• 제목/요약/키워드: Campus Network

검색결과 295건 처리시간 0.035초

Sustainable controlled low-strength material: Plastic properties and strength optimization

  • Mohd Azrizal, Fauzi;Mohd Fadzil, Arshad;Noorsuhada Md, Nor;Ezliana, Ghazali
    • Computers and Concrete
    • /
    • 제30권6호
    • /
    • pp.393-407
    • /
    • 2022
  • Due to the enormous cement content, pozzolanic materials, and the use of different aggregates, sustainable controlled low-strength material (CLSM) has a higher material cost than conventional concrete and sustainable construction issues. However, by selecting appropriate materials and formulations, as well as cement and aggregate content, whitethorn costs can be reduced while having a positive environmental impact. This research explores the desire to optimize plastic properties and 28-day unconfined compressive strength (UCS) of CLSM containing powder content from unprocessed-fly ash (u-FA) and recycled fine aggregate (RFA). The mixtures' input parameters consist of water-to-cementitious material ratio (W/CM), fly ash-to-cementitious materials (FA/CM), and paste volume percentage (PV%), while flowability, bleeding, segregation index, and 28-day UCS were the desired responses. The central composite design (CCD) notion was used to produce twenty CLSM mixes and was experimentally validated using MATLAB by an Artificial Neural Network (ANN). Variance analysis (ANOVA) was used for the determination of statistical models. Results revealed that the plastic properties of CLSM improve with the FA/CM rise when the strength declines for 28 days-with an increase in FA/CM, the diameter of the flowability and bleeding decreased. Meanwhile, the u-FA's rise strengthens the CLSM's segregation resistance and raises its strength over 28 days. Using calcareous powder as a substitute for cement has a detrimental effect on bleeding, and 28-day UCS increases segregation resistance. The response surface method (RSM) can establish high correlations between responses and the constituent materials of sustainable CLSM, and the optimal values of variables can be measured to achieve the desired response properties.

Design and Implementation of the Recording Processing Supporting System using RFID

  • Baek, Mi-Hye;Kim, Bong-Gi;Kim, Hyun-Ju
    • Journal of information and communication convergence engineering
    • /
    • 제9권6호
    • /
    • pp.629-632
    • /
    • 2011
  • RFID technology is one of the verification technology that use radio frequency. Use and study of RFID are on the increase because RFID is a one of main technologies in ubiquitous. In this paper, we address to develop a Record Processing System using RFID. The purpose of this paper is improvement of accuracy and efficiency on Record Processing System by applying RFID. Later, this paper will be able to help to establish of u-Campus.

Energy Efficient Routing in Wireless Sensor Networks

  • Cho, Seongsoo;Shrestha, Bhanu;Shrestha, Surendra;Lee, Jong-Yong;Hong, Suck-Joo
    • International journal of advanced smart convergence
    • /
    • 제3권2호
    • /
    • pp.1-5
    • /
    • 2014
  • Sensor nodes depend on batteries for energy source in Wireless Sensor Networks (WSNs). Low Energy Adaptive Clustering Hierarchy (LEACH) is a representative cluster-based routing protocol designed to ensure energy use efficiency whereas the virtual cluster exchange routing (VCR) information only with its closest node to build a network. In this paper, a protocol scheme was proposed wherein member nodes are designed to compare the currently sensed data with the previously sensed one and to switch to sleep mode when a match is achieved. The design is to help improve the transmission energy efficiency too.

안전한 대학 전산망 운영을 위한 취약점 분석 시스템 설계 및 구현 (Design and Implementation of Vulnerability Analysis System of Secure Campus Network Operations)

  • 정성용;이재명;황윤철;이상호
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2002년도 봄 학술발표논문집 Vol.29 No.1 (A)
    • /
    • pp.883-885
    • /
    • 2002
  • 오늘날 인터넷 기술이 급격한 성장과, 인터넷을 통한 조직과 개인의 사회적 활동의 증가에 따라 인터넷에 대한 우리의 생활 의존도가 점차로 커지고 있으며 이에 따른 역작용으로 침해사고 및 정보의 유출, 파괴, 서비스방해, 위조, 변조 등의 컴퓨터범죄가 날로 증가하여 심가한 사회문제로 대두되고 있다. 사이버 공간에서 전산망을 보호하기 위해서 사용자 인증, 무결성 점검, 침입탐지, 파이어 월 등 다양한 기술이 사용되고 있다, 하지만 가장 우선시 되어야 하는 것은 공격의 목표가 되는 시스템의 보안 취약점을 찾아내고 이를 제거하는 작업이라고 할 수 있다, 이 논문에서는 대학 전산망의 확대와 해킹기술은 급속히 발달하고 있지만 이에 비해 대학 전산망 보호를 위한 보안장비 및 관리자/사용자들의 보안 지식 및 기술은 절대적으로 부족한 실정을 감안해서, 내부 사용자들이 자신의 취약점을 쉽게 점검 및 해결할 수 있고, 관리자들이 전산망의 취약점을 파악하는데 효과적인 시스템을 제안한다.

