• Title/Summary/Keyword: Dynamic Network

Search Result 3,200, Processing Time 0.03 seconds

Hydrogels with diffusion-facilitated porous network for improved adsorption performance

  • Pei, Yan-yan;Guo, Dong-mei;An, Qing-da;Xiao, Zuo-yi;Zhai, Shang-ru;Zhai, Bin
    • Korean Journal of Chemical Engineering
    • /
    • v.35 no.12
    • /
    • pp.2384-2393
    • /
    • 2018
  • Porous alginate-based hydrogel beads (porous ABH) have been prepared through a facile and sustainable template-assisted method using nano-calcium carbonate and nano-$CaCO_3$ as pore-directing agent for the efficient capture of methylene blue (MB). The materials were characterized by various techniques. The sorption capacities of ABH towards MB were compared with pure sodium alginate (ABH-1:0) in batch and fixed-bed column adsorption studies. The obtained adsorbent (ABH-1:3) has a higher BET surface area and a smaller average pore diameter. The maximum adsorption capacity of ABH-1:3 obtained from Langmuir model was as high as $1,426.0mg\;g^{-1}$. The kinetics strictly followed pseudo-second order rate equation and the adsorption reaction was effectively facilitated, approximately 50 minutes to achieve adsorption equilibrium, which was significantly shorter than that of ABH-1:0. The thermodynamic parameters revealed that the adsorption was spontaneous and exothermic. Thomas model fitted well with the breakthrough curves and could describe the dynamic behavior of the column. More significantly, the uptake capacity of ABH-1:3 was still higher than 75% of the maximum adsorption capacity even after ten cycles, indicating that this novel adsorbent can be a promising adsorptive material for removal of MB from aqueous solution under batch and continuous systems.

Shared Governance for the Arts and Culture - US Public Arts Agencies and Cultural Foundations (문화예술활동 지원을 위한 지역과 중앙의 공유 거버넌스 - 미국의 지역예술위원회와 문화재단의 활동을 중심으로)

  • Chang, WoongJo;Lee, Dahyun
    • Review of Culture and Economy
    • /
    • v.21 no.1
    • /
    • pp.63-83
    • /
    • 2018
  • In the US, there are no governing bodies within the federal executive departments dedicated to the arts and cultural affairs. Direct government subsidies for the arts are relatively small compared to other countries with a comparable economy and standard of living. Nevertheless, the US produces artworks, artists, and arts groups, leading the world's arts and culture. Incorporating the concepts of network governance and shared governance, this paper examines the dynamic roles and interrelationships among various for-profit/nonprofit arts organizations, foundations, councils, service organizations, arts advocacy groups, and professional/amateur associations from the federal to local levels that compose the ecology of American arts and culture. Through our evaluation, we conclude that the local/state/federal arts agencies and arts organizations at various levels influence each other via the principle of subsidiarity and isomorphism, creating a unique cultural policy and arts-supporting system that correspond to the political and social structure and environment of the United States.

Development of Demand Forecasting Algorithm in Smart Factory using Hybrid-Time Series Models (Hybrid 시계열 모델을 활용한 스마트 공장 내 수요예측 알고리즘 개발)

  • Kim, Myungsoo;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.187-194
    • /
    • 2019
  • Traditional demand forecasting methods are difficult to meet the needs of companies due to rapid changes in the market and the diversification of individual consumer needs. In a diversified production environment, the right demand forecast is an important factor for smooth yield management. Many of the existing predictive models commonly used in industry today are limited in function by little. The proposed model is designed to overcome these limitations, taking into account the part where each model performs better individually. In this paper, variables are extracted through Gray Relational analysis suitable for dynamic process analysis, and statistically predicted data is generated that includes characteristics of historical demand data produced through ARIMA forecasts. In combination with the LSTM model, demand forecasts can then be calculated by reflecting the many factors that affect demand forecast through an architecture that is structured to avoid the long-term dependency problems that the neural network model has.

A Study on the Web Application for Sailing Ship Location Information interface based by RIA (RIA기반의 선박항해정보를 위한 웹 애플리케이션 구축 "평택항 원양어선 항해정보현황 사례를 중심으로")

  • Jung, Hoe-Jun;Park, Dea-Woo;Han, Kyung-Don
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.613-616
    • /
    • 2009
  • Information present condition is using situation board by manual processing that is consisted of ship arrangement plan and letterpress and magnet etc. in Pyeongtaekhang's deep-sea fishing vessel company. Study that mark open sea far from land ship information of underway 37 ships that is accepted in every time in internet web application environment that is based on Ubiquitous Network in PC that is linked to internet. 3 through practical use of RIA of Flash technology base compose Digital Dash-Board in width grid structure only and do ship sailing addition that is operating in 6 oceans and latitude, hardness indication as well as various informations to do visual display do. Emphasized in dynamic Web Application construction because can heighten the convenience to operator and user, and take advantage of real time data.

