• Title/Summary/Keyword: handling mechanism

Search Result 198, Processing Time 0.031 seconds

INVESTIGATION OF THE OPERATIONAL PRINCIPLE AND PARAMETRIC STUDY ON A DRY PASTE SEPARATOR EQUIPED WITH A ROTOR -II. CFD ANALYSIS (로터 장착 건식 미분 분리기의 작동원리 규명 및 파라미터 연구 - II. CFD 해석)

  • Park, S.U.;Kang, Y.S.;Kang, S.;Suh, Y.K.
    • Journal of computational fluids engineering
    • /
    • v.20 no.4
    • /
    • pp.81-92
    • /
    • 2015
  • Construction waste mainly consists of concrete aggregates of various size. Improper handling of concrete waste would be a major environmental problem whereas its recycling would be both economically useful and environmentally friendly. Bigger concrete aggregates are crushed and converted to medium and fine particles to make them recyclable. An apparatus to separate the concrete aggregates by their size is thus needed for their effective recycling. In this work, segregation of concrete particles in air flows from a newly designed rotary separator having three stages of blades is simulated using a commercial software, ANSYS-CFX. Both 2-D and 3-D models with 360, 240 and 180 blades in each stage are considered. Fundamental mechanism of separation of particles(pase) and the effect of design parameters such as particle size, rotor speed, air flow rate etc. on the performance of the separator are investigated. Critical size of particles that can be separated by the developed separator is also presented in this work. Simulation results are overall in good agreement with data predicted from the theoretical model previously reported in the companion paper.

Construction of an Agent-based Fault-Tolerant Object Group Model (에이전트 기반의 고장허용 객체그룹 모델 구축)

  • Kang, Myung-Seok;Kim, Hag-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1B
    • /
    • pp.74-85
    • /
    • 2009
  • We propose an Agent-based Fault Tolerant Object Group model based on the agent technology and FTOG model with replication mechanism for effective object management and fault recovery. We define the five kind of agents - internal processing agent, registration agent, state handling agent, user interface agent, and service agent - that extend the functions of the FTOG model. The roles of the agents in the proposed model are to reduce the remote interactions between distributed objects and provide more effective service execution. To verify the effectiveness of the proposed model, we implemented the Intelligent Home Network Simulator (IHNS) which virtually provides general home networking services. Through the simulations, it is validated that the proposed model decreases the interactions of the object components and supports the effective fault recovery, while providing more stable and reliable services.

The Literature Review of FibroMyalgia Syndrome (섬유근통 증후군에 대한 문헌고찰)

  • Kim Myung-Chul;Kim Jin-Sang
    • The Journal of Korean Physical Therapy
    • /
    • v.16 no.4
    • /
    • pp.23-37
    • /
    • 2004
  • Fibromyalgia syndrome(FMS) is a chronic pain disorder of unknown etiology characterized by widespread musculoskeletal aches and pains, stiffness, and general fatigue, disturbed sleep and sleepiness. Frequently misdiagnosed, FMS is often confused with myofascial pain syndrome, polymyalgia rheumatica, polymyositis, hypothyroidism, metastatic carcinoma, rheumatoid arthritis (RA), juvenile rheumatoid arthritis, chronic fatigue syndrome, or systemic lupus erythematosus, any of which may occur concomitantly with FMS. The management of FMS often begins with a thorough examination and a diagnosis from a physician who is formally trained in tender-point/trigger-point recognition. An initial diagnosis provides reassurance to the patient and often reduces the anxiety and depression patterns associated with FMS. The most common goals in the management of FMS are (1) to break the pain cycle, (2) to restore sleep patterns, and (3) to increase functional activity levels. Because FMS is a multifactorial syndrome, it is likely that the best treatment will encompass multiple strategies. Medication with analgesics and antidepressants and also physiotherapy, are often prescribed and give some relief. The other most effective intervention for long-term management of FS to date is physical exercise. Physical therapists can instruct patients in the use of heat at home (moist hot packs, heating pads, whirlpools, warm showers or baths, and hot pads) to increase local blood flow and to decrease muscle spasm and tension. Also instruct patients in the proper use of cold modalities (ice packs, ice massage, and cool baths) to anesthetize localized areas of pain (tender points) and break the pain cycle. Massage and tender-point massage also may promote muscle relaxation. To date, the two most important interventions for the long-term management of FS are patient education and physical exercise. Lately, is handling FMS and Chronic Fatigue syndrome(CFS) together, becuase FMS and CFS are poorly understood disorders that share similar demographic and clinical characteristics. Because of the clinical similarities between both disorders it was suggested that they share a common pathophysiological mechanism, namely, central nervous system dysfunction.

  • PDF

A Method to Manage Local Storage Capacity Using Data Locality Mechanism (데이터 지역성 메커니즘을 이용한 지역 스토리지 용량 관리 방법)

  • Kim, Baul;Ku, Mino;Min, Dugki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.324-327
    • /
    • 2013
  • Recently, due to evolving cloud computing technology, we can easily and transparently utilize both local computing resource and remote computing resource in real life. Especially, enhancing smart device technologies and network infrastructures promote an increase of needs to share files between local smart devices and cloud storages. However, since smart devices have a limited storage space, storing files on cloud storage causes a starvation problem of local storage. It means that users can face a storage-lack problem even a cloud storage service provide a huge file storing space. In this research, we propose a method to manage files between smart devices and cloud storages. Our approach calculate file usage pattern based on recently used date, and then this approach determines local files being migrated. As a result, our approach is sufficient for handling data synchronization between big data storage farm and local thin client which contains limited storage space.

