• Title/Summary/Keyword: Utility Work

Search Result 285, Processing Time 0.026 seconds

An efficient shear deformation theory with stretching effect for bending stress analysis of laminated composite plates

  • Abbas, Soufiane;Benguediab, Soumia;Draiche, Kada;Bakora, Ahmed;Benguediab, Mohamed
    • Structural Engineering and Mechanics
    • /
    • v.74 no.3
    • /
    • pp.365-380
    • /
    • 2020
  • The focus of this paper is to develop an analytical approach based on an efficient shear deformation theory with stretching effect for bending stress analysis of cross-ply laminated composite plates subjected to transverse parabolic load and line load by using a new kinematic model, in which the axial displacements involve an undetermined integral component in order to reduce the number of unknowns and a sinusoidal function in terms of the thickness coordinate to include the effect of transverse shear deformation. The present theory contains only five unknowns and satisfies the zero shear stress conditions on the top and bottom surfaces of the plate without using any shear correction factors. The governing differential equations and its boundary conditions are derived by employing the static version of principle of virtual work. Closed-form solutions for simply supported cross-ply laminated plates are obtained applying Navier's solution technique, and the numerical case studies are compared with the theoretical results to verify the utility of the proposed model. Lastly, it can be seen that the present outlined theory is more accurate and useful than some higher-order shear deformation theories developed previously to study the static flexure of laminated composite plates.

Removal of textile dyes in wastewater using polyelectrolytes containing tetrazole groups

  • Caldera-Villalobos, Martin;Pelaez-Cid, Alejandra-Alicia;Martins-Alho, Miriam-Amelia;Herrera-Gonzalez, Ana-Maria
    • Korean Journal of Chemical Engineering
    • /
    • v.35 no.12
    • /
    • pp.2394-2402
    • /
    • 2018
  • Textile dyes are some of the pollutants which have received the most attention because of the large volume of wastewater generated by the textile industry. Removal by means of adsorption is one of the most versatile alternatives to treat these effluents. Even though different adsorbents such as activated carbons and mineral materials have been proposed, polymeric adsorbents are a viable alternative. This work reports for the first time the use of polyelectrolyte PTZ and macroelectrolyte MTZ containing tetrazole groups as adsorbents useful in the textile dyes removal present in aqueous solutions and wastewater. Because of the anionic character of the tetrazole group, MTZ exhibits selective adsorption capabilities for cationic dyes of up to $156.25mg{\cdot}g^{-1}$. The kinetic study of the process of adsorption shows that PTZ and MTZ fit a pseudo second-order model. MTZ also shows utility as a flocculant agent in the treatment of wastewater containing dyes Indigo Blue and Reactive Black. The results showed that PTZ and MTZ may be used in the treatment of wastewater in a process of coagulation-flocculation followed by the treatment by adsorption. This two-stage treatment removed up to 95% of the dye present in the wastewater. As well as removing the dyes, the values for COD, suspended solids, pH, and color of the wastewater decreased, thus significantly improving its quality.

Analysis on the Charging Process of Stratified Thermal Storage - Tanks with Variable Inlet Temperature (입구온도가 변화하는 성층축열조의 충전과정 해석)

  • Yoo, Ho-Seon
    • Solar Energy
    • /
    • v.15 no.2
    • /
    • pp.25-37
    • /
    • 1995
  • This paper presents an approximate analytical solution to one-dimensional model of the charging process for stratified thermal storage tanks, in which variation of the inlet temperature as well as the momemtum-induced mixing is taken into accout. The mixing is incorporated into the model as a constant-depth perfectly mixed layer above the plug flow region. Based on the superposition principle, the variable inlet temperature is approximated by a number of step functions. Temperature distributions for the thermocline corresponding to three types of interfacial condition arr successfully derived in terms of well-defined functions, so that a linear combination of them constitutes the final solution. Validity and utility of this work is examined through the comparison of the approximate solution with an exact solution available for the case of linearly increasing inlet temperature. With increasing the number of steps, the present solution asymptotically approaches to the exact one. Even with a limited number of steps, the present results favorably agree with those by the exact solution for a wide range of the mixing depth. Also, it is revealed that fewer steps are needed for meaningful predictions as the mixing. depth becomes larger.

