• Title/Summary/Keyword: 기술적 요소

Search Result 9,639, Processing Time 0.049 seconds

A Study on the Stability of Uncontinuous Plate Structures with Cracks (결함을 갖는 불연속평판 구조물의 안정성 연구)

  • Lee, Seon-U;Kim, Si-Yeong;Hong, Bong-Gi
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.20 no.1
    • /
    • pp.37-42
    • /
    • 1984
  • This paper deals with the characterics of the stability of uncontinuous plate structures with cracks. The relation between the J-intergal of the cracks existing in the stress-concentrated regions and local strain are investigated experimentally and theoretically. The BEM(boundary element method)analysis and test results lead to the follow conclusions: 1. A non-dimensional J was computed in a plate stress and strain condition for several kind of loads and crack types. The J design curves are defined as follows: J sub(E)/$\sigma$ sub(y) super(2) a=3.345(e/e sub(y) ) super(2) at e/e sub(y)$\leq$1 J sub(E)/$\sigma$ sub(y) super(2) a=3.345(e/e sub(y) ) at e/e sub(y)$\geq$1 2. Use of this curve provides a good estimation for the uncontinuous plate structures with cracks existing in the stress and strain concentrated region. 3. The stability of the characteristics is mainly depenent upon not the length of cracks but the type of the cracks.

  • PDF

Deduction of Considerations During Design and Construction by Analysing Domestic and Abroad Case Analysis of Freeform Building Envelope (국내외 비정형 건축물 외피시스템 사례 분석을 통한 설계 및 시공시 고려사항 도출)

  • Ryu, Han-Guk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.4
    • /
    • pp.84-96
    • /
    • 2013
  • Recently, architectural design has been changing from formal design to freeform design due to the digitalization of construction industry. Especially, the formal design has been accepted as a design trend recently and applied many times as a design concept in the architectural design competitions such as turn-key. However, various deflects such as water leak and cracks have been occurred because the traditional construction methods had been applied without any revision or adaptation of the formal construction method for the freeform building construction. Design and construction of freeform building has been developed as an new method in order to solve the problems and minimize the construction duration and cost for the freeform building. Therefore this research deduced the positive implications for developing freefrom envelope by analyzing the domestic and abroad cases and proposed the considerations during design and construction of the freeform envelope as follows. First, the freeform design should consider the constructability for the freeform envelope. Second, manufacturing technology for the two-way curvature of the unit panel should be developed. Third, exposed concrete form method should be developed for the freeform envelope of concrete. Forth, material characteristics, construction method and facility management should be considered in order to manage precipitation and keep water-proof according to the classification of the freeform envelope area.

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

Methods for Stabilizing QoS in Mobile Cloud Computing (모바일 클라우드 컴퓨팅을 위한 QoS 안정화 기법)

  • La, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.507-516
    • /
    • 2013
  • Mobile devices have limited computing power and resources. Since mobile devices are equipped with rich network connectivity, an approach to subscribe cloud services can effectively remedy the problem, which is called Mobile Cloud Computing (MCC). Most works on MCC depend on a method to offload functional components at runtime. However, these works only consider the limited verion of offloading to a pre-defined, designated node. Moveover, there is the limitation of managing services subscribed by applications. To provide a comprehensive and practical solution for MCC, in this paper, we propose a self-stabilizing process and its management-related methods. The proposed process is based on an autonomic computing paradigm and works with diverse quality remedy actions such as migration or replicating services. And, we devise a pratical offloading mechanism which is still in an initial stage of the study. The proposed offloading mechanism is based on our proposed MCC meta-model. By adopting the self-stabilization process for MCC, many of the technical issues are effectively resolved, and mobile cloud environments can maintain consistent levels of quality in autonomous manner.

