• Title/Summary/Keyword: Distributed architecture

Search Result 1,409, Processing Time 0.023 seconds

A Role-Based Access Control Model of Managed Objects in Distributed System Environments (분산시스템 환경에서 관리 객체에 대한 역할기반 접근제어 모델)

  • Choi Eun-Bok
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.75-86
    • /
    • 2003
  • In this paper, we extended hierarchial structure of managed object class to support Role-Based Access Control, and described constraint conditions that have support dynamic temporal function as well as statical temporal function established by management process. And we defined about violation notifications should report to manager when rules violate constraint conditions. Also we presented system architecture that support RBAC with MIB(Management Information Base) of ITU-T recommendation. By access control enforcement and decision function, constraint conditions and activated translation procedure of each roles are described, our system presents dynamic temporal property systematically.

  • PDF

An Emission-Aware Day-Ahead Power Scheduling System for Internet of Energy

  • Huang, Chenn-Jung;Hu, Kai-Wen;Liu, An-Feng;Chen, Liang-Chun;Chen, Chih-Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4988-5012
    • /
    • 2019
  • As a subset of the Internet of Things, the Internet of Energy (IoE) is expected to tackle the problems faced by the current smart grid framework. Notably, the conventional day-ahead power scheduling of the smart grid should be redesigned in the IoE architecture to take into consideration the intermittence of scattered renewable generations, large amounts of power consumption data, and the uncertainty of the arrival time of electric vehicles (EVs). Accordingly, a day-ahead power scheduling system for the future IoE is proposed in this research to maximize the usage of distributed renewables and reduce carbon emission caused by the traditional power generation. Meanwhile, flexible charging mechanism of EVs is employed to provide preferred charging options for moving EVs and flatten the load profile simultaneously. The simulation results revealed that the proposed power scheduling mechanism not only achieves emission reduction and balances power load and supply effectively, but also fits each individual EV user's preference.

Greenhouse Test Results for Two Years of Sheet shaped Root Barrier Materials Apply to Green Roof System for Sustainable Building Construction

  • Jang, Dae-Hee;Kim, Hyeon-Soo;Choi, Soo-Kyung
    • Journal of the Korea Institute of Building Construction
    • /
    • v.11 no.6
    • /
    • pp.634-644
    • /
    • 2011
  • Recently, As a part of urban forestation, the introductions of green roofs into public projects has been actively driven. Supported by this policy, the sizes of domestic green roof related markets have been rapidly expanding and many types of root barrier materials developed in Korea or abroad are being commercially distributed. In this study, root barrier tests were conducted over two years with nine types of sheet type waterproof materials that are the most commonly used as root barrier layers in green roof systems. The test conditions prepared considered the climates, natural features and vegetation in Korea and the results and related root barrier performance were verified. From the results of this study, the necessity to improve the joint part of root barrier sheets and forming methods has been identified and a measure to improve domestic root barrier testing methods was proposed.

An Efficient Ad Hoc Routing Method for Tactical Networks using Integrated Metrics and Traffic Characteristics (전술 네트워크 환경의 트래픽 특성을 고려한 통합 매트릭 기반 애드혹 라우팅 기법)

  • Roh, Bong-Soo;Hoh, Mi-Jeong;Hwang, Ki-Min;Park, Gui-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1676-1684
    • /
    • 2010
  • Tactical network environments are characterized by unreliable connectivity, communication links which has limited bandwidth compared to commercial networks and distributed architecture where users have high mobility. The best route should be selected based on the required traffic characteristics which can be a wireless channel environments and a status of nodes which are moving. Those characteristics are self aware and should be a routing decision factor in order to guarantee a reliable data transfer. In this paper we define the requirements of services and traffic characteristics on tactical network environments and suggest the new routing method "AODV-IMTC" based on selective routing metric to enable efficient data transfer in wireless ad hoc networks.

A modified replacement beam for analyzing building structures with damping systems

  • Faridani, Hadi Moghadasi;Capsoni, Antonio
    • Structural Engineering and Mechanics
    • /
    • v.58 no.5
    • /
    • pp.905-929
    • /
    • 2016
  • This paper assesses efficiency of the continuum method as the idealized system of building structures. A modified Coupled Two-Beam (CTB) model equipped with classical and non-classical damping has been proposed and solved analytically. In this system, complementary (non-classical) damping models composed of bending and shear mechanisms have been defined. A spatial shear damping model which is non-homogeneously distributed has been adopted in the CTB formulation and used to equivalently model passive dampers, viscous and viscoelastic devices, embedded in building systems. The application of continuum-based models for the dynamic analysis of shear wall systems has been further discussed. A reference example has been numerically analyzed to evaluate the efficiency of the presented CTB, and the optimization problems of the shear damping have been finally ascertained using local and global performance indices. The results reveal the superior performance of non-classical damping models against the classical damping. They show that the critical position of the first modal rotation in the CTB is reliable as the optimum placement of the shear damping. The results also prove the good efficiency of such a continuum model, in addition to its simplicity, for the fast estimation of dynamic responses and damping optimization issues in building systems.

