• Title/Summary/Keyword: architecture framework

Search Result 1,297, Processing Time 0.027 seconds

Solution Dynamics and Crystal Structure of $CpMoOs_{3}(CO)_{10}(\mu-H)_{2}[\mu_{3}-\eta^{2}-C(O)CH_{2}Tol]$

  • Joon T. Park;Jeong-Ju Cho;Kang-Moon Chun;Sock-Sung Yun;Kim SangSoo
    • Bulletin of the Korean Chemical Society
    • /
    • v.14 no.1
    • /
    • pp.137-143
    • /
    • 1993
  • The tetranuclear heterometallic complex CpMo$Os_3(CO)_{10}({\mu]-H)2[{\mu}3-{\eta}^2-C(O)CH_2Tol]\;(1,\;Cp={\eta}^5-C_5H_5,\;Tol=p-C_6H_4Me)$ has been examined by variable-temperature $^{13}$C-NMR spectroscopy and by a full three-dimensional X-ray structual analysis. Complex 1 crystallizes in the orthorhombic space group Pna2$_1$ with a = 12.960(1) ${\AA}$, b = 11.255(l) ${\AA}$, c = 38.569(10)${\AA}$, V = 5626(2) ${\AA}^3$ and ${\rho}$(calcd) = 2.71 gcm$^{-3}$ for Z = 8 and molecular weight 1146.9. Diffraction data were collectedon a CAD4 diffractometer, and the structure was refined to $R_F$ = 9.7% and $R_{W^F}$ = 9.9% for 2530 data (MoK${\alpha}$ radiation). There are two essentially equivalent molecules in the crystallographic asymmetric unit. The tetranuclear molecule contains a triangulated rhomboidal arrangement of metal atoms with Os(2) and Mo at the two bridgehead positions. The metal framework is planar; the dihedral angle between Os(l)-Os(2)-Mo and Os(3)-Os(2)-Mo planes is 180$^{\circ}$. A triply bridging (${\mu}_3,\;{\eta}^2$) acyl ligand lies above the Os(l)-Os(2)-Mo plane; the oxygen atom spans the two bridgehead positions, while the carbon atom spans one bridgehead position and an acute apical position. The molecular architecture is completed by an ${\eta}^5$-cyclopentadienyl ligand and a semi-triply bridging carbonyl ligand on the molybdenum atom, and nine terminal carbonyl ligands-four on Os(3), three on Os(l), and two on Os(2). The two hydride ligands are inferred to occupy the Os(l)-Os(2) and Mo-Os(3) edges from structural and NMR data.

Design and Implementation of a Multi-level Simulation Environment for WSN: Interoperation between an FPGA-based Sensor Node and a NS3 (FPGA 기반 센서 노드와 NS3 연동을 통한 다층 무선 센서 네트워크 모의 환경 설계 및 구현)

  • Seok, Moon Gi;Kim, Tag Gon;Park, Daejin
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.43-52
    • /
    • 2016
  • Wireless sensor network (WSN) technology has been implemented using commercial off-the-shelf microcontrollers (MCUs), In this paper, we propose a simulation environment to realize the physical evaluation of FPGA-based node by considering vertically cross-layered WSN in terms of physical node device and network interconnection perspective. The proposed simulation framework emulates the physical FPGA-based sensor nodes to interoperate with the NS3 through the runtime infrastructure (RTI). For the emulation and interoperation of FPGA-based nodes, we extend a vendor-providing FPGA design tool from the host computer and a script to execute the interoperation procedures. The standalone NS-3 is also revised to perform interoperation through the RTI. To resolve the different time-advance mechanisms between the FPGA emulation and event-driven NS3 simulation, the pre-simulation technique is applied to the proposed environment. The proposed environment is applied to IEEE 802.15.4-based low-rate, wireless personal area network communication.

Tourism Potential of the Regions in the Conditions of European Integration

  • Tkach, Viktoriia;Rogovyi, Andrii;Zelenska, Olena;Gonta, Olena;Aleshugina, Nataliya;Tochylina, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.356-364
    • /
    • 2021
  • In the formation of a socially oriented economy in the context of European integration, the development of tourism is one of the priority areas that positively affects the socio-economic situation of the country as a whole and its regions in particular, stimulates important economic activities and strengthens Ukraine's positive image in Europe and the world. In view of this, in the framework of a thorough study of the tourism industry it is necessary to assess its potential. This study proposes an assessment of tourism potential in the regional context, which consists of consistent implementation of six steps, namely: first, the definition of research objects for which the tourism potential is determined; secondly, the formation of a set of basic features for assessing tourism potential of certain objects; thirdly, the collection of information on individual indicators, which are selected to assess the tourism potential of the objects; fourth, the calculation of parametric indices by comparing the indicators of each individual object of study (region) with the average values in the set of objects under study; fifth, the definition of a generalized index of tourism potential of the region; sixth, grouping regions by the values of the generalized index of tourism potential. Execution of the stated algorithm involves the use of various methods, in particular, statistical, graphical, parametric, the analysis of hierarchies, matrix and cartographic. Approbation of the proposed assessment of tourism potential at the regional level in Ukraine allowed to group regions according to the values of the generalized index of tourism potential, which can be used as a basis for developing measures to increase and enhance their tourism potential in Ukraine in terms of European integration.

