• Title/Summary/Keyword: Performance specification

Search Result 1,134, Processing Time 0.029 seconds

A Study on the Performance Improvement of the Security Transmission Using the SSFNet (SSFNet을 이용한 보안전송 성능개선에 관한 연구)

  • Ryu, Jung-Eun;Ryu, Dong-Ju;Lee, Taek-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.811-815
    • /
    • 2005
  • IPSec(Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. IPSec is providing authentication, integrity and confidentiality security services. The specifications for Internet Key Exchange(IKEv1) were released to the world. Some criticisms of IKEv1 were that it was too complex and endeavored to define too much functionality in one place. Multiple options for multiple scenarios were built into the specification. The problem is that some of the included scenarios are rarely if ever encountered. For IPsec to work, the sending and receiving devices must chare a Public Key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates. This thesis is a study on the performance improvement of the security transmission using the SSFNet(Scalable Simulation Framework Network Models)

  • PDF

Design and Verification of PCI 2.2 Target Controller to support Prefetch Request (프리페치 요구를 지원하는 PCI 2.2 타겟 컨트롤러 설계 및 검증)

  • Hyun Eugin;Seong Kwang-Su
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.523-530
    • /
    • 2005
  • When a PCI 2.2 bus master requests data using Memory Read command, a target device may hold PCI bus without data to be transferred for long time because a target device needs time to prepare data infernally. Because the usage efficiency of the PCI bus and the data transfer efficiency are decreased due to this situation, the PCI specification recommends to use the Delayed Transaction mechanism to improve the system performance. But the mechanism cann't fully improve performance because a target device doesn't know the exact size of prefetched data. In the previous work, we propose a new method called Prefetch Request when a bus master intends to read data from the target device. In this paper, we design PCI 2.2 controller and local device that support the proposed method. The designed PCI 2.2 controller has simple local interface and it is used to convert the PCI protocol into the local protocol. So the typical users, who don't know the PCI protocol, can easily design the PCI target device using the proposed PCI controller. We propose the basic behavioral verification, hardware design verification, and random test verification to verify the designed hardware. We also build the test bench and define assembler instructions. And we propose random testing environment, which consist of reference model, random generator ,and compare engine, to efficiently verify corner case. This verification environment is excellent to find error which is not detected by general test vector. Also, the simulation under the proposed test environment shows that the proposed method has the higher data transfer efficiency than the Delayed Transaction about $9\%$.

Extension of Wright-based Connector Considering Efficiency Characteristics of Component (컴포넌트 효율성 특성을 고려한 Wright기반의 커넥터 확장)

  • 정화영;송영재
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1185-1192
    • /
    • 2003
  • In the component assembly and composition technique of software architecture, It is operated that the existing composition techniques based on architecture, ACME, Wright etc., used in FIFO with the direct connection structure between components through connector's Role. But, when the non-synchronizing request of components that have different characteristics occurs, the FIFO techniques is applied to the connector is difficult to process and operate effectively because of the high performance component waiting the sequence order if the low performance component is allocated first. Thus, the allocated request process according to the priority considering the characteristics of each call components in connector is necessary to improve the operation of assembled component. In this research, we extend the connector part that is available in multiplex connection structure based on existent Wright specification. For service process requested from component, the connector part is designed and implemented to operating with priority sequence through calculating the weight of CPU use rate, bean requesting process time and memory use rate among the efficiency elements of assembled components. To verify the efficiency if this designed connector, we implemented 20 samples EJB components that have different efficiency characteristics and applied these samples components to designed connector. The operating results with this designed connector show that the efficient operation of whole system is possible though the processing time takes 481ms more than the time of the existing FIFO techniques.

Reduction of Aflatoxin during the Cooking and Processing of Rice (쌀의 조리 및 가공 과정 중 Aflatoxin 감소에 관한 연구)

  • 여현종;김종규
    • Journal of Food Hygiene and Safety
    • /
    • v.17 no.2
    • /
    • pp.79-86
    • /
    • 2002
  • Aflatoxin is a secondary fungal metabolite and is a public health hazard because it is a human carcinogenic and has many deleterious effects in men and animals. Rice is one of the better substrates far the fungus which can produce aflatoxins. This study was performed to investigate aflatoxin reduction during the cooking and processing of rice. Aflatoxin was produced by Aspergillus parasiticus ATCC 15517 on well-milled rice (Japonica type) at the level of 13.2 ppb. Cooked rice, rice cakes (baek-sol-gi, plain steamed rice bread), fermented rice (sikhye, sweet rice beverage), and popped rice were prepared from the aflatoxin-contaminated rice. Aflatoxin content in the samples was determined by high performance liquid chromatography. The total aflatoxin level was decreased to 46.9% in the cooked rice, 85.6% in the rice cakes, 11.4% in the fermented rice, and 7.6% in the popped rice, respectively (p.0.05). This reduction brought the level of aflatoxins down to below the Standard and Specification of korea (10 ppb), except for the rice cakes. These results indicate that washing, steaming, fermentation, and popping of rice was helpful in reducing the aflatoxin level in the rice and the most helpful factors were high temperature & high pressure. More research is needed to understand why the preparation of rice cakes did not reduce the level of aflatoxin as much as the other cooking methods.

