• Title/Summary/Keyword: File system

Search Result 2,280, Processing Time 0.029 seconds

Energy Big Data Pre-processing System for Energy New Industries (에너지신산업을 위한 에너지 빅데이터 전처리 시스템)

  • Yang, Soo-Young;Kim, Yo-Han;Kim, Sang-Hyun;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.851-858
    • /
    • 2021
  • Due to the increase in renewable energy and distributed resources, not only traditional data but also various energy-related data are being generated in the new energy industry. In other words, there are various renewable energy facilities and power generation data, system operation data, metering and rate-related data, as well as weather and energy efficiency data necessary for new services and analysis. Energy big data processing technology can systematically analyze and diagnose data generated in the first half of the power production and consumption infrastructure, including distributed resources, systems, and AMI. Through this, it will be a technology that supports the creation of new businesses in convergence between the ICT industry and the energy industry. To this end, research on the data analysis system, such as itemized characteristic analysis of the collected data, correlation sampling, categorization of each feature, and element definition, is needed. In addition, research on data purification technology for data loss and abnormal state processing should be conducted. In addition, it is necessary to develop and structure NIFI, Spark, and HDFS systems so that energy data can be stored and managed in real time. In this study, the overall energy data processing technology and system for various power transactions as described above were proposed.

A Semi-fragile Watermarking Algorithm of 3D Mesh Model for Rapid Prototyping System Application (쾌속조형 시스템의 무결성 인증을 위한 3차원 메쉬 모델의 Semi-fragile 워터마킹)

  • Chi, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.131-142
    • /
    • 2007
  • In this paper, semi-fragile watermarking algorithm was proposed for the application to RP(Rapid Prototyping) system. In the case of the perceptual change or distortion of the original one, the prototype product will be affected from the process because the RP system requires the high precision measure. Therefore, the geometrical transformations like translation, rotation and scaling, the mesh order change and the file format change are used in the RP system because they do not change the basic shapes of the 3D models, but, the decimation and the smoothing are not used because they change the models. The proposed algorithm which is called semi-fragile watermarking is robust against to these kinds of manipulations which preserve the original shapes because it considers the limitations of the RP system, but fragile against to the other manipulations which change the original shapes. This algorithm does not change the model shapes after embedding the watermark information, that is, there is no shape difference between the original model and the watermarked model. so, it will be useful to authenticate the data integrity and hide the information in the field of mechanical engineering which requires the high precision measure.

A Study on Non-Fungible Token Platform for Usability and Privacy Improvement (사용성 및 프라이버시 개선을 위한 NFT 플랫폼 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.403-410
    • /
    • 2022
  • Non-Fungible Tokens (NFTs) created on the basis of blockchain have their own unique value, so they cannot be forged or exchanged with other tokens or coins. Using these characteristics, NFTs can be issued to digital assets such as images, videos, artworks, game characters, and items to claim ownership of digital assets among many users and objects in cyberspace, as well as proving the original. However, interest in NFTs exploded from the beginning of 2020, causing a lot of load on the blockchain network, and as a result, users are experiencing problems such as delays in computational processing or very large fees in the mining process. Additionally, all actions of users are stored in the blockchain, and digital assets are stored in a blockchain-based distributed file storage system, which may unnecessarily expose the personal information of users who do not want to identify themselves on the Internet. In this paper, we propose an NFT platform using cloud computing, access gate, conversion table, and cloud ID to improve usability and privacy problems that occur in existing system. For performance comparison between local and cloud systems, we measured the gas used for smart contract deployment and NFT-issued transaction. As a result, even though the cloud system used the same experimental environment and parameters, it saved about 3.75% of gas for smart contract deployment and about 4.6% for NFT-generated transaction, confirming that the cloud system can handle computations more efficiently than the local system.

