• Title/Summary/Keyword: Storage Location

Search Result 408, Processing Time 0.026 seconds

A study on the determination of location of the detention pond in trunk sewer for reducing runoff amounts (우수유출저감을 위한 간선저류지 위치선정에 관한 연구)

  • Lee, Sung Ho;Yoon, Sei Eui;Lee, Jae Joon
    • Journal of Korea Water Resources Association
    • /
    • v.50 no.4
    • /
    • pp.223-232
    • /
    • 2017
  • The ability to defend against floods in urban areas was weakened, because the increase in the impervious rate of urban areas due to urbanization and industrialization and the increase in the localized torrential rainfall due to abnormal climate. In order to reduce flood damage in urban areas, various runoff reduction facilities such as detention ponds and infiltration facilities were installed. However, in the case of domestic metropolitan cities, it is difficult to secure land for the installation of storm water reduction facilities and secure the budget for improving the aged pipelines. Therefore, it is necessary to design a storage system (called the detention pond in trunk sewer) that linked the existing drainage system to improve the flood control capacity of the urban area and reduce the budget. In this study, to analyze the effect of reducing runoff amounts according to the volume of the detention pond in trunk sewer, three kinds of virtual watershed (longitudinal, middle, concentration shape) were assumed and the detention pond in trunk sewer was installed at an arbitrary location in the watershed. The volume of the detention pond in trunk sewer was set to 6 cases ($1,000m^3$, $3,000m^3$, $5,000m^3$, $10,000m^3$, $20,000m^3$, $30,000m^3$), and the installation location of the detention pond in trunk sewer was varied to 20%, 40%, 60%, and 80% of the detention pond upstream area to the total watershed area (DUAR). Also, using the results of this study, a graph of the relationship and relational equation between the volume of the detention pond in trunk sewer and the installation location is presented.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

Characteristics of Remodeling in Apartment Housing according to the Building Life-cycle and Family Life-cycle (건물의 생애주기와 가족생활주기에 따른 공동주택의 개조특성)

  • 윤정숙;정유선
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2000.11b
    • /
    • pp.123-129
    • /
    • 2000
  • The purpose of this study was to provide the fundamental data for the effective housing remodeling plan. Through the questionnaire survey, the actual conditions of remodeling in apartment housing were investigated. And as the result of statistic analysis, the relationships between characteristics of remodeling and building life-cycle, and family life-stage, were found out. The major findings of this study are as follows; 1) Most of apartment residents have remodeled the family living space and private living space. In detail, they performed remodeling frequently the change of finishing materials, facilities and equipments, and the change of the location of curtain wall & storage fixtures. 2) It might be predicted that the building life-cycle was influential variable to predict apartment residents' remodeling. Therefore, in planning the support service for the remodeling, the building life-cycle should be taken into consideration.

  • PDF

Design and Performance Analysis of Storage Schema for Efficient Storing GML Documents (효율적인 GML 문서 저장을 위한 저장 스키마의 설계 및 성능평가)

  • Wang, Tae-Woong;Chang, Jae-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.39-44
    • /
    • 2006
  • 최근 LBS(Location Based Service) 및 텔레매틱스 응용의 효과적인 지원을 위해, 도로, 철도와 같은 공간 데이터베이스에 관한 연구가 활발히 수행중에 있다. 공간 네트워크 데이터베이스 연구는 지리 정보의 교환 표준으로 제시된 GML(Geographic Markup Language)을 지원하는 연구가 필수적이다. 기존 XML 저장스키마는 공간지리정보 표현에 적합하지 않기 때문에, 본 논문에서는 공간 지리정보를 포함한 GML을 저장하기 위한 새로운 저장스키마를 제안한다. 아울러 제안하는 저장 스키마의 효율성을 평가하기 위해 디스크 기반 및 메모리 기반의 하부 저장 시스템을 통해 성능평가를 수행한다.

  • PDF

The Power of Power Law: A View from VoD Service

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.607-614
    • /
    • 2013
  • In this work we investigate the power of power law in the VoD service over IP network. Especially, we show that the power of power law is strong in the location of the contents storage for the VoD service and its impact on the link dimensioning. This work first shows the instance of the power law in the popularity of the video contents from the real data for the IPTV service. After that we propose an analytic model that characterizes the behavior of customers in accessing the video servers as well as the power law in the viewing pattern. Finally, we show the impact of the power law by proposing a model for the cost as well as link dimensioning. Via numerical experiment we show the implication of the proposition.

