• Title/Summary/Keyword: additional information

Search Result 4,957, Processing Time 0.04 seconds

Cyclic behavior of self-centering braces utilizing energy absorbing steel plate clusters

  • Jiawang Liu;Canxing Qiu
    • Steel and Composite Structures
    • /
    • v.47 no.4
    • /
    • pp.523-537
    • /
    • 2023
  • This paper proposed a new self-centering brace (SCB), which consists of four post-tensioned (PT) high strength steel strands and energy absorbing steel plate (EASP) clusters. First, analytical equations were derived to describe the working principle of the SCB. Then, to investigate the hysteretic performance of the SCB, four full-size specimens were manufactured and subjected to the same cyclic loading protocol. One additional specimen using only EASP clusters was also tested to highlight the contribution of PT strands. The test parameters varied in the testing process included the thickness of the EASP and the number of EASP in each cluster. Testing results shown that the SCB exhibited nearly flag-shape hysteresis up to expectation, including excellent recentering capability and satisfactory energy dissipating capacity. For all the specimens, the ratio of the recovered deformation is in the range of 89.6% to 92.1%, and the ratio of the height of the hysteresis loop to the yielding force is in the range of 0.47 to 0.77. Finally, in order to further understand the mechanism of the SCB and provide additional information to the testing results, the high-fidelity finite element (FE) models were established and the numerical results were compared against the experimental data. Good agreement between the experimental, numerical, and analytical results was observed, and the maximum difference is less than 12%. Parametric analysis was also carried out based on the validated FE model to evaluate the effect of some key parameters on the cyclic behavior of the SCB.

BIM-based Priority Activity in Construction Standard Unit Price (BIM기반 표준시장단가 우선적용 공종 분석)

  • Jin, Zheng-Xun;Baek, Seung-Ho
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.204-205
    • /
    • 2022
  • Recently, the application of BIM has been continuously expanded according to various government policies, and the application performance is being analyzed in BIM projects such as roads and railways. In line with this trend, the government is making additional efforts to introduce full-scale design BIM. The BIM design in the public sector is directly related to the estimated price. However, looking at the current status of BIM introduction, there is no support system in place for calculating the estimated price. Therefore, this study intends to analyze the priority activity that is easy to develop BIM unit price among the construction standard unit Price of construction work. In this study, in order to derive the BIM-based priority activity, BIM application statements and application guidelines were analyzed. As a result of the analysis, cast-in-place concrete construction (civil engineering) and reinforced concrete construction (architecture) were deduced as suitable construction activities for the preferential application of BIM. Since the results presented in this study are a rough analysis, it is judged that additional detailed analysis is necessary for the future.

  • PDF

An Application of the Rough Set Approach to credit Rating

  • Kim, Jae-Kyeong;Cho, Sung-Sik
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.10a
    • /
    • pp.347-354
    • /
    • 1999
  • The credit rating represents an assessment of the relative level of risk associated with the timely payments required by the debt obligation. In this paper, we present a new approach to credit rating of customers based on the rough set theory. The concept of a rough set appeared to be an effective tool for the analysis of customer information systems representing knowledge gained by experience. The customer information system describes a set of customers by a set of multi-valued attributes, called condition attributes. The customers are classified into groups of risk subject to an expert's opinion, called decision attribute. A natural problem of knowledge analysis consists then in discovering relationships, in terms of decision rules, between description of customers by condition attributes and particular decisions. The rough set approach enables one to discover minimal subsets of condition attributes ensuring an acceptable quality of classification of the customers analyzed and to derive decision rules from the customer information system which can be used to support decisions about rating new customers. Using the rough set approach one analyses only facts hidden in data, it does not need any additional information about data and does not correct inconsistencies manifested in data; instead, rules produced are categorized into certain and possible. A real problem of the evaluation of the evaluation of credit rating by a department store is studied using the rough set approach.

  • PDF

A Study on Security of AMI(Advanced Metering Infrastructure) in SMARTGRID (스마트 그리드에서의 AMI 보안에 관한연구)

  • Kim, Yeoun-Soo;Kim, Jin-Cheol;Ko, Jong-Bin;Shon, Tae-Shik
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.6
    • /
    • pp.1014-1023
    • /
    • 2012
  • Recently with improvement of SMART Grid, AMI network security has been affecting the environment for Electric information and communication. The system and communication protection consists of steps taken to protect the AMI components and the communication links between system components from cyber intrusions. The addition of two way communications between SUN and HAN introduces additional risk for unauthorized access to the AMI system. In this paper, we propose new AMI device authentication infrastructure, key establishment and security algorithm based on public key encryption to solve AMI network security problems.

