• Title/Summary/Keyword: symmetric design

Search Result 591, Processing Time 0.033 seconds

Estimation of Wind Resistance Capacity of Nielsen Arch Bridge Based on Measured Data From Monitoring System (모니터링 시스템의 계측자료를 기반으로 한 닐슨아치 교량의 내풍 안정성 평가)

  • Lee, Deok Keun;Yhim, Sung Soon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.3
    • /
    • pp.56-64
    • /
    • 2013
  • The wind resistant capacity of bridges with a span of less than 200m is typically evaluated by Wind Resistant Design Manual for Highway Bridges in Japan. Also, the first vertical frequency plays an important role in the evaluation of their aerodynamic performance. An unexpected vortex-induced vibration of Nielsen arch bridge with span of 183m designed by this manual has been measured by monitoring system during typhoon. The amplitude of vibrations was about 2 times than the allowable vibration displacement. This paper presents the feature of vortex-induced vibration of this Nielsen arch bridge based on measured wind velocity, wind direction, and responses at midspan of main girder. From the result of FFT, the $1^{st}$ mode shape of the bridge is antisymmetric and the $2^{nd}$ is symmetric. Also, the dominant vibration of the bridge is the $2^{nd}$ vertical mode. According to these results, the $2^{nd}$ vertical vibration mode of this Nielsen arch bridge is prior to the first for the estimation of wind resistance capacity.

Dynamic Response of Unreinforced Masonry Building (비보강 조적조의 동적 거동)

  • Kim, Nam-Hee;Kim, Jae-Kwan
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.8 no.5 s.39
    • /
    • pp.1-14
    • /
    • 2004
  • The seismic behavior of a 1/3-scale model of a two-story unreinforced masonry (URM) structure typically used in constructing low-rise residential buildings in Korea is studied through a shaking table test. The purposes of this study are to investigate seismic behavior and damage patterns of the URM structure that was not engineered against seismic loading and to provide its experimental test results. The test structure was symmetric about the transverse axis but asymmetric to some degrees about longitudinal axis and had a relatively strong diaphragm of concrete slab. The test structure was subjected to a series of differentlevels of earthquake shakings that were applied along the longitudinal direction. The measured dynamic response of the test structure was analyzed in terms of various global parameters (i.e., floor accelerations, base shear, floor displacements and storydrift, and torsional displacements) and correlated with the input table motion. Moreover, different levels of seismic performance were suggested for performance-based design approach. The results of the shaking table test revealed that the shear failure was dominant on a weak side of the 1stfloor while the upper part of the test model remained as a rigid body. Also, it was found that substantial strength and deformation capacity existed after cracking.

Effect of the Size and Location of a Web Opening on the Shear Behavior of High-Strength Reinforced Concrete Deep Beams (고강도 철근콘크리트 깊은 보의 전단거동에 대한 개구부 크기 및 위치의 영향)

  • Yang, Keun-Hyeok;Eun, Hee-Chang;Chung, Heon-Soo
    • Journal of the Korea Concrete Institute
    • /
    • v.15 no.5
    • /
    • pp.697-704
    • /
    • 2003
  • The purpose of this experimental study is to investigate the relationship of the shear behavior and the variety of width, depth and location of an opening in reinforced concrete deep beams with rectangular web openings, and to present an improved shear strength equation of those members. The main parameters considered were concrete strength(fck), shear span-to-overall depth ratio(a/h), and the size and vortical position of the web openings. Twenty five deep beams were tested under two symmetric loading-points. Test results showed that the shear behavior of deep beams with web openings was influenced by a/h and the size of opening. In addition, the KCI shear design provision is a tendency to be more unconservative according to the increase in a/h and the area-ratio of opening to shear span(Ao/Ash). Based on the concrete strut action of top and bottom member of an opening and the tie action of longitudinal reinforcement, a proper design equation which closely predicts the capacity of deep beams with rectangular openings is developed.

