• Title/Summary/Keyword: speed data

Search Result 8,853, Processing Time 0.044 seconds

A Study on Dynamic Behaviour of Cable-Stayed Bridge by Vehicle Load (차량하중에 의한 사장교의 동적거동에 관한 연구)

  • Park, Cheun Hyek;Han, Jai Ik
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.14 no.6
    • /
    • pp.1299-1308
    • /
    • 1994
  • This paper is considered on the dynamic behavior and the dynamic impact coefficient on the cable-stayed bridge under the vehicle load. The method of static analysis, that is, the transfer matrix method is used to get influence values about displacements, section forces of girder and cable forces. Gotten influence values were used as basic data to analyse dynamic behavior. This paper used the transfer matrix method because it is relatively simpler than the finite element method, and calculating speed of computer is very fast and the precision of computation is high. In the process of dynamic analysis, the uncoupled equation of motion is derived from simultaneous equation of the motion of cable-stayed bridge and vehicle travelling by using mode shape, which was borne from system of undamped free vibration. The solution of the uncoupled equation of motion, that is, time history of response of deflections, velocity and acceleration on reference coordinate system, is found by Newmark-${\beta}$ method, a kind of direct integral method. After the time history of dynamic response was gotten, and it was transfered to the time history of dynamic response of cable-stayed bridge by linear transformation of coordinates. As a result of this numerical analysis, effect of dynamic behavior for cable-stayed bridge under the vehicle load has varied depending on parameter of design, that is, the ratio of span, the ratio of main span length, tower height, the flexural rigidity of longitudinal girder, the flexural rigidity of tower, and the cable stiffness, investigated. Very good agreements with the existing solution in the literature are shown for the uncracked plate as well as the cracked plate.

  • PDF

Genetic Analysis Strategies for Improving Race Performance of Thoroughbred Racehorse and Jeju Horse (서러브레드 경주마와 제주마의 경주 능력 향상을 위한 유전체 분석 전략)

  • Baek, Kyung-Wan;Gim, Jeong-An;Park, Jung-Jun
    • Journal of Life Science
    • /
    • v.28 no.1
    • /
    • pp.130-139
    • /
    • 2018
  • In ancient times, horse racing was done in ancient European countries in the form of wagon races or mountain races, and wagon racing was adopted as a regular event at the Greek Olympic Games. Thoroughbred horse has been bred since 17th century by intensive selective breeding for its speed, stamina, and racing ability. Then, in the 18th century, horse racing using the Thoroughbred species began to gain popularity among nobles. Since then, horse racing has developed into various forms in various countries and have developed into flat racing, steeplechasing, and harness racing. Thoroughbred racehorse has excellent racing abilities because of powerful selection breeding strategy for 300 years. It is necessary to maintain and maximize horses' ability to race, because horse industries produce enormous economic benefits through breeding, training, and horse racing. Next-generation sequencing (NGS) methods which process large amounts of genomic data have been developed recently. Based on the remarkable development of these genomic analytical techniques, it is now possible to easily carry out animal breeding strategies with superior traits. In order to select breeding racehorse with superior racing traits, the latest genomic analysis techniques have to be introduced. In this paper, we will review the current efforts to improve race performance for racehorses and to examine the research trends of genomic analysis. Finally, we suggest to utilize genomic analysis in Thoroughbred racehorse and Jeju horse, and propose a strategy for selective breeding for Jeju horse, which contributes job creation of Korea.

Detection of Clavibacter michiganensis subsp. michiganensis Assisted by Micro-Raman Spectroscopy under Laboratory Conditions

  • Perez, Moises Roberto Vallejo;Contreras, Hugo Ricardo Navarro;Herrera, Jesus A. Sosa;Avila, Jose Pablo Lara;Tobias, Hugo Magdaleno Ramirez;Martinez, Fernando Diaz-Barriga;Ramirez, Rogelio Flores;Vazquez, Angel Gabriel Rodriguez
    • The Plant Pathology Journal
    • /
    • v.34 no.5
    • /
    • pp.381-392
    • /
    • 2018
  • Clavibacter michiganensis subsp. michiganesis (Cmm) is a quarantine-worthy pest in $M{\acute{e}}xico$. The implementation and validation of new technologies is necessary to reduce the time for bacterial detection in laboratory conditions and Raman spectroscopy is an ambitious technology that has all of the features needed to characterize and identify bacteria. Under controlled conditions a contagion process was induced with Cmm, the disease epidemiology was monitored. Micro-Raman spectroscopy ($532nm\;{\lambda}$ laser) technique was evaluated its performance at assisting on Cmm detection through its characteristic Raman spectrum fingerprint. Our experiment was conducted with tomato plants in a completely randomized block experimental design (13 plants ${\times}$ 4 rows). The Cmm infection was confirmed by 16S rDNA and plants showed symptoms from 48 to 72 h after inoculation, the evolution of the incidence and severity on plant population varied over time and it kept an aggregated spatial pattern. The contagion process reached 79% just 24 days after the epidemic was induced. Micro-Raman spectroscopy proved its speed, efficiency and usefulness as a non-destructive method for the preliminary detection of Cmm. Carotenoid specific bands with wavelengths at 1146 and $1510cm^{-1}$ were the distinguishable markers. Chemometric analyses showed the best performance by the implementation of PCA-LDA supervised classification algorithms applied over Raman spectrum data with 100% of performance in metrics of classifiers (sensitivity, specificity, accuracy, negative and positive predictive value) that allowed us to differentiate Cmm from other endophytic bacteria (Bacillus and Pantoea). The unsupervised KMeans algorithm showed good performance (100, 96, 98, 91 y 100%, respectively).

A Feature Point Extraction and Identification Technique for Immersive Contents Using Deep Learning (딥 러닝을 이용한 실감형 콘텐츠 특징점 추출 및 식별 방법)

  • Park, Byeongchan;Jang, Seyoung;Yoo, Injae;Lee, Jaechung;Kim, Seok-Yoon;Kim, Youngmo
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.529-535
    • /
    • 2020
  • As the main technology of the 4th industrial revolution, immersive 360-degree video contents are drawing attention. The market size of immersive 360-degree video contents worldwide is projected to increase from $6.7 billion in 2018 to approximately $70 billion in 2020. However, most of the immersive 360-degree video contents are distributed through illegal distribution networks such as Webhard and Torrent, and the damage caused by illegal reproduction is increasing. Existing 2D video industry uses copyright filtering technology to prevent such illegal distribution. The technical difficulties dealing with immersive 360-degree videos arise in that they require ultra-high quality pictures and have the characteristics containing images captured by two or more cameras merged in one image, which results in the creation of distortion regions. There are also technical limitations such as an increase in the amount of feature point data due to the ultra-high definition and the processing speed requirement. These consideration makes it difficult to use the same 2D filtering technology for 360-degree videos. To solve this problem, this paper suggests a feature point extraction and identification technique that select object identification areas excluding regions with severe distortion, recognize objects using deep learning technology in the identification areas, extract feature points using the identified object information. Compared with the previously proposed method of extracting feature points using stitching area for immersive contents, the proposed technique shows excellent performance gain.

A Study on Apparatus of Smart Wearable for Mine Detection (스마트 웨어러블 지뢰탐지 장치 연구)

  • Kim, Chi-Wook;Koo, Kyong-Wan;Cha, Jae-Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.263-267
    • /
    • 2015
  • current mine detector can't division the section if it is conducted and it needs too much labor force and time. in addition to, if the user don't move the head of sensor in regular speed or move it too fast, it is hard to detect a mine exactly. according to this, to improve the problem using one direction ultrasonic wave sensing signal, that is made up of human body antenna part, main micro processor unit part, smart glasses part, body equipped LCD monitor part, wireless data transmit part, belt type power supply part, black box type camera, Security Communication headset. the user can equip this at head, body, arm, waist and leg in removable type. so it is able to detect the powder in a 360-degree on(under) the ground whether it is metal or nonmetal and it can express the 2D or 3D film about distance, form and material of the mine. so the battle combats can avoid the mine and move fast. also, through the portable battery and twin self power supply system of the power supply part, combat troops can fight without extra recharge and we can monitoring the battle situation of distant place at the command center server on real-time. and then, it makes able to sharing the information of battle among battle combats one on one. as a result, the purpose of this study is researching a smart wearable mine detector which can establish a smart battle system as if the commander is in the site of the battle.

