• Title/Summary/Keyword: platform based design

Search Result 1,779, Processing Time 0.035 seconds

Characteristics of CFRP strengthened tubular joints subjected to different monotonic loadings

  • Prashob, P.S.;Shashikala, A.P.;Somasundaran, T.P.
    • Steel and Composite Structures
    • /
    • v.32 no.3
    • /
    • pp.361-372
    • /
    • 2019
  • Tubular joints are used in the construction of offshore structures and other land-based structures because of its ease of fabrication. These joints are subjected to different environmental loadings in their lifetime. At the time of fabrication or modification of an existing offshore platform, tubular joints are usually strengthened to withstand the environmental loads. Currently, various strengthening techniques such as ring stiffeners, gusset plates are employed to strengthen new and existing tubular joints. Due to some limitations with the present practices, some new techniques need to be addressed. Many researchers used Fibre Reinforced Polymer (FRP) to strengthen tubular joints. Some of the studies were focused on axial compression of Glass Fibre Reinforced Polymer (GFRP) strengthened tubular joints and found that it was an efficient technique. Earlier, the authors had performed studies on Carbon Fibre Reinforced Polymer (CFRP) strengthened tubular joint subjected to axial compression. The study steered to the conclusion that FRP composites is an alternative strengthening technique for tubular joints. In this work, the study was focused on axial compression of Y-joint and in plane and out of plane bending of T-joints. Experimental investigations were performed on these joints, fabricated from ASTM A106 Gr. B steel. Two sets of joints were fabricated for testing, one is a reference joint and the other is a joint strengthened with CFRP. After performing the set of experiments, test results were then compared with the numerical solution in ANSYS Parametric Design Language (APDL). It was observed that the joints strengthened with CFRP were having improved strength, lesser surface displacement and ovalization when compared to the reference joint.

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

Automatic recognition of the old and the infirm using Arduino technology implementation (아두이노를 사용하여 노약자 자동 인식 기술 구현)

  • Choi, Chul-kil;Lee, Sung-jin;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.454-457
    • /
    • 2014
  • Arduino is for design based on open source prototyping platform, artist, designer, hobby activists, etc, i has been designed for all those who are interested in the environment construct. Arduino adventage you can easily create applications hardware, without deep knowledge about the hardware. Configuration of arduino using AVR microcontroller ATmage 168, software to action arduino using arduino program, MATLAB, Processing. Arduino is open source base, you can hardware production directly and using shield additionally, the arduino can be combined. Android is open source. Continue to expand through a combination of hardware, Arduino. It name is shield. Be given to the Arduino Uno board to the main board, the shield extends to the various aspects and help can be equipped with more features. The shield on top of the shield can be combined as a kind of shield and Ethernet shield, motor shield, the shield RFID hardware beyond a simple extension can be configured. In this paper, RFID technology Sealed for automatic recognition of the elderly by the elderly to identify and tag them SM130 13.56Mhz compatible hardware was constructed by combining tags.

  • PDF

Design and Construction of Urban-type Energy Self-Supporting Smart-Farm Service Model (도심형 에너지 자립 스마트팜 서비스 모델 설계 및 구축)

  • Kim, Gwan-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1305-1310
    • /
    • 2019
  • Modern agriculture is changing from resource-oriented agriculture to technology-oriented agriculture. Agriculture, which combines science and technology, is recognized as a new growth engine, and governments, local governments, research institutes, and industry are working together to develop and disseminate various devices necessary for smart farms to build intelligent smart farms. Recently, research is being conducted to build a more intelligent agricultural environment by building a cloud platform. In this paper, we propose a plan to build an urban energy - independent smart farm that can utilize leisure time and agricultural activities by utilizing the rooftop of a city. Also, by using IT technology, various data of smart farm can be managed on remote server, and HMI module for controlling internal environment of smart farm can be developed to manage smart farm automatically or semi-automatically. The service model suggests a model that can manage the internal environment of the smart farm based on mobile.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

Development of small multi-copter system for indoor collision avoidance flight (실내 비행용 소형 충돌회피 멀티콥터 시스템 개발)

