• Title/Summary/Keyword: Speed Log

Search Result 179, Processing Time 0.027 seconds

Designing Modulo $({2^n}-1)$ Parallel Multipliers and its Technological Application Using Op Amp Circuits (Op Amp 회로를 이용한, 모듈로 $({2^n}-1)$ 병렬 승산기의 설계 및 그 기술의 응용)

  • Lee, Hun-Giu;Kim, Chul
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.6
    • /
    • pp.436-445
    • /
    • 2001
  • In this paper, we introduce modulo ( 2$^n$-1) parallel-processing residue multipliers, using Op Amp circuits, and their technological application to designing binary multipliers. The limit of multiplying speed in computational processing is a serious harrier in the advances of VLSI technology. To solve this problem, we implement a class of modulo ( 2$^n$-1) parallel multipliers having superior time complexity to O( log$_2$( log$_2$( log$_2$$^n$))) by applying Op Amp circuits, while investigating their technological application to binary multipliers. Since they have excellent time & area complexity compared with previous parallel multipliers, and are applicable to designing binary multipliers of the same efficiency, such parallel multipliers possess high academic value. Indexing Terms Modular Multipliers. Binary Multipliers. Parallel Processing, Operational Amplifiers, Mersenne Numbers.

  • PDF

Identification of Linear and Nonlinear Dynamic Stability Characteristics of a Medium-size High-speed Turbocharger Rotor Supported by 3-lobe Bearings (3-로브 베어링으로 지지된 중형 고속 터보차저 로터의 선형 및 비선형 동적 안정성 특성 규명)

  • Lee, An-Sung;Kim, Byung-Ok
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.21 no.6
    • /
    • pp.562-569
    • /
    • 2011
  • In this study linear and nonlinear dynamic stability characteristics of a medium-size high-speed turbocharger, whose rotor is supported by two 3-lobe journal bearings, are analyzed to evaluate and identify the effects of its bearing design variables. The rotor has the rated speed of 40,500 rpm and maximum continuous speed of 45,000 rpm. At first, utilizing the linear stability analysis method, bearing designs of yielding stable or unstable LogDecs as small as possible are searched by manipulating with machined bearing clearances and preloads. As next, utilizing the nonlinear analysis method, limit cycles of the rotor responses at the rated and maximum continuous speeds are simulated to check their acceptances. Results have shown that for the turbocharger rotor-bearing system considered, the 3-lobe journal bearing design with a smaller machined clearance and a larger preload are preferred for the stable rotor responses. More importantly, since there exists a good correlation between the linear and nonlinear stability analysis results, it is concluded that firstly the linear stability analysis method may be applied to screen quickly the ranges of bearing designs for stable or least unstable solutions and then, lastly the nonlinear stability analysis method may be deployed to check an absolute motion stability in terms of the limit cycle.

Removal Efficiency of Microorganism and Pesticide Residues by a Using Surface Washing System on Yuja (Citrus junos Sieb ex Tanaka) (표면 세척 시스템에 의한 유자의 미생물 및 잔류농약의 제거효과)

  • Sung, Jung-Min;Kwon, Ki-Hyun;Kim, Jong-Hoon;Jeong, Jin-Woong
    • Food Science and Preservation
    • /
    • v.18 no.5
    • /
    • pp.627-635
    • /
    • 2011
  • This study was conducted to assess the effects of the removal of pesticide residues and microorganisms from yuja (Citrus junos Sieb ex Tanaka) using a surface-washing system, under the following washing conditions: 0.11, 0.42, and 0.73 m/s spray rotation speeds; 0.6, 0.9, and 1.2 MPa water pressure and 0.046, 0.092, and 0.138 m/s conveying speeds. Tap-water treatment was used as the control. The washing efficiency when using squid ink was highly correlated with the conveying speed and the spray rotation speed. In addition, the highest washing efficiency was achieved when the water pressure was 0.9 MPa. The microorganisms were reduced to 0.40 log CFU/g for the tap-water treatment, and all the treatments, except those at the conveying speed of 0.138 m/s and the spray rotation speed of 0.11 rpm (6.07 log CFU/g), produced higher removal efficiencies compared with the tap-water treatment. Reductions of 2.20 and 2.05 log CFU/g were achieved at the spray rotation speeds of 0.42 and 0.73, respectively. The largest reductions were observed when the conveying speed was 0.046 m/s. Higher pesticide residue removal efficiency values were obtained at slower conveying speeds and higher spray rotation speeds. Higher than 50% removal efficiency was achieved when the spray rotation speed was 0.046 m/s for spirodichlofen, deltamethrin, benomyl, thiophanate-methyl, and acequinocyl. Especially, the removal efficiency for benomyl and thiophanate-methyl was more than 90%. It can thus be concluded that the pesticide residues in yuja can be effectively reduced by washing the latter with a less-than-0.092-m/s conveying speed and a higher-than-0.42-m/s spray rotation speed.

