• Title/Summary/Keyword: Distributed architecture

Search Result 1,409, Processing Time 0.029 seconds

VisDiS: A Visual Architecture Description Language supporting Distributed System Design (VisDiS: 분산 시스템 설계를 위한 시각적 아키텍쳐 기술 언어)

  • 정인복;김형호;배두환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10a
    • /
    • pp.469-471
    • /
    • 1999
  • 컴포넌트 기반 개발 방법이 확산됨에 따라 소프트웨어 아키텍처는 핵심 기술중의 하나로서 각광받고 있다. 컴포넌트 기반의 아키텍처의 연구와 함께 정형적 아키텍처 기술을 지원하는 많은 아키텍처 기술 언어들이 제시되었다. 그러나, 메시지 전달 패러다임을 기술하고 분석할 필요가 있는 분산 시스템의 경우 기존의 아키텍처 기술 언어들은 이러한 기능의 지원이 부족하다. 본 논문에서는 메시지 전달 패러다임을 명확하게 기술할 수 있고, 이를 기반으로 적합성을 검사할 수 있으며, 일반 개발자들이 이용하기 편리한 시각적 아키텍처 기술 언어를 제시한다. 이를 통하여 분산 시스템을 설계하는 경우, 좀 더 정확한 분석과 정보를 제공할 수 있고, 시각적 언어로서 일반 개발자들이 좀 더 편리하게 아키텍처를 설계할 수 있게 된다.

  • PDF

Intelligent navigation and control system for a mobile robot based on different programming paradigms

  • Kubik, Tomasz;Loukianov, Andrey A.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.36.6-36
    • /
    • 2001
  • The problem of robot navigation and control is a complex task. Its complexity and characteristics depends on the characteristics of the environment robot inhabits, robot construction (mechanical abilities to move, sense) and the job the robot is supposed to do. In this paper we propose a hybrid programming approach to mobile robot navigation and control in an indoor environment. In our approach we used declarative, procedural, and object oriented programming paradigms and we utilized some advantages of our distributed computing architecture. The programming languages corresponding to the paradigms we used were C, C++ and Prolog. In the paper we present some details of our mobile robot hardware and software structure, focusing on the software design and implementation.

  • PDF

Torsional parameters importance in the structural response of multiscale asymmetric-plan buildings

  • Bakas, Nikolaos;Makridakis, Spyros;Papadrakakis, Manolis
    • Coupled systems mechanics
    • /
    • v.6 no.1
    • /
    • pp.55-74
    • /
    • 2017
  • The evaluation of torsional effects on multistory buildings remains an open issue, despite considerable research efforts and numerous publications. In this study, a large number of multiple test structures are considered with normally distributed topological attributes, in order to quantify the statistically derived relationships between the torsional criteria and response parameters. The linear regression analysis results, depict that the center of twist and the ratio of torsion (ROT) index proved numerically to be the most reliable criteria for the prediction of the modal rotation and displacements, however the residuals distribution and R-squared derived for the ductility demands prediction, was not constant and low respectively. Thus, the assessment of the torsional parameters' contribution to the nonlinear structural response was investigated using artificial neural networks. Utilizing the connection weights approach, the Center of Strength, Torsional Stiffness and the Base Shear Torque curves were found to exhibit the highest impact numerically, while all the other torsional indices' contribution was investigated and quantified.

A Double-blockchain Architecture for Secure Storage and Transaction on the Internet of Things Networks (IoT 네트워크에서 스토리지와 트랜잭션 보호를 위한 이중 블록체인 구조)

  • Park, jongsoon;Park, chankil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.43-52
    • /
    • 2021
  • IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography(ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing(CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

The Design of Integrated Flying Vehicle Model for Engagement Analyses of Missiles

  • Ha, Sue Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.8
    • /
    • pp.930-939
    • /
    • 2019
  • High-Level Architecture(HLA)/Run-Time Infrastructure(RTI) are standards for distributed simulation systems and offer a technology to interconnect them and form one single simulation system. In defense domain, M&S is the only way to prove effectiveness of weapon systems except for Live Fire Testing (LFT). This paper focuses on guided missile simulations in weapon systems for engagement analyses and proposes the integrated flying vehicle model that is based on HLA/RTI. There are a lot of missiles in real world; therefore, we should develop each missile models in M&S in order to apply battlefield scenarios. To deal with the difficulties, in this paper, firstly, I classify these missiles into three models: ballastic, cruise, and surface-to-air missile models, and then I design each missile model and integrates them into a single model. This paper also offers a case study with my integrated flying vehicle model. At the conclusion, this paper presents contributions of this paper.

