• Title/Summary/Keyword: 범용

Search Result 2,873, Processing Time 0.033 seconds

Deterministic Parallelism for Symbolic Execution Programs based on a Name-Freshness Monad Library

  • Ahn, Ki Yung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • In this paper, we extend a generic library framework based on the state monad to exploit deterministic parallelism in a purely functional language Haskell and provide benchmarks for the extended features on a multicore machine. Although purely functional programs are known to be well-suited to exploit parallelism, unintended squential data dependencies could prohibit effective parallelism. Symbolic execution programs usually implement fresh name generation in order to prevent confusion between variables in different scope with the same name. Such implementations are often based on squential state management, working against parallelism. We provide reusable primitives to help developing parallel symbolic execution programs with unbound-genercis, a generic name-binding library for Haskell, avoiding sequential dependencies in fresh name generation. Our parallel extension does not modify the internal implementation of the unbound-generics library, having zero possibility of degrading existing serial implementations of symbolic execution based on unbound-genecrics. Therefore, our extension can be applied only to the parts of source code that need parallel speedup.

Design and Implementation of Machine Learning-based Blockchain DApp System (머신러닝 기반 블록체인 DApp 시스템 설계 및 구현)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, we developed a web-based DApp system based on a private blockchain by applying machine learning techniques to automatically identify Android malicious apps that are continuously increasing rapidly. The optimal machine learning model that provides 96.2587% accuracy for Android malicious app identification was selected to the authorized experimental data, and automatic identification results for Android malicious apps were recorded/managed in the Hyperledger Fabric blockchain system. In addition, a web-based DApp system was developed so that users who have been granted the proper authority can use the blockchain system. Therefore, it is possible to further improve the security in the Android mobile app usage environment through the development of the machine learning-based Android malicious app identification block chain DApp system presented. In the future, it is expected to be able to develop enhanced security services that combine machine learning and blockchain for general-purpose data.

Analysis of Rockfall Behavior about Slope Ditch (비탈면 Ditch에 대한 낙석의 거동 해석)

  • Lee, Jundae;Bae, Wooseok
    • Journal of the Korean GEO-environmental Society
    • /
    • v.23 no.2
    • /
    • pp.37-47
    • /
    • 2022
  • Recently, with the establishment of active stabilization measures, large-scale collapse of slopes is decreasing. However, the frequency of rockfalls due to the destabilization of floating stones or boulder within or above the slope has not been decreased significantly. As a measure for stabilizing rockfall and disaster prevention, protection methods such as rockfall barriers and rockfall protection nets are typically applied. However, the approach to catching the rockfall in a catchment area by reducing the energy of the rockfall and changing the rolling condition of the rockfall is relatively insignificant. Therefore, in this study, using a general-purpose rockfall simulation program, the change in the rolling characteristics of rockfall according to the specifications of the ditch installed under the slope was investigated. It is expected that the research results can be used as basic data to determine the specifications of the ditch that can be applied to general roads or trails.

Comparison and analysis of compression algorithms to improve transmission efficiency of manufacturing data (제조 현장 데이터 전송효율 향상을 위한 압축 알고리즘 비교 및 분석)

  • Lee, Min Jeong;Oh, Sung Bhin;Kim, Jin Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.94-103
    • /
    • 2022
  • As a large amount of data generated by sensors or devices at the manufacturing site is transmitted to the server or client, problems arise in network processing time delay and storage resource cost increase. To solve this problem, considering the manufacturing site, where real-time responsiveness and non-disruptive processes are essential, QRC (Quotient Remainder Compression) and BL_beta compression algorithms that enable real-time and lossless compression were applied to actual manufacturing site sensor data for the first time. As a result of the experiment, BL_beta had a higher compression rate than QRC. As a result of experimenting with the same data by slightly adjusting the data size of QRC, the compression rate of the QRC algorithm with the adjusted data size was 35.48% and 20.3% higher than the existing QRC and BL_beta compression algorithms.

Experimental, Theoretical and Numerical Studies for Concentrations and Velocities of Gas Jets (가스 제트 누출의 농도 및 속도에 대한 실험, 이론 및 수치해석 연구)

  • Bang, Boo-Hyoung;Kim, Hong-Min;Kim, Sung-Hoon;Lee, Keun-Won
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.1
    • /
    • pp.20-26
    • /
    • 2022
  • The results of experimental, theoretical, and numerical analysis were compared regarding the concentrations and velocities of flammable gas jets generated by pressurized leakage of methane gas. The concentration was measured through experiments for the jet dispersion process, and the velocities was calculated by applying the self-similarity theory. And the velocities and concentrations were calculated using CFD tools - FLACS and CFX- compared with the results. The difference between self-similarity model and CFD is due to the buoyancy term, which increases as the distance from a leak source increases. The results are compared with dimensionless parameters using the leak source radius and velocity components along the leak axis.

