• Title/Summary/Keyword: Make up techniques

Search Result 237, Processing Time 0.028 seconds

Green ICT framework to reduce carbon footprints in universities

  • Uddin, Mueen;Okai, Safiya;Saba, Tanzila
    • Advances in Energy Research
    • /
    • v.5 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The world today has reached a certain level where it is impossible to get the quality education at the tertiary level without the use of Information and Communication Technology (ICT). ICT has made life better, communication easier and faster, teaching and learning more practical through computers and other technology based learning tools. However, despite these benefits ICT has equally contributed immensely to environmental problems. Therefore there is the need to use ICT resources efficiently in universities for environmental sustainability so as to save both the university environment and the world at large from the effects of global warming. This paper evaluates the carbon footprints from the use of ICT devices and comes up with a proposed green ICT framework to reduce the carbon footprints in universities. The framework contains techniques and approaches to achieve greenness in the data center, personal computers (PCs) and monitors, and printing in order to make ICT more environmentally friendly, cheaper, safer and ultimately more efficient. Concerned experts in their respective departments at Asia Pacific University of Technology and Innovation (APU) Malaysia evaluated the proposed framework. It was found to be effective for achieving efficiency, reducing energy consumption and carbon emissions.

Implementation of Virtual Laboratory Based on the Internet (인터넷 기반 가상실험실의 구현)

  • Joo, Young-Hoon;Kim, Moon-Hwan;Lee, Ho-Jae;Park, Jin-Bae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.448-454
    • /
    • 2003
  • This paper concerns the establishment of the Internet-based virtual laboratory (VL). In control engineering, it is required to evaluate the feasibility of a newly developed controller design technique by applying to a physical system. However, it is inefficient to make or build such a experimental apparatus in all research activities. A possible remedy is to share such a apparatus spatially via the Internet. We set up techniques for the remote -control of various experimental apparatuses based on the Internet. The proposed VL forms a server-client structure and is implemented in multi-control interfaces.

A Study on the Relationship between Degree of Rust Condition and Bond Strength in Reinforced Concrete Members (철근의 부식정도와 부착강도에 대한 연구)

  • 유환구;이병덕;김국한;안태송
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1998.04b
    • /
    • pp.621-626
    • /
    • 1998
  • An experimental investigation on the reinforcing bar corrosion and relationshid of reinforcing bar and concrete bond strength has been conducted to establish the allowable limit of rust in the construction field. The reinforcing bars used in this study were rusted before embedding in concrete. The first component of this experiment is to make rust of reinforcing bar rust artificially based on Faraday's theory at certain rates such as 2, 4, 6, 8 and 10% of reinforcing bar weight. For estimation of the amount of rust by weight, Clarke's solution and Shot blasting were adopted and compared. Parameters include 240 and 450kg/㎠ of compressive strengths and diameter of reinforcing bar (16, 19 and 25mm) corresponding development length for pull-ort test. And, pull-out tests were carried. out according to KSF 2441 and ASTMC 234 to investigate the effect of the corrosion rate on reinforcing bar-concrete bond behavior. It is found from the test results that the test techniques for corrosion of bar used in this study is relatively effective and correct test method. Results shows that up to 2% of rust increases the bond strength regardless of concrete strength and diameter of reinforcing bar like the existing data. It might be because of the roughness from rust. As expected, the bond strength increases as compressive strength of concrete increases and the diameter of bar decreases.

  • PDF

A Study of Implementation of Analog Slope Equalizer and Its System Performance for Digital Radio Relay System (디지털 무선중계 장치의 아날로그 기울기 등화기 구현 및 시스템 성능에 대한 연구)

  • 서경환
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.11
    • /
    • pp.1034-1042
    • /
    • 2004
  • In this paper, as one of countermeasure techniques for a frequency selective fading, an adaptive analog slope equalizer(ASE) applicable to 64-QAM digital radio relay system is presented in terms of principle, implementation, and its performance. Also interference of cross-talk between I- and Q-channel caused by a fiequency selective lading has been analyzed by doing channel model in the baseband, which make it possible to derive the solution for implementing ASE in If-band. The effects of signal for the faded channel are investigated in the time and the frequency domains, respectively, with/without ASE. As system performance, it is shown that the signature is improved up to 6.2 dB at the edge of signal bandwidth for a given BER 10$\^$-3/.

Crowdsourcing Identification of License Violations

  • Lee, Sanghoon;German, Daniel M.;Hwang, Seung-won;Kim, Sunghun
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.4
    • /
    • pp.190-203
    • /
    • 2015
  • Free and open source software (FOSS) has created a large pool of source codes that can be easily copied to create new applications. However, a copy should preserve copyright notice and license of the original file unless the license explicitly permits such a change. Through software evolution, it is challenging to keep original licenses or choose proper licenses. As a result, there are many potential license violations. Despite the fact that violations can have high impact on protecting copyright, identification of violations is highly complex. It relies on manual inspections by experts. However, such inspection cannot be scaled up with open source software released daily worldwide. To make this process scalable, we propose the following two methods: use machine-based algorithms to narrow down the potential violations; and guide non-experts to manually inspect violations. Using the first method, we found 219 projects (76.6%) with potential violations. Using the second method, we show that the accuracy of crowds is comparable to that of experts. Our techniques might help developers identify potential violations, understand the causes, and resolve these violations.

