• Title/Summary/Keyword: massive devices

Search Result 107, Processing Time 0.027 seconds

Automation of Feature Modeling for HDD Fluid Dynamic Bearing Design (HDD용 유체베어링 설계를 위한 형상 모델링의 자동화)

  • Lee, Nam-Hun;Kwon, Jeong-Min;Koo, J.C.
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.15 no.2 s.95
    • /
    • pp.148-155
    • /
    • 2005
  • As functional requirement of massive digital information storage devices are on a trend for the higher data transfer rate and lower cost, many different technical efforts are being tested and implemented in the industry. FDB(fluid dynamic bearing) is one of the major breakthroughs in rotor design in terms of TMR(track misregistration) budget. Although FDB analysis based on Reynolds' equation is well established and popularly being used for FDB design especially for the estimation of bearing stiffness, there are obvious limitations in the approach due to the inherent assumptions. A generalized analysis tool employing the full Navier-Stokes equation and the energy balance is to be beneficial for detailed FDB design. In this publication, an efficient geometry modeling method is presented that provides fully integrated inputs for general FVM/FDM(finite volume method/ finite difference method) codes. By virtue of the flexibility of the presented method, many different detailed FDB design and analysis are carried over with ease.

DJFS: Providing Highly Reliable and High-Performance File System with Small-Sized NVRAM

  • Kim, Junghoon;Lee, Minho;Song, Yongju;Eom, Young Ik
    • ETRI Journal
    • /
    • v.39 no.6
    • /
    • pp.820-831
    • /
    • 2017
  • File systems and applications try to implement their own update protocols to guarantee data consistency, which is one of the most crucial aspects of computing systems. However, we found that the storage devices are substantially under-utilized when preserving data consistency because they generate massive storage write traffic with many disk cache flush operations and force-unit-access (FUA) commands. In this paper, we present DJFS (Delta-Journaling File System) that provides both a high level of performance and data consistency for different applications. We made three technical contributions to achieve our goal. First, to remove all storage accesses with disk cache flush operations and FUA commands, DJFS uses small-sized NVRAM for a file system journal. Second, to reduce the access latency and space requirements of NVRAM, DJFS attempts to journal compress the differences in the modified blocks. Finally, to relieve explicit checkpointing overhead, DJFS aggressively reflects the checkpoint transactions to file system area in the unit of the specified region. Our evaluation on TPC-C SQLite benchmark shows that, using our novel optimization schemes, DJFS outperforms Ext4 by up to 64.2 times with only 128 MB of NVRAM.

Agile Management and Interoperability Testing of SDN/NFV-Enriched 5G Core Networks

  • Choi, Taesang;Kim, TaeYeon;Tavernier, Wouter;Korvala, Aki;Pajunpaa, Jussi
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.72-88
    • /
    • 2018
  • In the fifth generation (5G) era, the radio internet protocol capacity is expected to reach 20 Gb/s per sector, and ultralarge content traffic will travel across a faster wireless/wireline access network and packet core network. Moreover, the massive and mission-critical Internet of Things is the main differentiator of 5G services. These types of real-time and large-bandwidth-consuming services require a radio latency of less than 1 ms and an end-to-end latency of less than a few milliseconds. By distributing 5G core nodes closer to cell sites, the backhaul traffic volume and latency can be significantly reduced by having mobile devices download content immediately from a closer content server. In this paper, we propose a novel solution based on software-defined network and network function virtualization technologies in order to achieve agile management of 5G core network functionalities with a proof-of-concept implementation targeted for the PyeongChang Winter Olympics and describe the results of interoperability testing experiences between two core networks.

The Fault Diagnosis using Neural Networks for Nuclear Power Plants (신경망을 이용한 원자력발전소의 주요 고장진단)

  • Kwon, Soon-Il;Lee, Jong-Kyu;Song, Chi-Kwon;Bae, Hyeon;Kim, Sung-Shin
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2723-2725
    • /
    • 2001
  • Nuclear power generations have been developed gradually since 1950. Nowadays, 440 nuclear power generations are taking charge of 16% of electric power production in the world. The most important factor to operate the nuclear power generations is safety. It is not easy way to control nuclear power generations with safety because nuclear power generations are very complicated systems. In the main control room of the nuclear power generations, about 4000 numbers of alarms and monitoring devices are equipped to handle the signals corresponding to operating equipments. Thus, operators have to deal with massive information and to grasp the situation immediately. If they could not achieve these task, then they should make big problem in the power generations Owing to too many variables, operators could be also in the uncontrolled situation. So in this paper, automatic systems to diagnose the fault are constructed using 2 steps neural networks. This diagnosis method is based on the pattern of the principal variables which could represent the type and severity of faults.