[$L_1$] Shortest Paths with Isothetic Roads (축에 평행한 도로들이 놓여 있을 때의 $L_1$ 최단 경로)

  • Bae Sang Won;Kim Jae-Hoon;Chwa Kyung-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.976-978
    • /
    • 2005
  • We present a nearly optimal ($O(\nu\;min(\nu,\;n)n\;log\;n)$ time and O(n) srace) algorithm that constructs a shortest path map with n isothetic roads of speed $\nu$ under the $L_1$ metric. The algorithm uses the continuous Dijkstra method and its efficiency is based on a new geometric insight; the minimum in-degree of any nearest neighbor graph for points with roads of speed $\nu$ is $\Theta(\nu\;min(\nu,\;n))$, which is first shown in this paper. Also, this algorithm naturally extends to the multi-source case so that the Voronoi diagram for m sites can be computed in $O(\nu\;min(\nu,\;n)(n+m)log(n+m))$ time and O(n+m) space, which is also nearly optimal.

  • PDF

Extreme Value Analysis of Metocean Data for Barents Sea

  • Park, Sung Boo;Shin, Seong Yun;Shin, Da Gyun;Jung, Kwang Hyo;Choi, Yong Ho;Lee, Jaeyong;Lee, Seung Jae
    • Journal of Ocean Engineering and Technology
    • /
    • v.34 no.1
    • /
    • pp.26-36
    • /
    • 2020
  • An extreme value analysis of metocean data which include wave, wind, and current data is a prerequisite for the operation and survival of offshore structures. The purpose of this study was to provide information about the return wave, wind, and current values for the Barents Sea using extreme value analysis. Hindcast datasets of the Global Reanalysis of Ocean Waves 2012 (GROW2012) for a waves, winds and currents were obtained from the Oceanweather Inc. The Gumbel distribution, 2 and 3 parameters Weibull distributions and log-normal distribution were used for the extreme value analysis. The least square method was used to estimate the parameters for the extreme value distribution. The return values, including the significant wave height, spectral peak wave period, wind speed and current speed at surface, were calculated and it will be utilized to design offshore structures to be operated in the Barents Sea.

Design and Implementation of Unified Network Security System support for Traffic Management (종단간 트래픽 관리를 지원하는 통합 네트워크 보안시스템 설계 및 구현)

  • Hwang, Ho-Young;Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.267-273
    • /
    • 2011
  • The importance of networking capability is gaining more weight for enterprise business and high-speed Internet access with guaranteed security management is essential to companies. This paper presents a unified network security management solution to support high-speed Internet access, active security management, traffic classification and control. The presented system provides firewall, VPN, intrusion detection, contents filtering, traffic management, QoS management, and history log functions in unified manner implemented in a single appliance device located at the edge of enterprise networks. This will enable cost effective unified network security solution to companies.

