• Title/Summary/Keyword: Multi Block

Search Result 844, Processing Time 0.026 seconds

Metadata Management of a SAN-Based Linux Cluster File System (SAN 기반 리눅스 클러스터 파일 시스템을 위한 메타데이터 관리)

  • Kim, Shin-Woo;Park, Sung-Eun;Lee, Yong-Kyu;Kim, Gyoung-Bae;Shin, Bum-Joo
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.367-374
    • /
    • 2001
  • Recently, LINUX cluster file systems based on the storage area network (SAN) have been developed. In those systems, without using a central file server, multiple clients sharing the whole disk storage through Fibre Channel can freely access disk storage and act as file servers. Accordingly, they can offer advantages such as availability, load balancing, and scalability. In this paper, we describe metadata management schemes designed for a new SAN-based LINUX cluster file system. First, we present a new inode structure which is better than previous ones in disk block access time. Second, a new directory structure which uses extendible hashing is described. Third, we describe a novel scheme to manage free disk blocks, which is suitable for very large file systems. Finally, we present how we handle metadata journaling. Through performance evaluation, we show that our proposed schemes have better performance than previous ones.

  • PDF

A Study on the Implementation of Power Line Modem for Remote Control Using DSP (DSP를 이용한 원격 제어용 전력선 모뎀 구현에 관한 연구)

  • Kim Su Nam;Kang Dong Wook;Kim Ki Doo;Yoo Hyeon Joong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10C
    • /
    • pp.1433-1443
    • /
    • 2004
  • The power line modem proposed in this paper transmits the remote control signal using CSK(Code Shift Keying) and DS/SS method. The CSK technique provides the increased capacity of transmission and robustness towards noise. Besides, the DS/SS technique provides protection against narrow-band Gaussian interference and multi-path interference. The modem supports full-duplex communication using FDD(Frequency Division Duplex) and the modem structure for forward link is same with that for reverse link. To switch each sub-controlled unit smoothly, 4/$\pi$-DQPSK is adopted for noncoherent demodulation. The PN code for spreading spectrum seues to divide each group which consists of sub-controlled units and Walsh code is used for the M-ary CSK technique. Each block is designed and verified with TMS320C5402 DSP. We show the superiority of the proposed method by analyzing numerically the system performance for the factors of the DS/SS and CSK method ullder additive white Gaussian noise and PBI.

A Bibliographical Study on Dementia (치매(痴?)에 대한 문헌적(文獻的) 고찰(考察))

  • Kim, Yeong-Gyun;Gwon, Jeong-Nam;Choi, Ran-Suk
    • The Journal of Internal Korean Medicine
    • /
    • v.18 no.2
    • /
    • pp.177-194
    • /
    • 1997
  • This thesis, deduced from studying eastern and western medical records, deals with geriatric demedtia in modern society. The result were obtained as follows : 1. Dementia is a kind of chronic, progressive, degenerative disease. The chief expression and pathogenic change of the disease is organic: e.g., extensive change such as cerebrum - atrophy, and denaturalization result. in such a situation intellectual capacities and the ability to enjoy daily life deteriorate trenendously. 2. A basic internal cause of the disease is Defficiencies of the heart, liver and kidneys. An exterior cause is an Excessiveness of the 'Dam'(痰), 'Blood Stasis', 'Fung'(風) and 'Fire'. In a Western Medical view, the reason for dementia is due to the onset of Alzheimer's disease and Brain anemia resulting from Multi - infarction or some other reason. If the white - matter of the brain is injured, then dementia easily to results. 3. Disease symptoms result in troubles in intellectual functions : e.g., memory, orientation, intelligence, judgement, common sence and calculating abilities. 4. The proper therapeutic treatment depends on the causes. When the Deficiency is serious, Fortification (heart, liver. and kidney deficiency) is applied and Decrease is follow. When Excessiveness of wrong is serious, the Decrease is tried before the supplement measure is used depending on the deficiency, which generally is used together with 'Fortify Right - Decreace Wrong'. 5. If the disease wasn't caused by some mental reason, it's difficult to be cured of the disease. When the degree of the disease is light and it doesn't continue for a long time, the therapeutic treatment can block the disease's progress and improve the patient's symptoms.

