• Title/Summary/Keyword: CloudHIS

Search Result 39, Processing Time 0.036 seconds

Development of a Modern One-piece Design using a Traditional Pattern - Focusing on the Arrangement and Color-Scheme of the Pattern - (전통문양을 활용한 현대적 원피스 디자인 개발 연구 - 문양의 배치 및 색채 배색 과정을 중심으로 -)

  • Kang, Min-Jung;Cho, Jean-Su
    • The Research Journal of the Costume Culture
    • /
    • v.20 no.3
    • /
    • pp.330-346
    • /
    • 2012
  • The purpose of this study is to link traditional patterns to modern clothing. Of all the traditional patterns, the cloud pattern was chosen for use during the development of a modern one-piece dress design. This study is based upon document searches, including research papers. Through these searches, it investigates the symbolic meaning, historical change, and formation of the cloud pattern. Based on this investigation, the study attempts to modernize the cloud pattern and apply the modernized patterns to the design of a one-piece dress. The design procedure includes three sub-processes: selection, arrangement, and color-scheme. The selection process was divided in two: first, the original form of the cloud pattern was hand-drawn using tracing paper: second, the form of the pattern was edited using Adobe Photoshop. The arrangement of the pattern was made through the checklist conception method, containing the following functions: expand, reset, repeat, and overlap. For the color-scheme of the pattern, Roy Lichtenstein's(1923~1997) work was selected, and the colors in his work were adopted when dyeing the rest of the one-piece dress as well as the cloud features. In conclusion, six modern designs of the one-piece dress were created by using one of Korea's traditional patterns - the cloud pattern. Therefore, this study can offer invaluable suggestions for multifaceted research on how to come up with design concepts which apply Korea's traditional patterns to clothing design.

An Appraoch for Preserving Loaction Privacy using Location Based Services in Mobile Cloud Computing

  • Abbas, Fizza;Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.621-624
    • /
    • 2013
  • Mobile Cloud Computing is today's emerging technology. Customers enjoy the services and application from this combination of mobile technology and cloud computing. Beside all these benefits it also increases the concerns regarding privacy of users, while interacting with this new paradigm One of the services is Location based services, but to get their required services user has to give his/her current location to the LBS provider that is violation of location privacy of mobile client. Many approaches are in literature for preserve location privacy but some has computation restriction and some suffer from lack of privacy. In this paper we proposed a novel idea that not only efficient in its protocol but also completely preserves the user's privacy. The result shows that by sharing just service name and a large enough geographic area (e.g. a city) user gets required information from the server by doing little client side processing We perform experiments at client side by developing and testing an android based mobile client application to support our argument.

An Analysis of 'Chunsansoesong' by Mi Fu - Underlining the Poem within the Painting - (미불의 춘산서송도<春山瑞松圖> 분석 -'화중유시 (畵中有詩)' 의 특성을 중심으로-)

  • Wang Hyung-Yul
    • Journal of Science of Art and Design
    • /
    • v.6
    • /
    • pp.100-118
    • /
    • 2004
  • Mi Fu, who was associated with Wen Tong, invented the Mijoem Technique (Dotting Technique) in landscape painting with his son Mi Youren. His landscapes, which referred to Dong Yuan's landscape technique and was inspired by the scenery of Jiang Nan, illustrate the mood of a cloud-covered foggy landscape by liberally applying dots with ink. 'Chunsansoesong' which is considered done by Mi Fu, clearly shows the virtues of ink painting's spreading, absorbing and omission techniques. This simply rendered landscape - whose mountains and hills are wrapped in both clouds and fog - displays exquisiteness by using small dots. In 'Chunsansoesong', the characteristics of Song painting: a 'vital energy', a 'poem within the painting', a 'beauty of margin', a 'beauty of one brush stroke, and a 'display of inner meanings' are implicatively expressed This is because it's simple but connotatively delineative. There is the characteristic of a 'poem within the painting' when analyzing the both fragmented and combined 'Chunsansoesong'. The margins support an imaginative space as the height of the mountains get higher which result in deepening both the width and depth of the landscape space. Furthermore, the soft thickness of ink, clouds, pine trees, and pavilion evoke delineative feelings and a desire to write a poem Every thing in 'Chunsansoesong' is enveloped in both clouds and fog regardless of its distance and this delivers boundless feelings of Oriental mystery and urges a desire for 'writing a poem'. The pavilion that faces the cloud and fog-bound mountains especially flames the poetic urge further by inducing viewers' poetic imaginations. As we reviewed above, 'Chunsansoesong's cloud and fog-covered landscape is a good example that clearly showcases the characteristics of a 'Poem within the Painting'.

  • PDF

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

1 Person Media Based on Person Wide Web for Preventing Privacy Risk (사생활 침해 방지를 위한 Person Wide Web 기반 1인 미디어)

  • Yoon, Jisup;Ma, Jung-Mi;So, Sun-sup;Eun, Seongbae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.339-346
    • /
    • 2016
  • 1 person media is becoming the leading trend among several media in the Internet era exploiting the individual desire of showing off. But, the vast accessibility of Internet produces the worry about privacy risk, which concludes in the increasement of closed SNS. In this paper, we propose a system based on PWW (Person Wide Web) where a person is producing a media and share it with other persons. PWW is an information system which consists of a smart-phone, mobile anchors, a standard web document, and his own cloud storage. An information consumer gets the link using his smart-phone from the mobile anchors attached on the objects in the field. The web browser in the smart-phone obtains the web documents designated by the link and presents it. We also explains the 1 person media system based on PWW and presents the example utilized in the field. We compared and analyzed the security factor of the system based on between WWW and PWW, and concluded that PWW is better than WWW in the aspect of security.

