• Title/Summary/Keyword: Speed Log

Search Result 181, Processing Time 0.021 seconds

A Result Analysis on Field Test for Localization Development of Axle Counter System (Axle Counter System 국산화 개발을 위한 현장시험 결과분석)

  • Ko, Joon-Young;Park, Jae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6214-6220
    • /
    • 2015
  • A track circuit has used stably more than 100 years for detecting train position, but solution of track circuit sort circuit incapacity due to a rust is necessary for side line in station yard, coast line and level crossing for conventional line in rural line. Domestically, Axle Counter System(ACS) has partially used for Hot Box System for high speed line and turnout for CBTC system. In contrast, most of countries has used ACS not only trunk line but also rural line and its application has increased for metro, electric car and industrial railway. In this paper, we has verified the operating status of ACS which installed with existing track circuit through log analsis to implement pilot application in mail track and turnout in station yard. And interface test with interlocking system has conducted at Obong shunting yard, as well as Cheongju station and has analyzed test result. Based on a test result, we made fail safe design, manufacturing skill and established system requirement specification for the smooth operation and maintenance.

Effect of trans-Cinnamaldehyde and High Pressure Treatment on Physico-chemical and Microbial Properties of Milk during Storage Periods

  • Chun, Ji-Yeon;Kim, Kwon-Beom;Shin, Jong-Boo;Min, Sang-Gi
    • Food Science of Animal Resources
    • /
    • v.33 no.1
    • /
    • pp.16-23
    • /
    • 2013
  • This study was carried out to investigate the effect of trans-cinnamaldehyde and high pressure treatment on milk. Cinnamon oil milk was manufactured by high speed homogenization (3,000 rpm) and high pressure homogenization (500 and 2,000 bar) processing UHT milk and trans-cinnamaldehyde of various concentrations (0 to 0.1% (w/v)). Cinnamon oil milk was inoculated with Escherichia coli (6.4 Log CFU/mL) and kept at $7^{\circ}C$ for 10 d to observe the antibacterial effect. The cinnamon oil milk containing 0.05% (w/v) trans-cinnamaldehyde initially began to show an antibacterial effect and Escherichia coli completely died in cinnamon oil milk added 0.1% (w/v) trans-cinnamaldehyde on the 6th day of storage. The result of the TBA value showed that the addition of 0.1% (w/v) trans-cinnamaldehyde was also effective to protect lipid oxidation. In the physical properties of cinnamon oil milk, particle sizes were enlarged in all samples during storage periods and the total color difference of cinnamon oil milk was slightly increased as level of high pressure. The surface tension of cinnamon oil milk treated 2,000 bar was remarkably higher than other samples. It seems that trans-cinnamaldehyde showed antibacterial activity and antioxidation effect at 0.05 and 0.1% (w/v) of concentration. Remarkably, high pressure treatment did not influence its microbial property but slightly affected the physical properties of cinnamon oil milk.

An Implementation of Fault Tolerant Software Distributed Shared Memory with Remote Logging (원격 로깅 기법을 이용하는 고장 허용 소프트웨어 분산공유메모리 시스템의 구현)

  • 박소연;김영재;맹승렬
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.328-334
    • /
    • 2004
  • Recently, Software DSMs continue to improve its performance and scalability As Software DSMs become attractive on larger clusters, the focus of attention is likely to move toward improving the reliability of a system. A popular approach to tolerate failures is message logging with checkpointing, and so many log-based rollback recovery schemes have been proposed. In this work, we propose a remote logging scheme which uses the volatile memory of a remote node assigned to each node. As our remote logging does not incur frequent disk accesses during failure-free execution, its logging overhead is not significant especially over high-speed communication network. The remote logging tolerates multiple failures if the backup nodes of failed nodes are alive. It makes the reliability of DSMs grow much higher. We have designed and implemented the FT-KDSM(Fault Tolerant KAIST DSM) with the remote logging and showed the logging overhead and the recovery time.

