• Title/Summary/Keyword: Normal element

Search Result 1,212, Processing Time 0.027 seconds

Stability analysis of steel cable-stayed bridges

  • Tang, Chia-Chih;Shu, Hung-Shan;Wang, Yang-Cheng
    • Structural Engineering and Mechanics
    • /
    • v.11 no.1
    • /
    • pp.35-48
    • /
    • 2001
  • The objective of this study is to investigate the stability behavior of steel cable-stayed bridges by comparing the buckling loads obtained by means of finite element methods with eigen-solver. In recent days, cable-stayed bridges dramatically attract engineers' attention due to their structural characteristics and aesthetics. They require a number of design parameters and present a high degree of static indetermination, especially for long span bridges. Cable-stayed bridges exhibit several nonlinear behaviors concurrently under normal design loads due to the individual nonlinearity of substructures such as the pylons, stay cables, and bridge deck, and their interactions. The geometric nonlinearities arise mainly from large displacements of cables. Strong axial and lateral forces acting on the bridge deck and pylons cause structural nonlinear behaviors. The interaction is among the substructures. In this paper, a typical three-span steel cable-stayed bridge with a variety of design parameters has been investigated. The numerical results indicate that the design parameters such as the ratio of $L_1/L$ and $I_p/I_b$ are important for the structural behavior, where $L_1$ is the main span length, L is the total span length of the bridge, $I_p$ is the moment of inertia of the pylon, and $I_b$ is the moment of inertia of the bridge deck. When the ratio $I_p/I_b$ increases, the critical load decreases due to the lack of interaction among substructures. Cable arrangements and the height of pylon are another important factors for this type of bridge in buckling analysis. According to numerical results, the bridges supported by a pylon with harp-type cable arrangement have higher critical loads than the bridges supported by a pylon with fan-type cable arrangement. On contrary, the shape of the pylon does not significantly affect the critical load of this type of bridge. All numerical results have been non-dimensionalized and presented in both tabular and graphical forms.

Modeling and Simulation for using Multiple Routing Protocols in Wireless Sensor Networks (무선 센서 네트워크에서 다중 라우팅 프로토콜 사용을 위한 모델링과 시뮬레이션)

  • Nam, Su Man;Cho, Tae Ho;Kim, Hyung Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.73-82
    • /
    • 2020
  • In the fourth industrial revolution, wireless sensor networks (WSNs) are an important element of collecting and analyzing data in a variety of environments without human intervention. This sensor network is greatly affected by topology and routing protocols. Routing protocols, which affect energy consumption, are executed after deploying sensor nodes. Once built, they are difficult to change. Before the WSN is deployed, a routing protocol is carefully selected in view of various environments and the performance of the protocol is evaluated. In this paper, we propose a model to simulate multiple routing protocols using a discrete event system specification (DEVS). The DEVS-based proposed model simulates various situations without changes and structures of the its model as algorithms of the routing protocols are implemented in its coordinators model. To verify normal behaviors of the proposed model, the number of report delivery and the energy consumption of the sensor network were compared using representative protocols LEACH and Dijkstra. As a result, it was confirmed that the proposed model executes normally in both routing protocols.

HeLa E-Box Binding Protein, HEB, Inhibits Promoter Activity of the Lysophosphatidic Acid Receptor Gene Lpar1 in Neocortical Neuroblast Cells

  • Kim, Nam-Ho;Sadra, Ali;Park, Hee-Young;Oh, Sung-Min;Chun, Jerold;Yoon, Jeong Kyo;Huh, Sung-Oh
    • Molecules and Cells
    • /
    • v.42 no.2
    • /
    • pp.123-134
    • /
    • 2019
  • Lysophosphatidic acid (LPA) is an endogenous lysophospholipid with signaling properties outside of the cell and it signals through specific G protein-coupled receptors, known as $LPA_{1-6}$. For one of its receptors, $LPA_1$ (gene name Lpar1), details on the cis-acting elements for transcriptional control have not been defined. Using 5'RACE analysis, we report the identification of an alternative transcription start site of mouse Lpar1 and characterize approximately 3,500 bp of non-coding flanking sequence 5' of mouse Lpar1 gene for promoter activity. Transient transfection of cells derived from mouse neocortical neuroblasts with constructs from the 5' regions of mouse Lpar1 gene revealed the region between -248 to +225 serving as the basal promoter for Lpar1. This region also lacks a TATA box. For the region between -761 to -248, a negative regulatory element affected the basal expression of Lpar1. This region has three E-box sequences and mutagenesis of these E-boxes, followed by transient expression, demonstrated that two of the E-boxes act as negative modulators of Lpar1. One of these E-box sequences bound the HeLa E-box binding protein (HEB), and modulation of HEB levels in the transfected cells regulated the transcription of the reporter gene. Based on our data, we propose that HEB may be required for a proper regulation of Lpar1 expression in the embryonic neocortical neuroblast cells and to affect its function in both normal brain development and disease settings.