Technical Trend Analysis for UCC Video Service (UCC 동영상 서비스를 위한 기술 동향 분석)

  • Kwak, nae-joung;Lee, hyen-tae;Min, byeong-won;Oh, yong-sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.795-798
    • /
    • 2007
  • Due to advance of communication environment and storage media, economics at home and abroad gets changed to active consumption environment to make digital contents by oneself and to consume ones. Specially UCC to be made by a user has been generating the various effects enough to be a issue in all the world. UCC multimedia among UCC quickly emerges as a core of crustal movement of Internet and so does an enterprise to concentrate his efforts on UCC multimedia. In this paper, we analyze the technical trend for UCC multimedia service and review the base techniques. Throught these studies, we bring up the growing direction for development of UCC service at the future.

  • PDF

Analysis Techniques for Accident Causes of Subcontract Work at Construction Site (전문 건설공사 재해원인 분석 기법에 관한 연구)

  • Son, Ki-Sang;Rhee, Kyung-Yong;Gal, Won-Mo
    • Journal of the Korean Society of Safety
    • /
    • v.24 no.5
    • /
    • pp.34-42
    • /
    • 2009
  • There are many accident causes related to even an accident. As well four(4) stepped causes of one accident at construction sites are analyzed in the study. First, eleven(11) cause factors are set up at each step such as policy level, management, indirect, direct level which are discussed and determined by field experts with 15year experience or more. Therefore, one direct cause occurred in construction site can be connected to the previous cause than in direct and management, and policy problem of previous management. These questionnaires results are analyzed with three different methods such as weighing level by Delphi technique, correlation analysis, critical pass method. Three different methods show their characteristic to see which subcontract work is more dangerous or not. Subcontract or at a construction site can be use the above three different cases as they need at their site in order to make more effective countermeasures.

A Study on Islandig Characteristics using Phase Angle Adjustment of Distributed Generation (배전계통연계 분산전원의 위상변화에 따른 고립운전 파라미터 특성)

  • Bang, Ji-Yoon;Kim, Hak-Man;Lee, Bock-Ku;Sim, Jae-Sun;Shin, Myong-Chul
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.525-526
    • /
    • 2006
  • Recently, much research has been done and many improvements have been developed for islanding protection of distributed generation(DG). Anti-islanding protection for DG must be act very quickly to prevent equipment damage at the time of disconnection and for the safety of maintenance and repair personnel. DG-based detection methods have included both passive and active types, and now research has shifted towards new anti-islanding detection methods that make up for the defects of the previous types. Because differences occur between the utility grid and the DG when connecting and disconnecting depending on the phase difference, voltage, current, relative capacity of electric power, and system operation characteristics, voltage phase angle is an important consideration. In this paper, we simulated islanded operation characteristics comparing phase difference of DG and the connected utility grid, and analyzed various parameters (real power, reactive power, RMS voltage, RMS current, power factor angle, and frequency) by varying the DG's voltage phase angle. Using this information, we propose a suitable DG voltage phase angle for enhanced passive islanding detection techniques.

  • PDF

Examining the Potentialities for Building Fisheries Cluster in Regional Level (지역별 수산업 클러스터 형성가능성 검토)

  • Choe, Sung-Ae;Chae, Dong-Ryul
    • The Journal of Fisheries Business Administration
    • /
    • v.40 no.3
    • /
    • pp.1-28
    • /
    • 2009
  • In recent, the Korean fisheries industry face an overall crisis. Annual fish catch is continuously decreasing for last two decades even though various programs to improve fish population. Moreover, domestic fish market is more and more occupied by imported cheap fish products from abroad due to the consequence of open economic policy, FTA and WTO/DDA entente. Under the circumstances, this study aims to examine the potential for building fisheries cluster as a policy tool to promote fisheries and fisheries-associated industries in Korea. To achieve this goal, the authors firstly reviewed the theoretical concept of Industrial Cluster in the evolutionary economics point of view, secondly, analyzed the main components of Porterian Cluster(or innovation cluster), thirdly, derived the key reasons to induce the improvement of productivity within the cluster network system and lastly evaluated fisheries capability and industrial infrastructures of each province as a basic condition to build a fisheries cluster. The result of the study demonstrates the voluntary accumulation of fish products and processing techniques in Korea, however, it is not enough to make up a Porterian innovation. Therefore, the present is most opportune for applying fisheries cluster as a strategic policy tool. Government supports to establish innovation cluster for fisheries may contribute both fisheries industry and local economy by developing the latent capacity of fisheries and helping concentrate innovation capabilities.

  • PDF

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF