• Title/Summary/Keyword: Cloud Pattern

Search Result 174, Processing Time 0.024 seconds

A Study on the Shape, Characteristic, and Investigated Design of Goryeo-Achungunsura-Jisun (고려 아청운수라 질손의 형태와 의미 규명 및 고증 디자인 연구)

  • Choi, Jeong
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.1
    • /
    • pp.135-146
    • /
    • 2013
  • The purpose of this study is to investigate the meaning and possible shape of Goryeo-Achungunsura-jisun(高麗鴉靑雲袖羅質孫) through the details regarding its color, fabric, and pattern in the $13-14^{th}$ century writings and costume relics. Goryeo-Achungunsura-jisun was the summer dress coat that government officials wore during the Jisun feast of Yuan, and it was symbolic of the political strategy of Yuan as well as the excellent Goryeo fabric material, but no relics remain. During this period, Achung (dark blue)was the color that was used to dye silk, dress coats of upper class men, and background fabric of the embroidered official patch. And, the term, Yunsu (cloud sleeves), was probably sleeves with cloud pattern. The most typical cloud pattern in the 13 and the $14^{th}$ century was the 'flowing, gathering-headed cloud'. The Ra(silk gauze) weaving technique of Goryeo was developed rapidly in the $12^{th}$ century, and the quality of the Ra in the late Goryeo was good enough to be used for making the official's dress coat in the golden age of Yuan. According to the characteristic of jisun and man's formal-suit style in the Mongolian-Yuan, the possible styles for Goryeo-Achungunsura-jisun can be summarized as follows: a basic Mongolian gown with narrow sleeves and deep crossed diagonal opening, a Mongolian gown with waist pleats, the combination of half sleeved gown and long sleeved Mongolian gown. These styles would be made of delicate Goryeo Ra, cloud patterned sleeves, fabrics dyed in dark blue color, and shawl or embroidered patch ornaments for officials of Yuan, which was more simple than materials for Khan's Jisun to avoid rebellions.

Study on Housed at Museum of Sun Am Temple (선암사 소장 <용문자수탁의(龍紋刺繡卓衣)> 연구)

  • Sim, Yeon-Ok
    • Journal of the Korean Society of Costume
    • /
    • v.67 no.2
    • /
    • pp.88-100
    • /
    • 2017
  • This study is for the textiles of at Sun Am Temple and characteristic of embroidery. Tak Ui was composed of orange body and green upper cover, and had no strings. The body plate was covered with embroidery, with Gauze base, and upper part was appliqued, by cutting dragon pattern, cloud pattern on satin damask. The thread for embroidery was silk floss, silk twisted thread, rapped gold thread, and rapped silk thread. For padding, it was used cotton thread in the part of dragon's scales. It was used satin stitch, outline stitch, split stitch, couching, and counted stitch, etc. as method of embroidery. In particular, it embroidered counted stitch of diamond shape consecutively on the whole of Tak Ui, it does so with counted stitch of same effect of weaving Brocade in the part of cloud. Besides, it is one of the characteristic for couching rapped silk thread. Such lead embroidery is the popular method in the Ming dynasty of China, in the 16~17 century. The design of Tak Ui is dragon, cloud, and wave in the theme. In the center, 'Seong-su-man-nyeon' was placed on the heads of dragon. This is similar to Dragon Robe of Four-petalled medallion patterns, period of Ming dynasty in China. Therefore, it confirmed that Tak Ui was remodeled the embroidered textiles, made for royal robe, originally, with Tak Ui at temple.

