• 제목/요약/키워드: the methods of connection

검색결과 1,360건 처리시간 0.03초

Behavior and modeling of single bolt lap-plate connections

  • Rex, Clinton O.;Easterling, W. Samuel
    • Steel and Composite Structures
    • /
    • 제2권4호
    • /
    • pp.277-296
    • /
    • 2002
  • A research investigation of single bolt lap-plate connection load-deformation behavior is presented. Each important characteristic of this behavior is evaluated and two methods for analytically approximating the behavior are developed and presented. The first of these methods is a component method in which the behavior of the connection is modeled as a combination of the behavior of the parts. The second method utilizes a number of parametric relationships that relate the connection parameters to coefficients of two non-linear continuous analytical curves. The test results from four independent experimental programs that investigated the behavior of single bolt lap-plate connections are used in the development and verification of these methods.

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제21권4호
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.

Evaluation the behavior of pre-fabricated moment connection with a new geometry of pyramidal end block under monotonic and cyclic loadings

  • Kazemi, Seyed Morteza;Sohrabi, Mohammad Reza;Kazemi, Hasan Haji
    • Steel and Composite Structures
    • /
    • 제29권3호
    • /
    • pp.391-404
    • /
    • 2018
  • Researchers have been long studying new building implementation methods to improve the quality of construction, reduce the time of assembly, and increase productivity. One of these methods is the use of modular pre-fabricated structural forms that are composed of a beam, column, short column, pyramidal end block, and connection plates. In this study, a new geometry for the pyramidal end block was proposed that helps facilitate the assembly procedure. Since the proposed configuration affects the performance of this form of connection, its behavior was evaluated using finite element method. For this purpose, the connection was modeled in ABAQUS and then validated by comparing the outputs with experimental results. The research proceeded through analyzing 16 specimens under monotonic and cyclic loading. The results indicated that using the pyramidal end block not only makes the assembly process easier but also reduces the out-of-plane displacement of the short column webs and the vertical displacement of beam end. By choosing appropriate section properties for column and beam, the connection can bear a rotation up to 0.01 radians within its inelastic region and a total of 0.04 radians without any significant reduction in its bearing capacity.

Seismic Performance of Fabricated Internally Confined Hollow CFT Column (조립식 내부 구속 중공 CFT 기둥의 내진 성능)

  • Won, Deok Hee;Han, Taek Hee;Kim, Seungjun;Kang, Young Jong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • 제33권2호
    • /
    • pp.397-407
    • /
    • 2013
  • Recently, a great progress has been made in bridge construction technology through the development of high performance materials and new structural types. However, most of attention has been paid to the cast-in-place technologies and material cost saving. The cast-in-place method is always subject to some environmental damages in construction sites, which frequently causes conflicts with residents. To overcome the disadvantages, a lot of fabrication construction method was developed. Most fabrication construction methods developed up to now have been applied for superstructure of bridges. In contrast, such fabricable methods developed for substructures are extremely rare. A fabricated column using ICH CFT(Internally Confined Hollow CFT) column was developed in a series of previous researches. Included in the previous studies are design and construction methods for the precast segmental coping, the column-coping connection, the column-segment connection, column-foundation connection. In this paper, seismic performance of the fabricated ICH CFT columns was extensively investigated experimentally. Two test specimens were prepared depending on the connection methods of segments; one by mortar-grouting method and the other by reinforcement method using stiffeners.

A study on skip-connection with time-frequency self-attention for improving speech enhancement based on complex-valued spectrum (복소 스펙트럼 기반 음성 향상의 성능 향상을 위한 time-frequency self-attention 기반 skip-connection 기법 연구)

  • Jaehee Jung;Wooil Kim
    • The Journal of the Acoustical Society of Korea
    • /
    • 제42권2호
    • /
    • pp.94-101
    • /
    • 2023
  • A deep neural network composed of encoders and decoders, such as U-Net, used for speech enhancement, concatenates the encoder to the decoder through skip-connection. Skip-connection helps reconstruct the enhanced spectrum and complement the lost information. The features of the encoder and the decoder connected by the skip-connection are incompatible with each other. In this paper, for complex-valued spectrum based speech enhancement, Self-Attention (SA) method is applied to skip-connection to transform the feature of encoder to be compatible with the features of decoder. SA is a technique in which when generating an output sequence in a sequence-to-sequence tasks the weighted average of input is used to put attention on subsets of input, showing that noise can be effectively eliminated by being applied in speech enhancement. The three models using encoder and decoder features to apply SA to skip-connection are studied. As experimental results using TIMIT database, the proposed methods show improvements in all evaluation metrics compared to the Deep Complex U-Net (DCUNET) with skip-connection only.