Distributed IoT Sensor based Laboratory Safety Management System (분산 IoT센서 기반 실험실 안전관리 시스템)

  • Jeong, Daejin;Kim, Jaeyoon;Bae, Sangjung;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.1
    • /
    • pp.90-96
    • /
    • 2019
  • Storage cabinet in a lab in these days measures various environmental factors in real-time with IoT sensors. Preexisting system collects sensor data, analyze a risk and then command other equipment. Such centralized control system tends to have an issue with of speed slowing down. It's because when there are more storage cabinets, there are more data to process. In order to solve this issue, this report addresses decentralized IoT sensor based lab safety control system. It can analyze internal state of storage cabinet to identify any hazardous situations and effectively control them. Such decentralized control system using sensor modules for internal environment of the cabinet storage and automated control algorithm based on administrator's log history can manage any hazardous situations by automated control of environment factors of inside a lab. It would allow users to deal with a hazard if it happens. Even better, it can prevent it to happen from the beginning.

Estimation of the survival function of the legislative process in Korea: based on the experiences of the 17th, 18th, and 19th National Assembly of Korea (국회 법안 검토 기간의 생존함수 추정: 제 17, 18, 19대 국회의 사례를 바탕으로)

  • Yun, Yeonggyu;Cho, Yunsoo;Jung, Hye-Young
    • The Korean Journal of Applied Statistics
    • /
    • v.32 no.4
    • /
    • pp.503-515
    • /
    • 2019
  • In this study we estimate the survival function of duration of the legislative processes in the 17th, 18th, and 19th National Assembly of Korea, and further analyze effects of the political situation variables on the legislative process. We define the termination of legislative process from a novel perspective to alleviate issues of dependency between censoring and failure in the data. We also show that the proportional hazards assumption does not hold for the data, and analyze data employing a log-normal accelerated failure time model. The policy areas of law agendas are shown to affect the speed of legislative process in different ways and legislative process tends to be prompt in times of divided governments.

A Study on the 4th Industrial Revolution and E-Government Security Strategy -In Terms of the Cyber Security Technology of Intelligent Government- (제4차 산업혁명과 전자정부 보안연구 -지능형 정부의 빅데이터 사이버보안기술 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.369-376
    • /
    • 2019
  • This paper studies desirable form of future e-government in terms of intelligent government research in response to new intelligent cyber security services in the fourth industrial revolution. Also, the strategic planning of the future e-government has been contemplated in terms of the centralization and intellectualization which are significant characteristics of the fourth industrial revolution. The new system construction which is applied with security analysis technology using big data through advanced relationship analysis is suggested in the paper. The establishment of the system, such as SIEM(Security Information & Event Management), which anticipatively detects security threat by using log information through big data analysis is suggested in the paper. Once the suggested system is materialized, it will be possible to expand big data object, allow centralization in terms of e-government security in the fourth industrial revolution, boost data process, speed and follow-up response, which allows the system to function anticipatively.

A Fast Method for Computing Multiplcative Inverses in GF(2$^{m}$ ) Using Normal Bases

  • 장용희;권용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.127-132
    • /
    • 2003
  • Cryptosystems have received very much attention in recent years as importance of information security is increased. Most of Cryptosystems are defined over finite or Galois fields GF($2^m$) . In particular, the finite field GF($2^m$) is mainly used in public-key cryptosystems. These cryptosystems are constructed over finite field arithmetics, such as addition, subtraction, multiplication, and multiplicative inversion defined over GF($2^m$) . Hence, to implement these cryptosystems efficiently, it is important to carry out these operations defined over GF($2^m$) fast. Among these operations, since multiplicative inversion is much more time-consuming than other operations, it has become the object of lots of investigation. Recently, many methods for computing multiplicative inverses at hi호 speed has been proposed. These methods are based on format's theorem, and reduce the number of required multiplication using normal bases over GF($2^m$) . The method proposed by Itoh and Tsujii[2] among these methods reduced the required number of times of multiplication to O( log m) Also, some methods which improved the Itoh and Tsujii's method were proposed, but these methods have some problems such as complicated decomposition processes. In practical applications, m is frequently selected as a power of 2. In this parer, we propose a fast method for computing multiplicative inverses in GF($2^m$) , where m = ($2^n$) . Our method requires fewer ultiplications than the Itoh and Tsujii's method, and the decomposition process is simpler than other proposed methods.

