• 제목/요약/키워드: University'S Open Access

검색결과 168건 처리시간 0.029초

Hybrid wind-solar power deployment in India: Green Energy Open Access (GEOA) and Renewable Energy Certificates (REC)

  • Hardik K. Jani;Surendra Singh Kachhwaha;Garlapati Nagababu;Alok Das
    • Advances in Energy Research
    • /
    • 제8권4호
    • /
    • pp.243-252
    • /
    • 2022
  • The hybrid wind-solar energy concept has a big influence on the spread of wind and solar power projects in India since it combines the benefits of both industries while also providing extra benefits such as resource sharing such as land, infrastructure, and power evacuation systems. Furthermore, while the hybrid policy may reduce certain barriers to the installation of wind and solar energy in India, there are still some issues that must be resolved rapidly in order to ensure a sustainable installation. According to the study's findings, the installation of wind and solar power plants is significantly influenced by energy policy. The wind-solar hybrid energy strategy will also be crucial in the near future for growing the usage of renewable energy sources. Aside from that, the establishment of Green Energy Open Access (GEOA) and the restart of the trading of Renewable Energy Certificates (REC) would promote the quick deployment of standalone and hybrid renewable power projects throughout the nation, enabling it to reach 500 GW of installed non-fossil energy capacity by 2030.

PCIe NTB를 활용한 OpenSHMEM-Light의 설계 및 구현 (Design and Implementation of OpenSHMEM-Light using PCIe NTB)

  • 주영웅;최민
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2016년도 추계학술발표대회
    • /
    • pp.58-61
    • /
    • 2016
  • .PCI Express는 고속, 저전력 등의 특성으로 업계 표준으로서 많이 쓰이고 있는 프로세서와 주변 I/O 장치들을 연결하는 버스 기술이다. 또한, PCI Express는 인피니밴드와 이더넷과 더불어 고성능 컴퓨터나 컴퓨터 클러스터를 위한 시스템 인터커넥트 기술로 널리 쓰이고 있다. PGAS(partitioned global address space) 프로그래밍 모델은 컴퓨터 클러스터와 같은 다중 호스트 시스템에서 단측 RDMA(remote direct memory access)를 구현하는데 많이 이용된다. 본 논문에서는 PCI Express 기반 RDMA를 구현하기 위해 PGAS 프로그래밍 모델인 OpenSHMEM의 기존의 특징을 유지하여 PCI Express 기반 OpenSHMEM API를 설계 및 구현하였다. 구현한 OpenSHMEM API는 PCI Express의 NTB(non-transparent bridge) 기술로 2대의 PC를 연결한 시스템에서 매트릭스 곱셈 예제를 통하여 실험하였다.

보안 무선엑세스 네트워크에서 스트리밍 미디어의 QoS 평가 (QoS Evaluation of Streaming Media in the Secure Wireless Access Network)

  • 김종우;신승욱;이상덕;한승조
    • 정보보호학회논문지
    • /
    • 제17권2호
    • /
    • pp.61-72
    • /
    • 2007
  • With the increasing growth of Internet and wireless IP networks, Multimedia systems need to be envisaged as information resources where users can access anywhere and anytime. However, efficient services in these multimedia systems are open and challenging research problem due to user mobility, limited resources in wireless devices and expensive radio bandwidth. To implement multimedia services over heterogeneous network, the IP header compression scheme can be used for saving bandwidth. In this paper, we present an efficient solution for header compression, which is modified form of ECRTP. It shows an architectural framework adopting modified ECRTP when IP tunneling network using GRE over IPSec is implemented. We have conducted simulations in order to analyze the effects of different header compression techniques while delivering real-time services to the wireless access network through secured IP Network. The impacts on performance have been investigated through a series of experiments.

