• 제목/요약/키워드: machines and devices

Search Result 233, Processing Time 0.032 seconds

Study on Divice for the Automatic Shut Off of Equipment Stand-by Power (자동전원 계폐장치에 관한 연구)

  • Kim, H.K.;Hyun, K.W.;Bae, J.I.;Yang, S.Y.;Park, S.T.
    • Proceedings of the KIEE Conference
    • /
    • 1999.07f
    • /
    • pp.2626-2627
    • /
    • 1999
  • The device we have developed is the automatic shut off equipment which will reduce energy consumption when an equipment is in stand by power state. The principle for this system is when a man is moving, electricity will flow by setting a on-off light system. At night, in the stand-by power state the electric supply will be shut off immediately which will reduce energy consumption. Energy consumed by 24hour operating machines and stand-by electronic devices will be reduced by pulse signals which will give power supply when needed.

  • PDF

Design and Implementation of iATA-based RAID5 Distributed Storage Servers (iATA 기반의 RAID5 분산 스토리지 서버의 설계 및 구현)

  • Ong, Ivy;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.305-311
    • /
    • 2010
  • iATA (Internet Advanced Technology Attachment) is a block-level protocol developed to transfer ATA commands over TCP/IP network, as an alternative network storage solution to address insufficient storage problem in mobile devices. This paper employs RAID5 distributed storage servers concept into iATA, in which the idea behind is to combine several machines with relatively inexpensive disk drives into a server array that works as a single virtual storage device, thus increasing the reliability and speed of operations. In the case of one machine failed, the server array will not destroy immediately but able to function in a degradation mode. Meanwhile, information can be easily recovered by using boolean exclusive OR (XOR) logical function with the bit information on the remaining machines. We perform I/O measurement and benchmark tool result indicates that additional fault tolerance feature does not delay read/write operations with reasonable file size ranged in 4KB-2MB, yet higher data integrity objective is achieved.

VDI Real-Time Monitoring System for KVM-Based Virtual Machine Resource Usage Analysis (KVM 기반의 가상머신 자원 사용량 분석을 위한 VDI 실시간 모니터링 시스템 설계 및 구현)

  • Kim, Taehoon;Kim, Hyeunjee;No, Jaechun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Recently, due to the development of next-generation computing devices and high-performance network, VDI (Virtual Desktop Infrastructure) is receiving a great deal of attention from IT market as an essential part of cloud computing. VDI enables to host multiple, individual virtual machines that are provisioned from servers located at the data center by using hypervisor. One of the critical issues related to VDI is to reduce the performance difference between virtual machines and physical ones. In this paper, we present a real-time VM monitoring system, called SETMOV, that is able to collect the real-time resource usage information. We also present the performance results using iozone to verify SETMOV.

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에서의 안전한 그룹 통신)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.60-71
    • /
    • 2006
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.

Export Competitiveness of Busan Port: Market Comparative Advantage Index (시장비교우위지수를 이용한 부산항의 수출경쟁력 분석)

  • Mo, Soo-Won;Chung, Hong-Young;Lee, Kwang-Bae
    • Journal of Korea Port Economic Association
    • /
    • v.31 no.3
    • /
    • pp.141-153
    • /
    • 2015
  • This paper is an attempt to analyze the comparative advantage of Busan Port to China. For this, we use the market comparative advantage index, which is a version of the revealed comparative advantage index. The market comparative advantage index (MCA) uses trade patterns to identify the sectors in which a region has a comparative advantage, in this case by comparing Busan Port's trade profile with the world average (China). The indices are calculated at the commodity level of the HS four-digit classification. The export data used in this study are obtained from the Korea International Trade Association. Exports to China accounted for almost one third of Korean exports in 2014. There are, however, structural differences among the main export items of Busan Port. This paper, therefore, employs MCA indices to reveal the behaviors of the ten main export items, which are "HS3920-other plates/sheets/film/foil of plastics," "HS7606-aluminum plates/sheets/strip," "HS8479-unspecified machines/medical appliances," "HS8486-machines for semiconductor devices or wafers," "HS8529-parts for transmission apparatus for television," "HS8703-motor vehicles for the transport of persons," "HS8708-parts of motor vehicles," "HS9001-optical fibers," and "HS9013-liquid crystal devices." The study shows that export competitiveness of nine items increases, the exception being HS8703. However, China's import ratios of seven of the nine items for which the MCA indices go up are on the decrease, which means that it would be hard to expand the export market for these seven items, despite the higher MCA indices. Since the shares of the port's total exports to China of HS3907, HS8486, HS8529, HS9001, and HS9013 in total exports to China increase together with China's import ratio decreasing, these items may have promising export markets. MCA increases of HS7606 and HS8479 are attributable to China's lower import ratio, rather than a higher export share, so higher MCA indices do not guarantee higher export competitiveness for these items.