An Approach of Solving the Constrained Dynamic Programming - an Application to the Long-Term Car Rental Financing Problem

  • Park, Tae Joon;Kim, Hak-Jin;Kim, Jinhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.29-43
    • /
    • 2021
  • In this paper, a new approach to solve the constrained dynamic programming is proposed by using the constraint programming. While the conventional dynamic programming scheme has the state space augmented with states on constraints, this approach, without state augmentation, represents states of constraints as domains in a contraining programming solver. It has a hybrid computational mechanism in its computation by combining solving the Bellman equation in the dynamic programming framework and exploiting the propagation and inference methods of the constraint programming. In order to portray the differences of the two approaches, this paper solves a simple version of the long-term car rental financing problem. In the conventional scheme, data structures for state on constraints are designed, and a simple inference borrowed from the constraint programming is used to the reduction of violation of constraints because no inference risks failure of a solution. In the hybrid approach, the architecture of interface of the dynamic programming solution method and the constraint programming solution method is shown. It finally discusses the advantages of the proposed method with the conventional method.

Analysis of Tensor Processing Unit and Simulation Using Python (텐서 처리부의 분석 및 파이썬을 이용한 모의실행)

  • Lee, Jongbok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.165-171
    • /
    • 2019
  • The study of the computer architecture has shown that major improvements in price-to-energy performance stems from domain-specific hardware development. This paper analyzes the tensor processing unit (TPU) ASIC which can accelerate the reasoning of the artificial neural network (NN). The core device of the TPU is a MAC matrix multiplier capable of high-speed operation and software-managed on-chip memory. The execution model of the TPU can meet the reaction time requirements of the artificial neural network better than the existing CPU and the GPU execution models, with the small area and the low power consumption even though it has many MAC and large memory. Utilizing the TPU for the tensor flow benchmark framework, it can achieve higher performance and better power efficiency than the CPU or CPU. In this paper, we analyze TPU, simulate the Python modeled OpenTPU, and synthesize the matrix multiplication unit, which is the key hardware.

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

  • Tefera, Mulugeta K.;Yang, Xiaolong;Sun, Qifu Tyler
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3199-3218
    • /
    • 2019
  • Location-based services (LBSs) have become popular in recent years due to the ever-increasing usage of smart mobile devices and mobile applications through networks. Although LBS application provides great benefits to mobile users, it also raises a sever privacy concern of users due to the untrusted service providers. In the lack of privacy enhancing mechanisms, most applications of the LBS may discourage the user's acceptance of location services in general, and endanger the user's privacy in particular. Therefore, it is a great interest to discuss on the recent privacy-preserving mechanisms in LBSs. Many existing location-privacy protection-mechanisms (LPPMs) make great efforts to increase the attacker's uncertainty on the user's actual whereabouts by generating a multiple of fake-locations together with user's actual positions. In this survey, we present a study and analysis of existing LPPMs and the state-of-art privacy measures in service quality aware LBS applications. We first study the general architecture of privacy qualification system for LBSs by surveying the existing framework and outlining its main feature components. We then give an overview of the basic privacy requirements to be considered in the design and evaluation of LPPMs. Furthermore, we discuss the classification and countermeasure solutions of existing LPPMs for mitigating the current LBS privacy protection challenges. These classifications include anonymization, obfuscation, and an encryption-based technique, as well as the combination of them is called a hybrid mechanism. Finally, we discuss several open issues and research challenges based on the latest progresses for on-going LBS and location privacy research.

Genome sequence of Veillonella atypica KHUD-V1 isolated from a human subgingival dental plaque of periodontitis lesion (사람 치주염 병소의 치은 연하 치태에서 분리된 Veillonella atypica KHUD-V1의 유전체 염기서열 해독)

  • Lee, Jae-Hyung;Shin, Seung-Yun;Lee, Han;Yang, Seok Bin;Jang, Eun-Young;Ryu, Jae-In;Lee, Jin-Yong;Moon, Ji-Hoi
    • Korean Journal of Microbiology
    • /
    • v.55 no.1
    • /
    • pp.77-79
    • /
    • 2019
  • Here we report the genome sequence of Veillonella atypica strain KHUD-V1 isolated from subgingival dental plaque of Korean chronic periodontitis patients. Unlike other V. atypica strains, KHUD-V1 carries two prophage regions and prophage remnants, as well as several genes homologous to prophage-associated virulence factors, such as virulence-associated protein E, a Clp protease, and a toxin-antitoxin system. The isolate and its genome sequence obtained here will aid to understand the diversity of the genome architecture of Veillonella within an evolutionary framework and the role of prophages that contribute to the genetic diversity as well as the virulence of V. atypica.

