• Title/Summary/Keyword: 'Two-File' technique'

Search Result 88, Processing Time 0.028 seconds

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.

Internal evaluation of provisional restorations according to the dental CAD/CAM manufacturing method : Three-dimensional superimpositional analysis (치과 CAD/CAM 가공방식에 따른 임시보철물의 내면 적합도 : 3차원 중첩 분석)

  • Kim, Jae-Hong;Kim, Ki-Baek
    • Journal of Technologic Dentistry
    • /
    • v.41 no.2
    • /
    • pp.81-86
    • /
    • 2019
  • Purpose: The purpose of the present study was to compare the internal fit of two different temporary restorations fabricated by dental CAD/CAM system and to evaluate clinical effectiveness. Methods: Composite resin tooth of the maxillary first molar was prepared as occlusal reduction(2.0mm), axial reduction(1mm offset), vertical angle(6 degree) and chamfer margin for a temporary crown and duplicated epoxy die was fabricated. The epoxy dies were used to fabricate provisional restorations by CAD/CAM milling technique or 3D-printing technique. The inner data from all crowns were superimposed on the master die file in the 'best-fit alignment' method using 3D analysis software. Statistical analysis was performed using a Wilcoxon's rank sum test for differences between groups. Results: It showed that the internal RMS(Root Mean Square) values of the additive group were significantly larger than those of other group. No significant differences in internal discrepancies were observed in the temporary crowns among the 2 groups with different manufacturing method. Conclusion: All the groups had the internal fit within the clinical acceptable range (< $50{\mu}m$). The continuous research in the future to be applied clinically for the adaptation of additive manufacturing technique are needed.

2D-THI: Two-Dimensional Type Hierarchy Index for XML Databases (2D-THI: XML 데이테베이스를 위한 이차원 타입상속 계층색인)

  • Lee Jong-Hak
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.3
    • /
    • pp.265-278
    • /
    • 2006
  • This paper presents a two-dimensional type inheritance hierarchy index(2D-THI) for XML databases. XML Schema is one of schema models for the XML documents supporting. The type inheritance. The conventional indexing techniques for XML databases can not support XML queries on type inheritance hierarchies. We construct a two-dimensional index structure using multidimensional file organizations for supporting type inheritance hierarchy in XML queries. This indexing technique deals with the problem of clustering index entries in the two-dimensional domain space that consists of a key element domain and a type identifier domain based on the user query pattern. This index enhances query performance by adjusting the degree of clustering between the two domains. For performance evaluation, we have compared our proposed 2D-THI with the conventional class hierarchy indexing techniques in object-oriented databases such as CH-index and CG-tree through the cost model. As the result of the performance evaluations, we have verified that our proposed two-dimensional type inheritance indexing technique can efficiently support the query Processing in XML databases according to the query types.

  • PDF

Implementation and Performance Measuring of Erasure Coding of Distributed File System (분산 파일시스템의 소거 코딩 구현 및 성능 비교)

  • Kim, Cheiyol;Kim, Youngchul;Kim, Dongoh;Kim, Hongyeon;Kim, Youngkyun;Seo, Daewha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1515-1527
    • /
    • 2016
  • With the growth of big data, machine learning, and cloud computing, the importance of storage that can store large amounts of unstructured data is growing recently. So the commodity hardware based distributed file systems such as MAHA-FS, GlusterFS, and Ceph file system have received a lot of attention because of their scale-out and low-cost property. For the data fault tolerance, most of these file systems uses replication in the beginning. But as storage size is growing to tens or hundreds of petabytes, the low space efficiency of the replication has been considered as a problem. This paper applied erasure coding data fault tolerance policy to MAHA-FS for high space efficiency and introduces VDelta technique to solve data consistency problem. In this paper, we compares the performance of two file systems, MAHA-FS and GlusterFS. They have different IO processing architecture, the former is server centric and the latter is client centric architecture. We found the erasure coding performance of MAHA-FS is better than GlusterFS.

Comparison of shaping ability using various Nickel-Titanium rotary files and hybrid technique (다양한 전동 니켈 티타늄 파일과 혼합사용법에 의한 근관 성형 효율 비교)

  • Kim, Jung-Won;Park, Jeong-Kil;Hur, Bock;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • v.32 no.6
    • /
    • pp.530-541
    • /
    • 2007
  • Currently, various Nickel-Titanium rotary files are used in endodontic treatment, but there is no one perfect system that can be applied to any clinical situation. Therefore, the combined uses of various file systems which can emphasize the advantages of each system are introduced as hybrid instrumentation. The ProTaper system is efficient in body shaping and apical pre-enlargement but is reported to have more possibility of transportation and produce more aberrations and deformation in more or less severe curved canals. Recently, new ProTaper system(ProTaper Universal) with different configuration and cross-sectional design to overcome the week points of ProTaper have been marketed. The purpose of this study was to compare and evaluate the shaping abilities of ProTaper, ProTaper Universal system, and two hybrid methods using S-series of ProTaper Universal and Hero Shaper or ProFile. The time lapses for instrumentation were measured and the used files were inspected for distortion. The pre- and post-instrumented root canals were scanned and superimposed to evaluate the aberrations and reduction of root canal curvature and change of radius of canal curvature. The increased canal width and apical centering ratio were calculated at 1, 2, 3, 4 and 5 mm levels from apical foramen. Under the conditions of this study, the ProTaper Universal seems to have better shaping ability than ProTaper in terms of instrumented width and instrumentation time. It may be suggested that the ProTaper Universal system is efficient as much as hybrid instrumentation using ProTaper and other constant-tapered NiTi file systems in highly experienced operators.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

