• Title/Summary/Keyword: direction code

Search Result 483, Processing Time 0.028 seconds

Reliability Evaluation of a Composite Pressure Vessel (복합재 압력 용기의 신뢰도 예측)

  • Hwang Tae-Kyung;Park Jae-Beom;Kim Hyoung-Geun;Doh Young-Dae;Moon Soon-Il
    • Composites Research
    • /
    • v.19 no.3
    • /
    • pp.7-14
    • /
    • 2006
  • In this paper, an integrated probabilistic strength analysis was conducted to predict the reliability of a composite pressure vessel under inner pressure loading condition. As a probabilistic strength analysis, the probabilistic progressive failure model consisting of progressive failure model and Monte Carlo simulation was incorporated with a commercial FEA code, ABAQUS Standard, to perform the probabilistic failure analysis of composite structure which has a complex shape and boundary conditions. As design random variables, the laminar strengths of each direction were considered. Finally, from probabilistic strength analysis, the scattering of burst pressure could be explained and the reliability of composite pressure vessel could be obtained for each component. In case of composite structures in mass production, the effects of uncertainties in material and manufacturing on the performance of composite structures would apparently become larger. So, the probabilistic strength analysis is essential for the structural design of composite structures in mass production.

A Study on the Use of Art Information Based on Digital Media - Focusing on Art Appreciation Mobile Application - (디지털미디어 기반 미술 정보 활용 방안 연구 - 미술 감상 모바일 애플리케이션을 중심으로 -)

  • Hur, Yukyoung;Park, Seung Ho
    • Design Convergence Study
    • /
    • v.15 no.5
    • /
    • pp.1-19
    • /
    • 2016
  • The emergence of digital media has enabled visitors' active intervention based on the existing art information archiving. Accordingly, this study was conducted to analyze how archiving data that art museums have developed so farcan be provided significantly to visitors and generate a contemporary appreciation code. This study intended to solve the problems in case study analysis through the restructuralization of information that reflected visitors' appreciation activities as the principal agent. The structure of information, which was reframed for multilayered information approach and use by keyword, is meaningful as it has developed an information structure to mainly enhance visitors' understanding. It is expected that the use of art information proposed in this study will be helpful for setting the specific direction of actual transmedia storytelling service by art museums based on web later on.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

A Study on Media Art using Ilwolobongdo (일월오봉도를 활용한 미디어아트 연구)

  • Kideok Park;Jeanhun Chung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.103-108
    • /
    • 2023
  • This paper conveys the limitations of analog natural history sample information in digital form, giving viewers interest and fun, and presenting the direction of digital diorama utilization of sample exhibitions. In this exhibition, through various media such as 10,000 won bill dramas and newspaper articles, the Sun and Moon and Five Peaks, a picture familiar to the public, was reproduced in media art so that it can be realized in real life. It is a Joseon Dynasty work in which five mountain peaks, a pair of waterfalls, and four pine trees are drawn symmetrically from side to side. In order to express the vividness of nature, the symbols of the sun and moon were created with the effect of light to maximize immersion, and animals such as waves, crane movements, deer, ramie butterflies, and carp were inserted under the mountain peaks to create the vividness of nature and creatures playing in them. The media art folding screen was produced and directed as a screen. In addition, the introduction of the work and information related to the living things in the work were provided through QR codes.

Kernel-Based Video Frame Interpolation Techniques Using Feature Map Differencing (특성맵 차분을 활용한 커널 기반 비디오 프레임 보간 기법)

  • Dong-Hyeok Seo;Min-Seong Ko;Seung-Hak Lee;Jong-Hyuk Park
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.13 no.1
    • /
    • pp.17-27
    • /
    • 2024
  • Video frame interpolation is an important technique used in the field of video and media, as it increases the continuity of motion and enables smooth playback of videos. In the study of video frame interpolation using deep learning, Kernel Based Method captures local changes well, but has limitations in handling global changes. In this paper, we propose a new U-Net structure that applies feature map differentiation and two directions to focus on capturing major changes to generate intermediate frames more accurately while reducing the number of parameters. Experimental results show that the proposed structure outperforms the existing model by up to 0.3 in PSNR with about 61% fewer parameters on common datasets such as Vimeo, Middle-burry, and a new YouTube dataset. Code is available at https://github.com/Go-MinSeong/SF-AdaCoF.

