• Title/Summary/Keyword: Software release time

Search Result 106, Processing Time 0.022 seconds

Validation of underwater explosion response analysis for airbag inflator using a fluid-structure interaction algorithm

  • Lee, Sang-Gab;Lee, Jae-Seok;Chung, Hyun;Na, Yangsup;Park, Kyung-Hoon
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.988-995
    • /
    • 2020
  • Air gun shock systems are commonly used as alternative explosion energy sources for underwater explosion (UNDEX) shock tests owing to their low cost and environmental impact. The airbag inflator of automotive airbag systems is also very useful to generate extremely rapid underwater gas release in labscale tests. To overcome the restrictions on the very small computational time step owing to the very fine fluid mesh around the nozzle hole in the explicit integration algorithm, and also the absence of a commercial solver and software for gas UNDEX of airbag inflator, an idealized airbag inflator and fluid mesh modeling technique was developed using nozzle holes of relatively large size and several small TNT charges instead of gas inside the airbag inflator. The objective of this study is to validate the results of an UNDEX response analysis of one and two idealized airbag inflators by comparison with the results of shock tests in a small water tank. This comparison was performed using the multi-material Arbitrary Lagrangian-Eulerian formulation and fluid-structure interaction algorithm. The number, size, vertical distance from the nozzle outlet, detonation velocity, and lighting times of small TNT charges were determined. Through mesh size convergence tests, the UNDEX response analysis and idealized airbag inflator modeling were validated.

Coactivity of Mast Cells and Stem Cells on Angiogenesis and Antioxidants' Potentials at Inflammation, Proliferation, and Tissue Remodeling Phases of Wound

  • Mousavi, Mahshad;Khanifar, Ahmad;Mousavi, Nazanin;Anbari, Khatereh;Chehelcheraghi, Farzaneh
    • Archives of Plastic Surgery
    • /
    • v.49 no.3
    • /
    • pp.462-470
    • /
    • 2022
  • Background Reactive oxygen species cause serious damage to the physiological function of tissues. Determination of total antioxidant capacity of skin tissue is one of the determinants of damaged tissue function. Mast cells (MCs) are one of the groups of cells that are invited to the site of injury. The healing process begins with the rapid release of various types of MCs' intermediate factors at the site of injury. Bone marrow mesenchymal stem cell (BMMSC) production and secretion have been shown to regenerate the skin. The aim of this research was to evaluate the wound-healing and antioxidant effects of BMMSCs per MCs. Methods Fifty-four albino Wistar male rats were divided into three groups: (1) nonsurgery, (2) surgery, and (3) surgery + BMMSCs. Groups 2 and 3 were operated with a 3 × 8 cm flap and in group 3, cell injections (7 × 109 cell injection at the time of surgery) were performed. After days 4, 7, and 15, percentage of the surviving tissue, histological characteristics, superoxide dismutase (SOD) activity, and amount of malondialdehyde (MDA) were measured in the groups. For results, Graph Pad Prism 8 software was used, and data were analyzed and compared by analysis of variance and Tukey test. Results BMMSCs' application decreased the amount of MDA, increased SOD activity and survival rate of the flaps, and improved the histological characteristics. Conclusion This study revealed the protective effects BMMSCs alongside MCs against oxidative stress on the survival of the flaps. However, for clinical use, more research is needed to determine its benefits.

A Methodology for Consistent Design of User Interaction (일관성 있는 사용자 인터랙션 설계를 위한 방법론 개발)

  • Kim, Dong-San;Yoon, Wan-Chul
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.961-970
    • /
    • 2009
  • Over the last decade, interactive devices such as mobile phones have become complicated drastically mainly because of feature creep, the tendency for the number of features in a product to rise with each release of the product. One of the ways to reduce the complexity of a multi-functional device is to design it consistently. Although the definition of consistency is elusive and it is sometimes beneficial to be inconsistent, in general, consistently designed systems are easier to learn, easier to remember, and causing less errors. In practice, however, it is often not easy to design the user interaction or interface of a multi-functional device consistently. Since the interaction design of a multi-functional device should deal with a large number of design variables and relations among them, solving this problem might be very time-consuming and error-prone. Therefore, there is a strong need for a well-developed methodology that supports the complex design process. This study has developed an effective and efficient methodology, called CUID (Consistent Design of User Interaction), which focuses on logical consistency rather than physical or visual consistency. CUID deals with three main problems in interaction design: procedure design for each task, decisions of available operations(or functions) for each system state, and the mapping of available operations(functions) and interface controls. It includes a process for interaction design and a software tool for supporting the process. This paper also demonstrates how CUID supports the consistent design of user interaction by presenting a case study. It shows that the logical inconsistencies of a multi-functional device can be resolved by using the CUID methodology.

