• Title/Summary/Keyword: network storage

Search Result 1,080, Processing Time 0.033 seconds

A Study on the Improvement of Collection, Management and Sharing of Maritime Traffic Information (해상교통정보의 수집, 관리 및 공유 개선방안에 관한 연구)

  • Shin, Gil-Ho;Song, Chae-Uk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.515-524
    • /
    • 2022
  • To effectively collect, manage, and share the maritime traffic information, it is necessary to identify the technology trends concerning this particular information and analyze its current status and problems. Therefore, this study observes the domestic and foreign technology trends involving maritime traffic information while analyzing and summarizing the current status and problems in collecting, managing, and sharing it. According to the data analysis, the problems in the collecting stage are difficulties in collecting visual information from long-distance radars, CCTVs, and cameras in areas outside the LTE network coverage. Notably, this explains the challenges in detecting smuggling ships entering the territorial waters through the exclusive economic zone (EEZ) in the early stage. The problems in the management stage include difficult reductions and expansions of maritime traffic information caused by the lack of flexibility in storage spaces mostly constructed by the maritime transportation system. Additionally, it is challenging to deal with system failure with system redundancy and backup as a countermeasure. Furthermore, the problems in the sharing stage show that it is difficult to share information with external operating organizations since the internal network is mainly used to share maritime transportation information. If at all through the government cloud via platforms such as LRIT and SASS, it often fails to effectively provide various S/W applications that help use maritime big data. Therefore, it is suggested that collecting equipment such as unmanned aerial vehicles and satellites should be constructed to expand collecting areas in the collecting stage. In the management and sharing stages, the introduction and construction of private clouds are suggested, considering the operational administration and information disclosure of each maritime transportation system. Through these efforts, an enhancement of the expertise and security of clouds is expected.

A Guidance Methodology Using Ubiquitous Sensor Network Information in Large-Sized Underground Facilities in Fire (대형 지하시설물에서 화재발생 시 USN정보를 이용한 피난 유도 방안)

  • Seo, Yonghee;Lee, Changju;Jung, Jumlae;Shin, Seongil
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.4D
    • /
    • pp.459-467
    • /
    • 2008
  • Because of the insufficiency of ground space, the utilization of underground is getting more and more in these days. Moreover, underground space is being used not only buildings but multipurpose space for movement, storage and shopping. However, ground space has vital weakness for fire compared to ground space. Especially in case of underground shopping center, there are various stuffs to burn and poisonous gas can be exposed on this count when the space is burned. A large number of casualties can be also occurred from conflagration as underground space has closed structures that prevent rapid evacuation and access. Therefore, this research proposes the guidance methodology for evacuation from conflagration in large-sized underground facilities. In addition, suggested methodology uses high technology wireless sensor information from up-to-date ubiquitous sensor networks. Fire information collected by sensors is integrated with existing underground facilities information and this is sent to guidance systems by inducing process. In the end, this information is used for minimum time paths finding algorithm considering the passageway capacity and distance. Also, usefulness and inadequacies of proposed methodology is verified by a case study.

A Design of Mobile Device Description Repository System (모바일 단말정보 저장소 시스템 설계)

  • Lee, Young-Il;Lee, Seung-Yun;Lee, Kang-Chan;In, Min-Kyo;Lee, Won-Suk;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.819-822
    • /
    • 2008
  • The demand against the contents service which is various with improvement capability of the mobile device. But the capability of heterogeneous mobile device to display contents has a difference from the side of the hardware, software, network conditions so the adaptation of contents is a solution to overcome this difference. This adaptation of contents is based on profile(DDL : Device Description Language) but there is no system which manages the profile efficiently. In this paper, we designed independent DDR(Device Description Repository) system that offers storage and optimized profiles processed by searching and recombination with request conditions.

  • PDF

Design and Implementation of a Wearable $SpO_2$ Module based WSN (무선센서네트워크 기반의 손목 착용형 $SpO_2$ 모듈 설계 및 구현)

  • Jung, Sang-Joong;Seo, Yong-Su;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.495-498
    • /
    • 2008
  • This paper describes design of a real-time, wearable reflectance pulse oximetry which is based Wireless Sensor Network. For the purpose of continuously monitoring vital signs of a human, wearable reflectance pulse oximetry is built into a wrist type that can be obtained $SpO_2$ value of patient unobtrusively. This designed $SpO_2$ module is based on a low-power 8 bit ATmega128L microcontroller operating in 3V. Low power operating $SpO_2$ module was integrated to wireless sensor node for user's health monitoring. This paper is focused on the successful integration of all these components into wearable reflectance pulse oximetry and evaluates its ability to measure patient' $SpO_2$ value. Information from this sensor was wirelessly transmitted to a base-station for storage and display purposes.

  • PDF

Solution Algorithm of Unsteady Flow in a Dendritic Channel System (수지형 하천에서의 부정류 흐름의 해석 알고리즘)

  • Choi, Gye Woon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.839-846
    • /
    • 1994
  • This paper presents a simultaneous solution algorithm for one-dimensional unsteady flow routing through a dendritic channel system. This simulations solution algorithm is based on the double-sweep method and utilizes separate recursion equations for continuity, momentum and energy equations for each of the individual components of a dendritic channel system. Through separate recursion equations for each of the components. the new algorithm converts a dendritic channel network problem into a single-channel problem. The new algorithm is utilized in conjunction with a linearized unsteady flow model using full dynamic flow equations. The required computer storage for the coefficient matrix of the whole system is reduced significantly from the $2N{\times}2N$ matrix to a $2N{\times}4$ matrix, where N is the number of cross sections used in the computation of flow variables in a dendritic channel system. The algorithm presented in this paper provides an efficient and accurate modeling of unsteady flow events through a dendritic channel system.

