• Title/Summary/Keyword: random load

Search Result 432, Processing Time 0.03 seconds

Methodology for Reliability-based Assessment of Capacity-Rating of Plate Girder Railroad Bridges using Ambient Measurement Data (상시 계측 데이터를 이용한 신뢰성에 기초한 판형 철도교의 내하력 평가법)

  • Cho, Hyo Nam;Choi, Hyun Ho;Lee, Sang Yoon;Sun, Jong Wan
    • Journal of Korean Society of Steel Construction
    • /
    • v.15 no.2
    • /
    • pp.187-196
    • /
    • 2003
  • Today, the Working Stress Rating (WSR) is being widely used for the capacity-rating and the safety assessment of railroad steel bridges. Since it cannot incorporate the uncertainties, several studies have been carried out in order to get over the incompleteness of the conventional capacity-rating and safety assessment. A system reliability-based equivalent capacity-rating method, which can evaluate the capacity of existing bridges, has been recently proposed. For more efficient reliability analysis, probabilistic parameters of the random variables in the limit-state models should be reasonably evaluated. Especially, uncertainties for live load effects must be realistically included. In this study, an improved limit-state model was used for the system reliability-based equivalent strength method. This model can incorporate the probabilistic parameters obtained from ambient measurement data. To demonstrate the applicability of the improved system reliability-based equivalent capacity rating method, this was applied to the existing steel plate girder bridge for comparison with the conventional capacity-rating and safety assessment.

Influence of Anticipation on Landing Patterns during Side-Cutting Maneuver in Female Collegiate Soccer Players

  • Park, Eun-Jung;Lee, Jung-Ho;Ryue, Jae-Jin;Sohn, Ji-Hoon;Lee, Ki-Kwang
    • Korean Journal of Applied Biomechanics
    • /
    • v.21 no.4
    • /
    • pp.391-395
    • /
    • 2011
  • To investigate the anticipatory effect on landing patterns during side-cutting maneuver, thirteen healthy female elite college soccer players participated in this study. Three-dimensional knee kinematics, effective mass and correlation between both these were measured and analyzed using a motion analysis and force plates. Each testing session included anticipated tasks, $45^{\circ}$ side-cutting tasks (AC), followed by a set of unexpected side-cutting (UC) in a random order. Knee flexion/extension, valgus/varus and internal/external rotation angles and effect mass were compared by using paired t-test. Also, correlation analysis was performed to identify the relationship between knee angles and effective mass. Effective mass during UC was greater than that during AC. Effective mass and maximum knee flexion angle were positively correlated during AC and not during UC. Based on the relationship between effective mass and knee flexion angle in AC, shock absorption can be controlled by knee joint flexion in pre-predicted movement condition. However, effective mass can not be controlled by knee flexion in UC condition. The unexpected load affects were more irregular on the knee joint, which may be one of the injury mechanisms of anterior cruciate ligament (ACL) in female soccer players.

Improved Flyweight RFID Authentication Protocol

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.95-105
    • /
    • 2012
  • The widespread implementation of RFID in ubiquitous computing is constrained considerably by privacy and security unreliability of the wireless communication channel. This failure to satisfy the basic, security needs of the technology has a direct impact of the limited computational capability of the tags, which are essential for the implementation of RFID. Because the universal application of RFID means the use of low cost tags, their security is limited to lightweight cryptographic primitives. Therefore, EPCGen2, which is a class of low cost tags, has the enabling properties to support their communication protocols. This means that satisfying the security needs of EPCGen2 could ensure low cost security because EPCGen2 is a class of low cost, passive tags. In that way, a solution to the hindrance of low cost tags lies in the security of EPCGen2. To this effect, many lightweight authentication protocols have been proposed to improve the privacy and security of communication protocols suitable for low cost tags. Although many EPCgen2 compliant protocols have been proposed to ensure the security of low cost tags, the optimum security has not been guaranteed because many protocols are prone to well-known attacks or fall short of acceptable computational load. This paper proposes a remedy protocol to the flyweight RFID authentication protocol proposed by Burmester and Munilla against a desynchronization attack. Based on shared pseudorandom number generator, this protocol provides mutual authentication, anonymity, session unlinkability and forward security in addition to security against a desynchronization attack. The desirable features of this protocol are efficiency and security.

