• Title/Summary/Keyword: Communication Cost

Search Result 3,196, Processing Time 0.032 seconds

An Improvement of Kubernetes Auto-Scaling Based on Multivariate Time Series Analysis (다변량 시계열 분석에 기반한 쿠버네티스 오토-스케일링 개선)

  • Kim, Yong Hae;Kim, Young Han
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.73-82
    • /
    • 2022
  • Auto-scaling is one of the most important functions for cloud computing technology. Even if the number of users or service requests is explosively increased or decreased, system resources and service instances can be appropriately expanded or reduced to provide services suitable for the situation and it can improves stability and cost-effectiveness. However, since the policy is performed based on a single metric data at the time of monitoring a specific system resource, there is a problem that the service is already affected or the service instance that is actually needed cannot be managed in detail. To solve this problem, in this paper, we propose a method to predict system resource and service response time using a multivariate time series analysis model and establish an auto-scaling policy based on this. To verify this, implement it as a custom scheduler in the Kubernetes environment and compare it with the Kubernetes default auto-scaling method through experiments. The proposed method utilizes predictive data based on the impact between system resources and response time to preemptively execute auto-scaling for expected situations, thereby securing system stability and providing as much as necessary within the scope of not degrading service quality. It shows results that allow you to manage instances in detail.

Efficient IoT data processing techniques based on deep learning for Edge Network Environments (에지 네트워크 환경을 위한 딥 러닝 기반의 효율적인 IoT 데이터 처리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.325-331
    • /
    • 2022
  • As IoT devices are used in various ways in an edge network environment, multiple studies are being conducted that utilizes the information collected from IoT devices in various applications. However, it is not easy to apply accurate IoT data immediately as IoT data collected according to network environment (interference, interference, etc.) are frequently missed or error occurs. In order to minimize mistakes in IoT data collected in an edge network environment, this paper proposes a management technique that ensures the reliability of IoT data by randomly generating signature values of IoT data and allocating only Security Information (SI) values to IoT data in bit form. The proposed technique binds IoT data into a blockchain by applying multiple hash chains to asymmetrically link and process data collected from IoT devices. In this case, the blockchainized IoT data uses a probability function to which a weight is applied according to a correlation index based on deep learning. In addition, the proposed technique can expand and operate grouped IoT data into an n-layer structure to lower the integrity and processing cost of IoT data.

A Study for the Efficient Improvement Measures of Military EMP Protection Ability (국방 EMP 방호능력의 효율적 개선을 위한 방안 연구)

  • Jung, Seunghoon;An, Jae-Choon;Hwang, Yeung-Kyu;Jung, Hyun-Ju;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.219-227
    • /
    • 2017
  • Current military command information system uses electronic equipment a lot on which semiconductor chip is attached. It seems its' importance will increase more with latest information communication technology developing. Electronic equipment which uses electricity contains regular tolerance to high output electric signal. And EMC specification is the standardized of this electronic equipment's tolerance. On the other hand, the Institute of Atomic Energy Research has ever declared that high output electromagnetic pulse(EMP) will be broken out within the radius of 170Km when 10kt nuclear explosion occurs at an altitude of 40Km above Seoul. Then, the region suffer from the damage of most electronic equipments. Therefore, the norm to protect the influences in that case is defined by EMP protection specification. Most common electronic equipments meet the EMC norm, but there is no way to check whether they meet the EMP norm or not. That is because it is difficult to check whether they meet EMP protection norm and is on the matter of cost. Except inevitable cases, there is no review of checking whether they meet the norm or not. Considering the above, in this research, we speculate about the measures to improve military EMP protection ability by analyzing the EMC-EMP correlation and checking the EMP protection ability of general electronic equipment through the analysis.

Determinants of U.S. Buyer Loyalty toward Gobizkorea.com: A Study Focused on Country Image, E-Service Quality, and Satisfaction (미국 바이어의 고비즈코리아에 대한 충성도 결정요인: 국가이미지, 서비스 품질 및 만족도를 중심으로)