  • PDF

Distributed Structural Analysis Algorithms for Large-Scale Structures based on PCG Algorithms (대형구조물의 분산구조해석을 위한 PCG 알고리즘)

  • 권윤한;박효선
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.12 no.3
    • /
    • pp.385-396
    • /
    • 1999
  • In the process of structural design for large-scale structures with several thousands of degrees of freedom, a plethora of structural calculations with large amount of data storage are required to obtain the forces and displacements of the members. However, current computational environment with single microprocessor such as a personal computer or a workstation is not capable of generating a high-level of efficiency in structural analysis and design process for large-scale structures. In this paper, a high-performance parallel computing system interconnected by a network of personal computers is proposed for an efficient structural analysis. Two distributed structural analysis algorithms are developed in the form of distributed or parallel preconditioned conjugate gradient (DPCG) method. To enhance the performance of the developed distributed structural analysis algorithms, the number of communications and the size of data to be communicated are minimized. These algorithms are applied to the structural analyses of three large space structures as well as a 144-story tube-in-tube framed structure.

  • PDF

Sound Enhancement of low Sample rate Audio Using LMS in DWT Domain (DWT영역에서 LMS를 이용한 저 샘플링 비율 오디오 신호의 음질 향상)

  • 백수진;윤원중;박규식
    • The Journal of the Acoustical Society of Korea
    • /
    • v.23 no.1
    • /
    • pp.54-60
    • /
    • 2004
  • In order to mitigate the problems in storage space and network bandwidth for the full CD quality audio, current digital audio is always restricted by sampling rate and bandwidth. This restriction normally results in low sample rate audio or calls for the data compression scheme such as MP3. However, they can only reproduce a lower frequency range than a regular CD quality because of the Nyquist sampling theory. Consequently they lose rich spatial information embedded in high frequency. The propose of this paper is to propose efficient high frequency enhancement of low sample rate audio using n adaptive filtering and DWT analysis and synthesis. The proposed algorithm uses the LMS adaptive algorithm to estimate the missing high frequency contents in DWT domain and it then reconstructs the spectrally enhanced audio by using the DWT synthesis procedure. Several experiments with real speech and audio are performed and compared with other algorithm. From the experimental results of spectrogram and sonic test, we confirm that the proposed algorithm outperforms the other algorithm and reasonably works well for the most of audio cases.

Multi-level Consistency Control Techniques in P2P Multiplayer Game Architectures with Primary Copy (기본 사본을 갖는 P2P 멀티플레이어 게임 구조의 수준별 일관성 제어 기법)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.135-143
    • /
    • 2015
  • A Multiplayer Online Game(MOG) is a game capable of supporting hundreds or thousands of players and is mostly played using the Internet. P2P(peer-to-peer) architectures for MOGs can potentially achieve high scalability, low cost, and good performance. The basic idea of many P2P-based games is to distribute the game state among peers and along with it processing, network, and storage tasks. In a primary-copy based replication scheme where any update to the object has to be first performed on the primary copy, this means distributing primary copies of objects among peers. Most multiplayer games use a primary-copy model in order to provide strong consistency control over an object. Games consist of various types of actions that have different levels of sensitivity and can be categorized according to their consistency requirements. With the appropriate consistency level of each action type within a game, this paper allows developers to choose the right trade-off between performance and consistency. The performance for P2P game architecture with the primary-copy model is evaluated through simulation experiments and analysis.

Synthesis of Core-shell Copper nanowire with Reducible Copper Lactate Shell and its Application

  • Hwnag, Hyewon;Kim, Areum;Zhong, Zhaoyang;Kwon, Hyeokchan;Moon, Jooho
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2016.02a
    • /
    • pp.430.1-430.1
    • /
    • 2016
  • We present the concept of reducible fugitive material that conformally surrounds core Cu nanowire (NW) to fabricate transparent conducting electrode (TCE). Reducing atmosphere can corrodes/erodes the underlying/surrounding layers and might cause undesirable reactions such impurity doing and contamination, so that hydrogen-/forming gas based annealing is impractical to make device. In this regards, we introduce novel reducible shell conformally surrounding indivial CuNW to provide a protection against the oxidation when exposed to both air and solvent. Uniform copper lactate shell formation is readily achievable by injecting lactic acid to the CuNW dispersion as the acid reacts with the surface oxide/hydroxide or pure copper. Cu lactate shell prevents the core CuNW from the oxidation during the storage and/or film formation, so that the core-shell CuNW maintains without signficant oxidation for long time. Upon simple thermal annealing under vacuum or in nitrogen atmosphere, the Cu lactate shell is easily decomposed to pure Cu, providing an effective way to produce pure CuNW network TCE with typically sheet resistance of $19.8{\Omega}/sq$ and optical transmittance of 85.5% at 550 nm. Our reducible copper lactate core-shell Cu nanowires have the great advantage in fabrication of device such as composite transparent electrodes or solar cells.

  • PDF

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.