• Title/Summary/Keyword: Virtual machine tool

Search Result 106, Processing Time 0.034 seconds

A Study on the Mechanism of Rotational Stage with Multi Degree of Freedom for Multi-Channel Optical Alignment System (다채널 광정렬 장치에서의 다자유도 회전 스테이지 동작 특성에 관한 연구)

  • Jeong Sanghwa;Cha Kyoungrae;Kim Hyunuk;Choi Sukbong;Kim Kwangho;Park Junho
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2005.05a
    • /
    • pp.150-155
    • /
    • 2005
  • In recent years, as the demands of VBNS(Very high speed Backbone Network Service) and VDSL(Very high-data rate Digital Subscriber Line) increase, the development of kernel parts of optical communication such as PLC(Planar Light Circuit), Coupler, WDM elements increase. The alignment and the attachment technology are very important to fabricate the optical elements for communication. In this paper, the mechanism of rotational stage are studied. with the three different method and the results of them are applied to the design of the system. The performance test of resolution and travel is performed.

  • PDF

Development of a High Brightness Ion Beam Extraction System using Micro-size Aperture (마이크로 사이즈 인출구경을 이용한 고휘도 이온빔 인출 시스템 개발)

  • Kim Yoon-Jae;Park Dong-Hee;Jeong Hyeong-Seol;Hwang Yong-Seok
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2005.05a
    • /
    • pp.19-23
    • /
    • 2005
  • In order to develop a high brightness ion source using plasma, the ion beam extraction system with an aperture of $100{\mu}m$ in diameter has been designed and constructed. It is observed that over 500nA of He ion beam current can be extracted. With such an optimized condition, $\~10^3\;A/cm^2sr$ beam brightness can be measured by emittance scanner, which is believed to be a promising result for developing next generation FIB.

  • PDF

Digital Manufacturing Simulation for Micro Factory (마이크로 공장을 위한 디지털 생산 시뮬레이션)

  • Park Sangho;Jung Young Sang;Song Jun Yeob;Lee Seung Woo;Kim Dong Hoon;Lee Soo Hoon;Park Jong Kweon
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2005.05a
    • /
    • pp.453-457
    • /
    • 2005
  • Existing manufacturing system has consumed too much energy, space and resource in micro parts manufacturing. To improve this, micro factory system is suggested. But it is difficult to get the high reliability in the assembly, production and inspection of the minute parts because the construction of the micro factory has been started just before. In this study, we will build the digital manufacturing simulation on the micro factory's process and verify the production and assembly process using this simulation.

  • PDF

Construction of the Intelligence Stress Predictor for Compression Strength Evaluation (압축강도 평가를 위한 지능형 응력예측기 구축)

  • 박원규;우영환;이종구;윤인식
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.10 no.6
    • /
    • pp.95-101
    • /
    • 2001
  • This work is concerned with construction of the intelligence stress predictor far compression strength evaluation using neural network-ultrasonic waves. The contact pressure in jointed plates was measured by using ultrasonic technique. Neural network is used to evaluate and predict contact pressure from the results of the calibration curves. The organized neural system was leaned with the accuracy of 99%, as a result of learning the ultrasonic echo ratio to the contact pressure measurement between SM45C and STS410 materials. And it could be evaluated and predicted with the accuracy of 90% in the evaluation of ultrasonic echo ratio difference in the same surface roughness and contact pressure, and 85% in the prediction of virtual ultrasonic echo ratio. Thus the proposed stress predictor is very useful for the evaluation and prediction of the contact pressure between SM45C and STS410 materials.

  • PDF

A Design and study on automatic extraction of kernel data structure to improve performance of rootkit detection tool, Gibraltar. (루트킷 탐지 도구(Gibraltar) 성능 향상을 위한 자동화된 커널 메모리 자료 구조 추출에 관한 연구)

  • Choi, Wonha;Yi, Hayoon;Cho, Yeongpil;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.384-387
    • /
    • 2015
  • 하이퍼바이저를 이용한 가상화 검사(Virtual Machine Introspection)의 하나인 Gibraltar[2]는 자동으로 무결성 명세서를 생성할 수 있고, 보안 위협이 높아지고 있는 데이터 영역에 대해서도 방어가 가능하다는 점에 존재하는 어떤 보안 도구보다 효과적인 시스템으로 여겨지고 있다. 본 연구에서는 루트킷 탐지 도구인 Gibraltar를 Linux/ARM 3.14 버전에서 구현하고, 커널 메모리 자료 구조 추출 자동화 툴을 개발함으로써 기존 연구의 문제점을 해결하여 성능을 개선하였다. 이를 바탕으로 향후 Gibraltar 연구의 추가 개선 방향을 제시한다.

CADRAM - Cooperative Agents Dynamic Resource Allocation and Monitoring in Cloud Computing

  • Abdullah, M.;Surputheen, M. Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.95-100
    • /
    • 2022
  • Cloud computing platform is a shared pool of resources and services with various kind of models delivered to the customers through the Internet. The methods include an on-demand dynamically-scalable form charged using a pay-per-use model. The main problem with this model is the allocation of resource in dynamic. In this paper, we have proposed a mechanism to optimize the resource provisioning task by reducing the job completion time while, minimizing the associated cost. We present the Cooperative Agents Dynamic Resource Allocation and Monitoring in Cloud Computing CADRAM system, which includes more than one agent in order to manage and observe resource provided by the service provider while considering the Clients' quality of service (QoS) requirements as defined in the service-level agreement (SLA). Moreover, CADRAM contains a new Virtual Machine (VM) selection algorithm called the Node Failure Discovery (NFD) algorithm. The performance of the CADRAM system is evaluated using the CloudSim tool. The results illustrated that CADRAM system increases resource utilization and decreases power consumption while avoiding SLA violations.

