• Title/Summary/Keyword: Backup

Search Result 530, Processing Time 0.032 seconds

A Research on PV-connected ESS dissemination strategy considering the effects of GHG reduction (온실가스감축효과를 고려한 태양광 연계형 에너지저장장치(ESS) 보급전략에 대한 연구)

  • Lee, Wongoo;KIM, Kang-Won;KIM, Balho H.
    • Journal of Energy Engineering
    • /
    • v.25 no.2
    • /
    • pp.94-100
    • /
    • 2016
  • ESS(Energy Storage System) is an important source that keeps power supply stable and utilizes electricity efficiently. For example, ESS contributes to resolve power supply imbalance, stabilize new renewable energy output and regulate frequency. ESS is predicted to be expanded to 55.9GWh of installed capacity by 2023, which is 30 times more than that of 2014. To raise competitiveness of domestic ESS industry in this increasing world market, we have disseminated load-shift ESS for continuous power supply imbalance with FR ESS, and also necessity to secure domestic track record is required. However in case of FR ESS, utility of installing thermal power plant is generally generated within 5% range of rated capacity, so that scalability of domestic market is low without dramatic increase of thermal power plant. Necessity of load-shift ESS dissemination is also decreasing effected by surplus backup power securement policy, raising demand for new dissemination model. New dissemination model is promising for $CO_2$ reduction effect in spite of intermittent output. By stabilizing new renewable energy output in connection with new renewable energy, and regulating system input timing of new renewable energy generation rate, it is prospected model for 'post-2020' regime and energy industry. This research presents a policy alternatives of REC multiplier calculation method to induce investment after outlining PV-connected ESS charge/discharge mode to reduce GHG emission, This alternative is projected to utilize GHG emission reduction methodology for 'Post-2020' regime, big issue of new energy policy.

Failure Restoration of Mobility Databases by Learning and Prediction of User Mobility in Mobile Communication System (이동 통신 시스템에서 사용자 이동성의 학습과 예측에 의한 이동성 데이타베이스의 실채 회복)

  • Gil, Joon-Min;Hwang, Chong-Sun;Jeong, Young-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.412-427
    • /
    • 2002
  • This paper proposes a restoration scheme based on mobility learning and prediction in the presence of the failure of mobility databases in mobile communication systems. In mobile communication systems, mobility databases must maintain the current location information of users to provide a fast connection for them. However, the failure of mobility databases may cause some location information to be lost. As a result, without an explicit restoration procedure, incoming calls to users may be rejected. Therefore, an explicit restoration scheme against the failure of mobility databases is needed to guarantee continuous service availability to users. Introducing mobility learning and prediction into the restoration process allows systems to locate users after a failure of mobility databases. In failure-free operations, the movement patterns of users are learned by a Neuro-Fuzzy Inference System (NFIS). After a failure, an inference process of the NFIS is initiated and the users' future location is predicted. This is used to locate lost users after a failure. This proposal differs from previous approaches using checkpoint because it does not need a backup process nor additional storage space to store checkpoint information. In addition, simulations show that our proposal can reduce the cost needed to restore the location records of lost users after a failure when compared to the checkpointing scheme

A Prospect for Growth and Economic Size of Foods-for-Elderly Industry -Focused on Health Functional Foods and Foods for Special Dietary Uses- (고령친화식품산업의 성장과 규모 전망 -건강기능식품과 특수용도식품을 중심으로-)

  • Jin, Hyun Joung;Woo, Hee Dong
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.4
    • /
    • pp.339-348
    • /
    • 2012
  • The purpose of this study is to predict the economic size of foods-for-elderly market, which will be valuable information for establishing related policy and backup system. After setting the scope of related industry, detailed information for current market situation was investigated and a systematic forecast for market changes in the future was performed. Economic growth, changes in consumer expenditure and economic status of the elderly, current subscription of medical insurance and saving for pension were reflected. In addition, a survey toward related firms was completed and changes in aged population and incidence of chronic disease in the elderly were taken into account. Results show that the annual growth rate of the market was predicted to be the minimum 4.54% through the maximum 8.32% from 2010 to 2025 and its market size was forecasted to be the minimum 7,073 ten million won through the maximum 10,976 ten million won. It is expected that the market of foods-for-elderly will grow rapidly with development of foods technology and fast increase of aged population. Especially, growth of health functional foods and foods for special dietary uses for elderly will be distinguished. However, it seems that related firms are on the hedge, watching current trend of the related industry. This may results in insufficient supply against the demand. Therefore, policy for foods-for-elderly should be introduced and systematically administered, including R&D support, standardization and authentication for foods-for-elderly, construction of related database system.