Virtual Target Overlay Technique by Matching 3D Satellite Image and Sensor Image (3차원 위성영상과 센서영상의 정합에 의한 가상표적 Overlay 기법)

  • Cha, Jeong-Hee;Jang, Hyo-Jong;Park, Yong-Woon;Kim, Gye-Young;Choi, Hyung-Il
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1259-1268
    • /
    • 2004
  • To organize training in limited training area for an actuai combat, realistic training simulation plugged in by various battle conditions is essential. In this paper, we propose a virtual target overlay technique which does not use a virtual image, but Projects a virtual target on ground-based CCD image by appointed scenario for a realistic training simulation. In the proposed method, we create a realistic 3D model (for an instructor) by using high resolution Geographic Tag Image File Format(GeoTIFF) satellite image and Digital Terrain Elevation Data (DTED), and extract the road area from a given CCD image (for both an instructor and a trainee). Satellite images and ground-based sensor images have many differences in observation position, resolution, and scale, thus yielding many difficulties in feature-based matching. Hence, we propose a moving synchronization technique that projects the target on the sensor image according to the marked moving path on 3D satellite image by applying Thin-Plate Spline(TPS) interpolation function, which is an image warping function, on the two given sets of corresponding control point pair. To show the experimental result of the proposed method, we employed two Pentium4 1.8MHz personal computer systems equipped with 512MBs of RAM, and the satellite and sensor images of Daejoen area are also been utilized. The experimental result revealed the effective-ness of proposed algorithm.

Neuro-Fuzzy Controller Design for Level Controls

  • Intajag, S.;Tipsuwanporn, V.;Koetsam-ang, N.;Witheephanich, K.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.546-551
    • /
    • 2004
  • In this paper, a level controller is designed with the neuro-fuzzy model based on Takagi-Sugeno fuzzy system. The fuzzy system is employed as the controller, which can be tuned by the neural network mechanism based on a gradient descent technique. The tuning mechanism will provide an optimal process input by forcing the process error to zero. The proposed controller provides the online tunable mode to adjust the consequent membership function parameters. The controller is implemented with M-file and graphic user interface (GUI) of Matlab program. The program uses MPIBM3 interface card to connect with the industrial processes In the experimentation, the proposed method is tested to vary of the process parameters, set points and load disturbance. Processes of one tank and two tanks are used to evaluate the efficiency of our controller. The results of the both processes are compared with two PID systems that are 3G25A-PIDO1-E and E5AK of OMRON. From the comparison results, our controller performance can be archived in the case of more robustness than the two PID systems.

  • PDF

A Study on Selective Encryption of Huffman Codes (허프만 코드의 선택적 암호화에 관한 연구)

  • Park, Sang-Ho
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.57-63
    • /
    • 2007
  • The security of data in network is provided by encryption. Selective encryption is a recent approach to reduce the computational cost and complexity for large file size data such as image and video. This paper describes techniques to encrypt Huffman code and discusses the performance of proposed scheme. We propose a simple encryption technique applicable to the Huffman code and study effectiveness of encryption against insecure channel. Our scheme combine encryption process and compression process, and it can reduce processing time for encryption and compression by combining two processes.

  • PDF

ATC: An Image-based Atmospheric Correction Software in MATLAB and SML

  • Choi, Jae-Won;Won, Joong-Sun;Lee, Sa-Ro
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.5
    • /
    • pp.417-425
    • /
    • 2008
  • An image-based atmospheric correction software ATC is implemented using MATLAB and SML (Spatial Modeler Language in ERDAS IMAGINE), and it was tested using Landsat TM/ETM+ data. This ATC has two main functional modules, which are composed of a semiautomatic type and an automatic type. The semi-automatic functional module includes the Julian day (JD), Earth-Sun distance (ESD), solar zenith angle (SZA) and path radiance (PR), which are programmed as individual small functions. For the automatic functional module, these parameters are computed by using the header file of Landsat TM/ETM+. Three atmospheric correction algorithms are included: The apparent reflectance model (AR), one-percent dark object subtraction technique (DOS), and cosine approximation model (COST). The ACT is efficient as well as easy to use in a system with MATLAB and SML.