• Title/Summary/Keyword: dynamic demand

Search Result 963, Processing Time 0.03 seconds

A History-based Scheduler for Dynamic Load Balancing on Distributed VOD Server Environments (분산 VOD 서버 환경에서 히스토리 기반의 동적 부하분산 스케줄러)

  • Moon, Jongbae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.210-213
    • /
    • 2010
  • 최근 사용자의 멀티미디어에 대한 요구의 증가가 VOD (Video-on-Demand) 서비스를 발전시키게 되었다. VOD는 엔터테인먼트나 원격 교육, 광고 및 정보 등 많은 분야에서 사용되고 있다. 이러한 VOD 서비스는 많은 디스크 I/O와 네트워크 I/O를 요구하며 기존 웹 서버 시스템과 비교했을 때 오랜 시간동안 서비스를 해야 하는 특징을 가지고 있다. 또한 VOD 서비스는 많은 네트워크와 디스크의 대역폭을 요구하며, 서비스의 QoS에 민감해서 사용자 응답시간이 길어지면 사용자 요청의 취소율이 높아지게 된다. 따라서 불만족스러운 서비스의 증가로 네트워크 부하만 증가하게 된다. 이러한 기존 웹 서버 환경과는 다른 부하의 패턴이 있는 VOD 서비스 환경에서는 부하를 균형적으로 분배하여 서비스의 QoS를 높이는 것이 매우 중요하다. 본 논문에서는 분산 VOD 시스템 환경에서 부하를 효율적으로 분산하기 위해 계층형 분산 VOD 시스템 모델과 사용자 요청 패턴의 히스토리와 유전 알고리즘을 기반으로 한 스케줄러를 제안한다. 본 논문에서 제안한 계층형 분산 VOD 시스템 모델은 서버들을 지역적으로 분산하고 제어 서버를 지역마다 설치하여 지역에 있는 VOD 서버들을 관리하도록 구성한다. 사용자 요청을 지역 서버군 내에서 분산시키기 위해서 히스토리를 기반으로 한 유전 알고리즘을 사용한다. 이러한 히스토리 정보를 기반으로 유전 알고리즘의 적합도 함수에 적용하여 VOD 시스템을 위한 유전 알고리즘과 유전 연산을 구현한다. 본 논문에서 제안한 부하 분산 알고리즘은 VOD 서비스 환경에서 사용자 요구에 대한 부하를 보다 정확하게 예측하여 부하를 분산할 수 있다. 본 논문에서 제안한 계층형 분산 VOD 시스템의 부하 분산 알고리즘의 성능을 테스트하기 위해 OPNET 기반 시뮬레이터를 구현한다. 라운드로빈(round-robin) 방식과 랜덤(random) 방식과의 비교 실험을 통해 본 논문에서 제안한 부하 분산 알고리즘의 성능을 평가한다. 비교 실험을 통해 본 논문에서 제안한 알고리즘이 보다 안정적인 QoS를 제공하는 것을 보여준다.

Resonance analysis of cantilever porous graphene platelet reinforced pipe under external load

