• Title/Summary/Keyword: Application deployment

Search Result 306, Processing Time 0.024 seconds

SMA-based devices: insight across recent proposals toward civil engineering applications

  • Casciati, Sara
    • Smart Structures and Systems
    • /
    • v.24 no.1
    • /
    • pp.111-125
    • /
    • 2019
  • Metallic shape memory alloys present fascinating physical properties such as their super-elastic behavior in austenite phase, which can be exploited for providing a structure with both a self-centering capability and an increased ductility. More or less accurate numerical models have been introduced to model their behavior along the last 25 years. This is the reason for which the literature is rich of suggestions/proposals on how to implement this material in devices for passive and semi-active control. Nevertheless, the thermo-mechanical coupling characterizing the first-order martensite phase transformation process results in several macroscopic features affecting the alloy performance. In particular, the effects of day-night and winter-summer temperature excursions require special attention. This aspect might imply that the deployment of some devices should be restricted to indoor solutions. A further aspect is the dependence of the behavior from the geometry one adopts. Two fundamental lacks of symmetry should also be carefully considered when implementing a SMA-based application: the behavior in tension is different from that in compression, and the heating is easy and fast whereas the cooling is not. This manuscript focuses on the passive devices recently proposed in the literature for civil engineering applications. Based on the challenges above identified, their actual feasibility is investigated in detail and their long term performance is discussed with reference to their fatigue life. A few available semi-active solutions are also considered.

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks

  • Wang, Qiuhua;Kang, Mingyang;Yuan, Lifeng;Wang, Yunlu;Miao, Gongxun;Choo, Kim-Kwang Raymond
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2255-2281
    • /
    • 2021
  • Channel characteristic-based physical layer authentication is one potential identity authentication scheme in wireless communication, such as used in a fog computing environment. While existing channel characteristic-based physical layer authentication schemes may be efficient when deployed in the conventional wireless network environment, they may be less efficient and practical for the industrial wireless communication environment due to the varying requirements. We observe that this is a topic that is understudied, and therefore in this paper, we review the constructions and performance of several commonly used test statistics and analyze their performance in typical industrial wireless networks using simulation experiments. The findings from the simulations show a number of limitations in existing channel characteristic-based physical layer authentication schemes. Therefore, we believe that it is a good idea to combine machine learning and multiple test statistics for identity authentication in future industrial wireless network deployment. Four machine learning methods prove that the scheme significantly improves the authentication accuracy and solves the challenge of choosing a threshold.

Implementation of an in vitro exposure system for 28 GHz

  • Lee, Young Seung;Dzagbletey, Philip Ayiku;Chung, Jae-Young;Jeon, Sang Bong;Lee, Ae-Kyoung;Kim, Nam;Song, Seong Jong;Choi, Hyung-Do
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.837-845
    • /
    • 2020
  • The objective of this study was to implement an in vitro exposure system for 28 GHz to investigate the biological effects of fifth-generation (5G) communication. A signal source of 28 GHz for 5G millimeter-wave (MMW) deployment was developed, followed by a variable attenuator for antenna input power control. A power amplifier was also customized to ensure a maximum output power of 10 W for high-power 28-GHz exposure. A 3-dB uniformity over the 80 mm × 80 mm area that corresponds to four Petri dishes of three-dimensional cell cultures can be obtained using a customized choke-ring-type antenna. An infrared camera is employed for temperature regulation during exposure by adjusting the airflow cooling rate via real-time feedback to the incubator. The reported measurement results confirm that the input power control, uniformity, and temperature regulation for 28-GHz exposure were successfully accomplished, indicating the possibility of a wide application of the implemented in vitro exposure system in the fields of various MMW dose-response studies.

A Study on Requirements and Application of Quality Process Audit and the Effect of Establishing the Defense Quality Management System (품질공정심사의 요구사항과 적용사례 및 국방품질경영시스템 구축 효과에 대한 연구)

  • Yoon, Cheol Geun;Park, Jong Hun;Lee, Sang Cheon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.2
    • /
    • pp.1-11
    • /
    • 2022
  • In this paper, we investigate the requirements of QPA(Quality Process Audit), which is a process quality audit system for secondary defense contractors, compared with those of DQMS(Defense Quality Management System). And evaluate whether the deployment of QPA meets the DQMS certification requirements through the case example of Company H. The evaluation items of QPA are composed of five categories such as Material Management, Incoming Inspection, Manufacturing Process, Product Evaluation, and Packaging Management. The QPA requirements are mainly related to the chapter 7(support) and chapter 8(operation) of DQMS standards. In this view point, QPA can be expected as an effective audit for suppliers preparing for DQMS certification. In the case example, we evaluate the results and effects of improvement due to QPA and compare it with the case of DQMS. QPA can be used as appropriate quality management standards of secondary and tertiary defense contractors and can provide the basis guidelines for the preparation of implementation steps in DQMS certification.

Development and Utilization of Guidelines for Customized Hygiene Management of Children's Meal Facilities (어린이 급식시설 맞춤형 위생관리 지도서의 개발과 활용)

  • Choi, Kyunga;Lee, Sunghyun;Park, Hyekyung
    • Journal of the FoodService Safety
    • /
    • v.2 no.1
    • /
    • pp.36-43
    • /
    • 2021
  • The development of food poisoning prevention guidelines aims to prevent food poisoning in advance and improve the safety of children's meals through hygiene management of children's feeding facilities, especially infants' facilities. Therefore, the composition of the content should be designed so that it can be fully understood from the point of view of the layperson. In terms of meal service management, various standards must be fully reflected and reviewed to increase utilization in the field. Daycare centers and kindergartens have different administrative agencies, similar application laws and guidelines, but different parts exist and various types of facilities, so management standards are often ambiguous. Therefore, such management requires easy guidance, not special guidance, and it should be universally applicable to any facility. Prior studies have shown that the management of meal facilities is the most efficient, but it is difficult to hire and deploy specialists due to the operation of children's meal facilities, so guidance, facilities managers and workers need to voluntarily practice them. It is time to prepare hygiene guidelines that reflect the characteristics of these children's cafeterias, and it is necessary to prepare and utilize guidance suitable for reality until it is institutionalized for the deployment of manpower exclusively for meals.

