• 제목/요약/키워드: Infrastructure as Code

검색결과 98건 처리시간 0.032초

Equations to evaluate fundamental period of vibration of buildings in seismic analysis

  • Sangamnerkar, Prakash;Dubey, S.K.
    • Structural Monitoring and Maintenance
    • /
    • 제4권4호
    • /
    • pp.351-364
    • /
    • 2017
  • In this study effects of various parameters like a number of bays, the stiffness of the structure along with the height of the structure was examined. The fundamental period of vibration T of the building is an important parameter for evaluation of seismic base shear. Empirical equations which are given in the Indian seismic code for the calculation of the fundamental period of a framed structure, primarily as a function of height, and do not consider the effect of number of bays and stiffness of the structure. Building periods predicted by these expressions are widely used in practice, although it has been observed that there is scope for further improvement in these equations since the height alone is inadequate to explain the period variability. The aim of this study is to find the effects of a number of bays in both the directions, the stiffness of the structure and propose a new period equation which incorporates a number of bays, plan area, stiffness along with the height of the structure.

공항 수.배전 설비 표준화 (Standardization for receive and supply of electric power facility of airport)

  • 최홍규;원진희;송영주;조계술
    • 한국조명전기설비학회:학술대회논문집
    • /
    • 한국조명전기설비학회 2003년도 학술대회논문집
    • /
    • pp.349-354
    • /
    • 2003
  • Airport facility is infrastructure that become external creditworthiness and linear measure of country competitive power. Among them, receive and supply of electric power facility of airport is very important in peculiarity, trustability, safety side of airport. In this parer, sorted domestic airline as 4 classes by code to accomplish standardization for receive and supply of electric power facility of airport. And established justice and coverage about receive and supply of electric power facility using without any standard present and analyze problem for receive and supply of electric power facility of existing airport and presents standard. Finally, present standard single-line diagram by airport grade and system grade standard of receive and supply of electric power facility of airport.

  • PDF

KubEVC-Agent : 머신러닝 추론 엣지 컴퓨팅 클러스터 관리 자동화 시스템 (KubEVC-Agent : Kubernetes Edge Vision Cluster Agent for Optimal DNN Inference and Operation)

  • 송무현;김규민;문지훈;김유림;남채원;박종빈;이경용
    • 대한임베디드공학회논문지
    • /
    • 제18권6호
    • /
    • pp.293-301
    • /
    • 2023
  • With the advancement of artificial intelligence and its various use cases, accessing it through edge computing environments is gaining traction. However, due to the nature of edge computing environments, efficient management and optimization of clusters distributed in different geographical locations is considered a major challenge. To address these issues, this paper proposes a centralization and automation tool called KubEVC-Agent based on Kubernetes. KubEVC-Agent centralizes the deployment, operation, and management of edge clusters and presents a use case of the data transformation for optimizing intra-cluster communication. This paper describes the components of KubEVC-Agent, its working principle, and experimental results to verify its effectiveness.

Newmark 기반 변형해석에 의한 필댐의 내진저항성 연구 (A Study on the Seismic Resistance of Fill-dams by Newmark-type Deformation Analysis)

  • 박동순
    • 한국지진공학회논문집
    • /
    • 제18권4호
    • /
    • pp.161-170
    • /
    • 2014
  • Newmark-type deformation analysis has rarely been done in Korea due to the popularity of simple pseudo-static limit equilibrium analysis and detailed time-history FE/FD dynamic analysis. However, the Korean seismic dam design code updated in 2011 prescribes Newmark-type deformation analysis as a major dynamic analysis method for the seismic evaluation of fill dams. In addition, a design PGA for dynamic analysis is significantly increased in the code. This paper aims to study the seismic evaluation of four existing large fill dams through advanced FEM/Newmark-type deformation analyses for the artificial earthquake time histories with the design PGA of 0.22g. Dynamic soil properties obtained from in-situ geo-physical surveys are applied as input parameters. For the FEM/Newmark analyses, sensitivity analyses are performed to study the effects of input PGA and $G_{max}$ of shell zone on the Newmark deformation. As a result, in terms of deformation, four fill dams are proved to be reasonably safe under the PGA of 0.22g with yield coefficients of 0.136 to 0.187, which are highly resistant for extreme events. Sensitivity analysis as a function of PGA shows that $PGA_{30cm}$ (a limiting PGA to cause the 30 cm of Newmark permanent displacement on the critical slip surface) is a good indicator for seismic safety check. CFRD shows a higher seismic resistance than ECRD. Another sensitivity analysis shows that $G_{max}$ per depth does not significantly affect the site response characteristics, however lower $G_{max}$ profile causes larger Newmark deformation. Through this study, it is proved that the amplification of ground motion within the sliding mass and the location of critical slip surface are the dominant factors governing permanent displacements.

VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜 (A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks)

  • 김성훈;김범한;이동훈
    • 정보보호학회논문지
    • /
    • 제18권5호
    • /
    • pp.115-124
    • /
    • 2008
  • 차량 네트워크(Vehicular Networks)환경에서 차량이 주행할 때 네트워크 기반 구조와 안전하게 통신을 하기 위해서는 상호간의 신원을 확인할 수 있어야 하며, 차량과 네트워크 기반 구조와의 통신 메시지로부터 차량의 위치와 아이디가 노출되지 않아야 한다. 반면 사고가 발생했을 경우 수사기관에서는 사고의 근원을 추적할 수 있어야 한다. 또한 차량 운행 시 차량은 하나의 RSU(Road Side Unit)와 통신하는 것이 아니라 여러 개의 RSU와 통신해야 하므로 위의 성질을 만족시키면서 차량과 RSU 사이의 통신 횟수와 연산량을 줄이는 것 또한 중요한 문제이다. 본 논문에서는 차량 네트워크 환경에서 차량과 RSU 간 상호인증 프로토콜을 수행할 때 익명아이디(pseudonym)와 MAC 체인(Massage Authentication Code chain)을 이용하여 차량의 프라이버시를 보호하면서 추적성을 제공할 수 있는 효율적인 상호 인증 프로토콜을 제안한다. 또한 제안하는 프로토콜에서는 익명아이디를 MAC 체인을 이용하여 일회성으로 구성하기 때문에, 익명아이디를 별도로 관리할 필요성이 없다.

Confinement models for high strength short square and rectangular concrete-filled steel tubular columns

  • Aslani, Farhad;Uy, Brian;Wang, Ziwen;Patel, Vipul
    • Steel and Composite Structures
    • /
    • 제22권5호
    • /
    • pp.937-974
    • /
    • 2016
  • While extensive efforts have been made in the past to develop finite element models (FEMs) for concrete-filled steel tubular columns (CFSTCs), these models may not be suitable to be used in some cases, especially in view of the utilisation of high strength steel and high strength concrete. A method is presented herein to predict the complete stress-strain curve of concrete subjected to tri-axial compressive stresses caused by axial load coupled with lateral pressure due to the confinement action in square and rectangular CFSTCs with normal and high strength materials. To evaluate the lateral pressure exerted on the concrete in square and rectangular shaped columns, an accurately developed FEM which incorporates the effects of initial local imperfections and residual stresses using the commercial program ABAQUS is adopted. Subsequently, an extensive parametric study is conducted herein to propose an empirical equation for the maximum average lateral pressure, which depends on the material and geometric properties of the columns. The analysis parameters include the concrete compressive strength ($f^{\prime}_c=20-110N/mm^2$), steel yield strength ($f_y=220-850N/mm^2$), width-to-thickness (B/t) ratios in the range of 15-52, as well as the length-to-width (L/B) ratios in the range of 2-4. The predictions of the behaviour, ultimate axial strengths, and failure modes are compared with the available experimental results to verify the accuracy of the models developed. Furthermore, a design model is proposed for short square and rectangular CFSTCs. Additionally, comparisons with the prediction of axial load capacity by using the proposed design model, Australian Standard and Eurocode 4 code provisions for box composite columns are carried out.

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • 통합자연과학논문집
    • /
    • 제14권4호
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

기기 간 직접통신을 위한 모바일 어플리케이션 및 서비스 디스커버리 프로토콜 (Mobile Application and Service Discovery Protocol for Device-to-Device Communication)

  • 최계원;이현;장성철
    • 한국통신학회논문지
    • /
    • 제38A권10호
    • /
    • pp.908-917
    • /
    • 2013
  • 본 논문에서는 기기 간 직접(device-to-device) 통신 시스템에서 근접한 디바이스의 모바일 어플리케이션 및 서비스를 발견하기 위한 디스커버리 프로토콜을 제안한다. 기기 간 직접통신 기술을 기반으로 모바일 소셜네트워크, 모바일 마케팅 등의 근접 기반 어플리케이션을 실현할 수 있다. 이를 위해 우선적으로 주변에 있는 수많은 디바이스에서 원하는 어플리케이션을 찾아내는 디스커버리 프로토콜의 설계가 필수적이다. 기반 시설이 없는 에드혹 망에서 디스커버리 프로토콜을 구현하기 위해서는 디바이스 내부의 어플리케이션 정보를 축약해서 디스커버리 코드를 생성하고 이를 주기적으로 방송하는 방법을 쓸 수 있다. 본 논문에서는 해시함수 및 블룸필터(Bloom filter)를 이용하여 디스커버리 프로토콜을 설계하고 이의 성능을 수학적으로 분석한다.

Design Conditions for Dolphin Berth by Tanker Fleet Analysis

  • Kang, Seok-Jin;Lee, Joong-Woo;Lee, Dong-Hyun;Kim, Hee-Jae
    • 한국항해항만학회지
    • /
    • 제37권6호
    • /
    • pp.647-653
    • /
    • 2013
  • Energy acquisition due to the increase of oil price is one of the most important issues and policy for most countries. Various tankers have been built in the world and sent to the trade market. It is necessary to build the port infrastructure and facilities to give them proper services such as mooring, packing, storing, and transshipment, etc. However, the domestic guidelines or standards for design and construction for the dolphin berth among these facilities are out of date and do not meet the recent trend of tanker types. Therefore, it requires amendment on the guidelines or standards. In this study, a detailed analysis of the tanker fleet, covering 8,000 ships under operation and order to build, is made to estimate the proper PBL(Parallel Body Length) of each tanker class. After discussion and comparison on the dolphin berth design and construction codes of various countries, those are the leading countries of tanker operation and management, suggestion was made to amend on the design code. The referred codes are of Korea, Japan, UK, USA, and Canada. The analysis of tanker fleet shows the PBL as 0.45L under the normal ballast condition. In order to verify the deduced amendment on the domestic design code for dolphin berth, it was selected one of the domestic dolphin berth, located at the Yeosu oil terminal, which is almost completed to construct. The design criteria and expected tankers to moor in that terminal were analyzed and the appropriateness and countermeasure for deficiency were summarized.

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.