• Title/Summary/Keyword: Self exploitation

Search Result 36, Processing Time 0.024 seconds

Recycling of Sintered Nd-Fe-B Magnets Doped with PrNd Nanoparticles

  • Zhang, Xuefeng;Liu, Fei;Liu, Yanli;Ma, Qiang;Li, Yongfeng;Zhao, Qian;Wang, Gaofeng;Li, Zhubai
    • Journal of Magnetics
    • /
    • v.20 no.2
    • /
    • pp.97-102
    • /
    • 2015
  • The waste of sintered Nd-Fe-B magnets was recycled using the method of dopingPrNd nanoparticles. The effect of PrNd nanoparticle doping on the magnetic properties of the regenerated magnets has been studied. As the content of the PrNd nanoparticles increases, the coercivity increases monotonically, whereas both the remanence and the maximum energy products reach the maximum values for 4 wt% PrNd doping. Microstructural observation reveals that the appropriate addition of PrNd nanoparticles improves the magnetic properties and refines the grain. Domain investigation shows that the self-pinning effect of the rare earth (Re)-rich phase is enhanced by PrNd nano-particle doping. Compared to the magnet with 4 wt% PrNd alloy prepared using the dual-alloy method, the regenerated magnet doped with the same number of PrNd nanoparticles exhibits better magnetic properties and a more homogeneous microstructure. Therefore, it is concluded that PrNd nanoparticle doping is an efficient method for recycling the leftover scraps of Nd-Fe-B magnets.

Rural Development Projects and their Impacts on Built Environment; Case of Ucheon Myon-center Village (면소마을 개발사업의 건조환경에의 영향과 개선 시사점 횡성군 우천면 우항1리의 경우)

  • Jang, Seong-Jun
    • Journal of Korean Society of Rural Planning
    • /
    • v.5 no.1 s.9
    • /
    • pp.66-75
    • /
    • 1999
  • The study intends to find out contents and impacts of rural development projects implemented by government in Ucheon myon-center village (Hoingseong-county) between 1989-1995. The projects in concern are Rural Industrial Estate Project(1989-90) and Rural Collective Village Project(1992-93), The restructuring of village plan introduced new construction and renewal of buildings that are required for a myon-center in general has to be. The study reveals some morphological patterns the village has and needs to be adjusted. As a conclusion, it proposes a conception of self-containment for a myon-center development. It is necessary that a project plan strategy should be based upon harmonious exploitation between old and new, flexible planning, and sense of technological alternatives.

  • PDF

Intelligent Approach for Android Malware Detection

  • Abdulla, Shubair;Altaher, Altyeb
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2964-2983
    • /
    • 2015
  • As the Android operating system has become a key target for malware authors, Android protection has become a thriving research area. Beside the proved importance of system permissions for malware analysis, there is a lot of overlapping in permissions between malware apps and goodware apps. The exploitation of them effectively in malware detection is still an open issue. In this paper, to investigate the feasibility of neuro-fuzzy techniques to Android protection based on system permissions, we introduce a self-adaptive neuro-fuzzy inference system to classify the Android apps into malware and goodware. According to the framework introduced, the most significant permissions that characterize optimally malware apps are identified using Information Gain Ratio method and encapsulated into patterns of features. The patterns of features data is used to train and test the system using stratified cross-validation methodologies. The experiments conducted conclude that the proposed classifier can be effective in Android protection. The results also underline that the neuro-fuzzy techniques are feasible to employ in the field.

The survey on the research trend for nanotechnology (나노기술에 대한 연구개발 동향 조사)

  • 박찬복;유경화
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2001.05a
    • /
    • pp.271-284
    • /
    • 2001
  • Nanotechnology arises from the exploitation of physical, chemical,and biological properties of systems that are intermediate in size between isolated atoms/molecules and bulk materials, where phenomena length scales become comparable to the size of the structure. In addition nanotechnology implies direct control of materials and devices on molecular and atomic scale, including fabrication of functional nanostructures with desired properties, synthesis and processing of nanoparticles, self-assembly, use of quantum effects, etc. This article is a collection of Informations of trend of research and development in the field of nanotechnology in U.S., EU, Japan and Korea. And we would like to include some idea to decide the direction and the strategy for the investment for nanotechnology.

  • PDF

Discrete optimal sizing of truss using adaptive directional differential evolution

  • Pham, Anh H.
    • Advances in Computational Design
    • /
    • v.1 no.3
    • /
    • pp.275-296
    • /
    • 2016
  • This article presents an adaptive directional differential evolution (ADDE) algorithm and its application in solving discrete sizing truss optimization problems. The algorithm is featured by a new self-adaptation approach and a simple directional strategy. In the adaptation approach, the mutation operator is adjusted in accordance with the change of population diversity, which can well balance between global exploration and local exploitation as well as locate the promising solutions. The directional strategy is based on the order relation between two difference solutions chosen for mutation and can bias the search direction for increasing the possibility of finding improved solutions. In addition, a new scaling factor is introduced as a vector of uniform random variables to maintain the diversity without crossover operation. Numerical results show that the optimal solutions of ADDE are as good as or better than those from some modern metaheuristics in the literature, while ADDE often uses fewer structural analyses.

