• Title/Summary/Keyword: Perimeter

Search Result 496, Processing Time 0.029 seconds

Cascade Perimeter Defence Model in Multiple VPN Environment (다중 VPN 환경에서의 분산 Perimeter defence 모델에 관한 연구)

  • Lim, Hyung-J.;Kim, Tae-Kyung;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.81-88
    • /
    • 2004
  • This paper analyzed the proper methods to solve the security problems of establishing trust zone which is changed by security policy in large scale networks containing multiple VPNs. Therefore, we surveyed the vulnerability of VPN technologies, it analyzed various models suitable for trust zone. By simulations of various models, we Propose the cascade perimeter defence policy model having the neit as such an efficient transit cost and the strictly isolation for trust tone. This model can protect the trust zone from the public network by dividing the trust Tone according to each VPN group and it shows the better transit performance by cascading the position of perimeter defence policy.

Effects of Perimeter to Core Connectivity on Tall Building Behavior

  • Besjak, Charles;Biswas, Preetam;Petrov, Georgi I.;Streeter, Matthew;Devin, Austin
    • International Journal of High-Rise Buildings
    • /
    • v.6 no.1
    • /
    • pp.1-9
    • /
    • 2017
  • The Pertamina Energy Tower (PET) and Manhattan West North Tower (MWNT) are two supertall towers recently designed and engineered by Skidmore, Owings & Merrill (SOM). The structural system for both buildings consists of an interior reinforced concrete core and a perimeter moment frame system, which is primarily structural steel. As is typical for tall towers with both concrete and steel elements, staged construction analysis was performed in order to account for the long term effects of creep and shrinkage, which result in differential shortening between the interior concrete core and steel perimeter frame. The particular design of each tower represents two extremes of behavior; PET has a robust connection between the perimeter and core in the form of three sets of outriggers, while the perimeter columns of MWNT do not reach the ground, but are transferred to the core above the base. This paper will present a comparison of the techniques used during the analysis and construction stages of the design process with the goal of understanding the differences in structural behavior of these two building systems in response to the long term effects of creep and shrinkage. This paper will also discuss the design and construction techniques implemented in order to minimize the differential shortening between the interior and exterior over the lifespan of these towers.

Evaluation of Thermal Performance for Air-Barrier Air-conditioning System in Perimeter Zone by Scale Model Experiment and Simulation (모델실험 및 수치해석을 통한 페리미터존 에어배리어 공조방식웨 열성능 평가)

  • Ham Heung-Don;Park Byung-Yoon;Sohn Jang-Yeul
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.17 no.10
    • /
    • pp.947-955
    • /
    • 2005
  • For the purpose of evaluating the thermal performance for air-barrier air conditioning system in perimeter zone, two air-conditioning systems, conventional perimeter air-conditioning system and air-barrier system, are evaluated and compared by scale model experiment and simulation during cooling season. As a result, measurement shows that supply air velocity of 1 m/s in the upstream direction at perimeter is more effective. Air-barrier system could reduce the cooling energy by $10\sim20\%$ compared with conventional system. Numerical simulation was carried out considering solar effect for reliable result. This method has improved the accuracy of numerical simulation for the space affected by the solar radiation. Both measurement and simulation results show that supply air velocity of 1 m/s at perimeter is the most effective.

RANK PRESERVER OF BOOLEAN MATRICES

  • SONG, SEOK-ZUN;KANG, KYUNG-TAE;JUN, YOUNG-BAE
    • Bulletin of the Korean Mathematical Society
    • /
    • v.42 no.3
    • /
    • pp.501-507
    • /
    • 2005
  • A Boolean matrix with rank 1 is factored as a left factor and a right factor. The perimeter of a rank-1 Boolean matrix is defined as the number of nonzero entries in the left factor and the right factor of the given matrix. We obtain new characterizations of rank preservers, in terms of perimeter, of Boolean matrices.

