• Title/Summary/Keyword: 무부하

Search Result 372, Processing Time 0.031 seconds

Data Sharing Technique between Heterogeneous based on Cloud Service (클라우드 서비스 기반 이기종간의 데이터 공유 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.391-398
    • /
    • 2018
  • There are many problems caused by data sharing between general heterogeneous digital devices due to various interfaces. To solve this problem, this paper proposes heterogeneous data sharing with cloud service and mobile through D2D communication that supports communication between different devices. The proposed technique is used to reduce the load on the server to perform data synchronization. Also, in order to minimize data latency caused by data replication between different devices, a technique to enhance the speed of data writing with copying only the modified parts in the chunk list is adopted and cloud service model integrated with mobile environment is realized in order to minimize the network bandwidth consumed for synchronization for data sharing. Therefore, it is possible to share data in different spaces efficiently with maintaining data integrity and minimizing latency in data.

System Integrity Monitoring System using Kernel-based Virtual Machine (커널 기반 가상머신을 이용한 시스템 무결성 모니터링 시스템)

  • Nam, Hyun-Woo;Park, Neung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.157-166
    • /
    • 2011
  • The virtualization layer is executed in higher authority layer than kernel layer and suitable for monitoring operating systems. However, existing virtualization monitoring systems provide simple information about the usage rate of CPU or memory. In this paper, the monitoring system using full virtualization technique is proposed, which can monitor virtual machine's dynamic kernel object as memory, register, GDT, IDT and system call table. To verify the monitoring system, the proposed system was implemented based on KVM(Kernel-based Virtual Machine) with full virtualization that is directly applied to linux kernel without any modification. The proposed system consists of KvmAccess module to access KVM's internal object and API to provide other external modules with monitoring result. In experiments, the CPU utilization for monitoring operations in the proposed monitering system is 0.35% when the system is monitored with 1-second period. The proposed monitoring system has a little performance degradation.

A Analysis of Heavy Tailed Distribution for Files in Web Servers Using TTT Plot Technique (TTT 타점법을 이용한 웹서버 파일 분포의 후미성 분석)

  • Jung, Sung-Moo;Lee, Sang-Yong;Jang, Joong-Soon;Song, Jae-Shin;Yoo, Hae-Young;Choi, Kyung-Hee
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.189-198
    • /
    • 2003
  • In this paper, we propose a method of analysis to show the heavy-tailed statistical distribution of file sizes in web servers, using TTT plot technique. TTT plot technique, a well-known method in the area of reliability engineering, determines that a distribution of samples fellows a heavy tailed one when their TTT statistical plots are lied on a straight line. We performed an intensive simulation using data gathered from real web servers. The simulation indicates that the proposed method is superior to Hill estimation technique or LLCD plot method in efficiency of data analysis. Moreover, the proposed method eliminates the possible decision error, which Pareto distribution or traditional method might cause.

Determination of Parameters of Equivalent Circuit Taking No-Load Losses Into Account for Single-Phase Induction Motors (단상 유도전동기의 무부하손실을 고려한 등가회로 정수의 결정)

  • Jwa, Chong-Keun;Kim, Do-Jin
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.59 no.4
    • /
    • pp.358-363
    • /
    • 2010
  • This paper proposes a step-by-step method of determining the parameters of equivalent circuit which is considered the no load losses for the single phase induction motor which has the starting winding. This method is comprised of three steps, and the stator resistance which is measured by the method of voltage drop is treated as constant and the stator and the rotor leakage reactances are assumed to be the same in every step. The test results of no load and locked rotor test are used in the 1st and 2nd step, and the ratings of name plate of the motor are needed in the 3rd step. In the 1st step, the traditional equivalent circuit parameters are directly calculated by no load and locked rotor conditions. In the next step, five nonlinear simultaneous equations for five unknown parameters can be set up by no load and locked rotor equivalent circuits. These equations are solved by using the initial parameters obtained by the 1st step parameters. In the final step, three nonlinear simultaneous equations for rotor winding resistance, leakage reactance and no load losses component resistance can be set up by equivalent circuit under the rated operation. Three parameters are solved by using the 2nd step parameters. Thus, equivalent circuit parameters are gradually refined step by step. The validity of the proposed method is evaluated by comparing the computed values obtained by the equivalent circuit parameters with the experimental values of the load test.

Formulation of Calculation Method for Inducing Current by Aerial Power Distribution Line (가공 배전선에 의한 전자유도 발생 전류 계산 방법)

  • Lee, Sangmu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.30-36
    • /
    • 2015
  • The formulation of calculation method for electromagnetic inducing current by aerial power distribution line is established. Nearby telecommunication cables can be induced due to the leakage of neutral current because the neutral line of power distribution is grounded at every 50 m distance. By the existing calculation method, the neutral line is regarded as a shielding conductor and the neutral current roles as an inducing current. So the error range to real measurement value is largely extended because the changing effect of leakage current flowing in the ground is not reflected. The leakage current returns to the power substation through the ground and is cumulated as being closer to the substation. When this practical inducing mechanism is applied, the deviation rate of calculation can be drastically reduced within about 100 % range compared to 1000 % of the exsiting method.