  • PDF

Segment Scheduling Scheme for Efficient Bandwidth Utilization of UHD Contents Streaming in Wireless Environment (무선 환경에서 UHD 콘텐츠의 효율적인 대역폭 활용을 위한 세그먼트 스케줄링 기법)

  • Kim, Heekwang;Chung, Kwangsue
    • Journal of Broadcast Engineering
    • /
    • v.23 no.6
    • /
    • pp.813-823
    • /
    • 2018
  • UHD content is characterized by higher bandwidth requirements to provide seamless playback. The existing HTTP adaptive streaming scheme periodically requests video segment of lower quality than the available bandwidth in the steady state. In the steady state, the On-Off pattern is repeated due to the difference of the available bandwidth and the encoding rate of the content. And the repeated Off interval is causing the problem that can not efficiently use the available bandwidth. In the wireless environment where the delay and loss rate are higher with large bandwidth fluctuations, this problem is exacerbated because the available bandwidth is estimated inaccurately. Therefore, in this paper, we propose a segment scheduling scheme for efficient bandwidth utilization of UHD contents streaming in wireless environment. Proposed scheme is a group segment that simultaneously reqeusts multiple segments in one request message in order to reduce frequency of OFF interval. Through simulation, Our scheme improves bandwidth utilization.

A Study on Detection of Small Size Malicious Code using Data Mining Method (데이터 마이닝 기법을 이용한 소규모 악성코드 탐지에 관한 연구)

  • Lee, Taek-Hyun;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.11-17
    • /
    • 2019
  • Recently, the abuse of Internet technology has caused economic and mental harm to society as a whole. Especially, malicious code that is newly created or modified is used as a basic means of various application hacking and cyber security threats by bypassing the existing information protection system. However, research on small-capacity executable files that occupy a large portion of actual malicious code is rather limited. In this paper, we propose a model that can analyze the characteristics of known small capacity executable files by using data mining techniques and to use them for detecting unknown malicious codes. Data mining analysis techniques were performed in various ways such as Naive Bayesian, SVM, decision tree, random forest, artificial neural network, and the accuracy was compared according to the detection level of virustotal. As a result, more than 80% classification accuracy was verified for 34,646 analysis files.

A Development Method of Framework for Collecting, Extracting, and Classifying Social Contents

  • Cho, Eun-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.163-170
    • /
    • 2021
  • As a big data is being used in various industries, big data market is expanding from hardware to infrastructure software to service software. Especially it is expanding into a huge platform market that provides applications for holistic and intuitive visualizations such as big data meaning interpretation understandability, and analysis results. Demand for big data extraction and analysis using social media such as SNS is very active not only for companies but also for individuals. However despite such high demand for the collection and analysis of social media data for user trend analysis and marketing, there is a lack of research to address the difficulty of dynamic interlocking and the complexity of building and operating software platforms due to the heterogeneity of various social media service interfaces. In this paper, we propose a method for developing a framework to operate the process from collection to extraction and classification of social media data. The proposed framework solves the problem of heterogeneous social media data collection channels through adapter patterns, and improves the accuracy of social topic extraction and classification through semantic association-based extraction techniques and topic association-based classification techniques.

Strategies for the Implementation of Cultural Heritage Night Travel Program Using Cognitive Inspection (인지시학을 적용한 문화재 야행(夜行) 프로그램 구현 전략)

  • Park, Seong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.103-113
    • /
    • 2022
  • As globalization progresses and localization takes place, interest in local culture is increasing. In line with this trend, the Cultural Heritage Administration has been promoting the Cultural Heritage Night Tour Project as a night-type cultural property tourism content since 2016. Cultural property nightlife, part of the regional regeneration project, creates new added value by converging and combining various historical and cultural-related contents centered on local cultural heritage. Although the "cultural nightlife" has been greatly activated, it is judged that changes are needed to continue. This is because fixed nightlife programs are positive in terms of establishing a nationwide network, but there is a limitation in that they cannot be standardized and expanded to various forms. Therefore, in this study, the meaning and limitations of nightlife programs were identified, and cognitive theory applicable to nightlife programs was considered. Through this process, it was confirmed that cognitive poetry's 'circular for dynamic semantic composition', 'surreal foreground', and 'adventures in time and space' can be applied to nightlife programs. As a result of combining cognitive poetry with nightlife programs, it was possible to present a strategy for implementing nightlife programs differentiated from existing nightlife programs.

Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

  • Wu, Jun;Chen, Ze;Bao, Jianrong;Gan, Jipeng;Chen, Zehao;Zhang, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3738-3760
    • /
    • 2022
  • Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision's correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.

A Blockchain-based User-centric Role Based Access Control Mechanism (블록체인 기반의 사용자 중심 역할기반 접근제어 기법 연구)

  • Lee, YongJoo;Woo, SungHee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1060-1070
    • /
    • 2022
  • With the development of information technology, the size of the system has become larger and diversified, and the existing role-based access control has faced limitations. Blockchain technology is being used in various fields by presenting new solutions to existing security vulnerabilities. This paper suggests efficient role-based access control in a blockchain where the required gas and processing time vary depending on the access frequency and capacity of the storage. The proposed method redefines the role of reusable units, introduces a hierarchical structure that can efficiently reflect dynamic states to enhance efficiency and scalability, and includes user-centered authentication functions to enable cryptocurrency linkage. The proposed model was theoretically verified using Markov chain, implemented in Ethereum private network, and compared experiments on representative functions were conducted to verify the time and gas efficiency required for user addition and transaction registration. Based on this in the future, structural expansion and experiments are required in consideration of exception situations.