A study on the optimization design of pulse air jet system to improve bag-filter performance (여과집진기의 탈진 성능 향상을 위한 충격 기류 분사 시스템 최적화 설계에 관한 연구)

  • Hong, Sung-Gil;Jung, Yu-Jin;Park, Ki-Woo;Jeong, Moon-Heon;Lim, Ki-Hyuk;Suh, Hye-Min;Shon, Byung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3792-3799
    • /
    • 2012
  • The dedusting characteristics of pulse air jet type dedusting system which is widely applied in the industries were identified by utilizing the computational fluid dynamics (CFD) and the dedusting performance in modified shape of dedusting unit was compared in this study. The review on the dedusting air volume, air stream distribution and inflow velocity distribution on each shape of dedusting part showed that the case of installing the nozzle on the blow tube (Case-3) and the case of installing the double intaking tube to the venturi (Case-4 and Case-5) were more excellent than the structure (Case-1) which is widely applied in the field in its amplification effect on the air volume and extension of stream width. The specification of venturi was decided to apply the selected Case-5 for the option of the commercial back filter. It is considered that the dedusting air volume will be maintained in maximum in the case of 50 mm and 90 mm for the diameter of internal and external intaking pipe respectively.

A Numerical Study on the Selection of Main Specification of the 18.5ft Bass Fishing Boat (18.5ft급 경기용 배스보트의 주요제원 선정에 관한 수치해석 연구)

  • Lim, Jun-Taek;Seo, Kwang-Cheol;Park, Geun-Hong;Kim, Sang-Won
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.7
    • /
    • pp.945-952
    • /
    • 2018
  • Recently, bass fishing has become a marine leisure sport in Korea. There are 4 major fishing associations in Korea, and each association holds 10-15 tournaments each year. However, supply of 17 ft bass boats, which are preferred in leagues, depends 100 % on imports. In this study, we have derived the main specifications to develop the initial hull forms of a 18.5ft bass boat through statistical analysis based on mothership data. In addition, CFD numerical analysis was carried out according to deadrise angle and longitudinal center of gravity, which strongly influenced the resistance and planing performance. For numerical analysis, design speed was set to $Fn=3.284 (Re=9.858{\times}10^7)$, the deadrise angle was set from 12 to $20^{\circ}$, and the longitudinal center of gravity was set in the range of 0 to $8%L_{wL}$ from the center of buoyancy to the stern. Based on the numerical results, we first set the range of these factors by resistance performance and immersion keel length. Furthermore, using a correlation graph of Savitsky's Drag-Lift ratio, we derived the deadrise angle ($14-16^{\circ}$) and longitudinal center of gravity ($4-6%L_{wL}$).

Slim Mobile Lens Design Using a Hybrid Refractive/Diffractive Lens (굴절/회절 하이브리드 렌즈 적용 슬림 모바일 렌즈 설계)

  • Park, Yong Chul;Joo, Ji Yong;Lee, Jun Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.31 no.6
    • /
    • pp.281-289
    • /
    • 2020
  • This paper reports a slim mobile lens design using a hybrid refractive/diffractive optical element. Conventionally a wide field of view (FOV) camera-lens design adopts a retrofocus type having a negative (-) lens at the forefront, so that it improves in imaging performance over the wide FOV, but with the sacrifice of longer total track length (TTL). However, we chose a telephoto type as a baseline design layout having a positive (+) lens at the forefront, to achieving slimness, based on the specification analysis of 23 reported optical designs. Following preliminary optimization of a baseline design and aberration analysis based on Zernike-polynomial decomposition, we applied a hybrid refractive/diffractive element to effectively reduce the residual chromatic spherical aberration. The optimized optical design consists of 6 optical elements, including one hybrid element. It results in a very slim telephoto ratio of 1.7, having an f-number of 2.0, FOV of 90°, effective focal length of 2.23 mm, and TTL of 3.7 mm. Compared to a comparable conventional lens design with no hybrid elements, the hybrid design improved the value of the modulation transfer function (MTF) at a spatial frequency of 180 cycles/mm from 63% to 71-73% at zero field (0 F), and about 2-3% at 0.5, 0.7, and 0.9 fields. It was also found that a design with a hybrid lens with only two diffraction zones at the stop achieved the same performance improvement.