Cascading Citation Expansion

  • Chen, Chaomei
    • Journal of Information Science Theory and Practice
    • /
    • 제6권2호
    • /
    • pp.6-23
    • /
    • 2018
  • Digital Science's Dimensions is envisaged as a next-generation research and discovery platform for more efficient access to cross-referenced scholarly publications, grants, patents, and clinical trials. As a new addition to the growing open citation resources, it offers opportunities that may benefit a wide variety of stakeholders of scientific publications, from researchers and policy makers to the general public. In this article, we explore and demonstrate some of the practical potentials in terms of cascading citation expansions. Given a set of publications, the cascading citation expansion process can be iteratively applied to a set of articles so as to extend the coverage to more and more relevant articles through citation links. Although the conceptual origin can be traced back to Garfield's citation indexing, it has been largely limited, until recently, to the few who have unrestricted access to a citation database that is large enough to sustain such iterative expansions. Building on the open application program interface of Dimensions, we integrate cascading citation expansion functions in CiteSpace and demonstrate how one may benefit from these new capabilities. In conclusion, cascading citation expansion has the potential to improve our understanding of the structure and dynamics of scientific knowledge.

Implementing Onetime Password based Access Control System for Secure Sharing Service

  • Kang, Namhi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권3호
    • /
    • pp.1-11
    • /
    • 2021
  • Development of ICT technologies leads exponential growth of various sharing economy over the last couple of years. The intuitive advantage of the sharing economy is efficient utilization of idle goods and services, but there are safety and security concerns. In this paper, we propose a onetime password based access control system to support secure accommodation sharing service and show the implementation results. To provide a secure service to both the provider and the user, the proposed system issues a onetime access password that is valid only during the sharing period reserved by the user, thereafter access returns to the accommodation owner. Especially, our system provides secure user access by merging the two elements of speaker recognition using voice and a one-time password to open and close the door lock. In this paper, we propose a secure system for accommodation sharing services as a use-case, but the proposed system can be applicable to various sharing services utilizing security-sensitive facilities.

하악골 과두경부 골절의 정복술 시 retromandibular approach의 유용성에 관한 고찰 (RETROMANDIBULAR APPROACH FOR OPEN REDUCTION & INTERNAL FIXATION OF MANDIBULAR CONDYLAR NECK FRACTURE)

  • 백진아
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • 제33권6호
    • /
    • pp.625-630
    • /
    • 2007
  • Fractures of the mandibular condyle are account for between 26% and 57% of all mandibular fractures. Clinicians should decide how to treat the fractured condyle with many factors considered. Many surgical methods have been developed to reduction of fractured condyle and it' s internal fixation. In open reduction of fractured condylar neck and subcondyle, retromandibular approach offers a safe and effective approach for direct fixation due to easy access and low surgical morbidity.

Analyzing Learners Behavior and Resources Effectiveness in a Distance Learning Course: A Case Study of the Hellenic Open University

  • Alachiotis, Nikolaos S.;Stavropoulos, Elias C.;Verykios, Vassilios S.
    • Journal of Information Science Theory and Practice
    • /
    • 제7권3호
    • /
    • pp.6-20
    • /
    • 2019
  • Learning analytics, or educational data mining, is an emerging field that applies data mining methods and tools for the exploitation of data coming from educational environments. Learning management systems, like Moodle, offer large amounts of data concerning students' activity, performance, behavior, and interaction with their peers and their tutors. The analysis of these data can be elaborated to make decisions that will assist stakeholders (students, faculty, and administration) to elevate the learning process in higher education. In this work, the power of Excel is exploited to analyze data in Moodle, utilizing an e-learning course developed for enhancing the information computer technology skills of school teachers in primary and secondary education in Greece. Moodle log files are appropriately manipulated in order to trace daily and weekly activity of the learners concerning distribution of access to resources, forum participation, and quizzes and assignments submission. Learners' activity was visualized for every hour of the day and for every day of the week. The visualization of access to every activity or resource during the course is also obtained. In this fashion teachers can schedule online synchronous lectures or discussions more effectively in order to maximize the learners' participation. Results depict the interest of learners for each structural component, their dedication to the course, their participation in the fora, and how it affects the submission of quizzes and assignments. Instructional designers may take advice and redesign the course according to the popularity of the educational material and learners' dedication. Moreover, the final grade of the learners is predicted according to their previous grades using multiple linear regression and sensitivity analysis. These outcomes can be suitably exploited in order for instructors to improve the design of their courses, faculty to alter their educational methodology, and administration to make decisions that will improve the educational services provided.