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF

Problem of Evaluation Methods on the Wall Facing-Geosynthetics Connection Strength and Its Improvement (전면 벽체-보강재 연결강도 평가방법의 문제점 및 개선 방향)

  • Hong, Ki-Kwon;Shin, Ju-Oek;Han, Jung-Geun;Cho, Sam-Deok;Lee, Kwang-Wu
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 한국지반공학회 2008년도 추계 학술발표회
    • /
    • pp.184-195
    • /
    • 2008
  • The use of geosynthetics for the reinforced earth wall system has been increasing rapidly for a number of years. The connection strength between wall facing and geosynthetics should be evaluated in the design of geosynthetics. However, the connection strength is not often evaluate, exactly, and it causes problems such as deformation of the wall facing, local failure of the reinforced earth wall system, conservative design and so on. Therefore, the connection strength in the design of geosynthetics should be applied evaluation result by reasonable method. This study is evaluated connection strength using the typical design method, NCMA(1997) and FHWA(1996), in the field case. Then the results compared with the evaluation results of connection strength, which is suggested by Soong & Koener(1997). The analysis results confirmed that the connection strength for the design of geosynthetics should be evaluate using reasonable method with considering various factor, such as safety factor, installation and importance of construction.

  • PDF

Optimal algorithm of part-matching process using neural network (신경 회로망을 이용한 부품 조립 공정의 최적화 알고리즘)

  • 오제휘;차영엽
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1996년도 한국자동제어학술회의논문집(국내학술편); 포항공과대학교, 포항; 24-26 Oct. 1996
    • /
    • pp.143-146
    • /
    • 1996
  • In this paper, we propose a hopfield model for solving the part-matching which is the number of parts and positions are changed. The goal of this paper is to minimize part-connection in pairs and net total path of part-connection. Therefore, this kind of problem is referred to as a combinatorial optimization problem. First of all, we review the theoretical basis for hopfield model to optimization and present two method of part-matching; Traveling Salesman Problem (TSP) and Weighted Matching Problem (WMP). Finally, we show demonstration through computer simulation and analyzes the stability and feasibility of the generated solutions for the proposed connection methods.

  • PDF

CONNECTIVITY BETWEEN MATHEMATICS AND SCIENCE CONCEPTS AND A PLAN FOR ORGANIZATION OF EDUCATIONAL PROGRAMS -FOCUSED ON MARGINALIZED LEARNERS

  • J.J. SEO;SANGWOOK WU;WANSEOK LEE
    • Journal of Applied and Pure Mathematics
    • /
    • 제5권1_2호
    • /
    • pp.9-22
    • /
    • 2023
  • In this paper, the connection and convergence between mathematics and science (physics) concepts were investigated. In addition, methods to closely analyze the degree of mathematics and science (physics) learning were looked into. Furthermore, methods to express and analyze the learning states of individual learners were investigated and a plan to organize educational programs was sought.

An Experimental Study on Connection System of FRP Modular Box Member (FRP 모듈형 박스 부재의 연결 시스템에 관한 실험적 연구)

  • Kwak, Kae-Hwan;Jang, Hwa-Sup;Yang, Dong-Woon;Kim, Ho-Sun
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • 제51권4호
    • /
    • pp.29-36
    • /
    • 2009
  • This is a basic experimental study to apply FRP modular box member to a variety of construction structures exposed to flexural strength, such as a slab and a girder. Applying FRP modular box member to a real structure requires a large section. FRP box member was made into modular systems. Tests were conducted under various conditions in order to analyze jointing performance of the developed FRP modular box member as a large section. For the methods of jointing FRP modular box member, synthetic resins connection, mechanical connection, and a combination of both were used to test both length and breadth connection. As a result of the test, using urethane + two bolts + sheets was the most efficient method of connecting FRP modular box member. It is expected that the proposed joint system in this study will contribute to the increase of failure load and synthesis behavior of FRP modular box member.