  • PDF

A Token Based Clustering Algorithm Considering Uniform Density Cluster in Wireless Sensor Networks (무선 센서 네트워크에서 균등한 클러스터 밀도를 고려한 토큰 기반의 클러스터링 알고리즘)

  • Lee, Hyun-Seok;Heo, Jeong-Seok
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.291-298
    • /
    • 2010
  • In wireless sensor networks, energy is the most important consideration because the lifetime of the sensor node is limited by battery. The clustering is the one of methods used to manage network energy consumption efficiently and LEACH(Low-Energy Adaptive Clustering Hierarchy) is one of the most famous clustering algorithms. LEACH utilizes randomized rotation of cluster-head to evenly distribute the energy load among the sensor nodes in the network. The random selection method of cluster-head does not guarantee the number of cluster-heads produced in each round to be equal to expected optimal value. And, the cluster head in a high-density cluster has an overload condition. In this paper, we proposed both a token based cluster-head selection algorithm for guarantee the number of cluster-heads and a cluster selection algorithm for uniform-density cluster. Through simulation, it is shown that the proposed algorithm improve the network lifetime about 9.3% better than LEACH.

Gust durations, gust factors and gust response factors in wind codes and standards

  • Holmes, John D.;Allsop, Andrew C.;Ginger, John D.
    • Wind and Structures
    • /
    • v.19 no.3
    • /
    • pp.339-352
    • /
    • 2014
  • This paper discusses the appropriate duration for basic gust wind speeds in wind loading codes and standards, and in wind engineering generally. Although various proposed definitions are discussed, the 'moving average' gust duration has been widely accepted internationally. The commonly-specified gust duration of 3-seconds, however, is shown to have a significant effect on the high-frequency end of the spectrum of turbulence, and may not be ideally suited for wind engineering purposes. The effective gust durations measured by commonly-used anemometer types are discussed; these are typically considerably shorter than the 'standard' duration of 3 seconds. Using stationary random process theory, the paper gives expected peak factors, $g_u$, as a function of the non-dimensional parameter ($T/{\tau}$), where T is the sample, or reference, time, and ${\tau}$ is the gust duration, and a non-dimensional mean wind speed, $\bar{U}.T/L_u$, where $\bar{U}$ is a mean wind speed, and $L_u$ is the integral length scale of turbulence. The commonly-used Durst relationship, relating gusts of various durations, is shown to correspond to a particular value of turbulence intensity $I_u$, of 16.5%, and is therefore applicable to particular terrain and height situations, and hence should not be applied universally. The effective frontal areas associated with peak gusts of various durations are discussed; this indicates that a gust of 3 seconds has an equivalent frontal area equal to that of a tall building. Finally a generalized gust response factor format, accounting for fluctuating and resonant along-wind loading of structures, applicable to any code is presented.

Fault Tolerant Encryption and Data Compression under Ubiquitous Environment (Ubiquitous 환경 하에서 고장 극복 암호 및 데이터 압축)

  • You, Young-Gap;Kim, Han-Byeo-Ri;Park, Kyung-Chang;Lee, Sang-Jin;Kim, Seung-Youl;Hong, Yoon-Ki
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.91-98
    • /
    • 2009
  • This paper presents a solution to error avalanche of deciphering where radio noise brings random bit errors in encrypted image data under ubiquitous environment. The image capturing module is to be made comprising data compression and encryption features to reduce data traffic volume and to protect privacy. Block cipher algorithms may experience error avalanche: multiple pixel defects due to single bit error in an encrypted message. The new fault tolerant scheme addresses error avalanche effect exploiting a three-dimensional data shuffling process, which disperses error bits on many frames resulting in sparsely isolated errors. Averaging or majority voting with neighboring pixels can tolerate prominent pixel defects without increase in data volume due to error correction. This scheme has 33% lower data traffic load with respect to the conventional Hamming code based approach.

Implementation of a Remote Authentication System Using Smartcards to Guarantee User Anonymity to Third Party (제 3자에게 사용자 익명성을 제공하는 스마트 카드 기반 원격 인증 시스템 구현)

  • Baek, Yi-Roo;Oh, Doo-Hwan;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2750-2759
    • /
    • 2009
  • In this paper, we analyze vulnerabilities in a remote authentication protocol using smartcards which was proposed by Bindu et al. and propose an improved scheme. The proposed scheme can prevent from restricted replay attack and denial of service attack by replacing time stamp with random number. In addition, this protocol can guarantee user anonymity by transmitting encrypted user's ID using AES cipher algorithm. The computational load in our protocol is decreased by removing heavy exponentiation operations and user efficiency is enhanced due to addition of password change phase in which a user can freely change his password. Furthermore, we really implement the proposed authentication protocol using a STM smartcard and authentication server. Then we prove the correctness and effectiveness of the proposed remote authentication system.

