• Title/Summary/Keyword: Network communication area

Search Result 1,318, Processing Time 0.033 seconds

A Study on Sharing the File Blocks Between Virtual Machines for Efficient Virtual Machine Migration in Wide Area Networks (WAN 환경에서의 가상 머신 마이그레이션 성능 향상을 위한 가상 머신간 파일 블록 공유에 관한 연구)

  • Shin, Eun Hwan;Kim, Jung Han;Eom, Young Ik
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1735-1738
    • /
    • 2010
  • 가상화는 하나의 물리적 시스템을 논리적으로 분할해 자원 공유의 효율성을 극대화하는 기술이다. 하지만 가상화에 필수적인 시스템의 추상화는 자원 관리의 복잡도를 증가시켜 하드웨어 장치의 로드 발생을 야기한다는 문제점이 있다. 가상 머신 마이그레이션(migration)은 로드를 발생시키는 가상 머신을 자원적 여유가 있는 시스템으로 이동시키는 기술이며, 기존의 기법들은 메모리상의 실행 컨텍스트의 이동 비용을 최소화하기 위한 방법에 초점을 맞추고 있다. 하지만 네트워크를 통한 스토리지의 공유가 어려운 WAN(wide area network) 환경에서는 실행 컨텍스트뿐만 아니라 가상 머신 이미지 자체의 이동이 불가피하며, 이는 많은 비용을 발생시킨다. 따라서 본 연구에서는 가상 머신간 파일 블록 공유를 통한 WAN 환경에서의 효율적인 가상 머신 마이그레이션 기법을 제안하고, 실험을 통해 제안 기법에 대한 분석 및 평가를 실시하였다.

Facial Shape Recognition Using Self Organized Feature Map(SOFM)

  • Kim, Seung-Jae;Lee, Jung-Jae
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.104-112
    • /
    • 2019
  • This study proposed a robust detection algorithm. It detects face more stably with respect to changes in light and rotation forthe identification of a face shape. The proposed algorithm uses face shape asinput information in a single camera environment and divides only face area through preprocessing process. However, it is not easy to accurately recognize the face area that is sensitive to lighting changes and has a large degree of freedom, and the error range is large. In this paper, we separated the background and face area using the brightness difference of the two images to increase the recognition rate. The brightness difference between the two images means the difference between the images taken under the bright light and the images taken under the dark light. After separating only the face region, the face shape is recognized by using the self-organization feature map (SOFM) algorithm. SOFM first selects the first top neuron through the learning process. Second, the highest neuron is renewed by competing again between the highest neuron and neighboring neurons through the competition process. Third, the final top neuron is selected by repeating the learning process and the competition process. In addition, the competition will go through a three-step learning process to ensure that the top neurons are updated well among neurons. By using these SOFM neural network algorithms, we intend to implement a stable and robust real-time face shape recognition system in face shape recognition.

Rain Cell Size Distribution Using Radar Data During Squall Line Episodes (레이더 자료를 이용한 강우입자분포의 통계적 분석 연구)

  • Ricardo S. Tenorio;Kwon, Byung-Hyuk;Lee, Dong-In
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.5
    • /
    • pp.971-976
    • /
    • 2000
  • The main objective of this paper is to present the rain cell size distribution observed during squall line episodes in the Sudano-Sahelian region. The used data were collected during the EPSAT Program [Etude des Precipitation par SATellite (Satellites Study of Precipitation)] which has been developed since 1958, on an experimental area located near Niamey, Niger (2 10′32"E, 13 28′38"N). The data were obtained with a C-band radar and a network composed of approximately 100 raingages over a 10,000 $\textrm{km}^2$. In this work a culling of the squall line episodes was made for the 1992 rainy season. After radar data calibration using the raingage network a number of PPI (Plan Position Indicator) images were generated. Each image was then treated in order to obtain a series of radar reflectivity (Z) maps. To describe the cell distribution, a contouring program was used to analyze the areas with rain rate greater than or equal to the contour threshold (R$\geq$$\tau$). 24700 contours were generated, where each iso-pleth belongs to a predefined threshold. Computing each cell surface and relating its area to an equi-circle (a circle having the same area as the cell), a statistical analysis was made. The results show that the number of rain cells having a given size is an inverse exponential function of the equivalent radius. The average and median equivalent radii ate 1.4 and 0.69 In respectively. Implications of these results for the precipitation estimation using threshold methods are discussed.

  • PDF

A Fabrication and Testing of New RC CMOS Oscillator Insensitive Supply Voltage Variation

  • Kim, Jin-su;Sa, Yui-hwan;Kim, Hi-seok;Cha, Hyeong-woo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.71-76
    • /
    • 2016
  • A controller area network (CAN) receiver measures differential voltage on a bus to determine the bus level. Since 3.3V transceivers generate the same differential voltage as 5V transceivers (usually ${\geq}1.5V$), all transceivers on the bus (regardless of supply voltage) can decipher the message. In fact, the other transceivers cannot even determine or show that there is anything different about the differential voltage levels. A new CMOS RC oscillator insensitive supply voltage for clock generation in a CAN transceiver was fabricated and tested to compensate for this drawback in CAN communication. The system consists of a symmetrical circuit for voltage and current switches, two capacitors, two comparators, and an RS flip-flop. The operational principle is similar to a bistable multivibrator but the oscillation frequency can also be controlled via a bias current and reference voltage. The chip test experimental results show that oscillation frequency and power dissipation are 500 kHz and 5.48 mW, respectively at a supply voltage of 3.3 V. The chip, chip area is $0.021mm^2$, is fabricated with $0.18{\mu}m$ CMOS technology from SK hynix.

An Energy-Efficient MAC Protocol for Wireless Wearable Computer Systems

  • Beh, Jounghoon;Hur, Kyeong;Kim, Wooil;Joo, Yang-Ick
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.7-11
    • /
    • 2013
  • Wearable computer systems use the wireless universal serial bus (WUSB), which refers to USB technology that is merged with WiMedia physical layer and medium access control layer (PHY/MAC) technical specifications. WUSB can be applied to wireless personal area network (WPAN) applications as well as wired USB applications such as PAN. WUSB specifications have defined high-speed connections between a WUSB host and WUSB devices for compatibility with USB 2.0 specifications. In this paper, we focus on an integrated system with a WUSB over an IEEE 802.15.6 wireless body area network (WBAN) for wireless wearable computer systems. Due to the portable and wearable nature of wearable computer systems, the WUSB over IEEE 802.15.6 hierarchical medium access control (MAC) protocol has to support power saving operations and integrate WUSB transactions with WBAN traffic efficiently. In this paper, we propose a low-power hibernation technique (LHT) for WUSB over IEEE 802.15.6 hierarchical MAC to improve its energy efficiency. Simulation results show that the LHT also integrates WUSB transactions and WBAN traffic efficiently while it achieves high energy efficiency.

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Adaptable PANID Generation Scheme for Resolving Address Conflict Based on Hash Mechanism in IoT Environment (IoT 환경을 위한 Hash 기반 동적 Zigbee PANID 생성 및 충돌 회피 방안)

  • Lee, Jaeho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2392-2400
    • /
    • 2015
  • Zigbee, which was a representative standard technology for dealing low energy and mesh networks in large deployment area such as smart home, smart building, and massive sensor networks, has been developed and deployed for increasing communication area by using Ad hoc method. It has been originally developed based on IEEE 802.15.4 standard so every node needs 48bit unique address defined by IEEE. However, it is absolutely inefficient to assign an unique address to every communication node where it would be deployed through large-scale network area, e.g., smart lighting and massive sensor networks, because there could be variously multiple companies to deploy network infrastructure and they could have different policy to assign node ID. To prevent the problem, this paper proposes a method of dynamic PANID assignment in overall Personal Coordinators, and also proposes a method for addressing PANID conflict problem which could be derived from dynamic PANID assignment.

A study on the implementation of the wireless video security system (무선 영상보안시스템 구현에 관한 연구)

  • Kim, Young-Min;Kim, Myeong-Hwan;Kim, Sun-Hyung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.1
    • /
    • pp.99-104
    • /
    • 2012
  • In this paper, implementation of a wireless video security system relates to a situation outside of using infrared sensors to detect changes when using Zigbee network security in the area of the sensor sends information to the server. The server can judge the situation if an emergency situation through the IP network security camera shot of the area to be transferred command to pantilte. The camera images and information in the security area, sent to administrator's smartphone users to control the camera can see the situation and More than a small video security system was designed so that user can monitor the security zone. Finally, for real-time to identify and respond to emergency situations based on the available wireless networks for video surveillance systems were verified through research and implementation.

  • PDF

Implementation of Smart Shoes for Dementia Patients using Embedded Board and Low Power Wide Area Technology (저전력장거리 기술과 임베디드 보드를 이용한 치매 돌봄 스마트 신발 구현)

  • Lee, Sung-Jin;Choi, Jun-Hyeong;Seo, Chang-Sung;Park, Byung-Kwon;Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.100-106
    • /
    • 2020
  • In this paper smart shoes for dementia care using embedded boards and Low Power Wide Area technology and their application software are implemented. The communication board composed of Cortex-M3 board and LoRa module is embedded into groove made in outsole of smart shoes. Including the mold, the shoe outsole was manufactured by hand. By using application software and embedded board, caregiver can track the position of dementia patient using GPS and LoRa network. The location tracking and data transmission operations of smart shoes have been successfully verified in the outdoor environment. The smart shoes of this paper are applicable to a safety device to prevent the disappearance of demented patients through results of experiments and if bigdata is collected and analyzed by deep-learning, it may be helpful to analyze the predictive path of dementia patients or the pattern of dementia.

OFDM System for Wireless-PAN related short distance Maritime Data Communication (Wireless PAN기반의 근거리 해상통신용 OFDM 송수신회로에 관한 연구)

  • Cho, Seung-Il;Cha, Jae-Sang;Park, Gye-Kack;Yang, Chung-Mo;Kim, Seong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.145-151
    • /
    • 2009
  • Orthogonal Frequency Division Multiplexing (OFDM) has been focused on as 4th generation communication method for realization of Ubiquitous Network in land mobile communications services, and has been a standard technology of Wireless Local Area Network (WLAN) for a High Date Rate communication. And in maritime data communication using high frequency (HF) band, 32-point FFT OFDM system is recommended by International Telecommunication Union (ITU). Maritime communication should be kept on connecting when maritime accident or the maritime disaster happen. Therefore, main device FFT should be operated with low power consumption. In this paper we propose a low power 32-point FFT algorithm using radix-2 and radix-4 for low power operation. The proposed algorithm was designed using VHSIC hardware description language (VHDL), and it was confirmed that the output value of Spartan-3 field-programmable gate array (FPGA) board corresponded to the output value calculated using Matlab. The proposed 32-point FFT algorithm will be useful as a leading technology in a HF maritime data communication.