Study on the screening method for determination of heavy metals in cellular phone for the restrictions on the use of certain hazardous substances (RoHS) (유해물질 규제법(RoHS)에 따른 휴대폰 내의 중금속 함유량 측정을 위한 스크리닝법 연구)

  • Kim, Y.H.;Lee, J.S.;Lim, H.B.
    • Analytical Science and Technology
    • /
    • v.23 no.1
    • /
    • pp.1-14
    • /
    • 2010
  • It is of importance that all countries in worldwide, including EU and China, have adopted the Restrictions on the use of certain Hazardous Substances (RoHS) for all electronics. IEC62321 document, which was published by the International Electronics Committee (IEC) can have conflicts with the standards in the market. On the contrary Publicly Accessible Specification (PAS) for sampling published by IEC TC111 can be adopted for complementary application. In this work, we tried to find a route to disassemble and disjoint cellular phone sample, based on PAS and compare the screening methods available in the market. For this work, the cellular phone produced in 2001, before the regulation was born, was chosen for better detection. Although X-ray Fluorescence (XRF) showed excellent performance for screening, fast and easy handling, it can give information on the surface, not the bulk, and have some limitations due to significant matrix interference and lack of variety of standards for quantification. It means that screening with XRF sometimes requires supplementary tool. There are several techniques available in the market of analytical instruments. Laser ablation (LA) ICP-MS, energy dispersive (ED) XRF and scanning electron microscope (SEM)-energy dispersive X-ray (EDX) were demonstrated for screening a cellular phone. For quantitative determination, graphite furnace atomic absorption spectrometry (GF-AAS) was employed. Experimental results for Pb in a battery showed large difference in analytical results in between XRF and GF-AAS, i.e., 0.92% and 5.67%, respectively. In addition, the standard deviation of XRF was extremely large in the range of 23-168%, compared with that in the range of 1.9-92.3% for LA-ICP-MS. In conclusion, GF-AAS was required for quantitative analysis although EDX was used for screening. In this work, it was proved that LA-ICP-MS can be used as a screening method for fast analysis to determine hazardous elements in electrical products.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Purchasing Status and Supplier Performance Evaluation of School Foodservice in Chanwon, Korea (창원시 학교급식 식재료 구매 실태 및 공급업체 수행도 평가)

  • Jung, Hoi-Jung;Kim, Hyun-Ah
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.41 no.6
    • /
    • pp.861-869
    • /
    • 2012
  • This study was conducted to investigate the purchasing status and to compare supplier performance evaluations between competitive bidding and negotiated contracts in school foodservice in Changwon, Korea. A total of 190 questionnaires were distributed and 167 (return rate 87.9%) were collected from June 29 to September 28, 2010, and then a total of 151 (analysis rate 79.5%) were used for the final analysis. First, 91.4% of food product purchases for school meals were contracted through competitive bidding, especially limited competitive bidding. It mainly consisted of agricultural products, processed food, and eco-friendly agricultural products (fruit). Second, 78.8% of schools purchased food products by negotiated contracts, while single negotiation accounted for 59.7%. Food products by negotiated contract consisted of meat, kimchi, and fish. Third, the purchase status of competitive bidding and negotiated contracts showed a significant difference in agricultural products (p<0.001), fish (p<0.001), meats (p<0.001), poultry (p<0.001), antibiotic-free poultry (p<0.001), eco-friendly grain (p<0.001), eco-friendly agricultural products (fruit) (p<0.001), eco-friendly processed food (p<0.001), processed products (p<0.001), milk (p<0.001) and general grain (p<0.001) except for kimchi. Fourth, comparative analysis of supplier performance evaluation (on a 5-point Likert scale) of school foodservice showed that price of product of competitive bidding (3.73) was significantly higher than that of negotiated contract (2.95) (p<0.001), and the overall performance level of the negotiated contract (3.85) was significantly higher than that of competitive bidding (3.61) (p<0.01). The supplier performance evaluation levels of product packaging (p<0.01), product quality at the time of delivery (p<0.001), hygiene of products (p<0.001), consistency to specification (p<0.001), swiftness of return and exchange (p<0.001), emergency delivery (p<0.001), service of delivery staff (p<0.05), and handling of complaints (p<0.001) of negotiated contracts were significantly higher than those of competitive bidding of school foodservice. In conclusion, school foodservice selected food suppliers both by adopting competitive bidding and negotiated contracts. And there was a significant difference of school foodservice supplier performance between competitive bidding and negotiated contracts in Changwon, Korea.