  • Huang, Qinghua;Yu, Xinping;Lv, Jun;Zhou, Jilie;Elvenia, Marischa Ray
    • Steel and Composite Structures
    • /
    • v.45 no.3
    • /
    • pp.409-423
    • /
    • 2022
  • Nowadays, there is a high demand for great structural implementation and multifunctionality with excellent mechanical properties. The porous structures reinforced by graphene platelets (GPLs) having valuable properties, such as heat resistance, lightweight, and excellent energy absorption, have been considerably used in different engineering implementations. However, stiffness of porous structures reduces significantly, due to the internal cavities, by adding GPLs into porous medium, effective mechanical properties of the porous structure considerably enhance. This paper is relating to vibration analysis of fluidconveying cantilever porous graphene platelet reinforced (GPLR) pipe with fractional viscoelastic model resting on foundations. A dynamical model of cantilever porous GPLR pipes conveying fluid and resting on a foundation is proposed, and the vibration, natural frequencies and primary resonant of such a system are explored. The pipe body is considered to be composed of GPLR viscoelastic polymeric pipe with porosity in which Halpin-Tsai scheme in conjunction with the fractional viscoelastic model is used to govern the construction relation of nanocomposite pipe. Three different porosity distributions through the pipe thickness are introduced. The harmonic concentrated force is also applied to the pipe and the excitation frequency is close to the first natural frequency. The governing equation for transverse motions of the pipe is derived by the Hamilton principle and then discretized by the Galerkin procedure. In order to obtain the frequency-response equation, the differential equation is solved with the assumption of small displacement, damping coefficient, and excitation amplitude by the multiple scale method. A parametric sensitivity analysis is carried out to reveal the influence of different parameters, such as nanocomposite pipe properties, fluid velocity and nonlinear viscoelastic foundation coefficients, on the primary resonance and linear natural frequency. Results indicate that the GPLs weight fraction porosity coefficient, fractional derivative order and the retardation time have substantial influences on the dynamic response of the system.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Cone-beam computed tomographic evaluation of the root canal anatomy of the lower premolars and molars in a Brazilian sub-population

  • Jessica Cecilia Almeida;Amanda Pelegrin Candemil;Gunther Ricardo Bertolini;Aline Evangelista Souza-Gabriel;Antonio Miranda Cruz-Filho;Manoel Damiao Sousa-Neto;Ricardo Gariba Silva
    • Imaging Science in Dentistry
    • /
    • v.53 no.1
    • /
    • pp.77-82
    • /
    • 2023
  • Purpose: This study evaluated anatomical variations in the root canals of the lower premolars and molars in a Brazilian sub-population using cone-beam computed tomography (CBCT). Materials and Methods: In total, 121 CBCT images of patients were selected from a database. All images contained lower first and second premolars and molars on both sides of the arch, fully developed roots, and no treatment, resorption, or calcifications. In each image, the root canals of the lower premolars and molars were evaluated according to the Vertucci classification in On-Demand 3D software in the multiplanar reconstruction with dynamic navigation. Twenty-five percent of the images were re-assessed to analyze intraobserver confidence with the kappa test. Data were statistically evaluated with linear regression to evaluate the correlations of anatomic variations with age and sex, and the Wilcoxon test to analyze the laterality of variations, with a significance level of 5%. Results: The intraobserver agreement (0.94) was excellent. In general, the root canals of lower premolars and molars showed a higher prevalence of type I than other Vertucci classification types, followed by type V in premolars and type II in molars. When the molar roots were evaluated separately, type II was more frequent in mesial roots and type I in distal roots. Although age showed no correlations with the results, sex and laterality showed correlations with tooth 45 and the lower second premolars, respectively. Conclusion: The lower premolars and molars of a Brazilian sub-population showed a wide range of root canal anatomic variations.

Has Container Shipping Industry been Fixing Prices in Collusion?: A Korean Market Case

  • Jaewoong Yoon;Yunseok Hur
    • Journal of Korea Trade
    • /
    • v.27 no.1
    • /
    • pp.79-100
    • /
    • 2023
  • Purpose - The purpose of this study is to analyze the market power of the Korea Container Shipping Market (Intra Asia, Korea-Europe, and Korea-U.S.) to verify the existence of collusion empirically, and to answer whether the joint actions of liner market participants in Korea have formed market dominance for each route. Precisely, it will be verified through the Lerner index as to whether the regional market of Asia is a monopoly, oligopoly, or perfect competition. Design/methodology - This study used a Lerner index adjusted with elasticity presented in the New Imperial Organization (NEIO) studies. NEIO refers to a series of empirical studies that estimate parameters to judge market power from industrial data. This study uses B-L empirical models by Bresnahan (1982) and Lau (1982). In addition, NEIO research data statistically contain self-regression and stability problems as price and time series data. A dynamic model following Steen and Salvanes' Error Correction Model was used to solve this problem. Findings - The empirical results are as follows. First, λ, representing market power, is nearly zero in all three markets. Second, the Korean shipping market shows low demand elasticity on average. Nevertheless, the markup is low, a characteristic that is difficult to see in other industries. Third, the Korean shipping market generally remains close to perfect competition from 2014 to 2022, but extreme market power appears in a specific period, such as COVID-19. Fourth, there was no market power in the Intra Asia market from 2008 to 2014. Originality/value - Doubts about perfect competition in the liner market continued, but there were few empirical cases. This paper confirmed that the Korea liner market is a perfect competition market. This paper is the first to implement dynamics using ECM and recursive regression to demonstrate market power in the Korean liner market by dividing the shipping market into Deep Sea and Intra Asia separately. It is also the first to prove the most controversial problems in the current shipping industry numerically and academically.

