• Title/Summary/Keyword: server performance

Search Result 1,690, Processing Time 0.032 seconds

A Study on the Flow Characteristics of Desktop Personal Computer by In-Out Fan (흡.배기 팬에 의한 Desktop Personal Computer 내부의 유동특성에 관한 연구)

  • Lee, Haeng-Nam;Park, Gil-Moon;Jung, Han-Byul
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.31 no.6
    • /
    • pp.665-671
    • /
    • 2007
  • The purpose of this study is to find out a flow characteristics required by the design of a computer case and to provide information about the preliminary data of cooling efficiency of CPU and a flow inside of a case. We examined a flow characteristic-suction a tracing particle occurred from a surge tand installed at an inlet into a computer case and moving it to a exit duct-experimentally by using PIV. The experimental device was consists of a fan inflowing and discharging the air into the computer case and a slot installed with a CPU cooling ran add-on, and analyzed the data of Re-stress distribution, velocity distribution, and kinetic energy distribution. This research will make a great contribution to improvement of the efficiency and performance of notebook, workstation, server, and all the design of electronic devices using large scale integrated(LSI) as well as usual computers.

Location based Ad-hoc Network Routing Protocol for Ubiquitous Port (지능형 항만을 위한 위치기반 Ad-hoc 네트워크 라우팅 프로토콜)

  • Lee, Bong-Hee;Choi, Young-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.65-71
    • /
    • 2011
  • In this paper, the RFID / USN-based ad-hoc network structure is presented for efficient operation of a container terminal yard. Communication between fixed or mobile devices in the container terminal yard is accomplished through the ad-hoc node, to collect the status information of a container in real time. Any outside shipper of the container as well as central server allows to share the status information of a container through ad-hoc communication. In addition, to predict the maximum wireless transmission range of nodes by RFID tag position in the yard, LAODV (Location based AODV) routing protocol is proposed. The validity is proved by performance evaluation via computer simulation.

A Smart Framework for Mobile Botnet Detection Using Static Analysis

  • Anwar, Shahid;Zolkipli, Mohamad Fadli;Mezhuyev, Vitaliy;Inayat, Zakira
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2591-2611
    • /
    • 2020
  • Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.

Design and implementation of SCADA system to support scalability and openness (확장성과 개방성을 지원하는 SCADA 시스템 설계 및 구현)

  • Kim, Hyung-Ill;Lee, Sung-Young;Jeon, Tae-Woong;Park, Young-Tack
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.5 no.6
    • /
    • pp.753-763
    • /
    • 1999
  • The existing SCADA(Supervisory Control and Data Acquisition) system software is usually developed to suitable for the specific hardware platforms. However, as per rapid improvement of computer performance and development of network technology, it is required to support scalability and inter-operability in existing different SCADA systems. In order to meet such requirements, in this paper, we propose a new type of SCADA testbed using Java for electric distribution applications. The system consists of three modules; development support tools, client and server modules. The basic architecture of the proposed SCADA system is similar to existing one, however, we improve the function of MTU and MMI interface to facilitate LAN and WAN environment. Also, the proposed system can deals with alarm and history data by using heterogeneous DBMS. Since the system is built in Java environment, the development cost is cheap and it can support sacalability and portability. Our experience can be utilized to develop next generation of small and medium size of SCADA system.

  • PDF

A Performance Analysis for Server of Context-awareness Inference System based on IoT (IoT 기반 상황 인식 추론 시스템 서버 성능 분석)

  • Song, Jun-Seok;Kim, Sang-Young;Song, Byung-Hoo;Kim, Kyung-Tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.71-72
    • /
    • 2017
  • 최근 소형 IoT 디바이스의 보급에 따라 모든 것이 인터넷과 연결되는 초연결 사회로 발전하면서 IoT 플랫폼 및 서비스 시장규모가 급격히 확대되고 있다. 특히, 스마트 홈을 위한 IoT 플랫폼에 대한 연구와 개발이 집중되고 있는데, 본 논문에서는 이러한 스마트 홈에서 다양한 IoT 기기의 시너지 효과를 극대화 할 수 있는 상황 인식 추론 시스템 서버의 성능을 분석한다. 본 논문의 IoT 기반 상황 인식 추론 시스템은 상황 정보를 RDF Triple 구조로 표기하며, 서버의 경량화 추론 엔진을 이용하여 사용자가 입력한 룰을 기반으로 주변 상황을 추론하고 사용자 맞춤형 서비스를 제공한다. 이러한 상황 인식 추론 시스템 서버의 성능을 확인하기 위해, 본 논문에서는 기존 PC 기반 상황 인식 추론 시스템 서버와 IoT 노드 기반 시스템 서버에 대한 메모리 사용량, 메모리 할당량, CPU 사용량을 비교한다.

