• Title/Summary/Keyword: Open Approach

Search Result 1,470, Processing Time 0.03 seconds

Hydrothermal Synthesis of Fe Based MOFs with Energy Economy Approach

  • Israr, Farrukh;Kim, Duk Kyung;Kim, Yeongmin;Oh, Seung Jin;Ng, Kim Choon;Chun, Wongee
    • Journal of Energy Engineering
    • /
    • v.24 no.2
    • /
    • pp.55-58
    • /
    • 2015
  • The mesoporous metal organic framework structure Fe-BTC was successfully synthesized by hydrothermal process with noticeable yield. The synthesis operation was conducted at intermediate temperature and for shortened operation time as compared to conventional procedures. This process approach with reduced operating temperature and shortened operation time may open an opportunity window towards process economy with reduction in energy consumption. A simple mathematical approach of diffraction indexing using X-ray diffraction patterns of synthesized powder was employed to confirm its crystalline nature and to investigate its high temperature stability. The crystallite size was calculated by using Debye-Scherrer equation.

Trend-Casting in the Interactive Digital Media Industry: Some Results and Guidelines

  • Sharma, Ravi S.;Yi, Yang
    • Asian Journal of Innovation and Policy
    • /
    • v.2 no.1
    • /
    • pp.20-36
    • /
    • 2013
  • In this practice article, we present the results of a scenario planning approach that is a hybrid of the three main schools of thought. Our research objective was to study the future of Interactive Digital Media applications such as online music, on-demand television and massively multi-player online role-playing games. Our approach, while essentially qualitative in nature, nevertheless draws from the rigors of the quantitative school in identifying and then tracking the significant dimensions of analysis that emerge over time as strands of events leading to plausible scenarios. Our empirical analysis revealed mapping strands to three themes - ownership, distribution and innovation - which we used in an expert validation exercise to formulate scenarios. We present and discuss the major findings and implications of this empirical investigation. In a nutshell, we conjecture that an open, competitive IDM marketplace with performance safeguards may serve both and lead to a win-win scenario. While there are differences among IDM sectors, a unified approach to regulation and policy would be effective.

Ligation of Thoracic Duct Via Extrapleural Approach for the Treatment of Chylothorax - Report of 1 case- (유미흉에서 늑막외층 접근법을 통한 흉관 결찰술 -치험 1예-)

  • 김성완;김덕실
    • Journal of Chest Surgery
    • /
    • v.36 no.11
    • /
    • pp.883-885
    • /
    • 2003
  • Traditional surgical management of chylothorax refractory to conservative treatment is thoracic duct ligation through a right open thoracotomy. A new surgical procedure of ligation of the thoracic duct via extrapleural approach is presented. Its advantages are less invasive, no need of a new drainage tube, and easier to expose the thoracic duct than the conventional transthoracic approach. We experienced a new surgical method in the treatment of the chylothorax and report it with literatures.

A GUI-based Approach to Software Modularization

  • Park, Dongmin;Seo, Yeong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.97-106
    • /
    • 2018
  • Software maintenance activities have always been important issues in many domains of the software industry. In order to help to resolve this issue, software modularization approaches have been studied to build adequate modules with high cohesion and low coupling; such modular structures can help the comprehension and maintenance of complex systems. In this paper, we propose a GUI-based automated approach for software modularization based on GUI structure analysis. GUI is a principal manner to allow users to access the overall functionalities of a software system; in particular, GUI is closely related to software functionalities, which makes it a promising tool to identify and understand the entire software system. We also implement a software tool to support our approach and evaluate it with a case study using an open source software.

Exact analysis of bi-directional functionally graded beams with arbitrary boundary conditions via the symplectic approach

  • Zhao, Li;Zhu, Jun;Wen, Xiao D.
    • Structural Engineering and Mechanics
    • /
    • v.59 no.1
    • /
    • pp.101-122
    • /
    • 2016
  • Elasticity solutions for bi-directional functionally graded beams subjected to arbitrary lateral loads are conducted, with emphasis on the end effects. The material is considered macroscopically isotropic, with Young's modulus varying exponentially in both axial and thickness directions, while Poisson's ratio remaining constant. In order to obtain an exact analysis of stress and displacement fields, the symplectic analysis based on Hamiltonian state space approach is employed. The capability of the symplectic framework for exact analysis of bi-directional functionally graded beams has been validated by comparing numerical results with corresponding ones in open literature. Numerical results are provided to demonstrate the influences of the material gradations on localized stress distributions. Thus, the material properties of the bi-directional functionally graded beam can be tailored for the potential practical purpose by choosing suitable graded indices.

Classification of Network Traffic using Machine Learning for Software Defined Networks

  • Muhammad Shahzad Haroon;Husnain Mansoor
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.91-100
    • /
    • 2023
  • As SDN devices and systems hit the market, security in SDN must be raised on the agenda. SDN has become an interesting area in both academics and industry. SDN promises many benefits which attract many IT managers and Leading IT companies which motivates them to switch to SDN. Over the last three decades, network attacks becoming more sophisticated and complex to detect. The goal is to study how traffic information can be extracted from an SDN controller and open virtual switches (OVS) using SDN mechanisms. The testbed environment is created using the RYU controller and Mininet. The extracted information is further used to detect these attacks efficiently using a machine learning approach. To use the Machine learning approach, a dataset is required. Currently, a public SDN based dataset is not available. In this paper, SDN based dataset is created which include legitimate and non-legitimate traffic. Classification is divided into two categories: binary and multiclass classification. Traffic has been classified with or without dimension reduction techniques like PCA and LDA. Our approach provides 98.58% of accuracy using a random forest algorithm.

