• Title/Summary/Keyword: Distributed objects

Search Result 425, Processing Time 0.024 seconds

Star Formation Activity in Infra-Red Dark Cloud at ${\Gamma}53.2^{\circ}$

  • Kim, Hyun-Jeong;Koo, Bon-Chul
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.1
    • /
    • pp.82.2-82.2
    • /
    • 2011
  • Infra-Red Dark Clouds (IRDCs) seen silhouette against the bright Galactic background in mid-IR are a class of interstellar clouds that are dense and cold with very high column densities. While IRDCs are believed to be the precursors to massive stars and star clusters, individual IRDCs show diverse star forming activities within them. We report a remarkable example of such cloud, the IRDC at ${\Gamma}53.2^{\circ}$, and star formation activity in this cloud. The IRDC was previously identified in part as three separate, arcmin-size clouds in the catalogue of MSX IRDC candidates, but we found that the IRDC is associated with a long, filamentary CO cloud at 2 kpc from the Galactic Ring Survey data of $^{13}CO$ J = 1-0 emission, and that its total extent reaches ~ 30pc. The Spitzer MIPSGAL 24mm data show a number of reddened mid-IR sources distributed along the IRDC which are probably young stellar objects (YSOs), and the UWISH2 $H_2$ data (2.122mm) reveal ubiquitous out flows around them. These observations indicate that the IRDC is a site of active star formation with YSOs in various evolutionary stages. In order to investigate the nature of mid-IR sources, we have performed photometry of MIPSGAL data, and we present a catalogue of YSOs combining other available point source catalogues from optical to IR. We discuss the evolutionary stages and characteristics of YSOs from their IR colors and spectral energy distributions.

  • PDF

Spatial Construction and Functional Characteristics of Market Place in Seomjin River -Focused on Gokseong, Gurye, Soonchang, Okgok Market Place- (섬진강유역 장시의 공간구성과 기능 특성에 관한 연구 -순창·곡성·구례·옥곡장시를 중심으로-)

  • Park, Chung-Shin;Kim, Tai-young
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.12 no.1
    • /
    • pp.17-24
    • /
    • 2010
  • This paper aims to clarify the spatial form and functional characteries of traditional market place in Seomjin river. The objects of this study are Gokseong, Gurye, Soonchang, and Okgok market place. The results are as follows. First, the form of the traditional market that it was open focusing on large open space of a village was maintained until now. Second, the spatial form of a market place surrounds market-shop located at the center of a market, and a permanent market-store is located in a line. Spatial element important for constituting a market place is three, market-shop, stall, and the mall of market place, and each spatial element is functioning in linkage. The unit space of market-shop is mainly determined by between pillars, and a store is opened. And the same type of industry adjoins, and market-shop's forms a fixed domain and is distributed. The stall is located with many kinds and forms at street mall, and it is taking charge of the important function of trade.

Development of a Quality Assessment Tool for Software Reuse (재사용 소프트웨어 품질평가 도구 개발)

  • Choi, Eun-Man;Nam, Yoon-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.1948-1960
    • /
    • 1997
  • Quality of a new system is closly related to the quality of components in reuse repository. Quality assessment is essential to construct a reuse library. Definition of quality and method of assessment are totally different in reuse environments. User interface, functionality, performance are main factor in non-reuse development environment. However, reuse environment needs more reusability, extensibility, generality, and maintainability in quality assessment. This paper describes a development of quality assessment tool for multimedia object reuse conponents. Tool gets reuse components described by C++ or IDL, and analyses style, structure, coupling, strength, complexity, understandability, etc. Ultimatly the tool generate quality satisfaction degree for reuse programmers. Quality assessment services are supported in distributed object architecture, CORBA.

  • PDF

A Comprehensive Analyses of Intrusion Detection System for IoT Environment

  • Sicato, Jose Costa Sapalo;Singh, Sushil Kumar;Rathore, Shailendra;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.975-990
    • /
    • 2020
  • Nowadays, the Internet of Things (IoT) network, is increasingly becoming a ubiquitous connectivity between different advanced applications such as smart cities, smart homes, smart grids, and many others. The emerging network of smart devices and objects enables people to make smart decisions through machine to machine (M2M) communication. Most real-world security and IoT-related challenges are vulnerable to various attacks that pose numerous security and privacy challenges. Therefore, IoT offers efficient and effective solutions. intrusion detection system (IDS) is a solution to address security and privacy challenges with detecting different IoT attacks. To develop an attack detection and a stable network, this paper's main objective is to provide a comprehensive overview of existing intrusion detections system for IoT environment, cyber-security threats challenges, and transparent problems and concerns are analyzed and discussed. In this paper, we propose software-defined IDS based distributed cloud architecture, that provides a secure IoT environment. Experimental evaluation of proposed architecture shows that it has better detection and accuracy than traditional methods.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

Smart Glasses Technologies for Trustworthy, Augmented Reality, See-Through Eyes-Direct Communications as Substitute for Smart Phones (스마트폰 대체재로서의 신뢰증강보는통신용 스마트안경 기술)

  • Song, K.B.;Lee, J.K.;Kim, K.Y.;Kim, G.W.;Park, S.H.;Kim, T.Y.;Yoon, H.S.;Lee, J.H.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.5
    • /
    • pp.58-70
    • /
    • 2019
  • In this paper, we present the R&D status of ETRI's Trusted Reality (TR) project and its core technologies. ETRI's TR project focuses on the next-generation paradigm of smart phones, ETRI-TR Smart Glasses, which aims to provide the same features as those of smart phones without the involvement of any handheld device. Furthermore, they are characterized by additional features enabled by trustworthy VR/AR/MR/XR, such as privacy masking/unmasking, distributed structure of thin-client computing/networking among TR-Glasses, TR-LocalEdge, and TR-RemoteEdge, with novel see-through eyes-direct communication between IoT real/virtual objects and human eyes. Based on these core technologies of the ETRI's TR project, the human-held ETRI-TR Smart Glasses is expected to aid in the realization of XR vision with particularly more XR's safe_privacy on social life in the near future.

