• Title/Summary/Keyword: Paper strength

Search Result 9,626, Processing Time 0.039 seconds

Low Cycle Fatigue Life Behavior of GFRP Coated Aluminum Plates According to Layup Number (적층수에 따른 GFRP 피막 Al 평활재의 저주기 피로수명 평가)

  • Myung, Nohjun;Seo, Jihye;Lee, Eunkyun;Choi, Nak-Sam
    • Composites Research
    • /
    • v.31 no.6
    • /
    • pp.332-339
    • /
    • 2018
  • Fiber metal hybrid laminate (FML) can be used as an economic material with superior mechanical properties and light weight than conventional metal by bonding of metal and FRP. However, there are disadvantages that it is difficult to predict fracture behavior because of the large difference in properties depending on the type of fiber and lamination conditions. In this paper, we study the failure behavior of hybrid materials with laminated glass fiber reinforced plastics (GFRP, GEP118, woven type) in Al6061-T6 alloy. The Al alloys were coated with GFRP 1, 3, and 5 layers, and fracture behavior was analyzed by using a static test and a low cycle fatigue test. In the low cycle fatigue test, strain - life analysis and the total strain energy density method were used to analyze and predict the fatigue life. The Al alloy did not have tensile properties strengthening effect due to the GFRP coating. The fatigue hysteresis geometry followed the behavior of the Al alloy, the base material, regardless of the GFRP coating and number of coatings. As a result of the low cycle fatigue test, the fatigue strength was increased by the coating of GFRP, but it did not increase proportionally with the number of GFRP layers.

An Implementation of an Intelligent Access Point System Based on a Feed Forward Neural Network for Internet of Things (사물인터넷을 위한 신경망 기반의 지능형 액세스 포인트 시스템의 구현)

  • Lee, Youngchan;Lee, SoYeon;Kim, Dae-Young
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.95-104
    • /
    • 2019
  • Various kinds of devices are used for the Internet of Things (IoT) service, and IoT devices mainly use communication technology that uses the frequency of the unlicensed band. There are several types of communication technology in the unlicensed band, but WiFi is most commonly used. Devices used for IoT services vary in computing resources from devices with limited capabilities to smartphones and provide services over wireless networks such as WiFi. Most IoT devices can't perform complex operations for network control, thus they choose a WiFi access point (AP) based on signal strength. This causes a decrease in IoT service efficiency. In this paper, an intelligent AP system that can efficiently control the WiFi connection of the IoT devices is implemented. Based on the network information measured by the IoT device, the access point learns using a feed forward neural network algorithm, and predicts a network connection state to control the WiFi connection. By controlling the WiFi connection at the AP, the service efficiency of the IoT device can be improved.

Discovering the Knowledge Structure of Graphene Technology by Text Mining National R&D Projects and Newspapers (국가R&D과제와 신문에서 텍스트마이닝을 통한 그래핀 기술의 지식구조 탐색)

  • Lee, Ji-Yeon;Na, Hye-In;Lee, Byeong-Hee;Kim, Tae-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.85-99
    • /
    • 2021
  • Graphene, called the "dream material" is drawing attention as a groundbreaking new material that will lead the era of the 4th Industrial Revolution. Graphene has high strength, excellent electrical and thermal conductivity, excellent optical permeability, and excellent gas barrier properties. In this paper, as the South Korean government recently announced Green New Deal and Digital New Deal policy, we analyze graphene technology, which is also attracting attention for its application to Corona 19 biosensor, to understand its national R&D trend and knowledge structure, and to explore the possibility of its application. Firstly, 4,054 cases of national R&D project information for the last 10 years are collected from the National Science & Technology Information Service(NTIS) to analyze the trend of graphene-related R&D. Besides, projects classified as green technology are analyzed concerning the government's Green New Deal policy. Secondly, text mining analysis is conducted by collecting 500 recent graphene-related articles from e-newspapers. According to the analysis, the field with the largest number of projects was found to be high-efficiency secondary battery technology, and the proportion of total research funds was also the highest. It is expected that South Korea will lead the development of graphene technology in the future to become a world leader in diverse industries including electric vehicles, cellular phone batteries, next-generation semiconductors, 5G, and biosensors.

Axial Compression of Stub Columns for Concrete-filled Square Steel Tubes (일축 압축력을 받는 콘크리트충전 각형강관 단주의 구조적 거동)

  • Yoo, Yeong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.617-624
    • /
    • 2021
  • Concrete-filled steel tubular columns can improve the strength and deformation capacity of structures, thereby enabling the development of efficient structures. The Korean design standard (KDS41) regarding concrete-filled steel tubular structures, established by the architectural institute of Korea in 2005, was revised in 2009 and 2016. The objective was to understand the compressive strengths and deformation capacity of stub columns for concrete-filled square steel tubes under uniaxial compression and validate the KDS41's standard code for necessary corrections. Experiments were conducted on 26 specimens with parameters, such as the width-thickness ratio of cold-formed square tubes. The following values of the stub columns for concrete-filled square steel tubes were obtained: compressive strengths, relationship between the axial load and axial displacement, and failure modes. An analysis of these results enabled an understanding of the concrete-filled effect and the influence of the wide-thickness ratio. The compressive strengths of filled concrete saw a 9% increase compared to a state of uniaxial stress, which must be noted in a future edition of KDS41. After benchmarking the results regarding square steel tubes generated by cold forming to the guidelines provided by the KDS41, the KDS41's value of 2.26 for the limiting width-to-thickness ratio for the compact section was found to be inflated. With a safety concern, this paper proposes a more conservative value of 1.35.

