• Title/Summary/Keyword: Performance of protecting

Search Result 290, Processing Time 0.026 seconds

A Stability Verification of Backup System for Disaster Recovery (재해 복구를 위한 백업 시스템의 안정성 검증)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.205-214
    • /
    • 2012
  • The main thing that IT operation managers consider is protecting assets of corporation from system failure and disaster. Therefore, this research proposed a backup system for a disaster recovery. Previous backup method is that if database update occurs, this record is saved in redo log, and if the size of record file is over than expected, this file is saved in archive log in order. Thus, it is possible to occur errors of data loss from the process of data backup which change in real time while changes of database occur. Suggested backup system is back redo log up to database of transaction log in real time, and back a record that can be omitted from previous backup method up to archive log. When recover the data, it is possible to recover redo log in real time online, and it minimizes data loss. Also, throughout multi thread processing method data recovery is performed and it is designed that system performance is improved. To verify stability of backup system CPN(Coloured Petri Net) is introduced, and each step of backup system is displayed in diagram form, and th e stability is verified based on the definition and theorem of CPN.

Flame Retardant and Weather Proof Characteristic of Dan-Chung Treated Wooden by Flame Retardant Performance (방염처리 방법에 따른 단청목재의 방염 및 내후특성)

  • Park, Cheul-Woo;Hong, Sang-Wan;Lee, Jong-Kyun;Lim, Nam-Gi
    • Journal of the Korea Institute of Building Construction
    • /
    • v.13 no.2
    • /
    • pp.122-130
    • /
    • 2013
  • One of recent methods to protect wooden cultural assets from fire, there is the flame retardation which is applied directly to wood and it is to prevent fire through securing flame resistance for the material and delaying combustion when failed fire in advance and then to gain time for people in the room to evacuate and it has same goal with the Korean Fire Service Act by protecting life and property. However, in case of spraying flame retardant on the colored surface of the wooden cultural assets, there are continuous problems of decoloration, efflorescence and water absorbtion after sometime and accordingly there increases danger of damages of cultural assets. So when treating with flame retardant on wooden cultural assets, there has to be no problems on dancheong after sometime and securing sustainable methods for flmae retardation should be preceded. Accordingly, this study aims to provide basic sources for selecting proper flame retardation methods by evaluating and analyzing flame retardation capabilities according to types of flame retardants which are frequently used nowadays and spraying them on the dancheong-painted surface and confirming if there is no problem on the dancheong and wood after sometime and if flame retardation effect is sustainable with its quality and capability through precise analysis.

Privacy-Preserving Language Model Fine-Tuning Using Offsite Tuning (프라이버시 보호를 위한 오프사이트 튜닝 기반 언어모델 미세 조정 방법론)

  • Jinmyung Jeong;Namgyu Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.165-184
    • /
    • 2023
  • Recently, Deep learning analysis of unstructured text data using language models, such as Google's BERT and OpenAI's GPT has shown remarkable results in various applications. Most language models are used to learn generalized linguistic information from pre-training data and then update their weights for downstream tasks through a fine-tuning process. However, some concerns have been raised that privacy may be violated in the process of using these language models, i.e., data privacy may be violated when data owner provides large amounts of data to the model owner to perform fine-tuning of the language model. Conversely, when the model owner discloses the entire model to the data owner, the structure and weights of the model are disclosed, which may violate the privacy of the model. The concept of offsite tuning has been recently proposed to perform fine-tuning of language models while protecting privacy in such situations. But the study has a limitation that it does not provide a concrete way to apply the proposed methodology to text classification models. In this study, we propose a concrete method to apply offsite tuning with an additional classifier to protect the privacy of the model and data when performing multi-classification fine-tuning on Korean documents. To evaluate the performance of the proposed methodology, we conducted experiments on about 200,000 Korean documents from five major fields, ICT, electrical, electronic, mechanical, and medical, provided by AIHub, and found that the proposed plug-in model outperforms the zero-shot model and the offsite model in terms of classification accuracy.

Design of Processor Lever Controller for Electric Propulsion System of Naval Ship (전기추진 함정용 프로세서 레버 제어기 설계)

  • Shim, Jaesoon;Lee, Hunseok;Jung, Sung-Young;Oh, Jin-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.134-145
    • /
    • 2021
  • It is common to optimize the propulsion control system through a so-called tuning process that modifies the parameter values of the propulsion control software during a ship commissioning. However, during this process, if the error of the initial setting value is large, the tuning time may take too long, or the propulsion equipment can be seriously damaged. Therefore, we conducted research on the design of a propulsion controller that applied a Processor lever controller even for inexperienced people with relatively little experience in tuning propulsion control software to be able to reduce the tuning time while protecting the propulsion system. Through simulation, by comparing the execution result of propulsion control lever commands through the PI controller without applying the Processor lever controller. We analyzed the improvement of the Overshoot and propulsion performance. The simulation results showed that the safety of the propulsion system increased because Overshoot of approximately 9.74%, which occurred when the Processor lever function was not applied.

Automatic Detection Approach of Ship using RADARSAT-1 Synthetic Aperture Radar

  • Yang, Chan-Su
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.14 no.2
    • /
    • pp.163-168
    • /
    • 2008
  • Ship detection from satellite remote sensing is a crucial application for global monitoring for the purpose of protecting the marine environment and ensuring marine security. It permits to monitor sea traffic including fisheries, and to associate ships with oil discharge. An automatic ship detection approach for RADARSAT Fine Synthetic Aperture Radar (SAR) image is described and assessed using in situ ship validation information collected during field experiments conducted on August 6, 2004. Ship detection algorithms developed here consist of five stages: calibration, land masking, prescreening, point positioning, and discrimination. The fine image was acquired of Ulsan Port, located in southeast Korea, and during the acquisition, wind speeds between 0 m/s and 0.4 m/s were reported. The detection approach is applied to anchoring ships in the anchorage area of the port and its results are compared with validation data based on Vessel Traffic Service (VTS) radar. Our analysis for anchoring ships, above 68 m in length (LOA), indicates a 100% ship detection rate for the RADARSAT single beam mode. It is shown that the ship detection performance of SAR for smaller ships like barge could be higher than the land-based radar. The proposed method is also applied to estimate the ship's dimensions of length and breadth from SAR radar cross section(RCS), but those values were comparatively higher than the actual sizes because of layover and shadow effects of SAR.