Time Series Prediction of Dynamic Response of a Free-standing Riser using Quadratic Volterra Model (Quadratic Volterra 모델을 이용한 자유지지 라이저의 동적 응답 시계열 예측)

  • Kim, Yooil
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.51 no.4
    • /
    • pp.274-282
    • /
    • 2014
  • Time series of the dynamic response of a slender marine structure was predicted using quadratic Volterra series. The wave-structure interaction system was identified using the NARX(Nonlinear Autoregressive with Exogenous Input) technique, and the network parameters were determined through the supervised training with the prepared datasets. The dataset used for the network training was obtained by carrying out the nonlinear finite element analysis on the freely standing riser under random ocean waves of white noise. The nonlinearities involved in the analysis were both large deformation of the structure under consideration and the quadratic term of relative velocity between the water particle and structure in Morison formula. The linear and quadratic frequency response functions of the given system were extracted using the multi-tone harmonic probing method and the time series of response of the structure was predicted using the quadratic Volterra series. In order to check the applicability of the method, the response of structure under the realistic ocean wave environment with given significant wave height and modal period was predicted and compared with the nonlinear time domain simulation results. It turned out that the predicted time series of the response of structure with quadratic Volterra series successfully captures the slowly varying response with reasonably good accuracy. It is expected that the method can be used in predicting the response of the slender offshore structure exposed to the Morison type load without relying on the computationally expensive time domain analysis, especially for the screening purpose.

Effects of Different External Loads on the Activities of the Gluteus Maximus and Biceps Femoris during Prone Hip Extension in Healthy Young Men

  • Bae, Chang-Hwan;Choe, Yu-Won;Kim, Myoung-Kwon
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.15 no.2
    • /
    • pp.1-9
    • /
    • 2020
  • PURPOSE: This study examined the effects of different external loads on the muscle activities around the hip during prone hip extension with knee flexion (PHEKF) exercise in healthy young men. METHODS: Sixteen healthy adult males participated in the study. A pressure biofeedback unit was used to provide feedback to the participants during the abdominal drawing-in maneuver (ADIM) with PHEKF. Sandbags (0 kg, 1 kg, 2 kg, and 3 kg) were used to provide external resistance. The quadriceps was contracted to maintain knee flexion 90° against resistance. Each resistance condition using a sandbag weight was given in random order. Surface electromyography (sEMG) was used to measure the electrical activity of the gluteus maximus, biceps femoris, and erector spinae during PHEKF. RESULTS: The muscle activity of the gluteus maximus was highest with the 3 kg resistance and lowest with 0 kg (F = 128.46, P = .00). The muscle activities of the biceps femoris and erector spinae were highest with 0 kg and lowest with 3 kg (F = 29.49, P = .00). The muscle activity rate of the gluteus maximus/biceps femoris was highest with 3 kg and lowest with 0 kg (F = 37.49, P = .00). CONCLUSION: The activity of the gluteus maximus was increased using a higher external weight load during PHEKF, while the activity of the biceps femoris decreased. These findings suggest that an external weight is needed during hip extensor exercise to strengthen the gluteus maximus and inhibit the biceps femoris.

A Scheme on High-Performance Caching and High-Capacity File Transmission for Cloud Storage Optimization (클라우드 스토리지 최적화를 위한 고속 캐싱 및 대용량 파일 전송 기법)

  • Kim, Tae-Hun;Kim, Jung-Han;Eom, Young-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8C
    • /
    • pp.670-679
    • /
    • 2012
  • The recent dissemination of cloud computing makes the amount of data storage to be increased and the cost of storing the data grow rapidly. Accordingly, data and service requests from users also increases the load on the cloud storage. There have been many works that tries to provide low-cost and high-performance schemes on distributed file systems. However, most of them have some weaknesses on performing parallel and random data accesses as well as data accesses of frequent small workloads. Recently, improving the performance of distributed file system based on caching technology is getting much attention. In this paper, we propose a CHPC(Cloud storage High-Performance Caching) framework, providing parallel caching, distributed caching, and proxy caching in distributed file systems. This study compares the proposed framework with existing cloud systems in regard to the reduction of the server's disk I/O, prevention of the server-side bottleneck, deduplication of the page caches in each client, and improvement of overall IOPS. As a results, we show some optimization possibilities on the cloud storage systems based on some evaluations and comparisons with other conventional methods.