  • PDF

A P2P Multimedia Streaming Protocol Using Multiple-Peer Binding (다중 피어 결합을 이용한 P2P 멀티미디어 스트리밍 프로토콜)

  • Jung Eui-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.253-261
    • /
    • 2006
  • In spite of the popularity of P2P technology, a multimedia streaming using the P2P technology has been neglected. The reason for this is that the P2P multimedia streaming has suffered from several inherent problems especially poor bandwidth and unreliable connection among peers. We suggest a Multi-Peer Binding Protocol (MPBP) in this paper that provides a virtual single channel composed of multiple connections to several peers to ease these problems. The protocol enables applications to download data from multiple peers simultaneously, so they can achieve throughput improvement and reliable streaming. For this, the MPBP splits media files into small chunks and provides a mechanism for identifying and transmitting each chunk. Implemented MPBP engine focuses on handling an abrupt disconnection from data sending peers and the evaluation result shows the MPBP is able to handle it gracefully. The MPBP is also desisted to support various media types. To verify this, video and audio applications are implemented using the MPBP engine in this paper.

  • PDF

Providing Fairness in Diffserv Architecture using Buffer Management Method (차등서비스 구조에서 버퍼관리기법을 이용한 공평성 제공)

  • 김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.05a
    • /
    • pp.8-13
    • /
    • 2003
  • Historically, IP-based internets have been able to provide a simple best-effort delivery service to all applications they carry. Best effort treats all packets equally, with no service level, packet loss, and delay. But the needs of users have changed. The want to use the new real-time, multimedia, and multicasting applications. Thus, there is a strong need to be able to support a variety of traffic with a variety of quality-of-service requirements. The DiffServ architecture, proposed by the Internet Engineering Task Force(IETF), has become the most viable solution for provising QoS over IP networks. The DiffServ architecture does not specify any handling method between AF out-profile packets and BE packets. This paper propose a mechanism for supporting inter class fairness in the DiffServ architecture. Ⅰ proposed a modified Weighted Round Robin method to protect the BE traffic from AF out-profile packets in the core routers. The proposed technique is evaluated through simulation. Simulation results indicate that the proposed method provides better protection not only for BE packets from AF out-profile packets, but also for the AF in-profile packets in congested networks.

  • PDF

The Realities and Characteristics of Trade Network at the Industrial Community in a Metropolis (대도시 산업지역사회의 거래 네트워크의 실태와 특성)

  • Park, Soon-Ho;Kwone, Kyoung-Hee
    • Journal of the Korean association of regional geographers
    • /
    • v.10 no.4
    • /
    • pp.787-799
    • /
    • 2004
  • The industrial community in a metropolis has played an essential role to keep business in a large city. This paper aims to analyze the realities of trade network among enterprises at Buksungro Tools Commercial Cooperative in Daegu. The urban style industrial community is found at Buksungro in Daegu. There are more than one hundred small-sized enterprises. Major trades among enterprises are occurred within and/or by the area. The long-term trade networks within the Buksungro Tools Commercial Cooperative have played the key role to maintain the industrial community. The trade relationship has depended on business networks based on social capital rather than commercial mechanism. The trade networks have been established through credit transactions as well as handling troublesome orders. The trade networks help to transfer technology and to learn the tacit knowledge among firms. The long-term trade networks are more influenced by the social accessibility than spatial accessibility.

  • PDF

A Study on Course Stability in Accordance with Configuration of Ships (선형에 따른 선박의 침로 안정성에 관한 연구)

  • 권종호
    • Journal of the Korean Institute of Navigation
    • /
    • v.10 no.2
    • /
    • pp.97-114
    • /
    • 1986
  • Ship's maneuverability is very important factor in safe ship handling and economical ship operation. Steering characteristics are consisted of course stability and maneuverability. Today in many advanced ship-building countries, they study ship's course stability, using model ship tests, such as straight line tests, rotating arm tests and Planar Motion Mechanism (PMM) etc., in tow in tanks. It is the purpose of this paper to provide ship's handlers with better understanding of steering characteristics and to help them in safe controlling and manevering . In this paper, the author simulated response of various vessels, running straight course with constant speed, and they are disturbed by small external disturbance of one degree yaw angle with no angular velocity . The author used the hydrodynamic derivtives resulted at tests of Davidson's laboratory in Stevens Institute of Technology, New Jersey, U.S.A. Course stability was evaluated and analyzed in various respects, such as block coefficient, ratio of ship's length to beam, draft and rudder area ratio etc. The obtained results are as follows : (1) The ship's course stability is affected by magnitude of block coefficient greatly. In case that the block coefficient is more than 0.7, the deviation varies at nearly same rate but the requistite time to reach the steady course is different. (2) The ship's course stability is affected by magnitude of L/B. When the dimensionless time reaches about 3, the deviation and requisite time to reach the steady course are influenced nearly same. After the dimensionless time is about 3, they change on invariable ratio. (3) The effect to course stability by L/T and RA' can be neglected. (4) The reason why thy VLCC and container feeder vessel are unstable on their course is that their block coefficient is generally more than 0.8 and the ratio of ship's length to beam is about 6.0.

  • PDF

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

A Designing Method of Intranet Security Architecture Model for Network Security Efficiency (보안 효율성 제고를 위한 인트라넷 네트워크 아키텍쳐 모델)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.9-17
    • /
    • 2010
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security architecture is the concept to distinguish the architecture from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security architecture could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every architecture. For the establishment of security architecture it is needed to show what criterion of net work should be set up. This study is based on analysis of diagnostic weakness structure in the network security architecture and research the criterion for topology factor, security architecture structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture.