• Title/Summary/Keyword: Centralized Architecture

Search Result 182, Processing Time 0.029 seconds

Transcendental Abstraction in Non-geometric Contemporary Architecture - focused on Deleuze's Thinking - (비기하학적 현대건축의 초월론적 추상 - 들뢰즈의 사유를 중심으로 -)

  • Cho, Yong-Soo
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.5
    • /
    • pp.107-116
    • /
    • 2019
  • Non-geometric shapes in contemporary architecture was explained from the transcendental schema of Deleuze with his abstraction theory. In this explanation, the intensity, the movement and change and the sublime were suggested as the expressional elements of the transcendental abstraction related with the artistic sensation of architecture. First, the intensity as a power of sensation which acts to the body before the recognition of brain is mainly expressed with the movement of curved lines of architectural space. Second, the movement of change is expressed as the de-centralized and de-formalized nomadic curve as the line in architectural 'smooth space' which has unrestrained orientations. Third, the sublime is expressed in the hugeness, enormousness or sometimes uncanny in void space, which could be contradictively mixed with senses of displeasure and pleasure. The sublime feelings in architecture can be emerging by rationally overcoming the unpleasant senses of contradictive spaces in architecture or urban fabric. This study has explained those expressional elements with the architectural works of Steven Holl, Frank Gehry and Zaha Hadid.

A Study on the Electrical and Electronic Architecture of Electric Vehicle Powertrain Domain through Big Data Analysis (빅데이터 분석을 통한 전기차 파워트레인 도메인 전기전자 아키텍처 연구)

  • Kim, Do Kon;Kim, Woo Ju
    • The Journal of Information Systems
    • /
    • v.31 no.4
    • /
    • pp.47-73
    • /
    • 2022
  • Purpose The purpose of this study is to select the electronic architecture concept of the powertrain domain of the electronic platform to be applied to electric vehicles after 2025. Previously, the automotive electrical and electronic architecture was determined only by trend analysis, but the purpose was to determine the scenario based on the data and select it with clear evaluation indicators. Design/methodology/approach This study identified the function to be applied to the powertrain domain of next-generation electric vehicle, estimated the controller, defined the function feature list, organized the scenario candidates with the controller list and function feature list, and selected the final architecture scenario. Findings According to the research results, the powertrain domain of electric vehicles was selected as the architectural concept to apply the DCU (Domain Control Unit) and VCU (Vehicle Control Unit) integrated architecture to next-generation electric vehicles. Although it is disadvantageous or equivalent in terms of cost, it was found to be excellent in most indicators such as stability, security, and hardware demand.

Analyses of Design for Intrusion Detection System based on Hardware Architecture (하드웨어 기반의 침입탑지 시스템의 설계에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.666-669
    • /
    • 2008
  • A number of intrusion detection systems have been developed to detect intrusive activity on individual hosts and networks. The systems developed rely almost exclusively on a software approach to intrusion detection analysis and response. In addition, the network systems developed apply a centralized approach to the detection of intrusive activity. The problems introduced by this approach are twofold. First the centralization of these functions becomes untenable as the size of the network increases.

  • PDF

Study on the wormhole detection and prevention algorithm for MANET (MANET에서 wormhole 공격의 탐지 및 방지를 위한 알고리즘에 대한 연구)

  • Kim, Jae-Honh;Kim, Se-Heon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.494-497
    • /
    • 2008
  • In Mobile ad hoc networks (MANET), nodes could transmit packets for each other to communicate beyond their transmission range without centralized control. Unlike infrastructure-based wireless networks, due to the unique characteristics of MANETs such as open network architecture, stringent resource constraints and highly dynamic network topology, networks are vulnerable to wormhole attacks launched through colluding nodes. In this paper, we develop an wormhole detection and prevention algorithm for MANET.

