• Title/Summary/Keyword: Backup system

Search Result 314, Processing Time 0.027 seconds

A Study on the International Competitiveness and Problems in Busan Shoe Industry (부산 신발산업의 국제경쟁력과 과제에 대한 연구)

  • Park Heung-Ju;Bin Bong-Sik;Song Kyung-Soo
    • Management & Information Systems Review
    • /
    • v.7
    • /
    • pp.317-340
    • /
    • 2001
  • The Busan shoe industry has been the accelerating overseas transfer of production facilities due to loss of competitiveness in the wake of drastic revaluation of the won, an increase in personnel expenses and the rise of backup developing countries since the late 1980s. On account of changes in the general system of supply and demand caused by a decrease in exports and production, the Industrial structure has been subjected to a transition from export to domestic demand. As a result, the Busan shoe industry, which used to rank second in the world in terms of its shoe export and to account for 16.5% in terms of its market share, started to be regarded as a fast-fading industry. As a domestic companies have a tendency to almost all the tasks on bloc, it is true that their competitiveness is on the rapid decline for they prefer self-reliance on the premise that all the production should be dealt with for themselves. It is outsourcing that is taken into account as a strategic vehicle for converting such self-reliance into the system of low expenditure and high efficiency.

  • PDF

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

A Simple Power Management Scheme with Enhanced Stability for a Solar PV/Wind/Fuel Cell Fed Standalone Hybrid Power Supply using Embedded and Neural Network Controller

  • Thangavel, S.;Saravanan, S.
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.5
    • /
    • pp.1454-1470
    • /
    • 2014
  • This paper propose a new power conditioner topology with intelligent power management controller that integrates multiple renewable energy sources such as solar energy, wind energy and fuel cell energy with battery backup to make best use of their operating characteristics and obtain better reliability than that could be obtained by single renewable energy based power supply. The proposed embedded controller is programmed for maintaining a constant voltage at PCC, maximum power point tracking for solar PV panel and WTG and power flow control by regulating the reference currents of the controller on instantaneous basis based on the power delivered by the sources and load demand. Instantaneous variation in reference currents of the controller enhances the controller response as it accommodates the effect of continuously varying solar insolation and wind speed in the power management. The power conditioner uses a battery bank with embedded controller based online SOC estimation and battery charging system to suitably sink or source the input power based on the load demand. The simulation results of the proposed power management system for a standalone solar/WTG/fuel cell fed hybrid power supply with real time solar radiation and wind velocity data collected from solar centre, KEC for a sporadically varying load demand is presented in this paper and the results are encouraging in reliability and stability perspective.

Fault Tolerant Operation of CHB Multilevel Inverters Based on the SVM Technique Using an Auxiliary Unit

  • Kumar, B. Hemanth;Lokhande, Makarand M.;Karasani, Raghavendra Reddy;Borghate, Vijay B.
    • Journal of Power Electronics
    • /
    • v.18 no.1
    • /
    • pp.56-69
    • /
    • 2018
  • In this paper, an improved Space Vector Modulation (SVM) based fault tolerant operation on a nine-level Cascaded H-Bridge (CHB) inverter with an additional backup circuit is proposed. Any type of fault in a power converter may result in a power interruption and productivity loss. Three different faults on H-bridge modules in all three phases based on the SVM approach are investigated with diagrams. Any fault in an inverter phase creates an unbalanced output voltage, which can lead to instability in the system. An additional auxiliary unit is connected in series to the three phase cascaded H-bridge circuit. With the help of this and the redundant switching states in SVM, the CHB inverter produces a balanced output with low harmonic distortion. This ensures high DC bus utilization under numerous fault conditions in three phases, which improves the system reliability. Simulation results are presented on three phase nine-level inverter with the automatic fault detection algorithm in the MATLAB/SIMULINK software tool, and experimental results are presented with DSP on five-level inverter to validate the practicality of the proposed SVM fault tolerance strategy on a CHB inverter with an auxiliary circuit.

Dynamic Prime Chunking Algorithm for Data Deduplication in Cloud Storage

  • Ellappan, Manogar;Abirami, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1342-1359
    • /
    • 2021
  • The data deduplication technique identifies the duplicates and minimizes the redundant storage data in the backup server. The chunk level deduplication plays a significant role in detecting the appropriate chunk boundaries, which solves the challenges such as minimum throughput and maximum chunk size variance in the data stream. To provide the solution, we propose a new chunking algorithm called Dynamic Prime Chunking (DPC). The main goal of DPC is to dynamically change the window size within the prime value based on the minimum and maximum chunk size. According to the result, DPC provides high throughput and avoid significant chunk variance in the deduplication system. The implementation and experimental evaluation have been performed on the multimedia and operating system datasets. DPC has been compared with existing algorithms such as Rabin, TTTD, MAXP, and AE. Chunk Count, Chunking time, throughput, processing time, Bytes Saved per Second (BSPS) and Deduplication Elimination Ratio (DER) are the performance metrics analyzed in our work. Based on the analysis of the results, it is found that throughput and BSPS have improved. Firstly, DPC quantitatively improves throughput performance by more than 21% than AE. Secondly, BSPS increases a maximum of 11% than the existing AE algorithm. Due to the above reason, our algorithm minimizes the total processing time and achieves higher deduplication efficiency compared with the existing Content Defined Chunking (CDC) algorithms.

