• Title/Summary/Keyword: A Reverse Idea Method

Search Result 11, Processing Time 0.025 seconds

Generalized Vehicle Routing Problem for Reverse Logistics Aiming at Low Carbon Transportation

  • Shimizu, Yoshiaki;Sakaguchi, Tatsuhiko
    • Industrial Engineering and Management Systems
    • /
    • v.12 no.2
    • /
    • pp.161-170
    • /
    • 2013
  • Deployment of green transportation in reverse logistics is a key issue for low carbon technologies. To cope with such logistic innovation, this paper proposes a hybrid approach to solve practical vehicle routing problem (VRP) of pickup type that is common when considering the reverse logistics. Noticing that transportation cost depends not only on distance traveled but also on weight loaded, we propose a hierarchical procedure that can design an economically efficient reverse logistics network even when the scale of the problem becomes very large. Since environmental concerns are of growing importance in the reverse logistics field, we need to reveal some prospects that can reduce $CO_2$ emissions from the economically optimized VRP in the same framework. In order to cope with manifold circumstances, the above idea has been deployed by extending the Weber model to the generalized Weber model and to the case with an intermediate destination. Numerical experiments are carried out to validate the effectiveness of the proposed approach and to explore the prospects for future green reverse logistics.

A Code Block Cipher Method to Protect Application Programs From Reverse Engineering (응용프로그램 역분석 방지를 위한 코드블록 암호화 방법)

  • Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.85-96
    • /
    • 2008
  • One of the typical methods to prevent tampering and reverse engineering on executable codes is to encrypt them. This paper proposes a code block cipher method based on key chaining to encrypt the code. The block cipher by key chaining has been known to be inadequate for encrypting the code with control transfer, even though the key chaining has advantage of hiding the keys in blocks and making the individual keys different from block to block. This paper proposes a block transformation and duplication method to apply the block cipher by key chaining to the executable codes with control transfer instructions, and shows the idea works with the MIPS instruction set.

A Study on the Conceptual Characteristics and Design Methods of Anti-Object in Architectural Theory of Kengo Kuma (쿠마켄고의 건축론에서 나타나는 반(反) 오브젝트의 개념적 특성과 디자인 방법에 관한 연구)

  • Park, Chan-Il
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.2
    • /
    • pp.67-77
    • /
    • 2015
  • This study is to contemplate an ultimate goal and new methodology the architecture and space design community should pursue forward by analyzing concepts in Kengo Kuma's idea of "Anti-object" and examining his design methods and characteristics. To this end, I reviewed space design methods and features in his book of "Anti-Object" and his architectures built around in 2000. The result is as in the followings. (1) Contact is an essential concept of "Anti-object" to connect and integrate divided materials and consciousness with time and space. (2) Elimination is a meaningful way to reverse "cohesiveness" of agglomerated cluster which is a form of object and reconstruct it into the form of passive and acceptive "Anti-object". This idea is realized through overlap of material property and removal of massing. (3) Minimization is a concept of "Anti-object" to set the temporality free from constraints of materials. Three-dimensional transparent faces and lines or patterns of porous materials can be used to remove static and coercive volume. (4) A particle is a "reflector of its environment." It rebuilds one-way or disconnected communication between human and architecture into an interactive one. Kengo Kuma materializes this "particle" by exploring positional relation with physical paths, precise details and measurements.

A Study on the Improvement of the Design VE Process using VE Idea-DataBank System (설계 VE 프로세스 개선을 위한 VE Idea-DataBank System 구축에 관한 연구 - 한국도로공사 고속도로 건축공사를 대상으로 -)

  • Park, Heetaek;Park, Chansik;Jung, Wooseob
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.1
    • /
    • pp.28-38
    • /
    • 2014
  • Construction value engineering(VE) is often performed in the form of a short term review of designs, rather than during a regular workshop with a standardized work plan, and its application method is limited. Thus, tasks are performed by applying the method in reverse depending on the VE results, and function analysis, a key VE method, is omitted or only applied for the sake of formality. In addition, it is hard to expect great results from VE because of insufficient time and budget allowed to perform VE and a lack of understanding of VE procedures and methods. In particular, the methods used to store and reuse the tremendous amount of ideas and information created during the process of VE implementation is not systematic. Even the Korea Expressway Corporation, which has produced relatively systematic VE performance compared to other institutions, has had the above-mentioned problems. Therefore, this study aims to improve existing VE processes and suggest a method to efficiently store and retrieve VE information by analyzing the limitations of construction VE practice and the characteristics of VE for highway facilities as part of improving design VE performance.

