• Title/Summary/Keyword: Expansion Method

Search Result 3,557, Processing Time 0.031 seconds

Calculation of the NMR Cheimical Shift for a 4d$^1$ System in a Strong Crystal Field Environment of Trigonal Symmetry with a Threefold Axis of Quantization

  • Ahn, Sang-Woon;Oh, Se-Woung;Ro, Seung-Woo
    • Bulletin of the Korean Chemical Society
    • /
    • v.7 no.3
    • /
    • pp.170-178
    • /
    • 1986
  • The NMR chemical shift arising from 4d electron angular momentum and 4d electron angular momentum and 4d electron spin dipolar-nuclear spin angular momentum interactions for a $4d^1$ system in a strong crystal field environment of trigonal symmetry, when the threefold axis is chosen to be the axis of quantization axis, has been examined. A general expression using the nonmultipole expansion method (exact method) is derived for the NMR chemical shift. From this expression all the multipolar terms are determined. We observe that along the (100), (010), (110), and (111) axes the NMR chemical shifts are positive while along the (001) axis, it is negative. We observe that the dipolar term (1/R3) is the dominant contribution to the NMR chemical shift except for along the (111) axis. A comparison of the multipolar terms with the exact values shows also that the multipolar results are exactly in agreement with the exact values around $R{\geqslant}0.2$ nm. The temperature dependence analysis on the NMR chemical shifts may imply that along the (111) axis the contribution to the NMR chemical shift is dominantly pseudo contact interaction. Separation of the contributions of the Fermi and the pseudo contact interactions would correctly imply that the dipolar interaction is the dominant contribution to the NMR chemical shifts along the (100), (010), (001), and (110) axes, but along the (111) axis the Fermi contact interaction is incorrectly the dominant contribution to the NMR chemical shift.

A Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values (SQL 질의 애트리뷰트 값 제거 방법을 이용한 효과적인 SQL Injection 공격 탐지 방법 연구)

  • Lee, In-Yong;Cho, Jae-Ik;Cho, Kyu-Hyung;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.135-148
    • /
    • 2008
  • The expansion of the internet has made web applications become a part of everyday lift. As a result the number of incidents which exploit web application vulnerabilities are increasing. A large percentage of these incidents are SQL Injection attacks which are a serious security threat to databases with potentially sensitive information. Therefore, much research has been done to detect and prevent these attacks and it resulted in a decline of SQL Injection attacks. However, there are still methods to bypass them and these methods are too complex to implement in real web applications. This paper proposes a simple and effective SQL Query attribute value removal method which uses Static and Dynamic Analysis and evaluates the efficiency through various experiments.

A Study on the Strategy of Sustainable Hospital Architecture Masterplan (지속가능한 병원건축 마스터플랜 전략에 관한 연구)

  • Park, Cheolkyun;Yang, Naewon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.26 no.4
    • /
    • pp.15-26
    • /
    • 2020
  • Purpose: The purpose of this study is to derive a plan to establish a more sophisticated master plan so that the direction of master plan study can be sustained in the mid to long term. Methods:: Compare and analyze the differences between the master plan and the design to identify causes and problems. First, after establishing the master plan, compare the expansion area, net area per bed, and service area with the design drawing of the first project to determine the degree of recovery to the level required by the recent medical environment. Second, the possibility of responding to future internal changes is reviewed by comparing and analyzing the arrangement and connection method of extension buildings. Third, comparing the difference between the project following the first project and the phased of masterplan. Results: The first one is that continuous participation of person or group with high understanding of the master plan. Second, establishing a master plan and proceeding with the project through the determination of the correct business budget. Third, a specific area of the mechanical and electrical room suitable for the size and purpose of the hospital should be presented, and research on the arrangement method should be conducted. Finally, the feasibility of the hospital's own plan for securing parking facilities should be accurately investigated. Implications: It is important for the hospital to recover from the past to the present and respond to the future that the direction of the master plan continues after the establishment.

