as the equivalent M-C shear strength corresponding to the H-B envelope changes sensitively, even with small variations in confining stress. To compensate for this problem, it was proposed to estimate equivalent M-C shear strength by iso-angle division method. To verify the design applicability of the iso-angle division method, the results of the safety factor and the displacement according to the change in angle of the cut slope constructed at the existing working design site were reviewed. The safety factor is FS=16~59 on the 1:0.5 slope, FS=12~52 on the 1:0.3 slope, most of which show a 10~12 percent reduction. Displacement is 0.126 to 0.975 mm on the 1:0.5 slope, 0.152 to 1.158 mm on the 1:0.3 slope, and represents an increase of 10 to 15%. This is a slightly change in normal proportion and is in good condition in terms of stability. In terms practical the working design, it was confirmed that applying the shear strength estimated by Iso-angle division method derived from the H-B failure criterion as a universal shear strength for a good continuum rock mass slope was also able to produce stable and economic results. The procedure for stability analysis using LEM (Limit Equilibrium Analysis Method) and FEM (Finite Element Analysis Method) will also be practical in the rock slope where is not distributed fault. The study was conducted by selecting the slope of study area as a good rock condition, establishing a verification for which it can be applied universal to a various rock conditions will be a research subject later on.

A UTMI-Compatible USB2.0 Transceiver Chip Design (UTMI 표준에 부합하는 USB2.0 송수신기 칩 설계)

  • Nam Jang-Jin;Kim Bong-Jin;Park Hong-June
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.5 s.335
    • /
    • pp.31-38
    • /
    • 2005
  • The architecture and the implementation details of a UTMI(USB2.0 Transceiver Macrocell Interface) compatible USB2.0 transceiver chip were presented. To confirm the validation of the incoming data in noisy channel environment, a squelch state detector and a current mode Schmitt-trigger circuit were proposed. A current mode output driver to transmit 480Mbps data on the USB cable was designed and an on-die termination(ODT) which is controlled by a replica bias circuit was presented. In the USB system using plesiochronous clocking, to compensate for the frequency difference between a transmitter and a receiver, a synchronizer using clock data recovery circuit and FIFO was designed. The USB cable was modeled as the lossy transmission line model(W model) for circuit simulation by using a network analyzer measurements. The USB2.0 PHY chip was implemented by using 0.25um CMOS process and test results were presented. The core area excluding the IO pads was $0.91{\times}1.82mm^2$. The power consumptions at the supply voltage of 2.5V were 245mW and 150mW for high-speed and full-speed operations, respectively.

Design of CFL Linearisation Chip for the Mobile Radio Using Ultra-Narrowband Digital Modulation (디지털 초협대역 단말기용 CFL 선형화 칩 설계)

  • Chong Young-Jun;Kang Min-Soo;Yoo Sung-Jin;Chung Tae-Jin;Oh Seung-Hyeub
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.7 s.98
    • /
    • pp.671-680
    • /
    • 2005
  • The CFL linearisation chip which is one of key devices in ultra-narrowband mobile radio transmitter using CQPSK digital modulation method is designed and implemented with $0.35{\mu}m$ CMOS technology. The reduced size and low cost of transmitter are available by the use of direct-conversion and CFL ASIC chip, which improve the power effi챠ency and linearity of transmitting path. In addition, low power operation is possible through CMOS technology The performance test results of transmitter show -25 dBc improvement of IMD level at the 3 kHz frequency offset and then satisfy FCC 47 CFR 90.210 E emission mask in the operation of CFL ASIC chip. At that time, the transmitting power is about PEP(Peak-to-Envelope Power) 5 W. The main parameters to improve the transmitting characteristic and to compensate the distortion in feed back loop such as DC-offset, loop gain and phase value are interfaced with notebook PC to be controlled with S/W.

Neuronal injury in AIDS dementia: Potential treatment with NMDA open-channel blockers and nitric oxide-related species

  • Lipton, Stuart A.
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 1996.04a
    • /
    • pp.19-29
    • /
    • 1996
  • The neurological manifestations of AIDS include dementia, encountered even in the absence of opportunistic superinfection or malignancy. The AIDS Dementia Complex appears to be associated with several neuropathological abnormalities, including astrogliosis and neuronal injury or loss. How can HIV-1 result in neuronal damage if neurons themselves are only rarely, if ever, infected by the vitus\ulcorner In vitro experiments from several different laboratiories have lent support to the existence of HIV- and immune-related toxins. In one recently defined pathway to neuronal injury, HIV-infected macrophages/microglia as well as macrophages activated by HIV-1 envelope protein gp120 appear to secrete excitants/neurotoxins. These substances may include arachidonic acid, platelet-activating factor, free radicals (NO - and O$_2$), glutamate, quinolinate, cysteine, cytokines (TNF-${\alpha}$, IL1-B, IL-6), and as yet unidentified factors emanating from stimulated macrophages and possibly reactive astrocytes. A final common pathway for newonal suscepubility appears to be operative, similar to that observed in stroke, trauma, epilepsy, and several neurodegenerative diseases, including Huntington's disease, Parkinson's disease, and amyotrophic lateral sclerosis. This mechanism involves excessive activation of N-methyl-D-aspartate (NMDA) receptor-operated channels, with resultant excessive influx of Ca$\^$2+/ leading to neuronal damage, and thus offers hope for future pharmacological intervention. This chapter reviews two clinically-tolerated NMDA antagonists, memantine and nitroglycerin; (ⅰ) Memantine is an open-channel blocker of the NMDA-associated ion channel and a close congener of the anti-viral and anti-parkinsonian drug amantadine. Memantine blocks the effects of escalating levels of excitotoxins to a greater degree than lower (piysiological) levels of these excitatory amino acids, thus sparing to some extent normal neuronal function. (ⅱ) Niuoglycerin acts at a redox modulatory site of the NMDA receptor/complex to downregulate its activity. The neuroprotective action of nitroglycerin at this site is mediated by n chemical species related to nitric oxide, but in a higher oxidation state, resulting in transfer of an NO group to a critical cysteine on the NMDA receptor. Because of the clinical safety of these drugs, they have the potential for trials in humans. As the structural basis for redox modulation is further elucidated, it may become possible to design even better redox reactive reagents of chinical value. To this end, redox modulatory sites of NMDA receptors have begun to be characterized at a molecular level using site-directed mutagenesis of recombinant subunits (NMDAR1, NMDAR2A-D). Two types of redox modulation can be distinguished. The first type gives rise to a persistent change in the functional activity of the receptor, and we have identified two cysteine residues on the NMDARI subunit (#744 and #798) that are responsible for this action. A second site, presumably also a cysteine(s) because <1 mM N-ethylmaleimide can block its effect in native neurons, underlies the other, more transient redox action. It appears to be at this, as yet unidentified, site on the NMDA receptor that the NO group acts, at least in recombinant receptors.