Curved finite strip and experimental study of thin stiffened composite cylindrical shells under axial compression

  • Mojtaba Rafiee;Hossein Amoushahi;Mehrdad Hejazi
    • Structural Engineering and Mechanics
    • /
    • v.89 no.2
    • /
    • pp.181-197
    • /
    • 2024
  • A numerical method is presented in this paper, for buckling analysis of thin arbitrary stiffened composite cylindrical shells under axial compression. The stiffeners can be placed inside and outside of the shell. The shell and stiffeners are operated as discrete elements, and their interactions are taking place through the compatibility conditions along their intersecting lines. The governing equations of motion are obtained based on Koiter's theory and solved by utilizing the principle of the minimum potential energy. Then, the buckling load coefficient and the critical buckling load are computed by solving characteristic equations. In this formulation, the elastic and geometric stiffness matrices of a single curved strip of the shell and stiffeners can be located anywhere within the shell element and in any direction are provided. Moreover, five stiffened composite shell specimens are made and tested under axial compression loading. The reliability of the presented method is validated by comparing its numerical results with those of commercial software, experiments, and other published numerical results. In addition, by using the ANSYS code, a 3-D finite element model that takes the exact geometric arrangement and the properties of the stiffeners and the shell into consideration is built. Finally, the effects of Poisson's ratio, shell length-to-radius ratio, shell thickness, cross-sectional area, angle, eccentricity, torsional stiffness, numbers and geometric configuration of stiffeners on the buckling of stiffened composite shells with various end conditions are computed. The results gained can be used as a meaningful benchmark for researchers to validate their analytical and numerical methods.

A new method to calculate a standard set of finite cloud dose correction factors for the level 3 probabilistic safety assessment of nuclear power plants

  • Gee Man Lee;Woo Sik Jung
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1225-1233
    • /
    • 2024
  • Level 3 probabilistic safety assessment (PSA) is performed to calculate radionuclide concentrations and exposure dose resulting from nuclear power plant accidents. To calculate the external exposure dose from the released radioactive materials, the radionuclide concentrations are multiplied by two factors of dose coefficient and a finite cloud dose correction factor (FCDCF), and the obtained values are summed. This indicates that a standard set of FCDCFs is required for external exposure dose calculations. To calculate a standard set of FCDCFs, the effective distance from the release point to the receptor along the wind direction should be predetermined. The TID-24190 document published in 1968 provides equations to calculate FCDCFs and the resultant standard set of FCDCFs. However, it does not provide any explanation on the effective distance required to calculate the standard set of FCDCFs. In 2021, Sandia National Laboratories (SNLs) proposed a method to predetermine finite effective distances depending on the atmospheric stability classes A to F, which results in six standard sets of FCDCFs. Meanwhile, independently of the SNLs, the authors of this paper discovered that an infinite effective distance assumption is a very reasonable approach to calculate one standard set of FCDCFs, and they implemented it into the multi-unit radiological consequence calculator (MURCC) code, which is a post-processor of the level 3 PSA codes. This paper calculates and compares short- and long-range FCDCFs calculated using the TID-24190, SNLs method, and MURCC method, and explains the strength of the MURCC method over the SNLs method. Although six standard sets of FCDCFs are required by the SNLs method, one standard sets of FCDCFs are sufficient by the MURCC method. Additionally, the use of the MURCC method and its resultant FCDCFs for level 3 PSA was strongly recommended.

