• Title/Summary/Keyword: Configuration management

Search Result 997, Processing Time 0.029 seconds

Design of Lab Framework for Effective Blockchain Education (효율적인 블록체인 교육을 위한 실습프레임워크 설계)

  • Kim, Do-Kyu
    • Journal of Industrial Convergence
    • /
    • v.18 no.6
    • /
    • pp.147-154
    • /
    • 2020
  • It is difficult to educate the overall operation of public and private blockchains with different characteristics. Recently, most education for blockchain is targeted at public blockchains such as Bitcoin and Ethereum. However, in an actual business environment, a private blockchain such as HyperLedger Fabric is used because access to corporate data is controlled through user authentication. In the case of HLF-based education, it is necessary to understand various components that are not in the public blockchain, such as peers, orderers, and channels. In this paper, a lab framework for HLF is designed for an efficient and systematic understanding of the functions and operations. The framework consists of HLF network, chaincode, and decentralized software control functions. Through the framework, the network configuration, distribution and activation of chaincode, and dApp execution process were checked step by step, and it was very easy to understand the overall flow for blockchain services. In addition, it is expected that a systematic understanding of the overall flow will be possible even in future network expansion.

Curation Service Implementation using Machine Learning Algorithm (기계학습 알고리즘을 이용한 Curation 서비스 구현)

  • Lee, Hyung Ho;Lee, Hak Jae;Kim, Tae Su;Kim, Mi Hyun
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.118-125
    • /
    • 2020
  • This paper is conducted for automatically recommending and providing information services desired by users on websites of local governments and public institutions with vast amounts of information, In this system, we defined a method of collecting data based on the SiiRU CMS system that collects and preprocesses data, and a study that provides curation services (contents and menus) to users through a collaborative filtering algorithm based on machine learning. Also, the data used in the paper is conducted based on about 1 million data collected in 2019. The analyzed data can provide important information that cannot be easily accessed by providing a cloud tag service or recommended menu for users to conveniently view, and the environment configuration that can realize this service to local governments and public institutions is also provided.

A Design of Growth Measurement System Considering the Cultivation Environment of Aquaponics (아쿠아포닉스의 생육 환경을 고려한 성장 측정 시스템의 설계)

  • Hyoun-Sup, Lee;Jin-deog, Kim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.27-33
    • /
    • 2023
  • Demands for eco-friendly food materials are increasing rapidly because of increased interest in well-being and health care, deterioration of air quality due to fine dust, and various soil and water pollution. Aquaponics is a system that can solve various problems such as economic activities, environmental problems, and safe food provision of the elderly population. However, techniques for deriving the optimal growth environment should be preceded. In this paper, we intend to design an intelligent plant growth measurement system that considers the characteristics of existing aquaponics. In particular, we would like to propose a module configuration plan for learning data and judgment systems when providing a uniform growth environment, focusing on designing systems suitable for production sites that do not have high-performance processing resources among intelligent aquaponics production management modules. It is believed that the proposed system can effectively perform deep learning with small analysis resources.

Appraisal method for Determining Whether to Upgrade Software for Appraisal (감정 대상 소프트웨어의 업그레이드 여부 판정을 위한 감정 방법)

  • Chun, Byung-Tae;Jeong, Younseo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.13-19
    • /
    • 2020
  • It can be seen that the infringement of copyright cases is increasing as the society becomes more complex and advanced. During the software copyright dispute, there may be a dispute over whether the software is duplicated and made into upgraded software. In this paper, we intend to propose an analysis method for determining whether to upgrade software. For the software upgrade analysis, a software similarity analysis technique was used. The analysis program covers servers, management programs, and Raspberry PC programs. The first analysis confirms the correspondence between program creation information and content. In addition, it analyzes the similarity of functions and screen composition between the submitted program and the program installed in the field. The second comparative analysis compares and analyzes similarities by operating two programs in the same environment. As a result of comparative analysis, it was confirmed that the operation and configuration screens of the two programs were identical. Thus, minor differences were found in a few files, but it was confirmed that the two programs were mostly made using the same or almost similar source code. Therefore, this program can be judged as an upgrade program.

A Study on How to Build a Disaster Recovery System that can Minimize Recovery Time Objective(RTO) and Recovery Point Objective(RPO) to Ensure Business Continuity (비즈니스 연속성 보장을 위한 복구 시간 목표(RTO) 및 복구 지점 목표(RPO)를 최소화할 수 있는 재해복구시스템 구축 방안 연구)

  • Kang, Hyun-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.91-99
    • /
    • 2021
  • In the current business environment where dependence on IT has increased rapidly, the risk from disasters or cyber-attacks is also increasing. Business continuity, the ability to continue to provide service in the event of a business disruption caused by a disaster, is essential. In other words, you need to have a plan in place to keep your core business functions uninterrupted with rapid recovery within a predetermined Recovery Time Objective (RTO) and Recovery Point Objective (RPO) time frame. In this paper, we propose a disaster recovery system construction method that can minimize RTO and RPO to ensure business continuity. The system configuration adopts Tier 7 disaster recovery model, synchronous storage replication, hot disaster recovery site, and operation management automation solution. This ensures continuity of core business with virtually no data loss and minimal RTO and RPO.