Study on Solutions to the Heavy Work of Safety Managers at Construction Sites (건설현장 안전관리자의 과중한 서류업무 해소방안 연구)

  • Cho Choonhwan
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.5 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • The purpose of this study is to suggest a way to solve the excessive paperwork of safety managers in domestic construction sites, and to suggest a work efficiency plan that can shorten the time required to prevent safety accidents. First, a function to automatically generate a safety document and find the necessary data is applied using the RPA program. The second is document creation using mobile devices. After safety training, use the Moleil app to keep the training log. Third, to prevent omission of essential safety and health documents, the automatic warning function is activated according to the RPA submission time and sent to the person in charge by e-mail or text. Fourth, the function to find the latest data with high accuracy and speed through 'Google Cloud Search', a search function, was applied.

A Fast Algorithm for Computing Multiplicative Inverses in GF(2$^{m}$) using Factorization Formula and Normal Basis (인수분해 공식과 정규기저를 이용한 GF(2$^{m}$ ) 상의 고속 곱셈 역원 연산 알고리즘)

  • 장용희;권용진
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.324-329
    • /
    • 2003
  • The public-key cryptosystems such as Diffie-Hellman Key Distribution and Elliptical Curve Cryptosystems are built on the basis of the operations defined in GF(2$^{m}$ ):addition, subtraction, multiplication and multiplicative inversion. It is important that these operations should be computed at high speed in order to implement these cryptosystems efficiently. Among those operations, as being the most time-consuming, multiplicative inversion has become the object of lots of investigation Formant's theorem says $\beta$$^{-1}$ =$\beta$$^{2}$sup m/-2/, where $\beta$$^{-1}$ is the multiplicative inverse of $\beta$$\in$GF(2$^{m}$ ). Therefore, to compute the multiplicative inverse of arbitrary elements of GF(2$^{m}$ ), it is most important to reduce the number of times of multiplication by decomposing 2$^{m}$ -2 efficiently. Among many algorithms relevant to the subject, the algorithm proposed by Itoh and Tsujii[2] has reduced the required number of times of multiplication to O(log m) by using normal basis. Furthermore, a few papers have presented algorithms improving the Itoh and Tsujii's. However they have some demerits such as complicated decomposition processes[3,5]. In this paper, in the case of 2$^{m}$ -2, which is mainly used in practical applications, an efficient algorithm is proposed for computing the multiplicative inverse at high speed by using both the factorization formula x$^3$-y$^3$=(x-y)(x$^2$+xy+y$^2$) and normal basis. The number of times of multiplication of the algorithm is smaller than that of the algorithm proposed by Itoh and Tsujii. Also the algorithm decomposes 2$^{m}$ -2 more simply than other proposed algorithms.

AFTL: An Efficient Adaptive Flash Translation Layer using Hot Data Identifier for NAND Flash Memory (AFTL: Hot Data 검출기를 이용한 적응형 플래시 전환 계층)

  • Yun, Hyun-Sik;Joo, Young-Do;Lee, Dong-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.1
    • /
    • pp.18-29
    • /
    • 2008
  • NAND Flash memory has been growing popular storage device for the last years because of its low power consumption, fast access speed, shock resistance and light weight properties. However, it has the distinct characteristics such as erase-before-write architecture, asymmetric read/write/erase speed, and the limitation on the number of erasure per block. Due to these limitations, various Flash Translation Layers (FTLs) have been proposed to effectively use NAND flash memory. The systems that adopted the conventional FTL may result in severe performance degradation by the hot data which are frequently requested data for overwrite in the same logical address. In this paper, we propose a novel FTL algorithm called Adaptive Flash Translation Layer (AFTL) which uses sector mapping method for hot data and log-based block mapping method for cold data. Our system removes the redundant write operations and the erase operations by the separating hot data from cold data. Moreover, the read performance is enhanced according to sector translation that tends to use a few read operations. A series of experiments was organized to inspect the performance of the proposed method, and they show very impressive results.