• Title/Summary/Keyword: indetermination

Search Result 13, Processing Time 0.016 seconds

The Cognitive Ecological Characteristics in Folded Space and Their Effects (폴드공간의 인지생태론적 특성과 그 효과)

  • Kim Joomi
    • Korean Institute of Interior Design Journal
    • /
    • v.14 no.3 s.50
    • /
    • pp.181-190
    • /
    • 2005
  • In accordance with the rapid growth of digital media in 1990s, the state of indetermination that is found in digital process has been emphasized in the field of natural science and philosophy. Digitalized space design has been dramatically developed and it raised heated debate and comment on 'folded space' The purpose of this thesis is to explore how the cognitive-ecological factors constitute fold structures in space design of the late 20th century. Syntax of space structure and geometric composition were analyzed to define what types of cognitive-ecological factors are contrived in the process of visual information. In particular, I put higher theoretical emphasis on what characteristics are ensued in the process of structuring spaces than any other subjects. Through theses analyses and discussions, I raised questions on what principles are operating to create new space design that counts on non-linear structure and its formational process. And I also observed what influences these structural principles of design could fundamentally bring to human beings. First, I proposed that we could overcome reductionist space design through cognitive-ecological approach. Some key concepts such as affordance, parallel processing, and redundancy were adopted as defining elements of non-linear structures. As a result of analyses, I found that the cognitive-ecological approach could substitute the reductionist space design of the past. What is also found is that the three variables are the ultimate ecological elements. In addition, as a methodological concept of fold structures, the form of 'topology' was highlighted because it could be a supporting idea to the cognitive-ecological factors. Second, I claimed that non-linear design is more experiential than rational linear design, and it is more efficiently correspondent to human being than any other forms. What is intended and implied in non-linear structure is also indicated.

Stability analysis of steel cable-stayed bridges

  • Tang, Chia-Chih;Shu, Hung-Shan;Wang, Yang-Cheng
    • Structural Engineering and Mechanics
    • /
    • v.11 no.1
    • /
    • pp.35-48
    • /
    • 2001
  • The objective of this study is to investigate the stability behavior of steel cable-stayed bridges by comparing the buckling loads obtained by means of finite element methods with eigen-solver. In recent days, cable-stayed bridges dramatically attract engineers' attention due to their structural characteristics and aesthetics. They require a number of design parameters and present a high degree of static indetermination, especially for long span bridges. Cable-stayed bridges exhibit several nonlinear behaviors concurrently under normal design loads due to the individual nonlinearity of substructures such as the pylons, stay cables, and bridge deck, and their interactions. The geometric nonlinearities arise mainly from large displacements of cables. Strong axial and lateral forces acting on the bridge deck and pylons cause structural nonlinear behaviors. The interaction is among the substructures. In this paper, a typical three-span steel cable-stayed bridge with a variety of design parameters has been investigated. The numerical results indicate that the design parameters such as the ratio of $L_1/L$ and $I_p/I_b$ are important for the structural behavior, where $L_1$ is the main span length, L is the total span length of the bridge, $I_p$ is the moment of inertia of the pylon, and $I_b$ is the moment of inertia of the bridge deck. When the ratio $I_p/I_b$ increases, the critical load decreases due to the lack of interaction among substructures. Cable arrangements and the height of pylon are another important factors for this type of bridge in buckling analysis. According to numerical results, the bridges supported by a pylon with harp-type cable arrangement have higher critical loads than the bridges supported by a pylon with fan-type cable arrangement. On contrary, the shape of the pylon does not significantly affect the critical load of this type of bridge. All numerical results have been non-dimensionalized and presented in both tabular and graphical forms.

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.