• Title/Summary/Keyword: Time-Delay Systems

Search Result 1,741, Processing Time 0.03 seconds

Boosting up the Mount Latency of NAND Flash File System using Byte-addressable NVRAM (바이트 접근성을 가지는 비휘발성 메모리 소자를 이용한 낸드 플래시 파일 시스템의 부팅시간 개선 기법)

  • Jeon, Byeong-Gil;Kim, Eun-Ki;Shin, Hyung-Jong;Han, Seok-Hee;Won, Yoo-Jip
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.256-260
    • /
    • 2008
  • This paper describes an improvement of mount-time delay in NAND Flash file systems. To improve file system mount performance, this work configures a hierarchical storage system with byte-addressable NVRAM and NAND Flash memory, and let the meta data of a file system allocated in the NVRAM. Since the meta data are stored in NVRAM supporting data integrity some of the items, which are stored in Spare area and Object Header area of NAND Flash memory to control meta data of NAND Flash file system, could be eliminated. And also, this work eliminates the scanning operation of the Object Header area of previous work FRASH1.0. The scanning operation is definitely required to find out the empty Object Header address for storing the Object Header data and provokes a certain amount of performance loss in file generation and deletion. In this work, an implemented file system, so-called FRASH1.5, is demonstrated, featuring new data structures and new algorithms. The mount time of FRASH1.5 becomes twice as fast as that of the FRASH1.0. The performance in file generation gets improved by about $3{\sim}8%$. In particular, for most large-size files, the FRASH1.5 has 8 times faster mount time than YAFFS, without any performance loss as seen in the file generation.

Prediction of Power Consumption for Improving QoS in an Energy Saving Server Cluster Environment (에너지 절감형 서버 클러스터 환경에서 QoS 향상을 위한 소비 전력 예측)

  • Cho, Sungchoul;Kang, Sanha;Moon, Hungsik;Kwak, Hukeun;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.47-56
    • /
    • 2015
  • In an energy saving server cluster environment, the power modes of servers are controlled according to load situation, that is, by making ON only minimum number of servers needed to handle current load while making the other servers OFF. This algorithm works well under normal circumstances, but does not guarantee QoS under abnormal circumstances such as sharply rising or falling loads. This is because the number of ON servers cannot be increased immediately due to the time delay for servers to turn ON from OFF. In this paper, we propose a new prediction algorithm of the power consumption for improving QoS under not only normal but also abnormal circumstances. The proposed prediction algorithm consists of two parts: prediction based on the conventional time series analysis and prediction adjustment based on trend analysis. We performed experiments using 15 PCs and compared performance for 4 types of conventional time series based prediction methods and their modified methods with our prediction algorithm. Experimental results show that Exponential Smoothing with Trend Adjusted (ESTA) and its modified ESTA (MESTA) proposed in this paper are outperforming among 4 types of prediction methods in terms of normalized QoS and number of good reponses per power consumed, and QoS of MESTA proposed in this paper is 7.5% and 3.3% better than that of conventional ESTA for artificial load pattern and real load pattern, respectively.

Design and Implementation of Interface System for Swarm USVs Simulation Based on Hybrid Mission Planning (하이브리드형 임무계획을 고려한 군집 무인수상정 시뮬레이션 시스템의 연동 인터페이스 설계 및 구현)

  • Park, Hee-Mun;Joo, Hak-Jong;Seo, Kyung-Min;Choi, Young Kyu
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.1-10
    • /
    • 2022
  • Defense fields widely operate unmanned systems to lower vulnerability and enhance combat effectiveness. In the navy, swarm unmanned surface vehicles(USVs) form a cluster within communication range, share situational awareness information among the USVs, and cooperate with them to conduct military missions. This paper proposes an interface system, i.e., Interface Adapter System(IAS), to achieve inter-USV and intra-USV interoperability. We focus on the mission planning subsystem(MPS) for interoperability, which is the core subsystem of the USV to decide courses of action such as automatic path generation and weapon assignments. The central role of the proposed system is to exchange interface data between MPSs and other subsystems in real-time. To this end, we analyzed the operational requirements of the MPS and identified interface messages. Then we developed the IAS using the distributed real-time middleware. As experiments, we conducted several integration tests at swarm USVs simulation environment and measured delay time and loss ratio of interface messages. We expect that the proposed IAS successfully provides bridge roles between the mission planning system and other subsystems.