제주도 지하수자원의 최적 개발가능량 선정에 관한 수리지질학적 연구

  • 한정상;김창길;김남종;한규상
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 1994.07a
    • /
    • pp.184-215
    • /
    • 1994
  • The Hydrogeologic data of 455 water wells comprising geologic and aquifer test were analyzed to determine hydrogeoloic characteristics of Cheju island. The groundwater of Cheju island is occurred in unconsolidated pyroclastic deposits interbedded in highly jointed basaltic and andesic rocks as high level, basal and parabasal types order unconfined condition. The average transmissivity and specific yield of the aquifer are at about 29,300m$^2$/day and 0.12 respectively. The total storage of groundwater is estimated about 44 billion cubic meters(m$^3$). Average annual precipitation is about 3390 million m$^3$ among which average recharge amount is estimated 1494 million m$^3$ equivalent 44.1% of annual precipitation with 638 million m$^3$ of runoff and 1256 million m$^3$ of evapotranspiration. Based on groundwater budget analysis, the sustainable yield is about 620 million m$^3$(41% of annual recharge)and rest of it is discharging into the sea. The geologic logs of recently drilled thermal water wens indicate that very low-permeable marine sediments(Sehwa-ri formation) composed of loosely cemented sandy sat derived from mainly volcanic ashes, at the 1st stage volcanic activity of the area was situated at the 120$\pm$68m below sea level. And also the other low-permeable sedimentary rock called Segipo-formation which is deemed younger than former marine sediment is occured at the area covering north-west and western part of Cheju at the $\pm$70m below sea level. If these impermeable beds are distributed as a basal formation of fresh water zone of Cheju, most of groundwater in Cheju will be para-basal type. These formations will be one of the most important hydrogeologic boundary and groundwater occurences in the area.

  • PDF

Development of Information System based on GIS for Analyzing Basin-Wide Pollutant Washoff (유역오염원 수질거동해석을 위한 GIS기반 정보시스템 개발)

  • Park, Dae-Hee;Ha, Sung-Ryong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.4
    • /
    • pp.34-44
    • /
    • 2006
  • Simulation models allow researchers to model large hydrological catchment for comprehensive management of the water resources and explication of the diffuse pollution processes, such as land-use changes by development plan of the region. Recently, there have been reported many researches that examine water body quality using Geographic Information System (GIS) and dynamic watershed models such as AGNPS, HSPF, SWAT that necessitate handling large amounts of data. The aim of this study is to develop a watershed based water quality estimation system for the impact assessment on stream water quality. KBASIN-HSPF, proposed in this study, provides easy data compiling for HSPF by facilitating the setup and simulation process. It also assists the spatial interpretation of point and non-point pollutant information and thiessen rainfall creation and pre and post processing for large environmental data An integration methodology of GIS and water quality model for the preprocessing geo-morphologic data was designed by coupling the data model KBASIN-HSPF interface comprises four modules: registration and modification of basic environmental information, watershed delineation generator, watershed geo-morphologic index calculator and model input file processor. KBASIN-HSPF was applied to simulate the water quality impact by variation of subbasin pollution discharge structure.

  • PDF

Usability Testing of Open Source Software for Digital Archiving (디지털 아카이브 구축을 위한 공개 소프트웨어 사용성 평가)

  • Jeon, Kyungsun;Chang, Yunkeum
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.3
    • /
    • pp.247-271
    • /
    • 2018
  • This research aims to explore the possibility of open source software for creating digital archives of small organizations or ordinary people that run short of budget and professional workforce and may easily create digital archives without the help of a professional. To do so, this study suggested three open source software, AtoM, ArchivesSpace, and Omeka, for such use, and conducted usability tests with system designers and users who had no experience with open source software. The results of the usability testing was that AtoM, which was developed to support the records management system and user services of small organizations, proved satisfactory to both system designers and users. ArchivesSpace had too many required fields with it to create archives. Omeka greatly satisfied the system designers because it is possible to create archives with simple inputs on the item level. However, Omeka, which focuses on exhibition functions while neglecting search functions, registered low satisfaction among the users. Based on the results of the usability testing, this study suggested selection criteria of open source software for small organizations or ordinary individuals, namely, purposes, license, characteristics, service creation environment, advantages and disadvantages, functions, metadata, file type, and interoperability.