Intensity estimation with log-linear Poisson model on linear networks

  • Idris Demirsoy;Fred W. Hufferb
    • Communications for Statistical Applications and Methods
    • /
    • v.30 no.1
    • /
    • pp.95-107
    • /
    • 2023
  • Purpose: The statistical analysis of point processes on linear networks is a recent area of research that studies processes of events happening randomly in space (or space-time) but with locations limited to reside on a linear network. For example, traffic accidents happen at random places that are limited to lying on a network of streets. This paper applies techniques developed for point processes on linear networks and the tools available in the R-package spatstat to estimate the intensity of traffic accidents in Leon County, Florida. Methods: The intensity of accidents on the linear network of streets is estimated using log-linear Poisson models which incorporate cubic basis spline (B-spline) terms which are functions of the x and y coordinates. The splines used equally-spaced knots. Ten different models are fit to the data using a variety of covariates. The models are compared with each other using an analysis of deviance for nested models. Results: We found all covariates contributed significantly to the model. AIC and BIC were used to select 9 as the number of knots. Additionally, covariates have different effects such as increasing the speed limit would decrease traffic accident intensity by 0.9794 but increasing the number of lanes would result in an increase in the intensity of traffic accidents by 1.086. Conclusion: Our analysis shows that if other conditions are held fixed, the number of accidents actually decreases on roads with higher speed limits. The software we currently use allows our models to contain only spatial covariates and does not permit the use of temporal or space-time covariates. We would like to extend our models to include such covariates which would allow us to include weather conditions or the presence of special events (football games or concerts) as covariates.

FAST : A Log Buffer Scheme with Fully Associative Sector Translation for Efficient FTL in Flash Memory (FAST :플래시 메모리 FTL을 위한 완전연관섹터변환에 기반한 로그 버퍼 기법)

  • Park Dong-Joo;Choi Won-Kyung;Lee Sang-Won
    • The KIPS Transactions:PartA
    • /
    • v.12A no.3 s.93
    • /
    • pp.205-214
    • /
    • 2005
  • Flash memory is at high speed used as storage of personal information utilities, ubiquitous computing environments, mobile phones, electronic goods, etc. This is because flash memory has the characteristics of low electronic power, non-volatile storage, high performance, physical stability, portability, and so on. However, differently from hard disks, it has a weak point that overwrites on already written block of flash memory is impossible to be done. In order to make an overwrite possible, an erase operation on the written block should be performed before the overwrite, which lowers the performance of flash memory highly. In order to solve this problem the flash memory controller maintains a system software module called the flash translation layer(FTL). Of many proposed FTL schemes, the log block buffer scheme is best known so far. This scheme uses a small number of log blocks of flash memory as a write buffer, which reduces the number of erase operations by overwrites, leading to good performance. However, this scheme shows a weakness of low page usability of log blocks. In this paper, we propose an enhanced log block buffer scheme, FAST(Full Associative Sector Translation), which improves the page usability of each log block by fully associating sectors to be written by overwrites to the entire log blocks. We also show that our FAST scheme outperforms the log block buffer scheme.

Design and Implementation of a Hadoop-based Efficient Security Log Analysis System (하둡 기반의 효율적인 보안로그 분석시스템 설계 및 구현)

  • Ahn, Kwang-Min;Lee, Jong-Yoon;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1797-1804
    • /
    • 2015
  • Integrated log management system can help to predict the risk of security and contributes to improve the security level of the organization, and leads to prepare an appropriate security policy. In this paper, we have designed and implemented a Hadoop-based log analysis system by using distributed database model which can store large amount of data and reduce analysis time by automating log collecting procedure. In the proposed system, we use the HBase in order to store a large amount of data efficiently in the scale-out fashion and propose an easy data storing scheme for analysing data using a Hadoop-based normal expression, which results in improving data processing speed compared to the existing system.

Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack (DDoS 공격에 대한 방화벽 로그 기록 취약점 분석)

  • Choun, Jun-Ho;Jang, Kun-Won;Jun, Moon-Seog;Shin, Dong-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.143-148
    • /
    • 2007
  • In the context of mass traffic, firewall system cannot record normal log files against DDoS attack. The loss of log record causes that a firewall system does not know whether a packet is normally filtered or not, and firewall log, which is an essential data for the counter measure of violation accident, cannot be verified as trusted. As a network speed increases, these problems happen more frequently and largely. Accordingly, the method to use simply additional hardware devices is not recommended for the popularization of firewall. This paper is devoted to verify the loss of iptable log that is the mother's womb of most domestic firewall systems and show that the log handling methods for conventional firewall systems are needed to improve.