• Title/Summary/Keyword: scenario layer

Search Result 112, Processing Time 0.032 seconds

A study with more probability for predicting the quantitative severity of fire occurance in department stores (백화점 화재 발생의 확률적 접근에 의한 심각성의 정량적 예측)

  • 구진영;김광열
    • Fire Science and Engineering
    • /
    • v.12 no.1
    • /
    • pp.15-21
    • /
    • 1998
  • In this research, we studied reach the conclusion with more probability for predicting the severity which based on fire cases in domestic department stores for last 30 years. Considering the number of yearly fire cases in department stores and the cost of damage, we set the risk level. Moreover, this research shows the severity of fire in department stores through its scenario applying to FPETOOL program which NIST in USA has developed. By the result of FPETOOL program operation, we could acquired information about the time reaching the point where people are in danger in temperature, smoke layer and gas concentration. When a fire breaks out in a department store, a great loss of property and life is significant, as well as the potential risk is awfully considerable. Therefore, we should prevent a five from occuring.

  • PDF

Evidence of Vertical Mixing Caused by High Frequency Internal Waves along the Eastern Coast of Korea

  • Han, In-Seong;Lee, Ju;Jang, Lee-Hyun;Suh, Young-Sang;Seong, Ki-Tack
    • Fisheries and Aquatic Sciences
    • /
    • v.11 no.1
    • /
    • pp.41-49
    • /
    • 2008
  • Internal waves and internal tides occur frequently along the eastern coast of Korea. During the spring-tide period in April 2003, the East Korean Warm Current (EKWC) flowed near the Korean East Coast Farming Forecast System (KECFFS; a moored oceanographic measurement system), creating a strong thermocline at the intermediate layer. Weakened stratification and well-mixed water appeared frequently around the KECFFS, with duration of approximately 1 day. The results suggest the following scenario. Baroclinic motion related to the internal tide generated high frequency internal waves around the thermocline. The breaking of those waves then created turbulence around the thermocline. After well-mixed water appeared, a current component with perpendicular direction to the EKWC appeared within the inertial period. The change in stratification around the KECFFS locally broke the geostrophic balance as a transient state. This local vertical mixing formed an ageostrophic current within the inertial period.

Design and evaluation of an alert message dissemination algorithm using fuzzy logic for VANETs

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.4
    • /
    • pp.783-793
    • /
    • 2010
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collisions at the link layer due to an excessive number of broadcast packets. We present a fuzzy alert message dissemination algorithm to improve performance for road safety alert application in Vehicular Ad-hoc Network (VANET). In the proposed algorithm, when a vehicle receives an alert message for the first time, the vehicle rebroadcasts the alert message according to the fuzzy control rules for rebroadcast degree, where the rebroadcast degree depends on the current traffic density of the road and the distance between source vehicle and destination vehicle. Also, the proposed algorithm is the hybrid algorithm that uses broadcast protocol together with token protocol according to traffic density. The performance of the proposed algorithm is evaluated through simulation and compared with that of other alert message dissemination algorithms.

Improved MPLS-MOB Scheme for Supporting Local and Global Mobility in NGN (차세대네트워크에서 로컬 및 글로벌 이동성 제공을 위한 향상된 MPLS-MOB 방안)

  • Yu, Myoung-Ju;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.54-62
    • /
    • 2011
  • This paper proposes both global and local mobility management (MM) scheme improved from Multi Protocol Label Switching (MPLS)-based Mobility Management scheme (MPLS-MOB) for seamless service in Next Generation Network (NGN). The proposed scheme adds local MM on the existing MPLS-MOB which supports global MM by processing handover signaling by 2.5 layer switching via Label Switch Path (LSP) of MPLS. We numerically analyze and verify that the proposed scheme has lower handover latency time than the existing ones, such as micro-MM methods using MPLS as well as MIP and an interworking scenario between PMIP and MIP.

Seismic Response Characterization of Shear Wall in Auxiliary Building of Nuclear Power Plant (지진에 의한 원전 보조건물 전단벽의동적 응답 특성 추정)

  • Rahman, Md Motiur;Nahar, Tahmina Tasnim;Baek, Geonhwi;Kim, Dookie
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.25 no.3
    • /
    • pp.93-102
    • /
    • 2021
  • The dynamic characterization of a three-story auxiliary building in a nuclear power plant (NPP) constructed with a monolithic reinforced concrete shear wall is investigated in this study. The shear wall is subjected to a joint-research, round-robin analysis organized by the Korea Atomic Energy Research Institute, South Korea, to predict seismic responses of that auxiliary building in NPP through a shake table test. Five different intensity measures of the base excitation are applied to the shaking table test to get the acceleration responses from the different building locations for one horizontal direction (front-back). Simultaneously to understand the global damage scenario of the structure, a frequency search test is conducted after each excitation. The primary motivation of this study is to develop a nonlinear numerical model considering the multi-layered shell element and compare it with the test result to validate through the modal parameter identification and floor responses. In addition, the acceleration amplification factor is evaluated to judge the dynamic behavior of the shear wall with the existing standard, thus providing theoretical support for engineering practice.

