• Title/Summary/Keyword: Gateway Concept

Search Result 53, Processing Time 0.025 seconds

Fasting of the Mind and Quieting of the Mind: A Comparative Analysis of Apophatic Tendencies in Zhuangzi and Cataphatic Tendencies in Daesoon Thought

  • ZHANG Rongkun;Jason GREENBERGER
    • Journal of Daesoon Thought and the Religions of East Asia
    • /
    • v.2 no.2
    • /
    • pp.33-50
    • /
    • 2023
  • 'Fasting of the Mind (心齋, ch. xīn zhāi)' is arguably the most important concept within the practical approach to the spiritual cultivation formulated by the Daoist philosopher, Zhuangzi (莊子). Most scholars have interpreted 'Fasting of the Mind' as an apophatic practice centered around the aim of the 'Dissolution of the Self (喪我, ch. sàng wŎ).' The Korean new religious movement, Daesoon Jinrihoe (大巡眞理會), can be shown to instead consistently utilize cataphatic descriptions of spiritual cultivation based on the 'quieting of the mind (安心, kr. anshim)' and 'quieting of the body (安身, kr. anshin)' with the highest attainable state referred to as the 'Perfected State of Unification with the Dao (道通眞境, kr. Dotong-jingyeong).' While the language used by Zhuangzi and Daesoon Jinrihoe appears quite different on a superficial level, a deeper examination shows that these rhetorical framings are likely negativistic and positivistic descriptions of the same, or at least reasonably similar, phenomena. Zhuangzi, who focused primarily on the body, mind, and internal energy, cautioned practitioners that 'mere listening stops with the ears (聽止於耳, ch. tīng zhǐ yú ěr)' and 'mere recognition stops with the mind (心止於符, ch. xīn zhǐ yú fú).' He therefore encouraged cultivators of the Dao to 'listen with the spirit (聽之以氣 ch. tīng zhī yǐ qì).' The main scripture of Daesoon Jinrihoe states that "The mind is a pivot, gate, and gateway for gods; They, who turn the pivot, open, and close the gate, and go back and forth through the gateway, can be either good or evil (心也者, 鬼神之樞機也, 門戶也,道路也)," and the Supreme God of the Ninth Heaven (九天上帝, kr. Gucheon Sangje) even promises to visit anyone who possesses a 'singularly-focused mind (一心, kr. il-shim).' In both these approaches, there is a sense of what must be kept out of the mind (e.g., external disturbances, strong emotions, malevolent entities) and what the mind should connect with to attain spiritual progress (e.g., spirit, singular focus, the Supreme God). The observations above serve as the main basis for a comparison between the apophatic descriptions of cultivation found in Zhuangzi and their cataphatic counterparts in Daesoon Thought. However, the culmination of this nuanced comparative exploration reveals that while the leanings of Zhuangzi and Daesoon Thought generally hold true, ultimately, both systems of cultivation transcend the categories of apophatic and cataphatic.

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.

IoT Enabled Smart Emergency LED Exit Sign controller Design using Arduino

  • Jung, Joonseok;Kwon, Jongman;Mfitumukiza, Joseph;Jung, Soonho;Lee, Minwoo;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.76-81
    • /
    • 2017
  • This paper presents a low cost and flexible IoT enabled smart LED controller using Arduino that is used for emergency exit signs. The Internet of Things (IoT) is become a global network that put together physical objects using network communications for the purpose of inter-communication of devices, access information on internet, interaction with users as well as permanent connected environment. A crucial point in this paper, is underlined on the potential key points of applying the Arduino platform as low cost, easy to use microcontroller with combination of various sensors applied in IoT technology to facilitate and establishment of intelligent products. To demonstrate the feasibility and effectiveness of the system, devices such as LED strip, combination of various sensors, Arduino, power plug and ZigBee module have been integrated to setup smart emergency exit sign system. The general concept of the proposed system design discussed in this paper is all about the combination of various sensor such as smoke detector sensor, humidity, temperature sensor, glass break sensors as well as camera sensor that are connected to the main controller (Arduino) for the purpose of communicating with LED exit signs displayer and dedicated PC monitors from integrated system monitoring (controller room) through gateway devices using Zig bee module. A critical appraisal of the approach in the area concludes the paper.

The Study of Security Life Cycler Energy Service Platform or Universal Middleware (유니버설미들웨어상의 생명주기기반 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.291-293
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware such as OSGi platform. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support the life cycle of secure, delete, start and updating of the security module by applying the security policy module layer concept. It is modular in terms of power generation and accountability, enabling us to distinguish between reliability and accountability in a large volume of data models in the smart grid, the service was intended to be standardized and applied to the security service platform.

