• Title/Summary/Keyword: Dynamic DNS

Search Result 44, Processing Time 0.023 seconds

An exact solution of dynamic response of DNS with a medium viscoelastic layer by moving load

  • S.A.H. Hosseini;O. Rahmani;H. Hayati;M. Keshtkar
    • Advances in materials Research
    • /
    • v.12 no.3
    • /
    • pp.193-210
    • /
    • 2023
  • This paper aims to analyze the dynamic response of a double nanobeam system with a medium viscoelastic layer under a moving load. The governing equations are based on the Eringen nonlocal theory. A thin viscoelastic layer has coupled two nanobeams together. An exact solution is derived for each nanobeam, and the dynamic deflection is achieved. The effect of parameters such as nonlocal parameter, velocity of moving load, spring coefficient and the viscoelastic layer damping ratio was studied. The results showed that the effect of the nonlocal parameter is significantly important and the classical theories are not suitable for nano and microstructures.

End-to-End Delay Analysis of a Dynamic Mobile Data Traffic Offload Scheme using Small-cells in HetNets

  • Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Recently, the traffic volume of mobile communications increases rapidly and the small-cell is one of the solutions using two offload schemes, i.e., local IP access (LIPA) and selected IP traffic offload (SIPTO), to reduce the end-to-end delay and amount of mobile data traffic in the core network (CN). However, 3GPP describes the concept of LIPA and SIPTO and there is no decision algorithm to decide the path from source nodes (SNs) to destination nodes (DNs). Therefore, this paper proposes a dynamic mobile data traffic offload scheme using small-cells to decide the path based on the SN and DN, i.e., macro user equipment, small-cell user equipment (SUE), and multimedia server, and type of the mobile data traffic for the real-time and non-real-time. Through analytical models, it is shown that the proposed offload scheme outperforms the conventional small-cell network in terms of the delay of end-to-end mobile data communications and probability of the mobile data traffic in the CN for the heterogeneous networks.

On Subgrid-Scale Models for Large-Fddy Simulation of Turbulent Flows (난류유동의 큰 에디 모사를 위한 아격자 모델)

  • Gang, Sang-Mo
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.24 no.11
    • /
    • pp.1523-1534
    • /
    • 2000
  • The performance of a number of existing dynamic subgrid-scale(SGS) models is evaluated in large-eddy simulations(LES) of two prototype transitional and turbulent shear flows, a planar jet and a channel flow. The dynamic SGS models applied include the dynamic Smagorinsky model(DSM);Germano et al. 1991, Lully 1992), the dynamic tow-component model(DTM; Akhavan et al. 2000), the dynamic mixed model(DMM;Zang et al, 1993). and the dynamic two-parameter model(DTPM; Salvetti & Banerjee 1995). The results are compared with those for DNS for their evaluation. The LES results demonstrate the superior performance of DTM with use of a sharp cutoff filter and DMM with use of a box filter, as compared to their respect counterpart DSM, in predicting the mean statistics, spectra and large-scale structure of the flow, Such features of DTM and DMM derive from the construction of the models in which tow separate terms are included to represent the SGS interactions; a Smagorinsky edd-viscosity term to account for the non-local interactions, and a local-interaction term to account for the nonlinear dynamics between the resolved and subgrid scales in the vicinity of the LES cutoff. As well, overall the SGS models using a sharp cutoff filter are more successful than those using a box filter in capturing the statistics and structure of the flow. Finally, DTPM is found to be compatible or inferior to DMM.

Development of a Distributed Web Caching Network through Consistent Hashing and Dynamic Load Balancing

  • Hwan Chang;Jong Ho Park;Ju Ho Park;Kil To Chong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1040-1045
    • /
    • 2002
  • This paper focuses on a hash-based, distributed Wet caching network that eliminates inter-cache communication. An agent program on cache servers, a mapping program on the DNS server, and other components comprised in a distributed Web caching network were modified and developed to implement a so-called "consistent" hashing. Also, a dynamic load balancing algorithm is proposed to address the load-balancing problem that is a key performance issue on distributed architectures. This algorithm effectively balances the load among cache servers by distributing the calculated amount of mapping items that have higher popularity than others. Therefore, this developed network can resolve the imbalanced load that is caused by a variable page popularity, a non-uniform distribution of a hash-based mapping, and a variation of cache servers.

