• 제목/요약/키워드: wide connection

검색결과 334건 처리시간 0.033초

Harmony search based, improved Particle Swarm Optimizer for minimum cost design of semi-rigid steel frames

  • Hadidi, Ali;Rafiee, Amin
    • Structural Engineering and Mechanics
    • /
    • 제50권3호
    • /
    • pp.323-347
    • /
    • 2014
  • This paper proposes a Particle Swarm Optimization (PSO) algorithm, which is improved by making use of the Harmony Search (HS) approach and called HS-PSO algorithm. A computer code is developed for optimal sizing design of non-linear steel frames with various semi-rigid and rigid beam-to-column connections based on the HS-PSO algorithm. The developed code selects suitable sections for beams and columns, from a standard set of steel sections such as American Institute of Steel Construction (AISC) wide-flange W-shapes, such that the minimum total cost, which comprises total member plus connection costs, is obtained. Stress and displacement constraints of AISC-LRFD code together with the size constraints are imposed on the frame in the optimal design procedure. The nonlinear moment-rotation behavior of connections is modeled using the Frye-Morris polynomial model. Moreover, the P-${\Delta}$ effects of beam-column members are taken into account in the non-linear structural analysis. Three benchmark design examples with several types of connections are presented and the results are compared with those of standard PSO and of other researches as well. The comparison shows that the proposed HS-PSO algorithm performs better both than the PSO and the Big Bang-Big Crunch (BB-BC) methods.

Debug Port Protection Mechanism for Secure Embedded Devices

  • Park, Keun-Young;Yoo, Sang-Guun;Kim, Ju-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제12권2호
    • /
    • pp.240-253
    • /
    • 2012
  • In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentication token includes user access information which represents the user's permitted level of access and the maximum number of authentications allowed using the token. The device authenticates the user with the token and grants limited access based on the user's access level. The proposed approach improves the degree of overall security by removing the need to expose the device's secret key. Availability is also enhanced by not requiring server connection after the initial token generation and further by supporting flexible token transfer among predefined device groups. Low implementation cost is another benefit of the proposed approach, enabling it to be adopted to a wide range of environments in demand of debug port protection.

Activation Plan for the Eurasia Railway Logistics

  • Chung, Sungbong;Namkung, Baekkyu;Kim, Moon-Joung
    • 유통과학연구
    • /
    • 제14권1호
    • /
    • pp.17-28
    • /
    • 2016
  • Purpose - Given the increasing interest in the Eurasian Initiative, government-wide studies for the construction of the Silk Road Express are currently being conducted. However, the Korean Government has no experience in operating international freight railroads and has not encountered problems in train service plans, international conventions, and customs clearance, which will arise when TKR is connected to TSR, TCR, and TMGR. Research design, data and methodology - Given these conditions, the cases of direct services in international freight railroads between China and Europe are investigated to identify the possible problems in the connection between TKR and continental railroads. This study also identifies the plans for activating Eurasian railroad logistics. Results - For the service of international freight trains, Korea needs to join international conventions, such as OJSD, as a regular member. Furthermore, any relevant international conference after the conclusion of such an agreement is needed for the agreement on train service schedules, fees, and procedures for passing border stations. Conclusions - Customs clearance and relevant documents must be standardized to address the differences in clearance systems between nations.

#Kr{\ddot}{a}mer# 시스템에 의한 3.phi.유도전동기의 특성에 관한 연구 (A study on characteristics of three phase induction motor by #Kr{\ddot}{a}mer# system)

  • 노창주;유춘식;정경열
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제9권1호
    • /
    • pp.61-73
    • /
    • 1985
  • The induction motor is widely used in the power equipments of the ship and the various industrial drive applications because it is robust and relatively simple and cheap to manufacture, but it has a disadvantage that the speed of induction motor is not controlled in wide range such as d.c motor. In this paper, the characteristics relating to the Kramer system that the speed of three phase wound type induction motor is controlled by changing the exciting e.m.f. of the secondary circuit is described. In order to analyze the characteristics, a new simplified and approximated T-type equivalent circuit from the Kramer circuit with three phase graetz connection and d.c machine is proposed. The stator current, motor torque and mechanical output power are computed by the current, torque and power equations derived by its equivalent circuit. Through the experiments, the $I_f-N$, torque-slip and current-slip characteristic curves of the tested motor are obtained and the various needed constants are determined. The numerical values obtained from the above method are compared with experimental values under the same conditions. As a result of the above investigation, it is found that the induction motor speed by the Kramer system is controlled by 28 per cent under the rated speed by changing the field current of d.c motor and the values computed by the current and torque equations derived by the simplified and approximated T-type equivalent circuit generally come to approach the experimental values.

  • PDF

Dishevelling Wnt and Hippo

  • Kim, Nam Hee;Lee, Yoonmi;Yook, Jong In
    • BMB Reports
    • /
    • 제51권9호
    • /
    • pp.425-426
    • /
    • 2018
  • As highly conserved signaling cascades of multicellular organisms, Wnt and Hippo pathways control a wide range of cellular activities, including cell adhesion, fate determination, cell cycle, motility, polarity, and metabolism. Dysregulation of those pathways are implicated in many human diseases, including cancer. Similarly to ${\beta}-catenin$ in the Wnt pathway, the YAP transcription co-activator is a major player in Hippo. Although the intracellular dynamics of YAP are well-known to largely depend on phosphorylation by LATS and AMPK kinases, the molecular effector of YAP cytosolic translocation remains unidentified. Recently, we reported that the Dishevelled (DVL), a key scaffolding protein between canonical and non-canonical Wnt pathway, is responsible for nuclear export of phosphorylated YAP. The DVL is also required for YAP intracellular trafficking induced by E-cadherin, ${\alpha}-catenin$, or metabolic stress. Note that the p53/LATS2 and LKB1/AMPK tumor suppressor axes, commonly inactivated in human cancer, govern the reciprocal inhibition between DVL and YAP. Conversely, loss of the tumor suppressor allows co-activation of YAP and Wnt independent of epithelial polarity or contact inhibition in human cancer. These observations provide novel mechanistic insight into (1) a tight molecular connection merging the Wnt and Hippo pathways, and (2) the importance of tumor suppressor contexts with respect to controlled proliferation and epithelial polarity regulated by cell adhesion.

