• Title/Summary/Keyword: distributed applications

Search Result 1,258, Processing Time 0.027 seconds

Development and Applications of Ecological Data Portal Service (EcoBank) for Sharing Ecological Information of Korea (생태정보의 공유를 위한 생태정보 포털서비스 (EcoBank) 구축 및 활용 방안)

  • Sung, Sunyong;Kwon, Yong Su;Kim, Ki Dong
    • Korean Journal of Ecology and Environment
    • /
    • v.51 no.3
    • /
    • pp.212-220
    • /
    • 2018
  • Ecological and ecosystem database is becoming very necessary to understand origins and relationship between human and nature and also to minimize disturbance caused by human activities. An ecological information portal can play important roles as a computing system to collect knowledge, distributed research findings and separated data from researchers. In this study, we designed and developed ecological information portal service (EcoBank 1.0) for collecting and providing ecological information for diverse classes of stakeholders. To reach the goal, we had reviewed related and comparable ecological database portals to design conceptual structure of EcoBank system including database management framework. Then, we developed some functions of ecosystem analysis for each stake-holders (researchers, general public and policy makers). As a result of this study, we successfully designed of EcoBank system covering the functions of Digital Object Identifier(DOI) publishing and data quality management process. Also, we (1) applied ecological indices for calculating biodiversity by administrative boundary for policy makers, (2) provided statistical information of econature map for general public and distribution characteristics of species for researchers. To make a successful establishment of EcoBank, we have to collect and build up related database and offer various and reliable ecological data consistently. We expect that the successful construction of EcoBank will help not only to accomplish sustainable development goals but also to raise the welfare of ecosystem in Korea.

Development of Preliminary Assessment Methodology for Priority Listing of Soil and Groundwater Contamination Sources (토양.지하수오염원 관리우선순위 개략평가기법 개발)

  • Jeong, Seung-Woo;Kim, Young-Ju;Kim, Jae-Hoon;Hwang, Sang-Il
    • Journal of Soil and Groundwater Environment
    • /
    • v.16 no.6
    • /
    • pp.106-112
    • /
    • 2011
  • This study developed preliminary assessment methodology for priority listing of soil and groundwater contamination sources, considering source characteristics, local environments and risk receptors. Source characteristics were evaluated by scoring relative risk of contamination sources. Local environments were evaluated by scoring annual rainfall, hydraulic conductivity of aquifer, and annual groundwater use. Risk receptors were evaluated by scoring local population, direct distance to surface water, direct distance to drinking-water wells. Scores of each parameter were allocated by analysing distribution of parameter values obtained from government databases. Distributed scores of source characteristics local environments: risk receptors were 12 : 12 : 12. The preliminary assessment scored 0 to 36 for each soil and groundwater sources. Inventory of soil and groundwater sources consisted of 7 categories. This study applied the preliminary assessment methodology to Manan-Gu, Anyang City, Korea. The number of car repair and washing facility was the largest in the contamination source inventory. Petroleum storage facilities showed the highest assessment score. The preliminary assessment methodology also indicated that Anyang-Dong was the priority section among Anyang-Dong, Suksu-Dong, Bakdal-Dong. This study is the first trial for relative ranking soil and groundwater contamination sources by considering source and local characteristics. Therefore, further researches and revision of the preliminary assessment methodology need to be pursued for various applications.

Distribution of Murine Tissue Specific ${\gamma}$-Glutamyltransferase: -Comparison of Six Monoclonal Antibody Applications in Enzyme Linked Immunosorbent Assay, Radioimmunoassay, Immunohistochemistry, and Autoradiography- (${\gamma}$-Glutamyltransferase의 조직내 분포에 관한 연구 -단일클론항체의 효소면역측정법, 방사면역측정법, 면역조직화학검사, 자가방사기록검사 적용에 관하여 -)