Multiclass Botnet Detection and Countermeasures Selection

  • Farhan Tariq;Shamim baig
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.205-211
    • /
    • 2024
  • The increasing number of botnet attacks incorporating new evasion techniques making it infeasible to completely secure complex computer network system. The botnet infections are likely to be happen, the timely detection and response to these infections helps to stop attackers before any damage is done. The current practice in traditional IP networks require manual intervention to response to any detected malicious infection. This manual response process is more probable to delay and increase the risk of damage. To automate this manual process, this paper proposes to automatically select relevant countermeasures for detected botnet infection. The propose approach uses the concept of flow trace to detect botnet behavior patterns from current and historical network activity. The approach uses the multiclass machine learning based approach to detect and classify the botnet activity into IRC, HTTP, and P2P botnet. This classification helps to calculate the risk score of the detected botnet infection. The relevant countermeasures selected from available pool based on risk score of detected infection.

Seismic vulnerability assessment of confined masonry buildings based on ESDOF

  • Ranjbaran, Fariman;Kiyani, Amir Reza
    • Earthquakes and Structures
    • /
    • v.12 no.5
    • /
    • pp.489-499
    • /
    • 2017
  • The effects of past earthquakes have demonstrated the seismic vulnerability of confined masonry structures (CMSs) to earthquakes. The results of experimental analysis indicate that damage to these structures depends on lateral displacement applied to the walls. Seismic evaluation lacks an analytical approach because of the complexity of the behavior of this type of structure; an empirical approach is often used for this purpose. Seismic assessment and risk analysis of CMSs, especially in area have a large number of such buildings is difficult and could be riddled with error. The present study used analytical and numerical models to develop a simplified nonlinear displacement-based approach for seismic assessment of a CMS. The methodology is based on the concept of ESDOF and displacement demand and is compared with displacement capacity at the characteristic period of vibration according to performance level. Displacement demand was identified using the nonlinear displacement spectrum for a specified limit state. This approach is based on a macro model and nonlinear incremental dynamic analysis of a 3D prototype structure taking into account uncertainty of the mechanical properties and results in a simple, precise method for seismic assessment of a CMS. To validate the approach, a case study was considered in the form of an analytical fragility curve which was then compared with the precise method.

Retromandibular approach for the management of subcondylar fractures, followed by treatment of parotid gland fistulae: Case report (하악 과두하 골절시 후하악 접근법에 의한 수술 후 발생한 이하선 누공 형성과 이에 대한 치료 증례)

  • Ro, Jae-Chan;Kim, Ju-Won;Yang, Byoung-Eun
    • The Journal of the Korean dental association
    • /
    • v.55 no.10
    • /
    • pp.696-705
    • /
    • 2017
  • Condylar fractures account for one-third of all mandibular fractures. There are many surgical methods for the open reduction of condylar fractures, such as the transoral, submandibular, preauricular, and retromandibular approaches. Two patients suffering from condylar fractures, a 45-year-old man and a 25-year-old man, were admitted to our hospital. Both patients' condylar fractures were positioned too high for us to use the transoral approach. Therefore, we employed the retromandibular method to expedite the approach to the fracture site and minimize the size of the incision. After the surgical procedures in both cases, we experienced complications in the form of parotid gland fistulae, which rarely result from the retromandibular approach. A combination of botulinum toxin injection and amitriptyline medication was effective for the management of these parotid gland fistulae. Here, we report these two cases and offer a review of the literature on this article.

  • PDF

Left-Side Surgical Approach to Mitral Valve in Dog Cadaver Study

  • Moon, Jeong-hyeon;Hwang, Byungmoon;Kim, Daesik;Jung, Sunjun;Ha, Yongsu;Lee, Kicahng;Kim, Namsoo;KIM, Min-su
    • Journal of Veterinary Clinics
    • /
    • v.35 no.1
    • /
    • pp.10-12
    • /
    • 2018
  • Mitral regurgitation is the most frequent cause of cardiac disability and death in dogs. A wide range of medical and surgical treatments have been used for mitral regurgitation. Surgical treatments for complete correction of mitral regurgitation include valve repair and valve replacement, which have the advantages of eliminating or correcting the primary cause. Surgical treatments approach the mitral valve via right- or left-side thoracotomy. Aortic root exposure is needed for cardiopulmonary bypass. To compare right-side and left-side approaches, 10 dog cadavers were used in this study. Subsequently, the left-side surgical approach was used in vivo and in conjunction with cardiopulmonary bypass and cardioplegic arrest. Based on the results, and considering ease of access to the aortic root, valve incision site, and visualization of the surgical field, a left-side approach is recommended.