• Title/Summary/Keyword: Convergence technique

Search Result 2,405, Processing Time 0.031 seconds

A Technique for Recovering Logs in Real-time Transactions by using a LIFO Method (LIFO 방식을 이용한 실시간 트랜잭션 로그 회복 방안)

  • Park, Il Tae;Choi, Dong Yeul;Oh, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.51-57
    • /
    • 2003
  • The Real-time DBMS must provide the keeping, fabrication and control function which the data where the user requsets for processing inside the hour when it is restricted, it is quick most and safely[3]. In order lide this to take chare of the real-time control and fabrication function, details recording (log) of the control processing is very important in accomplished transactions from inside the Real-time DBMS. In this proposal, it sees recording which is like this in base and it proposes the new recovery function for transactions log. This recovery technique which it sees used the concept of the LIFO (Last-In-First-Out) method with basic. The proposed technique will becomes the technique which it will be able and to record to process efficiently with a same attribute and the continuous transactions log.

  • PDF

A Study on Caching Management Technique in Mobile Ad-hoc Network (Mobile Ad-hoc Network에서 캐싱 관리 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.91-96
    • /
    • 2012
  • MANET is developed technique fairly among many field of wireless network. Nodes which consist of MANET transmit data using multi-hop wireless connection. Caching scheme is technique which can improve data access capacity and availability of nodes. Previous studies were achieved about dynamic routing protocol to improve multi-hop connection of moving nodes. But management and maintenance of effective cache information because of movement of nodes is not easy. In this study, we proposed cluster-based caching scheme to manage connection by decreasing overhead and moving of nodes as moving node discovers cache of wish information. And HLP was used to maintain effective cache table in each cluster head. Efficiency of proposed technique in this study was confirmed by experiment.

Memory Injection Technique and Injected DLL Analysis Technique in Windows Environment (윈도우 환경에서의 메모리 인젝션 기술과 인젝션 된 DLL 분석 기술)

  • Hwang, Hyun-Uk;Chae, Jong-Ho;Yun, Young-Tae
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.59-67
    • /
    • 2006
  • Recently the Personal Computer hacking and game hacking for the purpose of gaining an economic profit is increased in Windows system. Malicious code often uses methods which inject dll or code into memory in target process for using covert channel for communicating among them, bypassing secure products like personal firewalls and obtaining sensitive information in system. This paper analyzes the technique for injecting and executing code into memory area in target process. In addition, this analyzes the PE format and IMPORT table for extracting injected dll in running process in affected system and describes a method for extracting and analyzing explicitly loaded dll files related with running process. This technique is useful for finding and analyzing infected processes in affected system.

  • PDF

Modeling and Performance Evaluation of AP Deployment Schemes for Indoor Location-Awareness (실내 환경에서 위치 인식율을 고려한 AP 배치 기법의 모델링 및 성능 평가)

  • Kim, Taehoon;Tak, Sungwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.847-856
    • /
    • 2013
  • This paper presents an AP placement technique considering indoor location-awareness and examines its performance. The proposed AP placement technique is addressed from three performance metrics: location-awareness and AP-based wireless network performance as well as its cost. The proposed AP placement technique consists of meta-heuristic algorithms that yield a near optimal AP configuration for given performance metrics, and deterministic algorithms that improve the fast convergence of the near optimal AP configuration. The performance of the AP placement technique presented in this paper is measured under the environments simulating indoor space, and numerical results obtained by experimental evaluation yield the fast convergence of a near-optimal solution to a given performance metric.

A DFT Based Filtering Technique to Eliminate Decaying dc and Harmonics for Power System Phasor Estimation

  • Oh Yong- Taek;Balamourougan V.;Sidhu T.S.
    • KIEE International Transactions on Power Engineering
    • /
    • v.5A no.2
    • /
    • pp.138-143
    • /
    • 2005
  • During faults, the voltage and current signals available to the relay are affected by the decaying dc component and harmonics. In order to make appropriate and accurate decisions, most of the relaying algorithms require the fundamental frequency phasor information that is immune to decaying dc effect and harmonics. The conventional Fourier ph as or estimation algorithm is affected by the presence of decaying-exponential transients in the fault signal. This paper presents a modified Fourier algorithm, which effectively eliminates the decaying dc component and the harmonics present in the fault signal. The decaying dc parameters are estimated by means of an out-of-band filtering technique. The decaying dc offset and harmonics are removed by means of a simple computational procedure that involves the design of two sets of Orthogonal digital OFT filters tuned at different frequencies and by creating three off-line look-up tables. The technique was tested for different decay rates of the decaying dc component. It was also compared with the conventional mimic plus the full cycle OFT algorithm. The results indicate that the proposed technique has a faster convergence to the desired value compared to the conventional mimic plus OFT algorithms over a wide range of decay rates. In all cases, the convergence to the desired value was achieved within one cycle of the power system frequency.