A Study on SCOTT Transformer Protection Relay Malfunction Case and Improvement Methodology (스코트 변압기 보호계전기 오동작 사례분석 및 개선방안 고찰)

  • Lee, Jong-Hwa;Lho, Young-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.394-399
    • /
    • 2017
  • In Korean AC power railway substations, SCOTT winding transformers are under operation to have a single phase power supply together with a phase angle of $90^{\circ}$ on the secondary side of the main transformer. In the case of an internal fault of the transformer, the transformer protection relay should be cut off on the primary side, the transformer should be inoperative to the external fault of the transformer or to the normal train operation. Reducing the malfunction of the relay through an exact fault determination is very important for securing a stable power system and improving its reliability. The main transformers are protected using Buchholtz's relay and a differential relay as the internal fault detection devices, but there are some cases of the main transformer operation under the deactivation of this protection function due to a malfunction of the differential relay. In this paper, the characteristics of the SCOTT transformer and differential relay as well as the malfunctioning of the protection relays are presented. The modeling of the SCOTT transformer protection relay was accomplished by the power system analysis program and the Comtrade file from 'A substation', which was used as the input data for the fault wave, and the harmonics were analyzed to determine if the relay operates or not. In addition, an improvement plan for malfunctioning cases through wave form analysis is suggested.

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF

LxBSM: Loadable Kernel Module for the Creation of C2 Level Audit Data based on Linux (LxBSM: C2 수준의 감사 자료 생성을 위한 리눅스 기반 동적 커널 모듈)

  • 전상훈;최재영;김세환;심원태
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.146-155
    • /
    • 2004
  • Currently most of commercial operating systems contain a high-level audit feature to increase their own security level. Linux does not fall behind the other commercial operating systems in performance and stability, but Linux does not have a good audit feature. Linux is required to support a higher security feature than C2 level of the TCSEC in order to be used as a server operating system, which requires the kernel-level audit feature that provides the system call auditing feature and audit event. In this paper, we present LxBSM, which is a kernel module to provide the kernel-level audit features. The audit record format of LxBSM is compatible with that of Sunshield BSM. The LxBSM is implemented as a loadable kernel module, so it has the enhanced usability. It provides the rich audit records including the user-level audit events such as login/logout. It supports both the pipe and file interface for increasing the connectivity between LxBSM and intrusion detection systems (IDS). The performance of LxBSM is compared and evaluated with that of Linux kernel without the audit features. The response time was increased when the system calls were called to create the audit data, such as fork, execve, open, and close. However any other performance degradation was not observed.

Algorithm for the design of a Virtual Compensator Using the Multileaf Collimator and 3D RTP System (다엽콜리메터와 삼차원 방사선치료계획장치를 이용한 가상 선량보상체 설계 알고리듬)

  • 송주영;이병용;최태진
    • Progress in Medical Physics
    • /
    • v.12 no.2
    • /
    • pp.185-191
    • /
    • 2001
  • The virtual compensator which are realized using a multileaf collimator(MLC) and three-dimensional radiation therapy Planning(3D RTP) system was designed. And the feasibility study of the virtual compensator was done to verify that it can do the function of the conventional compensator properly. As a model for the design of compensator, styrofoam phantom and mini water phantom were prepared to simulate the missing tissue area and the calculated dose distribution was produced through the 3D RTP system. The fluence maps which are basic materials for the design of virtual compensator were produced based on the dose distribution and the MLC leaf sequence file was made for the realization of the produced fluence map. Ma's algorithm were applied to design the MLC leaf sequence and all the design tools were programmed with IDL5.4. To verify the feasibility of the designed virtual compensator, the results of irradiation with or without a virtual compensator were analyzed by comparing the irradiated films inserted into the mini water phantom. The higher dose area produced due to the missing tissue was removed and intended regular dose distribution was achieved when the virtual compensator was applied.

  • PDF