  • PDF

An Extended GDMO for Interworking Different Network Management Protocols (망 관리 프로토콜 연동을 위한 확장된 GDMO)

  • Lim, Mi-Kyoung;Kim, Tae-Soo;Lee, Kwang-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.156-165
    • /
    • 2000
  • This paper proposes an integrated system for interworking different network management protocols. The interworking system between SNMP(Simple Network Management Protocol) and CMIP(Common Management Information Protocol) has been designed. We defined new managed object architecture using MOVI(Managed Object View Interface) concept and implemented an extended GDMO(EGDMO) compiler. An access mechanism for consistency control and atomic action on the sharing resources has been defined. Thus, even if a new management protocol would be introduced, new gateway system need not to be redesigned. It can be achieved with minimum modification of the view interface of managed objects. As a managed object can support various view interfaces, several network management protocols can directly access it. This approach, therefore, provides some benefits. For instance, manager can access managed objects without additional functions and tools. Ti, also, could be achieved interworking between SNMP and CMIP with minimum modification on the view interface of the managed objects defined previously. It is able to interwork more complicated network management protocols and to increase usefulness of SNMP and CMIP.

  • PDF

An Adaptive Control of Individual Channels' Transmission Power in Femtocells (펨토셀 환경에서 채널별 전송전력의 적응적 제어 기법)

  • Lee, Hoseog;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.9
    • /
    • pp.762-771
    • /
    • 2012
  • In this paper, we propose an adaptive power control scheme employing a self-optimization concept in femtocell systems, in order to improve system capacity, thereby reducing call-drop probability. In the proposed scheme, each femto base station(FBS) controls individual channel's transmission power base on two parameters; the neighboring cell's transmission power for each individual channel which is delivered from a femto-gateway and the received power strength from neighboring cells which is periodically measured by means of a spectrum sensing. Adaptive adjustment of individual channel's transmission power in accordance with femto mobile station(FMS) mobility features can also reduce undesirable handovers and evenly distribute traffic load over all femtocells. In addition, the manipulative control of channel's transmission power is able to keep the system coverage and the call-drop probability within an acceptable range, regardless of density of femtocells. Computer simulation shows that the proposed scheme outperforms existing schemes in terms of the system coverage and the call-drop probability.

A Study on the Network Architecture for KEPCO SCADA Systems (한국전력 스카다 시스템의 네트워크 구조에 대한 연구)

  • Ryo, Woon Jong
    • Industry Promotion Research
    • /
    • v.2 no.2
    • /
    • pp.1-6
    • /
    • 2017
  • SCADA (Supervisory Control and Data Acquisition) System was first introduced to the Seoul Electricity Authority, which manages the transportation part among the three business fields that produce, transport and supply electric power in Korea. Has been using the data link with 1200 bps and 9600 bps in 5 protocols such as HARRIS 6000, BSC, HDLC, L & N and Toshiba by configuring 3 layers of EMS, SCADA and RTU computer equipments in 1: N radial form. This paper presents the OSI standard network packet flow, analyzing DataLink and Network Layer, and presents a KEPCO SCADA network model composed of X.25 high - speed communication network using 3 layers of network. We proposed a future SCADA communication structure that improved the current SCADA communication structure, defined the SCADA DB structure, introduced the concept of the remote SCADA gateway to the SCADA functional structure, applied the standard communication protocol, Multiplexing of surveillance and control in other local facilities and ensuring communication openness.

Advanced Stability Distributed Weighted Clustering Algorithm in the MANET (모바일 에드혹 네트워크에서 안정성을 향상시킨 분산 조합 가중치 클러스터링 알고리즘)

  • Hwang, Yoon-Cheol;Lee, Sang-Ho;Kim, Jin-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.33-42
    • /
    • 2007
  • Mobile ad-hoc network(MANET) can increase independence and flexibility of network because it consists of mobile node without the aid of fixed infrastructure. But, Because of unrestriction for the participation and breakaway of node, it has the difficulty in management and stability which is a basic function of network operation. Therefore, to solve those problems, we suggest a distributed weighted clustering algorithm from a manageable and stable point of view. The suggested algorithm uses distributed weighted clustering algorithm when it initially forms the cluster and uses a concept which is distributed gateway and sub-cluster head to reduce the re-clustering to the minimum which occurs mobile nodes after forming the cluster. For performance evaluation, We compare DCA and WCA with the suggested algorithm on the basis of initial overhead, resubscriber rate and a number of cluster.

  • PDF

The waste heat utilization in container greenhouse and smart farm related technology based on IOT (컨테이너 온실에서 폐열 활용 및 IOT 기반의 스마트 팜 연계 기술)

  • Hwang, Woo-jeong;Jung, Jung-hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.415-418
    • /
    • 2017
  • Recently, the demand for energy efficiency improvement technology through the connection of waste heat energy and SmartGrid has been increasing. Thus, investments for the cultivation of high value crops and produce is increasing through research aimed at synthetic technology in real-time utilization of smart farms and waste heat energy with the concept of using container greenhouses and plant factories. In this aspect, we have carried out research on a practical application technology that will help farmers to increase the economic effectiveness of LED based plant factories in terms of energy efficiency. This can provide opportunities to connect with the large scale automated smart farms in the future. In this study, we focused on the economic effectiveness of crop cultivation using cooling technology in a container greenhouse through waste heat energy. Hereafter, in order to further advance the technology of real-time monitoring/control of the absorption chiller which is used through the container greenhouses and waste heat energy by using IOT, we would like to propose research on new ideas of agricultural technology that can maximize the utility of cooling energy by operating a mobile gateway based on Raspberry PI.

  • PDF

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.