Architecture for Secure Mobile Agent through STAS System (STAS 시스템을 적용한 안전한 이동 에이전트구조)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1873-1879
    • /
    • 2007
  • As the mobile terminal which uses P2P service increases and it comes to be applied to many fields, mobile agent technology has been applied to P2P and its innovative services has been offered to various fields. However, free mobility of mobile agent technology works like worm, the problem which is contaminated by malicious attacker's attack quickly has appeared and fundamental solution has not been developed yet. This paper proposes STAS (Security Tracking and Auditing Server) system which can offer verification for security of mobile agent in structured P2P environments. Mobile Agent will send data value to STAS via peer so that STAS can verify secure audit and integrity and Mobile agent initiator will obtain the final value of the data from STAS. It can minimize overload of mobile terminal which is occurred by verification of mobile agent and its accomplishment.

A Sextant Cluster Based Monitoring on Secure Data Aggregation and Filtering False Data in Wireless Sensor Networks (무선센서 네트워크에서의 육분원 방식 모니터링 기반 안전한 데이터 병합 및 위조 데이터 필터링)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2012
  • Local monitoring is an effective technique in securing data of wireless sensor networks. Existing solutions require high communication cost for detecting false data and this results in a network lifetime being shortened. This paper proposes novel techniques of monitoring based secure data aggregation and filtering false data in wireless sensor networks. The aim is to reduce energy consumption in securing data aggregation. An aggregator and its monitoring node perform data aggregation in a 60o sextant cluster. By checking Message Authentication Codes (MAC), aggregation data will be dropped by a forward aggregator if data aggregated by the aggregator and data monitored by the monitoring node are inconsistent. The simulation shows that the proposed protocol can reduce the amount of average energy consumption about 64% when comparing with the Data Aggregation and Authentication protocol (DAA)[1]. Additionally, the network lifetime of the proposed protocol is 283% longer than that of DAA without any decline in data integrity.

Analysis of Water Quality and Aquatic Ecosystem Improvement Effect According to TMDL in Jinwi River Watershed (진위천수계의 오염총량관리에 따른 수질 및 수생태계 개선 효과 분석)

  • Im, Jihyeok;Kong, Dongsoo
    • Journal of Environmental Impact Assessment
    • /
    • v.30 no.6
    • /
    • pp.355-360
    • /
    • 2021
  • As the domestic water management policy shifted from concentration-oriented water management to load management-centered Total Maximum Daily Load (TMDL), water quality and aquatic ecosystems brought changed. However, it was difficult to determine whether the water quality and the health of the aquatic ecosystem improved after the implementation of the TMDL due to changes in pollutant sources and discharge fluctuations ect, so the effect was analyzed using a log-linear model and biological indicators (Benthic Macroinvertebrates). As a result, BOD and T-P concentrations in the Jinwi River Watershed were reduced by 30% and 35%, showed the effect of improving water quality, however the benthic macroinvertebrates index (BMI) downgraded from grade D to grade E. Therefore, efforts to cultivate ecologicalrivers are necessary to upgrade the health of the aquatic ecosystem in the river watershed.

A Study on Steady State Characteristics of LLC Resonant Half Bridge Converter Considering Internal Losses (내부 손실이 고려된 LLC 공진형 하프브릿지 컨버터의 정상상태 특성에 관한 연구)

  • Ahn, Tae-Young
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.985-991
    • /
    • 2018
  • In this paper, an equivalent circuit reflecting the internal loss of the LLC resonant half bridge converter was proposed and a steady state characteristic equation including the loss factors was derived. Using the results, the frequency characteristics of I/O voltage gain and input impedance were compared with the lossless model In order to verify the proposed model and the derived equation, the main components of the 1kW class LLC resonant half bridge converter were selected under the same conditions and the steady state characteristics such as voltage gain and input impedance were compared. In particular, to compare more closely the steady state error of the two models, we observed the change in switching frequency with respect to the load current, which is considered to be the most important in the actual circuit design stage. As a result, it is confirmed that the error of the operating frequency is significantly improved from the proposed model and the analysis result.

Response of the International Community to the Boko Haram Insurgency in Nigeria

  • Frimpong, Isaac Owusu
    • Korea and Global Affairs
    • /
    • v.3 no.1
    • /
    • pp.221-244
    • /
    • 2019
  • This paper attempts to analyze the role of Nigeria's current President Major (Rtd) Mahammudu Buhari and the immediate past President Goodluck Jonathan in dealing with the Boko Haram Insurgency in Nigeria. Nigeria has not been without its fair share of conflict. In fact, no decade of post-Independent Nigeria has been conflict free. With several coups, general strikes and a civil war, Nigerians have had to experience some of the most sordid tragedies arising from difference of opinions and distrust. It is interesting to mention that the conflict in Nigeria has not received the needed attention as it were. The leadership of Goodluck Jonathan did not receive the same effort and cooperation as compared to Muhammadu Buhari who came into office in May 2015. This paper argues the important roles played by the two Nigerian leaders which either aided or prevented collaboration. Goodluck Jonathan was perceived as a weak and indecisive leader whose leadership failed to effectively handle the Boko Haram insurgency. Muhammadu Buhari assumed office with a lot of high hopes and expectations from the Nigerian population and the international community to tackle the Boko Haram insurgency.