  • PDF

Neural network based model for seismic assessment of existing RC buildings

  • Caglar, Naci;Garip, Zehra Sule
    • Computers and Concrete
    • /
    • 제12권2호
    • /
    • pp.229-241
    • /
    • 2013
  • The objective of this study is to reveal the sufficiency of neural networks (NN) as a securer, quicker, more robust and reliable method to be used in seismic assessment of existing reinforced concrete buildings. The NN based approach is applied as an alternative method to determine the seismic performance of each existing RC buildings, in terms of damage level. In the application of the NN, a multilayer perceptron (MLP) with a back-propagation (BP) algorithm is employed using a scaled conjugate gradient. NN based model wasd eveloped, trained and tested through a based MATLAB program. The database of this model was developed by using a statistical procedure called P25 method. The NN based model was also proved by verification set constituting of real existing RC buildings exposed to 2003 Bingol earthquake. It is demonstrated that the NN based approach is highly successful and can be used as an alternative method to determine the seismic performance of each existing RC buildings.

기후변화에 따른 해양생태계 변화와 어업 (Changes in Marine Ecosystem according to Climate Change and Fishery)

  • 홍선기
    • 생태와환경
    • /
    • 제47권4호
    • /
    • pp.302-311
    • /
    • 2014
  • Global climate change is significant issue in marine ecosystem and fishery market. According to rising of both seawater temperature and sea-level, global fishery environment and marine ecosystem are changing drastically. Moreover, over-exploitation in fishery areas is the most important issue in the marine ecosystem conservation. In analysis and statistics of global network, major fish populations are decreasing very fastly, but fish catch are increasing annually. It means balance between product and consume is not appropriate in the global market. China as emerging new fish consumer in the world is strongly developing fishery industry and technology. In this paper, I try to review a relationship between marine ecosystem and climate change in global scale according to references. I also suggested possibility of sustainable global fishery in changing marine ecosystem by analysis of some related reports of international global fishery.

캠퍼스 네트웍에 IPv6 망 구현에 관한 연구 (A Study on Implementation of IPv6 for Campus Network)

  • 고봉구;이중열
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.1385-1388
    • /
    • 2005
  • 1998 년 IETF 에서 표준화 된 IPv6 의 도입은 시기에 대한 의견이 분분하지만 IPv4 의 주소 부족을 해결하기 위해 향후 도입하게 될 것이다. 그래서 본 논문에서는 차세대 인터넷 프로토콜인 IPv6의 기본적인 주소구조와 특징, IPv4 와 IPv6 를 비교 설명하였고 실제로 IPv6 망을 구현하기 위해 IPv6 주소 신청절차, 라우터 설정방법, 두 가지 OS(윈도우와 리눅스)의 호스트 설정방법 등을 기술하였으며 전북대학교와 KreoNet 과의 IPv6 망 구현결과를 제시하였다.

  • PDF

A Privacy Preserving Authentication Mechanism for Wireless Mesh Networks

  • Islam, Shariful;Hamid, Abdul;Hong, Choong-Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2007년도 가을 학술발표논문집 Vol.34 No.2 (D)
    • /
    • pp.556-559
    • /
    • 2007
  • Due to its ease of deployment, low cost, self-configuring and self-healing capabilities, Wireless Mesh Networks (WMNs) have emerged as a key technology to be used in a wide scale applications in personal, local, campus, and metropolitan areas. Security and more specifically privacy is an important issue in this type of multi-hop WMN which has given a little attention in the research community. We focus on privacy compromise of a mesh client in a community mesh network that may lead an attacker to reveal mesh clients identity. his other profiles and gain information about mobility. In this paper. we have presented an authentication mechanism with the aid of blind signature that ensures a mesh client to anonymously authenticate itself with a nearby mesh router and thereby preserve identity privacy We have also presented the security and performance analysis of the proposed scheme.

  • PDF

캠퍼스 네트워크의 구성 및 성능분석 자동화 방법론 (A Study on the Automated Methodology for Campus Network Design and Performance Analysis)

  • 이종근
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 1998년도 The Korea Society for Simulation 98 춘계학술대회 논문집
    • /
    • pp.21-26
    • /
    • 1998
  • 본 연구는 Zeigler가 제시한 DEVS 모델링 및 시뮬레이션 방법론에 전문가 시스템 및 기호적 시뮬레이션기법등 다양한 추론기법들을 결합시킴에 의해, 캠퍼스 네트워크의 설계 및 성능분석 자동화 방법론과 도구의 개발을 주 목적으로 한다. 이를 위하여, 본 연구에서는 SES/MB를 이용하여 정보시스템의 구성설계 및 성능분석 자동화 방법론을 제시하였고, 캠퍼스 네트워크에 대한 사례 연구를 통하여 그 적용 가능성을 검토하였다. 기존의 연구들과의 차별성은 다음과 같이 요약된다; 첫째, 구성 전문가의 지식베이스를 활용한 구성 설계 자동화, 둘째, 해석적 기법이 아닌 시뮬레이션 기법을 이용한 성능분석, 셋째, 요구조전 및 제약조건들에 따른 행동궤적의 자동생성 및 이를 이용한 성능분석 자동화등을 들 수 있다.

  • PDF

A Study on the Isolated Cloud Security Using Next Generation Network

  • Park, Jae-Kyung;Lee, Won Joo;Lee, Kang-Ho
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권11호
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we propose to present a model of cloud security that has emerged as the biggest topic of cloud computing, replacing the traditional IT environment. While cloud computing is an extension of existing IT technology, security issues and threats can be applied to traditional security technologies. However, the biggest difference between a typical computing environment and a cloud computing environment is a virtualized environment with a hypervisor. Currently, there are many weaknesses in the virtualized environment, and there are few related security products. In order for a cloud computing environment to function as a reliable IT environment, we expect more research on hypervisor-based security technologies, and we expect to secure safer cloud services through a secure model over the next generation of new-based networks.