• Title/Summary/Keyword: Network storage system

Search Result 546, Processing Time 0.029 seconds

Design and Feedback Performance Analysis of the Inverter-side LC Filters Used in the DVR System (DVR시스템에 사용되는 인버터부의 LC필터 설계와 피드백 성능분석)

  • Park, Jong-Chan;Shon, Jin-Geun
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.64 no.2
    • /
    • pp.79-84
    • /
    • 2015
  • Voltage sags are considered the dominant disturbances affecting power quality. Dynamic voltage restorers(DVRs) are mainly used to protect sensitive loads from the electrical network voltage disturbances such as sags or swells and could be used to reduce harmonic distortion of ac voltages. The typical DVR topology essentially contains a PWM inverter with LC Filter, an injection transformer connected between the ac voltage line and the sensitive load, and a DC energy storage device. For injecting series voltage, the PWM inverter is used and the passive filter consist of inductor(L) and capacitor(C) for harmonics elimination of the inverter. However there are voltage pulsation responses by the characteristic of the LC passive filter that eliminate the harmonics of the PWM output waveform of the inverter. Therefore, this paper presented design and feedback performance of LC filter used in the DVRs. The voltage control by LC filter should be connected in the line side since this feedback method allows a relatively faster dynamic response, enabling the elimination of voltage notches or spikes in the beginning and in the end of sags and strong load voltage THD reduction. Illustrative examples are also included.

Composition and Analysis of Linear Component Counting based Multiple Indexing (직선성분 계수 기반 다중 인덱싱 구성 및 분석)

  • Park, Je-Ho;Lim, Sang-Min
    • Journal of the Semiconductor & Display Technology
    • /
    • v.9 no.3
    • /
    • pp.17-21
    • /
    • 2010
  • As the compact and easily accessible handheld devices, such as cellular phones and MP3 players equipped with image acquisition functionality, are becoming widely available among common users, various applications of images are rapidly increasing. Image related services and software such as web-based image presentation and image manipulation for personal or commercial purpose enable users to view contents of remote image archive and to manipulate enormous amount of images in local or network based storage as well. It is necessary for users to identify the images efficiently so that the same images are perceived as one physical entity instead of recognizing them as different images as the trends are getting stronger. In order to support this environment, we propose a method that generates image identifiers or indexing for images within a solid and efficient manner. The proposed image identifier utilizes multiple index values. The integration of component index values creates a unique composite value that can be used as a file name, file system identifier, or database index. Our experimental results on generation of constituent index values have shown favorable results.

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks

  • Xiao, Xin;Zhang, Ruirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2732-2753
    • /
    • 2019
  • With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.

A Novel Framework for Resource Orchestration in OpenStack Cloud Platform

  • Muhammad, Afaq;Song, Wang-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5404-5424
    • /
    • 2018
  • This work is mainly focused on two major topics in cloud platforms by using OpenStack as a case study: management and provisioning of resources to meet the requirements of a service demanded by remote end-user and relocation of virtual machines (VMs) requests to offload the encumbered compute nodes. The general framework architecture contains two subsystems: 1) An orchestrator that allows to systematize provisioning and resource management in OpenStack, and 2) A resource utilization based subsystem for vibrant VM relocation in OpenStack. The suggested orchestrator provisions and manages resources by: 1) manipulating application program interfaces (APIs) delivered by the cloud supplier in order to allocate/control/manage storage and compute resources; 2) interrelating with software-defined networking (SDN) controller to acquire the details of the accessible resources, and training the variations/rules to manage the network based on the requirements of cloud service. For resource provisioning, an algorithm is suggested, which provisions resources on the basis of unused resources in a pool of VMs. A sub-system is suggested for VM relocation in a cloud computing platform. The framework decides the proposed overload recognition, VM allocation algorithms for VM relocation in clouds and VM selection.

Flood Risk Management for Weirs: Integrated Application of Artificial Intelligence and RESCON Modelling for Maintaining Reservoir Safety

  • Idrees, Muhammad Bilal;Kim, Dongwook;Lee, Jin-Young;Kim, Tae-Woong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.167-167
    • /
    • 2020
  • Annual sediment deposition in reservoirs behind weirs poses flood risk, while its accurate prediction remains a challenge. Sediment management by hydraulic flushing is an effective method to maintain reservoir storage. In this study, an integrated approach to predict sediment inflow and sediment flushing simulation in reservoirs is presented. The annual sediment inflow prediction was carried out with Artificial Neural Networks (ANN) modelling. RESCON model was applied for quantification of sediment flushing feasibility criteria. The integrated approach was applied on Sangju Weir and also on estuary of Nakdong River (NREB). The mean annual sediment inflow predicted at Sangju Weir and NREB was 400,000 ㎥ and 170,000 ㎥, respectively. The sediment characteristics gathered were used to setup RESCON model and sediment balance ratio (SBR) and long term capacity ratio (LTCR) were used as flushing efficiency indicators. For Sangju Weir, the flushing discharge, Qf = 140 ㎥/s with a drawdown of 5 m, and flushing duration, Tf = 10 days was necessary for efficient flushing. At NREB site, the parameters for efficient flushing were Qf = 80 ㎥/s, Tf = 5 days, N = 1, Elf = 2.24 m. The hydraulic flushing was concluded feasible for sediment management at both Sangju Weir and NREB.