Design and Performance Analysis of a new MAC Protocol for Providing Real-time Traffic Information using USN (USN 기반 실시간 주행 상황 정보 제공을 위한 MAC 설계 및 성능 분석)

  • Park, Man-Kyu;So, Sang-Ho;Lee, Jae-Yong;Lim, Jae-Han;Son, Myung-Hee;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.5
    • /
    • pp.38-48
    • /
    • 2007
  • In ubiquitous environment, sensor networks that sense and transmit surrounding data without human intervention will become more important. If sensors are installed for detecting vehicles and measuring their speed in the road and that real-time information is given to drivers, it will be very effective for enhancing safety and controlling traffic in the road. In this paper, we proposed a new reliable and real-time sensor MAC protocol between AP and sensor nodes in order to provide real-time traffic flow information based on ubiquitous sensor networks. The proposed MAC allocates one TDMA slot for each sensor node on the IEEE 802.15.4 based channel structure, introduces relayed communication for distant sensors, and adopts a frame structure that supports retransmission for the case of errors. In addition, the proposed MAC synchronizes with AP by using beacon and adopts a hybrid tracking mode that supports economic power consumption according to various traffic situations, We implemented a simulator for the proposed MAC by using sim++ and evaluated various performances. The simulation results show that the proposed MAC reduces the power consumption and reveals excellent performance in real-time application systems.

Simultaneous Analysis of Pesticides in Aqueous Sample by HF-LPME (HF-LPME를 이용한 수용액 시료 내 농약의 동시 분석)

  • Nam, Jang-Woo;Lee, Kang-Jin;Myung, Seung-Woon
    • Journal of the Korean Chemical Society
    • /
    • v.56 no.5
    • /
    • pp.583-590
    • /
    • 2012
  • The HF (Hollow fiber) extraction method was optimized to analysis seven species of pesticides in aqueous sample and analyzing samples by GC/MS. Hollow fiber extraction showed good efficiency when it was conducted under these conditions: organic solvent was toluene and agitation speed was 1200 rpm. The 15% concentration of NaCl was optimized when it was experimented between 5% and 25%. The equilibrium time was determined at 15 minutes. The pH 5 showed the best effect on the extraction efficiency. The linearities of calibration curves of seven species were good with correlation of regression ($r^2$) over 0.995 when they were experimented over a concentration range of $5{\mu}g/L$ to $50{\mu}g/L$. The analytical data exhibited the detection of limits (LODs) range of $0.37{\mu}g/L$ to $1.23{\mu}g/L$ and the limit of quantification (LOQs) range of $1.19{\mu}g/L$ to $3.91{\mu}g/L$. The optimized HF-LPME extraction method provides a simple and effective preparation and requires small amount of organic solvents and samples compared to conventional pre-treatment methods.

Influence of Low Temperature Degradation on Bond Strength of Yttria-Stabilized Tetragonal Zirconia Polycrystal Core to Veneering Ceramic (저온열화현상이 지르코니아 코어와 전장도재의 전단결합강도에 미치는 영향)

