• Title/Summary/Keyword: Distributed architecture

Search Result 1,409, Processing Time 0.035 seconds

A Study on the Architectural Composition of the World Heritage Jeongeup MuseongSeowon - Focusing on the Lecture Area - (세계유산 정읍무성서원의 건축구성에 관한연구 - 강학영역을 중심으로 -)

  • Kim, Yun-Sang
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.24 no.3
    • /
    • pp.13-21
    • /
    • 2022
  • Seowon is an educational institution of Neo-Confucianism in the Joseon Dynasty and is distributed throughout the country. Such a Seowon has a certain form in the composition and arrangement of buildings. Korean Seowon were recognized as excellent for localization by transforming them according to the local environment. Therefore, it was registered as a World Heritage Site. Museongseowon is located in the village differently from the 8 registered Seowons. However, data and research on the location setting and architectural composition of MuseongSeowon are insignificant, so related research is needed. Therefore, in this study, the appearance of the period when MuseongSeowon was equipped with architectural formality was investigated. This study compared the appearance of MuseongSeowon in Chilkwong-do drawn in 1910 and the present appearance, focusing on the Ganghak area. As a result, the architectural composition of the Seowon was similar to the present appearance after the revision of the Gangdang area in Chilkwong-do. Therefore, the present architectural composition of the Seowon appears to be the same as before 1900. In addition, the location and appearance of Heunghakjae and Myeonamsa, which were currently lost in the Gangsujae area, were partially derived. It seems that seowon played a central role in the village even after 1910. Also, since it is located in the village, the building seems to have a flexible spatial composition.

A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges

  • Alqarni, Manal M.;Cherif, Asma;Alkayal, Entisar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.952-973
    • /
    • 2021
  • In recent years, mobile devices have become an essential part of daily life. More and more applications are being supported by mobile devices thanks to edge computing, which represents an emergent architecture that provides computing, storage, and networking capabilities for mobile devices. In edge computing, heavy tasks are offloaded to edge nodes to alleviate the computations on the mobile side. However, offloading computational tasks may incur extra energy consumption and delays due to network congestion and server queues. Therefore, it is necessary to optimize offloading decisions to minimize time, energy, and payment costs. In this article, different offloading models are examined to identify the offloading parameters that need to be optimized. The paper investigates and compares several optimization techniques used to optimize offloading decisions, specifically Swarm Intelligence (SI) models, since they are best suited to the distributed aspect of edge computing. Furthermore, based on the literature review, this study concludes that a Cuckoo Search Algorithm (CSA) in an edge-based architecture is a good solution for balancing energy consumption, time, and cost.

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

Extensive Reorganization of the Chloroplast Genome of Corydalis platycarpa: A Comparative Analysis of their Organization and Evolution with other Corydalis plastomes

  • Grusamy Raman;SeonJoo Park
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2023.04a
    • /
    • pp.15-15
    • /
    • 2023
  • The chloroplast (cp) is an autonomous plant organelle with an individual genome that codes for essential cellular functions. The architecture and gene content of the cp genome is highly conserved in angiosperms. The plastome of Corydalis belongs to the Papaveraceae family, and the genome is comprised of unusual rearrangements and gene content. Thus far, no extensive comparative studies have been carried out to understand the evolution of Corydalis chloroplast genomes. Therefore, the Corydalis platycarpa cp genome was sequenced, and wide-scale comparative studies were conducted using publicly available twenty Corydalis plastomes. Comparative analyses showed that an extensive genome rearrangement and IR expansion occurred, and these events evolved independently in the Corydalis species. In addition, the protein-coding genes accD and the ndh gene loss events occurred in the common ancestor of the Corydalis and sub-clade of the Corydalis lineage, respectively. The gene ndh lost in the Corydalis-sub clade species is distributed predominantly in the Qinghai-Tibetan plateau (QTP) region. The molecular clock analysis suggests that the divergence time of all the ndh gene lost Corydalis sub-clade species occurred in the 44.31 - 15.71 mya. These results coincide very well with the uplift of the Qinghai-Tibet Plateau in the Oligocene and Miocene periods, and maybe during this period, it probably triggered the radiation of the Corydalis species. To the best of the authors' knowledge, this is the first large-scale comparative study of Corydalis plastomes and their evolution. The present study may provide insights into the plastome architecture and the molecular evolution of Corydalis species.

