• Title/Summary/Keyword: 분산 방법

Search Result 5,272, Processing Time 0.034 seconds

PTP Management Node-based Time Synchronization Error Detection and Recovery System (PTP Management Node 기반 시각동기 오류 검출 및 대응 시스템)

  • Kim, Yoon Hyun;Son, Kyou Jung;Seo, Young Duk;Chang, Tae Gyu
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.248-253
    • /
    • 2020
  • This paper proposed PTP(Precision Time Protocol) management node-based time synchronization error detection and recovery system. The proposed system is to maintain the preciseness of time synchronization under time synchronization error situations on IEEE 1588-based network environment. To demonstrate the proposed time synchronization error detection and recovery system, PTP implemented EVM(Evaluation Module)-based experiments were performed. As a results of the experiments, it is shown that the proposed system effectively maintains the preciseness of time synchronization under time synchronization error situations.

Preparation of electrostatic spray pyrolysis derived nano powder and hydroxyapatite forming ability (정전분무 열분해법에 의한 나노분말의 제조 및 하이드록시 아파타이트 형성능력 평가)

  • Lee, Young-Hwan;Jeon, Kyung-Ok;Jeon, Young-Sun;Lee, Ji-Chang;Hwang, Kyu-Seog
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.16 no.6
    • /
    • pp.244-249
    • /
    • 2006
  • Electrostatic spray pyrolysis, a novel fabrication technique, has been used in this study to prepare calcium phosphate nano powders. Final annealing was done at $400^{\circ}C$ for 30min in air. The hydroxyapatite - forming ability of the annealed powder has been evaluated in Eagle's minimum essential medium solution (MEM). X-ray diffraction analysis, field emission - scanning electron microscope, energy dispersive X-ray spectroscope, and Fourier transform infrared spectroscope were used to characterized the annealed powders after immersion in MEM. The powder with an amorphous structure induced hydroxyapatite formation on their surfaces after immersion fer 15 days.

The Spatial Pattern of Freight Flows of Automobile in the Capital Region, Korea (수도권지역 자동차 화물유동의 공간적 패턴)

  • 박진희;홍현철
    • Journal of the Korean Geographical Society
    • /
    • v.37 no.1
    • /
    • pp.15-40
    • /
    • 2002
  • This study is an attempt to grasp the spatial patterns and characteristics in the freight flows based on freight quantity data in 1997. The spatial background for the study is the Capital Region, which plays an important role in regional economics and industrial development. The methodology in the research used factor analysis to produce a functional region. The study selected three categories of freight that account for more than 60 percent of freight flows, chemical industrial goods, light industrial goods, and metal machinery industrial goods. The target analysis unit is divided into 36 zones. The common characteristic of the three categories is that they are concentrated at one specific region than are dispersed regionally. And in particular, the remarkable feature is that the central region of the study is Seoul. Usually the eminent regions of nows were made where environment of distribution facilities is good but these were made in a less than good environment. I think a reason is that facilities were uneven distribution.

Integration of Kriging Algorithm and Remote Sensing Data and Uncertainty Analysis for Environmental Thematic Mapping: A Case Study of Sediment Grain Size Mapping (지표환경 주제도 작성을 위한 크리깅 기법과 원격탐사 자료의 통합 및 불확실성 분석 -입도분포지도 사례 연구-)

  • Park, No-Wook;Jang, Dong-Ho
    • Journal of the Korean Geographical Society
    • /
    • v.44 no.3
    • /
    • pp.395-409
    • /
    • 2009
  • The objective of this paper is to illustrate that kriging can provide an effective framework both for integrating remote sensing data and for uncertainty modeling through a case study of sediment grain size mapping with remote sensing data. Landsat TM data which show reasonable relationships with grain size values are used as secondary information for sediment grain size mapping near the eastern part of Anmyeondo and Cheonsuman bay. The case study results showed that uncertainty attached to prediction at unsampled locations was significantly reduced by integrating remote sensing data through the analysis of conditional variance from conditional cumulative distribution functions. It is expected that the kriging-based approach presented in this paper would be efficient integration and analysis methodologies for any environmental thematic mapping using secondary information as well as sediment grain size mapping.