  • Kim, Meyoung-Kon;Park, Youn-Kyu;Ryu, Chong-Kun
    • The Korean Journal of Nuclear Medicine
    • /
    • v.28 no.1
    • /
    • pp.112-123
    • /
    • 1994
  • ${\gamma}$-Glutamyltransferase (GGT: E.C. 2.3.2.2.) is a glycoprotein enzyme which is involved in glutathione metabolism and amino acid transport through the plasma membrane. It is distributed widely in several organs including liver and kidney. Several isozymes of GGT have been reported and some of the isozymes may be associated with hepatocarcinogenesis. We have produced six monoclnal antibodies (mAbs) against GGT purified from the liver of 2-acetamidofluorene (AAF) treated rats. All of the six mAbs were obtained by immunizing mice with liver GGT Six hybridomas which produced anti-GGT Abs were extensively subcloned and injected into the peritoneal cavity of BALB/c mice to obtain large quantities of Abs. These mAbs were purified from ascites by ammonium sulfate precipitation and protein A sepharose CL-4B column chromatography. Using these mAbs we preformed enzyme-linked immunosorbent assay (ELISA), radioimmunoassay (RIA), immunohistochemistry (IHC), and autoradiography (ARG) to study the distribution of GGT isozyme in tissue. The results indicate that GGT-mAb 1 is specific for the AAF treated liver GGT, GGT-mAb 5 for the normal liver GGT, and GGT-mAb 6 for the normal kindey GGT. These mAbs may be used to evaluate the distribution of GGT isozymes in different tissues.

  • PDF

Minimizing Energy Consumption in Scheduling of Dependent Tasks using Genetic Algorithm in Computational Grid

  • Kaiwartya, Omprakash;Prakash, Shiv;Abdullah, Abdul Hanan;Hassan, Ahmed Nazar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2821-2839
    • /
    • 2015
  • Energy consumption by large computing systems has become an important research theme not only because the sources of energy are depleting fast but also due to the environmental concern. Computational grid is a huge distributed computing platform for the applications that require high end computing resources and consume enormous energy to facilitate execution of jobs. The organizations which are offering services for high end computation, are more cautious about energy consumption and taking utmost steps for saving energy. Therefore, this paper proposes a scheduling technique for Minimizing Energy consumption using Adapted Genetic Algorithm (MiE-AGA) for dependent tasks in Computational Grid (CG). In MiE-AGA, fitness function formulation for energy consumption has been mathematically formulated. An adapted genetic algorithm has been developed for minimizing energy consumption with appropriate modifications in each components of original genetic algorithm such as representation of chromosome, crossover, mutation and inversion operations. Pseudo code for MiE-AGA and its components has been developed with appropriate examples. MiE-AGA is simulated using Java based programs integrated with GridSim. Analysis of simulation results in terms of energy consumption, makespan and average utilization of resources clearly reveals that MiE-AGA effectively optimizes energy, makespan and average utilization of resources in CG. Comparative analysis of the optimization performance between MiE-AGA and the state-of-the-arts algorithms: EAMM, HEFT, Min-Min and Max-Min shows the effectiveness of the model.

Neural Net Agent for Distributed Information Retrieval (분산 정보 검색을 위한 신경망 에이전트)

  • Choi, Yong-S
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.10
    • /
    • pp.773-784
    • /
    • 2001
  • Since documents on the Web are naturally partitioned into may document database, the efficient information retrieval process requires identifying the document database that are most likely to provide relevant documents to the query and then querying the identified document database. We propose a neural net agent approach to such an efficient information retrieval. First, we present a neural net agent that learns about underlying document database using the relevance feedbacks obtained from many retrieval experiences. For a given query, the neural net agent, which is sufficiently trained on the basis of the BPN learning mechanism, discovers the document database associated with the relevant documents and retrieves those documents effectively. In the experiment, we introduce a neural net agent based information retrieval system and evaluate its performance by comparing experimental results to those of the conventional well-known approaches.

  • PDF

Structural Design and Analysis for High Altitude Long Endurance UAV (고고도 장기체공 무인기 구조 설계 및 해석)

