RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

        Mateen, Ahmed,Zhu, Qingsheng,Afsar, Salman,Rehan, Akmal,Mumtaz, Imran,Ahmad, Wasi The International Promotion Agency of Culture Tech 2019 International Journal of Advanced Culture Technolo Vol.7 No.4

        The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

      • KCI등재

        RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY

        Mateen, Ahmed,Zhu, Qingsheng,Afsar, Salman,Bashir, Salman The International Promotion Agency of Culture Tech 2019 International Journal of Advanced Culture Technolo Vol.7 No.3

        Radio Frequency Identification (RFID) skill is becoming a technology that might deliver a response to manual glitches. The use of tags, receiver and wireless surfs to join with each other would mean that RFID in combination with the EPC would speech these pain opinions and offer many welfares in different sectors such as production, distribution, trade, logistics, and security. Potential benefits include increased visibility rising supply chain, enlarged proficiency and cost savings through improved data harmonization, better responsiveness to actual prominence change. Trendy the case of the textile or industrial applications, recent systems used by the industry to control the supply chain in addition strength discernibility are being studied, besides improvements in the overall perceptibility of assets are anticipated through labels, readers, drivers, POEs, etc. this model will be developed with new situations and a lively construction industry. It will be focused on Cost, Hardware compatibility, security and maintenance issues.

      • KCI등재

        Record keeping system of bugs for software quality assurance

        Mateen, Ahmed,Zhu, Qingsheng,Afsar, Salman The Institute of Internet 2019 International journal of advanced smart convergenc Vol.8 No.4

        Assistance for the quality assurance management and developers to provide high quality software products. Using a bug record keeping system is exceptionally important in software progress, and it is followed vastly by majority of software producing companies in modern era. Regular application of a bug record keeping system is very helpful in developing software systems. We developed this system which helps the software testing team to keep a complete record of their testing activities during the software testing, also increases your confidence in the software quality, class and worth. Our proposed system offers trouble-free and effortless approaches to acquire desired information about bug, also produces different kinds of reports like summary reports, detailed reports etc. It gives facility to create, delete and update any project. Our developed application system is designed by using visual c# at front end and sql server 2008 management studio express at back end.

      • KCI등재

        Dielectric, Ferroelectric and Strain Properties of (Bi0.5Na0.5)0.935Ba0.065Ti1-x(Al0.5Nb0.5)xO3 Lead-free Piezoelectric Ceramics

        Mateen Ullah,Amir Ullah,Hidayat Ullah Khan,Imtiaz Ahmad,김일원 한국물리학회 2020 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.76 No.2

        Piezoelectric ceramics (Bi0.5Na0.5)0.935Ba0.065Ti1-x(Al0.5Nb0.5)xO3 (BNBT-AN) have been synthesized for x = 0, 0.010, 0.015, 0.020, 0.025, and 0.030 through simple solid state reaction technique. Synthesis and sintering of all the systems were successful as single phase was obtained through out. This work explains the influence of AN on morphology, phase structure, electrical and electromechanical characteristics of the parent BNBT matrix. All compositions were single phase perovskites by X-ray diffraction (XRD), that could be confirmed as the tetragonal, P4/m, and rhombohedral, R3c, mixed structures. Tetragonality was increased with increase in the AN content. With similar modification, dynamic piezoelectric constant d*33 (= Smax/Emax) was increased monotonically gaining a highest value of 354 pm/V corresponding to x = 0.030. The overall increase was found in remnant polarization (Pr) for all the systems except for the one with x = 0.030. Maximum Pr, 30.6 μC/cm^2, was noted for x = 0.025. This phenomenon was also accompanied by a persistent decrease in coercive field Ec, from 28.0 kV/cm for undoped to 14.5 kV/cm for 3 mol%. The ceramics were signified with encouraging electrical properties.

      • KCI등재

        IoT based real time agriculture farming

        Mateen, Ahmed,Zhu, Qingsheng,Afsar, Salman The Institute of Internet 2019 International journal of advanced smart convergenc Vol.8 No.4

        The Internet of things (IOT) is remodeling the agribusiness empowering the agriculturists through the extensive range of strategies, for example, accuracy as well as practical farming to deal with challenges in the field. The paper aims making use of evolving technology i.e. IoT and smart agriculture using automation. The objective of this research paper to present tools and best practices for understanding the role of information and communication technologies in agriculture sector, motivate and make the illiterate farmers to understand the best insights given by the big data analytics using machine learning. The methodology used in this system can monitor the humidity, moisture level and can even detect motions. According to the data received from all the sensors the water pump, cutter and sprayer get automatically activated or deactivated. we investigate a remote monitoring system using Wi-Fi. These nodes send data wirelessly to a central server, which collects the data, stores it and will allow it to be analyzed then displayed as needed and can also be sent to the client mobile.