Low-overhead Information Lookup in MANET (MANET 환경에서의 Low-overhead를 위한 Lookup 기법)

  • Khac Tiep Mai;Hyunseung Choo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1142-1145
    • /
    • 2008
  • This paper proposes a novel cluster-based lookup service in mobile ad hoc networks. By applying a self-adaptive multi-hop clustering, we avoid the empty region problem of grid system and omit the need of GPS device. The novelty of the proposed scheme is in its exploitation of hashing function for location querying to achieve low communication overhead. By varying different simulation parameters, we show that the proposed scheme is scalable and adaptive to many networks scenarios. Experiment results demonstrate that our scheme reduces the communication overhead significantly.

A hybrid self-adaptive Firefly-Nelder-Mead algorithm for structural damage detection

  • Pan, Chu-Dong;Yu, Ling;Chen, Ze-Peng;Luo, Wen-Feng;Liu, Huan-Lin
    • Smart Structures and Systems
    • /
    • v.17 no.6
    • /
    • pp.957-980
    • /
    • 2016
  • Structural damage detection (SDD) is a challenging task in the field of structural health monitoring (SHM). As an exploring attempt to the SDD problem, a hybrid self-adaptive Firefly-Nelder-Mead (SA-FNM) algorithm is proposed for the SDD problem in this study. First of all, the basic principle of firefly algorithm (FA) is introduced. The Nelder-Mead (NM) algorithm is incorporated into FA for improving the local searching ability. A new strategy for exchanging the information in the firefly group is introduced into the SA-FNM for reducing the computation cost. A random walk strategy for the best firefly and a self-adaptive control strategy of three key parameters, such as light absorption, randomization parameter and critical distance, are proposed for preferably balancing the exploitation and exploration ability of the SA-FNM. The computing performance of the SA-FNM is evaluated and compared with the basic FA by three benchmark functions. Secondly, the SDD problem is mathematically converted into a constrained optimization problem, which is then hopefully solved by the SA-FNM algorithm. A multi-step method is proposed for finding the minimum fitness with a big probability. In order to assess the accuracy and the feasibility of the proposed method, a two-storey rigid frame structure without considering the finite element model (FEM) error and a steel beam with considering the model error are taken examples for numerical simulations. Finally, a series of experimental studies on damage detection of a steel beam with four damage patterns are performed in laboratory. The illustrated results show that the proposed method can accurately identify the structural damage. Some valuable conclusions are made and related issues are discussed as well.

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.

Development Strategy of Korean Economy Through Economic Cooperation with Central Asian Countries (한국의 지속적인 경제성장을 위한 중앙아시아 진출 확대 전략)

  • Chung, Haing Deuck;Lee, Sang Ho
    • International Area Studies Review
    • /
    • v.13 no.2
    • /
    • pp.311-368
    • /
    • 2009
  • In order to survive the on-going natural resource war, Korea needs various efforts such as enhancing self-exploitation ratio, increasing the supply of new-reuse energy, strengthening cooperation with resource rich countries. Central Asian countries are geometrically far away from Korea. However, Korea should try to develop political, economic and ethnic relationship with those countries into much higher dimension to secure various natural resources. Major countries including U.S., EU. Japan and China are approaching Central Asian countries with long term perspective. Improving country-image through enlargement of ODA is the first concern of those countries. Korea should try to follow their practices. Government should try to improve Korea's image in the first place and lead economic cooperation with very detailed supportive measures to induce Korean firms' investment into the Central Asian countries. In the due process, a lot of information about those countries' political climate, social situation, ethnical composition, major religions, educational system, current state and structure of economies and industries, etc should be made available to Korean firms.

How does the Stock Market Reacts to Information Security Investment of Firms in Korea : An Exploratory Study (기업의 정보보안 투자에 시장이 어떻게 반응하는지에 대한 탐색적 연구)

  • Park, Jaeyoung;Jung, Woojin;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.17 no.1
    • /
    • pp.33-45
    • /
    • 2018
  • Recently, many South Korean firms have suffered financial losses and damaged corporate images from the data breaches. Accordingly, a firm should manage their IT assets securely through an information security investment. However, the difficulty of measuring the return on an information security investment is one of the critical obstacles for firms in making such investment decisions. There have been a number of studies on the effect of IT investment so far, but there are few researches on information security investment. In this paper, based on a sample of 76 investment announcements of firms whose stocks are publicly traded in the South Korea's stock market between 2001 and 2017, we examines the market reaction to information security investment by using event study methodology. The results of the main effects indicate that self-developed is significantly related to cumulative average abnormal returns (CAARs), while no significant effect was observed for discloser, investment characteristics and firm characteristics. In addition, we find that the market reacts more favorably to the news announced by the subject of investment than the vendor, in case of investments with commercial exploitation. One of main contributions in our study is that it has revealed the factors affecting the market reaction to announcement of information security investment. It is also expected that, in practice, corporate executives will be able to help make an information security investment decision.