  • PDF

Case Study for Ship Ad-hoc Networks under a Maritime Channel Model in Coastline Areas

  • Su, Xin;Yu, HaiFeng;Chang, KyungHi;Kim, Seung-Geun;Lim, Yong-Kon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4002-4014
    • /
    • 2015
  • ITU-R M.1842-1, as a well-known specification dedicated to maritime mobile applications, has standardized wireless transmission protocols according to the particular characteristics of a maritime communications scenario. A time division multiple access (TDMA) frame structure, along with modulation schemes to achieve a high data rate, has been described clearly in ITU-R M.1842-1. However, several specification items are still under "to be decided" status, which brings ambiguity to research works. In addition, the current version of ITU-R M.1842-1 is focused mainly on maritime transmissions in open-sea areas, where the cyclic prefix (CP) is set to zero and only 16-QAM is used in the multi-carrier (MC) system. System performance might be dramatically degraded in coastline areas due to the inter-symbol interference (ISI) caused by selective fading. This is because there is a higher probability that the signal will be reflected by obstacles in coastline areas. In this paper, we introduce the transmission resource block (TRB) dedicated to ITU-R M.1842-1 for a ship ad-hoc network (SANET), where the pilot pattern of TRB is based on the terrestrial trunked radio (TETRA). After that, we evaluated SANET performance under the maritime channel model in a coastline area. In order to avoid noise amplification and to overcome the ISI caused by selective fading, several strategies are suggested and compared in the channel estimation and equalization procedures, where the link-level simulation results finally validate our proposals.

Blind Adaptive Receiver based on Constant Modulus for Downlink MC-CDMA Systems (하향링크 MC-CDMA 시스템을 위한 CM 기반의 블라인드 적응 수신기)

  • Seo, Bangwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.47-54
    • /
    • 2019
  • In this paper, we consider a constant modulus (CM) based blind adaptive receiver design for downlink multi-carrier code-division multiple access (MC-CDMA) systems employing simple space-time block coding (STBC). In the paper, filter weight vectors used for the detection of the transmitted symbols are partitioned into its subvectors and then, special relations among the optimal subvectors minimizing the CM metric are derived. Using the special relations, we present a modified CM metric and propose a new blind adaptive stochastic-gradient CM algorithm (SG-CMA) by minimizing the modified CM metric. The proposed blind adaptive SG-CMA has faster convergence rate than the conventional SG-CMA because the filter weight vectors of the proposed scheme are updated in the region of satisfying the derived special relations. Computer simulation results are given to verify the superiority of the proposed SG-CMA.

A Numerical Study of Turbulent Flow Around a Twin-Skeg Container Ship Model with Appendages

  • Kim, Hyoung-Tae;Lee, Pyung-Kuk;Kim, Hee-Taek
    • Journal of Ship and Ocean Technology
    • /
    • v.10 no.4
    • /
    • pp.12-23
    • /
    • 2006
  • In this paper, a numerical study is carried out to investigate the turbulent flow around a twin-skeg container ship model with rudders including propeller effects. A commercial CFD code, FLUENT is used with body forces distributed on the propeller disk to simulate the ship stem and wake flows with the propeller in operation. A multi-block, matching, structured grid system has been generated for the container ship hull with twin-skegs in consideration of rudders and body-force propeller disks. The RANS equations for incompressible fluid flows are solved numerically by using a finite volume method. For the turbulence closure, a Reynolds stress model is used in conjunction with a wall function. Computations are carried out for the bare hull as well as the hull with appendages of a twin-skeg container ship model. For the bare hull, the computational results are compared with experimental data and show generally a good agreement. For the hull with appendages, the changes of the stem flow by the rudders and the propellers have been analyzed based on the computed result since there is no experimental data available for comparison. It is found the flow incoming to the rudders has an angle of attack due to the influence of the skegs and thereby the hull surface pressure and the limiting streamlines are changed slightly by the rudders. The axial velocity of the propeller disk is found to be accelerated overall by about 35% due to the propeller operation with the rudders. The area and the magnitude of low pressure on the hull surface enlarge with the flow acceleration caused by the propeller. The propellers are found to have an effect on up to the position where the skeg begins. The propeller slipstream is disturbed strongly by the rudders and the flow is accelerated further and the transverse velocity vectors are weakened due to the flow rectifying effect of the rudder.