REDUCING LATENCY IN SMART MANUFACTURING SERVICE SYSTEM USING EDGE COMPUTING

  • Vimal, S.;Jesuva, Arockiadoss S;Bharathiraja, S;Guru, S;Jackins, V.
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.15-22
    • /
    • 2021
  • In a smart manufacturing environment, more and more devices are connected to the Internet so that a large volume of data can be obtained during all phases of the product life cycle. The large-scale industries, companies and organizations that have more operational units scattered among the various geographical locations face a huge resource consumption because of their unorganized structure of sharing resources among themselves that directly affects the supply chain of the corresponding concerns. Cloud-based smart manufacturing paradigm facilitates a new variety of applications and services to analyze a large volume of data and enable large-scale manufacturing collaboration. The manufacturing units include machinery that may be situated in different geological areas and process instances that are executed from different machinery data should be constantly managed by the super admin to coordinate the manufacturing process in the large-scale industries these environments make the manufacturing process a tedious work to maintain the efficiency of the production unit. The data from all these instances should be monitored to maintain the integrity of the manufacturing service system, all these data are computed in the cloud environment which leads to the latency in the performance of the smart manufacturing service system. Instead, validating data from the external device, we propose to validate the data at the front-end of each device. The validation process can be automated by script validation and then the processed data will be sent to the cloud processing and storing unit. Along with the end-device data validation we will implement the APM(Asset Performance Management) to enhance the productive functionality of the manufacturers. The manufacturing service system will be chunked into modules based on the functionalities of the machines and process instances corresponding to the time schedules of the respective machines. On breaking the whole system into chunks of modules and further divisions as required we can reduce the data loss or data mismatch due to the processing of data from the instances that may be down for maintenance or malfunction ties of the machinery. This will help the admin to trace the individual domains of the smart manufacturing service system that needs attention for error recovery among the various process instances from different machines that operate on the various conditions. This helps in reducing the latency, which in turn increases the efficiency of the whole system

Conditions of Applications, Situations and Functions Applicable to Gesture Interface

  • Ryu, Tae-Beum;Lee, Jae-Hong;Song, Joo-Bong;Yun, Myung-Hwan
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.4
    • /
    • pp.507-513
    • /
    • 2012
  • Objective: This study developed a hierarchy of conditions of applications(devices), situations and functions which are applicable to gesture interface. Background: Gesture interface is one of the promising interfaces for our natural and intuitive interaction with intelligent machines and environments. Although there were many studies related to developing new gesture-based devices and gesture interfaces, it was little known which applications, situations and functions are applicable to gesture interface. Method: This study searched about 120 papers relevant to designing and applying gesture interfaces and vocabulary to find the gesture applicable conditions of applications, situations and functions. The conditions which were extracted from 16 closely-related papers were rearranged, and a hierarchy of them was developed to evaluate the applicability of applications, situations and functions to gesture interface. Results: This study summarized 10, 10 and 6 conditions of applications, situations and functions, respectively. In addition, the gesture applicable condition hierarchy of applications, situation and functions were developed based on the semantic similarity, ordering and serial or parallel relationship among them. Conclusion: This study collected gesture applicable conditions of application, situation and functions, and a hierarchy of them was developed to evaluate the applicability of gesture interface. Application: The gesture applicable conditions and hierarchy can be used in developing a framework and detailed criteria to evaluate applicability of applications situations and functions. Moreover, it can enable for designers of gesture interface and vocabulary to determine applications, situations and functions which are applicable to gesture interface.