  • PDF

Scenario-based Flood Disaster Simulation of the Rim Collapse of the Cheon-ji Caldera Lake, Mt. Baekdusan (시나리오에 따른 백두산 천지의 외륜산 붕괴에 의한 홍수재해 모의)

  • Lee, Khil-Ha;Kim, Sang-Hyun;Choi, Eun-Kyeong;Kim, Sung-Wook
    • The Journal of Engineering Geology
    • /
    • v.24 no.4
    • /
    • pp.501-510
    • /
    • 2014
  • Volcanic eruptions alone may lead to serious natural disasters, but the associated release of water from a caldera lake may be equally damaging. There is both historical and geological evidence of the past eruptions of Mt. Baekdusan, and the volcano, which has not erupted for over 100 years, has recently shown signs of reawakening. Action is required if we are to limit the social, political, cultural, and economic damage of any future eruption. This study aims to identify the area that would be inundated following a volcanic flood from the Cheon-Ji caldera lake that lies within Mt. Baekdusan. A scenario-based numerical analysis was performed to generate a flood hydrograph, and the parameters required were selected following a consideration of historical records from other volcanoes. The amount of water at the outer rim as a function of time was used as an upper boundary condition for the downstream routing process for a period of 10 days. Data from the USGS were used to generate a DEM with a resolution of 100 m, and remotely sensed satellite data from the moderate-resolution imaging spectroradiometer (MODIS) were used to show land cover and use. The simulation was generated using the software FLO-2D and was superposed on the remotely sensed map. The results show that the inundation area would cover about 80% of the urban area near Erdaobaihezhen assuming a 10 m/hr collapse rate, and 98% of the area would be flooded assuming a 100 m/hr collapse rate.

The Application of NIRS for Soil Analysis on Organic Matter Fractions, Ash and Mechanical Texture

  • Hsu, Hua;Tsai, Chii-Guary;Recinos-Diaz, Guillermo;Brown, John
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1263-1263
    • /
    • 2001
  • The amounts of organic matter present in soil and the rate of soil organic matter (SOM) turnover are influenced by agricultural management practice, such as rotation, tillage, forage plow down direct seeding and manure application. The amount of nutrients released from SOM is highly dependent upon the state of the organic matter. If it contains a large proportion of light fractions (low-density) more nutrients will be available to the glowing crops. However, if it contains mostly heavy fractions (high-density) that are difficult to breakdown, then lesser amounts of nutrients will be available. The state of the SOM and subsequent release of nutrients into the soil can be predicted by NIRS as long as a robust regression equation is developed. The NIRS method is known for its rapidity, convenience, simplicity, accuracy and ability to analyze many constituents at the same time. Our hypothesis is that the NIRS technique allows researchers to investigate fully and in more detail each field for the status of SOM, available moisture and other soil properties in Alberta soils for precision farming in the near future. One hundred thirty one (131) Alberta soils with various levels (low 2-6%, medium 6-10%, and high >10%) of organic matter content and most of dry land soils, including some irrigated soils from Southern Alberta, under various management practices were collected throughout Northern, Central and Southern Alberta. Two depths (0- 15 cm and 15-30 cm) of soils from Northern Alberta were also collected. These air-dried soil samples were ground through 2 mm sieve and scanned using Foss NIR System 6500 with transport module and natural product cell. With particle size above 150 microns only, the “Ludox” method (Meijboom, Hassink and van Noorwijk, Soil Biol. Biochem.27: 1109-1111, 1995) which uses stable silica, was used to fractionate SOM into light, medium and heavy fractions with densities of <1.13, 1.13-1.37 and >1.37 respectively, The SOM fraction with the particle size below 150 microns was discarded because practically, this fraction with very fine particles can't be further separated by wet sieving based on density. Total organic matter content, mechanical texture, ash after 375$^{\circ}C$, and dry matter (DM) were also determined by “standard” soil analysis methods. The NIRS regression equations were developed using Infra-Soft-International (ISI) software, version 3.11.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.