• Title/Summary/Keyword: network storage

Search Result 1,080, Processing Time 0.029 seconds

A Study on the Improvement of Availability of Distributed Processing Systems Using Edge Computing (엣지컴퓨팅을 활용한 분산처리 시스템의 가용성 향상에 관한 연구)

  • Lee, Kun-Woo;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.83-88
    • /
    • 2022
  • Internet of Things (hereinafter referred to as IoT) related technologies are continuously developing in line with the recent development of information and communication technologies. IoT system sends and receives unique data through network based on various sensors. Data generated by IoT systems can be defined as big data in that they occur in real time, and that the amount is proportional to the amount of sensors installed. Until now, IoT systems have applied data storage, processing and computation through centralized processing methods. However, existing centralized processing servers can be under load due to bottlenecks if the deployment grows in size and a large amount of sensors are used. Therefore, in this paper, we propose a distributed processing system for applying a data importance-based algorithm aimed at the high availability of the system to efficiently handle real-time sensor data arising in IoT environments.

The Influence of Social Factors of Acceptance of Cloud Services on Consumer Usage Intentions (클라우드 서비스의 수용 관련 사회적 요인이 소비자의 이용의도에 미치는 영향)

  • Chen, Yu-Fei;Nie, Xin-Yu;Quan, Dong-mei
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.173-178
    • /
    • 2022
  • With the development of information technology, the popularization of 5G and cloud computing has accelerated the circulation and digital transformation of information. In the network information society where information is rapidly increasing, it is very important to have the ability to manage and collect the required information. In particular, the information storage and management functions of cloud services are widely used among young people. This research takes the social factors of accepting cloud services as the breakthrough point, and takes young consumers aged 20-30 as the survey object, and designs a research model according to the development of cloud computing technology. The findings verify the influence of social factors on cloud service acceptance and 20-30-year-old consumers' intention to use cloud services. The partial and complete mediating effects of perceived ease of use were verified from the influence relationship between social factors and exploitation intention. Finally, this study provides inspiration for the development direction of cloud computing technology through empirical analysis.

A Blockchain-based User-centric Role Based Access Control Mechanism (블록체인 기반의 사용자 중심 역할기반 접근제어 기법 연구)

  • Lee, YongJoo;Woo, SungHee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1060-1070
    • /
    • 2022
  • With the development of information technology, the size of the system has become larger and diversified, and the existing role-based access control has faced limitations. Blockchain technology is being used in various fields by presenting new solutions to existing security vulnerabilities. This paper suggests efficient role-based access control in a blockchain where the required gas and processing time vary depending on the access frequency and capacity of the storage. The proposed method redefines the role of reusable units, introduces a hierarchical structure that can efficiently reflect dynamic states to enhance efficiency and scalability, and includes user-centered authentication functions to enable cryptocurrency linkage. The proposed model was theoretically verified using Markov chain, implemented in Ethereum private network, and compared experiments on representative functions were conducted to verify the time and gas efficiency required for user addition and transaction registration. Based on this in the future, structural expansion and experiments are required in consideration of exception situations.

Three-dimensional porous films consisting of copper@cobalt oxide core-shell dendrites for high-capacity lithium secondary batteries (리튬이차전지용 고용량 음극을 위한 구리@코발트산화물 코어-쉘 수지상 기반 3차원 다공성 박막)

  • So-Young Joo;Yunju Choi;Woo-Sung Choi;Heon-Cheol Shin
    • Journal of the Korean institute of surface engineering
    • /
    • v.56 no.1
    • /
    • pp.104-114
    • /
    • 2023
  • Three dimensional (3D) porous structures consisting of Cu@CoO core-shell-type nano-dendrites were synthesized and tested as the anode materials in lithium secondary batteries. For this purpose, first, the 3D porous films comprising Cu@Co core-shell-type nano-dendrites with various thicknesses were fabricated through the electrochemical co-deposition of Cu and Co. Then the Co shells were selectively anodized to form Co hydroxides, which was finally dehydrated to get Cu@CoO nanodendrites. The resulting electrodes exhibited very high reversible specific capacity almost 1.4~2.4 times the theoretical capacity of commercial graphite, and excellent capacity retention (~90%@50th cycle) as compared with those of the existing transition metal oxides. From the analysis of the cumulative irreversible capacity and morphology change during charge/discharge cycling, it proved that the excellent capacity retention was attributed to the unique structural feature of our core-shell structure where only the thin CoO shell participates in the lithium storage. In addition, our electrodes showed a superb rate performance (70.5%@10.8 C-rate), most likely due to the open porous structure of 3D films, large surface area thanks to the dendritic structure, and fast electron transport through Cu core network.

