• Title/Summary/Keyword: Software Requirements Evaluation

Search Result 145, Processing Time 0.026 seconds

Development of a High-efficiency and Low-noise Axial Flow Fan through Combining FanDAS and CFX codes (FanDAS-CFX 결합을 통한 고효율-저소음 축류 송풍기의 개발)

  • Lee, Chan;Kil, Hyun Gwon;Noh, Myung-Keun
    • The KSFM Journal of Fluid Machinery
    • /
    • v.15 no.5
    • /
    • pp.37-41
    • /
    • 2012
  • High-efficiency and low-noise axial flow fan is developed by combining the FanDAS, a computerized axial fan design/performance analysis system, and CFD software(CFX). Based on fan design requirements, FanDAS conducts 3-D blade geometry design, quasi-3D flow/ performance analyses and noise evaluation by using through-flow analysis method and noise models for discrete frequency and broadband noise sources. Through the parametric studies of fan design variables using FandDAS, preliminary and baseline design is achieved for high efficiency and low noise fan, and then can be coupled with a CFD technique such as the CFX code for constructing final and optimized fan design. The FanDAS-CFX coupled system and its design procedure are applied to actual fan development practice. The FanDAS provides an optimized 3-D fan blade geometry, and its predictions on the performance and the noise level of designed fan are well agreed with actual test results.

DJFS: Providing Highly Reliable and High-Performance File System with Small-Sized NVRAM

  • Kim, Junghoon;Lee, Minho;Song, Yongju;Eom, Young Ik
    • ETRI Journal
    • /
    • v.39 no.6
    • /
    • pp.820-831
    • /
    • 2017
  • File systems and applications try to implement their own update protocols to guarantee data consistency, which is one of the most crucial aspects of computing systems. However, we found that the storage devices are substantially under-utilized when preserving data consistency because they generate massive storage write traffic with many disk cache flush operations and force-unit-access (FUA) commands. In this paper, we present DJFS (Delta-Journaling File System) that provides both a high level of performance and data consistency for different applications. We made three technical contributions to achieve our goal. First, to remove all storage accesses with disk cache flush operations and FUA commands, DJFS uses small-sized NVRAM for a file system journal. Second, to reduce the access latency and space requirements of NVRAM, DJFS attempts to journal compress the differences in the modified blocks. Finally, to relieve explicit checkpointing overhead, DJFS aggressively reflects the checkpoint transactions to file system area in the unit of the specified region. Our evaluation on TPC-C SQLite benchmark shows that, using our novel optimization schemes, DJFS outperforms Ext4 by up to 64.2 times with only 128 MB of NVRAM.

Development and Evaluation of Video English Dictionary for Silver Generation (실버세대를 위한 동영상 영어사전의 개발 및 평가)

  • Kim, Jeiyoung;Park, Ji Su;Shon, Jin Gon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.345-350
    • /
    • 2020
  • Based on the analysis of physical and learning characteristics and requirements of the silver generation, a video English dictionary was developed and evaluated as English learning contents. The video English dictionary was developed using OCR as an input method and video as an output method, and 17 silver generations were evaluated for academic achievement, learning satisfaction, and ease of use. As a result of the analysis, both the text English dictionary and the video English dictionary showed high learning satisfaction, but the video English dictionary showed higher results than the text English dictionary in an academic achievement and ease of use.

Simulation Analysis on Static Safety of 55Hp-Servo-Based Hydrostatic Transmission (시뮬레이션 기반의 55마력급 서보식 정유압 무단변속기 정적구조안정성 분석)

  • Won, Jonggeun;Yoon, Jongil;Lee, Hyunah;Chung, Seonggyo;Jeong, Jaesu
    • Journal of Drive and Control
    • /
    • v.19 no.1
    • /
    • pp.34-42
    • /
    • 2022
  • Hydrostatic transmission (HST) comprises rotary parts, shafts, valve plate, swashplate, and servo pistons. Ensuring structural stability of each part of an HST has a significant impact on product safety. In this study, the structural stability of HST in agricultural machinery and industrial vehicles was analyzed using ANSYS software. For conservative evaluation, high-pressure conditions (35.5 MPa and 2 MPa pilot pressure) were applied as load conditions. The number of grids used in the calculations ranged from 0.4 to 0.8 million depending on modeling requirements. Structural analysis was performed for essential parts and safety factor was analyzed. All major parts of HST had a safety factor of ≥ 1.5. Thus, they were judged to be structurally safe. This study provides important information for designing an HST system.