Meltdown Threat Dynamic Detection Mechanism using Decision-Tree based Machine Learning Method (의사결정트리 기반 머신러닝 기법을 적용한 멜트다운 취약점 동적 탐지 메커니즘)

  • Lee, Jae-Kyu;Lee, Hyung-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.209-215
    • /
    • 2018
  • In this paper, we propose a method to detect and block Meltdown malicious code which is increasing rapidly using dynamic sandbox tool. Although some patches are available for the vulnerability of Meltdown attack, patches are not applied intentionally due to the performance degradation of the system. Therefore, we propose a method to overcome the limitation of existing signature detection method by using machine learning method for infrastructures without active patches. First, to understand the principle of meltdown, we analyze operating system driving methods such as virtual memory, memory privilege check, pipelining and guessing execution, and CPU cache. And then, we extracted data by using Linux strace tool for detecting Meltdown malware. Finally, we implemented a decision tree based dynamic detection mechanism to identify the meltdown malicious code efficiently.

Computationally Efficient Instance Memory Monitoring Scheme for a Security-Enhanced Cloud Platform (클라우드 보안성 강화를 위한 연산 효율적인 인스턴스 메모리 모니터링 기술)

  • Choi, Sang-Hoon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.775-783
    • /
    • 2017
  • As interest in cloud computing grows, the number of users using cloud computing services is increasing. However, cloud computing technology has been steadily challenged by security concerns. Therefore, various security breaches are springing up to enhance the system security for cloud services users. In particular, research on detection of malicious VM (Virtual Machine) is actively underway through the introspecting virtual machines on the cloud platform. However, memory analysis technology is not used as a monitoring tool in the environments where multiple virtual machines are run on a single server platform due to obstructive monitoring overhead. As a remedy to the challenging issue, we proposes a computationally efficient instance memory introspection scheme to minimize the overhead that occurs in memory dump and monitor it through a partial memory monitoring based on the well-defined kernel memory map library.

The Expressive Characteristics of the Posthuman Body in Fashion Illustration (패션 일러스트레이션에 반영된 포스트휴먼의 신체 표현특징)

  • Choi, Jung-Hwa
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.35 no.9
    • /
    • pp.1085-1098
    • /
    • 2011
  • In the $21^{st}$ century, technology is a tool for the expansion of the five senses and physical ability that works as an element for posthuman identity. This study analyzes and theorizes on the characteristics of the posthuman body in fashion illustration. The method of this study analyzes documentaries about posthuman and fashion illustration. The results are as follow. Posthuman body types are classed as hybrid body, plastic surgery body, and digital body. The characteristics of the posthuman body are categorized as ultra- functional prosthetic, mythical undifferentiated, radical plastic surgery type and post-physical digitization type. The ultra-functional prosthetic type shows a restored body and upgraded functional body through a machine hybrid, cyborg suit and mannequin hybrid. It is a break from classical gender identity to form a nerve sense extension that displays physical and abstract power. The mythical undifferentiated type shows a therianthropic form, parts of an animal body, radical skin and gender bending. It represents the return to an undifferentiated world, the desire of a powerful being and the possibility of radical transformation. The radical plastic surgery type shows a photomontage of an ideal body, transgendered body, grotesque body marking, absence of partial or overall face organ and the expansion of abnormal body organs. It represents the expression of narcissism, unconscious desire, fantasy, fear and suggests an alternative ideality, sexual attachment and ambiguous gender identity. The post-physical digitization type shows an imperfect form or duplicated ego image through the omission of the body silhouette or detailed form, fragmented image using net, representative self like optical illusion using typography, an imperfect vague silhouette and immaterial body outline through the use of virtual light. It represents the lack of desire, narcissism, fluidity in a virtual space, the continued creation of a new self, ambiguous gender identity and the liberation of environment, sex, and race. Likewise, the posthuman in fashion illustration shows the absence of a species boundary, destruction of classical gender identity, a new personality and virtual self image.

Classification of HDAC8 Inhibitors and Non-Inhibitors Using Support Vector Machines

  • Cao, Guang Ping;Thangapandian, Sundarapandian;John, Shalini;Lee, Keun-Woo
    • Interdisciplinary Bio Central
    • /
    • v.4 no.1
    • /
    • pp.2.1-2.7
    • /
    • 2012
  • Introduction: Histone deacetylases (HDAC) are a class of enzymes that remove acetyl groups from ${\varepsilon}$-N-acetyl lysine amino acids of histone proteins. Their action is opposite to that of histone acetyltransferase that adds acetyl groups to these lysines. Only few HDAC inhibitors are approved and used as anti-cancer therapeutics. Thus, discovery of new and potential HDAC inhibitors are necessary in the effective treatment of cancer. Materials and Methods: This study proposed a method using support vector machine (SVM) to classify HDAC8 inhibitors and non-inhibitors in early-phase virtual compound filtering and screening. The 100 experimentally known HDAC8 inhibitors including 52 inhibitors and 48 non-inhibitors were used in this study. A set of molecular descriptors was calculated for all compounds in the dataset using ADRIANA. Code of Molecular Networks. Different kernel functions available from SVM Tools of free support vector machine software and training and test sets of varying size were used in model generation and validation. Results and Conclusion: The best model obtained using kernel functions has shown 75% of accuracy on test set prediction. The other models have also displayed good prediction over the test set compounds. The results of this study can be used as simple and effective filters in the drug discovery process.