• Title/Summary/Keyword: Computers

Search Result 3,692, Processing Time 0.031 seconds

Investigation of physicochemical properties, sustainability and environmental evaluation of metakaolin- granulated blast furnace slag geopolymer concrete

  • Anas Driouich;Safae El Alami El Hassani;Zakia Zmirli;Slimane El Harfaoui;Nadhim Hamah Sor;Ayoub Aziz;Jong Wan Hu;Haytham F. Isleem;Hadee Mohammed Najm;Hassan Chaair
    • Computers and Concrete
    • /
    • v.34 no.4
    • /
    • pp.489-501
    • /
    • 2024
  • Geopolymers are part of a class of materials characterized by properties combining polymers, ceramics, and cement. These include exceptionally high thermal and chemical stability, excellent mechanical strength and durability in aggressive environments. This work deals with the synthesis, characterization, and sustainability evaluation of GPGBFS-MK geopolymers by alkaline activation of a granulated blast furnace slag-metakaolin mixture. In the first step, elemental and oxide analyses by XRF and EDS showed that the main constituents of GPGBFS-MK geopolymers are silicon, sodium, and aluminium oxides. The structural analyses by XRD and FTIR confirmed that the geopolymerization for GPGBFS-MK geopolymers did occur, accompanied by the formation of disordered networks from the blends and a modification to the microstructure by the geopolymerization process. Similarly, the microstructural study made by SEM showed that the GPGBFS-MK geopolymers are constituted by aluminosilicates in the form of dense clusters on which are adsorbed particles of unreacted GBFS in the form of spheroids and white residues of the alkaline activating solution. In addition, the study of the sustainability evaluation of GPGBFS-MK geopolymers showed that the water absorption of geopolymeric materials is lower than that of OPC cement. As for the elevated temperature resistance, the analyses indicated an excellent elevated temperature resistance of GPGBFS-MK. In the same way, the study of the resistance to chemical aggressions showed that the GPGBFS-MK geopolymeric materials are unattackable, contrary to the OPC cement-based materials which are strongly altered.

Horizontal only and horizontal-vertical combined earthquake effects on three R/C frame building structures through linear time-history analysis (LTHA): An implementation to Turkey

  • Selcuk Bas;Mustafa A. Bilgin
    • Computers and Concrete
    • /
    • v.34 no.3
    • /
    • pp.329-346
    • /
    • 2024
  • In this study, it is aimed to investigate the vertical seismic performance of reinforced concrete (R/C) frame buildings in two different building stocks, one of which consists of those designed as per the previous Turkish Seismic Code (TSC-2007) that does not consider the vertical earthquake load, and the other of which consists of those designed as per the new Turkish Seismic Code (TSCB-2018) that considers the vertical earthquake load. For this aim, three R/C buildings with heights of 15 m, 24 m and 33 m are designed separately as per TSC-2007 and TSCB-2018 based on some limitations in terms of seismic zone, soil class and structural behavior factor (Rx/Ry) etc. The vertical earthquake motion effects are identified according to the linear time-history analyses (LTHA) that are performed separately for only horizontal (H) and combined horizontal+vertical (H+V) earthquake motions. LTHA is performed to predict how vertical earthquake motion affects the response of the designed buildings by comparing the linear response parameters of the base shear force, the base overturning, the base axial force, top-story vertical displacement. Nonlinear time-history analysis (NLTHA) is generally required for energy dissipative buildings, not required for design of buildings. In this study, the earthquake records are scaled to force the buildings in the linear range. Since nonlinear behavior is not expected from the buildings herein, the nonlinear time-history analysis (NLTHA) is not considered. Eleven earthquake acceleration records are considered by scaling them to the design spectrum given in TSCB-2018. The base shear force is obtained not to be affected from the combined H+V earthquake load for the buildings. The base overturning moment outcomes underline that the rigidity of the frame system in terms of the dimensions of the columns can be a critical parameter for the influence of the vertical earthquake motion on the buildings. In addition, the building stock from TSC-2007 is estimated to show better vertical earthquake performance than that of TSCB-2018. The vertical earthquake motion is found out to be highly effective on the base axial force of 33 m building rather than 15 m and 24 m buildings. Thus, the building height is a particularly important parameter for the base axial force. The percentage changes in the top-story vertical displacement of the buildings designed for both codes show an increase parallel to that in the base axial force results. To extrapolate more general results, it is clear to state that many buildings should be analyzed.