  • PDF

On Securing Web-based Educational Online Game Using SSL Protocol (SSL 프로토콜을 이용한 안전한 웹기반 교육용 온라인 게임)

  • Yani, Kadek Restu;Priyana, Yoga;Rusmin, Pranoto H.;RHEE, Kyung-Hyune
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.3
    • /
    • pp.790-798
    • /
    • 2016
  • Currently, web-based online games is becoming popular in supporting learning process due to their effective and efficient tool. However, online games have lack of security aspect, in particular due to increase in the number of personal information leakage. Since the data are transmitted over insecure channel, it will be vulnerable of being intercepted by attackers who want to exploit user's identity. This paper aims to propose an online web-based educational game, Vidyanusa which allows the students to register their personal information using a unique code, a user name and a password. It manages the users according to their schools, subject teachers and class levels. In addition, by adopting a unique code, the confidentiality of the user identity can be kept away from attackers. Moreover, in order to provide a secure data communication between client and server, Secure Socket Layer (SSL) protocol is adopted. The performance of the system after implementing SSL protocol is examined by loading a number of requests for various users. From the experiment result, it can be concluded that the SSL protocol can be applied to web-based educational system in order to offer security services and reliable connection.

AMV: A k-anonymization technique minimizing the cloaking region (AMV: 클로킹 영역을 최소화하는 k-익명화 기법)

  • Song, Doohee;Heo, Minjae;Sim, Jongwon;Hwang, Sori;Song, Moonbae;Park, Kwangjin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.9-14
    • /
    • 2014
  • In this paper, we propose AMV scheme which supports k-anonymization by using vectors for mobile clients. AMV can produces the minimal cloaking area using motion vector information of users (clients). The main reason for minimizing cloaking area is a server has to send the object information to all users who request the spatial queries. The experimental results show that the proposed AMV has superior performance over existing methods.

THE SYSTEM FOR UPDATING PARTIAL MAP

  • Jang, In-Sung;Lee, Moon-Soo;Kim, Ju-Wan
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.270-273
    • /
    • 2008
  • Telematics is a leading IT service where wireless internet service represented by information and mobility is extended to the area of transportations to provide Telematics service. One of the killer-application about Telematics is navigation system. Recently, due to the mass storage conversion, the performance of the terminal and mobile communications technology development, navigation system is also changed. It more and more develops into 3D in a pre-existence 2D map. In the future, it is expected to include the remote sensing map or video map. There is also the characteristic of all the information expressed in frequently a change partially happening. That is, POI(Point Of Interest) which is freshly registered or is deleted is many. In a pre-existence, Map Contents Providers offer the new version map by off-line monthly or quarterly. And a user wastes time and is inconvenient because of updating the total map by the off-line. Thus, in this paper, in order to resolve this, we describe MAUS(Map Air Update Server) for updating only the partial map that was changed

  • PDF

Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures (비단조 접근 구조를 갖는 CP-ABE 방식)

  • Sadikin, Rifki;Moon, SangJae;Park, YoungHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control mechanism without a trusted server. We propose an attribute-based access control mechanism by incorporating a CP-ABE scheme to ensure only authorized users can access the sensitive data. The idea of CP-ABE is to include access control policy in the ciphertexts, in which they can only be decrypted if a user possesses attributes that pass through the ciphertext's access structure. In this paper, we prove a secure CP-ABE scheme where the policy can be expressed in non-monotonic access structures. We further compare the performance of our scheme with the existing CP-ABE schemes.

An integrated structural health monitoring system for the Xijiang high-speed railway arch bridge

  • He, Xu-hui;Shi, Kang;Wu, Teng
    • Smart Structures and Systems
    • /
    • v.21 no.5
    • /
    • pp.611-621
    • /
    • 2018
  • Compared with the highway bridges, the relatively higher requirement on the safety and comfort of vehicle makes the high-speed railway (HSR) bridges need to present enhanced dynamic performance. To this end, installing a health monitor system (HMS) on selected key HSR bridges has been widely applied. Typically, the HSR takes fully enclosed operation model and its skylight time is very short, which means that it is not easy to operate the acquisition devices and download data on site. However, current HMS usually involves manual operations, which makes it inconvenient to be used for the HSR. Hence, a HMS named DASP-MTS (Data Acquisition and Signal Processing - Monitoring Test System) that integrates the internet, cloud computing (CC) and virtual instrument (VI) techniques, is developed in this study. DASP-MTS can realize data acquisition and transmission automatically. Furthermore, the acquired data can be timely shared with experts from various locations to deal with the unexpected events. The system works in a Browser/Server frame so that users at any places can obtain real-time data and assess the health situation without installing any software. The developed integrated HMS has been applied to the Xijiang high-speed railway arch bridge. Preliminary analysis results are presented to demonstrate the efficacy of the DASP-MTS as applied to the HSR bridges. This study will provide a reference to design the HMS for other similar bridges.