Comparative Analysis of Machine Learning Techniques for IoT Anomaly Detection Using the NSL-KDD Dataset

  • Zaryn, Good;Waleed, Farag;Xin-Wen, Wu;Soundararajan, Ezekiel;Maria, Balega;Franklin, May;Alicia, Deak
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.46-52
    • /
    • 2023
  • With billions of IoT (Internet of Things) devices populating various emerging applications across the world, detecting anomalies on these devices has become incredibly important. Advanced Intrusion Detection Systems (IDS) are trained to detect abnormal network traffic, and Machine Learning (ML) algorithms are used to create detection models. In this paper, the NSL-KDD dataset was adopted to comparatively study the performance and efficiency of IoT anomaly detection models. The dataset was developed for various research purposes and is especially useful for anomaly detection. This data was used with typical machine learning algorithms including eXtreme Gradient Boosting (XGBoost), Support Vector Machines (SVM), and Deep Convolutional Neural Networks (DCNN) to identify and classify any anomalies present within the IoT applications. Our research results show that the XGBoost algorithm outperformed both the SVM and DCNN algorithms achieving the highest accuracy. In our research, each algorithm was assessed based on accuracy, precision, recall, and F1 score. Furthermore, we obtained interesting results on the execution time taken for each algorithm when running the anomaly detection. Precisely, the XGBoost algorithm was 425.53% faster when compared to the SVM algorithm and 2,075.49% faster than the DCNN algorithm. According to our experimental testing, XGBoost is the most accurate and efficient method.

Exploring Structural Stability using Arduino for the Prevention of Tower Cranes' Safety Accident : focused on ardu (타워크레인의 안전사고 예방을 위한 아두이노 기반 구조적 안정성 탐색)

  • Kim, Jun-Seok;Lee, Won-Hee;Kim, Sungae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.27-31
    • /
    • 2019
  • Various safety accidents occur frequently at construction sites due to poor operation of construction machines and insufficient safety facilities. Among them, safety accidents on the Tawerkrain have resulted in massive casualties and property damage. Therefore, the purpose of this study is to develop safety devices to prevent safety accidents in the Tower Crane. To this end, the existing safety device was explored and the model of the Tower Crane was constructed using Arduino. The weight of the object, the weight of the pendulum, and the distance from the center axis, as well as the equation of turning and experimentation, suggested mobile weights as a safety device to identify and resolve problems with existing safety devices. This is expected to minimize the limit on the salvage distance of the tower crane, thus providing a safer working environment away from the risk of a safety accident.

  • PDF

Environmental Assessment of Chemically Strengthened Glass for Touch Screen Panel by Material Life Cycle Assessment (물질전과정평가를 이용한 터치스크린패널용 화학강화유리에 대한 환경성 평가)

  • Lee, Na-Ri;Lee, Soo-Sun;Kim, Kyeong-Il;Hong, Tae-Whan
    • Clean Technology
    • /
    • v.18 no.3
    • /
    • pp.301-306
    • /
    • 2012
  • Rapidly growing mobile machines such as tablet PC and smart phone are equipped with touch screen panel using a sturdy material for products surface protection. Therefore, surge of chemically strengthened glass was increased and the amount of waste matter is proportional to demand. The purpose of this study is environmental impact assessment on touch screen panel of chemically strengthened glass by material life cycle assessment (MLCA). We used CES of Granta, SimaPro and Gabi software for MLCA. Chemically strengthened glass (2.7, 5.7 and 10.3 inch) was calculated to environmental impact assessment by Granta software under two cases. One case is Landfill and the other case is Reuse. As a result, in case of reuse, energy values of 2.7, 5.7 and 10.3 inches were reduced by an average of 51.4%, $CO_2$ values were reduced by an average of 46.6% than Landfill case, respectively. We assessed impact categories of 11 types using SimaPro software. As a result, the contents of fossil fuels, inorganics and climate change have a huge impact than the other impact categories. And the main cause of environmental impact is antimony and hydrogen fluoride in Gabi results.