An Architecture for Distributed Processing of Composite Web Services (복합 웹 서비스의 분산 처리 구조)

  • Park, Chang-Sup;Lee, Sang-Soo
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.633-636
    • /
    • 2004
  • 웹 서비스는 이질적인 응용 시스템들 사이의 연동 및 통합을 위한 표준화된 수단을 제공한다. 본 논문에서는 기존 웹 서비스들을 이용하여 정의되는 복합 웹 서비스를 효율적으로 실행하기 위한 방안으로서 사용자 에이전트를 이용한 분산 처리 시스템 구조 및 처리 방법을 제안한다. 본 시스템은 웹 서비스들의 통신 QoS 및 복합 웹 서비스의 부하 등을 고려하여 복합 웹 서비스의 호출 및 통합 작업을 사용자 에이전트에게 동적으로 위임하여 분산 처리함으로써 복합 웹 서비스의 성능 및 가용성을 향상시킨다.

  • PDF

Augmented Reality Haptic Upper Garment for Wear Sensation (착용감 구현을 위한 증강현실용 햅틱 상의(上衣))

  • Yim, Eunhyuk;Kwon, Jeanne;Lee, Sooyong
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.2
    • /
    • pp.150-156
    • /
    • 2019
  • Haptic systems have been widely used for both virtual reality and augmented reality application including game, entertainment, education and medical sectors. Clothing designers and retailers initiated using AR and VR technologies to help the consumers find style with the perfect fit. Most of the developed augmented reality shopping is implemented by overlapping the image of the clothes on the customer so that he/she can find the fit. However, those are only visual information and the customer cannot experience the real size and the stiffness of the clothes. In this paper, we present the haptic upper garment which provides the haptic feedback to the user using cables. By controlling the length of the cable, the size of the clothes is set and by stiffness control, the compliance of the fabric is implemented. The haptic garment is modeled for precise control and the distributed controller architecture is described. With the haptic upper garment, the user's experience of the virtual clothes is greatly enhanced.

Risk of Attack through an Open Wireless Network of IoT Devices (IoT 장치의 개방형 무선 네트워크를 통한 공격 위험)

  • Lee, Geonwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.10-14
    • /
    • 2019
  • The number of security incidents is increasing as the Internet of Things(IoT) is distributed widely. The security incidents of IoT can cause financial damages. Moreover, It can become direct threats to humans. In order to prevent these problems, the security installation for IoT devices is important. This paper describes the definition of IoT devices, security incident case, architecture, and the security threats that can occur when a device is connected to network without security installation.

  • PDF

Intrusion Detection System for Home Windows based Computers

  • Zuzcak, Matej;Sochor, Tomas;Zenka, Milan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4706-4726
    • /
    • 2019
  • The paper is devoted to the detailed description of the distributed system for gathering data from Windows-based workstations and servers. The research presented in the beginning demonstrates that neither a solution for gathering data on attacks against Windows based PCs is available at present nor other security tools and supplementary programs can be combined in order to achieve the required attack data gathering from Windows computers. The design of the newly proposed system named Colander is presented, too. It is based on a client-server architecture while taking much inspiration from previous attempts for designing systems with similar purpose, as well as from IDS systems like Snort. Colander emphasizes its ease of use and minimum demand for system resources. Although the resource usage is usually low, it still requires further optimization, as is noted in the performance testing. Colander's ability to detect threats has been tested by real malware, and it has undergone a pilot field application. Future prospects and development are also proposed.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.