Use of Sentinel Lymph Node Biopsy after Neoadjuvant Chemotherapy in Patients with Axillary Node-Positive Breast Cancer in Diagnosis

  • Choi, Hee Jun;Kim, Isaac;Alsharif, Emad;Park, Sungmin;Kim, Jae-Myung;Ryu, Jai Min;Nam, Seok Jin;Kim, Seok Won;Yu, Jonghan;Lee, Se Kyung;Lee, Jeong Eon
    • Journal of Breast Cancer
    • /
    • v.21 no.4
    • /
    • pp.433-4341
    • /
    • 2018
  • Purpose: This study aimed to evaluate the effects of sentinel lymph node biopsy (SLNB) on recurrence and survival after neoadjuvant chemotherapy (NAC) in breast cancer patients with cytology-proven axillary node metastasis. Methods: We selected patients who were diagnosed with invasive breast cancer and axillary lymph node metastasis and were treated with NAC followed by curative surgery between January 2007 and December 2014. We classified patients into three groups: group A, negative sentinel lymph node (SLN) status and no further dissection; group B, negative SLN status with backup axillary lymph node dissection (ALND); and group C, no residual axillary metastasis on pathology with standard ALND. Results: The median follow-up time was 51 months (range, 3-122 months) and the median number of retrieved SLNs was 5 (range, 2-9). The SLN identification rate was 98.3% (234/238 patients), and the false negative rate of SLNB after NAC was 7.5%. There was no significant difference in axillary recurrence-free survival (p=0.118), disease-free survival (DFS; p=0.578) or overall survival (OS; p=0.149) among groups A, B, and C. In the subgroup analysis of breast pathologic complete response (pCR) status, there was no significant difference in DFS (p=0.271, p=0.892) or OS (p=0.207, p=0.300) in the breast pCR and non-pCR patients. Conclusion: These results suggest that SLNB can be feasible and oncologically safe after NAC for cytology-determined axillary node metastasis patients and could help reduce arm morbidity and lymphedema by avoiding ALND in SLN-negative patients.

Analysis of Propagation Environment for Selecting R-Mode Reference and Integrity Station (R-Mode 보정국과 감시국 선정을 위한 전파환경 분석에 관한 연구)

  • Jeon, Joong-Sung;Jeong, Hae-Sang;Gug, Seung-Gi
    • Journal of Navigation and Port Research
    • /
    • v.45 no.1
    • /
    • pp.26-32
    • /
    • 2021
  • In ocean field, the spread of the Fourth Industrial Revolution based on information and communication technology requires high precision and stable PNT&D (Position, Navigation, Timing and Data). As the IMO (International Maritime Organization) and IALA (The International Association of Marine Aids to Navigation and Lighthouse Authorities) are requiring backup systems due to mitigate vulnerabilities and the increase of dependency on GNSS (Global Navigation Satellite System), Korea is conducting a research & development of R-Mode. An DGPS (Differentiate Global Positioning System) reference station that uses MF, an existing maritime infrastructure, and AIS (Automatic Identification System) base stations that use 34 integrity station and VHF will be utilized in this study to avoid redundant investment. Because there are radio shadow areas that display low signal levels in the west sea, the establishment of new R-Mode reference and integrity station will be intended to resolve problems regrading the radio shadow area. Because the frequency has a characteristic in that radio wave transmits well along the ground (water surface) in low frequency band, simulation and measurement were conducted therefore this paper to propose candidate sites for R-Mode reference and integrity station resulted through p wave's propagation characteristics analysis. Using this paper, R-Mode reference and integrity station can be established at appropriate locations to resolve radio shadow areas in other regions.

