• Title/Summary/Keyword: distributed applications

Search Result 1,258, Processing Time 0.026 seconds

Stochastic Strength Analysis according to Initial Void Defects in Composite Materials (복합재 초기 공극 결함에 따른 횡하중 강도 확률론적 분석)

  • Seung-Min Ji;Sung-Wook Cho;S.S. Cheon
    • Composites Research
    • /
    • v.37 no.3
    • /
    • pp.179-185
    • /
    • 2024
  • This study quantitatively evaluated and investigated the changes in transverse tensile strength of unidirectional fiber-reinforced composites with initial void defects using a Representative Volume Element (RVE) model. After calculating the appropriate sample size based on margin of error and confidence level for initial void defects, a sample group of 5000 RVE models with initial void defects was generated. Dimensional reduction and density-based clustering analysis were conducted on the sample group to assess similarity, confirming and verifying that the sample group was unbiased. The validated sample analysis results were represented using a Weibull distribution, allowing them to be applied to the reliability analysis of composite structures.

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements

Applications and technical standards for biogas (바이오가스 활용과 품질기준)

  • Kim, Seung-Soo
    • Journal of the Korea Organic Resources Recycling Association
    • /
    • v.18 no.3
    • /
    • pp.38-49
    • /
    • 2010
  • The technology of anaerobic digestion of organic wastes has been researched for the production of biogas in various purposes. Biogas comes from anaerobic digestion and landfill in which that of main components are methane and carbon dioxide containing small amount of hydrogen sulfide and ammonia. Biogas can either be used directly on the site where it is generated after proper upgrading or distributed to external customer via separate pipelines like natural gas. There are four basic ways biogas can be utilized such as production of heat and steam, electricity production, vehicle fuel and production of chemicals. There is no international technical standard for biogas use but some countries have developed national standards and procedures for biogas use. In this paper, technical standards of biogas depending on purpose have reviewed for the several countries.

Joint Sampling Rate and Quantization Rate-Distortion Analysis in 5G Compressive Video Sensing

  • Jin-xiu Zhu;Christian Esposito;Ai-min Jiang;Ning Cao;Pankoo Kim
    • Journal of Internet Technology
    • /
    • v.21 no.1
    • /
    • pp.203-219
    • /
    • 2020
  • Compressed video sensing (CVS) is one of the 5G application of compressed sensing (CS) to video coding. Block-based residual reconstruction is used in CVS to explore temporal redundancy in videos. However, most current studies on CVS focus on random measurements without quantization, and thus they are not suitable for practical applications. In this study, an efficient ratecontrol scheme combining measurement rate and quantization for residual reconstruction in CVS is proposed. The quantization effects on CS measurements and recovery for video signals are first analyzed. Based on this, a mathematical relationship between quantitative distortion (QD), sampling rate (SR), and the quantization parameter (QP) is derived. Moreover, a novel distortion model that exhibits the relationship between QD, SR, and QP is presented, if statistical independency between the QD and the CS reconstruction distortion is assumed. Then, using this model, a rate-distortion (RD) optimized rate allocation algorithm is proposed, whereby it is possible to derive the values of SR and QP that maximize visual quality according to the available channel bandwidth.

A Research on Design Direction for the Smart Walking Wear to Support Walking Exercise for the Baby Boomer Group (베이비부머 집단을 위한 보행 운동용 스마트 워킹웨어의 디자인 방향 연구)

  • Ban, Hyunsung;Hwang, Sujung;Kim, Sinhye;Lee, Joohyeon
    • Science of Emotion and Sensibility
    • /
    • v.21 no.3
    • /
    • pp.129-140
    • /
    • 2018
  • This study aimed to analyze consumers' acceptance of sports applications and smart sportswear to better design technology-enhanced walking exercise wear for the Baby Boomer generation based on their cohort characteristics. A questionnaire with items related to acceptance of existing smart sportswear design, functionality, and usability as well as existing sports application design, functionality, and usability was sent to consumers aged 50-65. Of 163 questionnaires distributed, 150 were used for analysis. The results showed that middle-aged consumers were aware of smart sportswear's functional stability, but were concerned about care, durability, and convenience. Middle-aged consumers were also aware of sports applications as educational functions for obtaining new information. Additionally, they found sports applications to have lower perceived convenience and accessibility relative to the young generation, highlighting the need for simple instructions and explanations for sports application planning. Based on these results, we propose "Everyday design for general sportswear," "Functions based on consumer's preference," "Enhanced design for durability and management convenience" for designing and planning walking exercise wear for middle-aged consumers, and "Convenient application organization" and "Educational exercise contents" for application planning for walking exercises.

A Robustness Test Method and Test Framework for the Services Composition in the Service Oriented Architecture (SOA에서 서비스 조합의 강건성 테스트 방법 및 테스트 프레임워크)

  • Kuk, Seung-Hak;Kim, Hyeon-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.10
    • /
    • pp.800-815
    • /
    • 2009
  • Recently, Web services based service-oriented architecture is widely used to integrate effectively various applications distributed on the networks. In the service-oriented architecture BPEL as a standard modeling language for the business processes provides the way to integrate various services provided by applications. Over the past few years, some types of studies have been made on testing compatibility of services and on discriminating and tracing of the business processes in the services composition. Now a lot of studies about the services composition with BPEL are going on. However there were few efforts to solve the problems caused by the services composition. Especially, there is no effort to evaluate whether a composite service is reliable and whether it is robust against to exceptional situations. In this paper, we suggest a test framework and a testing method for robustness of the composite service written in WS-BPEL. For this, firstly we extract some information from the BPEL process and the participant services. Next, with the extracted information we construct the virtual testing environment that generates various faults and exceptional cases which may be raised within the real services. Finally the testing work for robustness of a composite service is performed on the test framework.

Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction (안드로이드 모바일 정상 및 악성 앱 시스템 콜 이벤트 패턴 분석을 통한 유사도 추출 기법)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.125-139
    • /
    • 2013
  • Distribution of malicious applications developed by attackers is increasing along with general normal applications due to the openness of the Android-based open market. Mechanism that allows more accurate ways to distinguish normal apps and malicious apps for common mobile devices should be developed in order to reduce the damage caused by the rampant malicious applications. This paper analysed the normal event pattern from the most highly used game apps in the Android open market to analyse the event pattern from normal apps and malicious apps of mobile devices that are based on the Android platform, and analysed the malicious event pattern from the malicious apps and the disguising malicious apps in the form of a game app among 1260 malware samples distributed by Android MalGenome Project. As described, experiment that extracts normal app and malicious app events was performed using Strace, the Linux-based system call extraction tool, targeting normal apps and malicious apps on Android-based mobile devices. Relevance analysis for each event set was performed on collected events that occurred when normal apps and malicious apps were running. This paper successfully extracted event similarity through this process of analyzing the event occurrence characteristics, pattern and distribution on each set of normal apps and malicious apps, and lastly suggested a mechanism that determines whether any given app is malicious.

Trends of Semantic Web Services and Technologies : Focusing on the Business Support (비즈니스를 지원하는 시멘틱 웹서비스와 기술의 동향)

  • Kim, Jin-Sung;Kwon, Soon-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.113-130
    • /
    • 2010
  • During the decades, considerable human interventions to comprehend the web information were increased continually. The successful expansion of the web services made it more complex and required more contributions of the users. Many researchers have tried to improve the comprehension ability of computers in supporting an intelligent web service. One reasonable approach is enriching the information with machine understandable semantics. They applied ontology design, intelligent reasoning and other logical representation schemes to design an infrastructure of the semantic web. For the features, the semantic web is considered as an intelligent access to understanding, transforming, storing, retrieving, and processing the information gathered from heterogeneous, distributed web resources. The goal of this study is firstly to explore the problems that restrict the applications of web services and the basic concepts, languages, and tools of the semantic web. Then we highlight some of the researches, solutions, and projects that have attempted to combine the semantic web and business support, and find out the pros and cons of the approaches. Through the study, we were able to know that the semantic web technology is trying to offer a new and higher level of web service to the online users. The services are overcoming the limitations of traditional web technologies/services. In traditional web services, too much human interventions were needed to seek and interpret the information. The semantic web service, however, is based on machine-understandable semantics and knowledge representation. Therefore, most of information processing activities will be executed by computers. The main elements required to develop a semantic web-based business support are business logics, ontologies, ontology languages, intelligent agents, applications, and etc. In using/managing the infrastructure of the semantic web services, software developers, service consumers, and service providers are the main representatives. Some researchers integrated those technologies, languages, tools, mechanisms, and applications into a semantic web services framework. Therefore, future directions of the semantic web-based business support should be start over from the infrastructure.

A Design of Wireless Sensor Node Using Embedded System (임베디드 시스템을 활용한 무선 센서 노드설계)

  • Cha, Jin-Man;Lee, Young-Ra;Park, Yeon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.623-628
    • /
    • 2009
  • The emergence of compact and low-power wireless communication sensors and actuators in the technology supporting the ongoing miniaturization of processing and storage allows for entirely the new kinds of embedded systems. These systems are distributed and deployed in environments where they may have been designed into a particular control method, and are often very dynamic. Collection of devices can communicate to achieve a higher level of coordinated behavior. Wireless sensor nodes deposited in various places provide light, temperature, and activity measurements. Wireless sensor nodes attached to circuits or appliances sense the current or control the usage. Together they form a dynamic and multi-hop routing network connecting each node to more powerful networks and processing resources. Wireless sensor networks are a specific-application and therefore they have to involve both software and hardware. They also use protocols that relate to both applications and the wireless network. Wireless sensor networks are consumer devices supporting multimedia applications such as personal digital assistants, network computers, and mobile communication devices. Wireless sensor networks are becoming an important part of industrial and military applications. The characteristics of modem embedded systems are the capable of communicating adapting the different operating environments. In this paper, We designed and implemented sensor network system which shows through host PC sensing temperature and humidity data transmitted for wireless sensor nodes composed wireless temperature and humidity sensor and designs sensor nodes using embedded system with the intention of studying USN.

Factors Affecting Intention to Use Smartphone Healthcare Applications (스마트폰 헬스케어 어플리케이션 수용의도에 영향을 미치는 요인)

  • Park, Mijeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.143-153
    • /
    • 2017
  • This was a descriptive survey to determine the intention of users to use smartphone healthcare applications (SHAs) and to clarify factors that may influence such intention. The data were collected during the month of April in 2015, using a structured self-report questionnaire that was distributed to 300 participants aged 20 to 70 years; 285 complete copies were used for the final analysis. The data were analyzed using descriptive statistics, independent t-test, one-way ANOVA, Pearson correlation coefficients, and hierarchical multiple regression. First, according to the results, the average intention to use SHAs was 3.28 out of 5, which varied according to age, final education, economy level, vacation, current disease, total period of smartphone use, and etc. Second, significant correlations were shown by exercise behavior, dietary management behavior, stress management, satisfaction with smartphone use, and satisfaction with using SHAs. Third, the explanatory power of the predictive model involving all general, health-related, smartphone use-related, and SHA use-related factors was 45.5%; and the economic level, interest, status, and awareness satisfaction of patients using SHA were identified to be the main influential factors. The results indicate that SHA developers need to put efforts into improving consumers' app recognition and to develop plans in provoking consumers' interests to increase the use of SHAs.