  • PDF

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements

Actual Vegetation and Plant Community Structure of Geumsun Valley and Weonjeok Valley in Naejangsan(Mt.) National Park, Korea (내장산국립공원 금선계곡과 원적계곡의 현존식생 및 식물군집구조)

  • Bae, Ki-Wook;Lee, Kyong-Jae;Han, Bong-Ho;Kim, Jong-Yup;Jang, Jae-Hoon
    • Korean Journal of Environment and Ecology
    • /
    • v.26 no.3
    • /
    • pp.412-425
    • /
    • 2012
  • This study investigated the actual vegetation and plant community structure of Geumsun valley and Weonjeok valley of Naejangsan(Mt.) National Park to provide the data for park management. As a result of analysis of actual vegetation, Quercus variabilis community(47.3%) and Quercus serrata community(17.0%) are widely distributed but Carpinus tschonoskii community(7.5%) and Zelkova serrata community(6.9%) are distributed in valley forests. Plant communities were divided into 6 communities of Fraxinus mandshurica, Carpinus tschonoskii, Carpinus tschonoskii-Platycarya strobilacea-Zelkova serrata, Zelkova serrata, deciduous broad-leaved mixture(Zelkova serrata-Lindera erythrocarpa-Acer palmatum), and Lindera erythrocarpa-Cornus walteri according to the analysis of TWINSPAN of classification using 20 plots($400m^2$). Geumseon valley is composed of boulder stone area of average slope $20^{\circ}$, and there were distributed Fraxinus mandshurica community of 86 years old, Carpinus tschonoskii community in age from 56 to 79, and Carpinus tschonoskii-Platycarya strobilacea-Zelkova serrata community in age from 48 to 71. Weonjeok valley is composed of boulder stone area of average slope $11^{\circ}$, and there were distributed Zelkova serrata community in age from 52 to 71, deciduous broad-leaved mixture community in age from 49 to 70, and Lindera erythrocarpa-Cornus walteri community in age from 43 to 51. Ecological succession of each community was predicted to maintain same state. The Shannon's species diversity showed from 0.8220(Fraxinus mandshurica community) to 1.3850(Carpinus tschonoskii community) per unit area of $400m^2$.

Vibration Analysis of Beam and Plate with Viscoelastic Supports (점탄성요소 지지경계조건을 갖는 보/평판의 진동해석)

  • 강기호;김광준
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1995.04a
    • /
    • pp.153-158
    • /
    • 1995
  • 보 및 평판의 진동에 대해서 에너지의 손실은 재료감쇠를 이용한 표면감쇠처리나 지지부에서의 감쇠처리에 의하여 증가될 수 있다. 감쇠재료를 이용한 표면감쇠처리의 예로서 보/평판 표면에 접착되는 감쇠 테이프나 코팅등은 아주 효과적임이 입증되었다. 마찬가지로 지지부 감쇠처리는 점탄성재료의 삽입에 의해서 설명될수 있다[1]. 보/평판의 감쇠에 대한 최근의 많은 연구들은 진동하고 있는 보/평판의 표면에 적용하는 감쇠 테이프 혹은 적층형태의 감쇠 처리방법에 대해서 주로 수행되었다. 일반적으로 표면감쇠처리방법은 진동감소에 아주 효과적이지만 실제 적용상에서 항상 가능한 것은 아니며, 이와 같은 경웨는 지지부 감쇠 처리방법에 의존하게 된다[2]. 감쇠특성을 갖는 점탄성재료를 실제로 적용할 때 보/평판의 유한한 길이가 점탄성재료로 지지되며 점탄성재료의 물성치와 치수에 따라서 계의 모우드 매개변수(고유진동수, 계의 손실계수 그리고 모우드형상)가 크게 달라진다. 그리고 이와 같은 계에 대해서는 지지부의 거동보다는 전체 시스템의 고유진동수와 손실계수 그리고 보 영역에서의 모우드 형상에 더 관심이 있으므로 지지부 영역을 집중매개변수(lumped parameter)로 나타내어 계를 해석할 수 있다. 일반적으로 보와 평판의 경계에서는 병진 및 회전방향의 강성 뿐만 아니라 두 강성사이에 연성효과도 동시에 발생하게 되므로 이 항을 고려하여 계를 모델링해야 한다. 본 연구에서는 우선 점탄성 재료에 의한 지지부영역의 등가 강성계수들을 구하고 경계에 강성행렬을 갖는 보의 등가시스템을 얻는다. 그리고 등가시스템의 주파수방정식으로부터 모우드 매개변수에 대한 지지부의 영향을 살펴본다. 또한 시스템이 비교적 복잡한 사각 평판의 진동에 대해서도 동강성행렬법(dynamic stiffness matrix method)을 이용하여 해석하고자 한다. 수준임이 입증되었다. 본 연구의 결과를 토대로우리나라 젊고 건강한 남성에게 적합한 무게상수는 작업자군에 대하여 25.05kg, 학생군에 대하여 20.24kg 으로 나타나 이는 미국 NIOSH 안전기준과 대체로 일치함을 발견하였다.ive structures utilized in Client/server architecture for distribution and cooperative processing of application between server and client this study presents two different data management methods under the Client/server environment; one is "Remote Data Management Method" which uses file server or database server and. the other is "Distributed Data Management Method" using distributed database management system. The result of this study leads to the conclusion that in the client/server environment although distributed application is assumed, the data could become centralized (in the case of file server or database server) or decentralized (in the case of distributed database system) and the data management method through a distributed database system where complete responsi