Design and Implementation of Analysis Techniques for Fragmented Pages in the Flash Memory Image of Smartphones (스마트폰 플래시 메모리 이미지 내의 단편화된 페이지 분석 기법 및 구현)

  • Park, Jung-Heum;Chung, Hyun-Ji;Lee, Sang-Jin;Son, Young-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.827-839
    • /
    • 2012
  • A cell phone is very close to the user and therefore should be considered in digital forensic investigation. Recently, the proportion of smartphone owners is increasing dramatically. Unlike the feature phone, users can utilize various mobile application in smartphone because it has high-performance operating system (e.g., Android, iOS). As acquisition and analysis of user data in smartphone are more important in digital forensic purposes, smartphone forensics has been studied actively. There are two way to do smartphone forensics. The first way is to extract user's data using the backup and debugging function of smartphones. The second way is to get root permission, and acquire the image of flash memory. And then, it is possible to reconstruct the filesystem, such as YAFFS, EXT, RFS, HFS+ and analyze it. However, this methods are not suitable to recovery and analyze deleted data from smartphones. This paper introduces analysis techniques for fragmented flash memory pages in smartphones. Especially, this paper demonstrates analysis techniques on the image that reconstruction of filesystem is impossible because the spare area of flash memory pages does not exist and the pages in unallocated area of filesystem.

A Study on the application method of UPS's Battery Safety for battleship Command and Fire Control System (지휘무장통제체계용 UPS 배터리의 안전성 확보방안 연구)

  • Park, Gun-Sang;Kim, Jae-Yun;Kim, Dong-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.587-596
    • /
    • 2021
  • Naval battleships have systems to perform special purposes, such as the Command and Fire Control System (CFCS). Some of the this equipment should be equipped with an Uninterruptible Power System (UPS ) to ensure operational continuity and the backup of important data, even during unexpected power outages caused by problems with the ship's power generator. Heavy combat losses can occur if the equipment cannot satisfy the function. Therefore, it is important to design a stable UPS. The battery and Battery Management System (BMS) are two of the most important factors for designing a stable UPS. A power outage will be encountered if the battery and BMS are not stable. The customer will be exposed to abnormal situations, loss of important tactical data, and inability to operate some of the CFCS. As a result, an enhanced safety system should be designed. Thus, this study implemented and verified the improved system in terms of three methods, such as comparative analysis of the batteries, improvement about leakage current of the circuit, and tests of the aggressive environmental resistance to improve the UPS for CFCS.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

Extending the BR2K technique to enhance the robustness of blockchain application services

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.125-134
    • /
    • 2022
  • In this paper, we propose an extension method of the BR2K technique for enhancing the robustness of blockchain application services. The BR2K (Blockchain application, Replication & Recovery technique using Kubernetes) technique was recently developed to support the robustness of blockchain services through service replication and rapid restart. The proposed technique extends the existing BR2K technique to provide a state version, which is meta-information about the service state, and a method for safely managing it, and use the state version to determine the timing for service state recovery. Also, the technique provides systematic service state backup for service recovery and joining of new service nodes by utilizing the version information and the service registry which acts as a service recovery center in the BR2K technique. Based on this, it is possible to support new service nodes to join the replication service with consistency. As a result, new service nodes can be quickly added to the BR2K service in operation, enhancing the robustness of the BR2K service. In addition, the extended method is applied to the pilot blockchain application service and tested in a Kubernetes environment composed of virtual machines to confirm the validity of service replication consistency and rapid service recovery in the event of node failures.

Design and Implementation of User-Level FileSystem in the Combat Management System

  • Kang, Seok-Hyun;Kim, Keun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.9-16
    • /
    • 2022
  • In this paper, we propose a plan to design and utilize the RDBS(Record Block Data file management System) so that data can be recovered when data files in the Combat Management System are mismatched. The CMS(Combat Management System) manages the same files in multiple IPN(Infomation Processing Node) repositories to support multiplexing. However, mismatches in data files can occur due to equipment maintenance or user immaturity. The existing CMS does not manage the history of changes in data files, and when a mismatch occurs, data file were synchronized based on the latest date. But, It is difficult to say that files with the latest date have the highest reliability, and once the file synchronization has progressed, it cannot be recovered with pre-synchronization data. To solve this problem, data was stored and synchronized in units of record blocks using RDBS proposed in this paper, and the Rsync algorithm was used to reduce the overhead of file synchronization due to units of record blocks. SW applied with RDBS was tested for performance in a simulated environment, and it was confirmed that it could be applied to CMS through normal operation confirmation.