LINEAR OPERATORS THAT PRESERVE PERIMETERS OF BOOLEAN MATRICES

  • Song, Seok-Zun;Kang, Kyung-Tae;Shin, Hang-Kyun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.45 no.2
    • /
    • pp.355-363
    • /
    • 2008
  • For a Boolean rank 1 matrix $A=ab^t$, we define the perimeter of A as the number of nonzero entries in both a and b. The perimeter of an $m{\times}n$ Boolean matrix A is the minimum of the perimeters of the rank-1 decompositions of A. In this article we characterize the linear operators that preserve the perimeters of Boolean matrices.

Development of Opened Slab Method for Top-Down Construction (지하역타공법용 개방형 슬래브 개발)

  • Song, Jee-Yun;Rhim, Hong-Chul;Kang, Doo-Hyun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2008.05a
    • /
    • pp.43-46
    • /
    • 2008
  • In Top-Down construction for underground structures, the placement of slab as a horizontal supporting member against lateral earth pressure is an important process in determining construction time and cost. Usually, a reinforced concrete perimeter girder distributes concentrated lateral loads from earth retaining structures such as Cast-in-place (CIP) piles. By combining the function of the R/C perimeter girder and horizontal slabs, the Opened Slab Method is efficient for reducing construction time by elimination of time-consuming formwork for traditional perimeter girders. The structural performance of the method is also discussed in this paper.

  • PDF

Power Aware Greedy Perimeter Stateless Routing Protocol for Wireless Ad Hoc Network (무선 Ad Hoc 네트워크을 위한 위치정보 기반 에너지 고려 라우팅 프로토콜)

  • Lee, Byung-Geon;Yoon, Won-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.7
    • /
    • pp.62-66
    • /
    • 2008
  • In this paper we have proposed a power aware location based routing protocol for wireless ad hoc network. The existing greedy perimeter stateless routing (GPSR) has some problems which are certain node overloaded and void situation. The proposed power aware greedy perimeter stateless routing (PAGPSR) protocol gives a solution for these problems in GPSR. PAGPSR uses power aware and geographically informed neighbor selection to route a packet towards the destination. It also gives a solution for the fundamental problem in geographical routing called communication void. It considers residual energy of battery and distance to the destination for the next hope node selection. When it encounters a void it starts limited-flooding to select next hop node. To evaluate the performance of our protocol we simulated PAGPSR in ns-2. Our simulation results show that our protocol achieves longer network lifetime compared with greedy perimeter stateless routing (GPSR).

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Mitigating the effect of urban layout on torsion of buildings caused by infill walls

  • Noorifard, Azadeh;Tabeshpour, Mohammad Reza;Saradj, Fatemeh Mehdizadeh
    • Earthquakes and Structures
    • /
    • v.23 no.2
    • /
    • pp.151-168
    • /
    • 2022
  • Torsion is one of the most important causes of building collapse during earthquakes. Sometimes, despite the symmetric form of the building, infill walls disturb the symmetry of the lateral resisting system. The purpose of this research is to investigate the effect of urban layout on developing torsion caused by infill walls. For this purpose, a typological study was conducted based on the conditions of perimeter walls on 364 buildings and then 9 cases were selected. The dimensions of the selected buildings are constant and the conditions of the perimeter walls including facades with openings and cantilevered facades are variable. The selected buildings with 60 different layouts of infill walls were analyzed and the behavior of each one was evaluated based on the torsional irregularity criteria of seismic codes. The results of the analyses showed that if the perimeter walls of a building are symmetric, asymmetric interior walls will not be important in developing torsion and effective parameters in symmetry of the perimeter infill walls are the number of walls, area of openings, aspect ratio, and construction details. Finally, architectural solutions to mitigate the torsional effects of infill walls were proposed for buildings with solid infill walls on some sides, for buildings where the perimeter walls of one side are on the cantilevered part, and for buildings where the perimeter walls of two adjacent sides are on the cantilevered part. In three-sided buildings, where two adjacent façades are cantilevered, it is often impossible to use the potential of the infill walls.