Design of a Hospice Referral System for Terminally Ill Cancer Patients Using a Standards-Based Health Information Exchange System

  • Lim, Kahyun;Kim, Jeong-Whun;Yoo, Sooyoung;Heo, Eunyoung;Ji, Hyerim;Kang, Beodeul
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.317-326
    • /
    • 2018
  • Objectives: The demand for hospice has been increasing among patients with cancer. This study examined the current hospice referral scenario for terminally ill cancer patients and created a data form to collect hospice information and a modified health information exchange (HIE) form for a more efficient referral system for terminally ill cancer patients. Methods: Surveys were conducted asking detailed information such as medical instruments and patient admission policies of hospices, and interviews were held to examine the current referral flow and any additional requirements. A task force team was organized to analyze the results of the interviews and surveys. Results: Six hospices completed the survey, and 3 physicians, 2 nurses, and 2 hospital staff from a tertiary hospital were interviewed. Seven categories were defined as essential for establishing hospice data. Ten categories and 40 data items were newly suggested for the existing HIE document form. An implementation guide for the Consolidated Clinical Document Architecture developed by Health Level 7 (HL7 CCDA) was also proposed. It is an international standard for interoperability that provides a framework for the exchange, integration, sharing, and retrieval of electronic health information. Based on these changes, a hospice referral scenario for terminally ill cancer patients was designed. Conclusions: Our findings show potential improvements that can be made to the current hospice referral system for terminally ill cancer patients. To make the referral system useful in practice, governmental efforts and investments are needed.

A Study on the Master Plan of a Religious Community Complexes Applying the Types of the Urban Street Patterns. (도시가로패턴의 유형을 응용한 신앙공동체마을의 배치계획에 관한 연구)

  • Park, Chang Geun
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.7
    • /
    • pp.63-72
    • /
    • 2019
  • The purpose of this study is to apply the types of urban street pattern and the shape of streets to the master plan of a religious community complexes. The street pattern is a framework of urban structure and to understand the urban structure is helpful to understand the nature of urban streets. By analysing the precedent researches, the types of street patterns are classified as a serial pattern, a branching pattern, a grid pattern and a web pattern. The street patterns are hierarchically composed and classified as a differential development and sequential development. There are boundaries and gates where the street space is differentiated to the more private level. The urban streets continue to the architectural streets such as arcades, deck streets, corridors, lobbies and halls. The purposes and results of the master plan of this religious community complexes are as follows. 1) The school area, housing area and service area are properly separated and connected. They are separated by the building masses and connected by the street space in between. 2) The street pattern of this complexes is a serial pattern where the streets are the center of each functional building groups. The entry square is divided by the symbolic building. The one branch is school street and the other is living street. These streets are combined again to the festival street. 3) The architectural streets are organically related to the urban streets. 4) Each street spaces are of adequate form according to its properties as a place. 5) There are boundaries or gates such as a gab between buildings, posts, arches and deck streets according to the relationship between streets.

Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid

  • Prasanna Srinivasan, V;Balasubadra, K;Saravanan, K;Arjun, V.S;Malarkodi, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2168-2187
    • /
    • 2021
  • The smart grid replaces the traditional power structure with information inventiveness that contributes to a new physical structure. In such a field, malicious information injection can potentially lead to extreme results. Incorrect, FDI attacks will never be identified by typical residual techniques for false data identification. Most of the work on the detection of FDI attacks is based on the linearized power system model DC and does not detect attacks from the AC model. Also, the overwhelming majority of current FDIA recognition approaches focus on FDIA, whilst significant injection location data cannot be achieved. Building on the continuous developments in deep learning, we propose a Deep Learning based Locational Detection technique to continuously recognize the specific areas of FDIA. In the development area solver gap happiness is a False Data Detector (FDD) that incorporates a Convolutional Neural Network (CNN). The FDD is established enough to catch the fake information. As a multi-label classifier, the following CNN is utilized to evaluate the irregularity and cooccurrence dependency of power flow calculations due to the possible attacks. There are no earlier statistical assumptions in the architecture proposed, as they are "model-free." It is also "cost-accommodating" since it does not alter the current FDD framework and it is only several microseconds on a household computer during the identification procedure. We have shown that ANN-MLP, SVM-RBF, and CNN can conduct locational detection under different noise and attack circumstances through broad experience in IEEE 14, 30, 57, and 118 bus systems. Moreover, the multi-name classification method used successfully improves the precision of the present identification.