  • Kim, Sung Joon;Lee, Seunggyu;Kim, Sung Chan;Kim, Tae-Uk;Kim, Seungho
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.22 no.3
    • /
    • pp.68-73
    • /
    • 2014
  • Research is being carried out at Korea Aerospace Research Institute with aim of design a HALE UAV(High Altitude Long Endurance Unmanned Air Vehicle). HALE UAVs are ideally suited to provide surveillance, remote sensing and communication relay capabilities for both military and civilian applications. HALE UAVs typically cruise at an altitude between 15 km and 20 km, travelling at low speed and circling specific area of interest. Airframe structural point of view, weight reduction of the airframe structure is the most important method to improve the flight efficiency. High modulus CFRP(Carbon Fiber Reinforced Polymer) has been used in designing the structure in order to minimize the airframe weight. With respect to structural design and analysis, the key question is to decide an adequate airworthiness certification base to define suitable load cases for sizing of various structural components. In this study, FAR(Federal Aviation Regulation) 23 have constituted the guidance and benchmark throughout all structural studies. And the MSC/FlightLoads was introduced to analyze the flight loads for the HALE UAV. The MSC/FlightLoads can compute the flexible air load and analyzed loads are distributed on structural model directly. A preliminary structural concept was defined in accordance with the estimated inertial and aerodynamic loads. A FEM analysis was carried out using the MSC/Nastran code to predict the static and dynamic behaviour of UAV structure.

Dynamic and Reuseable Composition Model of Web Services using BPEL4WS (BPEL4WS을 이용한 동적이고 재사용가능한 웹 서비스 통합 모델)

  • Kim Woon-Yong
    • Journal of Internet Computing and Services
    • /
    • v.6 no.2
    • /
    • pp.1-11
    • /
    • 2005
  • Web services are being recognized as the efficient way to integrate the distributed applications on the web based on the web standards such as SOAP, WSDL and UDDI. Recently, BPEL4WS is suggested as a standard integration model language for web services to integrate them efficiently. The recent studies of web service integration are focused on the comparability among the services, process identification and tracing, and automation, However, little or no effort has been dedicated to the reusability, extensibility on the business process integrated services and how to allocate the services dynamically, So, in this paper, we propose how to increase the reusability and extensibility of integrated structure when services are integrated using BPEL4WS, and how to allocate and use the services dynamically. Also, we propose the framework of the composition of web services for the efficient use of suggested integrated structure.

  • PDF

Semantic Computing for Big Data: Approaches, Tools, and Emerging Directions (2011-2014)

  • Jeong, Seung Ryul;Ghani, Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2022-2042
    • /
    • 2014
  • The term "big data" has recently gained widespread attention in the field of information technology (IT). One of the key challenges in making use of big data lies in finding ways to uncover relevant and valuable information. The high volume, velocity, and variety of big data hinder the use of solutions that are available for smaller datasets, which involve the manual interpretation of data. Semantic computing technologies have been proposed as a means of dealing with these issues, and with the advent of linked data in recent years, have become central to mainstream semantic computing. This paper attempts to uncover the state-of-the-art semantics-based approaches and tools that can be leveraged to enrich and enhance today's big data. It presents research on the latest literature, including 61 studies from 2011 to 2014. In addition, it highlights the key challenges that semantic approaches need to address in the near future. For instance, this paper presents cutting-edge approaches to ontology engineering, ontology evolution, searching and filtering relevant information, extracting and reasoning, distributed (web-scale) reasoning, and representing big data. It also makes recommendations that may encourage researchers to more deeply explore the applications of semantic technology, which could improve the processing of big data. The findings of this study contribute to the existing body of basic knowledge on semantics and computational issues related to big data, and may trigger further research on the field. Our analysis shows that there is a need to put more effort into proposing new approaches, and that tools must be created that support researchers and practitioners in realizing the true power of semantic computing and solving the crucial issues of big data.

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

Automated Generation of Wrapper to Test Components (컴포넌트 테스트를 위한 래퍼의 자동 생성에 관한 연구)

  • Song, Ho-Jin;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.8
    • /
    • pp.704-716
    • /
    • 2005
  • Assembling new software systems from Prepared components is an attractive alternative to traditional software development method to reduce development cost and schedule dramatically. However, if separately developed components are tested, integrated and verified with unreasonable effort and high cost, it would not be an effective way to software development. Components are not distributed in the shape of white-box source code so that should be hard to validate and test in new application environment. For solving this problem, built-in tester components are suggested to check the contract-compliance of their server components. If components have various and complex function, built-in tester should be heavy and unflexible to test in composition of components. This paper suggests enhancing automated wrapper technique which substitutes with built-in tester components and shows the usability of the wrapper by design and implementation. Component testing in this way reduces the cost and effort associated with preparation of component testing and makes the various test experiments in components assembly.