• Title/Summary/Keyword: Shared storage

Search Result 137, Processing Time 0.023 seconds

Design of a Height Adjustable Bunker Bed Using a Gas Spring (가스 스프링을 이용한 높이조절 벙커침대 설계)

  • Jung, Gyuhong
    • Journal of Drive and Control
    • /
    • v.18 no.4
    • /
    • pp.19-27
    • /
    • 2021
  • A bunker bed is a type of furniture that efficiently utilizes a narrow indoor space by having a high bed and using the empty space below as a living and storage space. The demand for multi-purpose furniture is increasing due to the recent increase in single-person households and wide-spread shared accommodation. According to the consumer research, one of the major drawbacks of a bunker bed was to get on and off the bed through a ladder or stairs. In order to overcome these problems, it was confirmed that the height adjustment function that can easily adjust the minimum and maximum heights of the bed was necessary. In this study, a height adjustable bunker bed was designed by using a gas spring that generates a repulsive force by the compressed gas inside. The design process consisted of the following three steps: Firstly, the hysteresis characteristics due to a friction and spring constant of a commercial gas spring were confirmed by measuring the repulsive force vs. compressed displacement. Secondly, requirements of the vertical lifting force exerted on the bed against gravity force were derived. Finally, the height-adjustable bed using the four-bar link mechanism was designed with 4 parameters so that the bed weight of 60-70 kgf could be adjusted to 800 mm in height by an affordable initial operation force. The performance was verified through prototype production and the results of vertical displacement and force to move were nearly the same as designed. In addition, an electrically operated height-adjustable bed was also designed with linear actuators and the performance was proved with the prototype.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

A Study on the Perceptions of University Researchers on Data Management and Sharing (데이터 관리와 공유에 대한 대학 연구자들의 인식에 관한 연구)

  • Kim, Jihyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.3
    • /
    • pp.413-436
    • /
    • 2015
  • This study aimed to investigate data management practices of university researchers in Korea, as well as their experiences and perceptions of data sharing and reuse. For this purpose, it performed semi-structured interviews of 13 researchers who agreed to participate in interviews followed by a survey conducted prior to this study. The interview participants created or collected research data with various types and formats, and only a few conducted data documentation while they recognized its significance. The majority of participants perceived the period that data would be useful as the period that data can be employed for publications. However, most participants wanted to preserve data beyond the period that data would be considered useful and it indicates they have no small need for data storage and preservation. Participants usually shared data with those whom they have known, such as a personal research group or a research team. While some completely agree with the principle that publicly-funded data should be open to the public, others partially agreed or disagreed with it. Most participants were concerned about being scooped, plagiarism, and maintaining the first right to publish and incentives to mitigate the concerns would be necessary.

Hate Speech Detection Using Modified Principal Component Analysis and Enhanced Convolution Neural Network on Twitter Dataset

  • Majed, Alowaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.112-119
    • /
    • 2023
  • Traditionally used for networking computers and communications, the Internet has been evolving from the beginning. Internet is the backbone for many things on the web including social media. The concept of social networking which started in the early 1990s has also been growing with the internet. Social Networking Sites (SNSs) sprung and stayed back to an important element of internet usage mainly due to the services or provisions they allow on the web. Twitter and Facebook have become the primary means by which most individuals keep in touch with others and carry on substantive conversations. These sites allow the posting of photos, videos and support audio and video storage on the sites which can be shared amongst users. Although an attractive option, these provisions have also culminated in issues for these sites like posting offensive material. Though not always, users of SNSs have their share in promoting hate by their words or speeches which is difficult to be curtailed after being uploaded in the media. Hence, this article outlines a process for extracting user reviews from the Twitter corpus in order to identify instances of hate speech. Through the use of MPCA (Modified Principal Component Analysis) and ECNN, we are able to identify instances of hate speech in the text (Enhanced Convolutional Neural Network). With the use of NLP, a fully autonomous system for assessing syntax and meaning can be established (NLP). There is a strong emphasis on pre-processing, feature extraction, and classification. Cleansing the text by removing extra spaces, punctuation, and stop words is what normalization is all about. In the process of extracting features, these features that have already been processed are used. During the feature extraction process, the MPCA algorithm is used. It takes a set of related features and pulls out the ones that tell us the most about the dataset we give itThe proposed categorization method is then put forth as a means of detecting instances of hate speech or abusive language. It is argued that ECNN is superior to other methods for identifying hateful content online. It can take in massive amounts of data and quickly return accurate results, especially for larger datasets. As a result, the proposed MPCA+ECNN algorithm improves not only the F-measure values, but also the accuracy, precision, and recall.

Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window (랜드마크 윈도우 기반의 빈발 패턴 마이닝 기법의 분석 및 성능평가)

  • Pyun, Gwangbum;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.101-107
    • /
    • 2014
  • With the development of online service, recent forms of databases have been changed from static database structures to dynamic stream database structures. Previous data mining techniques have been used as tools of decision making such as establishment of marketing strategies and DNA analyses. However, the capability to analyze real-time data more quickly is necessary in the recent interesting areas such as sensor network, robotics, and artificial intelligence. Landmark window-based frequent pattern mining, one of the stream mining approaches, performs mining operations with respect to parts of databases or each transaction of them, instead of all the data. In this paper, we analyze and evaluate the techniques of the well-known landmark window-based frequent pattern mining algorithms, called Lossy counting and hMiner. When Lossy counting mines frequent patterns from a set of new transactions, it performs union operations between the previous and current mining results. hMiner, which is a state-of-the-art algorithm based on the landmark window model, conducts mining operations whenever a new transaction occurs. Since hMiner extracts frequent patterns as soon as a new transaction is entered, we can obtain the latest mining results reflecting real-time information. For this reason, such algorithms are also called online mining approaches. We evaluate and compare the performance of the primitive algorithm, Lossy counting and the latest one, hMiner. As the criteria of our performance analysis, we first consider algorithms' total runtime and average processing time per transaction. In addition, to compare the efficiency of storage structures between them, their maximum memory usage is also evaluated. Lastly, we show how stably the two algorithms conduct their mining works with respect to the databases that feature gradually increasing items. With respect to the evaluation results of mining time and transaction processing, hMiner has higher speed than that of Lossy counting. Since hMiner stores candidate frequent patterns in a hash method, it can directly access candidate frequent patterns. Meanwhile, Lossy counting stores them in a lattice manner; thus, it has to search for multiple nodes in order to access the candidate frequent patterns. On the other hand, hMiner shows worse performance than that of Lossy counting in terms of maximum memory usage. hMiner should have all of the information for candidate frequent patterns to store them to hash's buckets, while Lossy counting stores them, reducing their information by using the lattice method. Since the storage of Lossy counting can share items concurrently included in multiple patterns, its memory usage is more efficient than that of hMiner. However, hMiner presents better efficiency than that of Lossy counting with respect to scalability evaluation due to the following reasons. If the number of items is increased, shared items are decreased in contrast; thereby, Lossy counting's memory efficiency is weakened. Furthermore, if the number of transactions becomes higher, its pruning effect becomes worse. From the experimental results, we can determine that the landmark window-based frequent pattern mining algorithms are suitable for real-time systems although they require a significant amount of memory. Hence, we need to improve their data structures more efficiently in order to utilize them additionally in resource-constrained environments such as WSN(Wireless sensor network).

A Study on the Daesoon Cosmology of the Correlative Relation between Mugeuk and Taegeuk (무극과 태극 상관연동의 대순우주론 연구)