  • PDF

A Privacy Protection Method in Social Networks Considering Structure and Content Information (소셜 네트워크에서 구조정보와 내용정보를 고려한 프라이버시 보호 기법)

  • Sung, Minh-Kyoung;Lee, Ki-Yong;Chung, Yon-Dohn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.119-128
    • /
    • 2010
  • Recently, social network services are rapidly growing and it is estimated that this trend will continue in the future. Social network data can be published for various purposes such as statistical analysis and population studies. When data publication, however, it may disclose the personal privacy of some people, since it can be combined with external information. Therefore, a social network data holder has to remove the identifiers of persons and modify data which have the potential to disclose the privacy of the persons by combining it with external information. The utility of data is maximized when the modification of data is minimized. In this paper, we propose a privacy protection method for social network data that considers both structural and content information. Previous work did not consider content information in the social network or distorted too much structural information. We also verify the effectiveness and applicability of the proposed method under various experimental conditions.

Generation of 3D Design Data using Laser Scanning Data

  • Park, Joon Kyu;Lee, Keun Wang
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.5
    • /
    • pp.343-349
    • /
    • 2021
  • In The process from design to construction in the existing construction work was less efficient due to the contradictory approach of identifying the 3D state in the plan view and the repeated generation of surveys, floor plans, drawings. Accurate 3D design data is essential for smart construction. However, most of the existing related studies have focused on explaining the development method and main functions of equipment or improving the productivity of smart construction. Therefore, in this study, the utility of 3D design model generation for smart construction and construction survey using 3D laser scanner was evaluated. Plane and vertical road alignment were created using the specifications of the road. The generated road alignment was created as a three-dimensional corridor design using cross-sections at intervals of 20m. In addition, it was possible to create a DTM (Digital Terrain Model) using a digital map and effectively create a 3D design model for the study area through overlapping. Construction survey using a 3D laser scanner showed accuracy within 10cm as a result of the accuracy evaluation. These results proved that construction surveying using a 3D laser scanner is possible because it satisfies the acceptable accuracy of the relevant regulations modeling of target areas using 3D design and construction survey using 3D laser scanner can be a way to address shortcomings of existing GNSS (Global Navigation Satellite System) methods. And accurate 3D data will be used as essential data as basic data for smart construction.

On the Development of Swear Words (욕설의 형성과정에 관한 소고)

  • Yoon, Jae-Hak
    • Cross-Cultural Studies
    • /
    • v.35
    • /
    • pp.237-268
    • /
    • 2014
  • Examining swear words found in Korean and English, we aim to answer the following two questions: (i) 'What words develop into swear words?' and (ii) 'Why they do?' The utility of a swear word is frequently recognized as intimidation directed towards an opponent, emotional catharsis, and solidarity building among in-group members (Jay 1992, 2000, Kim 1997). We seek to go beyond this simple enumeration of possible functions of swearing and suggest an underlying mechanism at work to explain how these functions are achieved and why only certain types of words are employed in this pursuit. A close examination reveals that a swear word must contain either taboo or sadism as an essential component. Sexual pleasure adds another dimension to the basic components. Thus, if an expression contains a subset of the component set {taboo, sadism, sex} in its semantics, it becomes available for swearing (one of the underlined components must be included in the set). For example, many religiously sacred expressions and words for excretion are common swear words as they violate social and religious taboo. On the other hand, words referring to social minorities are a convenient target for sadism. Furthermore, words describing sexual activity contain all three components, violating social taboo, evoking sadism, and giving the initiator guilty sexual pleasure. A combination of the components can produce an emotional effect called catharsis for the initiator. When directed towards others, these components, especially taboo and sadism, can be exploited as a verbal attack, an intimidation, preceding or replacing a physical attack. However, solidarity building is analyzed as a secondary function of swearing, achieved by sharing a sense of accomplice when in-group members behave badly together, such as violating social taboo and committing sadism.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Study on the manufacturing technique of Silla potteries through Songogdong and Mulchunri sites in Gyungju. (경주 손곡동·물천리 요적(窯蹟)을 통해 본 신라토기 소성(燒成)기술)