  • Chung, Jae-Eun;Oh, Jeong Suk;Jeong, So Won
    • Korea Trade Review
    • /
    • v.43 no.5
    • /
    • pp.203-232
    • /
    • 2018
  • Gobizkorea is an online B2B matching platform operated by the Small & Medium Business Corporation. Gobizkorea provides an opportunity for resource-poor SMEs to promote their products and exploit new market opportunities at low cost. The successful operation of Gobizkorea will contribute to the increased exports of Korean SMEs. Accordingly, the present study examined determinants of foreign buyer loyalty toward Gobizkorea.com focusing on country image, e-service quality, and satisfaction. One hundred two survey questionnaires were collected from U.S. buyers registered with Gobizkorea.com. Exploratory and confirmatory factor analysis confirmed three dimensions of e-service quality including information & efficiency, reliability & privacy, and prompt communication & delivery. The path analysis results showed that the country image of Korea significantly and positively affected these three dimensions of e-service quality. Information & efficiency and reliability & privacy positively influenced buyer satisfaction. Reliability & privacy and satisfaction had a positive impact on buyer loyalty. This study enhances the understanding of the foreign buyers use of the domestic e-market platform by examining of determinants of U.S. buyer loyalty toward Gobizkorea.

One-to-All and All-to-all Broadcasting Algorithms of Matrix Hypercube (매트릭스 하이퍼큐브의 일-대-다 방송과 다-대-다 방송 알고리즘)

  • Kim, Jongseok;Lee, Heongok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.8
    • /
    • pp.825-834
    • /
    • 2018
  • Broadcasting is a basic data communication method for interconnection networks. There are two types of broadcasting. One-to-all broadcasting is to transmit a message from one node to all other nodes and all-to-all broadcasting is to transmit a message from all the nodes that have messages to other nodes. And by the using way of the transmission port per unit time, there are two schemes of broadcasting. Single port telecommunication(SLA) is to transmit messages from one node that contains the messages to one adjacent node only and all port telecommunication(MLA) is to transmit messages from one node to all adjacent nodes within a time of unit. Matrix hypercube is that an interconnection network has improved network cost than that of hypercube with the same number of nodes. In this paper, we analyze broadcasting scheme of matirx hypercube. First, we propose one-to-all and all-to-all broadcasting algorithms of matrix hypercube. And we prove that one-to-all broadcasting times are 2n+1 and $2{\lceil}{\frac{n}{2}}{\rceil}+1$ based on the SLA and MLA models, respectively. Also, we show all-to-all broadcasting time using SLA model is $5{\times}2^{\frac{n}{2}}-2$ when n=even, and is $5{\times}2^{\frac{n-1}{2}}+2$ when n=odd.

The Study on Control Algorithm of Elevator EDLC Emergency Power Converter (승강기 EDLC 비상전원 전력변환장치 제어 알고리즘 연구)

  • Lee, Sang-min;Kim, IL-Song;Kim, Nam
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.709-718
    • /
    • 2017
  • The installation of the elevator ARD(Automatic Rescue Device) system has been forced into law in these days in order to safely rescue passengers during power failure. The configuration of the ARD system consists of energy storage device, power converter and control systems. The EDLC(Electric Double Layer Capacitor) are used as energy storage device for rapid charge/discharge purposes. The power conditioning system (PCS) consists of bi-directional converter, 3-phase converter and control system. The dead-beat control system is adopted for most systems however it requires complex mathematical calculations, the high performance microprocessors are mandatory and thus it can be a cause of high manufacturing cost. In this paper the new control method for average current mode control is presented for simple structure. The control algorithm is applied to the single phase system and then expands to three phase system to meet the sysem requirements. The mathematical modeling using average modeling method is presented and analysed by PSIM computer simulation to verifie the validity of the proposed control methods.

A Model for Supporting Information Security Investment Decision-Making Considering the Efficacy of Countermeasures (정보보호 대책의 효과성을 고려한 정보보호 투자 의사결정 지원 모형)

  • Byeongjo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.27-45
    • /
    • 2023
  • The importance of information security has grown alongside the development of information and communication technology. However, companies struggle to select suitable countermeasures within their limited budgets. Sönmez and Kılıç (2021) proposed a model using AHP and mixed integer programming to determine the optimal investment combination for mitigating information security breaches. However, their model had limitations: 1) a lack of objective measurement for countermeasure efficacy against security threats, 2) unrealistic scenarios where risk reduction surpassed pre-investment levels, and 3) cost duplication when using a single countermeasure for multiple threats. This paper enhances the model by objectively quantifying countermeasure efficacy using the beta probability distribution. It also resolves unrealistic scenarios and the issue of duplicating investments for a single countermeasure. An empirical analysis was conducted on domestic SMEs to determine investment budgets and risk levels. The improved model outperformed Sönmez and Kılıç's (2021) optimization model. By employing the proposed effectiveness measurement approach, difficulty to evaluate countermeasures can be quantified. Utilizing the improved optimization model allows for deriving an optimal investment portfolio for each countermeasure within a fixed budget, considering information security costs, quantities, and effectiveness. This aids in securing the information security budget and effectively addressing information security threats.

