• Title/Summary/Keyword: Startup Time

Search Result 145, Processing Time 0.026 seconds

Technology for Real-Time Identification of Steady State of Heat-Pump System to Develop Fault Detection and Diagnosis System (열펌프의 고장감지 및 진단시스템 구축을 위한 실시간 정상상태 진단기법 개발)

  • Kim, Min-Sung;Yoon, Seok-Ho;Kim, Min-Soo
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.34 no.4
    • /
    • pp.333-339
    • /
    • 2010
  • Identification of a steady state is the first step in developing a fault detection and diagnosis (FDD) system of a heat pump. In a complete FDD system, the steady-state detector will be included as a module in a self-learning algorithm, which enables the working system's reference model to "tune" itself to its particular installation. In this study, a steady-state detector of a residential air conditioner based on moving windows was designed. Seven representative measurements were selected as key features for steady-state detection. The optimized moving-window size and the feature thresholds were decided on the basis of a startup-transient test and no-fault steady-state test. Performance of the steady-state detector was verified during an indoor load-change test. In this study, a general methodology for designing a moving-window steady-state detector for applications involving vapor compression has been established.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

A Functional Unit Dynamic API Birthmark for Windows Programs Code Theft Detection (Windows 프로그램 도용 탐지를 위한 기능 단위 동적 API 버스마크)

  • Choi, Seok-Woo;Cho, Woo-Young;Han, Tai-Sook
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.767-776
    • /
    • 2009
  • A software birthmark is a set of characteristics that are extracted from a program itself to detect code theft. A dynamic API birthmark is extracted from the run-time API call sequences of a program. The dynamic Windows API birthmarks of Tamada et al. are extracted from API call sequences during the startup period of a program. Therefore. the dynamic birthmarks cannot reflect characteristics of main functions of the program. In this paper. we propose a functional unit birthmark(FDAPI) that is defined as API call sequences recorded during the execution of essential functions of a program. To find out that some functional units of a program are copied from an original program. two FDAPIs are extracted by executing the programs with the same input. The FDAPIs are compared using the semi-global alignment algorithm to compute a similarity between two programs. Programs with the same functionality are compared to show credibility of our birthmark. Binary executables that are compiled differently from the same source code are compared to prove resilience of our birthmark. The experimental result shows that our birthmark can detect module theft of software. to which the existing birthmarks of Tamada et al. cannot be applied.

Characteristic of the Class Library for Embedded Java System (내장형 자바 시스템을 위한 클래스 라이브러리의 특성)

  • 양희재
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.788-797
    • /
    • 2003
  • Class library is one of the most crucial element of Java runtime environment in addition to Java virtual machine. In particular, embedded Java system depends heavily on the class library due to having a low bandwidth communication link and a small amount of memory which are a common restriction of embedded system. It is therefore quite necessary to find the characteristic of the class library for embedded Java system to build an efficient Java runtime environment. In this paper we have analyzed the characteristic of the class library for embedded system. The analysis includes sorts of classes in the library, typical size of the file which contains the class, and the composition of constant pool which is a major part of the file. We also have found typical number of field and method a class contains, the sizes of stack and local variable array each method requires, and the length of bytecode in the method. The result of this study can be used to estimate the startup time for class loading and the size of memory to create an instance of class which are a mandatory information to design an efficient embedded Java virtual machine.

An IPTV Network Infrastructure for Organizing an Extendible IPTV Architecture (확장형 IPTV 아키텍처 구성을 위한 IPTV 네트워크 인프라스트럭쳐 연구)

  • Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.465-471
    • /
    • 2016
  • An IPTV has emerged as a widespread system when a realtime network and broadcasting system have progressed. Interestingly, it can also be organized with IPTV STBs and FC-AL for a high-quality TV content-sharing architecture. It is, however, not easy to configure a large community network with the FC-AL since it only has a 7-bit address space with supporting up to 127 users in the FC-AL single loop. We, therefore, propose an extendible FC-AL-based IPTV network architecture using a FC switch device. In this article, our suggested architecture shows a superb startup delay, such as less than 20msec. In addition, it demonstrates outstanding extendibility, such that the number of accomodable users increases almost linearly according to adding loops. Lastly, it reveals exceptional time-shifting hours, i. e., which supports more than 140 hours with 1000 users.

