• Title/Summary/Keyword: Dynamic Service Platform

Search Result 99, Processing Time 0.029 seconds

Lifetime seismic performance assessment of high-rise steel-concrete composite frame with buckling-restrained braces under wind-induced fatigue

  • Liu, Yang;Li, Hong-Nan;Li, Chao;Dong, Tian-Ze
    • Structural Engineering and Mechanics
    • /
    • v.77 no.2
    • /
    • pp.197-215
    • /
    • 2021
  • Under a severe environment of multiple hazards such as earthquakes and winds, the life-cycle performance of engineering structures may inevitably be deteriorated due to the fatigue effect caused by long-term exposure to wind loads, which would further increase the structural vulnerability to earthquakes. This paper presents a framework for evaluating the lifetime structural seismic performance under the effect of wind-induced fatigue considering different sources of uncertainties. The seismic behavior of a high-rise steel-concrete composite frame with buckling-restrained braces (FBRB) during its service life is systematically investigated using the proposed approach. Recorded field data for the wind hazard of Fuzhou, Fujian Province of China from Jan. 1, 1980 to Mar. 31, 2019 is collected, based on which the distribution of wind velocity is constructed by the Gumbel model after comparisons. The OpenSees platform is employed to establish the numerical model of the FBRB and conduct subsequent numerical computations. Allowed for the uncertainties caused by the wind generation and structural modeling, the final annual fatigue damage takes the average of 50 groups of simulations. The lifetime structural performance assessments, including static pushover analyses, nonlinear dynamic time history analyses and fragility analyses, are conducted on the time-dependent finite element (FE) models which are modified in lines with the material deterioration models. The results indicate that the structural performance tends to degrade over time under the effect of fatigue, while the influencing degree of fatigue varies with the duration time of fatigue process and seismic intensity. The impact of wind-induced fatigue on structural responses and fragilities are explicitly quantified and discussed in details.

An Empirical Study on the Effects of Regulation in Online Gaming Industry via Vector Autoregression Model (벡터자기회귀(VAR) 모형을 활용한 온라인 게임 규제 영향에 대한 실증적 연구: 웹보드 게임을 중심으로)

  • Moonkyoung Jang;Seongmin Jeon;Byungjoon Yoo
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.123-145
    • /
    • 2017
  • This study empirically examines the effects of regulation on online gaming. Going beyond ad hoc heuristic approaches on individual behavior, we investigate the effects of regulation on dynamic changes of games or service providers. In particular, we propose three theoretical perspectives: social influence to investigate the regulation effect, the role of prior experience to determine the difference in the regulation effect size through users' prior experience, and network externalities to discover the difference in the regulation effect size according to the number of users on an online gaming platform. We use the vector autoregression methodology to model patterns of the co-movement of online games and to forecast game usage. We find that online gamers are heterogeneous. Therefore, policy makers should make suitable regulations for each heterogeneous group to effectively avoid generating gaming addicts without interrupting the economic growth of the online gaming industry.

Detecting TOCTOU Race Condition on UNIX Kernel Based File System through Binary Analysis (바이너리 분석을 통한 UNIX 커널 기반 File System의 TOCTOU Race Condition 탐지)

  • Lee, SeokWon;Jin, Wen-Hui;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.701-713
    • /
    • 2021
  • Race Condition is a vulnerability in which two or more processes input or manipulate a common resource at the same time, resulting in unintended results. This vulnerability can lead to problems such as denial of service, elevation of privilege. When a vulnerability occurs in software, the relevant information is documented, but often the cause of the vulnerability or the source code is not disclosed. In this case, analysis at the binary level is necessary to detect the vulnerability. This paper aims to detect the Time-Of-Check Time-Of-Use (TOCTOU) Race Condition vulnerability of UNIX kernel-based File System at the binary level. So far, various detection techniques of static/dynamic analysis techniques have been studied for the vulnerability. Existing vulnerability detection tools using static analysis detect through source code analysis, and there are currently few studies conducted at the binary level. In this paper, we propose a method for detecting TOCTOU Race Condition in File System based on Control Flow Graph and Call Graph through Binary Analysis Platform (BAP), a binary static analysis tool.