Characterization of Test Substance in the GLP (GLP 시험에서의 시험물질 특성파악)

  • Lee, Eun-Jung;Song, Kyung-Seuk;Yu, Il-Je
    • Toxicological Research
    • /
    • v.23 no.2
    • /
    • pp.173-177
    • /
    • 2007
  • The GLP contains specific language concerning characterization of the test, control and reference substances used in toxicity studies. This paper will describe and discuss what types of documents are required to support test/reference substance characterization under GLP system. The purpose of this article is to present an overview of data needed in the characterization package that will adequately define the substance. Most sponsors use a certificate of analysis (COA) to communicate the test sub-stance characterization status information to the contracting research organizations. The COA should provide the test $material^{\circ}{\phi}s$ characterization results, substance storage requirements, expiration dates, verification of the collection of the retention sample, archival location of the data to support the characterization and GLP compliance status of the characterization.

A Study on the Facility Standard of Herbal Dispensaries (탕전실의 시설 기준에 대한 연구)

  • Kim, Ji-Hoon;Kim, Yun-Kyung
    • The Journal of Korean Medicine
    • /
    • v.38 no.1
    • /
    • pp.81-92
    • /
    • 2017
  • Objectives: Herbal dispensaries can be installed separately from medical institutions. This study was done to suggest directions of regulation on management of externally installed herbal dispensaries. Methods: In this study, we visited and investrigated 7 representative herbal dispensaries to understand current status of herbal dispensaries. After comprehending current domestic regulations on herbal dispensaries, we referred "Management Practice on Dispensary Facility of Traditional Chinese Medicine in Medical Institution", "Enforcement Rule of Decree on Institution Standard of Manufacturing and Importation for Drugs, etc." and "Enforcement Rule of Food Sanitation Act" to suggest improved regulations for herbal dispensaries. Results: We suggested reasonable regulations for facility standards including location of building, dispensary room, water supply facility, lavatory and storage facility, etc.. Conclusions: We hope that results of this study could be baseline data for developing regulations on facility standards of herbal dispensaries.

A Study on the Application of Spatial-Knowledge-Tags using Human Motion in Intelligent Space

  • Jin, Tae-Seok;Morioka, Kazuyuki;Niitsuma, Mihoko;Sasaki, Takeshi;Hashimoto, Hideki
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.31-36
    • /
    • 2005
  • Intelligent Space (iSpace) is the space where many intelligent devices, such as computers and sensors, are distributed. According to the cooperation of many intelligent devices, the environment comes to have intelligence. In iSpace, the locations of multiple humans and other objects are obtained and tracked by using multiple camera and color-based method. In addition, we describe a context-aware information system which is based on Spatial-Knowledge-Tags (SKT). SKT system enables humans to access information and data by using spatial location of human and stored information in storage. The proposed tracking method is applied to the intelligent environment and its performance is verified by the experiments.

  • PDF

Enhanced Authentication Protocol of RFID System (RFID 시스템의 개선된 인증 프로토콜)

  • Lee, Sang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.193-200
    • /
    • 2007
  • There is an advantage that RFID system is better than previous bar code system in storage ability and noncontact property. But, everyone can easily receive the transmitting information by using RF signal. So, there is a problem that system security and personal privacy are threatened. In this paper, I propose RFID system that is secure against attacks like eavesdropping, replay, spoofing and location tracking and can efficiently provide mutual authentication services between reader and tag. The proposed RFID system can be used in various sections of ubiquitous computing environment.

  • PDF

Optimal unidirectional grid tied hybrid power system for peak demand management

  • Vineetha, C.P.;Babu, C.A.
    • Advances in Energy Research
    • /
    • v.4 no.1
    • /
    • pp.47-68
    • /
    • 2016
  • A well designed hybrid power system (HPS) can deliver electrical energy in a cost effective way. In this paper, model for HPS consisting of photo voltaic (PV) module and wind mill as renewable energy sources (RES) and solar lead acid battery as storage device connected to unidirectional grid is developed for peak demand reduction. Life time energy cost of the system is evaluated. One year hourly site condition and load pattern are taken into account for analysing the HPS. The optimal HPS is determined for least life time energy cost subject to the constraints like state of charge of the battery bank, dump load, renewable energy (RE) generation etc. Optimal solutions are also found out individually for PV module and wind mill. These three systems are compared to find out the most feasible combination. The results show that the HPS can deliver energy in an acceptable cost with reduced peak consumption from the grid. The proposed optimization algorithm is suitable for determining optimal HPS for desired location and load with least energy cost.