• Title/Summary/Keyword: 구조적 보완

Search Result 1,686, Processing Time 0.032 seconds

Application of Virtual Fixed Point Theory and Discrete Analysis for Pile Bent Structures (단일 현장타설말뚝의 가상고정점 설계 및 분리해석 적용성 평가)

  • Kim, Jae-Young;Jeong, Sang-Seom
    • Journal of the Korean Geotechnical Society
    • /
    • v.29 no.7
    • /
    • pp.57-74
    • /
    • 2013
  • In this study, the virtual fixed point analysis and 3D full-modeling analysis for pile bent structures are conducted by considering various influencing factors and the applicability of the virtual fixed point theory is discussed. Also, a discrete analysis calculating separately both the superstructure and substructure of pile bent structures is performed on the basis of an equivalent base spring model by taking into account the major influencing parameters such as soil conditions, combined loading and pile diameter. The results show that the settlement and lateral deflection of the virtual fixed point theory are smaller than those of 3D full-modeling analysis. On the other hand, the virtual fixed point analysis overestimates the axial force and bending moment compared with 3D full-modeling analysis. It is shown that the virtual fixed point analysis cannot adequately predict the real behavior of pile bent structures. It is also found that discrete analysis gives similar results of lateral deflection and bending moment to those of unified analysis. Based on this study, it is found that discrete analysis considering column-pile interaction conditions is capable of predicting reasonably well the behavior of pile bent structures. It can be effectively used to perform a more economical design of pile bent structures.

The study on scheme for train position detection based on GPS/DR (GPS/DR기반의 차상열차위치검지방안 연구)

  • Shin, Kyung-Ho;Joung, Eui-Jin;Lee, Jun-Ho
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.802-810
    • /
    • 2006
  • For a thorough train control, the precise train position detection is necessarily required. The widely used current way for train position detection is the one of using track circuits. The track circuit has a simple structure, and has a high level of reliability. However trains can be detected only on track circuits, which have to be installed on all ground sections, and much amount of cost for its installation and maintenance is needed. In addition, for the track circuit, only discontinuous position detection is possible because of the features of the closed circuit loop configuration. As the recent advances in telecommunication technologies and high-tech vehicle-based control equipments, for the train position detection, the method to detect positions directly from on trains is being studied. Vehicle-based position detection method is to estimate train positions, speed, timing data continuously, and to use them as the control information. In this paper, the features of GPS navigation and DR navigation are analyzed, and the navigation filters are designed by constructing vehicle-based train position detection method by combining GPS navigation and DR navigation for their complementary cooperation, and by using kalman filter. The position estimation performance of the proposed method is also confirmed by simulations.

  • PDF

A Prefetching and Memory Management Policy for Personal Solid State Drives (개인용 SSD를 위한 선반입 및 메모리 관리 정책)

  • Baek, Sung-Hoon
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.35-44
    • /
    • 2012
  • Traditional technologies that are used to improve the performance of hard disk drives show many negative cases if they are applied to solid state drives (SSD). Access time and block sequence in hard disk drives that consist of mechanical components are very important performance factors. Meanwhile, SSD provides superior random read performance that is not affected by block address sequence due to the characteristics of flash memory. Practically, it is recommended to disable prefetching if a SSD is installed in a personal computer. However, this paper presents a combinational method of a prefetching scheme and a memory management that consider the internal structure of SSD and the characteristics of NAND flash memory. It is important that SSD must concurrently operate multiple flash memory chips. The I/O unit size of NAND flash memory tends to increase and it exceeded the block size of operating systems. Hence, the proposed prefetching scheme performs in an operating unit of SSD. To complement a weak point of the prefetching scheme, the proposed memory management scheme adaptively evicts uselessly prefetched data to maximize the sum of cache hit rate and prefetch hit rate. We implemented the proposed schemes as a Linux kernel module and evaluated them using a commercial SSD. The schemes improved the I/O performance up to 26% in a given experiment.

