• Title/Summary/Keyword: Clouding

Search Result 50, Processing Time 0.028 seconds

Production of Mirin by Fusant Obtained Between Aspergillus oryzae and Aspergillus shirousamii (Aspergillus oryzae와 Aspergillus shirousamii간의 융합주에 의한 미림의 생산)

  • Shin, Dong-Bun;Ryu, Beung-Ho
    • Korean Journal of Food Science and Technology
    • /
    • v.25 no.5
    • /
    • pp.430-437
    • /
    • 1993
  • This study was carried out for high quality mirin Production by fusant F-50. Cellularly fused between Aspergillus oryzae 9-12 and Aspergillus shirousamii 6082-60. The conventional and the improvement methods in Mirin-making by F-50 showed high level of total sugar, reducing sugar and amino-nitrogen of 42%, 38% and 0.18%, respectively. Free amino acids in Mirin were found to 387.2 mg% glutamic acid, 283.8 mg% arginine, 244.0 mg% leucine, 218.0 mg% aspartic acid, 231.1 mg% alanine, 168.3 mg% serine and 148 mg% phenylalanine. Organic acids in Mirin were contained: oxalic acid, citric acid, malic acid, succinic acid, lactic acid, acetic acid and propionic acid. Sugars such as glucose, maltose, isomaltose, maltotriose, ribose, isomaltotriose and isomatotertraose were also found in Mirin. The clouding formation of Mirin made by F-50 showed 0.03 alcohol clouding, 0.08 water clouding and negative heat clouding.

  • PDF

Handoff Method Supporting LBS Information in Mobile Clouding Computing (이동 클라우딩 환경에서 LBS 지원 핸드오프 기법)

  • Kim, Ki-Young;Kim, Sun-Jib
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.89-97
    • /
    • 2015
  • In this paper, we propose a handoff method supporting LBS (Location Based Services) Information in mobile clouding environment. In mobile clouding computing, handoff delay and re-authentication is occurred. A mobile node needs re-authentication procedure from cloud server whenever it arrives new AP. But Using of location information of node enables to reduce delay time due to re-authentication. To reduce re-authentication delay time, proposed method stores location information of APs on WiFi based location server to complement. GPS-based technology which can't receive satellite signal in indoor and then node collects location information of AP at handoff time. And also enables to process LBS without increasing handoff delay by splitting the process of handoff from process of requesting location information. For analysis of proposed method, We analyze handoff delay and location information process time and have compared previous handoff method in cloud environment. We confirmed that proposed method shows lower delay time without increasing LBS process time than previous method because node receives location information from location information server when handoff is occurred.

The Technique of Clouding Service About its security (클라우드 저장 서비스 보안에 관한 기술)

  • LEE, MinSeok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.380-381
    • /
    • 2017
  • 현재 정보이용자는 icloud, google drive등과 같은 clouding storage 서비스를 이용하여 자신의 정보를 저장한다. 하지만 서버와 사용자간의 데이터 전송 시 발생할 수 있는 데이터 손실, 서버에 저장된 데이터 삭제 및 소유권 문제 등이 발생할 수 있다. 본 논문에서는 이러한 발생 가능한 정보보안 문제를 해결하기 위한 기술들을 소개하려 한다.

Exploration of Research Trends in The Journal of Distribution Science Using Keyword Analysis

  • YANG, Woo-Ryeong
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.8
    • /
    • pp.17-24
    • /
    • 2019
  • Purpose - The purpose of this study is to find out research directions for distribution and fusion and complex field to many domestic and foreign researchers carrying out related academic research by confirming research trends in the Journal of Distribution Science (JDS). Research Design, Data, and Methodology - To do this, I used keywords from a total of 904 papers published in the JDS excluding 19 papers that were not presented with keywords among 923. The analysis utilized word clouding, topic modeling, and weighted frequency analysis using the R program. Results - As a result of word clouding analysis, customer satisfaction was the most utilized keyword. Topic modeling results were divided into ten topics such as distribution channels, communication, supply chain, brand, business, customer, comparative study, performance, KODISA journal, and trade. It is confirmed that only the service quality part is increased in the weighted frequency analysis result of applying to the year group. Conclusion - The results of this study confirm that the JDS has developed into various convergence and integration researches from the past studies limited to the field of distribution. However, JDS's identity is based on distribution. Therefore, it is also necessary to establish identity continuously through special editions of fields related to distribution.

Study on Intrusion Detection System under Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 침입탐지시스템 특징 분석)

  • Yang, Hwan-Seok;Lee, Byoung-Cheon;Yoo, Seung-Jea
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.59-65
    • /
    • 2012
  • Clouding computing which is developing newly as IT and network technology develops become changed to internet and service environment of company. Especially, it can lend IT resource at low costs and no need to build up infra. Clouding computing environment become popular more and more because various computing environment using virtualization is provided. The attack threat range also becomes wider in proportion to broaden various connection ways and service supply range at these clouding computing. Therefore, intrusion detection system which can protect resource from various attack having malignant attempts is necessary. In this study, we analyzed about characteristic of intrusion detection system at cloud computing environment having big damage than other computing environment when intrusion happen by sharing of resource and virtualization.