Adaptive Importance Channel Selection for Perceptual Image Compression

  • He, Yifan;Li, Feng;Bai, Huihui;Zhao, Yao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3823-3840
    • /
    • 2020
  • Recently, auto-encoder has emerged as the most popular method in convolutional neural network (CNN) based image compression and has achieved impressive performance. In the traditional auto-encoder based image compression model, the encoder simply sends the features of last layer to the decoder, which cannot allocate bits over different spatial regions in an efficient way. Besides, these methods do not fully exploit the contextual information under different receptive fields for better reconstruction performance. In this paper, to solve these issues, a novel auto-encoder model is designed for image compression, which can effectively transmit the hierarchical features of the encoder to the decoder. Specifically, we first propose an adaptive bit-allocation strategy, which can adaptively select an importance channel. Then, we conduct the multiply operation on the generated importance mask and the features of the last layer in our proposed encoder to achieve efficient bit allocation. Moreover, we present an additional novel perceptual loss function for more accurate image details. Extensive experiments demonstrated that the proposed model can achieve significant superiority compared with JPEG and JPEG2000 both in both subjective and objective quality. Besides, our model shows better performance than the state-of-the-art convolutional neural network (CNN)-based image compression methods in terms of PSNR.

Implementation of redundant MAP system (MAP 이중화 시스템의 구현)

  • Moon, Hong-Ju;Park, Hong-Sung;Kim, Won-Cheol;Park, Jung-Woo;Ahn, Sang-Cheol;Woo, Won-Sik;Kwon, Wook-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 1992.07a
    • /
    • pp.248-251
    • /
    • 1992
  • In this paper, the RedMAP, i.e. a redundant Mini-MAP system for high reliability is proposed. Redundancy is implemented for LLC, MAC, and Physical layer of ISL-Mini -MAP. The detection of error of the network, the broadcasting of the error event, and the network change sequence are three major functions for the dualized Mini-MAP system. The abnormal operation of the network is mainly detected indirectly with the function of the TBC( token bus controller). The time delay to be required for the change of the networks must be minimized. With the RedMAP, we can achieve successful transmission only with short additional recovery time.

  • PDF

Design of Parking System using A Smart Device (스마트 기기를 활용한 주차 시스템의 설계)

  • Kim, DongHyun;Ban, ChaeHoon;Lee, MinHyung;Jo, HyunJoon;Seo, JungEun;Lee, JongSu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.439-440
    • /
    • 2013
  • As shopping malls and department stores become larger and larger, the parking lots for customers of the facilities provide broad spaces for massive cars. Though managers of the facilities support parking situation plates or numbers of guides in order to help customers, it requires additional costs for managing parking plates or guides. In this paper, we propose the parking system using smart devices. The proposed system exploits sensors and zigbee modules to collect the data of each parking space and shows the current state of the parking lot to customers with smart devices.

  • PDF

A Study on the Interface Model of Information sharing between nations for an efficient global SCM (효율적인 글로벌 SCM에 적합한 국가 간 정보 연계를 위한 인터페이스 모델 연구)

  • Park, Soo Min;Kim, Min Sik;Ahn, Kyeong Rim
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.217-230
    • /
    • 2012
  • To look at Korea trade environment, as increasing the quantity of goods transported in North-East Asia and deepening national competitive, information-oriented logistics environment is needed. That means it is automated work process and can provide value-added service. To do this, logistics business can be efficiently handled through "Electronic Means for the Clearance of Ships" and electronically data processing. Also, by increasing the risk of international terrorism, regulation regarding to logistics security has strengthened around the advanced country, such as USA and EU, etc. or international organization, such as IMO, ISO, etc.. Furthermore, because trade and logistics environment is changing and security becomes more important in logistics area, movement or status information of goods within the port or in entry in/out becomes more and more be needed in real time. In case cross-border logistics activities, international cooperation or agreement between countries is very important. However, different opinions much happened on defining the interface. If to follow one format or type using at a specific country or organization, it was occurred to difficulty in respect of interoperability as well as additional costs or time. Therefore, this paper proposes common interface model to exchange information for the efficient global SCM for using by the output of Korea R&D project, "National Logistics Standardization System Development".

Real-time Geotechnical Information Database Development Using Location Based Service (LBS를 이용한 실시간 지반정보 DB 구축 시스템 개발)

  • Woo, Je-Yoon;Koo, Jee-Hee;Lee, Sang-Hoon
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.2 s.10
    • /
    • pp.91-103
    • /
    • 2003
  • There are currently tremendous amount of geotechnical information saved, which has been qcquired for essential application of site selection, plan, design, constructin, repari in the builing work. However, due to the lack of the location data attribute, there has been a trouble in its analysis and GIS implementation. In this study, the geotechnical information aquisition program(PGeo) for real-time database in the field and geotechnical information reporting program(GeoReport) by Web-GIS for additional data input and its reporting function has been developed.

  • PDF

Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network

  • Xu, Feng;Lv, Xin;Zhou, Qi;Liu, Xuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1817-1827
    • /
    • 2014
  • As a new type of wireless network, Ad hoc network does not depend on any pre-founded infrastructure, and it has no centralized control unit. The computation and transmission capability of each node are limited. In this paper, a self-updating one-time password mutual authentication protocol for Ad hoc network is proposed. The most significant feature is that a hash chain can update by itself smoothly and securely through capturing the secure bit of the tip. The updating process does not need any additional protocol or re-initialization process and can be continued indefinitely to give rise to an infinite length hash chain, that is, the times of authentication is unlimited without reconstructing a new hash chain. Besides, two random variable are added into the messages interacted during the mutual authentication, enabling the protocol to resist man-in-the-middle attack. Also, the user's identity information is introduced into the seed of hash chain, so the scheme achieves anonymity and traceability at the same time.