• 제목/요약/키워드: network storage

검색결과 1,087건 처리시간 0.028초

입력 전원 외란 상황에서의 신경회로망 기반 전류 보상기를 이용한 매트릭스 컨버터의 출력 전류 개선 (Improving the Output Current of Matrix Converter under Abnormal Input Voltage Conditions using a Neural Network Compensator)

  • 이은실;박기우;이교범
    • 전력전자학회논문지
    • /
    • 제15권3호
    • /
    • pp.199-206
    • /
    • 2010
  • 매트릭스 컨버터는 3상의 입력 전원이 전력용 반도체 스위치의 제어를 통해 3상의 부하에 직접 연결되는 에너지 변환 장치이다. 에너지 저장을 위한 직류단이 없어 매트릭스 컨버터의 입력 전류는 부하 전류와 스위치 상태에 직접 의존한다. 그러므로 불평형 또는 왜곡된 입력 전압은 원치 않은 출력 고조파 전류의 원인이 된다. 본 논문에서는 매트릭스 컨버터의 입력 전원 외란 상황에서 출력 전류를 개선하는 신경회로망 기반 전류 보상기를 제안한다. 제안된 기법 타당성과 유효성을 시뮬레이션과 실험을 통해 증명한다.

하드웨어 기반 Anti-DDoS 대응 장비 고속 패킷 필터링을 위한 Hi-DPI 알고리즘 연구 (Development Hi-DPI Algorithm for High Speed Packet Filtering of Anti-DDoS based on HW)

  • 김점구
    • 융합보안논문지
    • /
    • 제17권2호
    • /
    • pp.41-51
    • /
    • 2017
  • 인터넷 활용 범위의 폭발적인 증가는 점차적으로 네트워크 속도와 용량을 초고속화 하고 대용량화로 빠르게 진화해 가고 있다. 이에 따라 스위치 라우터 등 네트워크 장비들은 하드웨어에 기반 한 빠른 기술 진화로 대처를 하고 있으나 초연결사회에 가장 기본적이고 필수적인 네트워크 보안시스템의 기술 진화는 수만 가지의 보안 이슈와 시그니처(signature)에 대해서 수시 변경과 갱신을 필요로 하기 때문에 소프트웨어에 기반 한 기술적인 한계를 극복하기가 쉽지 않다. 본 논문은 이와 같은 DDoS 대응 장비를 설치 운영할 때의 패킷 필터링 속도 저하 문제점을 개선하고자 FPGA(Field Programmable Gate Array)의 하드웨어적인 특성과 병렬처리 특성을 최대한 반영한 DPI 알고리즘인 Hi-DPI를 제안하고 실용성을 검증하고자 한다.

중소유역의 일별 용수수급해석을 위한 하천망모형의 개발(II) -모형의 구성- (A Streamfiow Network Model for Daily Water Supply and Demands on Small Watershed (II) - Model Development -)

  • 허유만;박창언;박승우
    • 한국농공학회지
    • /
    • 제35권2호
    • /
    • pp.23-32
    • /
    • 1993
  • This paper describes the background and the development of a hydrologic network flow model. The model was development to simulate daily water demand and supply for selected stream reaches within a watershed, and used as a tool for evaluating, simulating, and planning a water resources system. The proposed network flow model considers daily runoff from subareas, various water demands, and diversion structures within each subarea. Daily streamflow at a reach is simulated after balancing the water demands from subareas. The lateral inflow from subareas is simulated using a modified tank model. Total water demands consist of the daily demands for agricultural, domestic, industrial, livestock, fishery, and environmental uses within a rural district. The return flow, diversions from sources and storage components such as reservoirs were also incorporated into the mode l . The developed model is a generalized version that may be applied to different combinations of river reaches for a given system. This may help potential users identify areas where water supply does not suffice the demands for different time horizons.

  • PDF

P2P 기반의 모바일 노드간의 전술 정보 공유 시스템 (A P2P Based Tactical Information Sharing System for Mobile Nodes)

  • 이현
    • 한국군사과학기술학회지
    • /
    • 제17권4호
    • /
    • pp.501-509
    • /
    • 2014
  • In NCW(Network Centric Warfare) environment, mobile nodes communicate through wireless link. But wireless link provides limited networking performance due to signal interferences or mobility of nodes. So it is quite challenge to acquire enough networking resources and use the resources efficiently. In this paper, we have proposed a P2P based tactical information sharing system which provides satisfactory visual information playout for mobile nodes(i.e., military personnel, vehicle,..) in NCW environment. Our proposed system consists of two components. One is caching-enabled switch which stores tactical information segments at its internal storage and then transports them to mobile nodes when require. Another is centralized scheduling algorithm which exploits networking resources more efficiently. To validate performance of proposed system, we performed series of experiments in wireless network testbed. Results show improved performance in terms of segment-missing ratio, networking resources usage, sharing time, and number of simultaneous playout mobile nodes with acceptable playout continuity(i.e., over 95%).

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

  • Abdelkader, Ghazli;Naima, Hadj Said;Adda, Ali Pacha
    • Journal of Information Processing Systems
    • /
    • 제13권1호
    • /
    • pp.152-173
    • /
    • 2017
  • Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network.

