• Title/Summary/Keyword: Block Cloud

Search Result 87, Processing Time 0.026 seconds

Performance Evaluation and Analysis for Block I/O Access Pattern between KVM-based Virtual Machine and Real Machine in the Virtualized Environment (KVM 기반 가상화 환경에서의 가상 머신과 리얼 머신의 입출력 패턴 분석 및 성능 측정)

  • Kim, Hyeunjee;Kim, Youngwoo;Kim, Youngmin;Choi, Hoonha;No, Jaechun;Park, Sungsoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.86-96
    • /
    • 2016
  • Recently, virtualization is becoming the critical issue in the cloud computing due to its advantages of resource utilization and consolidation. In order to efficiently use virtualization services, several issues should be taken into account, including data reliability, security, and performance. In particular, a high write bandwidth on the virtual machine must be guaranteed to provide fast responsiveness to users. In this study, we implemented a way of visualizing comparison results between the block write pattern of KVM-based virtual machine and that of the real machine. Our final objective is to propose an optimized virtualization environment that enables to accelerate the disk write bandwidth.

A Study on Senior Behavioral Analysis and Care System Using Big Data (빅데이터를 활용한 시니어 행동분석 돌봄 시스템 연구)

  • Jang, Jae-Youl;Choi, Jin-Il;Uh, Je-Sun;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.973-980
    • /
    • 2020
  • Various applied solutions utilizing the technology of the 4th Industrial Revolution are being applied to the health and welfare sector. In the proposed paper, the senior care system solution based on big data is designed. The principles of operation of the proposed system are collecting senior behavioral analyses through API information of smart devices, and sending a primary notification to the relevant senior in cases where a senior reacts differently from the existing standards. A system is proposed to prevent dangerous situations by providing information to peer seniors, family members, and the emergency center in cases where there is no response.

Optimization of Lightweight Encryption Algorithm (LEA) using Threads and Shared Memory of GPU (GPU의 스레드와 공유메모리를 이용한 LEA 최적화 방안)

  • Park, Moo Kyu;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.719-726
    • /
    • 2015
  • As big-data and cloud security technologies become popular, many researchers have recently been conducted on faster and lighter encryption. As a result, National Security Research Institute developed LEA which is lightweight and fast block cipher. To date, there have been various studies on lightweight encryption algorithm (LEA) for speeding up using GPU rather than conventional CPU. However, it is rather difficult to explore any guideline how to manipulate the GPU for the efficient usage of the LEA. Therefore, we introduce a guideline which explains how to implement and design the optimal LEA using GPU.

Measurement uncertainty evaluation in FaroArm-machine using the bootstrap method

  • Horinov, Sherzod;Shaymardanov, Khurshid;Tadjiyev, Zafar
    • Journal of Multimedia Information System
    • /
    • v.2 no.3
    • /
    • pp.255-262
    • /
    • 2015
  • The modern manufacturing systems and technologies produce products that are more accurate day by day. This can be reached mainly by improvement the manufacturing process with at the same time restricting more and more the quality specifications and reducing the uncertainty in part. The main objective an industry becomes to lower the part's variability, since the less variability - the better is product. One of the part of this task is measuring the object's uncertainty. The main purpose of this study is to understand the application of bootstrap method for uncertainty evaluation. Bootstrap method is a collection of sample re-use techniques designed to estimate standard errors and confidence intervals. In the case study a surface of an automobile engine block - (Top view side) is measured by Coordinate Measuring Machine (CMM) and analyzed for uncertainty using Geometric Least Squares in complex with bootstrap method. The designed experiment is composed by three similar measurements (the same features in unique reference system), but with different points (5, 10, 20) concentration at each level. Then each cloud of points was independently analyzed by means of non-linear Least Squares, after estimated results have been reported. A MatLAB software tool used to generate new samples using bootstrap function. The results of the designed experiment are summarized and show that the bootstrap method provides the possibility to evaluate the uncertainty without repeating the Coordinate Measuring Machine (CMM) measurements many times, i.e. potentially can reduce the measuring time.