Ginsenosides Rg1 regulate lipid metabolism and temperature adaptation in Caenorhabditis elegans

  • Hao Shi ;Jiamin Zhao ;Yiwen Li ;Junjie Li ;Yunjia Li;Jia Zhang ;Zhantu Qiu ;Chaofeng Wu ;Mengchen Qin ;Chang Liu ;Zhiyun Zeng ;Chao Zhang ;Lei Gao
    • Journal of Ginseng Research
    • /
    • v.47 no.4
    • /
    • pp.524-533
    • /
    • 2023
  • Background: Obesity is a risk factor for aging and many diseases, and the disorder of lipid metabolism makes it prominent. This study aims to investigate the effect of ginsenoside Rg1 on aging, lipid metabolism and stress resistance Methods: Rg1 was administered to Caenorhabditis elegans (C. elegans) cultured in NGM or GNGM. The lifespan, locomotory activity, lipid accumulation, cold and heat stress resistance and related mRNA expression of the worms were examined. Gene knockout mutants were used to clarify the effect on lipid metabolism of Rg1. GFP-binding mutants were used to observe the changes in protein expression Results: We reported that Rg1 reduced lipid accumulation and improved stress resistance in C. elegans. Rg1 significantly reduced the expression of fatty acid synthesis-related genes and lipid metabolism-related genes in C. elegans. However, Rg1 did not affect the fat storage in fat-5/fat-6 double mutant or nhr-49 mutant. Combined with network pharmacology, we clarified the possible pathways and targets of Rg1 in lipid metabolism. In addition, Rg1-treated C. elegans showed a higher expression of anti-oxidative genes and heat shock proteins, which might contribute to stress resistance Conclusion: Rg1 reduced fat accumulation by regulating lipid metabolism via nhr-49 and enhanced stress resistance by its antioxidant effect in C. elegans.

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

An Integrated Surface Water-Groundwater Modeling by Using Fully Combined SWAT MODFLOW Model (완전연동형 SWAT-MODFLOW 모형을 이용한 지표수-지하수 통합 유출모의)

  • Kim, Nam Won;Chung, Il Moon;Won, Yoo Seung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.5B
    • /
    • pp.481-488
    • /
    • 2006
  • This paper suggests a novel approach of integrating the quasi-distributed watershed model SWAT with the fully-distributed groundwater model MODFLOW. Since the SWAT model has semi distributed features, its groundwater components hardly considers distributed parameters such as hydraulic conductivity and storage coefficient. Generating a detailed representation of groundwater recharge, head distribution and pumping rate is equally difficult. To solve these problems, the method of exchanging the characteristics of the hydrologic response units (HRUs) in SWAT with cells in MODFLOW by fully combined manner is proposed. The linkage is completed by considering the interaction between the stream network and the aquifer to reflect boundary flow. This approach is provisionally applied to Gyungancheon basin in Korea. The application demonstrates a combined model which enables an interaction between saturated zones and channel reaches. This interaction plays an essential role in the runoff generation in the Gyungancheon basin. The comprehensive results show a wide applicability of the model which represents the temporal-spatial groundwater head distribution and recharge.

A method of assisting small intestine capsule endoscopic lesion examination using artificial neural network (인공신경망을 이용한 소장 캡슐 내시경 병변 검사 보조 방법)

  • Wang, Tae-su;Kim, Minyoung;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.2-5
    • /
    • 2022
  • Human organs in the body have a complex structure, and in particular, the small intestine is about 7m long, so endoscopy is not easy and the risk of endoscopy is high. Currently, the test is performed with a capsule endoscope, and the test time is very long. The doctor connects the removed storage device to the computer to store the patient's capsule endoscope image and reads it using a program, but the capsule endoscope test results in a long image length, which takes a lot of time to read. In addition, in the case of the small intestine, there are many curves due to villi, so the occlusion area or light and shade of the image are clearly visible during the examination, and there may be cases where lesions and abnormal signs are missed during the examination. In this paper, we provide a method of assisting small intestine capsule endoscopic lesion examination using artificial neural networks to shorten the doctor's image reading time and improve diagnostic reliability.

  • PDF

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.

The TANDEM Euratom project: Context, objectives and workplan

  • C. Vaglio-Gaudard;M.T. Dominguez Bautista;M. Frignani;M. Futterer;A. Goicea;E. Hanus;T. Hollands;C. Lombardo;S. Lorenzi;J. Miss;G. Pavel;A. Pucciarelli;M. Ricotti;A. Ruby;C. Schneidesch;S. Sholomitsky;G. Simonini;V. Tulkki;K. Varri;L. Zezula;N. Wessberg
    • Nuclear Engineering and Technology
    • /
    • v.56 no.3
    • /
    • pp.993-1001
    • /
    • 2024
  • The TANDEM project is a European initiative funded under the EURATOM program. The project started on September 2022 and has a duration of 36 months. TANDEM stands for Small Modular ReacTor for a European sAfe aNd Decarbonized Energy Mix. Small Modular Reactors (SMRs) can be hybridized with other energy sources, storage systems and energy conversion applications to provide electricity, heat and hydrogen. Hybrid energy systems have the potential to strongly contribute to the energy decarbonization targeting carbon-neutrality in Europe by 2050. However, the integration of nuclear reactors, particularly SMRs, in hybrid energy systems, is a new R&D topic to be investigated. In this context, the TANDEM project aims to develop assessments and tools to facilitate the safe and efficient integration of SMRs into low-carbon hybrid energy systems. An open-source "TANDEM" model library of hybrid system components will be developed in Modelica language which, by coupling, will extend the capabilities of existing tools implemented in the project. The project proposes to specifically address the safety issues of SMRs related to their integration into hybrid energy systems, involving specific interactions between SMRs and the rest of the hybrid systems; new initiating events may have to be considered in the safety approach. TANDEM will study two hybrid systems covering the main trends of the European energy policy and market evolution at 2035's horizon: a district heating network and power supply in a large urban area, and an energy hub serving energy conversion systems, including hydrogen production; the energy hub is inspired from a harbor-like infrastructure. TANDEM will provide assessments on SMR safety, hybrid system operationality and techno-economics. Societal considerations will also be encased by analyzing European citizen engagement in SMR technology safety.