• Title/Summary/Keyword: The efficient of explosion

Search Result 89, Processing Time 0.028 seconds

The Analysis of Genome Database Compaction based on Sequence Similarity (시퀀스 유사도에 기반한 유전체 데이터베이스 압축 및 영향 분석)

  • Kwon, Sunyoung;Lee, Byunghan;Park, Seunghyun;Jo, Jeonghee;Yoon, Sungroh
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.4
    • /
    • pp.250-255
    • /
    • 2017
  • Given the explosion of genomic data and expansion of applications such as precision medicine, the importance of efficient genome-database management continues to grow. Traditional compression techniques may be effective in reducing the size of a database, but a new challenge follows in terms of performing operations such as comparison and searches on the compressed database. Based on that many genome databases typically have numerous duplicated or similar sequences, and that the runtime of genome analyses is normally proportional to the number of sequences in a database, we propose a technique that can compress a genome database by eliminating similar entries from the database. Through our experiments, we show that we can remove approximately 84% of sequences with 1% similarity threshold, accelerating the downstream classification tasks by approximately 10 times. We also confirm that our compression method does not significantly affect the accuracy of taxonomy diversity assessments or classification.

A Hybrid Modeling Method for RCS Worm Simulation (RCS 웜 시뮬레이션을 위한 Hybrid 모델링 방법)

  • Kim, Jung-Sik;Park, Jin-Ho;Cho, Jae-Ik;Choi, Kyoung-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.43-53
    • /
    • 2007
  • Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. Simulation is one of the most widely used method to study internet worms. But, it is quite challenging to simulate very large-scale worm attacks because of various reasons. In this paper, we propose a hybrid modeling method for RCS(Random Constant Spreading) worm simulation. The proposed hybrid model simulates worm attacks by synchronizing modeling network and packet network. So, this model will be both detailed enough to generate realistic packet traffic, and efficient enough to model a worm spreading through the Internet. Moreover, our model have the capability of dynamic updates of the modeling parameters. Finally, we simulate the hybrid model with the CodeRed worm to show validity of our proposed model for RCS worm simulation.

A study for the reduction of network traffic through an efficient processing of the trend analysis information (경향분석 정보의 효율적인 처리를 통한 네트워크 트래픽 감소 방안에 대한 연구)

  • Youn, Chun-Kyun
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.323-333
    • /
    • 2012
  • Network traffic demand is increasing explosively because of various smart equipment and services on smart era. It causes of traffic overload for wireless and wired network. Network management system is very important to control the explosion of data traffic. It uses SNMP to communicate with various network resources for management functions and creates lots of management traffic. Those are can be serious traffic congestion on a network. I propose an improving function of SNMP to minimize unnecessary traffics between manager and agent for collecting the Trend Analysis Information which is mainly used to monitor and accumulate for a specific time period in this paper. The results of test show it has compatibility with the existing SNMP and greatly decreases the amount of network traffic and response time.

Implementation of One-chip Package IC for Drone Battery Protection (드론용 배터리 보호를 위한 원칩 패키지 IC 구현)

  • Ju-Yeon Lee;Sung-Goo Yoo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.25 no.1
    • /
    • pp.46-51
    • /
    • 2024
  • Drone was first used for military purposes but as the range of use has recently expanded. It is being widely used in various industrial fields such as agriculture, service, logistics, and leisure. Lithium polymer batteries are lightweight and highly efficient, so they are mainly used as power supplies for drones. Accordingly, the need for lightweight and high energy density lithium polymer batteries has increased in order to supply stable power to drone. However, lithium polymer batteries can lead to ignition and explosion due to overcharging, short circuit, etc., so they must be used with a protective circuit installed. The protection circuit consists of a protection IC that monitors the voltage of the lithium polymer battery and a dual N-channel MOSFET that acts as a switch in case of overcharge and overdischarge. Therefore, this paper was implemented in one package form using a battery protection IC and a MOSFET semiconductor die chip serving as a switch. When implemented as a one chip package IC, at least 67% of savings compared to existing parts can be achieved.

Diagnosing Multiple Faults using Multiple Context Spaces (다중 상황공간을 이용한 다중 오류의 고장 진단)

  • Lee, Gye-Sung;Gwon, Gyeong-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.137-148
    • /
    • 1997
  • Diagnostic problem solving is a major application area of knowledge-based systems research. However, most of the current approaches, both heuristic and model-based, are designed to identify single faults, and do not generalize easily to multiple fault diagnosis without exhibiting exponential behavior in the amount of computation required. In this paper, we employ a decomposition approach based on system configuration to generate an efficient algorithm for multiple fault diagnosis. The basic idea of the algorithm is to reduce the inherent combinatorial explosion that occurs in generating multiple faults by partitioning the circuit into groups that correspond to output measurement points. Rules are multiple faults by partitioning the circuit into groups that correspond to output measurement points. rules are developed for combining candidates from individual groups, and forming consistent sets of minimal candidates.