무선 메쉬 네트워크의 군 환경 적용을 위한 클러스터 기반 멀티채널 할당 기법 (A Cluster Based Multi-channel Assignment Scheme for Adaptive Tactical Wireless Mesh Network)

  • 김영안
    • 한국군사과학기술학회지
    • /
    • 제14권5호
    • /
    • pp.880-887
    • /
    • 2011
  • The Wireless Mesh Network(WMN) technology is able to provide an infrastructure for isolated islands, in which it is difficult to install cables or wide area such as battlefield. Therefore, WMN is frequently used to satisfy needs for internet connection and active studies and research on them are in progress. However, as a result of increase in number of hops under hop-by-hop communication environment has caused a significant decrease in throughput and an increase in delay. Considering the heavy traffic of real-time data, such as voice or moving pictures to adaptive WMN, in a military environment. Such phenomenon might cause an issue in fairness index. In order to resolve this issue, we proposed a Cluster Based Multi-channel Assignment Scheme(CB-MAS) for adaptive tactical wireless mesh network. In the CB-MAS, the communication between the Cluster-Head(CH) and cluster number nodes uses a channel has no effect on channels being used by the inter-CH links. Therefore, the CB-MAS can minimize the interference within multi-channel environments. Our Simulation results showed that CB-MAS achieves improved the throughput and fairness index in WMN.

Comparison of Conventional DC-DC Converter and a Family of Diode-Assisted DC-DC Converter in Renewable Energy Applications

  • Zhang, Yan;Liu, Jinjun;Ma, Xiaolong;Feng, Junjie
    • Journal of Power Electronics
    • /
    • 제14권2호
    • /
    • pp.203-216
    • /
    • 2014
  • In the conventional dc-dc converter, a pair of additional diode and the adjacent passive component capacitor/inductor can be added to the circuit with an X-shape connection, which generates a family of new topologies. The novel circuits, also called diode-assisted dc-dc converter, enhance the voltage boost/buck capability and have a great potential for high step-up/step-down power conversions. This paper mainly investigates and compares conventional dc-dc converter and diode-assisted dc-dc converter in wide range power conversion from the aspects of silicon devices, passive components requirements, electro-magnetic interference (EMI) and efficiency. Then, a comprehensive comparison example of a high step-up power conversion system was carried out. The two kinds of boost dc-dc converters operate under the same operation conditions. Mathematical analysis and experiment results verify that diode-assisted dc-dc converters are very promising for simultaneous high efficiency and high step-up/step-down power conversion in distributed power supply systems.

Finite element model for the long-term behaviour of composite steel-concrete push tests

  • Mirza, O.;Uy, B.
    • Steel and Composite Structures
    • /
    • 제10권1호
    • /
    • pp.45-67
    • /
    • 2010
  • Composite steel-concrete structures are employed extensively in modern high rise buildings and bridges. This concept has achieved wide spread acceptance because it guarantees economic benefits attributable to reduced construction time and large improvements in stiffness. Even though the combination of steel and concrete enhances the strength and stiffness of composite beams, the time-dependent behaviour of concrete may weaken the strength of the shear connection. When the concrete loses its strength, it will transfer its stresses to the structural steel through the shear studs. This behaviour will reduce the strength of the composite member. This paper presents the development of an accurate finite element model using ABAQUS to study the behaviour of shear connectors in push tests incorporating the time-dependent behaviour of concrete. The structure is modelled using three-dimensional solid elements for the structural steel beam, shear connectors, concrete slab and profiled steel sheeting. Adequate care is taken in the modelling of the concrete behaviour when creep is taken into account owing to the change in the elastic modulus with respect to time. The finite element analyses indicated that the slip ductility, the strength and the stiffness of the composite member were all reduced with respect to time. The results of this paper will prove useful in the modelling of the overall composite beam behaviour. Further experiments to validate the models presented herein will be conducted and reported at a later stage.

파장 가변 링 레이저를 위한 새로운 복합연결형 광 필터에 대한 연구 (A Study on the New Hybrided Optical Filter for Wavelength Tunable Fiber Ring Laser)

  • 김광유;이정렬;엄진섭
    • 한국통신학회논문지
    • /
    • 제31권12A호
    • /
    • pp.1177-1181
    • /
    • 2006
  • 본 논문에서는 링 레이저를 위한 새로운 광대역 파장 가변 필터를 제안하였다. 두 종류의 필터를 제안하였는데, Fiber Reflection Mach-Zehnder Interferometer와 Sagnac필터로 구성된 것과 하이브리드 필터와 Fiber Reflection Mach-Zehnder Interferometer로 구성된 것이다. 시뮬레이션을 통해 50nm의 연속적인 파장 가변을 얻을 수 있음을 알 수 있었고, 기존의 필터에 비해 파장 가변 범위가 3배에 이르면서도 FWHM이 1/3로 줄어든 통과 스펙트럼 특성을 얻을 수 있었다. 이는 링 레이저의 광대력 파장 가변 및 안정적인 단일모드 발진을 더욱 가능케 하는 중요한 특성이다.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF