• Title/Summary/Keyword: combined users

Search Result 346, Processing Time 0.026 seconds

Nonlinear analysis of reinforced concrete frame under lateral load

  • Salihovic, Amir;Ademovic, Naida
    • Coupled systems mechanics
    • /
    • v.7 no.3
    • /
    • pp.281-295
    • /
    • 2018
  • This study aims to investigate the capacity of different models to reproduce the nonlinear behavior of reinforced concrete framed structures. To accomplish this goal, a combined experimental and analytical research program was carried out on a large scaled reinforced concrete frame. Analyses were performed by SAP2000 and compared to experimental and VecTor2 results. Models made in SAP2000 differ in the simulation of the plasticity and the type of the frame elements used to discretize the frame structure. The results obtained allow a better understanding of the characteristics of all numerical models, helping the users to choose the best approach to perform nonlinear analysis.

A Basic Study on the Directions for Reorganization of Small Elementary School in Kumi and Uiseong (구미시와 의성군 소규모초등학교의 재편성 방향에 관한 기초적 연구)

  • Yang, Kum-Suek
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.14 no.3
    • /
    • pp.33-40
    • /
    • 2012
  • This study is to clarify the actual conditions of small elementary school facilities in depopulation areas. The aim of this thesis is to present the directions for Reorganization of small school facilities. Research area was kumi and uiseong, the number of students decreased rapidly. And small elementary school facilities were surveyed. The results are as the follows; 1)After consider living zone, commuting distance, opinions of residents, it is advisable that the small size school(the number of students under 60) will be combined stronghold school. 2)In the case of relocation, first of all, should consider the characteristic of living zone, exchanging training programs between elementary schools. 3)The closed school facilities will be used consistently as public facilities with priority consideration of environmental characteristic and users' demand.

A Clothing Vending Machine using Augmented Reality Mirror (증강현실을 이용한 패션 자동판매기)

  • An, Myoung-Uk;Yang, Seungsin;Wi, DaeHyeon;Yoon, Gunwoo;Park, Daham
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.368-372
    • /
    • 2009
  • Augmented reality is derived from virtual reality that provides combined images of what users are watching and what computers are producing to improve the understanding of reality. As an effective method of applying this augmented reality technology in clothes shopping, in this paper we suggested an automatic vending machine as a sales medium, to seek a commercial application method, and developed a prototype.

  • PDF

Empirical Design of an On and Off Type Solenoid Actuator For Valve Operation

  • Sung, Baek-Ju;Lee, Eun-Woong;Kim, Hyoung-Eui
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.4B no.2
    • /
    • pp.39-46
    • /
    • 2004
  • Modern users demand that the on and off type solenoid actuator should be smaller, lighter in weight, lower in consumption power, and higher in response time. The complete design satisfying such requirements can be achieved when electromagnetic theories and empirical knowledge are combined. This paper presents various types of empirical coefficients essentially needed for optimal design of a solenoid actuator. The values of these empirical coefficients are obtained through extensive experiments over a great length of time for various kinds of solenoid actuators. We have developed a design program that is composed by combination of governing equations and empirical coefficients, and have also manufactured a prototype solenoid actuator based on the final results of the design program. The propriety of the design program and empirical coefficients have been proven by experiments.

A Case Study on the Decrease in Population and the Reorganization of School Facilities in the Rural Area (농촌지역의 인구감소와 학교시설 재편성에 대한 사례 연구)

  • Yang, Kum-Suek
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.10 no.2
    • /
    • pp.8-19
    • /
    • 2011
  • This study is to clarify the actual conditions of school Facilities in the Rural Area. The aim of this thesis is to present the direction for Reorganization of school facilities. Research area was Uiseong, Gyeongbuk, the number of students decreased rapidly. And elementary, middle and high school facilities were surveyed. The results are as the follows; 1) After consider living zone, commuting distance, opinions of residents, it is advisable that the small size school(the number of students under 60) will be combined stronghold school. 2) In the case of relocation, first of all, should consider the characteristic of living zone, exchanging training programs between elementary and middle schools. 3) The closed school facilities will be used consistently as public facilities with priority consideration of environmental characteristic and users' demand.