Proposed Test Method for Verification of Survivability Improvement of KASS Augmented Navigation of a Beam-formed GPS Receiver (빔포밍 GPS 위성항법장치의 KASS 보정항법 생존성 향상을 검증하기 위한 시험평가 방법 제안)

  • Junwoo Jung;Hyunhee Won;Daeyoung Park;Seungmin Kang;Jonggyu Go;Seungbok Kwon;Kwi Woo Park;Bongwoo Jo;Woogeun Ahn;Sung Wook Yun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.3
    • /
    • pp.257-268
    • /
    • 2024
  • The Korea Augmentation Satellite System (KASS) satellite was successfully launched and service is being started. By receiving messages transmitted from the KASS satellite, users can employ the messages to improve positioning accuracy or to verify the integrity of Global Positioning System (GPS). In this paper, we propose a test method for a beam-formed GPS receiver developed to improve the survivability of KASS augmented messages that can enhance positioning accuracy even in an environment with jamming or interfering signals. Through the test method proposed in this paper, quantitative verification is performed for a beam-formed GPS receiver aimed at maintaining the augmented navigation solution to which KASS augmented messages are applied by tracking the KASS signal as much as possible under conditions where the jamming signal strength is gradually increasing. In addition, the proposed test method includes three conditions; first, a static lab test method for repeated verification of functions under the same conditions; second, a static outdoor test method for performance verification in an operating environment of a platform equipped with the beam-formed GPS receiver; and finally, a dynamic lab test method for performance verification of a moving platform equipped with the beam-formed GPS receiver toward a jammer. In this paper, we propose a method for simulating the jamming signal incident direction through the phase delay of an RF cable designed to prevent unintentional jamming signal emission in both lab and outdoor tests, and a method of applying test software for injecting a jamming signal to compare the survivability performance consistently according to the presence or absence of beamforming signal processing. Through the proposed test method, it was verified that the augmented navigation solution could be output for a longer time period when the beamforming signal processing was applied to the KASS satellite signal in the beam-formed GPS receiver.

A Rule-based JMS Message Routing System for Dynamic Message Communication in based Distributed Systems (분산환경에서 동적 메시지 교환을 위한 룰 기반 JMS 메시지 라우팅 시스템)

  • Cho, Poong-Youn;Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.3
    • /
    • pp.1-20
    • /
    • 2008
  • Today's computing environment which is getting distributed to communicate with various systems needs dynamic inter-connectivity of the systems. MOM(Message Oriented Middleware) is popularly used for transmitting XML messages among the distributed systems for the inter-connectivity. But, they do not support event-based message routing functionalities with XML transformation for processing effective message routing, which is essential to inter-connectivity, and there is no integrated platform to cope with these requirements. Although event-based message routing and XML transformation have been studied in a wide range of computer science areas, development of message routing systems is considered as a tough job due to the technological difficulties. In order to address these requirements, we proposed a novel system, named RMRS(Rule-based Message Routing System), which supports event-based message routing as well as XML message transformation. To make the proposed system easy to use, we also redesigned ECA(Event- Condition-Action) rule to fit in our system and developed a tool to map source XML structure into target XML structure.

  • PDF

Provider Provisioned based Mobile VPN using Dynamic VPN Site Configuration (동적 VPN 사이트 구성을 이용한 Provider Provisioned 기반 모바일 VPN)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.1-15
    • /
    • 2007
  • Increase in the wireless mobile network users brings the issue of mobility management into the Virtual Private Network (VPN) services. We propose a provider edge (PE)-based provider provisioned mobile VPN mechanism, which enables efficient communication between a mobile VPN user and one or more correspondents located in different VPN sites. The proposed mechanism not only reduces the IPSec tunnel overhead at the mobile user node to the minimum, but also enables the traffic to be delivered through optimized paths among the (mobile) VPN users without incurring significant extra IPSec tunnel overhead regardless of the user's locations. The proposed architecture and protocols are based on the BGP/MPLS VPN technology that is defined in RFC24547. A service provider platform entity named PPVPN Network Server (PNS) is defined in order to extend the BGP/MPLS VPN service to the mobile users. Compared to the user- and CE-based mobile VPN mechanisms, the proposed mechanism requires less overhead with respect to the IPSec tunnel management. The simulation results also show that it outperforms the existing mobile VPN mechanisms with respect to the handoff latency and/or the end-to-end packet delay.

Dynamic Evaluation Methods for SMS Phishing Blocking App Based on Detection Setup Function (감지설정기능을 적용한 스미싱 차단앱의 동적 평가방법에 관한 연구)

  • Kim, Jang Il;Kim, Myung Gwan;Kwon, Young Man;Jung, Yong Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.111-118
    • /
    • 2015
  • Although the development of mobile devices are made us a free life, they were displayed the subject of this financial crime and attacking forces in the other side. Among finance-related crime is become a serious crime that are targeting smartphones by SMS phishing, phishing, pharming, voice phishing etc. In particular, SMS phishing is increased according to phenomenon using the nature of a text message in the mobile. SMS phishing is become new crime due to the burden to the smartphone user. Their crime is also the advanced way from the existing fraud, such as making the malicious apps. Especially it generates loopholes in the law by a method such as using a foreign server. For safe from SMS phishing attacks, proactive pre-diagnosis is even more important rather than post responses. It is necessary to deploy blocking programs for detecting SMS phishing attacks in advance to do this. In this paper we are investigating the process of block types and block apps that are currently deployed and presenting the evaluation of the application of the detection block setting app.