The Design Development of Family Formal Clothes Using 3D Virtual Clothing Software (3D 가상의상 소프트웨어를 활용한 가족예복 디자인 개발)

  • Lee, Nayeon;Sung, O kjin;Kim, Sookjin
    • Journal of Fashion Business
    • /
    • v.23 no.3
    • /
    • pp.35-50
    • /
    • 2019
  • Modern family culture manifests various different social phenomenon due to shifts caused by increased societal response to industrialization in our country. It is noted that as our lifestyle patterns have shifted from being work-oriented to family-oriented, by focusing on the trend where there is an increase in families enjoying hobby and leisure activities together and where families go shopping together, I attempted to propose various different family-look' designs. In this research study we designed and planned family normal clothes designs that are required and desired for family gatherings and family events, and these designed were produced using 3D virtual clothing design software technology. The research method used the formative features of natural plants and textiles containing a symbolic motif as an element of design, and the creation of family formal clothes were designed and planned based on the method. The development of family formal clothes designs was implemented using CLO 3D virtual clothing design software. Because utilizing 3D virtual clothing design software enables prototyping various types of designs, silhouettes, fabrics and textiles, and color schemes etc. in a short amount of time, it was possible to utilize an advantage from using the software as leveraged to propose designs with a strong symbolic motif and symbolism . Also, by confirming and examining the strengths and weaknesses of the design process when using CLO 3D, It can improve the utilization of IT technologies, and this study aims to provide that efficiency.

Effect of transversely bedding layer on the biaxial failure mechanism of brittle materials

  • Haeri, Hadi;Sarfarazi, Vahab;Zhu, Zheming;Moosavi, Ehsan
    • Structural Engineering and Mechanics
    • /
    • v.69 no.1
    • /
    • pp.11-20
    • /
    • 2019
  • The biaxial failure mechanism of transversally bedding concrete layers was numerically simulated using a sophisticated two-dimensional discrete element method (DEM) implemented in the particle flow code (PFC2D). This numerical modelling code was first calibrated by uniaxial compression and Brazilian testing results to ensure the conformity of the simulated numerical model's response. Secondly, 21 rectangular models with dimension of $54mm{\times}108mm$ were built. Each model contains two transversely bedding layers. The first bedding layer has low mechanical properties, less than mechanical properties of intact material, and second bedding layer has high mechanical properties, more than mechanical properties of intact material. The angle of first bedding layer, with weak mechanical properties, related to loading direction was $0^{\circ}$, $15^{\circ}$, $30^{\circ}$, $45^{\circ}$, $60^{\circ}$, $75^{\circ}$ and $90^{\circ}$ while the angle of second layer, with high mechanical properties, related to loading direction was $90^{\circ}$, $105^{\circ}$, $120^{\circ}$, $135^{\circ}$, $150^{\circ}$, $160^{\circ}$ and $180^{\circ}$. Is to be note that the angle between bedding layer was $90^{\circ}$ in all bedding configurations. Also, three different pairs of the thickness were chosen in models, i.e., 5 mm/10 mm, 10 mm/10 mm and 20 mm/10 mm. The result shows that in all configurations, shear cracks develop between the weaker bedding layers. Shear cracks angel related to normal load change from $0^{\circ}$ to $90^{\circ}$ with increment of $15^{\circ}$. Numbers of shear cracks are constant by increasing the bedding thickness. It's to be noted that in some configuration, tensile cracks develop through the intact area of material model. There is not any failure in direction of bedding plane interface with higher strength.

Experimental behavior of VHSC encased composite stub column under compression and end moment

  • Huang, Zhenyu;Huang, Xinxiong;Li, Weiwen;Mei, Liu;Liew, J.Y. Richard
    • Steel and Composite Structures
    • /
    • v.31 no.1
    • /
    • pp.69-83
    • /
    • 2019
  • This paper investigates the structural behavior of very high strength concrete encased steel composite columns via combined experimental and analytical study. The experimental programme examines stub composite columns under pure compression and eccentric compression. The experimental results show that the high strength encased concrete composite column exhibits brittle post peak behavior and low ductility but has acceptable compressive resistance. The high strength concrete encased composite column subjected to early spalling and initial flexural cracking due to its brittle nature that may degrade the stiffness and ultimate resistance. The analytical study compares the current code methods (ACI 318, Eurocode 4, AISC 360 and Chinese JGJ 138) in predicting the compressive resistance of the high strength concrete encased composite columns to verify the accuracy. The plastic design resistance may not be fully achieved. A database including the concrete encased composite column under concentered and eccentric compression is established to verify the predictions using the proposed elastic, elastoplastic and plastic methods. Image-oriented intelligent recognition tool-based fiber element method is programmed to predict the load resistances. It is found that the plastic method can give an accurate prediction of the load resistance for the encased composite column using normal strength concrete (20-60 MPa) while the elastoplastic method provides reasonably conservative predictions for the encased composite column using high strength concrete (60-120 MPa).

