• 제목/요약/키워드: Storage mechanism

검색결과 507건 처리시간 0.022초

Rigid plastic analysis for the seismic performance evaluation of steel storage racks

  • Montuori, Rosario;Gabbianelli, Giammaria;Nastri, Elide;Simoncelli, Marco
    • Steel and Composite Structures
    • /
    • 제32권1호
    • /
    • pp.1-19
    • /
    • 2019
  • The aim of the paper is the prediction of the seismic collapse mode of steel storage pallet racks under seismic loads. The attention paid by the researchers on the behaviour of the industrial steel storage pallets racks is increased over the years thanks to their high dead-to-live load ratio. In fact, these structures, generally made by cold-formed thin-walled profiles, present very low structural costs but can support large and expensive loads. The paper presents a prediction of the seismic collapse modes of multi-storey racks. The analysis of the possible collapse modes has been made by an approach based on the kinematic theorem of plastic collapse extended to the second order effects by means of the concept of collapse mechanism equilibrium curve. In this way, the dissipative behaviour of racks is determined with a simpler method than the pushover analysis. Parametric analyses have been performed on 24 racks, differing for the geometric layout and cross-section of the components, designed in according to the EN16618 and EN15512 requirements. The obtained results have highlighted that, in all the considered cases, the global collapse mechanism, that is the safest one, never develops, leading to a dangerous situation that must be avoided to preserve the structure during a seismic event. Although the studied racks follow all the codes prescriptions, the development of a dissipative collapse mechanism is not achieved. In addition, also the variability of load distribution has been considered, reflecting the different pallet positions assumed during the in-service life of the racks, to point out its influence on the collapse mechanism. The information carried out from the paper can be very useful for designers and manufacturers because it allows to better understand the racks behaviour in seismic load condition.

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

신뢰경로가 보장되는 보안커널 설계 및 구현 (The design and implementation of security kernel assured trusted path)

  • 이해균;김재명;조인준
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2001년도 종합학술발표회논문집
    • /
    • pp.340-347
    • /
    • 2001
  • MAC(Mandatory Access Control)이나 MLS(Multi Level Security) 보안정책이 적용된 보안운영체제는 주체와 객체에 보안등급(Security Level)과 영역(Category) 값을 부여하고, 부여된 이들 정보에 의해 객체에 행해지는 주체의 접근을 제한한다. 하지만, 이러한 MAC과 MLS 보안이 적용된 경우라 하더라도 시스템의 보안정책을 위반하며 불법적 정보를 유통하게 하는 경로가 있을 수 있다. 본 논문에서는 불법적 정보의 유통경로가 되고 있는 IPC(Inter Process Communication) 메커니즘과 스토리지에 의한 비밀채널을(Covert Channel) 문제 해결 위해 커널 수준의 설계와 구현을 시도하였다. IPC 메커니즘에 의한 불법적 정보흐름 제거를 위해 IPC 메커니즘에 MLS 보안정책을 적용하였고, 스토리지 비밀채널는 시스템 콜 명세를 분석하여 이를 식별, 감사, 지연처리가 가능토록 하였다.

  • PDF

A Data-Consistency Scheme for the Distributed-Cache Storage of the Memcached System

  • Liao, Jianwei;Peng, Xiaoning
    • Journal of Computing Science and Engineering
    • /
    • 제11권3호
    • /
    • pp.92-99
    • /
    • 2017
  • Memcached, commonly used to speed up the data access in big-data and Internet-web applications, is a system software of the distributed-cache mechanism. But it is subject to the severe challenge of the loss of recently uncommitted updates in the case where the Memcached servers crash due to some reason. Although the replica scheme and the disk-log-based replay mechanism have been proposed to overcome this problem, they generate either the overhead of the replica synchronization or the persistent-storage overhead that is caused by flushing related logs. This paper proposes a scheme of backing up the write requests (i.e., set and add) on the Memcached client side, to reduce the overhead resulting from the making of disk-log records or performing the replica consistency. If the Memcached server fails, a timestamp-based recovery mechanism is then introduced to replay the write requests (buffered by relevant clients), for regaining the lost-data updates on the rebooted Memcached server, thereby meeting the data-consistency requirement. More importantly, compared with the mechanism of logging the write requests to the persistent storage of the master server and the server-replication scheme, the newly proposed approach of backing up the logs on the client side can greatly decrease the time overhead by up to 116.8% when processing the write workloads.

지연시간의 변화를 고려한 연속미디어 표현 메카니즘의 설계 및 분석 (Design and Analysis of Continuous Media Representation Mechanism to minimize the Variance of Latency Time)

  • 여인국;황대훈
    • 한국정보처리학회논문지
    • /
    • 제2권5호
    • /
    • pp.787-796
    • /
    • 1995
  • 본 논문에서는 광디스크, 디지탈 테이프 등과 같은 제3의 저장 장치의 활용을 높 이기 위하여 다중의 디스크와 CD-ROM으로 구성된 저장구조를 제안하고, 이 구조에서 CD-ROM에 저장된 연속미디어 객체들을 효율적으로 표현하는 메카니즘을 설계한다. 본 논문에서는 제안한 연속미디어 저장 구조는 대역폭이 높은 SCSI 버스를 다중의 디스크 가 공유하여 데이타를 전송함으로써 정보의 검색 능력을 향상시킨다. 그리고 연속미디 어 표현 메카니즘은 CD-ROM의 연속미디어 객체의 인출과 표현을 병렬로 수행시켜 연속 미디어 표현의 불연속을 감소시킬 뿐만 아니라 자주 참조되는 객체를 디스크에 존재케 함으로써 재참조 요청에 대한 실기율과 서비스 시간의 변화를 최소화한다.