Cross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks

  • Jo, Jae-Ho;Cho, Jin-Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.4
    • /
    • pp.171-183
    • /
    • 2008
  • Nowadays, wireless packet data services are provided over Wireless MAN (WMAN) at a high data service rate, while 3G cellular networks provide wide-area coverage at a low data service rate. The integration of mobile WiMAX and 3G networks is essential, to serve users requiring both high-speed wireless access as well as wide-area connectivity. In this paper, we propose a cross-layer optimization scheme for a vertical handover between mobile WiMAX and 3G cellular networks. More specifically, L2 (layer 2) and L3 (layer 3) signaling messages for a vertical handover are analyzed and reordered/combined, to optimize the handover procedure. Extensive simulations using ns-2 demonstrate that the proposed scheme enhances the performance of a vertical handover between mobile WiMAX and 3G networks: low handover latency, high TCP throughput, and low UDP packet loss ratio.

Implementation of a beamforming for LTE-based MU-MIMO system (LTE 기반 MU-MIMO 시스템에 구현한 빔포밍 알고리즘)

  • Han, Yeon Gyu;Yang, Hyun Wook;Kim, Kyung Hoon;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.121-127
    • /
    • 2012
  • In this paper, we propose a new beamforming method which is used in Multiple User-Multiple Input Multiple Output (MU-MIMO) system. An experimental system consists of LTE based TDD base-station which has 2 MIMO elements each of which contains 10-array antennas and 2 mobile terminals each of which has a single antenna. We demonstrate that the Multiple Access Interference can further be reduced by appending a beamforming procedure in MU-MIMO system in which various users share a given channel resource. The proposed algorithm is the ordinary Lagrange beamforming algorithm combined with Zero-Forcing. It is demonstrated that the proposed beamforming method outperforms a conventional method which is the ZF at least by 8dB in terms of SNR through computer simulations. From experimental tests, we verify the feasibility of the proposed beamforming algorithm for realizing a practical LTE based TDD base-station for utilizing channel resources more efficiently.

- Technology and Tasks of Computer Forensics for Suppressing Computer Crime - (범죄 억제를 위한 컴퓨터 포렌식의 기술과 과제)

  • Lee Sang Rak;Shin Seung Ho;Park Sang Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.3
    • /
    • pp.327-337
    • /
    • 2004
  • The soaring increase in the number of Internet users combined with the constant computerization of business process has created new opportunities for computer criminals and terrorist. Fortunately, the computer security field is also progressing at a brisk rate. In particular, the field of computer forensics brings new ways of preserving and analyzing evidence related to computer crime. Computer forensics is a new emerging professions of the 21st century. It is the collection, preservation, analysis, and presentation of computer related evidence. For this reason, the various technology of computer forensics is regarded as a powerful tool for suppressing computer crime. Our aims is to introduce the overview of computer forensics technology. We also present the survey results of the state of the art of computer forensics in the domestics and of foreign country.

Visual-GPS combined Drone Follow-me Selfie Drone (영상과 GPS 정보를 결합한 Follow-me Selfie 드론)

  • Tuan, Do T.;Ahn, Heejune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.134-137
    • /
    • 2017
  • Follow-me function of drones is new and attractive for selfie drone users, where the drone autonomously follows and capture the user. Currently the products use the difference between GPS's in the drone and user side mobile GCS, but the targeting accuracy is not satisfactory owing to the low accuracy of GPS data, often the order of ten meters. We designed a new follow-me mode algorithm that utilizes the accuracy of visual tracking algorithm and the reliability of GPS-based. The experiment shows that proposed follow-me can capture much accurately the target user in the center of video content than GPS-only methods, and recover the vision algorithm failure quickly in 5-10 seconds.

Multidomain Network Based on Programmable Networks: Security Architecture

  • Alarco, Bernardo;Sedano, Marifeli;Calderon, Maria
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.651-665
    • /
    • 2005
  • This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes located in the architecture of the network. The programmable nodes execute codes to process active packets, which can carry user data and control information. The multiservice network model defined here considers the more pragmatic trends in programmable networks. In this scenario, new security risks that do not appear in traditional IP networks become visible. These new risks are as a result of the execution of code in the programmable nodes and the processing of the active packets. The proposed security architecture is based on symmetric cryptography in the critical process, combined with an efficient manner of distributing the symmetric keys. Another important contribution has been to scale the security architecture to a multidomain scenario in a single and efficient way.

  • PDF