• Title/Summary/Keyword: various applications

Search Result 8,638, Processing Time 0.032 seconds

FEM investigation of SFRCs using a substepping integration of constitutive equations

  • Golpasand, Gholamreza B.;Farzam, Masood;Shishvan, Siamak S.
    • Computers and Concrete
    • /
    • v.25 no.2
    • /
    • pp.181-192
    • /
    • 2020
  • Nowadays, steel fiber reinforced concretes (SFRCs) are widely used in practical applications. Significant experimental research has thus been carried out to determine the constitutive equations that represent the behavior of SFRCs under multiaxial loadings. However, numerical modelling of SFRCs via FEM has been challenging due to the complexities of the implementation of these constitutive equations. In this study, following the literature, a plasticity model is constructed for the behavior of SFRCs that involves the Willam-Warnke failure surface with the relevant evolution laws and a non-associated flow rule for determining the plastic deformations. For the precise (yet rapid) integration of the constitutive equations, an explicit substepping scheme consisting of yield intersection and drift correction algorithms is employed and thus implemented in ABAQUS via UMAT. The FEM model includes various material parameters that are determined from the experimental data. Three sets of parameters are used in the numerical simulations. While the first set is from the experiments that are conducted in this study on SFRC specimens with various contents of steel fibers, the other two sets are from the experiments reported in the literature. The response of SFRCs under multiaxial compression obtained from various numerical simulations are compared with the experimental data. The good agreement between numerical results and the experimental data indicates that not only the adopted plasticity model represents the behavior of SFRCs very well but also the implemented integration scheme can be employed in practical applications of SFRCs.

Quantum Communication Technology for Future ICT - Review

  • Singh, Sushil Kumar;Azzaoui, Abir El;Salim, Mikail Mohammed;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1459-1478
    • /
    • 2020
  • In the last few years, quantum communication technology and services have been developing in various advanced applications to secure the sharing of information from one device to another. It is a classical commercial medium, where several Internet of Things (IoT) devices are connected to information communication technology (ICT) and can communicate the information through quantum systems. Digital communications for future networks face various challenges, including data traffic, low latency, deployment of high-broadband, security, and privacy. Quantum communication, quantum sensors, quantum computing are the solutions to address these issues, as mentioned above. The secure transaction of data is the foremost essential needs for smart advanced applications in the future. In this paper, we proposed a quantum communication model system for future ICT and methodological flow. We show how to use blockchain in quantum computing and quantum cryptography to provide security and privacy in recent information sharing. We also discuss the latest global research trends for quantum communication technology in several countries, including the United States, Canada, the United Kingdom, Korea, and others. Finally, we discuss some open research challenges for quantum communication technology in various areas, including quantum internet and quantum computing.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

Recent developments in liquid-phase synthesis and applications of nanomagnesia

  • Hanie Abdollahzade;Asghar Zamani
    • Advances in nano research
    • /
    • v.14 no.1
    • /
    • pp.103-115
    • /
    • 2023
  • Recent developments in the synthesis of nanomagnesia of controlled sizes and shapes that are suitable for various applications are reviewed. Two main methods, based on liquid-phase synthesis, i.e., chemical methods and bio-based methods, are used to synthesize nanomagnesia. Conventionally, nanomagnesia was synthesized by chemical methods such as coprecipitation, sol-gel, combustion method, and so on using different chemical agents and stabilizers which later on become responsible for several biological risks because of the toxicity of used chemicals. Bio-based protocols are growing as another environmental friend method for the synthesis of various nanostructures especially nanomagnesia using biomass, plant extracts, alga, and fungi as a source of precursor material. The ideal method should offer better control of textural properties of nanostructures and decrease the necessity for purification of the synthesized nanoproducts, which sequentially removes the use of large amounts of chemicals and organic solvents and manipulation of products that are unsafe to the environment. Finally, the broad applicability of nanomagnesia in diverse areas is presented. Employment of nanomagnesia reported in several laboratory and industrial fields are valued from the standpoint of the significance of these issues for technological requests, as described in the literature. Nanomagnesia has various applications such as antimicrobial performance, removing pollutants, batteries application, and catalysis.

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

Device Applications of Graphene and Their Challenges

  • Lee, B.H.;Hwang, H.J.;Yang, J.H.;Baek, E.J.;Kang, S.C.;Lee, Y.G.;Kang, C.G.
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.08a
    • /
    • pp.114-114
    • /
    • 2012
  • Even though graphene was introduced with a great hope to replace silicon in future, small (or zero) band gap and poor stability have become major challenges in graphene electronics. Especially, rectification and amplification function which are the elemental functions of silicon device, is very difficult to implement without a bandgap. However, the graphene can still be used in many other device applications if the merits of graphene are creatively utilized. For example, graphene can be applied to almost any kind of substrate. Its conductivity can be varied in some degree using electric field, charge dipole, attached molecules, and many other ways. Recently, graphene stacked with ferroelectric materials or piezoelectric materials has been actively studied for various device applications. In this talk, various device applications of graphene using hybrid stack or novel device structure will be introduced and their prospect will be discussed.

