• Title/Summary/Keyword: Virtual machines

Search Result 239, Processing Time 0.021 seconds

Real-Time Remote Display Technique based on Wireless Mobile Environments (무선 모바일 환경 기반의 실시간 원격 디스플레이 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.297-302
    • /
    • 2008
  • In case of display a lot of information from mobile devices, those systems are being developed that display the information from mobile devices on remote devices such as TV using the mobile devices as remote controllers because it is difficult to display a lot of information on mobile devices due to their limited bandwidth and small screen sizes. A lot of cost is required to design and develop interfaces for these systems corresponding to each of remote display devices. In this paper, a mobile environment based remote display system for displays at real times is proposed for continuous monitoring of status data for unique 'Mote IDs'. Also, remote data are collected and monitored through sensor network devices such as ZigbeX by applying status perception based remote displays at real times through processing ubiquitous computing environment data, and remote display applications at real times are implemented through PDA wireless mobiles. The system proposed in this paper consists of a PDA for remote display and control, mote embedded applications programming for data collections and radio frequency, server modules to analyze and process collected data and virtual prototyping for monitoring and controls by virtual machines. The result of the implementations indicates that this system not only provides a good mobility from a human oriented viewpoint and a good usability of accesses to information but also transmits data efficiently.

Classification of HDAC8 Inhibitors and Non-Inhibitors Using Support Vector Machines

  • Cao, Guang Ping;Thangapandian, Sundarapandian;John, Shalini;Lee, Keun-Woo
    • Interdisciplinary Bio Central
    • /
    • v.4 no.1
    • /
    • pp.2.1-2.7
    • /
    • 2012
  • Introduction: Histone deacetylases (HDAC) are a class of enzymes that remove acetyl groups from ${\varepsilon}$-N-acetyl lysine amino acids of histone proteins. Their action is opposite to that of histone acetyltransferase that adds acetyl groups to these lysines. Only few HDAC inhibitors are approved and used as anti-cancer therapeutics. Thus, discovery of new and potential HDAC inhibitors are necessary in the effective treatment of cancer. Materials and Methods: This study proposed a method using support vector machine (SVM) to classify HDAC8 inhibitors and non-inhibitors in early-phase virtual compound filtering and screening. The 100 experimentally known HDAC8 inhibitors including 52 inhibitors and 48 non-inhibitors were used in this study. A set of molecular descriptors was calculated for all compounds in the dataset using ADRIANA. Code of Molecular Networks. Different kernel functions available from SVM Tools of free support vector machine software and training and test sets of varying size were used in model generation and validation. Results and Conclusion: The best model obtained using kernel functions has shown 75% of accuracy on test set prediction. The other models have also displayed good prediction over the test set compounds. The results of this study can be used as simple and effective filters in the drug discovery process.

Access Control Mechanism based on MAC for Cloud Convergence (클라우드 융합을 위한 MAC 정책 기반 접근통제 메커니즘)

  • Choi, Eun-Bok;Lee, Sang-Joon
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • Cloud computing technology offers function that share each other computer resource, software and infra structure based on network. Virtualization is a very useful technology for operation efficiency of enterprise's server and reducing cost, but it can be target of new security threat when it is used without considering security. This paper proposes access control mechanism based on MAC(Mandatory Access Control) for cloud convergence that solve various problem that can occur in cloud environment. This mechanism is composed of set of state rules, security characteristics and algorithm. Also, we prove that the machine system with access control mechanism and an initial secure state is a secure system. This policy module of mechanism is expected to not only provide the maintenance but also provide secure resource sharing between virtual machines.

A Monitoring Scheme Based on Artificial Intelligence in Mobile Edge Cloud Computing Environments (모바일 엣지 클라우드 환경에서 인공지능 기반 모니터링 기법)

  • Lim, JongBeom;Choi, HeeSeok;Yu, HeonChang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.27-32
    • /
    • 2018
  • One of the crucial issues in mobile edge cloud computing environments is to monitor mobile devices. Due to the inherit properties of mobile devices, they are prone to unstable behavior that leads to failures. In order to satisfy the service level agreement (SLA), the mobile edge cloud administrators should take appropriate measures through a monitoring scheme. In this paper, we propose a monitoring scheme of mobile devices based on artificial intelligence in mobile edge cloud computing environments. The proposed monitoring scheme is able to measure faults of mobile devices based on previous and current monitoring information. To this end, we adapt the hidden markov chain model, one of the artificial intelligence technologies, to monitor mobile devices. We validate our monitoring scheme based on the hidden markov chain model. The proposed monitoring scheme can also be used in general cloud computing environments to monitor virtual machines.