Secrecy Performance of Multi-Antenna Satellite-Terrestrial Relay Networks with Jamming in the Presence of Spatial Eavesdroppers

  • Wang, Xiaoqi;Hou, Zheng;Zhang, Hanwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3152-3171
    • /
    • 2022
  • This work investigates the physical layer secrecy of a multi-antenna hybrid satellite-terrestrial relay networks (HSTRN) with jamming, in which a satellite aims to make communication with a destination user by means of a relay, along with spatially random eavesdroppers. In order to weaken the signals of eavesdroppers, the conventional relay can also generate intentional interference, besides forwarding the received signal. Shadowed-Rician fading is adopted in satellite link, while Rayleigh fading is adopted in terrestrial link, eavesdropper link and jamming link. The analytical and asymptotic formulas for the system secrecy outage probability (SOP) are characterized. Practical insights on the diversity order of the network are revealed according to the asymptotic behavior of SOP at high signal-to-noise ratio (SNR) regime. Then, analysis of the system throughput is examined to assess the secrecy performance. In the end, numerical simulation results are presented to validate the theoretical analysis and point out: (1) The secrecy performance of the considered network is affected by the channel fading scenario, the system configuration; (2) Decrease of the relay coverage airspace can provide better SOP performance; (3) Jamming from the relay can improve secrecy performance without additional network resources.

Routing optimization algorithm for logistics virtual monitoring based on VNF dynamic deployment

  • Qiao, Qiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1708-1734
    • /
    • 2022
  • In the development of logistics system, the breakthrough of important technologies such as technology platform for logistics information management and control is the key content of the study. Based on Javascript and JQuery, the logistics system realizes real-time monitoring, collection of historical status data, statistical analysis and display, intelligent recommendation and other functions. In order to strengthen the cooperation of warehouse storage, enhance the utilization rate of resources, and achieve the purpose of real-time and visual supervision of transportation equipment and cargo tracking, this paper studies the VNF dynamic deployment and SFC routing problem in the network load change scenario based on the logistics system. The BIP model is used to model the VNF dynamic deployment and routing problem. The optimization objective is to minimize the total cost overhead generated by each SFCR. Furthermore, the application of the SFC mapping algorithm in the routing topology solving problem is proposed. Based on the concept of relative cost and the idea of topology transformation, the SFC-map algorithm can efficiently complete the dynamic deployment of VNF and the routing calculation of SFC by using multi-layer graph. In the simulation platform based on the logistics system, the proposed algorithm is compared with VNF-DRA algorithm and Provision Traffic algorithm in the network receiving rate, throughput, path end-to-end delay, deployment number, running time and utilization rate. According to the test results, it is verified that the test results of the optimization algorithm in this paper are obviously improved compared with the comparison method, and it has higher practical application and promotion value.

Effects of unconfined blast on strategic structures and its protective measures

  • Choubey, Bishwajeet;Dutta, Sekhar C.;Hussain, Md. Ahsaan
    • Structural Engineering and Mechanics
    • /
    • v.84 no.2
    • /
    • pp.167-180
    • /
    • 2022
  • A strategic structure when exposed to direct hit of conventional bomb/projectile are severely damaged because of large amounts of energy released by the impact and penetration of bomb. When massive concrete slabs suffer a direct hit, the energy released during impact and penetration process are able to easily break up large mass of concrete. When over stressed under such impact of bombs, the concrete structure fails showing brittle behavioural nature. This paper is intended to study and suggest the protective measures for structures used for strategic application by adopting a means to dissipate the large quantum of energy released. To quantitatively evaluate the force, displacement and energy in such scenario, a fine numerical model of the proposed layered structure of different combinations was built in ANSYS programme in which tri-nitrotoluene (TNT) explosive was detonated at penetration depth calculated for GP1000 Lbs bomb. The distinct blast mitigation effect of the proposed structure was demonstrated by adopting various layers/barriers created as protective measures for the strategic structure. The calculated result shows that the blast effect on the structure is potentially reduced due to provision of buster slab with sand cushioning provided as protective measure to the main structure. This concept of layered protective measures may be adopted for safeguarding strategic structures such as Domes, Tunnels and Underground Structures.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

Future tactical communication system development plan through Army TIGER information distribution capability analysis (Army TIGER 정보유통능력 분석을 통한 미래 전술통신체계 발전 방안)

  • Junseob Kim;Sangjun Park;Jinho Cha;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.23-30
    • /
    • 2021
  • As the 4th Industrial revolution technology develops, it is expected that future technologies will be used in the military. The Army is developing the Army TIGER 4.0 system, which means innovative changes in mobile, networked, and intelligent ground forces. In order to utilize future technologies, it is necessary to be able to transmit and receive large amounts of data between weapon systems, but there are limitations to supporting this through TICN and ANASIS. Therefore, in this paper, the information exchange requirements generated by the Army TIGER 4.0 battalion and the amount of traffic by communication layer are analyzed based on the battalion defense operation scenario to suggest information distribution capability of the future tactical communication system.