Bio-Sensing Convergence Big Data Computing Architecture (바이오센싱 융합 빅데이터 컴퓨팅 아키텍처)

  • Ko, Myung-Sook;Lee, Tae-Gyu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.2
    • /
    • pp.43-50
    • /
    • 2018
  • Biometric information computing is greatly influencing both a computing system and Big-data system based on the bio-information system that combines bio-signal sensors and bio-information processing. Unlike conventional data formats such as text, images, and videos, biometric information is represented by text-based values that give meaning to a bio-signal, important event moments are stored in an image format, a complex data format such as a video format is constructed for data prediction and analysis through time series analysis. Such a complex data structure may be separately requested by text, image, video format depending on characteristics of data required by individual biometric information application services, or may request complex data formats simultaneously depending on the situation. Since previous bio-information processing computing systems depend on conventional computing component, computing structure, and data processing method, they have many inefficiencies in terms of data processing performance, transmission capability, storage efficiency, and system safety. In this study, we propose an improved biosensing converged big data computing architecture to build a platform that supports biometric information processing computing effectively. The proposed architecture effectively supports data storage and transmission efficiency, computing performance, and system stability. And, it can lay the foundation for system implementation and biometric information service optimization optimized for future biometric information computing.

A Study on the establishment of IoT management process in terms of business according to Paradigm Shift (패러다임 전환에 의한 기업 측면의 IoT 경영 프로세스 구축방안 연구)

  • Jeong, Min-Eui;Yu, Song-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.151-171
    • /
    • 2015
  • This study examined the concepts of the Internet of Things(IoT), the major issue and IoT trend in the domestic and international market. also reviewed the advent of IoT era which caused a 'Paradigm Shift'. This study proposed a solution for the appropriate corresponding strategy in terms of Enterprise. Global competition began in the IoT market. So, Businesses to be competitive and responsive, the government's efforts, as well as the efforts of companies themselves is needed. In particular, in order to cope with the dynamic environment appropriately, faster and more efficient strategy is required. In other words, proposed a management strategy that can respond the IoT competitive era on tipping point through the vision of paradigm shift. We forecasted and proposed the emergence of paradigm shift through a comparative analysis of past management paradigm and IoT management paradigm as follow; I) Knowledge & learning oriented management, II) Technology & innovation oriented management, III) Demand driven management, IV) Global collaboration management. The Knowledge & learning oriented management paradigm is expected to be a new management paradigm due to the development of IT technology development and information processing technology. In addition to the rapid development such as IT infrastructure and processing of data, storage, knowledge sharing and learning has become more important. Currently Hardware-oriented management paradigm will be changed to the software-oriented paradigm. In particular, the software and platform market is a key component of the IoT ecosystem, has been estimated to be led by Technology & innovation oriented management. In 2011, Gartner announced the concept of "Demand-Driven Value Networks(DDVN)", DDVN emphasizes value of the whole of the network. Therefore, Demand driven management paradigm is creating demand for advanced process, not the process corresponding to the demand simply. Global collaboration management paradigm create the value creation through the fusion between technology, between countries, between industries. In particular, cooperation between enterprises that has financial resources and brand power and venture companies with creative ideas and technical will generate positive synergies. Through this, The large enterprises and small companies that can be win-win environment would be built. Cope with the a paradigm shift and to establish a management strategy of Enterprise process, this study utilized the 'RTE cyclone model' which proposed by Gartner. RTE concept consists of three stages, Lead, Operate, Manage. The Lead stage is utilizing capital to strengthen the business competitiveness. This stages has the goal of linking to external stimuli strategy development, also Execute the business strategy of the company for capital and investment activities and environmental changes. Manege stage is to respond appropriately to threats and internalize the goals of the enterprise. Operate stage proceeds to action for increasing the efficiency of the services across the enterprise, also achieve the integration and simplification of the process, with real-time data capture. RTE(Real Time Enterprise) concept has the value for practical use with the management strategy. Appropriately applied in this study, we propose a 'IoT-RTE Cyclone model' which emphasizes the agility of the enterprise. In addition, based on the real-time monitoring, analysis, act through IT and IoT technology. 'IoT-RTE Cyclone model' that could integrate the business processes of the enterprise each sector and support the overall service. therefore the model be used as an effective response strategy for Enterprise. In particular, IoT-RTE Cyclone Model is to respond to external events, waste elements are removed according to the process is repeated. Therefore, it is possible to model the operation of the process more efficient and agile. This IoT-RTE Cyclone Model can be used as an effective response strategy of the enterprise in terms of IoT era of rapidly changing because it supports the overall service of the enterprise. When this model leverages a collaborative system among enterprises it expects breakthrough cost savings through competitiveness, global lead time, minimizing duplication.