Mitigating TCP Incast Issue in Cloud Data Centres using Software-Defined Networking (SDN): A Survey

  • Shah, Zawar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5179-5202
    • /
    • 2018
  • Transmission Control Protocol (TCP) is the most widely used protocol in the cloud data centers today. However, cloud data centers using TCP experience many issues as TCP was designed based on the assumption that it would primarily be used in Wide Area Networks (WANs). One of the major issues with TCP in the cloud data centers is the Incast issue. This issue arises because of the many-to-one communication pattern that commonly exists in the modern cloud data centers. In many-to-one communication pattern, multiple senders simultaneously send data to a single receiver. This causes packet loss at the switch buffer which results in TCP throughput collapse that leads to high Flow Completion Time (FCT). Recently, Software-Defined Networking (SDN) has been used by many researchers to mitigate the Incast issue. In this paper, a detailed survey of various SDN based solutions to the Incast issue is carried out. In this survey, various SDN based solutions are classified into four categories i.e. TCP Receive Window based solutions, Tuning TCP Parameters based solutions, Quick Recovery based solutions and Application Layer based solutions. All the solutions are critically evaluated in terms of their principles, advantages, and shortcomings. Another important feature of this survey is to compare various SDN based solutions with respect to different performance metrics e.g. maximum number of concurrent senders supported, calculation of delay at the controller etc. These performance metrics are important for deployment of any SDN based solution in modern cloud data centers. In addition, future research directions are also discussed in this survey that can be explored to design and develop better SDN based solutions to the Incast issue.

High Rate Denial-of-Service Attack Detection System for Cloud Environment Using Flume and Spark

  • Gutierrez, Janitza Punto;Lee, Kilhung
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.675-689
    • /
    • 2021
  • Nowadays, cloud computing is being adopted for more organizations. However, since cloud computing has a virtualized, volatile, scalable and multi-tenancy distributed nature, it is challenging task to perform attack detection in the cloud following conventional processes. This work proposes a solution which aims to collect web server logs by using Flume and filter them through Spark Streaming in order to only consider suspicious data or data related to denial-of-service attacks and reduce the data that will be stored in Hadoop Distributed File System for posterior analysis with the frequent pattern (FP)-Growth algorithm. With the proposed system, we can address some of the difficulties in security for cloud environment, facilitating the data collection, reducing detection time and consequently enabling an almost real-time attack detection.

Address Permutation for Privacy-Preserving Searchable Symmetric Encryption

  • Choi, Dae-Seon;Kim, Seung-Hyun;Lee, Youn-Ho
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.66-75
    • /
    • 2012
  • This paper proposes a privacy-preserving database encryption scheme that provides access pattern hiding against a service provider. The proposed scheme uses a session key to permute indices of database records each time they are accessed. The proposed scheme can achieve access pattern hiding in situations in which an adversary cannot access the inside of the database directly, by separating the entity with an index table and data table and permuting both the index and position where the data are stored. Moreover, it is very efficient since only O(1) server computation and communication cost are required in terms of the number of the data stored. It can be applied to cloud computing, where the intermediate entities such as cloud computing service provider can violate the privacy of users or patients.

Characteristics of Textiles Found in the Pagoda at Naksan Temple (낙산사 공중 사리탑 복장직물의 조형특성 및 시기감정)

  • Cho, Hyo-Sook
    • Journal of the Korean Society of Costume
    • /
    • v.59 no.6
    • /
    • pp.29-40
    • /
    • 2009
  • On April 28th of 2006, a set of Buddha's reliquary was excavated from the pagoda in n Nacsan Temple. According to the record, the relics were put in the pagoda in the 18th year of King SookJong in the Chosun Dynasty (1692). The present paper examines ten pieces of wrapping clothes covering reliquary found in the pagoda. They are especially precious data in the history of textiles because they were blocked off from outside and was preserved in good condition with vivid colors still remaining after more than 300 years. Of the ten pieces of wrapping cloth, five were double-layered and the other five were single-layered. They include 15 pieces of silk fabric but, excluding repeated use of the same silk fabric, the total of 11 pieces of silk fabric were examined. All 11 kinds of silk fabric were patterned, 9 of which were Satin and the other 2 were Twill. Of the 9 Satin pieces, 8 pieces were 5-end satin which had the ground of 5-end warp satin with the figure of 5-end weft satin. The remaining 1 Satin piece were more splendid with prominent figures by using warp and weft of different colors. The 2 Twill pieces used twill weave-the ground was 3-end warp twill and the figures were 5-end weft twill. Both of the Twill pieces were weaved with character patterns, partly using wrapped gold thread as supplementary weft. The patterns of 11 pieces of silk fabric include flower, dragon/phoenix, cloud, and geometric patterns. Five were flower patterns, three were dragon/phoenix patterns, two were geometric pattern, and one was cloud pattern. In addition, various treasure patterns, character patterns were utilized as supplementary patterns. The flower and phoenix patterns reflect characteristics of the textiles of the 17th century whereas check pattern and cloud pattern were very unique.