A Study on the Prediction of Welding Distortion and Residual Stress for Channel I Butt SA Weldment Using FE Analysis (유한요소해석을 이용한 채널 I 형 잠호 맞대기 용접부의 변형 및 잔류 응력 예측에 관한 연구)

  • Shin, Dae-Hee;Shin, Sang-Beom;Lee, Joo-Sung
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.44 no.6
    • /
    • pp.598-604
    • /
    • 2007
  • The purpose of this study is to establish the predictive method of welding distortion and residual stress for the channel I butt SA (submerged arc) weldment using FEA. In order to do it, the heat input model for the weldment was defined as the combined heat source with the surface heat flux of gaussian distribution and volumetric heat source uniformly distributed within weld groove by comparing the shapes of molten pool and temperature distribution obtained by FEA with those of experiments. The arc efficiency of SA welding for two-dimensional FE analysis was evaluated as 0.85. The welding distortion and residual stress of the weldment obtained by FEA and heat input model proposed have a good agreement with those obtained by experiment. Based on the results, it was suggested that the proper heat input model should be required to evaluate the welding distortion for weldment.

Application of Living Ionic Polymerizations to the Design of AB-Type Comb-like Copolymers of Various Topologies and Organizations

  • Lanson, David;Ariura, Fumi;Schappacher, Michel;Borsali, Redouane;Deffieux, Alain
    • Macromolecular Research
    • /
    • v.15 no.2
    • /
    • pp.173-177
    • /
    • 2007
  • Living anionic and cationic polymerizations have been combined to prepare various types of comb-like copolymers composed of polystyrene (PS) and polyisoprene (PI) blocks, with a precisely controlled architecture. According to the relative placement of these elementary building blocks, combs with randomly distributed PS and PI or with poly(styrene-b-isoprene) diblock branches (I & II, respectively) can be prepared. The reaction procedure initially includes the synthesis of a poly(chloroethylvinyl ether) using living cationic polymerization, which is used as the reactive backbone to successively graft $PS^-Li^+$ and $PI^-Li^+$ or $PI-b-PS^-Li^+$ to obtain structures (I) or (II). The synthesis of Janus-type PS-comb-b-PI-combs (III) initially involves the synthesis of a diblock backbone using living cationic polymerization, which bears two distinct reactive functions having either a protected or activated form. Living $PS^-Li^+$ and $PI^-Li^+$ are then grafted, in two separate steps, onto each of the reactive functions of the backbone, respectively.

Distributed Space-Time Coded Transmission for Mobile Satellite Communication Using Ancillary Terrestrial Component (ATC를 사용하는 이동위성통신을 위한 분산된 시공간 부호화 전송 방법)

  • Kim, Hui-Uk;Gang, Gun-Seok;An, Do-Seop
    • Journal of Satellite, Information and Communications
    • /
    • v.2 no.1
    • /
    • pp.27-34
    • /
    • 2007
  • A mobile satellite broadcasting service including an ancillary terrestrial component (ATC) takes advantage of the satellite's inherent capability to provide broadcast service over global coverage. We consider the downlink transmission concept using ATC with space=time code (STC) for the mobile satellite communication. We do not regard ATC as simply a repeater but consider it as an antenna for STC. First transmission scenarios for an application of STC are represented. Next, we apply STC in the mobile satellite system including ATC and compare the system performance in the proposed architecture of ATC to that in the conventional structure. The simulation results are compared to the conventional downlink transmission concept for the mobile satellite broadcasting service.

  • PDF

Improvement of Peer Search Time and Control Messages with Rendezvous Peer in P2P Virtual Network

  • Jeong, Wang-Boo;Sohn, Young-Ho;Suh, Hyun-Gon;Kim, Ki-Hyung
    • International Journal of Contents
    • /
    • v.5 no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Peer to Peer (P2P) utilizes the resources of an offered service without the need for a central server or preexistent server-client, making it a desirable network environment for data exchange based on direct connection between peers. Proposed by Sun Microsystems. JXTA(Juxtapose) is a typical P2P system and distributed computing model that does not require central service resources and is flexible to deal with various network configuration changes. Meanwhile. Mobile Ad-hoc NETwork(MANET) is a typical wireless network configured with mobile nodes and without an infrastructure. where a network is established by direct connection or through other peers in the propagation area. Thus, MANET maintains the latest path information by establishing paths and changing path information for communication between peers in a highly mobile wireless network. Accordingly. this article proposes the JXTAMANET method for wireless networks to enable JXTA to be applied to MANET. NS2 is used to evaluate the performance and the proposed architecture is shown to produce better results than a conventional flooding method.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF