• Title/Summary/Keyword: Parallel Process

Search Result 1,462, Processing Time 0.033 seconds

A Numerical Study on the Progressive Brittle Failure of Rock Mass Due to Overstress (과지압으로 인한 암반의 점진적 취성파괴 과정의 수치해석적 연구)

  • Choi Young-Tae;Lee Dae-Hyuck;Lee Hee-Suk;Kim Jin-A;Lee Du-Hwa;You Kwang-Ho;Park Yeon-Jun
    • Tunnel and Underground Space
    • /
    • v.16 no.3 s.62
    • /
    • pp.259-276
    • /
    • 2006
  • In rock mass subject to high in-situ stresses, the failure process of rock is dominated by the stress-induced fractures growing parallel to the excavation boundary. When the ratio of in situ stresses compared to rock strength is greater than a certain value, progressive brittle failure which is characterized by popping and spatting of rock debris occurs due to stress concentration. Traditional constitutive model like Mohr-Coulomb usually assume that the normal stress dependent frictional strength component and the cohesion strength component are constant, therefore modelling progressive brittle failure will be very difficult. In this study, a series of numerical analyses were conducted for surrounding rock mass near crude oil storage cavern using CW-FS model which was known to be efficient for modelling brittle failure and the results were compared with those of linear Mohr-Coulomb model. Further analyses were performed by varying plastic shear strain limits on cohesion and internal friction angle to find the proper values which yield the matching result with the observed failure in the oil storage caverns. The obtained results showed that CW-FS model could be a proper method to characterize essential behavior of progressive brittle failure in competent rock mass.

Complement of the Interlocking Logic of ATS for Heterogenous Railway Signaling Systems (이종 철도신호시스템을 위한 기존 자동열차정지 연동로직의 보완)

  • Jeong, Rag-Gyo;Kim, Baek-Hyun;Kang, Seok-Won;Byun, Yeun-Sub;Park, Geon-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.702-708
    • /
    • 2016
  • The railway signaling system has evolved to maximize its safety and maintainability based on the experiences in the construction and operation of railway systems. The newly developed systems was established to cope with the changes in an operating environment. In the process of a transition to the new system, both the existing ATS (Automatic Train Stop) and new ATP/ATO (Automatic Train Protection/Automatic Train Operation) systems are operating simultaneously in parallel. In this situation, modifications of the conditions of the interlocking diagram and logic are necessarily required on the existing ATS systems due to the frequent improvements in signaling equipment. This paper reports the enhancement of safety and operational efficiency of the system through an improvement of the security and the interlocking conditions of the existing ATS systems. The independent display of signals for each track was ensured to avoid giving the effect of On/Off signals for the selected track on the opposite side, and the security was improved by adjusting the position and interlocking conditions. In addition, the increased traffic density of railway systems was achieved by removing the unnecessary conditions and detailed signal display, which resulted in enhanced operational efficiency.

A Study of Algal Succession and Community Structure on Artificial Reef at Yangyang-gun and Pohang-si, Korea (양양군과 포항 해역에 시설한 인공어초에서 진행된 해조천이와 군집에 관한 연구)

  • Lee, Hyeon Jin;Choi, Chang Geun
    • Journal of Marine Life Science
    • /
    • v.4 no.2
    • /
    • pp.81-85
    • /
    • 2019
  • This study was carried out to observe the changes of seaweed community in artificial reefs installed in September, 2016 in Namae-ri, Yangyang-gun, and Seokbyeong-ri, Pohangsi, Korea. Field surveys were conducted by SCUBA diving once a season in February, May, August, and November of 2017, and quantitative survey and qualitative survey were carried out in parallel. In this study, a total of 94 species, including 11 green algae, 15 brown algae and 68 red algae were appeared. 66 species (8 green algae, 9 brown algae, 49 red algae) and 65 species (7 green algae, 9 brown algae, 49 red algae) were collected and identified in Yangyang and Pohang. In dominant species, Yangyang was dominant species of Saccharina japonica and subdominant species of Ulva australis. Pohang dominated in order of Colpomenia sinuosa and Gelidium elegans. In both coastal areas, Ulva spp., Colpomenia sinuosa were grown at the early stage of reforestation, and perennial seaweeds such as Saccharina japonica, Ecklonia cava and Gelidium elegans were grown. In order to clarify the clustering relation through flora change, it is necessary to monitor the transition process until the seaweed community is stabilized by observing the long-term change through continuous monitoring.

The Hardware Design of Effective Deblocking Filter for HEVC Encoder (HEVC 부호기를 위한 효율적인 디블록킹 하드웨어 설계)

  • Park, Jae-Ha;Park, Seung-yong;Ryoo, Kwang-ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.755-758
    • /
    • 2014
  • In this paper, we propose effective Deblocking Filter hardware architecture for High Efficiency Video Coding encoder. we propose Deblocking Filter hardware architecture with less processing time, filter ordering for low area design, effective memory architecture and four-pipeline for a high performance HEVC(High Efficiency Video Coding) encoder. Proposed filter ordering can be used to reduce delay according to preprocessing. It can be used for realtime single-port SRAM read and write. it can be used in parallel processing by using two filters. Using 10 memory is effective for solving the hazard caused by a single-port SRAM. Also the proposed filter can be used in low-voltage design by using clock gating architecture in 4-pipeline. The proposed Deblocking Filter encoder architecture is designed by Verilog HDL, and implemented by 100k logic gates in TSMC $0.18{\mu}m$ process. At 150MHz, the proposed Deblocking Filter encoder can support 4K Ultra HD video encoding at 30fps, and can be operated at a maximum speed of 200MHz.

  • PDF

Evaluation and Forecast of North Korea's Nuclear Policy through Libya Model (리비아 모델을 통한 북한의 핵 정책 평가와 전망)

  • Han, Seung Jo;Shin, Jin
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.113-122
    • /
    • 2018
  • The issue of security on the Korean peninsula is facing the greatest upheaval in 2018 with the inter-Korean summit and the US-North Korea summit. North Korea has pursued the parallel policy developing military and economic at the same time. However, North Korea is changing its route to give up nuclear weapons and focus on the economy through summit talks. Since the change in North Korea is similar to that of Libya in the past, it is necessary to analyze why North Korea is trying to abandon its nuclear program and how the process is flowing compared to the case of Libya. The Libya model was constructed and analyzed in terms of international and domestic perpectives and recognition of the situation by leadership. North Korea's nuclear policy was evaluated based on the Libya model. The nuclear development of Libya and North Korea has caused diplomatic and economic pressures from the international community and ultimately led to instability of the regime. Two countries have tried to abandon nuclear program in order to solve the instability of the regime, also gain the economic reward insead. Libya took economic benefits and secured some of the stability of the regime, but the regime collapsed under the wave of democracy due to the influx of foreign capital and ideas. North Korea will seek diplomatic and economic gains with the example of Libya, but will try to limit as much as possible the culture of democracy and the full opening that can be incidental.

  • PDF

Past Affairs-Related Collective Memories and the Archival Justice : The Contemporary Rebuilding of the Archive on the Truth and Reconciliation Committee (과거사 집단기억과 '아카이브 정의' 진실화해위원회 아카이브의 동시대적 재구성)

  • Lee, Kyong Rae
    • The Korean Journal of Archival Studies
    • /
    • no.46
    • /
    • pp.5-44
    • /
    • 2015
  • This article purposes to define archival justice and suggest democratic modeling of the archive on the Truth and Reconciliation Committee (TRC), which is focused on victims of state violence. These purposes come from critical mind that the absence of framework of the records management for collective memory would cause incorporation of TRC archives into mainstream archives systems in which voices of victims have been marginalized. This article intends to expand theoretical prospects of documentation of past affairs through applying humanistic and theoretical frameworks differently from institutional and policy approaches on restoration of collective memory. In order to do this, this article first considers archival justice as archives building in which state violence' victims are pivotal and then extracts theoretical frameworks for building the archives based on archival justice from recent discourses of post-colonial archives and community archives. As the next step, it criticizes current conditions of TRC archives in Korea on the basis of extracted theoretical frames and finally suggests realistic models in which each theoretical frame could be applied effectively into TRC archives that is focused on victims.

A Study on the allowed range of viewing and copying right of criminal victim's investigation records (범죄 피해자의 수사기록 열람·등사권의 허용 범위에 관한 연구)

  • NAM, SEON MO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.127-137
    • /
    • 2019
  • In this study, I set the allowable range of viewing / copying rights of investigation records on criminal victims and bereaved families in the procedure of investigation. I tried to grasp the contents of the suspect's statement at an early stage and support it in order to cope appropriately Recently, the social consideration of people suffering from crime victims is expanding in fact. The scope of the investigation is set by the lawyer of the suspect in relation to the subordinate statute concerning the investigation and reading of the investigation record. In parallel, it is necessary to apply to the victim's lawyer or bereaved. This is a part that coincides with the purpose of certifying private rights such as browsing of litigation records to the victim and ultimately has a purpose related to the allowable range. Although it is the right to receive the investigation result at each stage, it is not used properly. Especially when distorted investigation progresses, if the suspect is not prosecuted, the victim may be in a state of regret. The important part can be summarized as the question of whether the investigation of the victim's lawyer is allowed to view and access the criminal records. This section has been reviewed with a focus on the current Act and its functional aspects should be emphasized and revised in accordance with the legal environment. These findings will contribute to ensuring victims' rights in the future. It is also used as an important resource in the legislative process, including the revision of the criminal procedure law.