Performance Analysis of RFID Interference Suppression System Based on the Gold Code (골드 코드 기반의 RFID 간섭제거 시스템 성능분석)

  • khadka, Grishma;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1491-1497
    • /
    • 2013
  • Radio frequency identification (RFID) is an important and essential components of ubiquitous computing, with the development of wireless communication technologies and mobile computing environment. Recently, RFID becomes the mainstream application that helps fast handling and uniquely identifying the physical objects. It utilizes the electromagnetic energy for data transmission from a tag to a reader in the presence of arbitrary interference and noise. In order to employ the portable mobile RFID reader, a tag-collision problem between two or more adjacent tags should be considered. In this paper, we present the operation of RFID system in which numerous tags are present in the interrogation zone of a single reader at the same time. Since there may exist a number of tagged objects in the narrow area, multiple RFID tags may interfere each other, caused to degrade the data reliability and efficiency of the RFID system. In order to suppress interference signals from multiple neighboring tags, we present an application of Gold code for RFID communication system, which uses spread spectrum technique. In this RFID system, data bits are spreaded in each tags with the unique Gold code and the spreaded data bits are despreaded in the reader with the same Gold code. The performance analysis of the considered RFID anti-collision system is illustrated via computer simulation examples.

A Prefetching and Memory Management Policy for Personal Solid State Drives (개인용 SSD를 위한 선반입 및 메모리 관리 정책)

  • Baek, Sung-Hoon
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.35-44
    • /
    • 2012
  • Traditional technologies that are used to improve the performance of hard disk drives show many negative cases if they are applied to solid state drives (SSD). Access time and block sequence in hard disk drives that consist of mechanical components are very important performance factors. Meanwhile, SSD provides superior random read performance that is not affected by block address sequence due to the characteristics of flash memory. Practically, it is recommended to disable prefetching if a SSD is installed in a personal computer. However, this paper presents a combinational method of a prefetching scheme and a memory management that consider the internal structure of SSD and the characteristics of NAND flash memory. It is important that SSD must concurrently operate multiple flash memory chips. The I/O unit size of NAND flash memory tends to increase and it exceeded the block size of operating systems. Hence, the proposed prefetching scheme performs in an operating unit of SSD. To complement a weak point of the prefetching scheme, the proposed memory management scheme adaptively evicts uselessly prefetched data to maximize the sum of cache hit rate and prefetch hit rate. We implemented the proposed schemes as a Linux kernel module and evaluated them using a commercial SSD. The schemes improved the I/O performance up to 26% in a given experiment.

Optimum Design of Lock Snap-fit Using Design of Experiment (실험계획법을 이용한 이탈방지 스냅핏의 최적설계)

  • Son, In-Seo;Shin, Dong-Kil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.8
    • /
    • pp.378-385
    • /
    • 2017
  • This study investigated the design of a snap fit, which is widely used for fastening plastic parts. We analyzed the assembly mechanism of a lock snapfit, measured the assembly force and separation force based on the design of experiments, and derived a regression equation through an analysis of variance. The response surface methodology was also used. Polybutylene terephthalate was used to fabricate specimens, and the assembly force and separation force were measured using a micro-tensile tester. The length, width, thickness, and interference were considered as factors. A second-order regression model was used to derive the regression equation. The assembly force decreased with increasing length and width, but it increased with increasing thickness and interference. The finite element method was used to analyze the assembly mechanics. The width decreased the assembly force by increasing the ductility. The influences of the factors for low assembly force and high release force were shown to be opposite to each other. It was necessary to design a structure that minimized the assembly force while maintaining an appropriate level of separation force.