      • Query Processing Framework for Blockchain

        Abdul Mateen,Narayan Khatri,Seung Yeob Nam 한국통신학회 2022 한국통신학회 학술대회논문집 Vol.2022 No.2

        Blockchain has gained popularity due to distributed nature which allow to keep track of a set of global states. It has completely changed the working of businesses and organizations. Immutability is one of blockchain"s most powerful features, as it prevents data manipulation within the network. Traditional databases, on the other hand, lack this feature and are thus more vulnerable. In this paper, we first survey the state of the art, focusing on data and query processing in Blockchain. The blockchain and traditional database systems are compared. The study"s main goal is to better comprehend data analytics in Blockchain technology based on the framework to handle incoming queries efficiently.

      • KCI등재

        LA-ICP-MS zircon U-Pb age and Hf isotope data from the granitic rocks in the Iwakuni area, southwest Japan: reevaluation of emplacement order and the source magma

        Tayyaba Mateen,Kazuaki Okamoto,Sun-Lin Chung,Kuo-Lung Wang,Hao-Yang Lee,Shuhei Abe,Yuji Mita,Hafiz U. Rehman,Masaru Terabayashi,Hiroshi Yamamoto 한국지질과학협의회 2019 Geosciences Journal Vol.23 No.6

        U-Pb-Hf isotopes of zircons from the granitic intrusive rocks in the Iwakuni area of southwest Japan are determined by LA-ICP-MS analysis. The Gamano Granodiorite belonging to the Older Ryoke Granites of the Ryoke Belt yielded U-Pb mean age of 92.3 ± 2.6 Ma (MSWD = 1.8). The Namera Granite belonging to the Younger Ryoke Granites of the Ryoke Belt yielded U-Pb mean age of 106.3 ± 1.6 Ma (MSWD = 2.3). The Shimokuhara Granite belonging to the Hiroshima Granites of the San-yo Belt yielded U-Pb mean age of 103.8 ± 1.5 Ma (MSWD = 0.32). A granite porphyry sample taken from about 15 m thick dike discordantly intruded into pelitic schist of the Ryoke metamorphic rocks yielded U-Pb mean age of 92.5 ± 1.6 Ma (MSWD = 0.63). Hf isotope data, obtained from the same dated zircon grains, show initial 176Hf/177Hf isotopic ratios referred to as “εHf(t)” generally ranging between –4.8 and +1.1 except an anomalously low value (–15.0) from an inherited core. The εHf(t) values, calculated with average crustal 176Lu/177Hf ratio of 0.015, correspond to Hf isotope crustal model ages between 1474 to 1087 Ma (Mesoproterozoic). The Gamano Graodiorite has long been regarded to be a syn-tectonic intrusion, but the zircon ages and εHf(t) values are similar to those of the post-tectonic granite porphyry dike. The results of this study together with available U-Pb zircon ages of granitic rocks in the Iwakuni area reported elsewhere reveal that the order of emplacement indicated by the U-Pb zircon ages are much discrepant with the traditional classification, the Older Ryoke, the Younger Ryoke. It is better to refrain from the use of “Older” and “Younger” for the collective names of the granitic intrusive bodies.

      • KCI등재

        캠퍼스 보안을위한 IoT 및 무선 센서 네트워크 모니터링

        Ahmed Mateen,Qingsheng Zhu,Salman Afsar,Muhammad Usman 한국인터넷방송통신학회 2018 한국인터넷방송통신학회 논문지 Vol.18 No.6

        스마트 캠퍼스의 플랫폼으로 사물 인터넷에 대한 아이디어가 점점 대중화되고 있다. 인터넷에 연결하기 위해 통신네트워크, 센서 노드 및 게이트웨이로 구성된 인프라가 필요하며 각 센서 노드는 환경에서 데이터를 수집할 수 있다. 본 논문은 스마트 캠퍼스 모니터링을 적용하기 위해 인터넷에 구성한 무선 센서 네트워크를 설명한다. 무선 센서 네트워크 모니터링은 저전력 구현 및 통합 시스템을 사용하는 완벽한 솔루션이다. 그러나 제한된 컴퓨팅 범위, 제한된 컴퓨팅 성능, 네트워크프로토콜의 가용성 부족, 프로그래밍 보안 부족 및 기밀성, 무결성 및 가용성 분야의 보안 오류로 인해 수많은 제약이 있다. WSNM 노드를 위한 새로운 보안 기술과 기능이 개발되었다. 보안 네트워크 연구 개발 및 서비스 거부 (DOS) 및 복잡성공격 방지를 위한 시스템을 제안하였다. 이러한 시스템이 제대로 구현되면 사전 할당을 통한 에너지 효율성 메커니즘과 안전한 루틴 알고리즘을 통해 핵심 관리 모델의 새로운 키를 제공 할 수 있다. The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