  • PDF

Development and Evaluation of an Impulsive Force Test Method for Wearable Airbags (착용형 에어백의 충격력 시험 방법개발 및 평가)

  • Park, Jin-O;Kim, Young-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.597-602
    • /
    • 2021
  • Even in the era of the 4th industrial revolution, the prevention of industrial accidents is still an important issue in industrial sites. In solving the problem of industrial safety, a product can be difficult to market if there is a lack of standard or method for a reliable performance evaluation. The purpose of this study was to develop and evaluate a test method for a wearable airbag product for protecting the body from falls that was newly developed to respond to fall accidents in industrial sites. As a research method, reliable evaluation standards were developed and applied through four stages of the evaluation and development process (Step 1: Product review, Step 2: Data research, Step 3: Expert meeting, Step 4: Drawing evaluation standard). In addition, the impact force was evaluated according to the developed evaluation standard. The fall impact force obtained through the evaluation showed a reduction effect of approximately 96% compared to the existing impact force. Therefore, the fall impact force was reduced significantly when the airbag was applied. This will enable new convergence products to be launched on the market and produce an environment where industrial workers can work safely.

Study on Guideline of Water Supply System for Forest Fire (산불방지 급수시설 설치 기준 마련에 관한 연구)

  • Kim, Dong-Hyun;Nam, Song-Hee;Keum, Si-Hoon
    • Fire Science and Engineering
    • /
    • v.27 no.3
    • /
    • pp.38-46
    • /
    • 2013
  • Permanent water supply and water sprinkling systems are essential to protect major forests and facilities from forest fire. Back in 2005, Naksan Temple, a valuable cultural asset of Korea, was burned down in a forest fire that took place in Yangyang. This started a series of movements including installing water supply facilities and managing forests near important cultural assets. As for the existing facilities, however, they were installed without any standard guidelines for management and installation according to each constructor's specifications, which were based on the National Fire Safety Code 109. Unfortunately, this is not effective in protecting facilities from forest fires such as they have a small protection area, limited simultaneous sprinkling, and a difficult the movement of fire hose. Against this background, the study examines the condition of water supply facilities currently in use, identifies their deficiencies, and suggests how to improve the criteria for water supply service to effectively prevent forest fire. Specifically, three systems were proposed: Water Sprinkler Tower System for preventing spread of crown fires, and Forest Fire Hydrant System and Portable Water Spray System to be effective for suppressing surface fires. In addition, the standards on the performance and components of water pumps are also suggested.

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

Double Queue CBOKe Mechanism for Congestion Control (이중 큐 CHOKe 방식을 사용한 혼잡제어)

  • 최기현;신호진;신동렬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11A
    • /
    • pp.867-875
    • /
    • 2003
  • Current end-to-end congestion control depends only on the information of end points (using three duplicate ACK packets) and generally responds slowly to the network congestion. This mechanism can't avoid TCP global synchronization in which TCP congestion window size is fluctuated during congestion period. Furthermore, if RTT(Round Trip Time) is increased, three duplicate ACK packets are not correct congestion signals because congestion might already disappear and the host may send more packets until it receives three duplicate ACK packets. Recently there are increasing interests in solving end-to-end congestion control using AQM(Active Queue Management) to improve the performance of TCP protocols. AQM is a variation of RED-based congestion control. In this paper, we first evaluate the effectiveness of the current AQM schemes such as RED, CHOKe, ARED, FRED and SRED, over traffic with different rates and over traffic with mixed responsive and non-responsive flows, respectively. In particular, CHOKe mechanism shows greater unfairness, especially when more unresponsive flows exist in a shared link. We then propose a new AQM scheme using CHOKe mechanism, called DQC(Double Queue CHOKe), which uses two FIFO queues before applying CHOKe mechanism to adaptive congestion control. Simulation shows that it works well in protecting congestion-sensitive flows from congestion-causing flows and exhibits better performances than other AQM schemes. Also we use partial state information, proposed in LRURED, to improve our mechanism.

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping (대역폭 감소를 적용한 MPEG-4 미디어 전송시의 암호화 기법 연구)

  • Shin, Dong-Kyoo;Shin, Dong-Il;Park, Se-Young
    • The KIPS Transactions:PartB
    • /
    • v.15B no.6
    • /
    • pp.575-584
    • /
    • 2008
  • According to the network condition, the communication network overload could be occurred when media transmitting. Many researches are being carried out to lessen the network overload, such as the filtering, load distributing, frame dropping and many other methods. Among these methods, one of effective method is frame dropping that reduces specified video frames for bandwidth diminution. B frames are dropped and then I, P frames are dropped according to dependency among the frames in frame dropping. This paper proposes a scheme for protecting copyrights by encryption, when we apply frame dropping to reduce bandwidth of media following MPEG-4 file format. We designed two kinds of frame dropping: first one stores and then sends the dropped files and the other drops frames in real-time when transmitting. We designed three kinds of encryption methods in which DES algorithm is used to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I, P-VOP. Based on these three methods, we implemented a digital right management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption and quality of video sequences to select an optimal method, and there is no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in encryption and decryption of frames was obtained when we apply the macro block and motion vector encryption in I, P-VOP.