A Secure Database Model based on Schema using Partition and Integration of Objects (객체의 분할과 통합에 의한 스키마 기반 데이타베이스 보안 모델)

  • Kang, Seog-Jun;Kim, Yoeng-Won;Hwang, Chong-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.51-64
    • /
    • 1995
  • In distributed environments, the DB secure models have been being studied to include the multi-level mechanism which is effective to control access according to the level of the data value. These mechanisms have the problems. The first, it is impossible to maintain the global data which is protected in the multi-level mechanism. The second, the access and the relation of the data is not clear due to the access revocation between the local data and the global's. In this paper, we proposed the mechanism using shema. The mechanism doesn't have the access revocation, and provides the protection of the data and the control to the global data.

Revisoin of the Daily Dose of Pinelliae Tuber in Treatise on Cold Damage Diseases (≪상한론≫ 탕제(湯劑)에서 반하(半夏)의 일일 복용량 수정)

  • Kim, In-Rak
    • The Korea Journal of Herbology
    • /
    • v.35 no.1
    • /
    • pp.19-25
    • /
    • 2020
  • Objects : The daily dose of Pinelliae Tuber in ≪Treatise on Cold Damage Diseases≫ is half seung in volume, two and half ryang in weight, and fifteen in total number. But the daily dose should be a whole number. So I found out the background of this setting and correct solution. Methods : I searched Classics of Traditional Medicine, found out the background of the daily dose setting, solution. Results : The daily dose of Pinelliae tuber in ≪Hangdi's Internal Classic Miraculous Pivot≫, ≪Bohenggyuljangbuyongyakbeobyo≫ is half seung. ≪Treatise on Cold Dameage Diseases≫ followed the same daily dose of that because it referred to these books. In ≪Synopsis of Prescription of the Golden Chamber≫, the daily dose of that is half seung, one or two seung. The half seung of the Pinelliae Tuber is thirty three mL, but the diameter is 1~1.5 cm that accurate measurement by volume is difficult. The daily dose by weight is correct considering the unity of marking of the daily dose, accuracy of measurement, the fact that Pinelliae Tuber is currently distributed by cutting. So, two ryang is correct which is thirteen gram. Conclusions : Considering the traditionality, the convenience of measurement, the daily dose of Pinelliae Tuber in the ≪Treatise on Cold Damage Diseases≫ is half seung, but considering the unity, accuracy, current state of distribution, it is correct that the daily dose of it is two ryang. It corresponds to thirteen gram.

Location Service Modeling of Distributed GIS for Replication Geospatial Information Object Management (중복 지리정보 객체 관리를 위한 분산 지리정보 시스템의 위치 서비스 모델링)

  • Jeong, Chang-Won;Lee, Won-Jung;Lee, Jae-Wan;Joo, Su-Chong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.985-996
    • /
    • 2006
  • As the internet technologies develop, the geographic information system environment is changing to the web-based service. Since geospatial information of the existing Web-GIS services were developed independently, there is no interoperability to support diverse map formats. In spite of the same geospatial information object it can be used for various proposes that is duplicated in GIS separately. It needs intelligent strategies for optimal replica selection, which is identification of replication geospatial information objects. And for management of replication objects, OMG, GLOBE and GRID computing suggested related frameworks. But these researches are not thorough going enough in case of geospatial information object. This paper presents a model of location service, which is supported for optimal selection among replication and management of replication objects. It is consist of tree main services. The first is binding service which can save names and properties of object defined by users according to service offers and enable clients to search them on the service of offers. The second is location service which can manage location information with contact records. And obtains performance information by the Load Sharing Facility on system independently with contact address. The third is intelligent selection service which can obtain basic/performance information from the binding service/location service and provide both faster access and better performance characteristics by rules as intelligent model based on rough sets. For the validity of location service model, this research presents the processes of location service execution with Graphic User Interface.

A Preprocessing Method for Ground-Penetrating-Radar based Land-mine Detection System (지면 투과 레이더(GPR) 기반의 지뢰 탐지 시스템을 위한 표적 후보 검출 기법)

  • Kong, Hae Jung;Kim, Seong Dae;Kim, Minju;Han, Seung Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.171-181
    • /
    • 2013
  • Recently, ground penetrating radar(GPR) has been widely used in detecting metallic and nonmetallic buried landmines and a number of related researches have been reported. A novel preprocessing method is proposed in this paper to flag potential locations of buried mine-like objects from GPR array measurements. GPR operates by measuring the reflection of an electromagnetic pulse from discontinuities in subsurface dielectric properties. As the GPR pulse propagates in the geologic medium, it suffers nonlinear attenuation as the result of absorption and dispersion, besides spherical divergence. In the proposed algorithm, a logarithmic transformed regression model which successfully represents the time-varying signal amplitude of the GPR data is estimated at first. Then, background signals may be densely distributed near the regression model and candidate signals of targets may be far away from the regression model in the time-amplitude space. Based on the observation, GPR signals are decomposed into candidate signals of targets and background signals using residuals computed from the estimated value by regression and the measurement of GPR. Candidate signals which may contain target signals and noise signals need to be refined. Finally, targets are detected through the refinement of candidate signals based on geometric signatures of mine-like objects. Our algorithm is evaluated using real GPR data obtained from indoor controlled environment and the experimental results demonstrate remarkable performance of our mine-like object detection method.