• Title/Summary/Keyword: Migration Scheme

Search Result 102, Processing Time 0.022 seconds

A Study on High Reynolds Number Flow in Two-Dimensional Closed Cavity (2차원 밀폐 캐비티의 고레이놀즈수 흐름에 관한 연구)

  • 최민선;송치성;이영호
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.20 no.3
    • /
    • pp.101-109
    • /
    • 1996
  • Two-dimensional lid-driven closed flows within square cavity were studied numerically for four Reynolds numbers : $10^4$, 3$\times10^4$, 5$\times10^4$ and 7.5$\times10^4$. A convective difference scheme to maintain the same spatial accurary by irregular grid correction is adopted by applying the interior division principle. Grid number is $80\times80$and its minimum size is about 1/400 of the cavity height. At Re=$10^4$, periodic migration of small eddies appearing in corner separation region and its temporal sinusoidal fluctuation are represented. At three higher Reynolds numbers(3$\times10^4$, 5$\times10^4$ and 7.5$\times10^4$), an organizing structure of four consecutive vorticles at two lower corners is revealed from time-mean flow patterns. But, instantaneous flow characteristics show very random unsteady fluctuation mainly due to the interaction between rotating shed vortices and stationary eddies within the corners.

  • PDF

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.

A Supply Chain Management based on Mobile Agents with Flexible Reply Scheme (유연한 응답 기능을 가지는 이동 에이전트에 기반을 둔 공급 체인 관리)

  • Jeong, Won-Ho;Nam, Hui-Jeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.439-450
    • /
    • 2001
  • Mobile agent is one of the promising ways of overcoming network load and latency. It is also a new software paradigm including those concepts of client/server, applet/servelet, and code-on-demand. In this paper, a new mobile agent concept with flexible replay scheme is proposed, which can deal with embarrassing situation when replying results should be accomplished in various distributed applications. For example, they are 1) a burden of bulky result, 2) a need of different replay scheme dependent on work type, 3) connection failure to the target node, and 4) a need of fast migration to next node to keep the itinerary. Regarding the source node, there may be another situation that it wants to be aware of whether its wi가 is completed or not. Three kinds of reply schemes are proposed for dealing flexibly with such situations. They are based on priority reply list where nodes to be replied are stored according to their priorities. An experimental supply chain management model using the proposed reply schemes is designed and implemented. It is one of good distributed applications appropriate for our reply schemes, because it requires different reply schemes according to work types and it is important to gather required information in time.

  • PDF

Energy-Aware Video Coding Selection for Solar-Powered Wireless Video Sensor Networks

  • Yi, Jun Min;Noh, Dong Kun;Yoon, Ikjune
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.101-108
    • /
    • 2017
  • A wireless image sensor node collecting image data for environmental monitoring or surveillance requires a large amount of energy to transmit the huge amount of video data. Even though solar energy can be used to overcome the energy constraint, since the collected energy is also limited, an efficient energy management scheme for transmitting a large amount of video data is needed. In this paper, we propose a method to reduce the number of blackout nodes and increase the amount of gathered data by selecting an appropriate video coding method according to the energy condition of the node in a solar-powered wireless video sensor network. This scheme allocates the amount of energy that can be used over time in order to seamlessly collect data regardless of night or day, and selects a high compression coding method when the allocated energy is large and a low compression coding when the quota is low. Thereby, it reduces the blackout of the relay node and increases the amount of data obtained at the sink node by allowing the data to be transmitted continuously. Also, if the energy is lower than operating normaly, the frame rate is adjusted to prevent the energy exhaustion of nodes. Simulation results show that the proposed scheme suppresses the energy exhaustion of the relay node and collects more data than other schemes.

Enhanced UV-Visible Absorbance Detection in Capillary Electrophoresis Using Modified T-Shaped Post-Column Flow Cell

  • Lim, Kwan-Seop;Kim, Su-Hyeon;Hahn, Jong-Hoon
    • Bulletin of the Korean Chemical Society
    • /
    • v.23 no.2
    • /
    • pp.295-300
    • /
    • 2002
  • The construction of the T-shaped post-column flow cell has been changed to enhance the practicability as a UV-visible absorbance detector for capillary electrophoresis. In this new design, a rectangular cube-shaped inner structure is employed, which completely fits the outer rectangular tubing. This arrangement has greatly facilitated the fabrication of the T-cells. In addition, the volume for the auxiliary flow has been dramatically reduced down to 300 ${\mu}L$, and its volume flow rate is optimized at 4.2 ${\mu}L$/min. The short optical path length in the sheath flows (500 ${\mu}m$ on each side) minimizes background absorption, and thus enhances its performance in low-UV wavelengths. We have optimized the auxiliary flow rate at 50 ${\mu}m$/s, so that migration times are insensitive to the flow rate. This optimization has improved repeatabilities in migration times and peak heights. A double-beam detection scheme using a pair of photodiodes is employed to increase the signal-to-noise ratio.