  • PDF

Design and Implementation of a Volume Structure for Tertiary Storage Devices in MIDAS-II (MIDAS-II에서 3차 저장 장치를 위한 볼륨 구조의 설계 및 구현)

  • Kim, Yeong-Seong;Gang, Hyeon-Cheol;Kim, Myeong-Jun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.6
    • /
    • pp.674-685
    • /
    • 1999
  • MIDAS-II는 한국전자통신연구원에서 개발한 바다 DBMS의 저장 시스템이다. MIDAS-II 볼륨은 데이터의 논리적 저장 단위인 파일을 저장하는 영역을 가리킨다. 본 논문에서는, MIDAS-II가 대용량 멀티미디어 데이터 서버의 저장 시스템으로 기능하도록 광 디스크 쥬크박스 또는 테이프 라이브러리와 같이 복수 개의 저장 매체 (platter , 예를 들어 디스크 또는 카트리지 테이프)로 구성된 Tera 바이트 급의 3창 저장 장치를 장착할 경우 이를 위한 볼륨 구조의 설계 및 구현에 대해 기술한다. 본 논문에서 제안하는 볼륨 구조는 3차 저장 장치 접근 시 성능 제고를 위하여 디스크 캐쉬 영역을 두고 있으며, 3차 저장 장치의 저장 매체별 관리 기능을 제공한다. Abstract MIDAS-II is the storage systemfor BADA DBMS developed at ETRI. A volume of MIDAS-II is the area where the files, the logical unit for storing data, are stored. This paaper describes the design and implementation of a new MIDAS-II volume structure for the tertiary storage device such as an optical disk juke box or a tape library equipped with multiple platters(disks or cartridge tapes, for example ). Incorporating thetertirary storage device of the order of tera bytes into MIDAS-II enables it to function as a storage system for a massive amount fo multimedia eata server. The volume structure for the tertiary storage device proposed in this paper features disk caching for performing improvement and direct control of theindividual platter.

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

Semantic Trajectory Based Behavior Generation for Groups Identification

  • Cao, Yang;Cai, Zhi;Xue, Fei;Li, Tong;Ding, Zhiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5782-5799
    • /
    • 2018
  • With the development of GPS and the popularity of mobile devices with positioning capability, collecting massive amounts of trajectory data is feasible and easy. The daily trajectories of moving objects convey a concise overview of their behaviors. Different social roles have different trajectory patterns. Therefore, we can identify users or groups based on similar trajectory patterns by mining implicit life patterns. However, most existing daily trajectories mining studies mainly focus on the spatial and temporal analysis of raw trajectory data but missing the essential semantic information or behaviors. In this paper, we propose a novel trajectory semantics calculation method to identify groups that have similar behaviors. In our model, we first propose a fast and efficient approach for stay regions extraction from daily trajectories, then generate semantic trajectories by enriching the stay regions with semantic labels. To measure the similarity between semantic trajectories, we design a semantic similarity measure model based on spatial and temporal similarity factor. Furthermore, a pruning strategy is proposed to lighten tedious calculations and comparisons. We have conducted extensive experiments on real trajectory dataset of Geolife project, and the experimental results show our proposed method is both effective and efficient.

Achievable Sum Rate of NOMA with Negatively-Correlated Information Sources

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.75-81
    • /
    • 2021
  • As the number of connected smart devices and applications increases explosively, the existing orthogonal multiple access (OMA) techniques have become insufficient to accommodate mobile traffic, such as artificial intelligence (AI) and the internet of things (IoT). Fortunately, non-orthogonal multiple access (NOMA) in the fifth generation (5G) mobile networks has been regarded as a promising solution, owing to increased spectral efficiency and massive connectivity. In this paper, we investigate the achievable data rate for non-orthogonal multiple access (NOMA) with negatively-correlated information sources (CIS). For this, based on the linear transformation of independent random variables (RV), we derive the closed-form expressions for the achievable data rates of NOMA with negatively-CIS. Then it is shown that the achievable data rate of the negatively-CIS NOMA increases for the stronger channel user, whereas the achievable data rate of the negatively-CIS NOMA decreases for the weaker channel user, compared to that of the positively-CIS NOMA for the stronger or weaker channel users, respectively. We also show that the sum rate of the negatively-CIS NOMA is larger than that of the positively-CIS NOMA. As a result, the negatively-CIS could be more efficient than the positively-CIS, when we transmit CIS over 5G NOMA networks.

Deep Neural Network-Based Critical Packet Inspection for Improving Traffic Steering in Software-Defined IoT

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid growth of intelligent devices and communication technologies, 5G network environment has become more heterogeneous and complex in terms of service management and orchestration. 5G architecture requires supportive technologies to handle the existing challenges for improving the Quality of Service (QoS) and the Quality of Experience (QoE) performances. Among many challenges, traffic steering is one of the key elements which requires critically developing an optimal solution for smart guidance, control, and reliable system. Mobile edge computing (MEC), software-defined networking (SDN), network functions virtualization (NFV), and deep learning (DL) play essential roles to complementary develop a flexible computation and extensible flow rules management in this potential aspect. In this proposed system, an accurate flow recommendation, a centralized control, and a reliable distributed connectivity based on the inspection of packet condition are provided. With the system deployment, the packet is classified separately and recommended to request from the optimal destination with matched preferences and conditions. To evaluate the proposed scheme outperformance, a network simulator software was used to conduct and capture the end-to-end QoS performance metrics. SDN flow rules installation was experimented to illustrate the post control function corresponding to DL-based output. The intelligent steering for network communication traffic is cooperatively configured in SDN controller and NFV-orchestrator to lead a variety of beneficial factors for improving massive real-time Internet of Things (IoT) performance.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.