Analysis of problems caused by Big Data's private information handling (빅데이터 개인정보 취급에 따른 문제점 분석)

  • Choi, Hee Sik;Cho, Yang Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.89-97
    • /
    • 2014
  • Recently, spread of Smartphones caused activation of mobile services, because of that Big Data such as clouding service able to proceed with large amount of data which are hard to collect, save, search and analyze. Many companies collected variety of private and personal information without users' agreement for their business strategy and marketing. This situation raised social issues. As companies use Big Data, numbers of damage cases are growing. In this Thesis, when Big Data process, methods of analyze and research of data are very important. This thesis will suggest that choices of security levels and algorithms are important for security of private informations. To use Big Data, it has to encrypt the personal data to emphasize the importance of security level and selection of algorithm. Thesis will also suggest that research of utilization of Big Data and protection of private informations and making guidelines for users are require for security of private information and activation of Big Data industries.

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

Case of 'Dianxian' Patient Induced by Eum Deficiency of Liver & Kidney Who was Considered as Complex Partial Seizure Treated by Acupuncture (복합국소형발작으로 사료되는 간신음허형(肝腎陰虛形) 및 전간 환자의 침치료 예)

  • Cho, Chang-Hyun;Cho, Yoon-Soong;Yoon, Ji-Woon;Lee, Sang-Kwan
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.21 no.1
    • /
    • pp.328-332
    • /
    • 2007
  • Epilepsy is any of various neurological disorders characterized by sudden, recurring attacks of motor, sensory, or psychic malfunction with or without loss of consciousness or convulsive seizures. It could be divided into subcategories due to the international classification of epileptic seizure and the complex partial seizure, that is one of epileptic seizure subcategories, is characterized by elaborate and multiple sensory, motor, and/or psychic components accompanying the clouding of consciousness, prodrome, automatism, postictal confusion. This study reports a patient who was presumptive diagnosed as complex partial seizure by having the clouding of consciousness, prodrome, postictal confusion. We also diagnosed him as a ‘dianxian’ patient induced by sum deficiency of liver & kidney. This patient was treated by acupuncture to tonifying eum of liver & kidney and it achieved markedly improved symptoms.

Evaluation of Facilitating Factors for Cloud Service by Delphi Method (델파이 기법을 이용한 클라우드 서비스의 개념 정의와 활성화 요인 분석)

  • Suh, Jung-Han;Chang, Suk-Gwon
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.107-118
    • /
    • 2012
  • Recently, as the clouding computing begins to receive a great attention from people all over the world, it became the most popular buzz word in recent IT magazines or journal and heard it in many different services or different fields. However, a notion of the cloud service is defined vaguely compared to increasing attentions from others. Generally the cloud service could be understood as a specific service model base on the clouding computing, but the cloud, the cloud computing, the cloud computing service and cloud service, these four all terms are often used without any distinction of its notions and characteristics so that it's difficult to define the exact nature of the cloud service. To explore and analyze the cloud service systematically, an accurate conception and scope have to be preceded. Therefore this study is to firstly clarify its definition by Delpi method using expert group and then tries to provide the foundation needed to enable relative research such as establishing business model or value chain and policies for its activation to set off. For the Delpi, 16 experts participated in several surveys from different fields such industry, academy and research sector. As a result of the research, Characteristics of the Cloud Service are followings : Pay per use, Scalability, Internet centric Virtualization. And the scope as defined including Grid Computing, Utility Computing, Server Based Computing, Network Computing.

Observation of Lateral Compartment through Posteromedial Trans-posterior Septal Portal in Knee Joints (슬관절 후내측 후격막 통과 도달법을 이용한 외측 구획의 관찰)

  • Lee, Ghun-Shik;Park, Han-Sung;Kim, Sang-Hyo
    • Journal of the Korean Arthroscopy Society
    • /
    • v.9 no.1
    • /
    • pp.56-59
    • /
    • 2005
  • Trans-posterior septal posterior arthroscopic portals are useful in performing arthroscopic diagnosis and treatment of the lesions located in posterior aspect of knee joints. Except inferior surface of posterior horn of lateral meniscus, we easily observed entire lateral compartment, especially inferior surface of anterior horn and lateral tibial condyle by figure of 4 position through posteromedial trans-posterior septal arthroscopic portal. And it was possible to obtain visual field from posterior aspect and we could use anteromedial and anterolateral portals for instrumentation without clouding. So, this procedure may be useful in performing surgery of lateral compartment especially, anterior aspect in the knee joints.

  • PDF