A Study on the Characteristics of Space Production for Art Museums Reflex Media Art (영상미디어 아트 공간연출 표현특성에 관한 연구 - 미술 전시장을 중심으로 -)

  • Yoo, Jae-Yeup
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2004.05a
    • /
    • pp.156-160
    • /
    • 2004
  • Our time is called as the era of information-oriented society and up-to-date scientific technology, but it can be also called as the era of image. It is because the image has much influence upon our everyday life. In the deluge of images, the delivery of image Is a better and faster synergic tool than the delivery of language, and this trend is consistent with the phases of the times in which the analog modality of synergy is converted into the digital one. The image is a picture that is formed by a physical process, and is all the figures reflected by electronic equipments that reproduce the image. After the discovery of photograph in 1893, the image has been appeared first with the form of movie, and then with the form of TV. However, the appearance of such unidirectional synergic tools as movies and TV. has provided artists with some creative motives with which they intercommunicate their messages via some experimental bidirectional synergic tools. Among image-media arts, the performance of installation and participation is an important example that causes many changes through conceptional conversion, such as the conception of the time in space and formative characteristics. What satisfy this trend have been videos, lasers, holographic, and etc. Furthermore, the appearance of computer has provided a synesthesia, that is, a virtual reality, and mixed a real image with a visional one. The image-media art will realize better synergy through combining brand new machines, informational technology, and art, and have much influence upon our everyday life formatively and artistically in the future. with this study, through analyzing the meaning of relationship between image equipments and space.

  • PDF

An Efficient Agent Framework for Host-based Vulnerability Assessment System in Virtualization Environment (가상화 환경에서 호스트 기반 취약점 분석 시스템을 위한 효율적인 에이전트 프레임워크)

  • Yang, Jin-Seok;Chung, Tai-Myoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.1
    • /
    • pp.23-30
    • /
    • 2014
  • In this paper, we propose an efficient agent framework for host-based vulnerability assessment system by analyzing the operational concept of traditional vulnerability assessment framework and proposed vulnerability assessment agent framework in virtualization environment. A proposed agent framework have concept by using the features of virtualization technology, it copy and execute checking agent in targeted virtual machines. In order to embody a propose agent framework, we design function block of checking agent and describe a vulnerability checking scenario of proposed agent framework. Also we develop pilot system for vulnerability checking scenario. We improve the shortcomings of the traditional vulnerability assessment system, such as unnecessary system load of the agent, inefficiency due to duplication agent installation. Moreover, the proposed agent framework is maximizing the scalability of the system because there is no agent installation when adding a targeted system.

The Comparison of formative Characteristics Clothing in Fashion and Art to Wear.-focused on Art to Wear of Futurism in 1910~1930 (유행의상과 예술의상의 조형적 특성 비교-미래주의 예술의상을 중심으로-)

  • 양취경
    • Journal of the Korean Society of Costume
    • /
    • v.38
    • /
    • pp.51-72
    • /
    • 1998
  • Futurists objected the existent style, that is the conventional fashion, and took part in these disciplines of fashion to make clothes the instruments being able to represent the individuality. Giacomo Balla and fortunato Depero, pain-ters who in 1915 were to work with Diaghilev's company, were the first to see clothing as a dynamic interfaced between th body and the atmosphere, between physical gestures and the urban context, which could be translated into encounters between forms and colours, volumes and architecture. For them, clothing began to exist as an object and an event, something to be removed from a mainly static conception and made mobile, active. The interaction between movement and clothing was based on the relativity of perception : the appearance and disappearance of the body produced points without dimension or duration which served, as Balla wrote in the Futurist Mnaifesto of Men's Clothing to“renew incessantly the enjoyment and impetuous movement of the body”. The historical achievement in the effort for the reformation of Futurist, Art to Wear. First, for Futurist, clothing is removed from a static conception and focused on dynamics. Second, Balla used asymmetry in men's clothing. Moreover he supposed dynamic men's clothes by using optical intersection. Third, the after image of Chronophotograph represented rapidity. This rhythmic expression is the fore-runner in Optical and Kinetic Art of Visual Art. Fourth, Futurist emphasized flexibility in fashion. They aimed to create‘Clothing Machines’whose parts would interact to aceelerate the real and virtual, inner and outer movement of the human being. Fifth, the variety and short life of cutting skills and colors are focused and‘Fast Substance’in fashion is admitted by Futurists. Futurist concern with clothing was not lim-ited its appearance in terms of cut and colour. What important was also the way it appeared and disappeared according to fashion. It was a“fast substance”, able to reflect rapid, sudden changes of social and aesthetic taste. To reach to the aim of internationalization, Gesamtkunstwerk in our Art to Wear, it is extremely meaningful to examine art fashion which is created under the conception of Gesamtkunstwerk production of avang garde artist in the early 20th century and look at formative conscious of truth, goodess and beauty synthetically which they faced on their works of art.

