The objective of this study is to investigate the stability behavior of steel cable-stayed bridges by comparing the buckling loads obtained by means of finite element methods with eigen-solver. In recent days, cable-stayed bridges dramatically attract engineers' attention due to their structural characteristics and aesthetics. They require a number of design parameters and present a high degree of static indetermination, especially for long span bridges. Cable-stayed bridges exhibit several nonlinear behaviors concurrently under normal design loads due to the individual nonlinearity of substructures such as the pylons, stay cables, and bridge deck, and their interactions. The geometric nonlinearities arise mainly from large displacements of cables. Strong axial and lateral forces acting on the bridge deck and pylons cause structural nonlinear behaviors. The interaction is among the substructures. In this paper, a typical three-span steel cable-stayed bridge with a variety of design parameters has been investigated. The numerical results indicate that the design parameters such as the ratio of $L_1/L$ and $I_p/I_b$ are important for the structural behavior, where $L_1$ is the main span length, L is the total span length of the bridge, $I_p$ is the moment of inertia of the pylon, and $I_b$ is the moment of inertia of the bridge deck. When the ratio $I_p/I_b$ increases, the critical load decreases due to the lack of interaction among substructures. Cable arrangements and the height of pylon are another important factors for this type of bridge in buckling analysis. According to numerical results, the bridges supported by a pylon with harp-type cable arrangement have higher critical loads than the bridges supported by a pylon with fan-type cable arrangement. On contrary, the shape of the pylon does not significantly affect the critical load of this type of bridge. All numerical results have been non-dimensionalized and presented in both tabular and graphical forms.
In the fourth industrial revolution, wireless sensor networks (WSNs) are an important element of collecting and analyzing data in a variety of environments without human intervention. This sensor network is greatly affected by topology and routing protocols. Routing protocols, which affect energy consumption, are executed after deploying sensor nodes. Once built, they are difficult to change. Before the WSN is deployed, a routing protocol is carefully selected in view of various environments and the performance of the protocol is evaluated. In this paper, we propose a model to simulate multiple routing protocols using a discrete event system specification (DEVS). The DEVS-based proposed model simulates various situations without changes and structures of the its model as algorithms of the routing protocols are implemented in its coordinators model. To verify normal behaviors of the proposed model, the number of report delivery and the energy consumption of the sensor network were compared using representative protocols LEACH and Dijkstra. As a result, it was confirmed that the proposed model executes normally in both routing protocols.
Kim, Nam-Ho;Sadra, Ali;Park, Hee-Young;Oh, Sung-Min;Chun, Jerold;Yoon, Jeong Kyo;Huh, Sung-Oh
Molecules and Cells
/
v.42
no.2
/
pp.123-134
/
2019
Lysophosphatidic acid (LPA) is an endogenous lysophospholipid with signaling properties outside of the cell and it signals through specific G protein-coupled receptors, known as $LPA_{1-6}$. For one of its receptors, $LPA_1$ (gene name Lpar1), details on the cis-acting elements for transcriptional control have not been defined. Using 5'RACE analysis, we report the identification of an alternative transcription start site of mouse Lpar1 and characterize approximately 3,500 bp of non-coding flanking sequence 5' of mouse Lpar1 gene for promoter activity. Transient transfection of cells derived from mouse neocortical neuroblasts with constructs from the 5' regions of mouse Lpar1 gene revealed the region between -248 to +225 serving as the basal promoter for Lpar1. This region also lacks a TATA box. For the region between -761 to -248, a negative regulatory element affected the basal expression of Lpar1. This region has three E-box sequences and mutagenesis of these E-boxes, followed by transient expression, demonstrated that two of the E-boxes act as negative modulators of Lpar1. One of these E-box sequences bound the HeLa E-box binding protein (HEB), and modulation of HEB levels in the transfected cells regulated the transcription of the reporter gene. Based on our data, we propose that HEB may be required for a proper regulation of Lpar1 expression in the embryonic neocortical neuroblast cells and to affect its function in both normal brain development and disease settings.