Cost-based design of residential steel roof systems: A case study

  • Rajan, S.D.;Mobasher, B.;Chen, S.Y.;Young, C.
    • Structural Engineering and Mechanics
    • /
    • v.8 no.2
    • /
    • pp.165-180
    • /
    • 1999
  • The cost effectiveness of using steel roof systems for residential buildings is becoming increasingly apparent with the decrease in manufacturing cost of steel components, reliability and efficiency in construction practices, and the economic and environmental concerns. While steel has been one of the primary materials for structural systems, it is only recently that its use for residential buildings is being explored. A comprehensive system for the design of residential steel roof truss systems is presented. In the first stage of the research the design curves obtained from the AISI-LRFD code for the manufactured cross-sections were verified experimentally. Components of the truss systems were tested in order to determine their member properties when subjected to axial force and bending moments. In addition, the experiments were simulated using finite element analysis to provide an additional source of verification. The second stage of the research involved the development of an integrated design approach that would automatically design a lowest cost roof truss given minimal input. A modified genetic algorithm was used to handle sizing, shape and topology variables in the design problem. The developed methodology was implemented in a software system for the purpose of designing the lowest cost truss that would meet the AISI code provisions and construction requirements given the input parameters. The third stage of the research involved full-scale testing of a typical residential steel roof designed using the developed software system. The full scale testing established the factor of safety while validating the analysis and design procedures. Evaluation of the test results indicates that designs using the present approach provide a structure with enough reserve strength to perform as predicted and are very economical.

Comparison of encryption algorithm performance between low-spec IoT devices (저 사양 IoT 장치간의 암호화 알고리즘 성능 비교)

  • Park, Jung Kyu;Kim, Jaeho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2022
  • Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.

Page Group Search Model : A New Internet Search Model for Illegal and Harmful Content (페이지 그룹 검색 그룹 모델 : 음란성 유해 정보 색출 시스템을 위한 인터넷 정보 검색 모델)

  • Yuk, Hyeon-Gyu;Yu, Byeong-Jeon;Park, Myeong-Sun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1516-1528
    • /
    • 1999
  • 월드 와이드 웹(World Wide Web)에 존재하는 음란성 유해 정보는 많은 국가에서 사회적인 문제를 일으키고 있다. 그러나 현재 음란성 유해 정보로부터 미성년자를 보호하는 실효성 있는 방법은 유해 정보 접근 차단 프로그램을 사용하는 방법뿐이다. 유해 정보 접근 차단 프로그램은 기본적으로 음란성 유해 정보를 포함한 유해 정보 주소 목록을 기반으로 사용자의 유해 정보에 대한 접근을 차단하는 방식으로 동작한다.그런데 대규모 유해 정보 주소 목록의 확보를 위해서는 월드 와이드 웹으로부터 음란성 유해 정보를 자동 색출하는 인터넷 정보 검색 시스템의 일종인 음란성 유해 정보 색출 시스템이 필요하다. 그런데 음란성 유해 정보 색출 시스템은 그 대상이 사람이 아닌 유해 정보 접근 차단 프로그램이기 때문에 일반 인터넷 정보 검색 시스템과는 달리, 대단히 높은 검색 정확성을 유지해야 하고, 유해 정보 접근 차단 프로그램에서 관리가 용이한 검색 목록을 생성해야 하는 요구 사항을 가진다.본 논문에서는 기존 인터넷 정보 검색 모델이 "문헌"에 대한 잘못된 가정 때문에 위 요구사항을 만족시키지 못하고 있음을 지적하고, 월드 와이드 웹 상의 문헌에 대한 새로운 정의와 이를 기반으로 위의 요구사항을 만족하는 검색 모델인 페이지 그룹 검색 모델을 제안한다. 또한 다양한 실험과 분석을 통해 제안하는 모델이 기존 인터넷 정보 검색 모델보다 높은 정확성과 빠른 검색 속도, 그리고 유해 정보 접근 차단 프로그램에서의 관리가 용이한 검색 목록을 생성함을 보인다.Abstract Illegal and Harmful Content on the Internet, especially content for adults causes a social problem in many countries. To protect children from harmful content, A filtering software, which blocks user's access to harmful content based on a blocking list, and harmful content search system, which is a special purpose internet search system to generate the blocking list, are necessary. We found that current internet search models do not satisfy the requirements of the harmful content search system: high accuracy in document analysis, fast search time, and low overhead in the filtering software.In this paper we point out these problems are caused by a mistake in a document definition of the current internet models and propose a new internet search model, Page Group Search Model. This model considers a document as a set of pages that are made for one subject. We suggest a Group Construction algorithm and a Group Evaluation algorithm. And we perform experiments to prove that Page Group Search Model satisfies the requirements.uirements.