A Safety IO Throttling Method Inducting Differential End of Life to Improving the Reliability of Big Data Maintenance in the SSD based RAID (SSD기반 RAID 시스템에서 빅데이터 유지 보수의 신뢰성을 향상시키기 위한 차등 수명 마감을 유도하는 안전한 IO 조절 기법)

  • Lee, Hyun-Seob
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.593-598
    • /
    • 2022
  • Recently, data production has seen explosive growth, and the storage systems to store these big data safely and quickly is evolving in various ways. A typical configuration of storage systems is the use of SSDs with fast data processing speed as a RAID group that can maintain reliable data. However, since NAND flash memory, which composes SSD, has the feature that deterioration if writes more than a certain number of times are repeated, can increase the likelihood of simultaneous failure on multiple SSDs in a RAID group. And this can result in serious reliability problems that data cannot be recovered. Thus, in order to solve this problem, we propose a method of throttling IOs so that each SSD within a RAID group leads to a different life-end. The technique proposed in this paper utilizes SMART to control the state of each SSD and the number of IOs allocated according to the data pattern used step by step. In addition, this method has the advantage of preventing large amounts of concurrency defects in RAID because it induces differential lifetime finishes of SSDs.

A New Recovery Method to Privide Diverse Service Demands for Loss Sensitive Medical Data on IP over WDM Networks (IP over WDM 네트워크에서 손실에 민감한 의료 데이터를 위한 다양한 서비스 요구사항을 만족하는 새로운 복구 방법)

  • Lee, Yonggyu
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.377-388
    • /
    • 2022
  • Various researches are actively studied to satisfy exponentially increasing the usage of the Internet as well as the diverse service demands. Especially the Optical Internet that delivers several Tbps through a single optical fiber requires the intelligence to satisfy the various types of survivability requirements. In the paper, a novel recovery scheme that satisfies the various restoration demands in IP over WDM networks is proposed. The scheme classifies the restoration services into three classes and applies dedicated protection and shared restoration scheme with different priorities for each class. Also, a configuration scheme for information database to support the scheme is proposed. This scheme satisfies the different degree of restoration demands in terms of restoration time, blocking rate and resource usage. With the scheme, medical data can be transmitted without loss.

A Design of Industrial Safety Service using LoRa Gateway Networks (LoRa 게이트웨이 네트워크를 활용한 산업안전서비스 설계)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.313-316
    • /
    • 2021
  • In the IoT(IoT: Internet of Things) environment, network configuration is essential to collect data generated from objects. Various communication methods are used to process data of objects, and wireless communication methods such as Bluetooth and WiFi are mainly used. In order to collect data of objects, a communication module must be installed to collect data generated from sensors or edge devices in real time. And in order to deliver data to the database, a software architecture must be configured. Data generated from objects can be stored and managed in a database in real time, and data necessary for industrial safety can be extracted and utilized for industrial safety service applications. In this paper, a network environment was constructed using a LoRa(LoRa: Long Range) gateway to collect object data, and a client/server data collection model was designed to collect object data transmitted from the LoRa module. In order to secure the resources necessary for data collection and storage management without data leakage, data collection should be possible in real time. As an application service, location data required for industrial safety can be stored and managed in a database in real time.

  • PDF

Influence Analysis on the Number of Ruptured SG u-tubes During mSGTR in CANDU-6 Plants (중수로 증기발생기 다중 전열관 파단사고시 파단 전열관 수에 대한 영향 분석)

  • Seon Oh Yu;Kyung Won Lee
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.18 no.2
    • /
    • pp.37-42
    • /
    • 2022
  • An influence analysis on multiple steam generator tube rupture (mSGTR) followed by an unmitigated station blackout is performed to compare the plant responses according to the number of ruptured u-tubes under the assumption of a total of 10 ruptured u-tubes. In all calculation cases, the transient behaviour of major thermal-hydraulic parameters, such as the discharge flow rate through the ruptured u-tubes, reactor header pressure, and void fraction in the fuel channels is found to be overall similar to that of the base case having a single SG with 10 u-tubes ruptured. Additionally, as the conditions of low-flow coolant with high void fraction in the broken loop continued, causing the degradation of decay heat removal, the peak cladding temperature (PCT) would be expected to exceed the limit criteria for ensuring nuclear fuel integrity. However, despite the same total number of ruptured u-tubes, because of the different connection configuration between the SG and pressurizer, a difference is foud in time between the pressurizer low-level signal and reactor header low-pressure signal, affecting the time to trip the reactor and to reach the PCT limit. The present study is expected to provide the technical basis for the accident management strategy for mSGTR transient conditions of CANDU-6 plants.

2D Analytical Model to Evaluate Behavior of Pipeline in Lowering Phase (자원 이송용 파이프라인의 내리기 단계에서 평면 거동 평가를 위한 해석 모델)

  • Jung Suk Kim;Ki Yong Ann
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.11 no.4
    • /
    • pp.467-475
    • /
    • 2023
  • To ensure the safety of the pipeline against large deformation of the pipeline during lowering construction, the analysis for pipeline becomes emphasized. The FE analysis has a lower efficiency at calculating time, while it could be obtained high accuracy. In this paper, a reasonable analytical model for analysis of pipeline is proposed during lowering-in. This analytical model is partitioned considering the geometrical characteristics and modeled as two parameters Beam On Elastic Foundation and Euler-Bernoulli beam considering the boundary condition. This takes into account the pipeline-soil interaction and the axial forces acting on the pipeline. Previous model can only be applied to standardized conditions, whereas the proposed model defined as Segmented Pipeline Model can be considered for the majority of construction conditions occurred during lowering-in. In addition, minimized assumptions and segmented elements lead to improve the convenience and applicability of modeling. Nevertheless, the model shows accurate results compared to the FE model. Accordingly, it is expected that it will be used efficiently for configuration management as well as safety assessment of pipeline during lowering-in.