• Title/Summary/Keyword: Storage policy

Search Result 505, Processing Time 0.027 seconds

A Dynamic Storage Allocation Algorithm with Predictable Execution Time (예측 가능한 실행 시간을 가진 동적 메모리 할당 알고리즘)

  • Jeong, Seong-Mu;Yu, Hae-Yeong;Sim, Jae-Hong;Kim, Ha-Jin;Choe, Gyeong-Hui;Jeong, Gi-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2204-2218
    • /
    • 2000
  • This paper proposes a dynamic storage allocation algorithm, QHF(quick-half-fit) for real-time systems. The proposed algorithm manages a free block list per each worked size for memory requests of small size, and a free block list per each power of 2 size for memory requests of large size. This algorithms uses the exact-fit policy for small sie requests and provides high memory utilization. The proposed algorithm also has the time complexity O(I) and enables us to easily estimate the worst case execution time (WCET). In order to confirm efficiency of the proposed algorithm, we compare he memory utilization of proposed algorithm with that of half-fit and binary buddy system that have also time complexity O(I). The simulation result shows that the proposed algorithm guarantees the constant WCET regardless of the system memory size and provides lower fragmentation ratio and allocation failure ratio thant other two algorithms.

  • PDF

M/G/1 Queueing Model for the Performance Estimation of AS/RS (자동창고시스템의 성능평가를 위한 M/G/1 대기모형)

  • Lim, Si-Yeong;Hur, Sun;Lee, Moon-Hwan;Lee, Young-Hae
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.27 no.1
    • /
    • pp.111-117
    • /
    • 2001
  • Most of the techniques for the performance estimation of unit-load AS/RS are a static model or computer simulation. Especially, their models have been developed under the assumption that the Storage/Retrieval (S/R) machine performs either single command(SC) or dual command(DC) only. In reality, depending on the operating policy and the status of the system at a particular time, the S/R machine performs a SC or a DC, or becomes idle. In order to resolve this weak point, we propose a stochastic model for the performance estimation of unit-load ASIRS by using a M/G/1 queueing model with a single server and two queues. Server utilization, expected numbers of waiting storage and retrieval commands and mean time spent in queue and system are found.

  • PDF

Determination of the Optimal Configuration of Operation Policies in an Integrated-Automated Manufacturing System Using the Taguchi Method and Simulation Experiments (다구치방법과 시뮬레이션을 이용한 통합된 자동생산시스템의 최적운영방안의 결정)

  • Lim, Joon-Mook;Kim, Kil-Soo;Sung, Ki-Seok
    • IE interfaces
    • /
    • v.11 no.3
    • /
    • pp.23-40
    • /
    • 1998
  • In this paper, a method to determine the optimal configuration of operating policies in an integrated-automated manufacturing system using the Taguchi method and computer simulation experiments is presented. An integrated-automated manufacturing system called direct-input-output manufacturing system(DIOMS) is described. We only consider the operational aspect of the DIOMS. Four operating policies including input sequencing control, dispatching rule for the storage/retrieval(S/R) machine, machine center-based part type selection rule, and storage assignment policy are treated as design factors. The number of machine centers, the number of part types, demand rate, processing time and the rate of each part type, vertical and horizontal speed of the S/R machine, and the size of a local buffer in the machine centers are considered as noise factors in generating various manufacturing system environment. For the performance characteristics, mean flow time and throughput are adopted. A robust design experiment with inner and outer orthogonal arrays are conducted by computer simulation, and an optimal configuration of operating policies is presented which consists of a combination of the level of each design factor. The validity of the optimal configurations is investigated by comparing their signal-to-noise ratios with those obtained with full factorial designs.

  • PDF

A Study on Improved Split Algorithms for Moving Object Trajectories in Limited Storage Space (한정된 저장 공간상에서 이동 객체 궤적들에 대한 개선된 분할 알고리즘에 관한 연구)

  • Park, Ju-Hyun;Cho, Woo-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2057-2064
    • /
    • 2010
  • With the development of wireless network technology, the location information of a spatiotemporal object which changes their location is used in various application. Each spatiotemporal object has many location information, hence it is inefficient to search all trajectory information of spatiotemporal objects for a range query. In this paper, we propose an efficient method which divides a trajectory and stores its division data on restricted storage space. Using suboptimal split algorithm, an extended split algorithm that minimizes the volume of EMBRs(Extended Minimum Bounding Box) is designed and simulated. Our experimental evaluation confirms the effectiveness and efficiency of our proposed splitting policy

Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3699-3719
    • /
    • 2017
  • Conjunctive keyword search encryption is an important technique for protecting sensitive personal health records that are outsourced to cloud servers. It has been extensively employed for cloud storage, which is a convenient storage option that saves bandwidth and economizes computing resources. However, the process of searching outsourced data may facilitate the leakage of sensitive personal information. Thus, an efficient data search approach with high security is critical. The multi-user search function is critical for personal health records (PHRs). To solve these problems, this paper proposes a novel multi-user conjunctive keyword search scheme (mNCKS) without a secure channel against keyword guessing attacks for personal health records, which is referred to as a secure channel-free mNCKS (SCF-mNCKS). The security of this scheme is demonstrated using the Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions in the standard model. Comparisons are performed to demonstrate the security advantages of the SCF-mNCKS scheme and show that it has more functions than other schemes in the case of analogous efficiency.