  • PDF

The Analysis of the Purchasing Process and Distribution Management Requirements of Teaching Materials in Preschool

  • Jae-Moo LEE;Kyung-Seu CHO
    • Journal of Distribution Science
    • /
    • v.22 no.1
    • /
    • pp.115-125
    • /
    • 2024
  • Purpose: This study is to analyze the purchasing process and distribution management requirements for teaching materials that have important meaning in the practical field of preschool education. Research design, data and methodology: A structured questionnaire was used to survey 103 childcare staffs regarding the purchasing process and distribution managements. The collected data underwent Likert's 5-point scale analysis and keyword grouping. Additionally, ANOVA was conducted to examine the distribution management demands based on demographic characteristics. Results: The purchasing of teaching materials involved more offline channels than online, and the purchase decisions were predominantly made by principals rather than teachers. Although the purchasing process is similar to that of general businesses, there are difficulties in purchasing due to the disorganized distribution channels and limited accessibility to product information. Additionally, the management of inventory for teaching materials is challenging due to limited personnel and storage. Childcare staffs have requirements for classification systems, evaluation criteria, environments and policies related to teaching materials distribution. The need to introduce a teaching material evaluation and certification system to ensure quality was not high. Conclusions: Most of the respondents recognized that strict management and measures should be taken for the distribution of teaching materials. There were differences in the demand of teaching material distribution depending on the respondents' status, age, education, and experience.

A Study on Integration of Healthcare Information Systems based on P2P in Distributed Environment (분산환경에서의 P2P기반 보건의료분야 정보시스템 통합에 관한 연구)

  • Park, Yong-Min;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.36-42
    • /
    • 2011
  • The current healthcare information systems field to meet the growing demand for healthcare for a variety of building systems and operation, and subsequent information on the budget continues to increase, but the current system, although the association link between the various systems made does not, with organizations with information about each of the standardization and real-time network status data do not consist of various materials, such as insufficient to provide real-time issues have been raised. This paper proposes a Integrated information system on Healthcare based on JXTA to solve problems mentioned above. Until now, in a network environment for data storage and management is the most widely used server-intensive structure, while an increase in users and traffic difficulties in data management and communications services to handle the growing number of servers increase faster than information associated with the cost savings, P2P model in terms of efficient data management has emerged as a new solution. Therefore this paper designs a platform for Integrated information system on Healthcare based on JXTA as a method to integrate health information data and services, and then proves that the new information system on healthcare based on JXTA is the suitable model.

A Design of Mobile Device Description Repository System (모바일 단말정보 저장소 시스템 설계)

  • Lee, Young-Il;Lee, Seung-Yun;Lee, Kang-Chan;In, Min-Kyo;Lee, Won-Suk;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.819-822
    • /
    • 2008
  • The demand against the contents service which is various with improvement capability of the mobile device. But the capability of heterogeneous mobile device to display contents has a difference from the side of the hardware, software, network conditions so the adaptation of contents is a solution to overcome this difference. This adaptation of contents is based on profile(DDL : Device Description Language) but there is no system which manages the profile efficiently. In this paper, we designed independent DDR(Device Description Repository) system that offers storage and optimized profiles processed by searching and recombination with request conditions.

  • PDF

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

A study on Development of Remote Vehicle Fault Diagnostic System (원격 자동차 고장 진단 시스템 개발에 대한 연구)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.224-227
    • /
    • 2015
  • Data transmission via the car driver's tethered smart phone may have a volume-dependent billing in case car driver' phone transmits data in real-time to the remote data center. The on-board diagnosis data generated are temporary stored locally to mobile remote diagnosis application on the car driver's phone, and then transmit to the data center later when car driver connects to the Internet. To increase the easiest of using the remote vehicle application without blocking other tasks to be executing on the cloud, node.js stands as a suitable candidate for handling tasks of data storage on the cloud via mobile network. We demonstrate the effectiveness of the proposed architecture by simulating a preliminary case study of an android application responsible of real time analysis by using a vehicle-to- smart phones applications interface approach that considers the smart phones to act as a remote user which passes driver inputs and delivers output from external applications. In this paper, we propose a study on development of Remote Vehicle fault diagnostic system features web server architecture based event loop approach using node.js platform, and wireless communication to handle vehicle diagnostics data to a data center.

  • PDF