A Study on the Ship Ability Evaluation Criteria for Training-only ship through Ship Space Analysis (선박공간분석을 통한 실습전용선박의 선박능력 평가 기준에 관한 연구)

  • Park, Kitae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.1
    • /
    • pp.100-106
    • /
    • 2022
  • Ships are built according to the purpose and operated with individual goals. Operational goals are reflected in the design of the ships and become the main criterion for determining the required ship ability. In general, cargo ships and passenger ships are objectively evaluated in terms of the operation part of the ship and the capacity part of the cargo or passenger, centering on their transportation ability. In consideration of the required ship ability, the built ship can expect effects such as economic feasibility and eco-friendliness in addition to basic characteristics such as stability. Accordingly, the concept of ship ability is expected to be effectively used in the field of training-only ship management by each institution, which plays a pivotal role in training ship-officers. In this study, the basic direction was verified for the ship ability evaluation criteria of training-only ships through the analysis of the internal space of two training-only ships of the Korea Institute of Maritime and Fisheries Technology, which were recently built with a time lag. In the process of building training-only ship or general-purpose training ship, the possibility of using the ship ability standards in securing budget and designing was derived.

Evolution of OTT Service and Changes of Pay TV Industry (OTT 서비스 진화와 유료방송 생태계 변화)

  • Do, Joonho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.143-149
    • /
    • 2022
  • The diffusion of OTT service has brought the fundamental changes in the value chain of the existing media industry. OTT service based on the public Internet has increased the number of subscribers by using dominant marketing capability, making the pay TV platform player's ability to connecting users powerless. This study examined the changes in the media market and pay TV industry in the USA due to the diffusion of OTT service and analyzed the changing strategies of media firms. The number subscribers of the expensive pay TV service in the USA has diminished, experiencing cord cutting and cord shaving due the diffusion of OTT. OTT players are changing the media market, showing the dramatic excellence in making original contents and distributing the newly released movies. Examination of the recent merger and acquisition cases of media firms tells that the investment in making original contents has increased in order to have the competitiveness in OTT business. The future media industry will be rapidly reshaped mainly based OTT service and strategic judgement is important to maintain the competitiveness of all media firms in the existing value chain of media industry.

Design and implementation of blockchain-based anti-theft protocol in Lora environment (Lora 환경에서 블록체인 기반 도난방지 프로토콜 설계 및 구현)

  • Park, Jung-oh
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.1-8
    • /
    • 2022
  • With the development of communication infrastructure, the number of network equipment owned by one person is gradually increasing. General-purpose devices such as smartphones can implement theft/loss prevention function by implementing S/W. However, other small devices lack practicality such as long-distance communication problems due to standard communication technology specifications or H/W limitations, and lack of functions(authentication and security). This study combines the Lora communication protocol in the LPWA standard environment and the blockchain technology. Anti-theft and security functions were added to the protocol, and the PBFT consensus algorithm was applied to build a blockchain network. As a result of the test, the effectiveness of safety(authentication and trust network) and performance(blockchain processing performance) were confirmed. This study aims to contribute to the future development of portable or small device anti-theft products as a 4th industrial convergence research.

A Study on the Characteristics Analysis of LLC AC to DC High Frequency Resonant Converter capable of ZVZCS (ZVZCS가 가능한 LLC AC to DC 고주파 공진 컨버터의 특성 해석에 관한 연구)

  • Kim, Jong-Hae
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.741-749
    • /
    • 2021
  • This paper presents the current-fed type LLC AC to DC high frequency resonant converter capable of ZVZCS(Zero-Voltage and Zero-Current Switching). The current-fed type LLC AC to DC high frequency resonant converter proposed in this paper could operate not only in ZVS(Zero-Voltage Switching) operation by connecting the resonant capacitors(C1, C2) in parallel across the switching devices but also in ZCS(Zero-Current Switching) operation of the secondary diode. The ZVS and ZCS operations can reduce the turn-on loss of the switching devices and the turn-off loss of the secondary diodes, respectively. The circuit analysis of current-fed type LLC AC to DC high frequency resonant converter proposed in this paper is addressed generally by adopting the normalized parameters. The operating characteristics of proposed LLC AC to DC high frequency resonant converter were also evaluated by using the normalized control parameters such as the normalized control frequency(μ), the normalized load resistor(λ) and so on. Based on the characteristic values through the characteristics of evaluation, an example of the design method of proposed LLC AC to DC high frequency resonant converter is suggested, and the validity of the theoretical analysis is confirmed using the experimental results and PSIM simulation.

A Review on the Screw Configuration of Intermeshing Co-rotating Twin Screw Extruder (교합형 동방향 이축압출기의 스크류 조합에 대한 고찰)

  • Lee, Shichoon;Kim, Hyungsu
    • Korean Chemical Engineering Research
    • /
    • v.59 no.3
    • /
    • pp.305-315
    • /
    • 2021
  • An intermeshing corotating twin screw extruder is mainly used for compounding polymeric materials. Twin screw extruder can adopt modular-type screw configurations, which directly controls the quality and productivity of the products. The types, shapes, and specifications of the screw and kneading elements are summarized, and the effects of screw configuration on the processabiliy of the materials are discussed. The principles of screw configuration universally applied to mass production of general-purpose resins are explained, and the guidelines of screw combination according to the roles of feeding, melt mixing, and metering zones are listed. The strategies of screw combination suitable for various cases, such as side feeding of liquid additives or inorganic fillers, reactive extrusion, devolatilization process, production of products requiring bright color and transparency, and processing of materials with low apparent specific gravity, are presented.