Open Source Cloud Computing: An Experience Case of Geo-based Image Handling in Amazon Web Services

  • Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.3
    • /
    • pp.337-346
    • /
    • 2012
  • In the view from most application system developers and users, cloud computing becomes popular in recent years and is still evolving. But in fact it is not easy to reach at the level of actual operations. Despite, it is known that the cloud in the practical stage provides a new pattern for deploying a geo-spatial application. However, domestically geo-spatial application implementation and operation based on this concept or scheme is on the beginning stage. It is the motivation of this works. Although this study is an introductory level, a simple and practical processed result was presented. This study was carried out on Amazon web services platform, as infrastructure as a service in the geo-spatial areas. Under this environment, cloud instance, a web and mobile system being previously implemented in the multi-layered structure for geo-spatial open sources of database and application server, was generated. Judging from this example, it is highly possible that cloud services with the functions of geo-processing service and large volume data handling are the crucial point, leading a new business model for civilian remote sensing application and geo-spatial enterprise industry. The further works to extend geo-spatial applications in cloud computing paradigm are left.

Characteristics of Silk fabrics which was Collected in Temples of the Middle and the Latter Term Chosun Period (조선 중.후기 사찰 견직물에 나타난 특성)

  • 장현주;권영숙
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.8
    • /
    • pp.1-12
    • /
    • 2001
  • An empirical review on silk fabrics of the Chosen period showed that they varied in kind and design according to their uses. Thus the purpose of this study is to classify the fabrics into temple and excavated fabrics according to their uses and collected places and then to examine characteristics of each type. Concerning fabrics collected in temples. satin was most used, followed by twill, tabby, multiply, leno and gauze and clossing fabrics in order. Tabby and silk fabrics used Ju(紬) as their main material. Cho( ) was much more used in fabrics collected in temples than in excavated ones. This indicate that Cho( ), more luxurious than Ju(紬), had divine applications such as covering Buddha s bones of temples. Brilliant, colorful multiply fabrics using goldern and color threads had high effects of ornamenting altar covers, umbrellas, surplices and palanquins. Fabrics held in temples adapted composite designs, in which more than two shapes were used, rather than single ones. Single designs employed plant shapes in most cases. followed by treasures pattern, geometrical, cloud and animal shapes in order. Most composite designs used a combination of animal and plant shapes, followed by plant and geometry, treasures pattern and plant, cloud and animal, and animal, treasures pattern and plant in order. Few excavated fabrics used animal designs while fabrics collected in temples were often designed with shapes of propitious animals such as dragon. Treasures pattern. representing a good omen of Buddhism, was often used sing1y or sometimes compositely with another design.nother design.

  • PDF

Supporting The Tunnel Using Digital Photographic Mapping And Engineering Rock Classification (디지털 사진매핑에 의한 공학적 암반분류와 터널의 보강)

  • Kim, Chee-Hwan
    • Tunnel and Underground Space
    • /
    • v.21 no.6
    • /
    • pp.439-449
    • /
    • 2011
  • The characteristics of rock fractures for engineering rock classification are investigated by analyzing three dimensional point cloud generated from adjusted digital images of a tunnel face during construction and the tunnel is reinforced based on the supporting pattern suggested by the RMR and the Q system using parameters extracted from those images. As results, it is possible saving time required from face mapping to tunnel reinforcing work, enhancing safety during face mapping work in tunnels and reliability of both the mapping information and selecting supporting pattern by storing the files of digital images and related information which can be checked again, if necessary sometime in the future.