  • PDF

A Design of Transceiver for 13.56MHz RFID Reader using the Peak Detector with Automatic Reference Voltage Generator (자동 기준전압 생성 피크 검출기를 이용한 13.56 MHz RFID 리더기용 송수신기 설계)

  • Kim, Ju-Seong;Min, Kyung-Jik;Nam, Chul;Hurh, Djyoung;Lee, Kang-Yun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.3
    • /
    • pp.28-34
    • /
    • 2010
  • In this paper, the transceiver for RFID reader using 13.56MHz as a carrier frequency and meeting International Standard ISO 14443 type A, 14443 type B and 15693 is presented. The receiver is composed of envelope detector, VGA(Variable Gain Amplifier), filter, comparator to recovery the received signal. The proposed automatic reference voltage generator, positive peak detector, negative peak detector, and data slicer circuit can adjust the decision level of reference voltage over the received signal amplitudes. The transmitter is designed to drive high voltage and current to meet the 15693 specification. By using inductor loading circuit which can swing more than power supply and drive large current even under low impedance condition, it can control modulation rate from 30 percent to 5 percent, 100 perccnt and drive the output currents from 5 mA to 240 mA depending on standards. The 13.56 MHZ RFID reader is implemented in $0.18\;{\mu}m$ CM08 technology at 3.3V single supply. The chip area excluding pads is $1.5mm\;{\times}\;1.5mm$.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Design of Hybrid Supply Modulator for Reconfigurable Power Amplifiers (재구성 전력증폭기용 혼합형 가변 전압 공급기의 설계)

  • Son, Hyuk-Su;Kim, Woo-Young;Jang, Joo-Young;Lee, Hae-Jin;Oh, Inn-Yeal;Park, Chul-Soon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.4
    • /
    • pp.475-483
    • /
    • 2012
  • This paper presents new type of the hybrid supply modulator for the next reconfigurable transmitters. The efficiency of the hybrid supply modulator is one of the most important performance. For enhancement the efficiency, multi-switching structure in the hybrid supply modulator is employed. Additionally, input envelope signal sensing stage is employed for implementation multi-mode operation. To compare the performance of the proposed hybrid supply modulator, the conventional hybrid supply modulator is also designed. The measured efficiency of the proposed hybrid supply modulator is 85 %/84 %/79 % for EDGE/WCDMA/LTE signals which have 384 kHz/3.84 MHz/5 MHz bandwidth, respectively. The efficiency of the proposed hybrid supply modulator is higher than the conventional hybrid supply modulator. Therefore, this structure shows good candidate for the reconfigurable transmitters.

A Reliability Analysis of Shallow Foundations using a Single-Mode Performance Function (단일형 거동함수에 의한 얕은 기초의 신뢰도 해석 -임해퇴적층의 토성자료를 중심으로-)

  • 김용필;임병조
    • Geotechnical Engineering
    • /
    • v.2 no.1
    • /
    • pp.27-44
    • /
    • 1986
  • The measured soil data are analyzed to the descriptive statistics and classified into the four models of uncorrelated-normal (UNNO), uncorrelated-nonnormal (VNNN), correlatedonnormal(CONN), and correlated-nonnormal(CONN) . This paper presents the comparisons of reliability index and check points using the advanced first-order second-moment method with respect to the four models as well as BASIC Program. A sin91e-mode Performance function is consisted of the basic design variables of bearing capacity and settlements on shallow foundations and input the above analyzed soil informations. The main conclusions obtained in this study are summarized as follows: 1. In the bearing capacity mode, cohesion and bearing-capacity factors by C-U test are accepted for normal and lognormal distribution, respectively, and negatively low correlated to each other. Since the reliability index of the CONN model is the lowest one of the four model, which could be recommended a reliability.based design, whereas the other model might overestimate the geotechnical conditions. 2. In the case of settlements mode, the virgin compression ratio and preccnsolidation pressure are fitted for normal and lognormal distribution, respectively. Constraining settlements to the lower ones computed by deterministic method, The CONN model is the lowest reliability of the four models.

  • PDF