  • PDF

Application of Analytic Hierarchy Process for Relative Importance Determination of Internet of Things Standardization (사물인터넷 표준화의 상대적 중요도 결정을 위한 계층분석방법 응용)

  • Woo, Hoon-Shik
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.1
    • /
    • pp.47-55
    • /
    • 2016
  • As one of recent issues in the information and communication industry, internet of things has attracted attention to provide intelligent infrastructure services which connect and share data and information between real and virtual world. According to the development of these internet of things technologies, types of machines, telecommunication devices, and terminals are increasing tremendously. In this situation, connectivity and interoperability between internet of things components are important issues to build a hyper connected society. To visualize this society, it is important to set up and develop information and communication technology (ICT) standards among stakeholders. However, under limited budget and human resources, it is essential to rank standardization work items for setting standards with respect to efficiency. The purpose of this study is to provide a method for setting standardization strategies within group decision making. As a multi-criteria group decision making tool, analytic hierarchy process (AHP) is adopted and applied to determine the priorities of setting work items. The proposed method first defines decision making problem with objective, criteria, and alternatives which produces a hierarchy consisting of upper and lower criteria. Then, pairwise comparisons of academy and public sector experts are performed with respect to their relative meaning and importance. Individual surveys of expert groups are collected and summarized to determine relative criteria importance measures. Furthermore, to deliver reliable importance criteria measures, differences between academy and public sector expert groups are compared and tested using Mann-Whitney non-parametric test. The results are illustrated for useful guidelines to practical group decision making in standardization strategy establishments.

Maximum Power Point Tracking Control Scheme for Grid Connected Variable Speed Wind Driven Self-Excited Induction Generator

  • El-Sousy Fayez F. M.;Orabi Mohamed;Godah Hatem
    • Journal of Power Electronics
    • /
    • v.6 no.1
    • /
    • pp.52-66
    • /
    • 2006
  • This paper proposes a wind energy conversion system connected to a grid using a self-excited induction generator (SEIG) based on the maximum power point tracking (MPPT) control scheme. The induction generator (IG) is controlled by the MPPT below the base speed and the maximum energy can be captured from the wind turbine. Therefore, the stator currents of the IG are optimally controlled using the indirect field orientation control (IFOC) according to the generator speed in order to maximize the generated power from the wind turbine. The SEIG feeds a (CRPWM) converter which regulates the DC-link voltage at a constant value where the speed of the IG is varied. Based on the IG d-q axes dynamic model in the synchronous reference frame at field orientation, high-performance synchronous current controllers with satisfactory performance are designed and analyzed. Utilizing these current controllers and IFOC, a fast dynamic response and low current harmonic distortion are attained. The regulated DC-link voltage feeds a grid connected CRPWM inverter. By using the virtual flux orientation control and the synchronous frame current regulators for the grid connected CRPWM inverter, a fast current response, low harmonic distortion and unity power factor are achieved. The complete system has been simulated with different wind velocities. The simulation results are presented to illustrate the effectiveness of the proposed MPPT control scheme for a wind energy system. In the simulation results, the d-q axes current controllers and DC-link voltage controller give prominent dynamic response in command tracking and load regulation characteristics.

An Effective Java Obfuscation Technique Using Assignment Statements Merging (대입문 병합을 이용한 효율적인 자바 난독화 기법)

  • Lee, Kyong-Ho;Park, Hee-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.129-139
    • /
    • 2013
  • Java bytecodes are executed not on target machine but on the Java virtual machines. Since this bytecodes use a higher level representation than binary code, it is possible to decompile most bytecodes back to Java source. Obfuscation is the technique of obscuring code and it makes program difficult to understand. However, most of the obfuscation techniques make the code size and the performance of obfuscated program bigger and slower than original program. In this paper, we proposed an effective Java obfuscation techniques using assignment statements merging that make the source program difficult to understand. The basic approach is to merge assignments statements to append side effects of statement. An additional benefit is that the size of the bytecode is reduced.