Engineering Critical Assessement for an Independent Type-B LNG Cargo Tank (독립형 LNG 화물창의 공학적 결함 평가)

  • Jae Hoon Seo;Kyu-Sik Park;Inhwan Cha;Joonmo Choung
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.60 no.4
    • /
    • pp.213-221
    • /
    • 2023
  • The demand for Liquefied Natural Gas (LNG) carriers and LNG-fueled ships has significantly increased in recent years due to the sulfur-oxide emission regulations by the International Maritime Organization (IMO). The main goal of this paper is to introduce the process for the Engineering Critical Assessment (ECA) of IMO independent type-B cargo tanks made from 9% nickel alloy. A methodology proposed by the British Standard was used to conduct ECA for any structure with initial flaws. Based on this standard, a Matlab code was developed to perform ECA. Coarse mesh Finite Element Analysis (FEA) was performed on an independent type-B LNG cargo tank with a capacity of 15,000 m3. The location with the highest development of maximum principal stress was identified at the bottom of the cargo tank. Fine mesh FEA was performed to obtain the stress range required for ECA. The dynamic cargo tank loads used for FEA were determined using some ship rules presented by Det Norske Veritas. As a result of performing a 20-year long-term crack propagation analysis with a semi-elliptical surface crack, the fracture-to-yield ratio exceeded the Fracture Assessment Line (FAL) and some structural reinforcement was necessary. Performing a 15-day short-term crack propagation analysis, the fracture-to-yield ratio remained within the FAL, and no significant LNG leaks were expected. This paper is believed to provide a guide for performing ECA of LNG cargo tanks in the future by providing the basic theory and application sample necessary to perform ECA.

Metaverse Artifact Analysis through the Roblox Platform Forensics (메타버스 플랫폼 Roblox 포렌식을 통한 아티팩트 분석)

  • Yiseul Choi;Jeongeun Cho;Eunbeen Lee;Hakkyong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.37-47
    • /
    • 2023
  • The growth of the metaverse has been accelerated by the increased demand for non-face-to-face interactions due to COVID-19 and advancements in technologies such as blockchain and NFTs. However, with the emergence of various metaverse platforms and the corresponding rise in users, criminal cases such as ransomware attacks, copyright infringements, and sexual offenses have occurred within the metaverse. Consequently, the need for artifacts that can be utilized as digital evidence within metaverse systems has increased. However, there is a lack of information about artifacts that can be used as digital evidence. Furthermore, metaverse security evaluation and forensic analysis are also insufficient, and the absence of attack scenarios and related guidelines makes forensics challenging. To address these issues, this paper presents artifacts that can be used for user behavior analysis and timeline analysis through dynamic analysis of Roblox, a representative metaverse gaming solution. Based on analyzing interrelationship between identified artifacts through memory forensics and log file analysis, this paper suggests the potential usability of artifacts in metaverse crime scenarios. Moreover, it proposes improvements by analyzing the current legal and regulatory aspects to address institutional deficiencies.