Study on the Conservation of Scale Armor Using Duplication Technique - Focused on the Case of the Conservation Treatment of the Excavated Artifact from Jinyoung 2-Area, Gimhae - (복제 기법을 이용한 찰갑의 보존처리 - 김해 진영 2지구 출토품의 보존처리 사례를 중심으로 -)

  • Kim, Dong Min;Park, Jung Hyeok;Cho, Hyun Kyung;Cho, Nam Chul
    • Journal of Conservation Science
    • /
    • v.31 no.1
    • /
    • pp.75-86
    • /
    • 2015
  • A scale Armor is usually excavated in a scattered form weakened by corrosion after its burial. Therefore, they should be brought into the indoor in a safe environment for the on-site conservation treatment as it was excavated. They should be placed on a stable support with a reinforced base in the indoor treatment. In this process, the bottom surface which can not be observed after the conservation treatment is placed for a record by actual survey and photography. But this method had a limit on figuring out the whole aspects of the artifact. For compensating the defect, duplication of the artifact was considered as an alternative method for the previous two methods in the case of conservation of the scale Armor from Jinyoung 2-Area, Gimhae. Neck guard was excavated in a distorted form by the earth pressure, and was hard to recognize the original shape. However, whole real material of its original form was secured through the combination of each duplicated lamellae. Throughout the application of the duplication technique in the process of conservation of scale Armor and neck guard, it could secure the real material of the bottom surface and elevate the understanding of the artifact. Moreover, a constitution of the armor could be identified more effectively.

The Analysis of the Factors and Weights for the Performance Mesurement of Hospital CRM System (병원의 CRM시스템 성과측정을 위한 주요요인 및 가중치 분석)

  • Hong, Hyun-Gi;Chun, Je-Ran
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.915-923
    • /
    • 2007
  • Recently we can see many cases that the CRM Systems are implemented and operated in Hospitals. The reason for such situation is the management environments in medical service market is changing rapidly one hand, and on the other hand the competitions among the Hospitals became more severe. In this paper we try to present the factors and weights as index for the measurement of Hospital CRM's System Performance. To achieve this goal, we derived the primary factors for the success of the CRM Systems based on the precedent researches, and futhermore carry out the verification of the rightness of those factors. For the verification of the rightness of the factors, we employ the Structured-Model-Analysis Method of AMOS. This enhance the meaning of the analysis result of the factors. And we use the AHP method to compare the importance grade of each success factors, because the comparison of importance level of each success factor is very crucial for the measurement of the Hospital CRM's system performance. As a result, we derived the primary factors and analyzed the weights in this paper, which might be used as the guiding Index for the measurement of the Hospital CRM' System Performance.

  • PDF

Development of Transparent Cleansing Water with Salicylic Acid and Capryloyl Salicylic Acid (살리실릭애씨드 및 카프릴로일살리실릭애씨드가 적용된 투명 클렌징 워터의 개발)

  • Yeo, Hye Lim;Park, Injeong;Jung, So Young;Lee, So Min;Kim, Hyung mook;Lee, Mi-Gi;Kwak, Byeong-Mun;Bin, Bum-Ho
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.48 no.2
    • /
    • pp.87-95
    • /
    • 2022
  • This study is about the development of transparent cleansing water with one of the beta-hydroxy acids (BHA), salicylic acid, and capryloyl salicylic acid, which is one of the lipo-hydroxy acids (LHA). Transparent appearance was stabilized by increasing the solubility of lipophilic salicylic acid and capryloyl salicylic acid in water using ethanol, polyol, and sodium hydroxide, and supplementing suspension and deposition using a double micelle structure of two types of PEG surfactants. Cleansing water applied with this technology was developed, and makeup removing ability and skin texture improvement ability were confirmed using an optical camera and an image analyzer. This solubilization technology is proposed as a new approach of LHA, which has been difficult to apply due to its low solubility in water, and is expected to help in the development of new chemical peeling products.

