• Title/Summary/Keyword: Chain-block analysis

Search Result 91, Processing Time 0.031 seconds

3D Casing-Distributor Analysis for Hydraulic Design Application

  • Devals, Christophe;Zhang, Ying;Dompierre, Julien;Vu, Thi C.;Mangani, Luca;Guibault, Francois
    • International Journal of Fluid Machinery and Systems
    • /
    • v.8 no.3
    • /
    • pp.142-154
    • /
    • 2015
  • Nowadays, computational fluid dynamics is commonly used by design engineers to evaluate and compare losses in hydraulic components as it is less expensive and less time consuming than model tests. For that purpose, an automatic tool for casing and distributor analysis will be presented in this paper. An in-house mesh generator and a Reynolds Averaged Navier-Stokes equation solver using the standard $k-{\omega}$ shear stress transport (SST) turbulence model will be used to perform all computations. Two solvers based on the C++ OpenFOAM library will be used and compared to a commercial solver. The performance of the new fully coupled block solver developed by the University of Lucerne and Andritz will be compared to the standard 1.6ext segregated simpleFoam solver and to a commercial solver. In this study, relative comparisons of different geometries of casing and distributor will be performed. The present study is thus aimed at validating the block solver and the tool chain and providing design engineers with a faster and more reliable analysis tool that can be integrated into their design process.

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

Haircutting Point Analysis and Improvement the Block Matching Algorithm Using in Web Camera (웹 카메라에서 블록정합기법을 이용한 헤어커팅 포인트 분석 및 개선)

  • Kang, Nam Soon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.189-197
    • /
    • 2009
  • This paper suggests the system for searching and application is to be in combination between existing hair art area and Image/Video processing area. This proposed system usually saves various hair types into a database, then, users send images of their face over the internet by using WebCam. Finally, they can find the hair types for users. Hair cutting is technology that form draft to make hair style. Man cut must decide how in image of sinciput, image of side bean curd, after lower image must operate. Silhouette is produced as is different by change of this three places. Customer increases in the beauty salon and beauty salon chain being changed, research about beauty art is necessary point of time. In this treatise, our country of when swim and operate haircut about problem that happen sample survey and analysis.

A Study on the Performance Analysis Algorithm for Digital Transmission Lines (디지틀 전송선로의 성능 분석 알고리즘에 관한 연구)

  • 서수완;전동근;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.6
    • /
    • pp.498-508
    • /
    • 1991
  • This thesis presents a performance analysis algorithm that estimates erro performance of individual links, at the bit level, in an end-to-end digital connection using the model of 3-statte MarKov chain. The link model proposed the burst error behavior of each individual link. It also presents a method to concateante several individual links and extract a model for end-to-end digital connection. This resulting end-to-end model can be used to calculate performance parameters such as bit error rate(BER) and block error(BLER) for any block size.

  • PDF

Reliable blockchain-based ring signature protocol for online financial transactions

  • Jinqi Su;Lin He;Runtao Ren;Qilei Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2083-2100
    • /
    • 2023
  • The rise of Industry 5.0 has led to a smarter and more digital way of doing business, but with it comes the issue of user privacy and security. Only when privacy and security issues are addressed, will users be able to transact online with greater peace of mind. Thus, to address the security and privacy problems associated with industry blockchain technology, we propose a privacy protection scheme for online financial transactions based on verifiable ring signatures and blockchain by comparing and combining the unconditional anonymity provided by ring signatures with the high integrity provided by blockchain technology. Firstly, we present an algorithm for verifying ring signature based on distributed key generation, which can ensure the integrity of transaction data. Secondly, by using the block chain technique, we choose the proxy node to send the plaintext message into the block chain, and guarantee the security of the asset transaction. On this basis, the designed scheme is subjected to a security analysis to verify that it is completely anonymous, verifiable and unerasable. The protection of user privacy can be achieved while enabling online transactions. Finally, it is shown that the proposed method is more effective and practical than other similar solutions in performance assessment and simulation. It is proved that the scheme is a safe and efficient online financial transaction ring signature scheme.

Comparison of the Rehabilitation Program after Rotator Cuff Repair by Time Closed Chain Exercise (회전근개봉합술 후 닫힌사슬운동 적용 시점에 따른 효과 비교)

  • Song, Hyun-Seung;Kim, Suhn-Yeop
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.9 no.4
    • /
    • pp.485-492
    • /
    • 2014
  • PURPOSE: This study aimed to examine the pain, range of motion (ROM), upper extremity task performance, and functional levels of patients after rotator cuff repair according to the timing of a closed chain exercise thereby presenting basic data for an effective rehabilitation program. METHODS: The intervention was applied three times per week, one hour per day, for four weeks to 40 participants, 78 of whom had undergone rotator cuff repair. The participants were divided into four groups and assigned to usual general physical therapy and an open chain exercise. Group I consisted of the open chain exercise only. The closed chain exercise was applied to group II after the 4 times, group III after the 7 times, group IV after the 10 times. Measurement were used ROM, visual analogue scale (VAS), box and block test (BBT), and shoulder pain and disability index (SPADI). A one-way analysis of variance was conducted to test differences. RESULTS: There were significant differences in the internal/external rotation between group I and group II. The VAS significantly differed between group II and group I, group III, and group IV. The BBT results of group II and group I were significantly different compared to those of group IV. The SPADI significantly differed between group II and group I and between group II and group IV. CONCLUSION: The closed chain exercise was effective for patients following rotator cuff repair from the second week after active exercise was prescribed, verifying its applicability in rehabilitation programs.