  • Lee, Sang-Jun
    • Korean Journal of Heritage: History & Science
    • /
    • v.36
    • /
    • pp.69-86
    • /
    • 2003
  • This article introduce the manufacturing technique of Silla potteries based on the result excavated from Songogdong and Mulchunri site in Gyungju. As a result, we selected the kiln-site to produce Silla potteries and knew the feature which following to make them. 1. The Environmental elements to take a kiln-site were abundant fuel, plenty water and suitable soil. In particular, efficient usage of refracted winds and reserved space of forepart in the kiln-site were importantly applied to select place of kiln-site. 2. The structure of the kiln-body have been changing according to the time. It could be massproduced by produce-group from the middle and end of sixth centry which the fireplace-kiln was generalized. 3. The work center of equipments were related kiln-site. It consisted of mixed wheel, keepingpit and ditch. We knew that a look-out shed had been appeared according to utility purpose variously. 4. It sees as trimming trace of inner and outter aspects in excavated potteries and we knew that wheel had been turn to the contrast watch direction. For producing pottery of the good guality, various kiln-tools had been used already at Silla period and they used for the different purpose. 5. We intended to know method for laying the potteries in the kiln through the example of the adherent pottery to be melted. Finally, manufature and tomb-site are separated by the time through current situation of Songokdong and Mulchonri site. At the same time, we could know that group of Chounbuk kiln-site moved from the south to the north step by step.

Development of 3D Underground Utilities Processing and Partial Update Automation Technology - Focused on 3D Underground Geospatial Map - (3차원 지하시설물 가공 및 부분갱신 자동화 기술개발 - 지하공간통합지도 중심으로 -)

  • LEE, Min-Kyu;CHOI, Sung-Sik;JEON, Heung-Soo;KIM, Sung-Su
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.4
    • /
    • pp.1-15
    • /
    • 2020
  • As cities expand and underground utilities construction projects increase, there is an urgent need for a technology capable of analyzing the underground utilities network in 3D. Since 2015, 3D Underground Geospatial Map project, that has been integrating 15 types of underground information such as underground utilities, underground structures, and ground information, is in progress in S. Korea. However, the construction of 3D underground facilities is currently based on manual work and the logic for building a 3D model is very complicated. And it takes a lot of time and cost to process millions of large amounts of data per local governments. By presenting a framework on the processing and partial updating of the 3D underground utilities model, this paper aims to establish a plan to quickly build a 3D underground utility model at a minimum cost. The underground utilities processing and partial update automation technologies developed in this study are expected to be immediately applied to the 3D Underground Geospatial Map project.

A study on the algorithms to achieve the data privacy based on some anonymity measures (익명성 관련 측도에 기반한 데이터 프라이버시 확보 알고리즘에 관한 연구)

  • Kang, Ju-Sung;Kang, Jin-Young;Yi, Ok-Yeon;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.149-160
    • /
    • 2011
  • Technique based on the notions of anonymity is one of several ways to achieve the goal of privacy and it transforms the original data into the micro data by some group based methods. The first notion of group based method is ${\kappa}$-anonymity, and it is enhanced by the notions of ${\ell}$-diversity and t-closeness. Since there is the natural tradeoff between privacy and data utility, the development of practical anonymization algorithms is not a simple work and there is still no noticeable algorithm which achieves some combined anonymity conditions. In this paper, we provides a comparative analysis of previous anonymity and accuracy measures. Moreover we propose an algorithm to achieve ${\ell}$-diversity by the block merging method from a micro-data achieving ${\kappa}$-anonymity.