Fine tuning of wavelength for the intenrnal wavelength locker module at 50 GHz composed of the photo-diode array black with the multi-channel tunable laser diodes in DWDM application (DWDM용 다채널 파장 가변 레이저 다이오드 모듈을 위한 다수개의 광 수신 소자를 갖는 50 GHz 내장형 파장 안정화 모듈의 파장 미세 조정)

  • 박흥우;윤호경;최병석;이종현;최광성;엄용성;문종태
    • Korean Journal of Optics and Photonics
    • /
    • v.13 no.5
    • /
    • pp.384-389
    • /
    • 2002
  • A new idea of the wavelength locking module for DWDM application was investigated in the present research. Only one etalon photo-diode is generally used in the internal/external wavelength locking system. For the internal wavelength locking module with 50 GHz applications, an algle tuning method of the etalon commonly applied. However, the alignment process of the etalon with the angle tuning method is limited because the lock performance is extremely sensitive accoriding to the change of the tilting angle. In an optical viewpoint, the alignment tolerance of the locker module with the etalon PD array block was good, and the precise tuning of the wavelength was possible. The characteristics of free spectral range (FSR) and peak shift of wavelength according to the tilting angle with the locker module was investigated. For the present module, the optimized initial tilting angle was experimentally obtained.

Detection of Crosswalk for the Walking Guide of the Blind People (시각장애인 보행 안내를 위한 횡단보도 검출 및 방향 판단)

  • Kim, Seon-il;Jeong, Yu-Jin;Lee, Dong-Hee;Jung, Kyeong-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.45-48
    • /
    • 2019
  • Detection of crosswalk is an important issue for the blind to walk without the help of others. There is a braille block on the sidewalk, which helps the blind to walk. On the other hand, crosswalk is more dangerous due to the moving vehicles. However, there is no appropriate means to induce the blind. In this paper, we propose a method to detect crosswalk in front of a blind and estimate its direction using an image sensor. We adopt multi-ROIs and make their binary versions. In order to determine whether it is a crosswalk, two features are extracted; one is the number of crossing in the binary image and the other is the ratio of white area. We can also estimate the direction of the crosswalk through the slope of the projection data. We evaluated the performance using experimental dataset and the proposed algorithm showed 80% accuracy of detection.

  • PDF

Blockchain-based Personal Information Authentication Method using Zero Knowledge Proofs (영지식을 활용한 블록체인 기반 개인정보 인증 기법)

  • Lee, Kwang Kyu
    • Smart Media Journal
    • /
    • v.10 no.3
    • /
    • pp.48-53
    • /
    • 2021
  • The authentication process is a key step that should be used to verify that a user is legitimate, and it should be used to verify that a user is a legitimate user and grant access only to that user. Recently, two-factor authentication and OTP schemes are used by most applications to add a layer of security to the login process and to address the vulnerability of using only one factor for authentication, but this method also allows access to user accounts without permission. This is a known security vulnerability. In this paper, we propose a Zero Knowledge Proofs (ZKP) personal information authentication scheme based on a Smart Contract of a block chain that authenticates users with minimal personal information exposure conditions. This has the advantage of providing many security technologies to the authentication process based on blockchain technology, and that personal information authentication can be performed more safely than the existing authentication method.

Security Analysis of Software-Oriented Stream Ciphers against Algebraic Attacks (소프트웨어 구현에 적합한 스트림 암호의 대수적 공격에 대한 안전성)

  • Sung Jaechul;Moon Dukjae;Im Hung-su;Chee Seongtaek;Lee Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.29-40
    • /
    • 2005
  • In this paper we consider the security of recently proposed software-orienred stram cipher HELIX, SCREAM, MUGI, and PANAMA against algebraic attacks. Algebraic attack is a key recovery attack by solving an over-defined system of multi-variate equations with input-output pairs of an algorithm. The attack was firstly applied to block ciphers with some algebraic properties and then it has been mon usefully applied to stream ciphers. However it is difficult to obtain over-defined algebraic equations for a given cryptosystem in general. Here we analyze recently proposed software-oriented stream ciphers by constructing a system of equations for each cipher. furthermore we propose three design considerations of software-oriented stream ciphers.