A Study on Blockchain Adoption in Retail Supply Chain Management (소매 공급망 관리에서 블록체인 활용에 관한 연구)

  • Shipra Pathak;Charu Saxena;Kyung-Sil Kim
    • Advanced Industrial SCIence
    • /
    • v.2 no.2
    • /
    • pp.1-8
    • /
    • 2023
  • The goal of the study is to describe blockchain technology as it relates to enhancing supply chains in the retail sector in order to achieve sustainability. This study offers a critical analysis of the possible applications of blockchain technology and smart contracts to supply chain management. This paper explains how Blockchain technology may be used by customers and merchants in a variety of retail business operations to great advantage. By adopting a modified version of the UTUAT model, this study validates the possibility of using blockchain for supply chain management in the retail industry. The study found a significant and positive correlation between behavioral intention and acceptance toward employing block networks in supply chain management in the retail business. The behavior intention (BI) to adopt blockchain technology is significantly influenced by performance expectations, effect expectations, subjective standards, and enabling variables. The performance and effort expectations have a considerable impact on the BI to adopt blockchain in supply chain management.

Investigation on Chain Transfer Reaction of Benzene Sulfonyl Chloride in Styrene Radical Polymerization

  • Li, Cuiping;Fu, Zhifeng;Shi, Yan
    • Macromolecular Research
    • /
    • v.17 no.8
    • /
    • pp.557-562
    • /
    • 2009
  • The free radical polymerization of styrene was initiated with azobis(isobutyronitrile) in the presence of benzene sulfonyl chloride. Analysis of the terminal structures of the obtained polystyrene with $^1H$ NMR spectroscopy revealed the presence of a phenyl sulfonyl group at the ${\alpha}$-end and a chlorine atom at the ${\omega}$-end of each polystyrene chain. The terminal chlorine atom in the polystyrene chains was further confirmed through atom transfer radical polymerization (ATRP) of styrene and methyl acrylate using the obtained polystyrenes as macroinitiators and CuCl/2,2'-bipyridine as the catalyst system. GPC traces of the products obtained in ATRP at different reaction times were clearly shifted to higher molecular weight direction, indicating that nearly all the macroinitiator chains initiated ATRP of the second monomers. In addition, the number-average molecular weights of the polystyrenes increased directly proportional to the monomer conversions, and agreed well with the theoretical ones.

Performance Evaluation of Buffer Management Schemes for Implementing ATM Cell Reassembly Mechanism

  • Park, Gwang-Man;Kang, Sung-Yeol;Lie, Chang-Hoon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.2
    • /
    • pp.139-151
    • /
    • 1997
  • An ATM switching system may be designed so that communications between processors of its control part can be performed via its switching network rather than a separate inter-processor communications (IPC) network. In such a system, there should be interfaces to convent IPC traffic from message format to cell format and vice versa, that is, mechanisms to perform the SAR (Segmentation And Reassembly) sublayer functions. In this paper, we concern the cell reassembly mechanism among them, mainly focussed on buffer management schemes. We consider a few alternatives to implement cell reassembly function block, namely, separated buffering, reserved buffering and shared buffering in this paper. In case of separated and reserved buffering, we employ a continuous time Markov chain for the performance evaluation of cell reassembly mechanism, judicially defining the states of the mechanism. Performance measures such as measage loss probability, mean number of message queued in buffer and average reassembly delay are obtianed in closed forms. In case of shared buffering, we compare the alternatives for implementing cell reassembly function block using simulation because it is almost impossible to analyze the mechanism of shared buffering by analytical modeling. Some illustrations are given for the performance analysis of the alternatives to implement cell reassembly function block.

  • PDF

Effect of Block chain Characteristic on Acceptance Intention: Focusing on Medical Area (블록체인 특성이 수용의도에 미치는 영향 : 의료분야를 중심으로)

  • Park, Jung-Hong;Kim, Jinsu
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.169-180
    • /
    • 2020
  • In this study, we explored Technology Acceptance Model(TAM) to introduce Blockchain technology in the medical field. It extracted five external variables(Security, Availability, Reliability, Diversity, Economic feasibility) through previous studies. It set the study model for a path to acceptance intention through the information reliance of recognized easiness and recognized usefulness. As results of empirical analysis, H1-1(Security →Perceived Easiness) was rejected. H1-2(Availability→Perceived Easiness), H1-3(Reliabilit→Perceived Easiness), H1-4(Diversity →Perceived Easiness), H1-5(Economic →Perceived Easiness) were adopted. Hypothesis 2 was a relations between Blockchain's characteristics and Perceived usefulness, all the Hypothesis were adopted. Hypothesis 3 and Hypothesis 4 indicated that H3-1(Perceived Easiness →Perceived usefulness) was rejected but H3-2(Perceived Easiness → information reliability), H3-3(Perceived usefulness → information reliability), and H4(information reliability→acceptance intention) were all adopted. It was confirmed that it is important to emphasize the importance of stability to introduce block chain technology to medical centers, but it was necessary to use a design that can increase the easiness from the prospect of users.