• 제목/요약/키워드: Cloud Pattern

검색결과 174건 처리시간 0.037초

한국 전통문양의 이미지 형상화 소고 (A Study on the Figuration of Korean Traditional Pattern Images)

  • 장수경
    • 한국의류학회지
    • /
    • 제22권8호
    • /
    • pp.1001-1010
    • /
    • 1998
  • The purpose of this study was to investigate the images and characteristic formative elements of Korean traditional patterns. The Korean pattern image could be interpreted into visual elements of design based on the images, the characteristic formative elements of Korean traditional patterns, and their relationships. Fourteen patterns selected from 5 groups of Korean patterns were used as stimuli. An image evaluation using a 2-point sementica scale of 19 bipolar adjectives, and an impression evaluation of which results were presented by visual drawing using lines and shapes were carried out. The data were analyzed by correspondence analysis and cluster analysis. The major findings are as follows; 1. Fourteen patterns and 19 adjectives were marked on a perception map composed of two (x and y-) axes. The bipoles of x- and y axes were soft-hard and splendid-artless, respectively. 2. Four clusters semerged to account for the dimensional sturucture of 14 patterns and 19 adjectives. These were splendid image, soft image, individualistic image, and sophisticated image. However there was no pattern which belonged to the cluster, sophisticated image. The Korean pattern image was founded to be better related to the kind of patterns than the type of patterns. 3. The characteristic formative elements obtained from the impression test were contour of motif, repeated line or shape, various curved lines, and decorative elements. 4. The splendid image was related to Bongwhang patterns and detailed line and complexity. The individualistic image was related to the abstractive form of Bongwhang pattern and the decorative form of Cloud pattern both of which have the characteristics of point-symmetry and abstraction, and Turtle-back pattern. In this case, the related charac-teristic formative element was identified to be repeated lines. The soft image was related to Moran, Cloud, and Taegeuk patterns. The related characteristic elements were various types of curved lines, decorative elements, and rounded contours.

  • PDF

조선시대 직물에 나타난 보배무늬의 변화 경향과 구성 유형 (Changing Trends and Classification of Composition Styles of Treasure Patterns on Textiles in Joseon Period)

  • 조효숙;이은진
    • 복식
    • /
    • 제65권7호
    • /
    • pp.32-46
    • /
    • 2015
  • Treasures patterns are simplified designs of vessels used in everyday life, which were symbols of luck. Treasures patterns on textiles are largely assorted into four groups: eight auspicious patterns of Buddhism, eight immortal patterns of Taoism, seven treasures patterns of King Chakravarti in the Buddhist Scriptures and normal treasures patterns. Among them normal treasures patterns are most commonly used. Records in the Joseon documents show these patterns as being composed of seven treasures patterns or eight treasures patterns. But observation of the actual relics show that these patterns ranged from four to ten patterns. Korean traditional textiles treasures patterns began to appear in Korea on the relics of the last of Goryeo period. They were used as sub-patterns among main patterns of dynamically rising cloud patterns with five heads. Treasures patterns in the early Joseon period were commonly used as sub-patterns, and cloud and treasures pattern were prime examples of this. In the 16th century, lotus vine pattern, small flower vine pattern, or small flower pattern were often used as main patterns and treasures patterns were regularly used as sub-patterns. The robe of the Great Monk of Seo San was unique, in that both main and sub patterns consisted of the treasures patterns. From the 17th century, treasures patterns began to be used as main patterns. For example, a relic with eight alternatively arranged treasures patterns were found. Though there were still some cases where the patterns were used as sub-patterns, they begin to appear bigger than the previous period and became similar to main patterns in size. In the 18th and 19th centuries, there were various cases where treasures patterns were combined with flowers, fruits, animals, and letter patterns and used as main patterns. And there are many different methods of representing and developing the patterns.