Improvement plan for Function Definition using CAFAT in the Construction VE (건설 VE에서 CAFAT을 이용한 기능정의 개선방안)

  • Choi, Chang-Hoon;Kim, Soo-Yong
    • Korean Journal of Construction Engineering and Management
    • /
    • v.7 no.3 s.31
    • /
    • pp.102-111
    • /
    • 2006
  • In the analysis of function, which is the core and early phase among the procedure of construction VE Job Plan, the accuracy of function definition directly connects to VE result. However, the method of defining function, which is currently used is not accurate and comprehended or is difficult to utilize it systematically. Also, there is not a clear definition about the function for selecting VE so that many difficulties occur in the organic connection between each of functions in the summarization of function after defining function. Therefore, this study cleared the definition of function and made up any counter measured problem occurred in FAST Diagram later on and suggested CAFAT(Combined Antithetic Function Analysis Technique) in order to induce better phase in functional analysis.

A Design of Noise Reduction Circuit for A radio Telephonic System (무선전화 시스템용 잡음억제회로의 설계)

  • Moon, Jong-Kyu;Kim, Duk-Gyoo
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.84-89
    • /
    • 2002
  • In this paper, we present the design method of noise reduction circuit in telephonic system. The circuit consists of compressor, expander and a filter. The basic idea of a proposed method compresses the audible signal in order to mask the channel noise during transmission and then expand at the reverse rate the transmitted signal to naturally recover the original signal. Of course, there should be no distortion or other degradation of the audio itself in passing through companding(compress/expand) cycle. In the compressing process, the gain of compressor is automatically controlled by the envelope level of input signal in order to increase the effective dynamic range of input signal and to improve the signal to noise ratio. The compressed rate is the root time of a audible signal. The compressed signal should be expanded at the square time of the signal to recover a original signal. Simulation shows the proposed method improves the performance of the noise reduction of a channel noise as well as stability. 

Development of an Engineering Model of Hydrogen-Fueled Ultra-micro Combustor for UMGT

  • Shimotori, Shoko;Yuasa, Saburo;Sakurai, Takashi
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.03a
    • /
    • pp.828-836
    • /
    • 2008
  • To develop an engineering-model of hydrogen-fueled ultra-micro combustor for Ultra Micro Gas Turbine(UMGT), we reviewed and summarized the problems in downsizing combustors, and determined a suitable burning method. The key issue to actualize practical ultra-micro combustors is reducing heat loss from the combustor to compressor and turbine. The reduction of heat loss was discussed from 3 different viewpoints; heat-insulation material, high-space-heating-rate combustion, and combustor-insolated gas turbine structure. Use of heat-insulation material induced the heat loss reduction to the surroundings. The heat loss ratio decreased substantially in reverse proportion to space heating rate, leading the idea that it could be reduced by burning at a high space heating rate. By settling the combustor insolated from the compressor and turbine, the heat transfer from the combustor to the compressor and turbine becomes smaller. For a selection of the suitable burning method, comparison between 2 burning methods, flat-flame and swirling-flamer types, was conducted. Synthetically the flat-flame burning method was confirmed to be more suitable for ultra-micro combustors than latter one. Base on them, an engineering-model of hydrogen-fueled flat-flame ultra-micro combustor was developed. To obtain high overall heat-insulation, heat-resistant and strength, the engineering-model combustor had triple layer structure with an advanced ceramic, a heat insulation material and a stainless steel. To simplify heat transfer issue in the combustor, it was isolated from the other components. Furthermore it was designed by considering structure, size, material, velocity, pressure loss and prevention of flashback.