  • PDF

Simplistic Beam Theory-based Structural Safety Evaluation Method for Block Structure on the A-Carrier (블록 구조물 적치용 지지대의 빔 이론 기반 구조 안전성 평가법)

  • Myung-Su Yi;Joo-Shin Park
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.4
    • /
    • pp.358-364
    • /
    • 2024
  • Type A carrier structures that support blocks or equipment gradually deform over time with load changes, reducing the area in contact with the block and changing the load pattern from distributed to concentrated during construction work in the shipyard. This phenomenon has the potential to misrepresent actual service loads. In particular, A carriers are often used by small manufacturers, who often do not have specialized engineering capabilities, necessitating the development of a method for easy calculation of carrier safe working load. This study proposes a quick evaluation method for the long-term safe working load of Type A carriers, to predict the plastic deformation and safety issues resulting from changes in load distribution. Based on the results of finite element analysis (beam and shell modeling) of the centralized load, beam-theory was modified to propose a method for determining the distributed load conditions of the A-carrier. In beam modeling, the theoretical value was multiplied by a correction factor of 0.73 for concentrated loads and 0.69 for distributed loads to obtain a safe working load. For shell modeling, a correction factor of 0.75 can be used for concentrated loads and 0.69 for distributed loads. This study can serve as a basis for improving the safety of shipbuilding, enabling quick and effective decisions for determining safe working loads in actual working environments.

A Study on the Traditional Industrial Landscape Valued as Scenic Site - With the Focus on Daranginon, Dok-sal, Saltern - (전통산업경관의 명승적 가치 - 다랑이 논, 독살, 염전을 중심으로 -)

  • Lee, Young-Yi;Lee, Jin-Hee;Kim, Hyoung-Dae;Lee, Jae-Keun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.30 no.2
    • /
    • pp.14-27
    • /
    • 2012
  • This study aimed to discover new types of landscape resources that have not designated as cultural heritages through a survey of the nationwide traditional industrial landscape resources whose original forms have been lost or damaged in the aspect of management and conservation. It also discovered and analyzed the values of the traditional industrial landscape considered to be humanistic and cultural values. Among the traditional industrial landscape resources distributed nationwide, this study mainly investigated Daranginon, Dok-sal(Korean traditional stone fishing weir) and saltern. Make a list of traditional industrial landscape based on the scenic resources and analyzed the value as scenic spot by conducted basic research and field work. In case some resources were highly valued, this study aimed to rediscover the value as a cultural heritage of the traditional industrial landscape that was a basis of our ancestors' lives and has represented our traditional agricultural and fishing activities done by them over a long period of time by exploring the possibilities of being designated as cultural heritages. Continuous discoveries and studies of traditional industrial landscapes, conservation and usage of traditional industrial landscapes by being designated as a cultural heritage required to be done will be required to be done. Also, this study was supposed to be used as a basic data.

Developing the Assessment System of Rural Amenity Landscape (농촌 어메니티 경관의 평가 체계 개발과 적용 - "2007 농촌 어메니티 100선"을 중심으로 -)

  • Ahn, Myung-June;Pae, Jeong-Hann;Joo, Shin-Ha;Shin, Ji-Hoon;Lee, Dong-Kun
    • Journal of Korean Society of Rural Planning
    • /
    • v.14 no.2
    • /
    • pp.77-84
    • /
    • 2008
  • Amenity landscapes in rural areas are becoming increasingly important as a resource to enhance the (public) interest in rural landscapes and to vitalize the rural areas. Befitting the times, the objective of this project is to discover the amenity landscapes distributed throughout the rural areas and to produce material in the form of a publication for the promotion of the aforementioned landscapes. For such purposes, local autonomous bodies, rural amenity resource investigation team, and experts on landscape found rural amenity landscapes and entered them for a selection process, out of which the top 100 rural amenity landscapes were ultimately selected based both on the assessment system developed by the researchers and on the assessment process executed by the assessment committee. The following two categories of assessment criteria for the amenity landscapes were presented: village-related assessment criteria including value as resource and use value; landscape-resources-related assessment criteria, including aesthetic value, identity, adherence to traditionality, and sustainability. Assessment for each criteria item was made by applying a 5-point Likert scale throughout. The sum of the points for each landscape was then converted at a 100 point scale for ultimate use in selection of the top 100 landscapes. This paper is the outcome of such series of processes and systems.