Image Edge Detection Algorithm applied Directional Structure Element Weighted Entropy Based on Grayscale Morphology (그레이스케일 형태학 기반 방향성 구조적 요소의 가중치 엔트로피를 적용한 영상에지 검출 알고리즘)

  • Chang, Yu;Cho, JoonHo;Moon, SungRyong
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.41-46
    • /
    • 2021
  • The method of the edge detection algorithm based on grayscale mathematical morphology has the advantage that image noise can be removed and processed in parallel, and the operation speed is fast. However, the method of detecting the edge of an image using a single structural scale element may be affected by image information. The characteristics of grayscale morphology may be limited to the edge information result of the operation result by repeatedly performing expansion, erosion, opening, and containment operations by repeating structural elements. In this paper, we propose an edge detection algorithm that applies a structural element with strong directionality to noise and then applies weighted entropy to each pixel information in the element. The result of applying the multi-scale structural element applied to the image and the result of applying the directional weighted entropy were compared and analyzed, and the simulation result showed that the proposed algorithm is superior in edge detection.

Behaviour of ultra-high strength concrete encased steel columns subject to ISO-834 fire

  • Du, Yong;Zhou, Huikai;Jiang, Jian;Liew, J.Y. Richard
    • Steel and Composite Structures
    • /
    • v.38 no.2
    • /
    • pp.121-139
    • /
    • 2021
  • Ultra-high strength concrete (UHSC) encased steel columns are receiving growing interest in high-rise buildings owing to their economic and architectural advantages. However, UHSC encased steel columns are not covered by the modern fire safety design code. A total of 14 fire tests are conducted on UHSC (120 MPa) encased steel columns under constant axial loads and exposed to ISO-834 standard fire. The effect of load ratio, slenderness, stirrup spacing, cross-section size and concrete cover to core steel on the fire resistance and failure mode of the specimens are investigated. The applicability of the tabulated method in EC4 (EN 1994-1-2-2005) and regression formula in Chinese code (DBJ/T 15-81-2011) to fire resistance of UHSC encased steel columns are checked. Generally, the test results reveal that the vertical displacement-heating time curves can be divided into two phases, i.e. thermal expansion and shortening to failure. It is found that the fire resistance of column specimens increases with the increase of the cross-section size and concrete cover to core steel, but decreases with the increase of the load ratio and slenderness. The EC4 method overestimates the fire resistance up to 186% (220 min), while the Chinese code underestimates it down to 49%. The Chinese code has a better agreement than EC4 with the test results since the former considers the effect of the load ratio, slenderness, cross section size directly in its empirical formula. To estimate the fire resistance precisely can improve the economy of structural fire design of ultra-high strength concrete encased steel columns.

Analysis of the virtual simulation practice and high fidelity simulation practice training experience of nursing students: A mixed-methods study (간호대학생의 Virtual 시뮬레이션 실습 및 High fidelity 시뮬레이션 실습교육 경험 분석: 혼합연구방법 적용)

  • Lee, Eun Hye;Ryu, So Young
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.27 no.3
    • /
    • pp.227-239
    • /
    • 2021
  • Purpose: This study used an exploratory sequential approach (mixed methods) design to explore essential meaning through comparing and analyzing the experiences of nursing students in virtual simulation practice and high fidelity simulation practice education in parallel. Methods: The study participants were 20 nursing students, and data were collected through focus group meetings from July 17 to August 5, 2020, and via online quantitative data from November 10 to November 15, 2020. The qualitative data were analyzed using Giorgi's phenomenological method, and the quantitative data were analyzed using descriptive statistics, the Mann-Whitney U test, Kruskal-Wallis H test analysis of variance and Spearman's ρ correlation. Results: The comparison between the two simulation training experiences was shown in five contextual structures, as follows: (1) reflection of the clinical field, (2) thinking theorem vs. thinking expansion, (3) individual-centered learning vs. team-centered learning, (4) attitudes toward participating in practical training, (5) metacognition of personal competency as a prospective nurse, and (6) revisiting the method of practice training. There was a positive correlation between satisfaction with the practice and the clinical judgment ability of high fidelity simulation, which was statistically significant (r=.47, p=.036). Conclusion: Comparing the experiences between virtual simulation practice training and high fidelity simulation practice training, which has increased in demand due to the Coronavirus Disease-2019 pandemic, is meaningful as it provides practical data for introspection and reflection on in-campus clinical education.

Augmented Quantum Short-Block Code with Single Bit-Flip Error Correction (단일 비트플립 오류정정 기능을 갖는 증강된 Quantum Short-Block Code)

  • Park, Dong-Young;Suh, Sang-Min;Kim, Baek-Ki
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.1
    • /
    • pp.31-40
    • /
    • 2022
  • This paper proposes an augmented QSBC(Quantum Short-Block Code) that preserves the function of the existing QSBC and adds a single bit-flip error correction function due to Pauli X and Y errors. The augmented QSBC provides the diagnosis and automatic correction of a single Pauli X error by inserting additional auxiliary qubits and Toffoli gates as many as the number of information words into the existing QSBC. In this paper, the general expansion method of the augmented QSBC using seed vector and the realization method of the Toffoli gate of the single bit-flip error automatic correction function reflecting the scalability are also presented. The augmented QSBC proposed in this paper has a trade-off with a coding rate of at least 1/3 and at most 1/2 due to the insertion of auxiliary qubits.

Verification Methods for Vulnerabilities of Airborne Object-Oriented Software (항공용 객체지향 소프트웨어에 대한 취약점 검증 방안)

  • Jang, Jeong-hoon;Kim, Sung-su;Lee, Ji-hyun
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.2
    • /
    • pp.13-24
    • /
    • 2022
  • As the scale of airborne system software increases, the use of OOT (Object-Oriented Technology) is increasing for functional expansion, efficient development, and code reuse, but the verification method for airborne object-oriented software is conducted from the perspective of the existing procedure-oriented program. The purpose of this paper was to analyze the characteristics of OOT and the vulnerabilities derived from the functional characteristics of OOT, and present a verification method applicable to each software development process (Design, Coding and Testing) to ensure the functional safety integrity of aviation software to which OOT is applied. Additionally, we analyzed the meaning of the static analysis results among the step-by-step verification measures proposed by applying LDRA, a static analysis automation tool, to PX4, an open source used to implement flight control software.

Permeability Characteristics of Geosynthetics Vertical Barrier Connections for the Prevention of Contaminants Diffusion (오염물질 확산방지를 위한 토목섬유 연직차수벽 연결부의 투수성능 평가)

  • Park, Jeong Jun
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Purpose: In this study, we used hydrophilic waterstop used in geosynthetics vertical barrier system to evaluate the performance of impermeability under sealing conditions. Method: ASTM D5887 and ASTM D6766 were applied to determine the capability of the connection during the geosynthetics vertical barrier system. Hydrophilic waterstop was saturated in each solution and the weight, thickness, and volume changes were analyzed over elapsed time. Hydrophilic waterstop was installed at the geosynthetics vertical barrier system connection to evaluate the permeability characteristics. Results: As the expansion reaction time of hydrophilic waterstop increased relatively under saline conditions, the decrease in permeability also showed a smaller decrease in fresh water. Furthermore, the method of engagement of the geosynthetics vertical barrier system showed somewhat better performance of the impermeability due to the large pressure resistance caused by the roll joint type than interlock type. Conclusion: In urban pollutants, which can estimate the outflow of pollutants such as oil storage facilities and industrial complexes, proactive response technologies that can prevent the contaminant diffusion can significantly reduce the damage.

A Study of Port Facility Maintenance and Decision-making Support System Development (항만시설 유지관리 의사결정 지원 시스템 개발 연구)

  • Na, Yong Hyoun;Park, Mi Yeon;Choi, Doo Young
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.2
    • /
    • pp.290-305
    • /
    • 2022
  • Purpose: Currently, port facility informatization technology is focused on the planning and design phases, so the necessity of research and technology development on the port facility maintenance system based on life cycle-level information is emphasized. Method: Based on the maintenance history data of port facilities and facility operation information, from the perspective of the life cycle of port facilities, the system is configured to enable maintenance decisions for port facilities through analysis of aging patterns, performance degradation prediction models, and risk analysis and proposed a method of expressing information. Result: A function was developed to simultaneously display the SOC performance evaluation and the comprehensive performance evaluation developed in this study, so that mid-to long-term maintenance and reinforcement and facility expansion can be applied and comparatively judged. Conclusion: The integrated port performance system developed in this study induces and supports the risk minimization of port facility management by proactively promoting appropriate repair and reinforcement measures through historical and operational information on port facilities.