침적 모형에 의한 습성침적 플럭스 수치모의 (Numerical simulation of wet deposition flux by the deposition model)

  • 이화운;문난경;임주연
    • 한국환경과학회지
    • /
    • 제11권12호
    • /
    • pp.1235-1242
    • /
    • 2002
  • The purpose of this study is to estimate wet deposition flux and to investigate wet deposition characteristics by using the ADOM model. Wet deposition flux of highly reactive $SO_2$ is estimated by applying observed meteorological parameters and concentrations of chemical species to the ADOM model. Wet deposition is largely dependent on large scale precipitation and cloud thickness. Wet deposition flux of sulfate depends on $SO_2$ oxidation in clouds. When large amount of $SO_2$ is converted to sulfate, deposition flux of sulfate increases, but wet deposition flux of $SO_2$ is small. On the whole, the pattern of sulfate wet deposition flux agrees with the typical pattern of sulfate wet deposition that is high in the summer(July) and low in the winter(January).

Vortex Cloud Model에 의한 추상체 주위의 Vortex 유출 Simulation (Simulation of the Vortex Shedding from a Circular Cylinder by Means of the Vortex Cloud Model)

  • 이동기
    • 대한조선학회논문집
    • /
    • 제30권3호
    • /
    • pp.62-74
    • /
    • 1993
  • 균일한 정상유동을 하는 유체 안에 가로놓인 원주로부터 일어나는 vortex유출을 이산 vortex 방법을 써서 vortex cloud모형으로 simulation했다. 원주표면에서 생겨나는 와도를 매 시간 간격마다 미리 정해진 많은 갯수의 이산화된 초생 vortex로 나타낸 후 기 유출된 vortex들에 합류시켜 누적된 vortex들의 운동을 탐색함으로서 vortex 분포 상태의 진화를 알아낸다. vortex들의 이동은 cloud-in-cell 기법을 써서 추적 하였고 항력 계수와 양력 계수는 Sarpkaya의 식과 Lee의 식을 써서 계산하여 실험치와 비교하였다. 계산 인수 사이의 상호 연관 관계를 논고하였으며 부분적이나마 적정값 선정 원칙을 제시하였다.

  • PDF

Statistical Properties of Electric Fields Produced by Cloud-to-Ground Lightning Return Strokes

  • Lee, Bok-Hee;Lee, Dong-Moon;Lee, Seung-Chil;Ahn, Chang-Hwan
    • KIEE International Transactions on Electrophysics and Applications
    • /
    • 제11C권4호
    • /
    • pp.120-126
    • /
    • 2001
  • For the past five years, Inha University has been observing the electric fields produced by cloud-to-ground return strokes. This paper presents the summary of most recent results. Statistics on the zero-to-peak rise time, the zero-to-zero crossing time and the amplitude ratio of the second peak in the opposite polarity to the first peak were examined. The radiation electric fields produced by distant cloud-to-ground return strokes were substantially same pattern. The first return stroke field starts with a slowly increasing front and rises abruptly to peak. The rising portions of the electric fields produced by cloud-to-ground return strokes last 1 $mutextrm{s}$ to a few $mutextrm{s}$. The mean values of the zero-to-peak rise times of electric fields were 5.72 $mutextrm{s}$ and 4.12 $mutextrm{s}$ for the positive and the negative cloud-to-ground return strokes, respectively. The mean of the zero-to-zero crossing time for the positive return strokes was 29.48 $mutextrm{s}$ compared with 38.54 $mutextrm{s}$ for the negative return strokes. The depths of the dip after the peak of return stroke electric fields also have the dependence on the polarity of cloud-to-ground return stroke, and the mean values for the positive and negative cloud-to-ground return strokes were 33.55 and 28.19%, respectively.

  • PDF

Profit-Maximizing Virtual Machine Provisioning Based on Workload Prediction in Computing Cloud

  • Li, Qing;Yang, Qinghai;He, Qingsu;Kwak, Kyung Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4950-4966
    • /
    • 2015
  • Cloud providers now face the problem of estimating the amount of computing resources required to satisfy a future workload. In this paper, a virtual machine provisioning (VMP) mechanism is designed to adapt workload fluctuation. The arrival rate of forthcoming jobs is predicted for acquiring the proper service rate by adopting an exponential smoothing (ES) method. The proper service rate is estimated to guarantee the service level agreement (SLA) constraints by using a diffusion approximation statistical model. The VMP problem is formulated as a facility location problem. Furthermore, it is characterized as the maximization of submodular function subject to the matroid constraints. A greedy-based VMP algorithm is designed to obtain the optimal virtual machine provision pattern. Simulation results illustrate that the proposed mechanism could increase the average profit efficiently without incurring significant quality of service (QoS) violations.