The Development and Performance Analysis of Compact Type Solar Thermal/Ground Coupled Heat Pump Hybrid System for Heating, Cooling and Hot water (콤팩트형 태양열/지열히트펌프 하이브리드 냉난방 및 급탕 시스템 개발 및 성능분석)

  • Baek, Nam-Choon;Jeong, Seon-Yeong;Yoon, Eung-Sang;Lee, Kyoung-Ho
    • Journal of the Korean Solar Energy Society
    • /
    • v.32 no.5
    • /
    • pp.59-67
    • /
    • 2012
  • In this study,the compact type solar thermal and ground coupled heat pump hybrid system for space heating/cooling and hot water supply has been developed. This hybrid system was installed in Zero Energy Solar House(ZeSH) in KIER for the demonstration. The thermal performance and operational characteristics of this hybrid system were analysed especially. The results are as follows. (1) This hybrid system was designed in order to address the existing disadvantages of solar thermal/ground coupled heat pump system. For this design, all parts except solar collector and ground coupled heat pump were integrated into a single product in a factory. The compact type unit includes two buffer tanks, an expansion tank, pumps, valves, a controller, etc. This system has an advantage of easy installation with simple plumbing work even in narrow space. (2) The thermal charging and discharging time of the buffer tanks and its characteristics by ground coupled heat pump, and heat pump COP according to geo-source temperature and buffer storage temperature have been studied. This system was found to meet well to the heat load without any other auxiliary heating equipment. (3) The operating hours of the ground coupled heat pump as a backup device of solar thermal can be reduced significantly by using solar heat. It was also found that the minimum heating water supply setting temperature and maximum cooling water supply setting temperature make an influence on the heat pump COP. The lower heating water and the higher cooling water temperature, the higher COP. In this respect, the hybrid system's performance can be improved in ZeSH than conventional house.

Implement of High Available Replicate Systems Based on Cloud Computing (클라우드 컴퓨팅 기반의 고가용성 복제시스템의 구현)

  • Park, Sung-Won;Lee, Moon-Goo;Lee, Nam-Yong
    • 전자공학회논문지 IE
    • /
    • v.48 no.4
    • /
    • pp.61-68
    • /
    • 2011
  • As business management has a high level of dependence on Informational Technology (IT), protecting assets of a company from disaster is one of the most important thing that IT operating managers should consider. Because data or information is a major source of operation of the company, data security is the first priority as an aspect of continuity of business management. Therefore, this paper will realize disaster recovery system, which is suspended because of disaster, based on cloud computing system. Realized High Available Replicate System applied a method of multi thread target database to improve Replicate performance, and real time synchronize technology can improve efficiency of network. From Active to Active operation, it maximizes use of backup system, and it has a effect to disperse load of source database system. Also, High Available Replicate System realized consistency verification mechanism and monitoring technique. For Performance evaluation, High Available Replicate System used multi thread method, which shows more than threefold of replicate performance than single thread method.

A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism (자가치유 메커니즘을 활용한 침입감내시스템의 취약성 분석)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.333-340
    • /
    • 2005
  • One of the most important core technologies required for the design of the ITS (Intrusion Tolerance System) that performs continuously minimal essential services even when the network-based computer system is partially compromised because of the external or internal intrusions is the quantitative dependability analysis of the ITS. In this paper, we applied self-healing mechanism, the core technology of autonomic computing to secure the protection power of the ITS. We analyzed a state transition diagram of the ITS composed of a Primary server and a backup server utilizing two factors of self-healing mechanism (fault model and system response) and calculated the availability of ITS through simulation experiments and also performed studies on two cases of vulnerability attack.

Development of Process Control Graphic System for Power Plant Using Multiple Microcomputers (다중 마이크로 컴퓨터를 이용한 발전소 공정제어 그래픽 시스템의 개발)

  • ;;;Zeungnam Bien
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.38 no.3
    • /
    • pp.217-227
    • /
    • 1989
  • A process control graphic system is proposed as an efficient tool for monitoring the operation of power plant. It uses the multi-processor structure with 60 Kbyte shared memory as an implemental type of the distributed computer system, so that it is flexible, functionally extensible, and applicable to real-time process. The shared memory is used as a real-time database handling the process values and operator's commands. The database files, generated by the user-interactive graphic editor developed for the system or text editor, have the characteristics of simplicity and user-friendliness. The process control graphic system, that can monitor the operation of boiler and function as a backup controller in case of failure in boiler controller, is applied to Ulsan power plant. As a result, it displays the operating data of the boiler process without error by 14 pages of color graphic image according to the operation menu, and additionally functions well as a fault-tolerant control system.

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.