Institutional Repositories in BRICS Countries: A Study

  • Dhanavandan, S.;Tamizhchelvan, M.
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제5권1호
    • /
    • pp.33-47
    • /
    • 2015
  • An institutional repository includes digital assets generated by academics, such as administrative documents, course notes, learning objects, or conference proceedings. It will provide a window that gives open access to improve the sponsoring institution's visibility and status. This paper discusses the growth and development of Institutional Repositories available in BRICS Countries. The relevant data was collected from the directory of OpenDOAR. Based on the data in OpenDOAR, 242 repositories are represented from BRICS countries. Among the 242, 84 (34.71%) repositories are from Brazil, 39 (16.12%) from China, 68 (28.10%) repositories from India, 22 (9.109%) repositories from Russia, and 29(11.98%) repositories from South Africa. Brazil has the largest number of records (11, 17,688) among BRICS Countries repositories.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

도시 오픈스페이스 방문동기 및 만족도 연구 - 서울시 하천변 오픈스페이스를 중심으로 - (A Study on Visitor Motivation and Satisfaction of Urban Open Space - In the Case of Waterfront Open Space in Seoul -)

  • 조경진;김용국;김영현
    • 한국조경학회지
    • /
    • 제42권1호
    • /
    • pp.27-40
    • /
    • 2014
  • 도시 오픈스페이스는 다기능적 공간으로서 시민들의 휴식 및 건강, 자연경관 감상은 물론 예술 문화적 체험과 도시관광 및 마케팅 수단으로서 기능한다. 그러나 현대 도시 오픈스페이스의 역할과 기능에 비해 이에 대한 담론과 연구는 미진하였다. 본 연구는 지역주민은 물론 관광객 등의 원거리 이용 수요가 있는 서울시의 4개 하천변 오픈스페이스 방문객들을 대상으로 방문동기 요인을 도출하고, 오픈스페이스의 공간 특성 및 이용행태에 따라 방문동기와 만족도가 어떤 차이를 나타내는가를 알아보고자 하였다. 대상지는 청계천, 서울숲, 선유도공원, 반포한강공원을 선정하였고, 조사방법으로는 관찰조사, 문헌조사, 설문조사를 수행하였다. 분석방법은 SPSS 18.0을 이용하여 탐색적 요인분석, 신뢰도분석, 일원배치분산분석, 다중선형회귀분석을 실시하였다. 분석결과는 다음과 같다. 첫째, 도시 오픈스페이스의 방문동기 요인은 크게 커뮤니티성, 자연성, 문화교육성, 디자인 심미성, 일상탈출성 등 5개로 구분되었다. 둘째, 방문동기 요인 중 커뮤니티성, 자연성, 디자인 심미성은 오픈스페이스별 경관, 집객시설 및 프로그램, 편의시설, 주변지역 특성 등의 공간 특성에 따라 방문객들의 지각 정도에 유의한 차이가 있는 것으로 나타났다. 셋째, 방문객 거주지로부터 오픈스페이스까지의 거리에 따라 방문동기를 지각하는 데 있어 차이가 있는 것으로 나타났으며, 근거리의 방문객은 오픈스페이스의 자연성을, 도시관광객 등 원거리 방문객은 디자인 심미성을 주요 방문동기 요인으로 지각하고 있었다. 넷째, 도시 오픈스페이스 방문객들의 방문만족도를 높이기 위한 공통적인 방문동기 요인은 자연성, 디자인 심미성, 일상탈출성으로 나타났고, 오픈스페이스별 공간 특성에 따라 방문만족도에 영향을 미치는 방문동기 요인에는 차이가 있었다. 종합해 보면, 도시 오픈스페이스는 휴식 및 운동 등의 단순한 체험을 넘어 다양한 형태의 콘텐츠와 결합한 하이브리드 공간으로서 심미적 욕구, 유대감 형성 및 강화, 문화 및 교육, 엔터테인먼트 등의 요인들이 방문동기로서 작용하며, 이들 요인이 전체 방문만족도에 영향을 미치고 있음을 알 수 있었다. 본 연구는 서울시를 대표하는 도시 하천변 오픈스페이스가 방문객들에게 어떻게 인식되고 있는가를 조사 및 분석함으로써 지자체 입장에서는 매력적인 도시 오픈스페이스 창출을 위한 조성 정비는 물론 운영 관리 과정에 활용할 수 있으며, 오픈스페이스 계획 및 설계가 입장에서는 지역 여건에 부합하는 도시관광 및 마케팅적인 기능을 시설배치 및 공간프로그램 구상 과정에 적용하는데 기여할 것으로 기대된다.