  • Kim, Yong-hwan
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.33
    • /
    • pp.31-62
    • /
    • 2019
  • The purpose of this article is to study on the Daesoon Cosmology of the Correlative Relation between Mugeuk and Taegeuk. Daesoon cosmology is a cosmology based on the juxtaposition between the Gucheon Sangje and the world. In this article, I would like to say that this theory in Daesoon Thought was developed in three stages: the phase of the Mugeuk Transcendence of Gucheon Sangje, the stage of the Taegeuk Immanence, and the phase of the Grand Opening of the Later World between Mugeuk and Taegeuk as a correlative gentle reign. First of all, the phase of the Mugeuk Transcendence of Gucheon Sangje has been revealed as a yin-yang relationship. The stage of the Taegeuk Immanence represents the togetherness of harmony and co-prosperity between yin and yang, and the phase of the Grand Opening of the Later World between Mukeuk and Taegeuk refers to the unshakable accomplishment of its character and energy. It will be said that this is due to the practical mechanism in the correct balance of yin-yang making a four stage cycle of birth, growth, harvest, and storage. In addition, the Daesoon stage of the settlement of yin and yang is revealed as a change in the growth of all things and the formation of the inner circle. The mental growth reveals the characteristics of everything in the world, each trying to shine at the height of their own respective life as they grow up energetically. The dominant culture of cerebral communion renders a soft and elegant mood and combines yin and yang to elevate the heavenly and earthly period through transcendental change into sympathetic understanding. The stage of the Grand Opening of the Later World between Mugeuk and Taegeuk is one of the earliest days of the lunar month and also the inner circle of Taegeuk. It is in line with Ken Wilbur's integrated model as a step to the true degrees to develop into a world with brightened degrees. It is a beautiful and peaceful scene where celestial maidens play music, the firewood burns, and the scholars command thunder and lightning playfully. Human beings achieve a state of happiness as a free beings who lives as gods upon the earth. This is the world of theGrand Opening of the Later World between Mugeuk and Taegeuk. Daesoon Thought was succeeded by Dojeon in 1958, when Dojeon emerged as the successor in the lineage of religious orthodoxy and was assigned the task of handling Dao in its entirety. In addition, Daesoon is a circle and represents freedom and commonly shared happiness among the populous. Cosmology in the Daesoon Thought will enable us to understand deep dimensions and the identity of members as individuals within an inner circle of correlation between transcendence and immanence. This present study tries to analyze the public effects philologically and also the mutual correlation by utilizing the truthfulness of literature and rational interpretation. The outlook for the future in Daesoon Thought also leads to the one-way communication of Daesoon as a circle.

Improvement of State Ownership of Excavated Cultural Heritage System and Establishment of Policy Direction (발굴매장문화재 국가귀속제도의 정책 개선방안 연구)

  • Kim, Jong soo
    • Korean Journal of Heritage: History & Science
    • /
    • v.49 no.1
    • /
    • pp.22-43
    • /
    • 2016
  • State Ownership of Excavated Cultural Heritage System was originated from the legislations concerning cultural objects during the Japanese colonial period (1910~1945) and was succeeded by the present Buried Cultural Properties Act enacted in 2011. Despite the importance of the system that completes the outcomes of excavations and determines the state-owned cultural properties, the foundation of national heritage, it has been limitedly regarded as administrative area and neglected by the academic scholars or policy researchers. Recently the traditional culture has drawn increasing domestic interest and awareness that the cultural heritage contributes to building cultural identity and vitalizing tourism has led to increasing the demand of a local government's role in management of the state-designated cultural heritage and even fighting for hegemony in securing the cultural objects between the central and local governments. Despite the continuing efforts for improving the selection process of cultural heritage and its management institution, establishment of an advanced objective system has been requested. This paper is intended to suggest the policy direction through demonstrating the problem and assignment caused in the process of implementing the Buried Cultural Properties Act and reviews the State Ownership of Excavated Cultural Heritage System from the legal point of view accordingly. First, I suggest improving the selection process of the state-owned cultural properties. Even though current law states that Administrator of Cultural Heritage Administration reviews the research reports and selects the possible candidates for the state-owned cultural properties almost all the cultural objects listed on the reports are practically selected. In this regard, two possible resolutions can be made; newly establishing a separate process for selecting the state-owned cultural properties after publishing the report or adding the selection process of the state-owned cultural properties during the heritage selection meeting. Either way should contribute to strengthening the impartiality and objectivity of the policy. My second suggestion is improving the operating system of the heritage selection meeting in which the cultural properties to be listed on the reports are determined. Given the present extensive assessment criteria, there is much room for certain experts' subjective opinions. Therefore, in order to enhance the fairness and credibility of the heritage selection meeting, specifying the assessment criteria and advance review of the expert list are necessary. Third, this paper suggests increasing the local government's role in management of the state-owned cultural heritage and diversifying the heritage management institution. Development of a local self-governing system has led to the increased demand for delegating the authority of the state-owned heritage management to the local governments. Along with this, the gradual improvements of public museum management raises the need for expanding the cultural benefits through increasing the local government's role in management of the state-owned heritage. Considering the fact that overall majority of the art collections housed at national or public museums is owned by the central government, developing a variety of heritage contents and vitalizing the heritage tourism are crucial. The true meaning and value of the state-owned cultural heritage hidden at the storage of a museum can be found when they are shared together with the public.