• 제목/요약/키워드: Multi-version

검색결과 293건 처리시간 0.031초

Korea Emissions Inventory Processing Using the US EPA's SMOKE System

  • Kim, Soon-Tae;Moon, Nan-Kyoung;Byun, Dae-Won W.
    • Asian Journal of Atmospheric Environment
    • /
    • 제2권1호
    • /
    • pp.34-46
    • /
    • 2008
  • Emissions inputs for use in air quality modeling of Korea were generated with the emissions inventory data from the National Institute of Environmental Research (NIER), maintained under the Clean Air Policy Support System (CAPSS) database. Source Classification Codes (SCC) in the Korea emissions inventory were adapted to use with the U.S. EPA's Sparse Matrix Operator Kernel Emissions (SMOKE) by finding the best-matching SMOKE default SCCs for the chemical speciation and temporal allocation. A set of 19 surrogate spatial allocation factors for South Korea were developed utilizing the Multi-scale Integrated Modeling System (MIMS) Spatial Allocator and Korean GIS databases. The mobile and area source emissions data, after temporal allocation, show typical sinusoidal diurnal variations with high peaks during daytime, while point source emissions show weak diurnal variations. The model-ready emissions are speciated for the carbon bond version 4 (CB-4) chemical mechanism. Volatile organic carbon (VOC) emissions from painting related industries in area source category significantly contribute to TOL (Toluene) and XYL (Xylene) emissions. ETH (Ethylene) emissions are largely contributed from point industrial incineration facilities and various mobile sources. On the other hand, a large portion of OLE (Olefin) emissions are speciated from mobile sources in addition to those contributed by the polypropylene industry in point source. It was found that FORM (Formaldehyde) is mostly emitted from petroleum industry and heavy duty diesel vehicles. Chemical speciation of PM2.5 emissions shows that PEC (primary fine elemental carbon) and POA (primary fine organic aerosol) are the most abundant species from diesel and gasoline vehicles. To reduce uncertainties in processing the Korea emission inventory due to the mapping of Korean SCCs to those of U.S., it would be practical to develop and use domestic source profiles for the top 10 SCCs for area and point sources and top 5 SCCs for on-road mobile sources when VOC emissions from the sources are more than 90% of the total.

다중시기 원격탐사 화상의 변화탐지를 위한 임계치 자동 추정 (Automatic Estimation of Threshold Values for Change Detection of Multi-temporal Remote Sensing Images)

  • 박노욱;지광훈;이광재;권병두
    • 대한원격탐사학회지
    • /
    • 제19권6호
    • /
    • pp.465-478
    • /
    • 2003
  • 이 논문은 다중시기 원격탐사 화상의 무감독 변화탐지를 위해 자동으로 임계치를 결정하는 두가지 방법을 제안하였다. 두 방법 모두 3성분 가우시안 혼합 확률 모델의 파라미터 추정과 베이지안 최소 오차 이론을 이용한 임계치 결정의 두 단계로 이루어져 있다. 첫 번째 방법은 Bruzzone and Prieto (2000)의 방법을 확장 적용한 것으로, 혼합 확률 모델의 파라미터 추정에 기대최대화 기법을 적용한다. 두 번째 제안 방법은 연속적으로 임계치 결정과 혼합 확률 모델의 파라미터 추정을 수행한다. 모의 화상과 KOMPSAT-1 EOC 화상에 적용한 결과, 제안한 두 기법 모두 효율적으로 모델 파라미터를 추정할 수 있었으며, 최소 오차를 보이는 임계치에 근사한 값을 추출할 수 있었다.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Multi-Parameter Lamb Wave Tomography

  • Choi, Jae-Seung;Kline, Ronald A.
    • Journal of Mechanical Science and Technology
    • /
    • 제14권1호
    • /
    • pp.1-10
    • /
    • 2000
  • This work shows that it is possible to obtain information about more than one parameter from acoustic field information. A variety of ultrasonic Lamb wave modes were utilized to reconstruct thickness and density of an isotropic plate. An image reconstruction of one parameter (thickness of a plate) was carried out for four cases, i.e., the lowest symmetrical and anti symmetrical modes, and the fastest symmetrical and anti symmetrical Lamb waves among multiple modes. For two parameter reconstructions (thickness and density), the image processing was performed using the lowest symmetrical and antisymmetrical modes simultaneously. In this work, a modified version of algebraic reconstruction technique (ART), which is a form of finite-series expansion method, was employed to reconstruct the ultrasonically computed tomographic images. Results from several sample geometries are presented.

  • PDF

휴대용 정보기기를 위한 플래시 기반 2단계 로킹 기법 (Flash-Based Two Phase Locking Scheme for Portable Computing Devices)

  • 변시우;노창배;정명희
    • Journal of Information Technology Applications and Management
    • /
    • 제12권4호
    • /
    • pp.59-70
    • /
    • 2005
  • Flash memories are one of best media to support portable computer's storages in mobile computing environment. The features of non-volatility, low power consumption, and fast access time for read operations are sufficient grounds to support flash memory as major database storage components of portable computers. However, we need to improve traditional transaction management scheme due to the relatively slow characteristics of flash operation as compared to RAM memory. in order to achieve this goal, we devise a new scheme called Flash Two Phase Locking (F2PL) scheme for efficient transaction processing. F2Pl improves transaction performance by allowing multi version reads and efficiently handling slow flash write/erase operation in lock management process. We also propose a simulation model to show the performance of F2PL. Based on the results of the performance evaluation, we conclude that F2PL scheme outperforms the traditional scheme.