Ubiquitous intelligent lesson management system (유비쿼터스 지능형 교육관리 시스템)

  • Hong, Sung-Moon;Oh, Suk-Kyung;Lim, Hyung-Min;Cho, Jae-Min;Kim, Dong-Suk;Park, Sang-Gug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.739-742
    • /
    • 2011
  • This paper describes system design and realization to the ubiquitous intelligent lesson management. This system includes students management by utilizing RFID and web-cam, personal security certification by fingerprint recognition, keyboard locking of PC by hooking technology, personal data management by cloud system, internet block access by a packet monitoring. We have design and realize this system, In the future, we will applicate our system to the classes using computer.

  • PDF

A Study on Improvement for Curved Block Support Pipe Design and Process with TOC Thinking Process (TOC의 사고프로세스를 이용한 곡블럭 서포트 파이프의 설계 및 공정 개선 방법에 관한 연구)

  • Kwon, Oh Uk;Song, In;Choi, Sang Il;Hu, Chul Su;Kim, Hyuk Jun
    • Special Issue of the Society of Naval Architects of Korea
    • /
    • 2013.12a
    • /
    • pp.21-29
    • /
    • 2013
  • For the purpose of supporting Curved Blocks, pipe welding is commonly used on Curved panel. Typically, when it comes to attaching supporting pipe on heavy incurvated surface, it makes much loss in the process of design, cutting, welding. This paper gives proper methods to collecting problems and Core conflicts surrounding Support Pipe by using of TOC (Theory Of Constraints). Therefore drawing two solutions, pipe development program and NC generating from pipe development Data for Plate Cutting machine. It describes a process of erasing loss surrounding Support Pipe with "TOC Thinking process" and development of two programs in this paper.

  • PDF

Effect of Added Pluronics on fabrication of Poly(L-lactic acid) Scaffold via Thermally-Induced Phase Separation (상 분리법을 이용한 Poly(L-lactic acid) Scaffold제조에 미치는 Pluronics의 영향)

  • 김고은;김현도;이두성
    • Polymer(Korea)
    • /
    • v.26 no.6
    • /
    • pp.821-828
    • /
    • 2002
  • Regular and highly interconnected macroporous poly(L-lactic acid) (PLLA) scaffolds with pore size of 10∼300 ㎛ were fabricated through thermally induced phase separation of a PLLA-dioxane-water ternary system in the presence of a small amount of Pluronics. Addition of Pluronics to the ternary system raised the cloud-point temperature curve in the order of P-123< F-68< F-127. The Pluronics act as nuclei for the phase separation. This assistance is enhanced with increasing length of the hydrophilic PEO blocks in the Pluronics molecules. Liquid-liquid spinodal phase separation was induced at higher temperatures in the systems containing Pluronics because the spinodal region is raised to higher temperature. The absorption of Pluronics onto the interface stabilizes a macro scale structure and increases the interconnection of pores.

Optimal Implementation of Lightweight Block Cipher PIPO on CUDA GPGPU (CUDA GPGPU 상에서 경량 블록 암호 PIPO의 최적 구현)

  • Kim, Hyun-Jun;Eum, Si-Woo;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1035-1043
    • /
    • 2022
  • With the spread of the Internet of Things (IoT), cloud computing, and big data, the need for high-speed encryption for applications is emerging. GPU optimization can be used to validate cryptographic analysis results or reduced versions theoretically obtained by the GPU in a reasonable time. In this paper, PIPO lightweight encryption implemented in various environments was implemented on GPU. Optimally implemented considering the brute force attack on PIPO. In particular, the optimization implementation applying the bit slicing technique and the GPU elements were used as much as possible. As a result, the implementation of the proposed method showed a throughput of about 19.5 billion per second in the RTX 3060 environment, achieving a throughput of about 122 times higher than that of the previous study.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

A Study on the Acceptability of Digital Transformation in the Port Logistics (항만물류분야의 디지털 전환 수용성에 관한 연구)

  • Hyeon-Deok Song;Myung-Hee Chang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.298-299
    • /
    • 2022
  • Digital Transformation in the maritime transportation sector means "by utilizing digital technologies such as artificial intelligence, big data, Internet of Things, block chain, and cloud to create new business models, products, and services for maritime transportation-related companies. It can be defined as a continuous process that adapts to or drives disruptive changes in the market" (Chang, 2021). In a situation where various digital conversion technologies are applied and started to be used in the domestic port logistics field, active acceptance by members can bring about the success of digital conversion. Therefore, in this study, in order to investigate the acceptability of digital transformation in the domestic port logistics sector,

  • PDF