  • PDF

Development of a process control package using PC (PC를 이용한 자동제어시스템 개발)

  • 구영재;이준서;이인범;장근수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.322-326
    • /
    • 1991
  • A real time process control package was developed in an INTEL 80386 based PC and MS OS/2 environment using MS-C and MS-FORTRAN. RTACS(Real Time Advanced Control System), process control computer software for distributed or centralized architectures, is a package which meets functional requirements specified for typical continuous process applications like chemical processes. The package consists of 5 parts, which are DB(data base), OCF(Operator Console Functions), CL (Control logic Library), MSM(Multitasking and Scheduling, Manager) and UAI(User Applications Interface), based upon a table and function block architecture to improve the system performance.

  • PDF

A study on the design of data bus(EFbus) for factory automation (공장자동화용 데이타 버스(EFbus)의 설계에 관한 연구)

  • 이전우;황선호;김현기;이혁희;채영도
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.623-628
    • /
    • 1990
  • This paper describes the design of EFbus(ETRI Fieldbus), EFbus was designed from the interim results of international Fieldbus standardization in IEC (International Electrotechnical Commission) and proposals of many companies. The design was performed and described on the basis of three layered architecture. Application layer S/W runs on IBM PC and provides services which is similar ED MMS in MAP to user application Data linklayer runs on Intel's iDCX96 real time executive and uses centralized media accesscontrol method. Physical layer uses Manchester encoding & decoding, twisted pair fines and RS485 electrical standard.

  • PDF

홀로닉 생산시스템을 위한 일정계획 모델

  • 이용수;이영해;전성진
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1994.10a
    • /
    • pp.701-706
    • /
    • 1994
  • Holonic manufacturing system is a new approachto the organization and architecture of decentralized, autonomous and cooperative manufacturing system. The new paradigm combines the concepts of hierarchical systems and the integration of autonomous elements in distributed system. Today's scheduling and control techniques are mostly based on a centralized structure. Only little work has been done on scheduling and control of decentralized, autonomous and cooperative manufacturing system. This paper proposes a new approach IPM(Interactive Prediction Method) for scheduling and control of holonic manufacturing system.

  • PDF

Implementing Network Management Repository From Distributed Object Technology Perspective (네트워크 관리 리파지토리 구축: 분산 객체 기술 중심으로)

  • 신재호;이희석
    • Proceedings of the Korea Database Society Conference
    • /
    • 1998.09a
    • /
    • pp.475-505
    • /
    • 1998
  • With rapid progresses in information technologies, managing enterprise network resources as a whole becomes more important. Telecommunication Management Network (TMN) has been used to integrate network elements. TMN is complex to develop and manage because it has a centralized management service. Common Object Request Broker Architecture (CORBA) can overcome this complexity by the use of transparent distributed object processing mechanism. Therefore, the main objective of this paper is to integrate TMN service with CORBA. A network management repository is built for this integration. In addition, a prototype that can partially support network management service is implemented to illustrate the usefulness of this repository.

  • PDF

Mutual-Backup Architecture of SIP-Servers in Wireless Backbone based Networks (무선 백본 기반 통신망을 위한 상호 보완 SIP 서버 배치 구조)

  • Kim, Ki-Hun;Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.32-39
    • /
    • 2015
  • The voice communications with wireless backbone based networks are evolving into a packet switching VoIP systems. In those networks, a call processing scheme is required for management of subscribers and connection between them. A VoIP service scheme for those systems requires reliable subscriber management and connection establishment schemes, but the conventional call processing schemes based on the centralized server has lack of reliability. Thus, the mutual-backup architecture of SIP-servers is required to ensure efficient subscriber management and reliable VoIP call processing capability, and the synchronization and call processing schemes should be changed as the architecture is changed. In this paper, a mutual-backup architecture of SIP-servers is proposed for wireless backbone based networks. A message format for synchronization and information exchange between SIP servers is also proposed in the paper. This paper also proposes a FSM scheme for the fast call processing in unreliable networks to detect multiple servers at a time. The performance analysis results show that the mutual backup server architecture increases the call processing success rates than conventional centralized server architecture. Also, the FSM scheme provides the smaller call processing times than conventional SIP, and the time is not increased although the number of SIP servers in the networks is increased.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.