A Comparative Study on Approximate Models and Sensitivity Analysis of Active Type DSF for Offshore Plant Float-over Installation Using Orthogonal Array Experiment (직교배열실험을 이용한 해양플랜트 플로트오버 설치 작업용 능동형 DSF의 민감도해석과 근사모델 비교연구)

  • Kim, Hun-Gwan;Song, Chang Yong
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.187-196
    • /
    • 2021
  • The paper deals with comparative study for characteristics of approximation of design space according to various approximate models and sensitivity analysis using orthogonal array experiments in structure design of active type DSF which was developed for float-over installation of offshore plant. This study aims to propose the orthogonal array experiments based design methodology which is able to efficiently explore an optimum design case and to generate the accurate approximate model. Thickness sizes of main structure member were applied to the design factors, and output responses were considered structure weight and strength performances. Quantitative effects on the output responses for each design factor were evaluated using the orthogonal array experiment. Best design case was also identified to improve the structure design with weight minimization. From the orthogonal array experiment results, various approximate models such as response surface model, Kriging model, Chebyshev orthogonal polynomial model, and radial basis function based neural network model were generated. The experiment results from orthogonal array method were validated by the approximate modeling results. It was found that the radial basis function based neural network model among the approximate models was able to approximate the design space of the active type DSF with the highest accuracy.

Structure Design Sensitivity Analysis of Active Type DSF for Offshore Plant Float-over Installation Using Design of Experiments (실험계획법을 이용한 해양플랜트 플로트오버 설치 작업용 능동형 DSF의 구조설계 민감도 해석)

  • Kim, Hun-Gwan;Song, Chang Yong;Lee, Kangsu
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.98-106
    • /
    • 2021
  • The paper deals with comparative study on sensitivity analysis using various methods regarding to design of experiments for structure design of an active type DSF (Deck support frame) that was developed for float-over installation of offshore plant. The thickness sizing variables of structure member of the active type DSF were considered the design factors. The output responses were defined from the weight and the strength performances. Various methods such as orthogonal array design, Box-Behnken design, and Latin hypercube design were applied to the comparative study. In order to evaluate the approximation performance of the design space exploration according to the design of experiments, response surface method was generated for each design of experiment, and the accuracy characteristics of the approximation were reviewed. The design enhancement results such as numerical costs, weight minimization, etc. via the design of experiment methods were compared to the results of the best design. The orthogonal array design method represented the most improved results for the structure design of the active type DSF.

The Photoautotrophic Culture System Promotes Photosynthesis and Growth of Somatic Embryo-derived Plantlets of Kalopanax septemlobus (독립영양방식 액체대량배양 시스템하에서 배양한 체세포배 유래 음나무 기내묘의 생장과 광합성)

  • Park, So-Young;Moon, Heung-Kyu;Kim, Yong-Wook
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.2
    • /
    • pp.212-217
    • /
    • 2011
  • A photoautotrophic micropropagation methodology in liquid culture medium has a number of advantages for large-scale propagation of plants. This paper describes an improved system for the mass propagation via somatic embryogenesis of the medicinal plant Kalopanax septemlobus Nakai. Somatic embryo-derived young plantlets of K. septemlobus were cultured either under heterotrophic conditions with sucrose on half-strength MS medium with $30gL^{-1}$ sucrose, under heterotrophic conditions without sucrose, or under photoautotrophic conditions (MS liquid medium without sucrose under forced aeration) for four weeks before transferring the plantlets for acclimatization. Plantlets grown under photoautotrophic conditions had more leaves, higher chlorophyll content, a higher net photosynthetic rate (NPR), and a higher survival rate. The results indicate that the photoautotrophic conditions with a forced ventilation system are effective in enhancing the growth of plantlets and the rate of net photosynthesis. The plantlets grown under photoautotrophic conditions had a high survival rate (92%) upon ex vitro transplantation. Our study shows that autotrophically produced plantlets acclimatize better and sooner upon ex vitro transplantation than conventionally cultured plants.

Video Watermarking Scheme with Adaptive Embedding in 3D-DCT domain (3D-DCT 계수를 적응적으로 이용한 비디오 워터마킹)

  • Park Hyun;Han Ji-Seok;Moon Young-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.3-12
    • /
    • 2005
  • This paper introduces a 3D perceptual model based on JND(Just Noticeable Difference) and proposes a video watermarking scheme which is perceptual approach of adaptive embedding in 3D-DCT domain. Videos are composed of consecutive frames with many similar adjacent frames. If a watermark is embedded in the period of similar frames with little motion, it can be easily noticed by human eyes. Therefore, for the transparency the watermark should be embedded into some places where motions exist and for the robustness its magnitude needs to be adjusted properly. For the transparency and the robustness, watermark based on 3D perceptual model is utilized. That is. the sensitivities from the 3D-DCT quantization are derived based on 3D perceptual model, and the sensitivities of the regions having more local motion than global motion are adjusted. Then the watermark is embedded into visually significant coefficients in proportion to the strength of motion in 3D-DCT domain. Experimental results show that the proposed scheme improves the robustness to MPEG compression and temporal attacks by about $3{\sim}9\%$, compared to the existing 3D-DCT based method. In terms of PSNR, the proposed method is similar to the existing method, but JND guarantees the transparency of watermark.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.