Analysis of User Requirements for Development of Vessel Traffic Services Cloud System (선박교통관제 클라우드 시스템 개발에 따른 사용자 요구사항 분석)

  • Lee, Li-Na;Kim, Joo-Sung;Lee, Hong-Hoon;Lee, Jin-Suk;Namgung, Ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.2
    • /
    • pp.314-323
    • /
    • 2022
  • Vessel Traffic Services (VTS) operators perform traffic management tasks using VTS systems and sensor equipment designated as VTS facilities to promote the safety and efficiency of vessel traffic. The necessary VTS information for effective operations could be obtained through the additional access of various information channels other than the designated VTS facility. To unify these various information access windows, the development of the VTS cloud system is in progress. In this study, the operational information analysis for VTS was performed through VTS tasks-facility linkage analysis to identify the user required information according to the introduction of the VTS cloud system. The VTS task analysis was performed through research of the international and domestic literature, and expert interviews. The necessary information were identified and linked according to the VTS facilities. As a result of the analysis, 37 categories of necessary information were identified for internal and external information windows, and 8 information windows were selected other than the present VTS equipment. The identified user requirements would be applied to the structure design of the VTS cloud system. In the future, it is necessary to update user requirements through scenario-based user operation analysis and to conduct additional research on the system interface design.

A Servicism Model of the New Technology Industry Enterprise System (서비스주의 기술 산업 기업 연구)

  • Hyunsoo Kim
    • Journal of Service Research and Studies
    • /
    • v.12 no.3
    • /
    • pp.1-25
    • /
    • 2022
  • This study was conducted for technology development and industrial and enterprise system design for the sustainable life of mankind. Human society is facing a crisis. As the power of mankind has increased due to the development of nuclear weapons and information and communication technologies, the risk of human society has greatly increased. The value of growth and freedom is increasing due to capitalism and democratic systems, so technological innovation is accelerating, and industries and companies are growing significantly. New technologies and industries can greatly develop human society and put it at risk. This study was conducted with the aim of redesigning technology, industry, and enterprise systems so that humans who live on Earth can be more sustainable for a longer time. It presented a practical alternative for a long-term sustainable human society. It suggested alternatives for what philosophy and methodology should be developed for the whole of humanity and in each individual national society, for developing technologies, fostering industries, and operating corporate systems. First of all, the problems of the technology development system, industrial system, and enterprise system of human society were analyzed. The characteristics and problems were analyzed in terms of sustainability of human society. The necessary and sufficient conditions for an alternative system to solve the raised problems were derived. A system that satisfies these conditions was designed and presented. The alternative system was named as a servicism system as a system based on the service philosophy. The structure, operation model, and implementation plan of the new technology industry enterprise system were presented. In the future, follow-up studies are needed to be concreted at the level of individual countries and human society as a whole.

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

Application of Handheld Raman Spectroscopy for Pigment Identification of a Hanging Painting at Janggoksa Temple(Maitreya Buddha) (장곡사 미륵불 괘불탱의 채색 재료 분석을 위한 휴대용 라만 분광기의 적용성 연구)

  • LEE Na Ra;YOO Youngmi;KIM Sojin
    • Korean Journal of Heritage: History & Science
    • /
    • v.56 no.4
    • /
    • pp.216-228
    • /
    • 2023
  • The purpose of this study is to apply the handheld Raman spectrometer to identify the coloring materials used in a large Buddhist painting (of Maitreya Buddha) at Janggoksa Temple through cross-validation with HH-XRF. An in situ investigation was performed together with use of a digital microscope and HH-XRF analysis to verify the properties of pigments used in the gwaebul ("large Buddhist painting") via a non-destructive method. However, the identification of coloring materials composed of light elements and mixed or overlaid pigments is difficult using only non-destructive analysis data. Unlike in situ investigation, laboratory analysis often required samples yet the sampling is restricted to a small quantity due to the cultural heritage characteristic. Thus, it is necessary to develop a non-destructive in situ method to supplement the HH-XRF data. The large Buddhist painting at Janggoksa Temple was painted mainly using white, red, yellow, green, and blue colors. The Raman spectroscopy provides molecular information, while XRF spectroscopy provides information about elemental composition of the pigments. Analysis results identified various coloring materials: inorganic pigment, such as lead white, minium, cinnabar, and orpiment, as well as organic pigment such as gamboge and indigo. Therefore, it is possible to obtain more information for the identification of pigments; organic pigment and mixed or overlaid pigments, while at the same time minimizing the collection sample and simplifying the analysis procedure compared to previously used methods. The results of this study will be used as basic data for the analysis of painting cultural heritage through a non-destructive in situ method in the future.