An Area-Efficient Design of Merged TEA Block Cipher for Mobile Security (모바일 보안용 병합 TEA 블록 암호의 면적 효율적인 설계)

  • Sonh, Seungil;Kang, Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.11-19
    • /
    • 2020
  • In this paper, a merged TEA block cipher processor which unifies Tiny Encryption Algorithm(TEA), extended Tiny Encryption Algorithm(XTEA) and corrected block TEA(XXTEA) is designed. After TEA cipher algorithm was first designed, XTEA and XXTEA cipher algorithms were designed to correct security weakness. Three types of cipher algorithm uses a 128-bit master key. The designed cipher processor can encrypt or decrypt 64-bit message block for TEA/XTEA and variable-length message blocks up to 256-bit for XXTEA. The maximum throughput for 64-bit message blocks is 137Mbps and that of 256-bit message blocks is 369Mbps. The merged TEA block cipher designed in this paper has a 16% gain on the area side compared to a lightweight LEA cipher. The cryptographic IP of this paper is applicable in security module of the mobile areas such as smart card, internet banking, and e-commerce.

Symmetry Analysis of Interconnection Networks and Impolementation of Drawing System (상호연결망의 대칭성분석 및 드로잉 시스템 구현)

  • Lee, Yun-Hui;Hong, Seok-Hui;Lee, Sang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1353-1362
    • /
    • 1999
  • 그래프 드로잉이란 추상적인 그래프를 시각적으로 구성하여 2차원 평면상에 그려주는 작업으로 대칭성은 그래프 드로잉시 고려해야 하는 미적 기준들 중에서 그래프의 구조 및 특성을 표현해주는 가장 중요한 기준이다. 그러나 일반 그래프에서 대칭성을 찾아 그려 주는 문제는 NP-hard로 증명이 되어 있기 때문에 현재까지는 트리, 외부평면 그래프, 직병렬 유향 그래프나 평면 그래프 등으로 대상을 한정시켜 연구가 진행되어 왔다. 본 논문에서는 병렬 컴퓨터나 컴퓨터 네트워크 구조를 가시화 시키기 위하여 많이 사용되는 그래프인 상호연결망(interconnection network)의 대칭성을 분석하고 분석된 대칭성을 최대로 보여주는 대칭 드로잉 알고리즘을 제안하였다. 그리고 이를 기반으로 하여 상호연결망의 기존 드로잉 방법들과 본 논문에서 제안한 대칭 드로잉 등 다양한 드로잉을 지원하는 WWW 기반의 상호연결망 드로잉 시스템을 구현하였다.Abstract Graph drawing is constructing a visually-informative drawing of an abstract graph. Symmetry is one of the most important aesthetic criteria that clearly reveals the structures and the properties of graphs. However, the problem of finding geometric symmetry in general graphs is NP-hard. So the previous work has focused on the subclasses of general graphs such as trees, outerplanar graphs, series-parallel digraphs and planar graphs.In this paper, we analyze the geometric symmetry on the various interconnection networks which have many applications in the design of computer networks, parallel computer architectures and other fields of computer science. Based on these analysis, we develope algorithms for constructing the drawings of interconnection networks which show the maximal symmetries.We also design and implement Interconnection Network Drawing System (INDS) on WWW which supports the various drawings including the conventional drawings and our suggested symmetric drawings.

