• Title/Summary/Keyword: Kernel Level

Search Result 294, Processing Time 0.028 seconds

A Prediction-Based Dynamic Thermal Management Technique for Multi-Core Systems (멀티코어시스템에서의 예측 기반 동적 온도 관리 기법)

  • Kim, Won-Jin;Chung, Ki-Seok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.2
    • /
    • pp.55-62
    • /
    • 2009
  • The power consumption of a high-end microprocessor increases very rapidly. High power consumption will lead to a rapid increase in the chip temperature as well. If the temperature reaches beyond a certain level, chip operation becomes either slow or unreliable. Therefore various approaches for Dynamic Thermal Management (DTM) have been proposed. In this paper, we propose a learning based temperature prediction scheme for a multi-core system. In this approach, from repeatedly executing an application, we learn the thermal patterns of the chip, and we control the temperature in advance through DTM. When the predicted temperature may go beyond a threshold value, we reduce the temperature by decreasing the operation frequencies of the corresponding core. We implement our temperature prediction on an Intel's Quad-Core system which has integrated digital thermal sensors. A Dynamic Frequency System (DFS) technique is implemented to have four frequency steps on a Linux kernel. We carried out experiments using Phoronix Test Suite benchmarks for Linux. The peak temperature has been reduced by on average $5^{\circ}C{\sim}7^{\circ}C$. The overall average temperature reduced from $72^{\circ}C$ to $65^{\circ}C$.

  • PDF

Design of P2P Server System to execute Dynamic Distribution Policy (동적 분배정책을 수행하는 P2P 서버 시스템의 설계)

  • 박정민;김홍일
    • Journal of Internet Computing and Services
    • /
    • v.3 no.6
    • /
    • pp.25-33
    • /
    • 2002
  • The efficiency of the data share service of P2P method is decided by the maintaining guard method of a sharing list, This paper suggests the data sharing system of the P2P base that it should retain a shared data list at a client, The Server at a proposed system guards inclusively client. divided into several groups and at each individual group, a client appointed the TopHost uses the method guarding a free share list of a applicating group, The TopHost designs to execute it relating with server in case of the mergence and the division of a group as well as a maintaining management of a data share list, The efficiency of the suggested system regard the maintaining guard of groups formed of a client of the appropriate level of a kernel and exams examination to measure it through a really executed data share service.

  • PDF

System-Call-Level Core Affinity for Improving Network Performance (네트워크 성능향상을 위한 시스템 호출 수준 코어 친화도)

  • Uhm, Junyong;Cho, Joong-Yeon;Jin, Hyun-Wook
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.1
    • /
    • pp.80-84
    • /
    • 2017
  • Existing operating systems experience scalability issues as the number of cores increases. The network I/O performance on manycore systems is faced with the major limiting factors of cache consistency costs and locking overheads. Legacy methods resolve this issue include the new microkernel-like operating system or modification of existing kernels; however, these solutions are not fully application transparent. In this study, we proposed a library that improves the network performance by separating system call context from user context and by applying the core affinity without any kernel and application modifications. Experiment results showed that our implementation can improve the network throughput of Apache by up to 30%.

Stability Analysis According to Hinge Type Alteration on Micro Stage for Micro Cutting Machine (초정밀 가공기용 마이크로 스테이지의 힌지 형상에 따른 안정성 해석)

  • 김재열;곽이구;심재기;안재신;송경석;한재호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.993-998
    • /
    • 2002
  • Ultra precision processing technology is the field which is seriously protected its technology by advanced nations. Because of this reason, this technology is very difficult to supply for domestic companies, also domestic companies are revealed the limit of technology development by itself. And then, those are depend on the technology development of advanced nation, domestic companies are not conquer application step with already developed parts. Of course, some cases of its research are succeed. those are included element technology, system technology and so on, for development of ultra precision processing system. To conquer technology holding ultra precision processing accuracy of no level, active research are needed. In this paper, stability of ultra precision cutting unit is analyzed, this unit is the kernel unit in ultra precision processing machine. According to alteration of shape and material about hinge, stability investigation is performed Through this stability investigation, trial and error is reduced in design and manufacture, at the same time, we are accumulated foundation data for un it control.

  • PDF

Occurrence of cis-4-Tetradecenoic Acid in the Oils of Kernels of Lindera erythrocarpa Seeds, as a Major Component