Modern family culture manifests various different social phenomenon due to shifts caused by increased societal response to industrialization in our country. It is noted that as our lifestyle patterns have shifted from being work-oriented to family-oriented, by focusing on the trend where there is an increase in families enjoying hobby and leisure activities together and where families go shopping together, I attempted to propose various different family-look' designs. In this research study we designed and planned family normal clothes designs that are required and desired for family gatherings and family events, and these designed were produced using 3D virtual clothing design software technology. The research method used the formative features of natural plants and textiles containing a symbolic motif as an element of design, and the creation of family formal clothes were designed and planned based on the method. The development of family formal clothes designs was implemented using CLO 3D virtual clothing design software. Because utilizing 3D virtual clothing design software enables prototyping various types of designs, silhouettes, fabrics and textiles, and color schemes etc. in a short amount of time, it was possible to utilize an advantage from using the software as leveraged to propose designs with a strong symbolic motif and symbolism . Also, by confirming and examining the strengths and weaknesses of the design process when using CLO 3D, It can improve the utilization of IT technologies, and this study aims to provide that efficiency.
The biaxial failure mechanism of transversally bedding concrete layers was numerically simulated using a sophisticated two-dimensional discrete element method (DEM) implemented in the particle flow code (PFC2D). This numerical modelling code was first calibrated by uniaxial compression and Brazilian testing results to ensure the conformity of the simulated numerical model's response. Secondly, 21 rectangular models with dimension of $54mm{\times}108mm$ were built. Each model contains two transversely bedding layers. The first bedding layer has low mechanical properties, less than mechanical properties of intact material, and second bedding layer has high mechanical properties, more than mechanical properties of intact material. The angle of first bedding layer, with weak mechanical properties, related to loading direction was $0^{\circ}$, $15^{\circ}$, $30^{\circ}$, $45^{\circ}$, $60^{\circ}$, $75^{\circ}$ and $90^{\circ}$ while the angle of second layer, with high mechanical properties, related to loading direction was $90^{\circ}$, $105^{\circ}$, $120^{\circ}$, $135^{\circ}$, $150^{\circ}$, $160^{\circ}$ and $180^{\circ}$. Is to be note that the angle between bedding layer was $90^{\circ}$ in all bedding configurations. Also, three different pairs of the thickness were chosen in models, i.e., 5 mm/10 mm, 10 mm/10 mm and 20 mm/10 mm. The result shows that in all configurations, shear cracks develop between the weaker bedding layers. Shear cracks angel related to normal load change from $0^{\circ}$ to $90^{\circ}$ with increment of $15^{\circ}$. Numbers of shear cracks are constant by increasing the bedding thickness. It's to be noted that in some configuration, tensile cracks develop through the intact area of material model. There is not any failure in direction of bedding plane interface with higher strength.
Huang, Zhenyu;Huang, Xinxiong;Li, Weiwen;Mei, Liu;Liew, J.Y. Richard
Steel and Composite Structures
/
v.31
no.1
/
pp.69-83
/
2019
This paper investigates the structural behavior of very high strength concrete encased steel composite columns via combined experimental and analytical study. The experimental programme examines stub composite columns under pure compression and eccentric compression. The experimental results show that the high strength encased concrete composite column exhibits brittle post peak behavior and low ductility but has acceptable compressive resistance. The high strength concrete encased composite column subjected to early spalling and initial flexural cracking due to its brittle nature that may degrade the stiffness and ultimate resistance. The analytical study compares the current code methods (ACI 318, Eurocode 4, AISC 360 and Chinese JGJ 138) in predicting the compressive resistance of the high strength concrete encased composite columns to verify the accuracy. The plastic design resistance may not be fully achieved. A database including the concrete encased composite column under concentered and eccentric compression is established to verify the predictions using the proposed elastic, elastoplastic and plastic methods. Image-oriented intelligent recognition tool-based fiber element method is programmed to predict the load resistances. It is found that the plastic method can give an accurate prediction of the load resistance for the encased composite column using normal strength concrete (20-60 MPa) while the elastoplastic method provides reasonably conservative predictions for the encased composite column using high strength concrete (60-120 MPa).