Analysis of Delta-V Losses During Lunar Capture Sequence Using Finite Thrust

  • Song, Young-Joo;Park, Sang-Young;Kim, Hae-Dong;Lee, Joo-Hee;Sim, Eun-Sup
    • Journal of Astronomy and Space Sciences
    • /
    • v.28 no.3
    • /
    • pp.203-216
    • /
    • 2011
  • To prepare for a future Korean lunar orbiter mission, semi-optimal lunar capture orbits using finite thrust are designed and analyzed. Finite burn delta-V losses during lunar capture sequence are also analyzed by comparing those with values derived with impulsive thrusts in previous research. To design a hypothetical lunar capture sequence, two different intermediate capture orbits having orbital periods of about 12 hours and 3.5 hours are assumed, and final mission operation orbit around the Moon is assumed to be 100 km altitude with 90 degree of inclination. For the performance of the on-board thruster, three different performances (150 N with $I_{sp}$ of 200 seconds, 300 N with $I_{sp}$ of 250 seconds, 450 N with $I_{sp}$ of 300 seconds) are assumed, to provide a broad range of estimates of delta-V losses. As expected, it is found that the finite burn-arc sweeps almost symmetric orbital portions with respect to the perilune vector to minimize the delta-Vs required to achieve the final orbit. In addition, a difference of up to about 2% delta-V can occur during the lunar capture sequences with the use of assumed engine configurations, compared to scenarios with impulsive thrust. However, these delta-V losses will differ for every assumed lunar explorer's on-board thrust capability. Therefore, at the early stage of mission planning, careful consideration must be made while estimating mission budgets, particularly if the preliminary mission studies were assumed using impulsive thrust. The results provided in this paper are expected to lead to further progress in the design field of Korea's lunar orbiter mission, particularly the lunar capture sequences using finite thrust.

EM Algorithm for Designing Soft-Decision Binary Error Correction Codes of MLC NAND Flash Memory (멀티 레벨 낸드 플래시 메모리용 연판정 복호를 수행하는 이진 ECC 설계를 위한 EM 알고리즘)

  • Kim, Sung-Rae;Shin, Dong-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.3
    • /
    • pp.127-139
    • /
    • 2014
  • In this paper, we present two signal processing techniques for designing binary error correction codes for Multi-Level Cell(MLC) NAND flash memory. MLC NAND flash memory saves the non-binary symbol at each cell and shows asymmetric channel LLR l-density which makes it difficult to design soft-decision binary error correction codes such as LDPC codes and Polar codes. Therefore, we apply density mirroring and EM algorithm for approximating the MLC NAND flash memory channel to the binary-input memoryless channel. The density mirroring processes channel LLRs to satisfy roughly all-zero codeword assumption, and then EM algorithm is applied to l-density after density mirroring for approximating it to mixture of symmetric Gaussian densities. These two signal processing techniques make it possible to use conventional code design algorithms, such as density evolution and EXIT chart, for MLC NAND flash memory channel.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

Detection of Colluded Multimedia Fingerprint by Neural Network (신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.80-87
    • /
    • 2006
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic inform on using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before recontributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the hopfield neural network using (n,k)code designing for the error bits correction confirmed that can correct error within 2bits.

Effects of Symmetrically Arranged Heat Sources on the Heat Release Performance of Extruded-Type Heat Sinks (열원의 대칭 배열에 따른 압출형 히트싱크의 방열성능 연구)

  • Ku, Min Ye;Shin, Hon Chung;Lee, Gyo Woo
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.40 no.2
    • /
    • pp.119-126
    • /
    • 2016
  • In this study we investigated the effects of symmetrically arranged heat sources on the heat release performances of extruded-type heat sinks through experiments and thermal fluid simulations. Also, based on the results we suggested a high-efficiency and cost-effective heat sink for a solar inverter cooling system. In this parametric study, the temperatures between heaters on the base plate and the heat release rates were investigated with respect to the arrangements of heat sources and amounts of heat input. Based on the results we believe that the use of both sides of the heat sink is the preferred method for releasing the heat from the heat source to the ambient environment rather than the use of a single side of the heat sink. Also from the results, it is believed that the symmetric arrangement of the heat sources is recommended to achieve a higher rate of heat transfer. From the results of the thermal fluid simulation, it was possible to confirm the qualitative agreement with the experimental results. Finally, quantitative comparison with respect to mass flow rates, heat inputs, and arrangements of the heat source was also performed.