A channel parameter-based weighting method for performance improvement of underwater acoustic communication system using single vector sensor (단일 벡터센서의 수중음향 통신 시스템 성능 향상을 위한 채널 파라미터 기반 가중 방법)

  • Kang-Hoon, Choi;Jee Woong, Choi
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.6
    • /
    • pp.610-620
    • /
    • 2022
  • An acoustic vector sensor can simultaneously receive vector quantities, such as particle velocity and acceleration, as well as acoustic pressure at one location, and thus it can be used as a single input multiple output receiver in underwater acoustic communication systems. On the other hand, vector signals received by a single vector sensor have different channel characteristics due to the azimuth angle between the source and receiver and the difference in propagation angle of multipath in each component, producing different communication performances. In this paper, we propose a channel parameter-based weighting method to improve the performance of an acoustic communication system using a single vector sensor. To verify the proposed method, we used communication data collected from the experiment conducted during the KOREX-17 (Korea Reverberation Experiment). For communication demodulation, block-based time reversal technique which is robust against time-varying channels were utilized. Finally, the communication results showed that the effectiveness of the channel parameter-based weighting method for the underwater communication system using a single vector sensor was verified.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Performance Analysis of Soft Handoff Methods using Simulation (시뮬레이션을 이용한 소프트 핸드오프 방식의 성능 분석)

  • Han, Kyung-Sook;Kim, Tae-Jung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.411-420
    • /
    • 2000
  • The performance of soft handoffs of CDMA mobile communication systems is potentially determined by several factors such as handoff-related system parameters (T_ADD, T_DROP, T_COMP, T_TDROP), mobile stations' mobility, service areas, capacity of base stations. Due to the importance of handoffs in mobile communications, several methods have been proposed and tested through computer simulations to prove the efficiency of proposed methods. Different assumptions on the above mentioned factors often produce different simulation results. Therefore, the credibility of a simulation result is directly determined by the objectivity of the assumptions made by the simulation. This paper proposes a new soft handoff method that controls handoff delay time based on a mobile station's speed, and compares it with the current method of CDMA systems. The simulation results showed that the new method is much more efficient for mobile stations that are free in their moving direction and space than for those restricted in their moving direction and space. In addition, the results showed that even the same handoff method may produces different simulation results depending on whether a service area is modeled as two-dimensional space or three-dimensional space. These results indicate the importance of suitable models of user mobility, especially the movement types and space allowed for mobile stations, which have been neglected in simulation studies of mobile communications.

  • PDF

Two-Way Donation Locking for Transaction Management in Database Systems (데이터베이스 시스템에서 거래관리를 위한 두단계기부잠금규약)

  • Rhee, Hae-Kyung;Kim, Ung-Mo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.2
    • /
    • pp.1-10
    • /
    • 2000
  • Traditional syntax-oriented serializability notions ate considered to be not enough to handle in particular various types of transaction in terms of duration of execution. To deal with this situation, altruistic locking has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of altruism has also been deployed in extended altruistic locking in a way that scope of data to be early released is enlarged to include even data initially not intended to be donated. In this paper, we first of all investigated limitations inherent in both altruistic schemes from the perspective of alleviating starvation occasions for transactions in particular of short-lived nature. The idea of two-way donation locking(2DL) has then been experimented to see the effect of more than single donation in client-server database systems. Simulation experiments shows that 2DL outperforms the conventional two-phase locking in terms of the degree of concurrency and average transaction waiting time under the circumstances that the size of long-transaction is in between 5 and 9.