  • PDF

Successive Interactions of a Shock Wave with Serially Arranged Vortices

  • Chang, Se-Myong;Chang, Keun-Shik
    • Journal of Mechanical Science and Technology
    • /
    • 제18권4호
    • /
    • pp.664-670
    • /
    • 2004
  • Navier-Stokes computation based on a new simplified model is proposed to investigate the interactions of a moving shock wave with multiple vortices arranged in the serial manner. This model problem simulates shock-vortexlet interactions at the shear layer of a compressible vortex often observed in the experiment. Applying the Foppl's idea, we extended the Rankin's model generally used for the description of a single vortex to the multi-vortex version. The acoustic pulses accelerated and decelerated are successively generated and propagated from each shock-vortex interaction, which simply explains the genesis of eccentrically diverging acoustic waves appearing in the experimental photograph.

Adaptive Transcoding for Object-based MPEG-4 Scene using Optimal Configuration of Objects

  • Cha, Kyung-Ae
    • 한국멀티미디어학회논문지
    • /
    • 제9권12호
    • /
    • pp.1560-1571
    • /
    • 2006
  • In order to transmit multimedia streams over the network with a timely changing channel bandwidth such as Internet, scalable video coding schemes have been studied to represent video in flexible bitstream. Much research has been made on how to represent encoded media(such as video) bitstream in scalable ways. In this paper, rte propose an optimal selection of the objects for MPEG-4 bitstream adaptation to meet a given constraint. We adopt a multiple choice knapsack problem with multi-step selection for the MPEG-4 objects with different bit-rate scaling levels in the MPEG-4 bitstream. The bitstream adaptation based on the optimal selection result is then to fetch the necessary parts of the MPEG-4 bitstream to constitute an adapted version of the original MPEG-4 binary resource. The experiment results show that the optimal selection of MPEG-4 objects for a given constraint can promisingly be made which meets the given constraint.

  • PDF

Distributed Indexing Methods for Moving Objects based on Spark Stream

  • Lee, Yunsou;Song, Seokil
    • International Journal of Contents
    • /
    • 제11권1호
    • /
    • pp.69-72
    • /
    • 2015
  • Generally, existing parallel main-memory spatial index structures to avoid the trade-off between query freshness and CPU cost uses light-weight locking techniques. However, still, the lock based methods have some limits such as thrashing which is a well-known problem in lock based methods. In this paper, we propose a distributed index structure for moving objects exploiting the parallelism in multiple machines. The proposed index is a lock free multi-version concurrency technique based on the D-Stream model of Spark Stream. The proposed method exploits the multiversion nature of D-Stream of Spark Streaming.

Concurrency Control Method to Provide Transactional Processing for Cloud Data Management System

  • Choi, Dojin;Song, Seokil
    • International Journal of Contents
    • /
    • 제12권1호
    • /
    • pp.60-64
    • /
    • 2016
  • As new applications of cloud data management system (CDMS) such as online games, cooperation edit, social network, and so on, are increasing, transaction processing capabilities for CDMS are required. Several transaction processing methods for cloud data management system (CDMS) have been proposed. However, existing transaction processing methods have some problems. Some of them provide limited transaction processing capabilities. Some of them are hard to be integrated with existing CDMSs. In this paper, we proposed a new concurrency control method to support transaction processing capability for CDMS to solve these problems. The proposed method was designed and implemented based on Spark, an in-memory distributed processing framework. It uses RDD (Resilient Distributed Dataset) model to provide fault tolerant to data in the main memory. In our proposed method, database stored in CDMS is loaded to main memory managed by Spark. The loaded data set is then transformed to RDD. In addition, we proposed a multi-version concurrency control method through immutable characteristics of RDD. Finally, we performed experiments to show the feasibility of the proposed method.

초신뢰성 시스팀에서의 공통원인 실패문제-공통원인의 내부적 효과 및 통계학적 원리의 관점에서 (Common Cause Failure Problems in Ultra-High Reliability Systems-A View Point on Common Cause Internal Effects and Statistical Principles)

  • 박범;고광호;김철수;김한경;오현승
    • 전자통신동향분석
    • /
    • 제8권3호
    • /
    • pp.39-52
    • /
    • 1993
  • This study involves a Common Cause Failure (CCF) problem on the ultra-high reliability required system development such as war game operations, nuclear power control, air traffic control, space shuttle missions, and large scale network communication system. The system situation problems are defined according to CCF, reliability and system fault identifications for the development cast verifications in the multi-version redundant software system. Then, CCF analysis of redundant system, system principles and statistical dependence are also described. This validation oh the CCF in the human software interaction system will notify software engineers to conceive what really is CCF contribution factor, not only the internal but the external ones.