시뮬레이션 분석을 통한 물류거점체계하의 수배송 최적화 연구 (Optimization for Transportation Routing on Logistics Network by Simulation Analysis)

  • 김영철;성행기;황대성;김정현;이해욱;강경식
    • 대한안전경영과학회지
    • /
    • 제14권4호
    • /
    • pp.177-184
    • /
    • 2012
  • Logistics cost of domestic company has been improved continuously and annually, it is still higher than other main comparative countries. So, in this study, as optimizing the logistic network of distribution, it was trying to find methods decreasing logistics cost and storage cost, which occupies 86% of logistics cost of companies. through the efficiency of transportation and delivery routing, it could be also possible to decrease the logistics cost. And, it is also checked to find the logistics cost could be decreased by 10% by optimizing the routes of transportation and delivery, improving the transportation mode, etc.

Prioritization-Based Model for Effective Adoption of Mobile Refactoring Techniques

  • Alhubaishy, Abdulaziz
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.375-382
    • /
    • 2021
  • The paper introduces a model for evaluating and prioritizing mobile quality attributes and refactoring techniques through the examination of their effectiveness during the mobile application development process. The astonishing evolution of software and hardware has increased the demand for techniques and best practices to overcome the many challenges related to mobile devices, such as those concerning device storage, network bandwidth, and energy consumption. A number of studies have investigated the influence of refactoring, leading to the enhancement of mobile applications and the overcoming of code issues as well as hardware issues. Furthermore, rapid and continuous mobile developments make it necessary for teams to apply effective techniques to produce reliable mobile applications and reduce time to market. Thus, we investigated the influence of various refactoring techniques on mobile applications to understand their effectiveness in terms of quality attributes. First, we extracted the most important mobile refactoring techniques and a set of quality attributes from the literature. Then, mobile application developers from nine mobile application teams were recruited to evaluate and prioritize these quality attributes and refactoring techniques for their projects. A prioritization-based model is examined that integrates the lightweight multi-criteria decision making method, called the best-worst method, with the process of refactoring within mobile applications. The results prove the applicability and suitability of adopting the model for the mobile development process in order to expedite application production while using well-defined procedures to select the best refactoring techniques. Finally, a variety of quality attributes are shown to be influenced by the adoption of various refactoring techniques.

딥 뉴럴 네트워크를 이용한 새로운 리튬이온 배터리의 SOC 추정법 (A Novel SOC Estimation Method for Multiple Number of Lithium Batteries Using a Deep Neural Network)

  • 아사드 칸;고영휘;최우진
    • 전력전자학회논문지
    • /
    • 제26권1호
    • /
    • pp.1-8
    • /
    • 2021
  • For the safe and reliable operation of lithium-ion batteries in electric vehicles or energy storage systems, having accurate information of the battery, such as the state of charge (SOC), is essential. Many different techniques of battery SOC estimation have been developed, such as the Kalman filter. However, when this filter is applied to multiple batteries, it has difficulty maintaining the accuracy of the estimation over all cells owing to the difference in parameter values of each cell. The difference in the parameter of each cell may increase as the operation time accumulates due to aging. In this paper, a novel deep neural network (DNN)-based SOC estimation method for multi-cell application is proposed. In the proposed method, DNN is implemented to determine the nonlinear relationships of the voltage and current at different SOCs and temperatures. In the training, the voltage and current data obtained at different temperatures during charge/discharge cycles are used. After the comprehensive training with the data obtained from the cycle test with a cell, the resulting algorithm is applied to estimate the SOC of other cells. Experimental results show that the mean absolute error of the estimation is 1.213% at 25℃ with the proposed DNN-based SOC estimation method.

폐쇄망에서의 안전하고 효율적인 소프트웨어 패키지 관리 방안 (Secure and Efficient Package Management Techniques in Closed Networks)

  • 안건희;안상혁;임동균;정수환;김재우;신영주
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제11권4호
    • /
    • pp.119-126
    • /
    • 2022
  • 본 연구는 폐쇄망에서 효율적이고 안전하게 패키지 관리 시스템을 사용하기 위해서 고려해야 할 할 중요 요소들과 그 방법론 들을 제시하는 것을 목적으로 한다. 관련 선행 연구의 분석을 통해 기존 패키지 관리에서 보안성을 위해 고려해야 할 사항들을 살펴보고, 이를 바탕으로 폐쇄망이라는 특수한 상황에서 고려해야 할 세부 방법들을 제안한다. 구체적으로, 새로운 패키지 관리 도구의 개발, 물리적 저장매체 활용, 로컬 백업 저장소 활용, 패키지 업데이트 및 다운그레이드 일괄 처리의 방법을 제안한다.

상수급수관 인입관경 제안 및 수리해석 (Hydraulic Analysis and Sizing of Inlet-Pipe Diameter for the Water Distribution Network)

  • 신성교;김은주;최시환
    • 한국환경과학회지
    • /
    • 제31권1호
    • /
    • pp.33-42
    • /
    • 2022
  • The objective of this study is to determine the appropriate size of the inlet pipe diameter and thereby conduct hydraulic analysis for the Korean water distribution network. To this end, the data tables for equivalent pipe diameters and outflow rates presently employed in Korea were adopted. By incorporating the table of equivalent pipe diameters, it was found that the size of the inlet pipe diameter was overestimated, which can cause shortage of water pressure and malfunctioning or insufficiency of outflow rate in the corresponding adjacent region. However, by conducting hydraulic analysis based on the table of outflow rates, relatively reasonable flow rates were observed. Furthermore, by comparing the real demand-driven analysis (RDDA) approach and demand-driven analysis (DDA) approach toward managing the huge water demand, it was observed that DDA could not effectively respond to real hourly usage conditions, whereas RDDA (which reflects the hourly effects of inlet pipe diameter and storage tanks) demonstrated results similar to that of real water supply.