  • PDF

A Mismatch-Insensitive 12b 60MS/s 0.18um CMOS Flash-SAR ADC (소자 부정합에 덜 민감한 12비트 60MS/s 0.18um CMOS Flash-SAR ADC)

  • Byun, Jae-Hyeok;Kim, Won-Kang;Park, Jun-Sang;Lee, Seung-Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.7
    • /
    • pp.17-26
    • /
    • 2016
  • This work proposes a 12b 60MS/s 0.18um CMOS Flash-SAR ADC for various systems such as wireless communications and portable video processing systems. The proposed Flash-SAR ADC alleviates the weakness of a conventional SAR ADC that the operation speed proportionally increases with a resolution by deciding upper 4bits first with a high-speed flash ADC before deciding lower 9bits with a low-power SAR ADC. The proposed ADC removes a sampling-time mismatch by using the C-R DAC in the SAR ADC as the combined sampling network instead of a T/H circuit which restricts a high speed operation. An interpolation technique implemented in the flash ADC halves the required number of pre-amplifiers, while a switched-bias power reduction scheme minimizes the power consumption of the flash ADC during the SAR operation. The TSPC based D-flip flop in the SAR logic for high-speed operation reduces the propagation delay by 55% and the required number of transistors by half compared to the conventional static D-flip flop. The prototype ADC in a 0.18um CMOS demonstrates a measured DNL and INL within 1.33LSB and 1.90LSB, with a maximum SNDR and SFDR of 58.27dB and 69.29dB at 60MS/s, respectively. The ADC occupies an active die area of $0.54mm^2$ and consumes 5.4mW at a 1.8V supply.

Adaptive Strip Compression for Panorama Video Streaming (파노라마 동영상 스트리밍을 위한 적응적 스트립 압축 기법)

  • Kim Bo Youn;Jang Kyung Ho;Koo Sang Ok;Jung Soon Ki
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.1_2
    • /
    • pp.137-146
    • /
    • 2006
  • Traditional live video streaming systems support the limited field of view (FOV) of image to the remote users. A server system based on the pan/tilt camera provides a user with wide view by changing the view direction of the camera mechanically. But, when many clients try to access to the server, this system can not offer their own view to every user simultaneously, and moreover it has the delay by camera motion. In order to offer wide views to several users, we propose new streaming system using the panorama image that has wide view. Our system is a kind of implementation of software pan/tilt camera. The server acquires panorama video and sends a part of the video to clients. Then, each client can control their own view. We need the effective way to reduce the average transmission data size and server burden to the compression because generally the full size of panorama video is too big to be served by the real-time streaming. To solve this problem, we propose an strip-based video compression and adaptive transmission of the compressed multiple strip videos. Experimental results show that our system can be adapted quickly to the change of view and the number of clients. Furthermore, proposed method effectively reduce the transmission data.

A Study on the Impacts of Manufacture's Sales Policy of Each Power Source on Sales Will by Agency (제조업체의 파워원천별 영업정책이 대리점의 판매의지에 미치는 영향에 관한 연구)

  • Lee, Han-Il;Park, Jong-Oh
    • Management & Information Systems Review
    • /
    • v.29 no.3
    • /
    • pp.23-50
    • /
    • 2010
  • This study is that the manufacturer's sales policy power appeared on the source of local distributors through the sale willingness impact on research for coexistence between the manufacturer and dealer sales for developing policy. Dealers in terms of the sale of regional sales willingness says "manufacturers and retailers to connect to the regional distribution on the path to regional sales representative for manufacturers based on trust companies that supply products or products manufactured by local retailers for about a unilateral will sale whether the continued willingness and indicates the degree of business". This study topics are the results of this measure will sell a total of 24 entries are four factors. In variety sales policy of each power source, First, sales policy in Reward Power, compensatory power as the manager of promotion support, sales support and sales activities will significantly impact respectively. Second, sales policy of Coercive Power, reduction of credit limits act as an element of discontent and the sales will appear in the negative hypothesis of the influence was partially supported. Third, sales policy in Referent Power, the information trust, the most significantly impact of trade policy, respectively. Fourth, sales policy in Professional Power, delay time delivery of goods, sales of our product and sales knowledge will have a significantly effect appear to be related.

  • PDF