  • PDF

Development of Configuration Management Methodology for Rocket Development Test Facilities (발사체 개발 시험시설의 형상관리 방법론 개발)

  • Jeon, Chanmin;Choi, Minchan;Park, Taekeun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.24 no.3
    • /
    • pp.31-41
    • /
    • 2023
  • This study is a study to develop a configuration management methodology for efficient and systematic management in the event of configuration changes such as deformation, explosion, and remodeling of launch vehicle development test facilities, which are emerging as important national facilities in the era of full-scale space competition. Through the analysis of international standards for configuration management, a configuration management process framework to be applied to launch vehicle development test facilities is extracted, a survey was conducted on experts who performed life cycle engineering of launch vehicle development test facilities, and a configuration management methodology optimized for operation/management of domestic launch vehicle development test facilities was proposed. Identify the configuration for launch vehicle development test facilities, the configuration management manager, configuration management organization, and configuration management board approve/process the configuration changes, and after construction is completed according to design requirements, launch vehicle development test facilities try to manage the configuration in a controlled state.

Case Analysis of the Harmful Chemical Substances' Spill (유해화학물질 유출의 사례 분석)

  • You, Jisun;Chung, Yeong-Jin
    • Fire Science and Engineering
    • /
    • v.28 no.6
    • /
    • pp.90-98
    • /
    • 2014
  • Lately accidents of harmful chemical substance in korea were repeatedly replaying. We studied problems and preparation plan in 2008 years~2014 years through analysis cases of harmful chemical substance. Leakage of chemical substance's accident situation shows that leakage in the workplace is the most 10 cases, accounting for 58.6% is the largest proportion in 2009. Leakage according to explosion accounting for 50% (5 cases) in 2004, 25% (4 cases) in 2007 and 33.3% (4 cases) in 2011 has very irregular change. Therefore, A major cause of accidents is lack of safety management. Harmful chemical substance showed various aspects, high residual substance and non-visible characteristic so response and recovery was easy. And the second damage to move a distance causes environment pollution. So a mutual-assistance system and integrated system of related organization have to build and expert of chemical incident response and therapist of chemical substance response have to establish to do efficient and rapid response.

Study on Standard Symptoms and Gender Differences of Qi${\cdot}$Xue${\cdot}$Yin${\cdot}$Yang Asthenia Syndromes Based on Questionnaire Analysis (설문지 분석법에 의한 기허 혈허 기체 음허 양허증(氣虛 血虛 氣滯 陰虛 陽虛證)의 표준 증상 및 남녀차이 연구)

  • Kim, Kang-Tae;Eom, Hyun-Sup;Lee, In-Seon;Kim, Jong-Won;Chi, Gyoo-Yong
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.20 no.6
    • /
    • pp.1742-1748
    • /
    • 2006
  • In order to establish the manifestational symptoms in men and women and highly frequent symptoms(HFS) of deficiency of Qi and blood(氣虛, 血虛), stagnation of Qi(氣滯), deficiency of Yin(陰虛), deficiency of Yang(陽虛), and, 546 questionaires were analyzed through Cronbach alpha value and Pearson's correlative efficient. Symptomatic differences of male and female specimens were as follows. HFS of Qi deficiency were similar in terms of inactivity like mental and physical fatigue, enervation in men and women. In blood deficiency, dizziness and light sleep were common in men and women, but mucosal symptoms of conjunctiva, lip, nail bed were more frequent in women than men. Emotional explosion was common in Qi stagnation, then women had more motivation-related symptoms than men. Inner heat was frequently arisen in Yin deficiency in both, and the heat was expressed more common in exterior and upper part in women but in interior abdominal part in men. In Yang deficiency, main symptoms of men were feeling coldness in peripheral, but Qi deficiency symptoms were more common in women former than coldness.

Upcycling of Waste Jelly-Filled Communication Cables (폐 젤리충진 통신케이블 업사이클링 연구)

  • Cho, Sungsu;Lee, Sooyoung;Hong, Myunghwan;Seo, Minhye;Lee, Dukhee;Uhm, Sunghyun
    • Resources Recycling
    • /
    • v.24 no.2
    • /
    • pp.29-35
    • /
    • 2015
  • A feasibility test was carried out for upcycling of waste jelly-filled communication cables together with the development of environmentally friendly processes and equipments. High pressure water injection is proved to be an exceptionally environmentally friendly and highly efficient mechanical process. A batch-type cable barking equipment is designed and built on the basis of computational fluid dynamics modelling. It is optimized in terms of energy consumption and productivity with very high copper recovery of 99.5%. Copper nano-powder is prepared by an electrical wire explosion in ethanol media in order to improve the value of final products, and the preliminary economical assessment is also conducted.

Efficient Null Pointer Dereference Vulnerability Detection by Data Dependency Analysis on Binary (효율적 데이터 의존성 분석을 이용한 바이너리 기반 Null Pointer Dereference 취약점 탐지 도구)

  • Wenhui Jin;Heekuck Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.253-266
    • /
    • 2023
  • The Null Pointer Dereference vulnerability is a significant vulnerability that can cause severe attacks such as denial-of-service. Previous research has proposed methods for detecting vulnerabilities, but large and complex programs pose a challenge to their efficiency. In this paper, we present a lightweight tool for detecting specific functions in large binaryprograms through symbolizing variables and emulating program execution. The tool detects vulnerabilities through data dependency analysis and heuristics in each execution path. While our tool had an 8% higher false positive rate than the bap_toolkit, it detected all existing vulnerabilities in our dataset.