Implementation of High-radix Modular Exponentiator for RSA using CRT (CRT를 이용한 하이래딕스 RSA 모듈로 멱승 처리기의 구현)

  • 이석용;김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.81-93
    • /
    • 2000
  • In a methodological approach to improve the processing performance of modulo exponentiation which is the primary arithmetic in RSA crypto algorithm, we present a new RSA hardware architecture based on high-radix modulo multiplication and CRT(Chinese Remainder Theorem). By implementing the modulo multiplier using radix-16 arithmetic, we reduced the number of PE(Processing Element)s by quarter comparing to the binary arithmetic scheme. This leads to having the number of clock cycles and the delay of pipelining flip-flops be reduced by quarter respectively. Because the receiver knows p and q, factors of N, it is possible to apply the CRT to the decryption process. To use CRT, we made two s/2-bit multipliers operating in parallel at decryption, which accomplished 4 times faster performance than when not using the CRT. In encryption phase, the two s/2-bit multipliers can be connected to make a s-bit linear multiplier for the s-bit arithmetic operation. We limited the encryption exponent size up to 17-bit to maintain high speed, We implemented a linear array modulo multiplier by projecting horizontally the DG of Montgomery algorithm. The H/W proposed here performs encryption with 15Mbps bit-rate and decryption with 1.22Mbps, when estimated with reference to Samsung 0.5um CMOS Standard Cell Library, which is the fastest among the publications at present.

Real-time Watermarking Algorithm using Multiresolution Statistics for DWT Image Compressor (DWT기반 영상 압축기의 다해상도의 통계적 특성을 이용한 실시간 워터마킹 알고리즘)

  • 최순영;서영호;유지상;김대경;김동욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.33-43
    • /
    • 2003
  • In this paper, we proposed a real-time watermarking algorithm to be combined and to work with a DWT(Discrete Wavelet Transform)-based image compressor. To reduce the amount of computation in selecting the watermarking positions, the proposed algorithm uses a pre-established look-up table for critical values, which was established statistically by computing the correlation according to the energy values of the corresponding wavelet coefficients. That is, watermark is embedded into the coefficients whose values are greater than the critical value in the look-up table which is searched on the basis of the energy values of the corresponding level-1 subband coefficients. Therefore, the proposed algorithm can operate in a real-time because the watermarking process operates in parallel with the compression procession without affecting the operation of the image compression. Also it improved the property of losing the watermark and the efficiency of image compression by watermark inserting, which results from the quantization and Huffman-Coding during the image compression. Visual recognizable patterns such as binary image were used as a watermark The experimental results showed that the proposed algorithm satisfied the properties of robustness and imperceptibility that are the major conditions of watermarking.

A Case Study on Utilizing Open-Source Software SDL in C Programming Language Learning (C 프로그래밍 언어 학습에 공개 소스 소프트웨어 SDL 활용 사례 연구)

  • Kim, Sung Deuk
    • Journal of Practical Engineering Education
    • /
    • v.14 no.1
    • /
    • pp.1-10
    • /
    • 2022
  • Learning C programming language in electronics education is an important basic education course for understanding computer programming and acquiring the ability to use microprocessors in embedded systems. In order to focus on understanding basic grammar and algorithms, it is a common teaching method to write programs based on C standard library functions in the console window and learn theory and practice in parallel. However, if a student wants to start a project activity or go to a deeper stage after acquiring some basic knowledge of the C language, using only the C standard library function in the console window limits what a student can express or control with the C program. For the purpose of making it easier for a student to use graphics or multimedia resources and increase educational value, this paper studies a case of applying Simple DirectMedia Layer (SDL), an open source software, into the C programming language learning process. The SDL-based programming course applied after completing the basic programming curriculum performed in the console window is introduced, and the educational value is evaluated through a survey. As a result, more than 56% of the respondents expressed positive opinions in terms of improved application ability, stimulating interest, and overall usefulness, and less than 4% of them had negative opinions.