Implementation of IoT-Based Irrigation Valve for Rice Cultivation (벼 재배용 사물인터넷 기반 물꼬 구현)

  • Byeonghan Lee;Deok-Gyeong Seong;Young Min Jin;Yeon-Hyeon Hwang;Young-Gwang Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.93-98
    • /
    • 2023
  • In paddy rice farming, water management is a critical task. To suppress weed emergence during the early stages of growth, fields are deeply flooded, and after transplantation, the water level is reduced to promote rooting and stimulate stem generation. Later, water is drained to prevent the production of sterile tillers. The adequacy of water supply is influenced by various factors such as field location, irrigation channels, soil conditions, and weather, requiring farmers to frequently check water levels and control the ingress and egress of water. This effort increases if the fields are scattered in remote locations. Automated irrigation systems have been considered to reduce labor and improve productivity. However, the net income from rice production in 2022 was about KRW 320,000/10a on average, making it financially unfeasible to implement high-cost devices or construct new infrastructure. This study focused on developing an IoT-Based irrigation valve that can be easily integrated into existing agricultural infrastructure without additional construction. The research was carried out in three main areas: Firstly, an irrigation valve was designed for quick and easy installation on existing agricultural pipes. Secondly, a power circuit was developed to connect a low-power Cat M1 communication modem with an Arduino Nano board for remote operation. Thirdly, a cloud-based platform was used to set up a server and database environment and create a web interface that users can easily access.

Optimal deployment of sonobuoy for unmanned aerial vehicles using reinforcement learning considering the target movement (표적의 이동을 고려한 강화학습 기반 무인항공기의 소노부이 최적 배치)

  • Geunyoung Bae;Juhwan Kang;Jungpyo Hong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.2
    • /
    • pp.214-224
    • /
    • 2024
  • Sonobuoys are disposable devices that utilize sound waves for information gathering, detecting engine noises, and capturing various acoustic characteristics. They play a crucial role in accurately detecting underwater targets, making them effective detection systems in anti-submarine warfare. Existing sonobuoy deployment methods in multistatic systems often rely on fixed patterns or heuristic-based rules, lacking efficiency in terms of the number of sonobuoys deployed and operational time due to the unpredictable mobility of the underwater targets. Thus, this paper proposes an optimal sonobuoy placement strategy for Unmanned Aerial Vehicles (UAVs) to overcome the limitations of conventional sonobuoy deployment methods. The proposed approach utilizes reinforcement learning in a simulation-based experimental environment that considers the movements of the underwater targets. The Unity ML-Agents framework is employed, and the Proximal Policy Optimization (PPO) algorithm is utilized for UAV learning in a virtual operational environment with real-time interactions. The reward function is designed to consider the number of sonobuoys deployed and the cost associated with sound sources and receivers, enabling effective learning. The proposed reinforcement learning-based deployment strategy compared to the conventional sonobuoy deployment methods in the same experimental environment demonstrates superior performance in terms of detection success rate, deployed sonobuoy count, and operational time.

Performance of Passive UHF RFID System in Impulsive Noise Channel Based on Statistical Modeling (통계적 모델링 기반의 임펄스 잡음 채널에서 수동형 UHF RFID 시스템의 성능)

  • Jae-sung Roh
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.835-840
    • /
    • 2023
  • RFID(Radio Frequency Identification) systems are attracting attention as a key component of Internet of Things technology due to the cost and energy efficiency of application services. In order to use RFID technology in the IoT application service field, it is necessary to be able to store and manage various information for a long period of time as well as simple recognition between the reader and tag of the RFID system. And in order to read and write information to tags, a performance improvement technology that is strong and reliable in poor wireless channels is needed. In particular, in the UHF(Ultra High Frequency) RFID system, since multiple tags communicate passively in a crowded environment, it is essential to improve the recognition rate and transmission speed of individual tags. In this paper, Middleton's Class A impulsive noise model was selected to analyze the performance of the RFID system in an impulsive noise environment, and FM0 encoding and Miller encoding were applied to the tag to analyze the error rate performance of the RFID system. As a result of analyzing the performance of the RFID system in Middleton's Class A impulsive noise channel, it was found that the larger the Gaussian noise to impulsive noise power ratio and the impulsive noise index, the more similar the characteristics to the Gaussian noise channel.