  • PDF

Research on the tightening strategy of bolted flange for contact stiffness of joint surface

  • Zuo, Weiliang;Liu, Zhifeng;Zhao, Yongsheng;Niu, Nana;Zheng, Mingpo
    • Structural Engineering and Mechanics
    • /
    • v.83 no.3
    • /
    • pp.341-351
    • /
    • 2022
  • During bolted flange assembly, the contact stiffness of some areas of the joint surface may be low due to the elastic interaction. In order to improve the contact stiffness at the lowest position of bolted flange, the correlation model between the initial bolt pre-tightening force and the contact stiffness of bolted flange is established in this paper. According to the stress distribution model of a single bolt, an assumption of uniform local contact stiffness of bolted flange is made. Moreover, the joint surface is divided into the compressive stress region and the elastic interaction region. Based on the fractal contact theory, the relationship model of contact stiffness and contact force of the joint surface is proposed. Considering the elastic interaction coefficient method, the correlation model of the initial bolt pre-tightening force and the contact stiffness of bolted flange is established. This model can be employed to reverse determine the tightening strategy of the bolt group according to working conditions. As a result, this provides a new idea for the digital design of tightening strategy of bolt group for contact stiffness of bolted flange. The tightening strategy of the bolted flange is optimized by using the correlation model of initial bolt pre-tightening force and the contact stiffness of bolted flange. After optimization, the average contact stiffness of the joint surface increased by 5%, and the minimum contact stiffness increased by 6%.

Efficient Session Management mechanism applied Key Recovery technique in IPSec (IPSec에서 키 복구 기술을 적용한 효율적인 연결 관리 메커니즘)

  • Kim, Jeong-Beom;Lee, Yun-Jeong;Park, Nam-Seop;Kim, Tae-Yun
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.775-782
    • /
    • 2001
  • Recently the use of Linux OS is increasing to tremendous figures. But due to the fact that Linux is distributed on an open-source policy, the need of security is an upcoming question which leads to widespread development of security on a Linux based environment. Cryptography, however, can cause various problems because of difficulty of key management. A lot of researchers have been concentrating on the key recovery technique to eliminate the reverse effect of using these kinds of security and to promote positive aspects of using it. In this thesis I am suggesting an mechanism based on the key recovery technique, as a method to save time in recovery and resetting a disconnection between two end-users through IPSec (IP Security) protocols in a VPN (Virtual Private Network) environment. The main idea of the newly suggested mechanism, KRFSH (Key Recovery Field Storage Header), is to store the information of the session in advance for the case of losing the session information essential to establish a tunnel connection between a SG and a host in the VPN environment, and so if necessary to use the pre-stored information for recovery. This mechanism is loaded on the IPSec based FreeS/WAN program (Linux environment), and so the VPN problem mentioned above is resolved.

  • PDF

Effect of Amino Terminus of Gap Junction Hemichannel on Its Channel Gating (간극결합채널의 아미노말단이 채널개폐에 미치는 영향)

  • Yim Jaegil;Cheon Misaek;Jung Jin;Oh Seunghoon
    • Journal of Life Science
    • /
    • v.16 no.1
    • /
    • pp.37-43
    • /
    • 2006
  • Gap junction is an ion channel forming between adjacent cells. It also acts as a membrane channel like sodium or potassium channels in a single cell. The amino acid residues up to the $10^{th}$ position in the amino (N)-terminus of gap junction hemichannel affect gating polarity as well as current-voltage (I-V) relation. While wild-type Cx32 channel shows negative gating polarity and inwardly rectifying I-V relation, T8D channel in which threonine residue at $8^{th}$ position is replaced with negatively charged aspartate residue shows reverse gating polarity and linear I-V relation. It is still unclear whether these changes are resulted from the charge effect or the conformational change of the N-terminus. To clarify this issue, we made a mutant channel harboring cysteine residue at the $8^{th}$ position (T8C) and characterized its biophysical properties using substituted-cysteine accessibility method (SCAM). T8C channel shows negative gating polarity and inwardly rectifying I-V relation as wild-type channel does. This result indicates that the substitution of cysteine residue dose not perturb the original conformation of wild-type channel. To elucidate the charge effect two types of methaenthiosulfonate (MTS) reagents (negatively charged $MTSES^-$ and positively charged $MTSET^+$) were used. When $MTSES^-$ was applied, T8C channel behaved as T8D channel, showing positive gating polarity and linear I-V relation. This result indicates that the addition of a negative charge changes the biophysical properties of T8C channel. However, positively charged $MTSET^+$ maintained the main features of T8C channel as expected. It is likely that the addition of a charge by small MTS reagents does not distort the conformation of the N-terminus. Therefore, the opposite effects of $MTSES^-$ and $MTSETT^+$ on T8C channel suggest that the addition of a charge itself rather than the conformational change of the N-terminus changes gating polarity and I-V relation. Furthermore, the accessibility of MTS reagents to amino acid residues at the $8^{th}$ position supports the idea that the N-terminus of gap junction channel forms or lies in the aqueous pore.