Traceback Technique using Table-based Route Management under Mobile Ad Hoc Network Environment (Mobile Ad Hoc Network에서 테이블 기반 경로 관리를 이용한 역추적 기법)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.19-24
    • /
    • 2013
  • MANET has a highly dynamic topology because it consists of only mobile nodes. Various attacks using these characteristics exist. Among them, damage of the attacks based flooding such as DoS or DDos is large and traceback of the attack node is not easy. It is because route information by moving of intermediate nodes which pass the data changes frequently. In this paper, we propose table-based traceback technique to perform efficient traceback although route information by moving of nodes changes frequently. Cluster head manages route management table in order to form cluster status table and network topology snapshot for storing the location information of mobile nodes when cluster member nodes change. Also, bloom filter is used to reduce the amount of storing route information. The performance of the proposed technique is confirmed through experiment.

Global sensitivity analysis improvement of rotor-bearing system based on the Genetic Based Latine Hypercube Sampling (GBLHS) method

  • Fatehi, Mohammad Reza;Ghanbarzadeh, Afshin;Moradi, Shapour;Hajnayeb, Ali
    • Structural Engineering and Mechanics
    • /
    • v.68 no.5
    • /
    • pp.549-561
    • /
    • 2018
  • Sobol method is applied as a powerful variance decomposition technique in the field of global sensitivity analysis (GSA). The paper is devoted to increase convergence speed of the extracted Sobol indices using a new proposed sampling technique called genetic based Latine hypercube sampling (GBLHS). This technique is indeed an improved version of restricted Latine hypercube sampling (LHS) and the optimization algorithm is inspired from genetic algorithm in a new approach. The new approach is based on the optimization of minimax value of LHS arrays using manipulation of array indices as chromosomes in genetic algorithm. The improved Sobol method is implemented to perform factor prioritization and fixing of an uncertain comprehensive high speed rotor-bearing system. The finite element method is employed for rotor-bearing modeling by considering Eshleman-Eubanks assumption and interaction of axial force on the rotor whirling behavior. The performance of the GBLHS technique are compared with the Monte Carlo Simulation (MCS), LHS and Optimized LHS (Minimax. criteria). Comparison of the GBLHS with other techniques demonstrates its capability for increasing convergence speed of the sensitivity indices and improving computational time of the GSA.

A Case Study of Back-analysis Technique in Tunnelling Using Extended Bayesian Method and Relative Convergence Measurement (확장 Baysian 방법과 상대변위를 이용한 터널 역해석 기법의 적용사례연구)

  • Lee In-Mo;Choi Min-Kwang;Cho Kook-Hwan;Lee Geun-Ha;Choi Chung-Sik
    • Journal of the Korean Geotechnical Society
    • /
    • v.21 no.3
    • /
    • pp.109-118
    • /
    • 2005
  • It is a very difficult task to estimate engineering properties of the ground when designing underground structures, especially in tunnelling. Therefore, a feed-back system to combine the data measured in construction field with priorly estimated information at the design stage is necessary. In this paper, 3-dimensional back-analysis in tunnelling, to which only relative convergence is applied as input values, is carried out to estimate the optimum geotechnical parameters. For this purpose, the Extended Bayesian Method (EBM), which appropriately combines the objective information with the subjective one, is applied to optimize engineering parameters and 3-dimensional numerical analysis is carried out to predict a trend of relative convergence occurrence. The data measured from two tunnelling sites are used to verify the applicability of the proposed back-analysis technique. from the results of analysis, the proposed back-analysis technique is verified.

Design of an Information System Prototype for Generating and Linking Ultra-precision Digital Maps of Construction Sites (건설 현장의 초정밀 디지털 맵 생성 및 연계를 위한 정보체계 프로토타입 설계)

  • Kim, Jong-Hyeop;Yeom, Dong-Jun;Ko, Hyun-A;Kang, Tai-Kyung
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.6_2
    • /
    • pp.1015-1024
    • /
    • 2020
  • By nature, smart construction technology is a convergence technology, therefore aptly constructing and running an information system is needed in order to effectively develop and maintain it. Thus, in this study, an information system prototype was developed for the creation and linking of high precision digital maps at road construction sites for the effective performance of the development of the Information Collecting and Analyzing Techniques in the Construction Site (ICAT). For this, (1) defined input/output (I/O) data of each technical detail of ICAT, (2) analyzed the data flow, (3 ) proposed an information system prototype for high precision digital maps development and connection. Based on the information system prototype constructed in this study, it was inferred that each technique and its information for the Smart Construction Technique Development Business was in a consistent flow. Developed information system prototype would enable effective cooperation between subjects directly involved in the technique development, by defining I/O data in advance. Moreover, it would be of value to practitioners for refining the output data from each technique, thereby linking databases and forming Entity Relationship Diagram.

A Study on Improvement of the Channel Efficiency of FH-SS Transceiver Based on DDS Technique

  • Kim, Gi-Rae;Choi, Young-Kyu
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.1
    • /
    • pp.47-50
    • /
    • 2008
  • A novel high channel efficiency transceiver based on a fast acquisition frequency synthesizer has been designed. The direct digital synthesis (DDS) technique is applied and a simple memory look-up table is incorporated to expedite channel acquisition. The technique simplifies the frequency control process in the transceiver and thus reduces the channel switching time. As a result, the channel efficiency is improved. The designed transceiver is ideal for frequency hopping mobile communication applications.