Evaluation of Fuel Consumption Models for Eco-friendly Traffic Operations Strategies (친환경 교통운영전략을 위한 차량 연료소모량 예측모형 평가)

  • PARK, Sangjun;LEE, Jung-Beom
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.3
    • /
    • pp.234-247
    • /
    • 2016
  • As the necessity of the evaluation of environmentally-friendly traffic operations strategies becomes obvious, the characteristics of fuel consumption models should be comprehended in advance. This study selected three fuel consumption models developed in Korea and another three models widely used in North America, and compared their applicabilities. Specifically, the national institute of environmental research (NIER) drive modes and the VISSIM software were utilized to model various driving patterns, and their fuel consumptions were estimated using the fuel consumption models. Based on the results, all the models showed the similar results in the analysis of the most fuel efficient cruising speed. On the other hand, caution should be taken when using the KR-1 and KR-2 models in microscopic analyses because they are not sensitive to instantaneous power requirements of vehicles.

Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems

  • Idriss, Rim;Loukil, Adlen;Khalgui, Mohamed;Li, Zhiwu;Al-Ahmari, Abdulrahman
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.5
    • /
    • pp.2051-2066
    • /
    • 2017
  • This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.

Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications

  • Okafor, Kennedy Chinedu;Longe, Omowunmi Mary
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2257-2285
    • /
    • 2022
  • Cyber-physical systems (CPS) have been growing exponentially due to improved cloud-datacenter infrastructure-as-a-service (CDIaaS). Incremental expandability (scalability), Quality of Service (QoS) performance, and reliability are currently the automation focus on healthy Tier 4 CDIaaS. However, stable QoS is yet to be fully addressed in Cyber-physical data centers (CP-DCS). Also, balanced agility and flexibility for the application workloads need urgent attention. There is a need for a resilient and fault-tolerance scheme in terms of CPS routing service including Pod cluster reliability analytics that meets QoS requirements. Motivated by these concerns, our contributions are fourfold. First, a Distributed Non-Recursive Cloud Model (DNRCM) is proposed to support cyber-physical workloads for remote lab activities. Second, an efficient QoS stability model with Routh-Hurwitz criteria is established. Third, an evaluation of the CDIaaS DCN topology is validated for handling large-scale, traffic workloads. Network Function Virtualization (NFV) with Floodlight SDN controllers was adopted for the implementation of DNRCM with embedded rule-base in Open vSwitch engines. Fourth, QoS evaluation is carried out experimentally. Considering the non-recursive queuing delays with SDN isolation (logical), a lower queuing delay (19.65%) is observed. Without logical isolation, the average queuing delay is 80.34%. Without logical resource isolation, the fault tolerance yields 33.55%, while with logical isolation, it yields 66.44%. In terms of throughput, DNRCM, recursive BCube, and DCell offered 38.30%, 36.37%, and 25.53% respectively. Similarly, the DNRCM had an improved incremental scalability profile of 40.00%, while BCube and Recursive DCell had 33.33%, and 26.67% respectively. In terms of service availability, the DNRCM offered 52.10% compared with recursive BCube and DCell which yielded 34.72% and 13.18% respectively. The average delays obtained for DNRCM, recursive BCube, and DCell are 32.81%, 33.44%, and 33.75% respectively. Finally, workload utilization for DNRCM, recursive BCube, and DCell yielded 50.28%, 27.93%, and 21.79% respectively.