  • Kim, Ki-Baek;Kim, Jae-Hong
    • Journal of dental hygiene science
    • /
    • v.14 no.1
    • /
    • pp.29-34
    • /
    • 2014
  • The purpose of this study was to evaluate the influence of low temperature degradation (LTD) on the bonding strength of yttria-stabilized tetragonal zirconia polycrystal (Y-TZP). The push-shear bond test method was used to investigate the core-veneer bonding strength of industrially manufactured Y-TZP core ceramic and manufacturer recommended veneering ceramic. Four groups from ceramic-zirconia specimens (n=28; n=7 per group) were assigned into four experimental aging conditions, namely storage in an autoclave at $134^{\circ}C$ for 0, 3, 5, 10 hours. Bonding strength was obtained using a universal testing machine with crosshead speed 0.5 mm/min. Data were statistically analyzed using one-way ANOVA and Tukey's test (${\alpha}=0.05$). In bonding strength test, the group which was treated with LTD showed lower bonding strength than no treated group. The ceramic-zirconia bonding strength was affected by LTD (p<0.05). Digital microscope examination of the fracture surface showed mixed failures with adhesive and cohesive types in LTD with treated Y-TZP groups.

Review on the Three-Dimensional Inversion of Magnetotelluric Date (MT 자료의 3차원 역산 개관)

  • Kim Hee Joon;Nam Myung Jin;Han Nuree;Choi Jihyang;Lee Tae Jong;Song Yoonho;Suh Jung Hee
    • Geophysics and Geophysical Exploration
    • /
    • v.7 no.3
    • /
    • pp.207-212
    • /
    • 2004
  • This article reviews recent developments in three-dimensional (3-D) magntotelluric (MT) imaging. The inversion of MT data is fundamentally ill-posed, and therefore the resultant solution is non-unique. A regularizing scheme must be involved to reduce the non-uniqueness while retaining certain a priori information in the solution. The standard approach to nonlinear inversion in geophysis has been the Gauss-Newton method, which solves a sequence of linearized inverse problems. When running to convergence, the algorithm minimizes an objective function over the space of models and in the sense produces an optimal solution of the inverse problem. The general usefulness of iterative, linearized inversion algorithms, however is greatly limited in 3-D MT applications by the requirement of computing the Jacobian(partial derivative, sensitivity) matrix of the forward problem. The difficulty may be relaxed using conjugate gradients(CG) methods. A linear CG technique is used to solve each step of Gauss-Newton iterations incompletely, while the method of nonlinear CG is applied directly to the minimization of the objective function. These CG techniques replace computation of jacobian matrix and solution of a large linear system with computations equivalent to only three forward problems per inversion iteration. Consequently, the algorithms are efficient in computational speed and memory requirement, making 3-D inversion feasible.

Cache-Filter: A Cache Permission Policy for Information-Centric Networking

  • Feng, Bohao;Zhou, Huachun;Zhang, Mingchuan;Zhang, Hongke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4912-4933
    • /
    • 2015
  • Information Centric Networking (ICN) has recently attracted great attention. It names the content decoupling from the location and introduces network caching, making the content to be cached anywhere within the network. The benefits of such design are obvious, however, many challenges still need to be solved. Among them, the local caching policy is widely discussed and it can be further divided into two parts, namely the cache permission policy and the cache replacement policy. The former is used to decide whether an incoming content should be cached while the latter is used to evict a cached content if required. The Internet is a user-oriented network and popular contents always have much more requests than unpopular ones. Caching such popular contents closer to the user's location can improve the network performance, and consequently, the local caching policy is required to identify popular contents. However, considering the line speed requirement of ICN routers, the local caching policy whose complexity is larger than O(1) cannot be applied. In terms of the replacement policy, Least Recently Used (LRU) is selected as the default one for ICN because of its low complexity, although its ability to identify the popular content is poor. Hence, the identification of popular contents should be completed by the cache permission policy. In this paper, a cache permission policy called Cache-Filter, whose complexity is O(1), is proposed, aiming to store popular contents closer to users. Cache-Filter takes the content popularity into account and achieves the goal through the collaboration of on-path nodes. Extensive simulations are conducted to evaluate the performance of Cache-Filter. Leave Copy Down (LCD), Move Copy Down (MCD), Betw, ProbCache, ProbCache+, Prob(p) and Probabilistic Caching with Secondary List (PCSL) are also implemented for comparison. The results show that Cache-Filter performs well. For example, in terms of the distance to access to contents, compared with Leave Copy Everywhere (LCE) used by Named Data Networking (NDN) as the permission policy, Cache-Filter saves over 17% number of hops.