Numerical modelling of bottom-hole rock in underbalanced drilling using thermo-poroelastoplasticity model

  • Liu, Weiji;Zhou, Yunlai;Zhu, Xiaohua;Meng, Xiannan;Liu, Mei;Wahab, Magd Abdel
    • Structural Engineering and Mechanics
    • /
    • v.69 no.5
    • /
    • pp.537-545
    • /
    • 2019
  • Stress analysis of bottom-hole rock has to be considered with much care to further understand rock fragmentation mechanism and high penetration rate. This original study establishes a fully coupled simulation model and explores the effects of overburden pressure, horizontal in-situ stresses, drilling mud pressure, pore pressure and temperature on the stress distribution in bottom-hole rock. The research finds that in air drilling, as the well depth increases, the more easily the bottom-hole rock is to be broken. Moreover, the mud pressure has a great effect on the bottom-hole rock. The bigger the mud pressure is, the more difficult to break the bottom-hole rock is. Furthermore, the maximum principal stress of the bottom-hole increases as the mud pressure, well depth and temperature difference increase. The bottom-hole rock can be divided into three main regions according to the stress state, namely a) three directions tensile area, b) two directions compression areas and c) three directions compression area, which are classified as a) easy, b) normal and c) hard, respectively, for the corresponding fragmentation degree of difficulty. The main contribution of this paper is that it presents for the first time a thorough study of the effect of related factors, including stress distribution and temperature, on the bottom-hole rock fracture rather than the well wall, using a thermo-poroelastoplasticity model.

Investigation of continuous and discontinuous contact cases in the contact mechanics of graded materials using analytical method and FEM

  • Yaylaci, Murat;Adiyaman, Gokhan;Oner, Erdal;Birinci, Ahmet
    • Computers and Concrete
    • /
    • v.27 no.3
    • /
    • pp.199-210
    • /
    • 2021
  • The aim of this paper was to examine the continuous and discontinuous contact problems between the functionally graded (FG) layer pressed with a uniformly distributed load and homogeneous half plane using an analytical method and FEM. The FG layer is made of non-homogeneous material with an isotropic stress-strain law with exponentially varying properties. It is assumed that the contact at the FG layer-half plane interface is frictionless, and only the normal tractions can be transmitted along the contacted regions. The body force of the FG layer is considered in the study. The FG layer was positioned on the homogeneous half plane without any bonds. Thus, if the external load was smaller than a certain critical value, the contact between the FG layer and half plane would be continuous. However, when the external load exceeded the critical value, there was a separation between the FG layer and half plane on the finite region, as discontinuous contact. Therefore, there have been some steps taken in this study. Firstly, an analytical solution for continuous and discontinuous contact cases of the problem has been realized using the theory of elasticity and Fourier integral transform techniques. Then, the problem modeled and two-dimensional analysis was carried out by using ANSYS package program based on FEM. Numerical results for initial separation distance and contact stress distributions between the FG layer and homogeneous half plane for continuous contact case; the start and end points of separation and contact stress distributions between the FG layer and homogeneous half plane for discontinuous contact case were provided for various dimensionless quantities including material inhomogeneity, distributed load width, the shear module ratio and load factor for both methods. The results obtained using FEM were compared with the results found using analytical formulation. It was found that the results obtained from analytical formulation were in perfect agreement with the FEM study.

Experimental and numerical studies on the shear connectors in steel-concrete composite beams at fire and post fire exposures

  • Mirza, Olivia;Shil, Sukanta Kumer;Rashed, M.G.;Wilkins, Kathryn
    • Steel and Composite Structures
    • /
    • v.39 no.5
    • /
    • pp.529-542
    • /
    • 2021
  • Shear connectors are required to build composite (concrete and steel) beams. They are placed at the interface of concrete and steel to transfer shear and normal forces between two structural components. Such composite beams are sensitive to provide structural integrity when exposed to fire as they loss strength, stiffness, and ductility at elevated temperature. The present study is designed to investigate the shear resistance and the failure modes of the headed stud shear connectors at fire exposure and post-fire exposure. The study includes ordinary concrete and concrete with carbon nanotubes (CNTs) to build composite (concrete-steel) beams with structural steel. Experimental push tests were conducted on composite beams at ambient and elevated temperatures, such as 200, 400 & 600℃. Moreover, push tests were performed on the composite beams after being exposed to 200, 400 & 600℃. Push test results illustrated the reduction of ultimate shear capacity and stiffness of headed stud shear connectors as the temperature increased. Although similar values of ultimate shear were obtained for the headed stud connectors in both ordinary and CNT concrete, the CNT modified concrete reduced the concrete spalling and cracking compared to ordinary concrete and was observed to be effective at temperatures greater than 400℃. All specimens showed a lower shear resistance at fire exposures compared to the corresponding post-fire exposures. Moreover, numerical simulation by Finite Element (FE) analyses were carried out at ambient temperature and at fire conditions. The FE analysis results show a good agreement with the experimental results. In the experimental studies, failure of all specimens occurred due to shear failure of headed stud, which was later validated by FE analyses using ABAQUS.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.