  • PDF

Cellulose-based Nanocrystals: Sources and Applications via Agricultural Byproducts

  • Seo, Yu-Ri;Kim, Jin-Woo;Hoon, Seonwoo;Kim, Jangho;Chung, Jong Hoon;Lim, Ki-Taek
    • Journal of Biosystems Engineering
    • /
    • v.43 no.1
    • /
    • pp.59-71
    • /
    • 2018
  • Purpose: Cellulose nanocrystals (CNCs) are natural polymers that have been promoted as a next generation of new, sustainable materials. CNCs are invaluable as reinforcing materials for composites because they can impart improved mechanical, chemical, and thermal properties and they are biodegradable. The purpose of this review is to provide researchers with information that can assist in the application of CNCs extracted from waste agricultural byproducts (e.g. rice husks, corncobs, pineapple leaves). Methods & Results: This paper presents the unique characteristics of CNCs based on agricultural byproducts, and lists processing methods for manufacturing CNCs from agricultural byproducts. Various mechanical treatments (microfluidization and homogenization) and chemical treatments (alkali treatment, bleaching and hydrolysis) can be performed in order to generate nanocellulose. CNC-based composite properties and various applications are also discussed. Conclusions: CNC-based composites from agricultural byproducts can be combined to meet end-use applications such as sensors, batteries, films, food packaging, and 3D printing by utilizing their properties. The review discusses applications in food engineering, biological engineering, and cellulose-based hydrogels.

Prioritization-Based Model for Effective Adoption of Mobile Refactoring Techniques

  • Alhubaishy, Abdulaziz
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.375-382
    • /
    • 2021
  • The paper introduces a model for evaluating and prioritizing mobile quality attributes and refactoring techniques through the examination of their effectiveness during the mobile application development process. The astonishing evolution of software and hardware has increased the demand for techniques and best practices to overcome the many challenges related to mobile devices, such as those concerning device storage, network bandwidth, and energy consumption. A number of studies have investigated the influence of refactoring, leading to the enhancement of mobile applications and the overcoming of code issues as well as hardware issues. Furthermore, rapid and continuous mobile developments make it necessary for teams to apply effective techniques to produce reliable mobile applications and reduce time to market. Thus, we investigated the influence of various refactoring techniques on mobile applications to understand their effectiveness in terms of quality attributes. First, we extracted the most important mobile refactoring techniques and a set of quality attributes from the literature. Then, mobile application developers from nine mobile application teams were recruited to evaluate and prioritize these quality attributes and refactoring techniques for their projects. A prioritization-based model is examined that integrates the lightweight multi-criteria decision making method, called the best-worst method, with the process of refactoring within mobile applications. The results prove the applicability and suitability of adopting the model for the mobile development process in order to expedite application production while using well-defined procedures to select the best refactoring techniques. Finally, a variety of quality attributes are shown to be influenced by the adoption of various refactoring techniques.

A Study on Business-Based Screen Design Techniques for Designing Efficient Applications

  • Kim, Tae-Woo;Park, Sun-Yi;Yeo, Jeong-Mo
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1420-1430
    • /
    • 2018
  • To build a successful information system, design and development should be carried out from the enterprise perspective. A complicated business is represented in various ways as technology advances, and many development methodologies have been studied from the viewpoint of technology and development. Each domain is independently designed and developed from the enterprise perspective, but there would be inclusive parts due to the integrated process wherein the definition, design, and development of business are carried out, and the design is done based on the designer's experience. This study would like to address the technique of designing screens based on the business process of the applications derived from the business. It designs the screens that appear when actual applications are completed, including how the data transfer process in the derived business process is represented and operated on the relevant screens. It designs the screen which is displayed when the actual application is completed and how the data transfer process in the derived business process is represented and operated on the relevant screen. In addition, it designs the DFD representing the overall flow of data for each business to represent the movement procedure between screens in general. Through the design method proposed in this study, the client's requirement could be confirmed to reduce the cost for redevelopment, the problem of communication between designers and developers with various experiences could be reduced, and an efficient design procedure could be provided to persons who lack design experience.

DISTANCE MEASUREMENT IN THE AEC/FM INDUSTRY: AN OVERVIEW OF TECHNOLOGIES

  • Jasmine Hines;Abbas Rashidi;Ioannis Brilakis
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.616-623
    • /
    • 2013
  • One of the oldest, most common engineering problems is measuring the dimensions of different objects and the distances between locations. In AEC/FM, related uses vary from large-scale applications such as measuring distances between cities to small-scale applications such as measuring the depth of a crack or the width of a welded joint. Within the last few years, advances in applying new technologies have prompted the development of new measuring devices such as ultrasound and laser-based measurers. Because of wide varieties in type, associated costs, and levels of accuracy, the selection of an optimal measuring technology is challenging for construction engineers and facility managers. To tackle this issue, we present an overview of various measuring technologies adopted by experts in the area of AEC/FM. As the next step, to evaluate the performance of these technologies, we select one indoor and one outdoor case and measure several dimensions using six categories of technologies: tapes, total stations, laser measurers, ultrasound devices, laser scanners, and image-based technologies. Then we evaluate the results according to various metrics such as accuracy, ease of use, operation time, associated costs, compare these results, and recommend optimal technologies for specific applications. The results also revealed that in most applications, computer vision-based technologies outperform traditional devices in terms of ease of use, associated costs, and accuracy.

  • PDF