  • PDF

중복 데이터 관리 기법을 통한 저장 시스템 성능 개선 (Storage System Performance Enhancement Using Duplicated Data Management Scheme)

  • 정호민;고영웅
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제37권1호
    • /
    • pp.8-18
    • /
    • 2010
  • 기존의 전통적인 저장 서버는 중복 데이터 블록에 의해서 저장 공간과 네트워크 대역폭의 낭비가 발생되고 있다. 이와 같은 문제를 해결하기 위하여, 다양한 중복 제거 메커니즘이 제시되었으나, 대부분 Contents-Defined Chunking (CDC) 기법을 사용하는 백업 서버에 한정되었다. 왜냐하면 CDC 기법은 앵커를 사용하여 중복 블록을 쉽게 추적할 수 있기 때문에 파일의 업데이트를 관찰하기 유리한 백업 시스템에서 널리 사용되고 있는 것이다. 본 논문에서는 저장 시스템 성능을 개선하기 위하여, 새로운 중복 제거 메커니즘을 제시하고 있다. 범용적인 중복제거 서버를 구축하기 위한 효율적인 알고리즘에 초점을 맞추고 있으며, 이를 통하여 백업 서버, P2P 서버, FTP 서버와 같은 다양한 시스템에 활용이 가능하게 하는 것을 목표로 한다. 실험 결과 제안한 알고리즘이 중복 영역의 블록을 찾아내는 시간을 최소화하고 효율적으로 저장 시스템을 관리하는 것을 보였다.

Immunocytochemical Study on the Translocation Mechanism of Glucose Transporters by Insulin

  • Hah, Jong-Sik;Kim, Ku-Ja
    • The Korean Journal of Physiology
    • /
    • 제27권2호
    • /
    • pp.123-138
    • /
    • 1993
  • The mechanism of insulin action to increase glucose transport is attributed to glucose transporter translocation from intracellular storage pools to the plasma membrane in insulin-sensitive cells. The present study was designed to visualize the redistribution of the glucose transporter by means of an immunogold labelling method. Our data clearly show that glucose transporter molecules were visible by this method. According to the method this distribution of glucose transporters between cell surface and intracellular pool was different in adipocytes. The glucose transporter molecules were randomly distributed at the cell surface whereas the molecules at LDM were farmed as clusters. By insulin treatment the number of homogeneous random particles increased at the cell surface whereas the cluster forms decreased at the intracellular storage pools. It suggests that the active molecules needed to be evenly distributed far effective function and that the inactive molecules in storage pools gathered and termed clusters until being transferred to the plasma membrane.

  • PDF

Laves phase계 수소저장합금의 전기화학적 수소화 반응 매카니즘에 관한 연구 (A Study on the Electrochemical Hydrogenation Reaction Mechanism of the Laves Phase Hydrogen Storage Alloys)

  • 이지열;김찬중;김대용
    • 한국수소및신에너지학회논문집
    • /
    • 제8권1호
    • /
    • pp.31-41
    • /
    • 1997
  • In order to investigate the mechanism of electrochemical hydrogenation reaction on Zr-based Laves phase hydrogen storage alloy electrodes, electrochemical charge/discharge characteristics, potentiostatic/dynamic polarizations and electrocehmical impedance spectroscopy(EIS) of Zr-Ti-Mn-Ni and Zr-Ti-Mn-Ni-M(M=Fe, Co, Al) alloys were examined. Electrochemical discharge capacities of the alloys were quite different with gas charge capacities. Therefore, it was considered that discharge capacities of the alloys depend on electrochemical kinetic factors rather then thermodynamic ones. Discharge efficiencies were increased linearly with exchange current densities. The results of potentiostatic/dynamic polarization measurements showed that electrochemical charge and discharge reaction of Zr-based Laves phase hydrogen storage alloys is controlled by charge transfer process at the electrode surface. The EIS measurements also confirmed this result.

  • PDF

Information Processing in Primate Retinal Ganglion

  • Je, Sung-Kwan;Cho, Jae-Hyun;Kim, Gwang-Baek
    • Journal of information and communication convergence engineering
    • /
    • 제2권2호
    • /
    • pp.132-137
    • /
    • 2004
  • Most of the current computer vision theories are based on hypotheses that are difficult to apply to the real world, and they simply imitate a coarse form of the human visual system. As a result, they have not been showing satisfying results. In the human visual system, there is a mechanism that processes information due to memory degradation with time and limited storage space. Starting from research on the human visual system, this study analyzes a mechanism that processes input information when information is transferred from the retina to ganglion cells. In this study, a model for the characteristics of ganglion cells in the retina is proposed after considering the structure of the retina and the efficiency of storage space. The MNIST database of handwritten letters is used as data for this research, and ART2 and SOM as recognizers. The results of this study show that the proposed recognition model is not much different from the general recognition model in terms of recognition rate, but the efficiency of storage space can be improved by constructing a mechanism that processes input information.

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks

  • Jeong, Yoon-Su;Kim, Yong-Tae;Shin, Seung-Soo;Lee, Sang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.923-948
    • /
    • 2013
  • The main concern in mobile peer-to-peer (P2P) networks is security because jamming or eavesdropping on a wireless link is much easier than on a wired one and such damage can be incurred without physical access or contact. In particular, authentication has increasingly become a requirement in mobile P2P environments. This paper presents a new mutual authentication mechanism which requires less storage space and maintains a high level of security in mobile P2P networks. The proposed mechanism improves efficiency by avoiding the use of centralized entities and is designed to be agile in terms of both reliability and low-cost implementation. The mechanism suggested in the simulation evaluates the function costs occurring in authentication between the devices under mobile P2P network environment comparing to existing method in terms of basic operation costs, traffic costs, communications costs, storage costs and scalability. The simulation results show that the proposed mechanism provides high authentication with low cryptography processing overhead.