Controlling Factors of Particle Size Distribution during Formation of Cubic and Colloidal Calcium Carbonate Compounds (Cubic형과 Colloid형 탄산칼슘 합성에서의 입경제어 연구)

  • Ahn, Ji-Whan;Park, Chan-Hoon
    • Resources Recycling
    • /
    • v.5 no.3
    • /
    • pp.65-72
    • /
    • 1996
  • Colloidal calcium wrbonate(diametcr 0.02-0 09 m~wja s developed to maintain the mamenl of pnriide formatio~>w ~lhoutsurlace trealment. The control factors of particle size and optimum condiliuna for compound fam*tition has not bccn studiedyet. This shldy war aimed at developing a method fur compounding colloidal calcium carbonfcte to cnl~hol cubic calciumcarbonate, and then compounding the b-o types oI precipitated calcium wrbonatc under optimum wndilrans Calc~umhydroxide was calcinated at 1, lWC far two hours, md then hydrated for 30 minutes at t i i O rprn and ambiznt temperahlle.Two-liter suspension was subjected to the contact with carbon dioxide at l5"C, 600 ipxn and C0= injection in the rate of 1 Umin Two types of dcium carbonate(cuhic calcium carbonatc(0 24.9 pm) md collnidd calcium mhnnate (0.02-0 09 pm))were compounded by "wing the concentrations of calcium oxide and ihe suspension were compounded. It was found that theoptimum concentrations of each suspensions were 5 wt % and 2.5 \I*.% respectively. ' h c key control factor af thc parlicle slzcdislribution was the concenkation al the suspension. The size of compounded particles was measured by a Zcla S k r 'fieaverage particle size of the cubic calcium carbonate aas 223.4 nm(0.223 pm), and that of thc colloidal a~lciumc arbonate was93.6 nm (0.093 km). Ihe particle sizc was evenly cantlolled on a stdblc basis in an H, O reaction system.asis in an H, O reaction system.

  • PDF

A Study on the Educational Needs and the Review of the Validity of the Establishment for Invention Gifted School (발명영재학교의 교육수요 진단 및 설립 타당성 검토 연구)

  • Choi, Yu-Hyun;Kang, Kyoung-Kyoon;Shim, Jae-Young;Lee, Han-Gyu;Chung, Ho-Keun;Lee, Jin-Woo
    • 대한공업교육학회지
    • /
    • v.33 no.1
    • /
    • pp.169-190
    • /
    • 2008
  • The purposes of this research were to review the validity and to investigated educational needs of the establishment for invention gifted school. And this study was conducted on the establishment plan through diagnosis necessity and validity of the establishment for invention gifted school. The methodes of this study were review, investigation researches, workshop, expert review for validity and a seminar. The results was as follows: First, the invention gifted school presented distinctive curriculum and instruction methods. The curriculum focus on engineering, technology, invention, problem solving, and STEM. And it presented scenario on the establishment of invention gifted school from the viewpoint of necessity and distinction. Second, the invention gifted school investigated high-level transition from demand of education of students and their parents. Third, the necessity level was higher than the validity and feasibility with expert assessment. But, before the establishment of the invention gifted school institute will review pre-requirements and hinder factors.

Design and Implementation of Tool Server and License Server for Protecting Digital Contents (디지털 콘텐츠의 저작권 관리를 위한 라이센스 서버와 툴 서버 설계 및 구현)

  • Hong Hyen-Woo;Ryu Kwang-Hee;Kim Kwang-Yong;Kim Jae-Gon;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.573-576
    • /
    • 2006
  • Recently, the standard work of the copyright of the Digital content is not completed. And the content providers are developing self's copyright protecting technique. here is some problem such as the confusion existed in the copyright protecting and management system. The reason is that the company using different technique when developing the Digital Contents. Now, there is a standard working leaded by the MPEG. It's called MPEG-21 Multimedia framework and the REL is parted of the Intellectual Property Management and Protection included the framework. And the REL's standard working is completed. The Intellectual Property Management and Protection system contain license server, tool server, metadate server and consume server. In this paper, In order to management and protect the Digital Content copyright, We applying the REL, One of the contents of the MPEG-21 framework to design and implementation the License Server manage the settlement and the consumption information and the Tool Server manage and transport the Tools used from Digital Contents formation to the Digital Contents consumption.

  • PDF