블록체인을 적용한 사설 클라우드 기반 침입시도탐지 (A Probe Detection based on Private Cloud using BlockChain)

  • 이세열
    • 디지털산업정보학회논문지
    • /
    • 제14권2호
    • /
    • pp.11-17
    • /
    • 2018
  • IDS/IPS and networked computer systems are playing an increasingly important role in our society. They have been the targets of a malicious attacks that actually turn into intrusions. That is why computer security has become an important concern for network administrators. Recently, various Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems is useful for existing intrusion patterns on standard-only systems. Therefore, probe detection of private clouds using BlockChain has become a major security protection technology to detection potential attacks. In addition, BlockChain and Probe detection need to take into account the relationship between the various factors. We should develop a new probe detection technology that uses BlockChain to fine new pattern detection probes in cloud service security in the end. In this paper, we propose a probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) based on service security using BlockChain technology.

클라우드 시스템에서 소셜 시멘틱 웹 기반 협력 프레임 워크 (Collaboration Framework based on Social Semantic Web for Cloud Systems)

  • 마테오 로미오;양현호;이재완
    • 인터넷정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.65-74
    • /
    • 2012
  • 클라우드 서비스는 비즈니스 향상을 위해 사용되며, 특히, 고객 관리에서는 고객 서비스 향상을 위한 툴로서 소셜 네트워크를 사용한다. 그러나 대부분의 클라우드 시스템은 시멘틱 구조를 지원하지 않기 때문에 소셜 네트워크 사이트의 중요한 정보는 비즈니스 정책을 위해 처리 및 사용이 어렵다. 본 연구에서는 클라우드 시스템에서 소셜 시멘틱 웹에 기반을 둔 협력 프레임 워크를 제안한다. 제안한 프레임 워크는 클라우드 소비자와 서비스 제공자를 위한 효율적인 협력시스템을 제공하기 위해, 소셜 시멘틱 웹 지원을 위한 요소들로 구성된다. 지식획득모듈은 소셜 에이전트가 수집한 데이터로부터 규칙을 추출하며, 이 규칙들은 협력 및 경영정책에 사용된다. 본 논문은 제안한 시멘틱 모델에서 소셜 네트워크 사이트 데이터의 처리 및 효율적인 협력을 위한 클라우드 서비스 제공자의 가상 그룹핑을 위해 사용될 패턴 추출에 대한 구현 결과를 보여준다.

FaST: Fine-grained and Scalable TCP for Cloud Data Center Networks

  • Hwang, Jaehyun;Yoo, Joon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.762-777
    • /
    • 2014
  • With the increasing usage of cloud applications such as MapReduce and social networking, the amount of data traffic in data center networks continues to grow. Moreover, these appli-cations follow the incast traffic pattern, where a large burst of traffic sent by a number of senders, accumulates simultaneously at the shallow-buffered data center switches. This causes severe packet losses. The currently deployed TCP is custom-tailored for the wide-area Internet. This causes cloud applications to suffer long completion times towing to the packet losses, and hence, results in a poor quality of service. An Explicit Congestion Notification (ECN)-based approach is an attractive solution that conservatively adjusts to the network congestion in advance. This legacy approach, however, lacks scalability in terms of the number of flows. In this paper, we reveal the primary cause of the scalability issue through analysis, and propose a new congestion-control algorithm called FaST. FaST employs a novel, virtual congestion window to conduct fine-grained congestion control that results in improved scalability. Fur-thermore, FaST is easy to deploy since it requires only a few software modifications at the server-side. Through ns-3 simulations, we show that FaST improves the scalability of data center networks compared with the existing approaches.

Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

  • Oh, Doohwan;Kim, Ilkyu;Kim, Keunsoo;Lee, Sang-Min;Ro, Won Woo
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.348-358
    • /
    • 2015
  • Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.