A Study on the Estimation of REC Multiplier for ESS Introduction (ESS 부가 설치형 REC 가중치 산정에 관한 연구)

  • Kim, Kang-Won;Kim, Balho H.
    • Journal of Energy Engineering
    • /
    • v.23 no.4
    • /
    • pp.106-111
    • /
    • 2014
  • In order to manage the gradual increase of electricity demand, the United States, Japan, and Europe are seeking to achieve overall change of electric power system by introducing solutions such as smart grid. Among these solutions, there are various research projects regarding the Electricity Storage System (ESS), which aims to promote the efficient usage of electricity and grid system of new and renewable energy system. Korean government revised the law by including ESS in new and renewable energy facilities to accelerate ESS deployment. Following the same direction of the government policy, this study suggests methodologies of setting REC weighted value that guarantees investment financial feasibility when new and renewable power producers install ESS.

A Case Study on the Technology Tree Methodology of Energy R&D (에너지연구개발(R&D)위한 기술계통도(Technology Tree) 기획방법론 활용 사례 - 에너지저장 기술 중심으로)

  • Kang, Geun Young;Yun, Ga-Hye;Kim, Donghwan
    • New & Renewable Energy
    • /
    • v.9 no.2
    • /
    • pp.40-50
    • /
    • 2013
  • Government spending on research and development increased continuously is much more important to decision-making methodology for rational investment. Rely on a group of minority experts in the application of a general methodology, a tipping effect occur in specific technology field or difficult balanced procedure and objective control to maintain. This paper presents a qualitative-quantitative methodology to avoid such risks by utilizing Technology-Tree pertaining to energy R&D planning of the government Energy Technology Development program. Especially Energy Technology Development program "energy storage system" is applied to the analysis of Technology-Tree, mapping and analysis of existing government-supported projects during the recent 5 years, is derived essential missing elements of the technology value chain. This study suggests that significant evidence is utilized for improving efficiency of government R&D budget considering the importance of technology, domestic research-based and so forth, could be used to implement the R&D project planning.

Optimal Harvest-Use-Store Design for Delay-Constrained Energy Harvesting Wireless Communications

  • Yuan, Fangchao;Jin, Shi;Wong, Kai-Kit;Zhang, Q.T.;Zhu, Hongbo
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.902-912
    • /
    • 2016
  • Recent advances in energy harvesting (EH) technology have motivated the adoption of rechargeable mobile devices for communications. In this paper, we consider a point-to-point (P2P) wireless communication system in which an EH transmitter with a non-ideal rechargeable battery is required to send a given fixed number of bits to the receiver before they expire according to a preset delay constraint. Due to the possible energy loss in the storage process, the harvest-use-and-store (HUS) architecture is adopted. We characterize the properties of the optimal solutions, for additive white Gaussian channels (AWGNs) and then block-fading channels, that maximize the energy efficiency (i.e., battery residual) subject to a given rate requirement. Interestingly, it is shown that the optimal solution has a water-filling interpretation with double thresholds and that both thresholds are monotonic. Based on this, we investigate the optimal double-threshold based allocation policy and devise an algorithm to achieve the solution. Numerical results are provided to validate the theoretical analysis and to compare the optimal solutions with existing schemes.

A Study on the Energy Saving Capacity of Solar Power Generation System using Economic Evaluation (경제성 평가를 통한 태양광발전시스템 연계형 에너지저장장치 용량 선정에 관한 연구)

  • Lee, Yeo-Jin;Kim, Sung-Yul;Han, Se-Kyung
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.1
    • /
    • pp.21-26
    • /
    • 2018
  • Due to the international environmental regulations and changes in policies, the demand for generators using the renewable energy is increasing. However, renewable energy generators with intermittent output characteristics such as solar and wind power generators, need the buffer facilities such as ESS during system operations. However, because of low price competitiveness in energy storage system, it is difficult to operate the renewable energy generator with ESS. Therefore, the government has recently proposed a policy to compensate the REC for renewable energy system with ESS. For all this, since the initial cost of the ESS is high, it is the most important to calculate and operate the optimal capacity of the ESS through an economic analysis. In this paper, we proposed the method of calculation the optimal capacity of ESS and analyzed economic feasibility of renewable energy system using the ESS according to depreciation in ESS price.

A Study on the Protection of User Data in the Cloud System (클라우드 시스템에서의 사용자 데이터 보호에 관한 연구)

  • Lee, Ae-Ri;Cho, Do-Eun;Lee, Jae-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.389-394
    • /
    • 2012
  • The cloud computing is a system that provides IT resources service by using internet technologies, which grabs lots of attention today. Though cloud storage services provide service users with convenience, there is a problem in which data confidentiality is not guaranteed because it is hard for data owners to control the access to the data. This article suggested the technique by applying Public-Key Cryptosystem only to a block after dividing users' data into blocks in order to protect users' data in cloud system. Thus confidentiality and integrity are given to users' data stored in cloud storage server.