  • Kim, Seong-Jin;Joh, Yong-Goe
    • Food Science and Biotechnology
    • /
    • v.15 no.1
    • /
    • pp.107-111
    • /
    • 2006
  • Kernel oils of Lindera erythrocarpa seeds had high level of unusual fatty acid. Picolinyl ester of this unknown fatty acid showed molecular ion at m/z = 317 with other diagnostic ions such as m/z = 151, 191 (40 amu between two peaks), 204, and 218 on GC-MS. Characteristic peak at $720\;cm^{-1}$ appeared in IR spectrum. In $^1H-NMR$ spectrum both methylene protons at C-3 and C-6 resonated at ${\delta}2.309$ and ${\delta}2.012$, and methine protons of double bond resonated in lower magnetic field centered at ${\delta}5.296$ (C-4) and ${\delta}5.387$ (C-5) as multiplet (J = 9.7Hz). In $^{13}C-NMR$, signals at ${\delta}22.669$ and ${\delta}27.048$ were due to C-3 and C-6 of ${\delta}^4$-monoenoic acid. Results obtained from spectroscopic measurements confirmed unknown fatty acid as cis-4-tetradecenoic acid (cis-4-$C_{14:1}$). Main fatty acid components of oils were cis-4-$C_{14:1}$ (44.5-45.1%), oleic acid ($C_{18:1}$), 20.4-21.3%), and lauric acid ($C_{12:0}$, 11.6-12.4%), along with trace amounts of cis-4-$C_{12:1}$ and cis-4-$C_{16:1}$.

DEVELOPMENT OF REAL-TIME DATA REDUCTION PIPELINE FOR KMTNet (KMTNet 실시간 자료처리 파이프라인 개발)

  • Kim, D.J.;Lee, C.U.;Kim, S.L.;Park, B.G.
    • Publications of The Korean Astronomical Society
    • /
    • v.28 no.1
    • /
    • pp.1-6
    • /
    • 2013
  • Real-time data reduction pipeline for the Korea Microlensing Telescope Network (KMTNet) was developed by Korea Astronomy and Space Science Institute (KASI). The main goal of the data reduction pipeline is to find variable objects and to record their light variation from the large amount of observation data of about 200 GB per night per site. To achieve the goal we adopt three strategic implementations: precision pointing of telescope using the cross correlation correction for target fields, realtime data transferring using kernel-level file handling and high speed network, and segment data processing architecture using the Sun-Grid engine. We tested performance of the pipeline using simulated data which represent the similar circumstance to CTIO (Cerro Tololo Inter-American Observatory), and we have found that it takes about eight hours for whole processing of one-night data. Therefore we conclude that the pipeline works without problem in real-time if the network speed is high enough, e.g., as high as in CTIO.

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.

Boolean Factorization Using Two-cube Non-kernels (2-큐브 비커널을 이용한 부울 분해식 산출)

  • Kwon, Oh-Hyeong;Chun, Byung-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4597-4603
    • /
    • 2010
  • A factorization is a very important part of multi-level logic synthesis. The number of literals in a factored form is an estimate of the complexity of a logic function, and can be translated directly into the number of transistors required for implementation. Factored forms are described as either algebraic or Boolean, according to the trade-off between run-time and optimization. A Boolean factored form contains fewer number of literals than an algebraic factored form. In this paper, we present a new method for a Boolean factorization. The key idea is to identify two-cube nonkernel Boolean pairs from given expression. Experimental results on various benchmark circuits show the improvements in literal counts over previous other factorization methods.

Performance Evaluation of Flash Memory-Based File Storages: NAND vs. NOR (플래시 메모리 기반의 파일 저장 장치에 대한 성능분석)

  • Sung, Min-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.3
    • /
    • pp.710-716
    • /
    • 2008
  • This paper covers the performance evaluation of two flash memory-based file storages, NAND and NOR, which are the major flash types. To evaluate their performances, we set up separate file storages for the two types of flash memories on a PocketPC-based experimental platform. Using the platform, we measured and compared the I/O throughputs in terms of buffer size, amount of used space, and kernel-level write caching. According to the results from our experiments, the overall performance of the NAND-based storage is higher than that of NOR by up to 4.8 and 5.7 times in write and read throughputs, respectively. The experimental results show the relative strengths and weaknesses of the two schemes and provide insights which we believe assist in the design of flash memory-based file storages.

Development of the Abstract Test Cases of Ship STEP

  • Kim Yong-Dae;Hwang Ho-Jin
    • Journal of Ship and Ocean Technology
    • /
    • v.9 no.3
    • /
    • pp.23-32
    • /
    • 2005
  • Ship STEP(Standard for the Exchange of Product Model Data) which is composed of AP 215 (Ship Arrangement), AP 216(Ship Hull Form), AP 218 (Ship Structure), has been developed more than last 10 years and it is now at the stage just before IS(International Standard). It is expected that ship STEP would be used for the seamless data exchange among various CAD/CAM/CAE systems of shipbuilding process. In this paper the huge and complicated data structure of ship STEP is briefly reviewed at the level of ARM(Application Reference Model) and some abstract test cases which will be included as part of the standards are introduced. Basically ship STEP has common data model to be used without losing compatibility among those three different ship AP's, and it is defined as the modeling framework. Typical cases of data exchange during shipbuilding process, such as hull form data exchange between design office and model basin, midship structure data between shipbuilding yard and classification society are reviewed and STEP physical data are generated using commercial geometric modeling kernel. Test cases of ship arrangement at initial design stage and hydrodynamic data of crude oil carrier are also included.