Stress analysis of bottom-hole rock has to be considered with much care to further understand rock fragmentation mechanism and high penetration rate. This original study establishes a fully coupled simulation model and explores the effects of overburden pressure, horizontal in-situ stresses, drilling mud pressure, pore pressure and temperature on the stress distribution in bottom-hole rock. The research finds that in air drilling, as the well depth increases, the more easily the bottom-hole rock is to be broken. Moreover, the mud pressure has a great effect on the bottom-hole rock. The bigger the mud pressure is, the more difficult to break the bottom-hole rock is. Furthermore, the maximum principal stress of the bottom-hole increases as the mud pressure, well depth and temperature difference increase. The bottom-hole rock can be divided into three main regions according to the stress state, namely a) three directions tensile area, b) two directions compression areas and c) three directions compression area, which are classified as a) easy, b) normal and c) hard, respectively, for the corresponding fragmentation degree of difficulty. The main contribution of this paper is that it presents for the first time a thorough study of the effect of related factors, including stress distribution and temperature, on the bottom-hole rock fracture rather than the well wall, using a thermo-poroelastoplasticity model.
Yaylaci, Murat;Adiyaman, Gokhan;Oner, Erdal;Birinci, Ahmet
Computers and Concrete
/
v.27
no.3
/
pp.199-210
/
2021
The aim of this paper was to examine the continuous and discontinuous contact problems between the functionally graded (FG) layer pressed with a uniformly distributed load and homogeneous half plane using an analytical method and FEM. The FG layer is made of non-homogeneous material with an isotropic stress-strain law with exponentially varying properties. It is assumed that the contact at the FG layer-half plane interface is frictionless, and only the normal tractions can be transmitted along the contacted regions. The body force of the FG layer is considered in the study. The FG layer was positioned on the homogeneous half plane without any bonds. Thus, if the external load was smaller than a certain critical value, the contact between the FG layer and half plane would be continuous. However, when the external load exceeded the critical value, there was a separation between the FG layer and half plane on the finite region, as discontinuous contact. Therefore, there have been some steps taken in this study. Firstly, an analytical solution for continuous and discontinuous contact cases of the problem has been realized using the theory of elasticity and Fourier integral transform techniques. Then, the problem modeled and two-dimensional analysis was carried out by using ANSYS package program based on FEM. Numerical results for initial separation distance and contact stress distributions between the FG layer and homogeneous half plane for continuous contact case; the start and end points of separation and contact stress distributions between the FG layer and homogeneous half plane for discontinuous contact case were provided for various dimensionless quantities including material inhomogeneity, distributed load width, the shear module ratio and load factor for both methods. The results obtained using FEM were compared with the results found using analytical formulation. It was found that the results obtained from analytical formulation were in perfect agreement with the FEM study.
Shear connectors are required to build composite (concrete and steel) beams. They are placed at the interface of concrete and steel to transfer shear and normal forces between two structural components. Such composite beams are sensitive to provide structural integrity when exposed to fire as they loss strength, stiffness, and ductility at elevated temperature. The present study is designed to investigate the shear resistance and the failure modes of the headed stud shear connectors at fire exposure and post-fire exposure. The study includes ordinary concrete and concrete with carbon nanotubes (CNTs) to build composite (concrete-steel) beams with structural steel. Experimental push tests were conducted on composite beams at ambient and elevated temperatures, such as 200, 400 & 600℃. Moreover, push tests were performed on the composite beams after being exposed to 200, 400 & 600℃. Push test results illustrated the reduction of ultimate shear capacity and stiffness of headed stud shear connectors as the temperature increased. Although similar values of ultimate shear were obtained for the headed stud connectors in both ordinary and CNT concrete, the CNT modified concrete reduced the concrete spalling and cracking compared to ordinary concrete and was observed to be effective at temperatures greater than 400℃. All specimens showed a lower shear resistance at fire exposures compared to the corresponding post-fire exposures. Moreover, numerical simulation by Finite Element (FE) analyses were carried out at ambient temperature and at fire conditions. The FE analysis results show a good agreement with the experimental results. In the experimental studies, failure of all specimens occurred due to shear failure of headed stud, which was later validated by FE analyses using ABAQUS.
KSII Transactions on Internet and Information Systems (TIIS)
/
v.15
no.12
/
pp.4531-4544
/
2021
Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.