FEXT cancellation for high-speed local transmission over twisted pair wiring (동축 선로에서의 초고속 근거리 전송을 위한 FEXT 제거기)

  • 우정수;강규민;임기홍
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.782-791
    • /
    • 2002
  • This paper discusses a far-end crosstalk (FEXT) canceller for twisted-pair transmission. Many twisted-pair systems such as fiber-to-the-curb (FTTC), very high-speed digital subscriber line (VDSL), and high-speed LAN systems, use frequency-division duplexing (FDD) for duplex transmission. It is shown that the maximum reach of FDD twisted-pair system is limited by the performance of its upstream channel, which is located at higher frequencies than the downstream channel. In order to improve the performance of such FDD transceiver, FEXT cancellation is introduced for the channel at higher frequencies. A system arrangement and its blind start-up procedure are studied when the FEXT canceller and equalizer are jointly adapted to combat channel intersymbol interference (ISI), FEXT, and other additive noise. The initial convergence and the steady-state behavior of the proposed twisted-pair system without requiring transmission of an ideal training sequence are investigated. Measured characteristics as well as analytical model of the FEXT channel are used to estimate the time span needed for the FEXT canceller. It is also shown that the memory span for the FEXT canceller is almost independent of the channel, thus making our results useful for the twisted-pair system over all different channels.

Soft Start-up Algorithm of Single-Phase Induction Motor Based on Full-bridge Inverter (풀 브리지 인버터 기반 단상 유도전동기의 소프트 기동 기법)

  • Kim, Tae-Seong;Kang, Hyung-Do;Hwang, Seon-Hwan
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.258-265
    • /
    • 2018
  • This paper proposes an algorithm for reducing the starting current when the single-phase induction motor starts and analyzes its operation. Generally, the single-phase induction motors require several starters to generate the starting torque due to their structural characteristics. In this paper, a capacitor-start / capacitor-run method of the single-phase induction motor is basically adopted. This conventional method is efficient and has a large starting torque, but it generates about 5 ~ 6 times of inrush current at startup. As a result, the freezer starting device and peripheral devices are damaged and life time may be reduced. To reduce the inrush current, the current control algorithm based on the virtual dq model is presented to control the starting current. In addition, it validates the proposed algorithm through experiments to smooth transit from start-up operation to the rated operating region.

A Study on Open API Security Protocol based on Multi-Channel (다중 채널 기반 오픈 API 보안 프로토콜에 관한 연구)

  • Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.40-46
    • /
    • 2020
  • Safe security technology is required for the startup ecosystem according to the construction and service of a joint open platform in the financial sector. Financial industry standard open API recommends that payment-related fintech companies develop/apply additional security technologies to protect core API authentication keys in the mutual authentication process. This study proposes an enhanced API security protocol using multiple channels. It was designed in consideration of the compatibility of heterogeneous platforms by further analyzing the problems and weaknesses of existing open API related research. I applied the method of concealment to remove the additional security channels into a single channel of the existing security protocols. As a result of the performance analysis, the two-way safety of the communication session of the multi-channel and the security of the man-in-the-middle attack of the enhanced authentication key were confirmed, and the computational performance of the delay time (less than 1 second) in the multi-session was confirmed.

Proxy Caching Grouping by Partition and Mapping for Distributed Multimedia Streaming Service (분산 멀티미디어 스트리밍 서비스를 위한 분할과 사상에 의한 프록시 캐싱 그룹화)

  • Lee, Chong-Deuk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.40-47
    • /
    • 2009
  • Recently, dynamic proxy caching has been proposed on the distributed environment so that media objects by user's requests can be served directly from the proxy without contacting the server. However, it makes caching challenging due to multimedia large sizes, low latency and continuous streaming demands of media objects. To solve the problems caused by streaming demands of media objects, this paper has been proposed the grouping scheme with fuzzy filtering based on partition and mapping. For partition and mapping, this paper divides media block segments into fixed partition reference block(R$_f$P) and variable partition reference block(R$_v$P). For semantic relationship, it makes fuzzy relationship to performs according to the fixed partition temporal synchronization(T$_f$) and variable partition temporal synchronization(T$_v$). Simulation results show that the proposed scheme makes streaming service efficiently with a high average request response time rate and cache hit rate and with a low delayed startup ratio compared with other schemes.

A Scalable Content-Sharing Architecture for High-quality TV Programs (확장 가능한 실시간 고화질 TV 컨텐츠 공유 아키텍처)

  • Chung, Sungwook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2651-2657
    • /
    • 2014
  • It can be organized with PVRs and FC-AL for a high-quality TV content-sharing architecture. It is, however, not easy to configure a large community network with the FC-AL since it has a 7-bit address space with supporting up to 127 users. We, therefore, propose a novel scalable FC-AL multiple-loop architecture using shared disks, which does not need to use expensive and load-concentrated switches. In this article, our suggested architecture shows a superb startup delay, such as less than 20msec. In addition, it demonstrates outstanding scalability, such that the number of accomodable users increases almost linearly according to adding loops. Lastly, it reveals exceptional time-shifting hours, that is, which supports more than 140 hours with 1000 users.