  • Moon, Jung-Ho
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.1
    • /
    • pp.102-110
    • /
    • 2021
  • Recently, multi-copters equipped with various collision avoidance sensors have been introduced to improve flight stability. LiDAR is used to recognize a three-dimensional position. Multiple cameras and real-time SLAM technology are also used to calculate the relative position to obstacles. A three-dimensional depth sensor with a small process and camera is also used. In this study, a small collision-avoidance multi-copter system capable of in-door flight was developed as a platform for the development of collision avoidance software technology. The multi-copter system was equipped with LiDAR, 3D depth sensor, and small image processing board. Object recognition and collision avoidance functions based on the YOLO algorithm were verified through flight tests. This paper deals with recent trends in drone collision avoidance technology, system design/manufacturing process, and flight test results.

A NARX Dynamic Neural Network Platform for Small-Sat PDM (동적신경망 NARX 기반의 SAR 전력모듈 안전성 연구)

  • Lee, Hae-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.809-817
    • /
    • 2020
  • In the design and development process of Small-Sat power distribution and transmission module, the stability of dynamic resources was evaluated by a deep learning algorithm. The requirements for the stability evaluation consisted of the power distribution function of the power distribution module and demand module to the SAR radar in Small-Sat. To verify the performance of the switching power components constituting the power module PDM, the reliability was verified using a dynamic neural network. The adoption material of deep learning for reliability verification is the power distribution function of the payload to the power supplied from the small satellite main body. Modeling targets for verifying the performance of this function are output voltage (slew rate control), voltage error, and load power characteristics. First, to this end, the Coefficient Structure area was defined by modeling, and PCB modules were fabricated to compare stability and reliability. Second, Levenberg-Marquare based Two-Way NARX neural network Sigmoid Transfer was used as a deep learning algorithm.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

A Study on the Service Quality of Audiobook Using Revised IPA (수정된 IPA 기법을 적용한 오디오북 서비스품질에 관한 연구)

  • Lee, Tae Won;Sung, Haeng Nam;Kwon, Jin Taek
    • The Journal of Information Systems
    • /
    • v.30 no.4
    • /
    • pp.329-347
    • /
    • 2021
  • Purpose The purpose of this study is to examine the review of previous studies based on audiobooks, 1) using the IPA method, we examine the quality of audiobooks that listeners perceive as important and the quality of preferred audiobooks, 2) improvement directions for activating audio content and audiobook platform, to seek ways to establish strategic plans for the audiobook market. Design/methodology/approach This study conducted and experiment using three factors(usability, information and interaction) used in web service quality(WebQual). Usability consists of the availability of time, such as the use of audiobooks for hobbies and the ease of search. Information consists of the trends of the times, topics of converation and the latest trends. Interaction consists of the proportion and depth of celebrities. After that, grid analysis was performed using the traditional IPA method and the revised IPA method. It was judged that identifying and analyzing the preference for service provision and new content was more valuable than the Performance used in the existing method. Findings According to the results of the empirical analysis, it was found that the conversation material corresponding to informativity did not affect the audiobook during the online quality analysis. It is believed that improvements can be found through content production related to entertainment, webtoons, and general common sense that can increase listeners' interest. In addition, it was found that the advertising effect of celebrities corresponding to interactivity did not affect the results of this study, which should increase the concentration and immersion of listeners by increasing the technology for audiobooks.

The Effect of Badges Gamification on Participation Behavior in StackOverflow (스택오버플로 배지 시스템의 게임화 효과에 관한 연구)

  • Nam, Jeongin;Baek, Hyunmi
    • Knowledge Management Research
    • /
    • v.23 no.3
    • /
    • pp.1-22
    • /
    • 2022
  • This study aims to investigate the gamification effect of the badge awards, the most popular gamification process, on users participation behavior. This study also attempts to investigate the effect of tailored gamification, which designs the system of gamification differently based on users' characteristics, focusing on the level of online user information disclosure. For this, we collect and analyze data on 557 users and 1,048,020 answers from StackOverflow, an online Q&A community for developers. The results show that providing a badge is effective for increasing the amount of user participation, whereas providing a goal through the badge is partially effective for increasing the quality of participation. However, the moderating effect of whether users disclose their SNS information on the relationship between badge gaining and participation decrease is not statistically significant. For platform operators, our findings emphasize the importance of gamification design to enhance user engagement effectively.