A Probabilistic Analysis on Logarithmic-Spiral Failure of Slope in Consideration of Load Variance (하중의 분산성을 고려한 대수누선사면 파괴의 확률론적 해석)

  • 정성관;권무남
    • Geotechnical Engineering
    • /
    • v.4 no.4
    • /
    • pp.39-50
    • /
    • 1988
  • Until now, most probabilistic approaches to the slope stability analysis have been accomplished on the arc failure surface without load. In this study, the relationships between the probability of failure and the safety factor are investigated when the shape of failure is logarithmic spiral on the homogeneous slope with ground water level, the probability distributions of the load and the strength parameter of soil being assumed as normal distribution, log-normal distribution and beta distribution. The results obtained are as follows; 1. For the same safety factor, the design of slope is more reasonable by using the probability of failure than by the safety factor because the probability of failure is increased as the coefficient of variation is increased. 2, The safety factor is more reasonably determined by the coefficient of variation of the strength parameter than by the field condition when the safety factor is applied to design of slope.

  • PDF

Long haul transmission link using a optimized circulating loop for optical wavelength division multiplexing signals (최적화된 반복루프를 이용한 파장분할다중화 광신호 장거리 전송)

  • Choi, Bo-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1757-1763
    • /
    • 2014
  • Optical wavelength division multiplexing signals of eight non-return-to-zero 10 Gb/s channels were transmitted on the long-haul link up to 720 km. The link span was composed of 80 km single mode fiber, dispersion compensation fiber for complete compensation, and EDFAs. A circulating loop method was applied to the link experiment and the loop was optimized for the transmission link. Wavelength-dependent gain variation of EDFA was compensated using EDFAs of opposite gain slopes without expensive gain flattening filters. Average OSNR was aggravated to 22 dB and the worst OSNR channel variation was 9.7 dB after the transmission. It was confirmed by analyzing optical spectra that this OSNR variation was mainly caused by the hole burning effect of EDFA.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

Adaptive Load Balancing based on Consistency (일관성에 기초한 적응 부하 평형)

  • Kim, Jun-Hyeong;O, Ha-Ryeong;Lee, Jae-Mun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.288-298
    • /
    • 1995
  • Load balancing attempts to improve the performance of a distributed computing system by transferring some of the workload of a congested site to others. A load balancing scheme that supports both the source-initiated and the server- initiated load balancing is proposed in this paper. It can model both the m/m/1 queue(no load balancing) and the m/m/n queue(perfect load balancing) as the extreme State variables are replicated into every site, and copy consistency constraints are relaxed more weakly. We propose weak copy consistency constraints which correlate the outdated state information to that of the current state. We also derive sufficient conditions under which each scheduler can guarantee the load balancing without communication Using this model, the problem of load balancing is converted to that of maintaining the consistency of states and communication overhead becomes less than that of the bidding algorithm. The scheme is simulated by event tracing, compared to the two extreme cases and the bidding algorithm. The results show that the mean response time and the number of messages are reduced by 0-35% and 40-100% respectively, compared with the bidding algorithm. Finally the effects of some system parameters are described.

  • PDF

A Traffic Shaping Scheme Considering ATM Traffic Characteristics (ATM 트래픽 특성을 고려한 트래픽 쉐이핑 기법)

  • Choi, Chang-Won;Kim, Tai-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.667-676
    • /
    • 1995
  • In ATM traffic multiplexing, the cell clumping and the cell dispersion are occured due to the cell delay variance(CDV) which changes the traffic characteristics. These cell variances increase the burstiness of t.he cell streams and make the network congested. The function of the traffic shaping is necessary to transmit the input streams into the networks or into the traffic policing schemes with some intevals. Most of the existing studies regard the input traffics as the traffic with the identical characteristics. In this study, the traffic shaping is processed by considering the traffic characteristICS with t.he loss-sensitive traffic and the delay-sensitive traffic. The traffic shaping model and the traffic shaping algorithm which considers the" characteristics of input streams have been presented. The traffic effect On t.he CDV size is also studied. The proposed scheme is compared to Virtual Scheduling Algorithm(VSA) and the efficiency of the proposed scheme is evaluated. According to the simulation results, t.he mean delay is decreased about 12% in delay-sensitive traffic and the traffic burstiness is decreased about 11 % in loss-sensitive traffic.

  • PDF

Array Localization for Multithreaded Code Generation (다중스레드 코드 생성을 위한 배열 지역화)

  • Yang, Chang-Mo;Yu, Won-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1407-1417
    • /
    • 1996
  • In recent researches on thread partitioning algorithms break a thread at the long latency operation and merge threads to get the longer threads under the given constraints. Due to this limitation, even a program with little parallelism is partitioned into small-sized threads and context-swithings occur frequently. In the paper, we propose another method array localization about the array name, dependence distance(the difference of accessed element index from loop index), and the element usage that indicates whether element is used or defined. Using this information we can allocate array elements to the node where the corresponding loop activation is executed. By array localization, remote accesses to array elements can be replaced with local accesses to localized array elements. As a resuit,the boundaries of some threads are removed, programs can be partitioned into the larger threads and the number of context switchings reduced.

  • PDF