Effect of perforation patterns on the fundamental natural frequency of microsatellite structure

  • Ahmad M. Baiomy;M. Kassab;B.M. El-Sehily;R.M. El-Kady
    • Advances in aircraft and spacecraft science
    • /
    • v.10 no.3
    • /
    • pp.223-243
    • /
    • 2023
  • There is a burgeoning demand for minimizing the mass of satellites because of its direct impact on reducing launch-to-orbit cost. This must be done without compromising the structure's efficiency. The present paper introduces a relatively low-cost and easily implementable approach for optimizing structural mass to a maximum natural frequency. The natural frequencies of the satellite are of utmost pertinence to the application requirements, as the sensitive electronic instrumentation and onboard computers should not be affected by the vibrations of the satellite structure. This methodology is applied to a realistic model of Al-Azhar University micro-satellite in partnership with the Egyptian Space Agency. The procedure used in structural design can be summarized in two steps. The first step is to select the most favorable primary structural configuration among several different candidate variants. The nominated variant is selected as the one scoring maximum relative dynamic stiffness. The second step is to use perforation patterns reduce the overall mass of structural elements in the selected variant without changing the weight. The results of the presented procedure demonstrate that the mass reduction percentage was found to be 39% when compared to the unperforated configuration that had the same plate thickness. The findings of this study challenge the commonly accepted notion that isogrid perforations are the most effective means of achieving the goal of reducing mass while maintaining stiffness. Rather, the study highlights the potential benefits of exploring a wider range of perforation unit cells during the design process. The study revealed that rectangular perforation patterns had the lowest efficiency in terms of modal stiffness, while triangular patterns resulted in the highest efficiency. These results suggest that there may be significant gains to be made by considering a broader range of perforation shapes and configurations in the design of lightweight structures.

A Optimization Study of UAV Path Planning Generation based-on Rapid-exploring Random Tree Method (급속탐색랜덤트리기법 기반의 무인 비행체 경로계획생성 최적화 연구)

  • Jae-Hwan Bong;Seong-Kyun Jeong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.981-988
    • /
    • 2023
  • As the usage of unmanned aerial vehicles expands, the development and the demand of related technologies are increasing. As the frequency of operation increases and the convenience of operation is emphasized, the importance of related autonomous flight technology is also highlighted. Establishing a path plan to reach the destination in autonomous flight of an unmanned aerial vehicle is important in guidance and control, and a technology for automatically generating path plan is required in order to maximize the effect of unmanned aerial vehicle. In this study, the optimization research of path planning using rapid-exploring random tree method was performed for increasing the effectiveness of autonomous operation. The path planning optimization method considering the characteristics of the unmanned aerial vehicle is proposed. In order to achieve indexes such as optimal distance, shortest time, and passage of mission points, the path planning was optimized in consideration of the mission goals and dynamic characteristics of the unmanned aerial vehicle. The proposed methods confirmed their applicability to the generation of path planning for unmanned aerial vehicles through performance verification for obstacle situations.

The Performance Analysis of Cognitive-based Overlay D2D Communication in 5G Networks

  • Abdullilah Alotaibi;Salman A. AlQahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.178-188
    • /
    • 2024
  • In the near future, it is expected that there will be billions of connected devices using fifth generation (5G) network services. The recently available base stations (BSs) need to mitigate their loads without changing and at the least monetary cost. The available spectrum resources are limited and need to be exploited in an efficient way to meet the ever-increasing demand for services. Device to Device communication (D2D) technology will likely help satisfy the rapidly increasing capacity and also effectively offload traffic from the BS by distributing the transmission between D2D users from one side and the cellular users and the BS from the other side. In this paper, we propose to apply D2D overlay communication with cognitive radio capability in 5G networks to exploit unused spectrum resources taking into account the dynamic spectrum access. The performance metrics; throughput and delay are formulated and analyzed for CSMA-based medium access control (MAC) protocol that utilizes a common control channel for device users to negotiate the data channel and address the contention between those users. Device users can exploit the cognitive radio to access the data channels concurrently in the common interference area. Estimating the achievable throughput and delay in D2D communication in 5G networks is not exploited in previous studies using cognitive radio with CSMA-based MAC protocol to address the contention. From performance analysis, applying cognitive radio capability in D2D communication and allocating a common control channel for device users effectively improve the total aggregated network throughput by more than 60% compared to the individual D2D throughput without adding harmful interference to cellular network users. This approach can also reduce the delay.