A Real Time Traffic Flow Model Based on Deep Learning

  • Zhang, Shuai;Pei, Cai Y.;Liu, Wen Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2473-2489
    • /
    • 2022
  • Urban development has brought about the increasing saturation of urban traffic demand, and traffic congestion has become the primary problem in transportation. Roads are in a state of waiting in line or even congestion, which seriously affects people's enthusiasm and efficiency of travel. This paper mainly studies the discrete domain path planning method based on the flow data. Taking the traffic flow data based on the highway network structure as the research object, this paper uses the deep learning theory technology to complete the path weight determination process, optimizes the path planning algorithm, realizes the vehicle path planning application for the expressway, and carries on the deployment operation in the highway company. The path topology is constructed to transform the actual road information into abstract space that the machine can understand. An appropriate data structure is used for storage, and a path topology based on the modeling background of expressway is constructed to realize the mutual mapping between the two. Experiments show that the proposed method can further reduce the interpolation error, and the interpolation error in the case of random missing is smaller than that in the other two missing modes. In order to improve the real-time performance of vehicle path planning, the association features are selected, the path weights are calculated comprehensively, and the traditional path planning algorithm structure is optimized. It is of great significance for the sustainable development of cities.

Improvement of Fire Blight Blossom Infection Control Using Maryblyt in Korean Apple Orchards

  • Kyung-Bong Namkung;Sung Chul Yun
    • The Plant Pathology Journal
    • /
    • v.39 no.5
    • /
    • pp.504-512
    • /
    • 2023
  • After transitioning from periodic to model-based control policy for fire blight blossom infection, it is crucial to provide the timing of field application with easy and accurate information. To assess the risk of blossom infection, Maryblyt was employed in 31 sites across apple-producing regions nationwide, including areas prone to fire blight outbreaks, from 2021 to 2023. In 2021 and 2023, two and seven sites experienced Blossom Infection Risk-Infection warning occurrences among 31 sites, respectively. However, in 2022, most of the sites observed Blossom Infection Risk-Infection from April 25 to 28, highlighting the need for blossom infection control. For the comparison between the two model-based control approaches, we established treatment 1, which involved control measures according to the Blossom Infection Risk-Infection warning and treatment 2, aimed at maintaining the Epiphytic Infection Potential below 100. The analysis of control values between these treatments revealed that treatment 2 was more effective in reducing Blossom Infection Risk-Infection and the number of days with Epiphytic Infection Potential above 100, with respective averages of 95.6% and 93.0% over the three years. Since 2022, the implementation of the K-Maryblyt system and the deployment of Automated Weather Stations capable of measuring orchard weather conditions, with an average of 10 stations per major apple fire blight county nationwide, have taken place. These advancements will enable the provision of more accurate and timely information for farmers based on fire blight models in the future.

Exploratory Study on the Process and Checklist Items for Construction Safety Inspection Utilizing Drones

  • Jung, Jieun;Baek, Mina;Yu, Chaeyeon;Lee, Donghoon;Kim, Sungjin
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.3
    • /
    • pp.327-336
    • /
    • 2023
  • The focus of this research was to devise a conceptual methodology for drone usage and to assess the viability of safety checklist items specific to drone application in safety oversight. The appraisal was grounded in a focus group interview involving professionals from construction management and safety fields. The proposed process was segmented into four stages: 1) pre-flight phase for flight plan development, 2) drone flight phase for safety condition inspection utilizing checklist items, 3) post-flight phase for visual asset analysis, and 4) documentation and management phase. Furthermore, the research scrutinized the applicability of 32 distinct safety checklist items for drone operations. The primary aim of this investigation was to probe the possible deployment of drones as part of construction safety inspections at work sites. However, it bears mentioning that subsequent research should strive to gather a more extensive sample size through questionnaire surveys, thereby facilitating quantitative analysis. Administering such surveys would yield more comprehensive data compared to a focus group interview, which was constrained by a limited participant count. In summation, this study lays a foundational groundwork for understanding the potential advantages and challenges associated with integrating drones into construction safety management.

Perception Survey of Firefighters on Application of Emergency Vehicle Exemption during Return to Station Accidents (긴급자동차 복귀 중 교통사고 특례에 대한 소방공무원의 인식조사)

  • Young-Jin, Reem;Deok-Jin Jang;Ha-Sung Kong
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.2
    • /
    • pp.139-151
    • /
    • 2023
  • This study aims to understand the current status of exemptions for traffic accidents during the return of emergency vehicles and to provide suggestions for improvement. A survey was conducted on 3,500 firefighters to investigate the perception of traffic accidents during the return of emergency vehicles, and responses from 505 participants were analyzed. Based On the demographic characteristics and perception of the participants, frequency analysis and variance analysis were used as research methods to analyze basic statistics and the current situation. The results showed that firefighters have concerns and anxieties about traffic accidents during the return of emergency vehicles, and the need for applying exemptions and enacting explicit legal provisions was statistically confirmed. Based on these results, we suggest a policy for exemptions to improve the preparation for re-deployment and to alleviate the concerns and anxieties of firefighters.