Malicious Packet Detection Technology Using Machine Learning and Deep Learning (머신러닝과 딥러닝을 활용한 악성 패킷 탐지 기술 연구)

  • Byounguk An;JongChan Lee;JeSung Chi;Wonhyung Park
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.109-115
    • /
    • 2021
  • Currently, with the development of 5G and IoT technology, it is being used in connection with the things used in real life through a network. However, attempts to use networked computers for malicious purposes are increasing, and attacks using malicious codes that infringe the confidentiality and integrity of user information are becoming more intelligent. As a countermeasure to this, research is being conducted on a method of detecting malicious packets using a security control system and AI technology, supervised learning. The cyber security control system is being operated inefficiently in terms of manpower and cost. In addition, in the era of the COVID-19 pandemic, remote work has increased, making it difficult to respond immediately. In addition, malicious code detection using the existing AI technology, supervised learning, does not detect variant malicious code, and has an inaccurate malicious code detection rate depending on the quantity and quality of data. Therefore, in this study, by converging malicious packet detection technologies through various machine learning and deep learning models, the accuracy of malicious packet detection is increased, the false positive rate and the false positive rate are reduced, and a new type of malicious packet can be efficiently detected when intrusion. We propose a malicious packet detection technology.

The study on Standard Uptake Value(SUV) change according to time input difference in PET/CT scan (PET/CT 검사에서 시간 입력 차이에 따른 표준화섭취계수(SUV) 변화에 대한 고찰)

  • Kim, Kyung-Sik;Lee, Ju-Young;Jung, Woo-Young;Kim, Jung-Sun
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.15 no.2
    • /
    • pp.21-25
    • /
    • 2011
  • Purpose: $^{18}F$-FDG Fusion Whole Body PET scan is performed approximately 1 hour after injecting $^{18}F$-FDG. At this point in the injection procedure, as a tool of the criteria of time input, time of clocks or computers can be used and in the scan procedure, time of workstation can be used. In case that synchronized time input is not done in the injection and scan procedures for PET scan, time error from injection to scan can occur. This time error may affect Standard Uptake Value (SUV) being used as quantitative assessment. Therefore, in this study, we analyzed the change of SUV according to time input difference and necessity of time synchronization. Materials and Methods: The analysis was performed to 30 patients ($54.8{\pm}15.5$ years old) who examined $^{18}F$-FDG Fusion Whole Body PET scan in Department of nuclear medicine, Asan Medical Center from December 2009 to February 2010. To observe the change of SUV according to time input difference, the image was reconstructed and analyzed by artificially changing time difference of 1, 2, 3, 5, 10, 20 min against the same patients based on 60 minutes. Result: SUV of the image that reconstructed the images of 30 patients by giving intervals of 1, 2, 3, 5, 10, 20 min respectively and the image that entered original time was compared and analyzed through paired t-test. Based on 0 minute, mean SUV of aorta was changed by 0.3, 1.1, 1.4, 3.2, 4.7, 12.5% respectively and there was no statistically significant difference in 1, 2 minutes (p>0.05) but there was significant difference in 3, 5, 10, 20 min (p<0.05). The changes of $SUV_{avg}$ of liver were 1.6, 2.5, 3.0, 4.2, 6.6, 12.8% in 1, 2, 3, 5, 10, 20 min respectively and the changes of $SUV_{max}$ of primary lesion were 1.0, 1.5, 2.2, 3.5, 6.6, 12.8% respectively (p<0.05). Conclusion: Errors may occur in the process of measuring or recording variables affecting SUV such as height and weight of patients, $^{18}F$-FDG dose, Emission scan start time etc. and as these errors are more, the accurate assessment of SUV is interfered. Therefore, in order to assess SUV more accurately, it is thought that efforts to minimize these errors should be made. Of these efforts, time synchronization will be a cornerstone for accurate scanning.