Shear strengthening of seawater sea-sand concrete beams containing no shear reinforcement using NSM aluminum alloy bars

  • Yasin Onuralp Ozkilic;Emrah Madenci;Ahmed Badr;Walid Mansour;Sabry Fayed
    • Steel and Composite Structures
    • /
    • v.51 no.2
    • /
    • pp.153-172
    • /
    • 2024
  • Due to the fast development of constructions in recent years, there has been a rapid consumption of fresh water and river sand. In the production of concrete, alternatives such as sea water and sea sand are available. The near surface mounted (NSM) technique is one of the most important methods of strengthening. Aluminum alloy (AA) bars are non-rusting and suitable for usage with sea water and sand concrete (SSC). The goal of this study was to enhance the shear behaviour of SSC-beams strengthened with NSM AA bars. Twenty-four RC beams were cast from fresh water river sand concrete (FRC) and SSC before being tested in four-point flexure. All beams are the same size and have the same internal reinforcement. The major factors are the concrete type (FRC or SSC), the concrete degree (C25 or C50 with compressive strength = 25 and 50 MPa, respectively), the presence of AA bars for strengthening, the direction of AA bar reinforcement (vertical or diagonal), and the AA bar ratio (0, 0.5, 1, 1.25 and 2 %). The beams' failure mechanism, load-displacement response, ultimate capacity, and ductility were investigated. Maximum load and ductility of C25-FRC-specimens with vertical and diagonal AA bar ratios (1%) were 100,174 % and 140, 205.5 % greater, respectively, than a matching control specimen. The ultimate load and ductility of all SSC-beams were 16-28 % and 11.3-87 % greater, respectively, for different AA bar methods than that of FRC-beams. The ultimate load and ductility of C25-SSC-beams vertically strengthened with AA bar ratios were 66.7-172.7 % and 89.6-267.9 % higher than the unstrengthened beam, respectively. When compared to unstrengthened beams, the ultimate load and ductility of C50-SSC-beams vertically reinforced with AA bar ratios rose by 50-120 % and 45.4-336.1 %, respectively. National code proposed formulae were utilized to determine the theoretical load of tested beams and compared to matching experimental results. The predicted theoretical loads were found to be close to the experimental values.

Reed-Solomon Encoded Block Storage in Key-value Store-based Blockchain Systems (키값 저장소 기반 블록체인 시스템에서 리드 솔로몬 부호화된 블록 저장)

  • Seong-Hyeon Lee;Jinchun Choi;Myungcheol Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.3
    • /
    • pp.102-110
    • /
    • 2024
  • Blockchain records all transactions issued by users, which are then replicated, stored, and shared by participants of the blockchain network. Therefore, the capacity of the ledger stored by participants continues to increase as the blockchain network operates. In order to address this issue, research is being conducted on methods that enhance storage efficiency while ensuring that valid values are stored in the ledger even in the presence of device failures or malicious participants. One direction of research is applying techniques such as Reed-Solomon encoding to the storage of blockchain ledgers. In this paper, we apply Reed-Solomon encoding to the key-value store used for ledger storage in an open-source blockchain, and measure the storage efficiency and increasing computational overhead. Experimental results confirm that storage efficiency increased by 86% while the increase in CPU operations required for encoding was only about 2.7%.

A Study on the Development of a Public Building Renewal Model and Incorporating Mobility Technologies and Policy Innovations (모빌리티 기술을 접목한 공공건축물 리뉴얼 모델 개발 및 제도적 지원 방안 연구)

  • Nam, Seong-Woo;Bang, Hong-Soon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.24 no.4
    • /
    • pp.483-494
    • /
    • 2024
  • The purpose of this study is to develop a model for renewing old public buildings by incorporating mobility technology into them for the convenience of citizens' transportation and the enhancement of public services, and to propose support measures to improve the direction of implementation. The main contents and results of this study are as follows. First, the renewal target site was selected based on the technical considerations and evaluation criteria required for the renewal of public buildings incorporating mobility technology, and the construction was planned by analyzing the necessary mobility technology based on the size, area, and district unit plan of the selected target site. Second, the expected cost was calculated based on the construction plan and the financial support plan necessary for reflecting mobility technology was proposed. Third, the improvement plan of the building code system required for the development of public building renewal incorporating mobility technology was proposed. This study had limitations in that it could not reflect detailed construction costs due to the lack of design standards and experience, and it was difficult to identify specific problems due to the lack of specific operation methods and implementation cases.