Load Balancing Strategy for P2P VoD Systems

  • Huang, Guimin;Li, Chengsen;Liu, Pingshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4207-4222
    • /
    • 2016
  • In a P2P (Peer-to-Peer) VoD (video-on-Demand) streaming system, the nodes' load is an important factor which affects the system performance. In the system, some nodes may receive too many requests, which leads to overload. On the other hand, some other nodes may receive too few requests, which leads to low utilization. Therefore, designing a reasonable load balancing strategy is important. However, existing related studies cannot handle this problem effectively, because they don't have an efficient dynamic load information management mechanism, and they don't distinguish the difference of requests when transfer the nodes' load. In this paper, to manage the dynamic load information efficiently, we design a load management table for each node. Based on the load information, we propose a load balancing strategy which uses a request migration algorithm (LBRM). Through simulations, our scheme can handle the load imbalance problem effectively and improve the users' playback fluency.

A Numerical Model for Nuclide Migration in the Far-field of the Repository (처분장 Far-field에서의 핵종이동 수치 모델)

  • Lee, Youn-Myoung;Lee, Han-Soo;Park, Heui-Joo;Cho, Won-Jin;Han, Kyong-Won;Park, Hun-Hwee
    • Nuclear Engineering and Technology
    • /
    • v.21 no.4
    • /
    • pp.267-276
    • /
    • 1989
  • A numerical model for nuclide migration through fractured rock media has been developed. Nuclide transport with groundwater in rock fissures and the diffusion of nuclides into rock matrix are considered one-dimensionally . In the safety assessment of the repository for radioactive waste, this one-dimensional model by the finite-difference scheme, which enables us not only to use more realistic boundary conditions but also to model the nonhomogeneous rock medium as the multilayered media, can be used effectively with the analytical mode. The solution by the numerical model will be verified analytically, and then extended to the double-layered rock medium transport model.

  • PDF

Performance of Transaction Processing Schemes in Mobile Database Systems (이동 데이터베이스체계에서 거래처리 기법의 성능)

  • 최용구
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.2
    • /
    • pp.70-79
    • /
    • 1999
  • In mobile database system, transactions processing schemes address in ones using a static coordinator and coordinator migration. This apply coordinator migration mechanism which perform the transaction in new database server when posed to be the transaction service handoff. That apply static coordinator mechanism which perform the transaction in database server to begin the transaction when posed to be the transaction service handoff. In this paper, a scheme-independent simulation model has been developed in order to support comparative performance studies of mobile transaction processing schemes. And this paper describes the model in detail and presents simulation results which were obtained for what it believe to be the performance evaluation of the mobile transaction processing schemes. Finally, the mobile transaction processing schemes will improve system performance by minimizing the transmission of message for processing the transactions in mobile database system.

  • PDF

Design of an eFuse OTP Memory of 8bits Based on a Generic Process ($0.18{\mu}m$ Generic 공정 기반의 8비트 eFuse OTP Memory 설계)

  • Jang, Ji-Hye;Kim, Kwang-Il;Jeon, Hwang-Gon;Ha, Pan-Bong;Kim, Young-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.687-691
    • /
    • 2011
  • In this paper, we design an 8-bit eSuse OTP (one-time programmable) memory in consideration of EM (electro-migration) and eFuse resistance variation based on a $0.18{\mu}m$ generic process, which is used for an analog trimming application. First, we use an external program voltage to increase the program power applied an eFuse. Secondly, we apply a scheme of precharging BL to VSS prior to RWL (read word line) activation and optimize read NMOS transistors to reduce the read current flowing through a non-programmed cell. Thirdly, we design a sensing margin test circuit with a variable pull-up load out of consideration for the eFuse resistance variation of a programmed eFuse. Finally, we increase program yield of eFuse OTP memory by splitting the length of an eFuse link.

  • PDF

The Modified Eulerian-Lagrangian Formulation for Cauchy Boundary Condition Under Dispersion Dominated Flow Regimes: A Novel Numerical Approach and its Implication on Radioactive Nuclide Migration or Solute Transport in the Subsurface Environment

  • Sruthi, K.V.;Suk, Heejun;Lakshmanan, Elango;Chae, Byung-Gon;Kim, Hyun-su
    • Journal of Soil and Groundwater Environment
    • /
    • v.20 no.2
    • /
    • pp.10-21
    • /
    • 2015
  • The present study introduces a novel numerical approach for solving dispersion dominated problems with Cauchy boundary condition in an Eulerian-Lagrangian scheme. The study reveals the incapability of traditional Neuman approach to address the dispersion dominated problems with Cauchy boundary condition, even though it can produce reliable solution in the advection dominated regime. Also, the proposed numerical approach is applied to a real field problem of radioactive contaminant migration from radioactive waste repository which is a major current waste management issue. The performance of the proposed numerical approach is evaluated by comparing the results with numerical solutions of traditional FDM (Finite Difference Method), Neuman approach, and the analytical solution. The results show that the proposed numerical approach yields better and reliable solution for dispersion dominated regime, specifically for Peclet Numbers of less than 0.1. The proposed numerical approach is validated by applying to a real field problem of radioactive contaminant migration from radioactive waste repository of varying Peclet Number from 0.003 to 34.5. The numerical results of Neuman approach overestimates the concentration value with an order of 100 than the proposed approach during the assessment of radioactive contaminant transport from nuclear waste repository. The overestimation of concentration value could be due to the assumption that dispersion is negligible. Also our application problem confirms the existence of real field situation with advection dominated condition and dispersion dominated condition simultaneously as well as the significance or advantage of the proposed approach in the real field problem.