  • PDF

Design Information Management System Core Development Using Industry Foundation Classes (IFC를 이용한 설계정보관리시스템 핵심부 구축)

  • Lee Keun-hyung;Chin Sang-yoon;Kim Jae-jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.1 no.2 s.2
    • /
    • pp.98-107
    • /
    • 2000
  • Increased use of computers in AEC (Architecture, Engineering and Construction) has expanded the amount of information gained from CAD (Computer Aided Design), PMIS (Project Management Information System), Structural Analysis Program, and Scheduling Program as well as making it more complex. And the productivity of AEC industry is largely dependent on well management and efficient reuse of this information. Accordingly, such trend incited much research and development on ITC (Information Technology in Construction) and CIC (Computer Integrated Construction) to be conducted. In exemplifying such effort, many researchers studied and researched on IFC (Industry Foundation Classes) since its development by IAI (International Alliance for Interoperability) for the product based information sharing. However, in spite of some valuable outputs, these researches are yet in the preliminary stage and deal mainly with conceptual ideas and trial implementations. Research on unveiling the process of the IFC application development, the core of the Design Information management system, and its applicable plan still need be done. Thus, the purpose of this paper is to determine the technologies needed for Design Information management system using IFC, and to present the key roles and the process of the IFC application development and its applicable plan. This system play a role to integrate the architectural information and the structural information into the product model and to group many each product items with various levels and aspects. To make the process model, we defined two activities, 'Product Modeling', 'Application Development', at the initial level. Then we decomposed the Application Development activity into five activities, 'IFC Schema Compile', 'Class Compile', 'Make Project Database Schema', 'Development of Product Frameworker', 'Make Project Database'. These activities are carried out by C++ Compiler, CAD, ObjectStore, ST-Developer, and ST-ObjectStore. Finally, we proposed the applicable process with six stages, '3D Modeling', 'Creation of Product Information', 'Creation and Update of Database', 'Reformation of Model's Structure with Multiple Hierarchies', 'Integration of Drawings and Specifications', and 'Creation of Quantity Information'. The IFCs, including the other classes which are going to be updated and developed newly on the construction, civil/structure, and facility management, will be used by the experts through the internet distribution technologies including CORBA and DCOM.

  • PDF

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

A Study on the Application of Graphic Metaphor to the Web Interface - concentrating on the homework supporting domains for higher classes in the elementary schools- (웹 인터페이스에서의 그래픽 메타포 활용에 관한 연구 -초등학교 고학년 숙제도우미 영역을 중심으로-)

  • 이미경;김혜경
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.385-394
    • /
    • 2003
  • An investigation by KRNIC (Korea Network Information Center) on the real state of usage of internet has shown that 96.9% of children investigated had experiences of using internet. Especially the firstly ranked item that had been answered by children as a necessity of internet was 'Studying to solve tasks' rated by 83.9%. As seen from the research result, the need as a homework sonics is actually so dominant that it cannot be ignored when considering the profitability at the area of education contents, but any profound research has not been accomplished yet. Internet has been positioned as a more effective and fruitful learning tool, and also all activities done by users for exploring informations and choosing learning items under the on-line circumstances are based on the successive mutual reactions between users and computers. Up to now much of the web based learning circumstances has been introducing the User Interface using metaphor, and the same is found dominantly from the sites for children. But in spite of the availability of metaphor mentioned above the current status is much lack of profound researches about metaphor interface; and what is more, in the case of the site for elementary school students the gap of the ability recognizing metaphor is very large between lower classes and higher classes according to the degree of mental growth but that is used to be simply ignored, then a common concept is adapted to interface for all grades of classes and moreover for infant and kindergarten without any objections. Based on foregoing problems this research has put the main focus on the groping and presenting desirable directions on the prospect design of interface for children-oriented sites by analyzing the status of practical usage of metaphor interface in the field of the sites for children-oriented learning sites with concentration upon homework supporting domains.