New Distributed SDN Framework for Mitigating DDoS Attacks (DDoS 공격 완화를 위한 새로운 분산 SDN 프레임워크)

  • Alshehhi, Ahmed;Yeun, Chan Yeob;Damiani, Ernesto
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1913-1920
    • /
    • 2017
  • Software Defined Networking creates totally new concept of networking and its applications which is based on separating the application and control layer from the networking infrastructure as a result it yields new opportunities in improving the network security and making it more automated in robust way, one of these applications is Denial of Service attack mitigation but due to the dynamic nature of Denial of Service attack it would require dynamic response which can mitigate the attack with the minimum false positive. In this paper we will propose a new mitigation Framework for DDoS attacks using Software Defined Networking technology to protect online services e.g. websites, DNS and email services against DoS and DDoS attacks.

Large-Eddy Simulation of Turbulent Channel Flow using a Viscous Numerical Wave Tank Simulation Technique (점성 수치파랑수조 구축을 위한 LES 기술의 평판간 난류유동에의 적용)

  • Park, Jong-Chun;Kang, Dae-Hwan;Kim, Bang-Eun;Yoon, Hyeon-Sik;Chun, Ho-Hwan
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2003.10a
    • /
    • pp.204-212
    • /
    • 2003
  • As the first step to investigate the nonlinear interactions between turbulence and marine structures inside a viscous NWT, a LES technique was applied to the turbulent channel flow for $Re_{T}=150$, in this paper. The employed models were 4 types, such as the Smagorinsky model, the Dynamic SGS model, the Structure Function model and the Generalized Normal Stress model. The simulated data in time-series for the LESs were averaged in both time and space and performed statistical analysis. And results of the LESs were compared with those of a DNS developed in the present study and two spectral methods by Yoon et al.(2003) & Kim et al.(1987). It seems to be quite difficult to evaluate their performances to the present problem, but is seen that the accuracy of LESs are still related to the number of grids(or fine grid size).

  • PDF

A Study on Smart Door Lock using Internet of Things (IoT를 이용한 스마트 도어락에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.539-544
    • /
    • 2020
  • The research is on progressing to operate digital door lock with the method to guarantee the security and safety in the meantime to use digital door lock conveniently using Internet of Things (IoT) standardizing various service providing technology using IoT in home network currently. In this study, compose home network interconnecting Raspberry-PI and web server reflection this trend and composed the system to control the door lock after connect Arduino substituting converter function. Making Raspberry-PI using dynamic IP address using existing open source easily maintain DNS information and possible to connect internet network in home network ethernet and finally, making the smartphone can control door lock remotely entering designated address after connect the internet. The connection between home network and Arduino is executed by Raspberry-PI and bluetooth pairing as 1:1 and make random user's access to be impossible. Especially, to make open/close the door lock with smartphone not by using password on the keypad or using RFID card is judged as the method increasing the security make random user's access to be impossible and also increased the usefulness making remote control to be possible.

Impact analysis of composite plate by multiscale modeling (멀티스케일 모델링에 의한 복합재료 평판의 충격해석)

  • Ji Kuk Hyun;Paik Seung Hoon;Kim Seung Jo
    • Proceedings of the Korean Society For Composite Materials Conference
    • /
    • 2004.04a
    • /
    • pp.67-70
    • /
    • 2004
  • An investigation was performed to study the impact damage of the laminated composite plates caused by a low- velocity foreign object with multi-scale modeling based on the concepts of Direct Numerical Simulation (DNS)[4]. In the micro-scale part, we discretize the composite plates through separate modeling of fiber and matrix for the local microscopic analysis. A micro-scalemodel was developed for predicting the initiation of the damage and the extent of the final damage as a function of material properties, laminate configuration and the impactor's mass, etc. Anda macro-scale model was developed for description of global dynamic behavior. The connection betweenmicroscopic and macroscopic is implemented by the tied interface constraints of LS-DYNA contact card. A transient dynamic finite element analysis was adopted for calculating the contact force history and the stresses and strains inside the composites during impact resulting from a point-nose impactor. The low-velocity impact events such as contact force, deformation, etc. are simulated in the macroscopic sense and the impact damages, fiber-breakage, matrix cracking and delamination etc. are examined in the microscopic sense.

  • PDF

Large Eddy Simulation of Turbulent Flows over Backward-facing Steps (후향 계단에서 난류 유동에 대한 대와동모사)

  • Hwang, Cheol-Hong;Kum, Sung-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.507-514
    • /
    • 2009
  • Large eddy simulation code was developed to predict the turbulent flows over backward-facing steps including a recirculating flow phenomena. Localized dynamic ksgs-equation model was employed as a LES subgrid model and the LES solver was implemented on parallel computer consisting of 16 processors to reduce computational costs. The results of laminar flow showed qualitative and quantitative agreements between current simulations and experimental results availablein literatures. The simulation of the turbulent flows also yielded reasonable results. From these results, it can be expected that developed LES code will be very useful to analyze the combustion in stabilities and noise of a practical combustor in the future.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.