The real nature of the West Wind in Shelley's Ode to the West Wind (셸리의 Ode to the West Wind에 나타난 서풍의 실체)

  • Jeon, Woong-Ju
    • English Language & Literature Teaching
    • /
    • no.5
    • /
    • pp.259-272
    • /
    • 1999
  • The real nature of the west wind in Shelley's Ode to the West Wind is the divine providence which influences all things in this world- that is, whether they are on land, in the sky, or in the sea. The divine providence is the manifestation of something beyond the present and tangibel object. In the first stanza, the real nature of the west wind in this poem is the wild wind, the breath of Autumn's being, the unseen presence, the azure sister of the Spring, a Destroyer, a Preserver, the winged seed, a creator, a philosopher, a poet, Shelley, and the wild spirit moving everywhere. In the second stanza, the real nature of the west wind in this poem is cloud, the angel of rain and lightning, fierce Maenad, the approaching storm, the congregated might, the black rain, the fire, hail, solid atmosphere, the tremendous power of revolutionary change, and the power that influences all things in the sky. In the third stanza, the real nature of the west wind in this poem is the voice that makes the oozy woods which wear the sapless foliage of the Atlantic, and the power makes the blue Mediterranean wake from his summer dream. the fit medium of expression which Shelley's soul was seeking for, Shelley's passion, Shelley's partner, Shelley's co-worker, and a strong presence which influences in the sea. In the fourth stanza, the real nature of the west wind in this poem is the mightest presence, the power, the strength, the free presence, the uncontrollable, the wanderer over heaven, a vision, the tameless, the swift, the proud and the God who can save Shelley form the heavy weight of hours and lift Shelley as a wave a leaf, a cloud. In the fifth stanza, the real nature of the west wind in this poem is the mighty harmony, the fierce Spirit, Shelley's spirit, the impetuous spirit, incanation of this verse, spark, the trumpet of a prophecy, the Providence which can make the Winter depart and call Spring, and the prophet. To conclude, the real nature of the west wind in this poem is Shelley's accumulated insight that he visulize his impulse of revolutionary thought.

  • PDF

User Mobility Model Based Computation Offloading Decision for Mobile Cloud

  • Lee, Kilho;Shin, Insik
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.3
    • /
    • pp.155-162
    • /
    • 2015
  • The last decade has seen a rapid growth in the use of mobile devices all over the world. With an increasing use of mobile devices, mobile applications are becoming more diverse and complex, demanding more computational resources. However, mobile devices are typically resource-limited (i.e., a slower-speed CPU, a smaller memory) due to a variety of reasons. Mobile users will be capable of running applications with heavy computation if they can offload some of their computations to other places, such as a desktop or server machines. However, mobile users are typically subject to dynamically changing network environments, particularly, due to user mobility. This makes it hard to choose good offloading decisions in mobile environments. In general, users' mobility can provide some hints for upcoming changes to network environments. Motivated by this, we propose a mobility model of each individual user taking advantage of the regularity of his/her mobility pattern, and develop an offloading decision-making technique based on the mobility model. We evaluate our technique through trace-based simulation with real log data traces from 14 Android users. Our evaluation results show that the proposed technique can help boost the performance of mobile devices in terms of response time and energy consumption, when users are highly mobile.

Mutable Encryption for Oblivious Data Access in Cloud Storage

  • Ahmad, Mahmood;Hussain, Shujjat;Pervez, Zeeshan;Lee, Sungyoung;Chung, Tae Choong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.157-158
    • /
    • 2013
  • Data privacy and access control policies in computer clouds are a prime concerns while talking about the sensitive data. Authorized access is ensured with the help of secret keys given to a range of valid users. Granting the role access is a trivial matter but revoking user access is tricky and compute intensive. To revoke a user and making his data access ineffective the data owner has to compute new set of keys for the rest of effective users. This situation is inappropriate where user revocation is a frequent phenomenon. Time based revocation is another way to deal this issue where key for data access expires automatically. This solution rests in a very strong assumption of time determination in advance. In this paper we have proposed a mutable encryption for oblivious data access in cloud storage where the access key becomes ineffective after defined number of threshold by the data owner. The proposed solution adds to its novelty by introducing mutable encryption while accessing the data obliviously.

Variable Blue Stragglers in the Metal-Poor Globular Clusters in the Large Magellanic Cloud - Hodge 11 and NGC1466

  • Yang, Soung-Chul;Bhardwaj, Anupam
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.1
    • /
    • pp.35.2-35.2
    • /
    • 2021
  • Blue straggler stars (BSs) are "rejuvenated" main sequence stars first recognized by Allan Sandage from his observation of the prominent northern globular cluster M3 in the year of 1953. BSs are now known to be present in diverse stellar environments including open clusters, globular clusters, dwarf galaxies, and even the field populations of the Milky Way. This makes them a very useful tool in a wide range of astrophysical applications: Particularly BSs are considered to have a crucial role in the evolution of stellar clusters because they affect on the dynamics, the binary population, and the history of the stellar evolution of the cluster they belong to. Here we report a part of the preliminary results from our ongoing research on the BSs in the two metal-poor globular clusters (GCs) in the Large Magellanic Cloud (LMC), Hodge 11 and NGC1466. Using the high precision multi-band images obtained with the Advanced Camera for Survey (ACS) onboard the Hubble Space Telescope (HST), we extract time-series photometry to search for the signal of periodic variations in the luminosity of the BSs. Our preliminary results confirm that several BSs are intrinsic "short period (0.05 < P < 0.25 days)" variable stars with either pulsating or eclipsing types. We will discuss our investigation on the properties of those variable BS candidates in the context of the formation channels of these exotic main sequence stars, and their roles in the dynamical evolution of the host star clusters.

  • PDF