  • PDF

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.

The Effect of Penalizing Wrong Answers Upon the Omission Response in the Computerized Modified Multiple-choice Testing (컴퓨터화 변형 선다형 시험 방식에서 감점제가 시험 점수와 반응 포기에 미치는 영향)

  • Song, Min Hae;Park, Jooyong
    • Korean Journal of Cognitive Science
    • /
    • v.28 no.4
    • /
    • pp.315-328
    • /
    • 2017
  • Even though assessment using information and communication technology will most likely lead the future of educational assessment, there is little domestic research on this topic. Computerized assessment will not only cut costs but also measure students' performance in ways not possible before. In this context, this study introduces a tool which can overcome the problems of multiple choice tests, which are most widely used type of assessment in current Korean educational setting. Multiple-choice tests, in which options are presented with the questions, are efficient in that grading can be automated; however, they allow for students who don't know the answer, to find the correct answer from the options. Park(2005) has developed a modified multiple-choice testing system (CMMT) using the interactivity of computers, that presents questions first, and options later for a short time when the student requests for them. The present study was conducted to find out if penalizing wrong answers could lower the possibility of students choosing an answer among the options when they don't know the correct answer. 116 students were tested with the directions that they will be penalized for wrong answers, but not for no response. There were 4 experimental conditions: 2 conditions of high or low percentage of penalizing, each in traditional multiple-choice or CMMT format. The results were analyzed using a two-way ANOVA for the number of no response, the test score and self-report score. Analysis showed that the number of no response was significantly higher for the CMMT format and that test scores were significantly lower when the penalizing percentage was high. The possibility of applying CMMT format tests while penalizing wrong answers in actual testing settings was addressed. In addition, the need for further research in the cognitive sciences to develop computerized assessment tools, was discussed.

The preliminary study of developing computational thinking practice analysis tool and its implementation (컴퓨팅 사고 실천 분석도구 개발 및 이의 활용에 대한 기초연구)

  • Park, Young-Shin;Hwang, Jin-Kyung
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.10 no.2
    • /
    • pp.140-160
    • /
    • 2017
  • The purpose of this study was to develop computational thinking (CT) analysis tool that can be used to analyze CT practices; first, by defining what CT practices are, and then, by identifying which components of CT are reflected in STEAM classes. Exploring various kinds of CT practices, which can be identified while applying the proposed CT analysis tool for exemplary STEAM classes, is another goal of this study. Firstly, to answer the question of "What is CT in science education" and thereby to develop the proposed CT practice analysis tool, three types of published documents about CT definition as the main data in this study have been considered. In the first "analysis tool development" part of this study, the following five elements have been identified as the main components of CT analysis tool as follows; (1) connecting open problems with computing, (2) using tools or computers to develop computing artifact, (3) abstraction process, (4) analyzing and evaluating computing process and artifact, and (5) communicating and cooperating. Based on the understandings that there is a consistent flow among the five components due to their interactions, a flow chart of CT practice has also been developed. In the second part of this study, which is an implementation study, the proposed CT practice analysis tool has been applied in one exemplary STEAM program. To select the candidate STEAM program, four selection criteria have been identified. Then, the proposed CT practice analysis tool has been applied for the selected STEAM program to determine the degree of CT practice reflected in the program and furthermore, to suggest a way of improving the proposed CT analysis tool if it shows some weak points. Through the findings of this study, we suggest that the actual definition of computational thinking will be helpful to converge Technology and Engineering to STEAM education and a strong complement to reinforce STEAM education.