• 제목/요약/키워드: Virtual machine tool

검색결과 107건 처리시간 0.025초

다채널 광정렬 장치에서의 다자유도 회전 스테이지 동작 특성에 관한 연구 (A Study on the Mechanism of Rotational Stage with Multi Degree of Freedom for Multi-Channel Optical Alignment System)

  • 정상화;차경래;김현욱;최석봉;김광호;박준호
    • 한국공작기계학회:학술대회논문집
    • /
    • 한국공작기계학회 2005년도 춘계학술대회 논문집
    • /
    • pp.150-155
    • /
    • 2005
  • In recent years, as the demands of VBNS(Very high speed Backbone Network Service) and VDSL(Very high-data rate Digital Subscriber Line) increase, the development of kernel parts of optical communication such as PLC(Planar Light Circuit), Coupler, WDM elements increase. The alignment and the attachment technology are very important to fabricate the optical elements for communication. In this paper, the mechanism of rotational stage are studied. with the three different method and the results of them are applied to the design of the system. The performance test of resolution and travel is performed.

  • PDF

마이크로 사이즈 인출구경을 이용한 고휘도 이온빔 인출 시스템 개발 (Development of a High Brightness Ion Beam Extraction System using Micro-size Aperture)

  • 김윤재;박동희;정형설;황용석
    • 한국공작기계학회:학술대회논문집
    • /
    • 한국공작기계학회 2005년도 춘계학술대회 논문집
    • /
    • pp.19-23
    • /
    • 2005
  • In order to develop a high brightness ion source using plasma, the ion beam extraction system with an aperture of $100{\mu}m$ in diameter has been designed and constructed. It is observed that over 500nA of He ion beam current can be extracted. With such an optimized condition, $\~10^3\;A/cm^2sr$ beam brightness can be measured by emittance scanner, which is believed to be a promising result for developing next generation FIB.

  • PDF

마이크로 공장을 위한 디지털 생산 시뮬레이션 (Digital Manufacturing Simulation for Micro Factory)

  • 박상호;정영상;송준엽;이승우;김동훈;이수훈;박종권
    • 한국공작기계학회:학술대회논문집
    • /
    • 한국공작기계학회 2005년도 춘계학술대회 논문집
    • /
    • pp.453-457
    • /
    • 2005
  • Existing manufacturing system has consumed too much energy, space and resource in micro parts manufacturing. To improve this, micro factory system is suggested. But it is difficult to get the high reliability in the assembly, production and inspection of the minute parts because the construction of the micro factory has been started just before. In this study, we will build the digital manufacturing simulation on the micro factory's process and verify the production and assembly process using this simulation.

  • PDF

압축강도 평가를 위한 지능형 응력예측기 구축 (Construction of the Intelligence Stress Predictor for Compression Strength Evaluation)

  • 박원규;우영환;이종구;윤인식
    • 한국공작기계학회논문집
    • /
    • 제10권6호
    • /
    • pp.95-101
    • /
    • 2001
  • This work is concerned with construction of the intelligence stress predictor far compression strength evaluation using neural network-ultrasonic waves. The contact pressure in jointed plates was measured by using ultrasonic technique. Neural network is used to evaluate and predict contact pressure from the results of the calibration curves. The organized neural system was leaned with the accuracy of 99%, as a result of learning the ultrasonic echo ratio to the contact pressure measurement between SM45C and STS410 materials. And it could be evaluated and predicted with the accuracy of 90% in the evaluation of ultrasonic echo ratio difference in the same surface roughness and contact pressure, and 85% in the prediction of virtual ultrasonic echo ratio. Thus the proposed stress predictor is very useful for the evaluation and prediction of the contact pressure between SM45C and STS410 materials.

  • PDF

루트킷 탐지 도구(Gibraltar) 성능 향상을 위한 자동화된 커널 메모리 자료 구조 추출에 관한 연구 (A Design and study on automatic extraction of kernel data structure to improve performance of rootkit detection tool, Gibraltar.)

  • 최원하;이하윤;조영필;백윤흥
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.384-387
    • /
    • 2015
  • 하이퍼바이저를 이용한 가상화 검사(Virtual Machine Introspection)의 하나인 Gibraltar[2]는 자동으로 무결성 명세서를 생성할 수 있고, 보안 위협이 높아지고 있는 데이터 영역에 대해서도 방어가 가능하다는 점에 존재하는 어떤 보안 도구보다 효과적인 시스템으로 여겨지고 있다. 본 연구에서는 루트킷 탐지 도구인 Gibraltar를 Linux/ARM 3.14 버전에서 구현하고, 커널 메모리 자료 구조 추출 자동화 툴을 개발함으로써 기존 연구의 문제점을 해결하여 성능을 개선하였다. 이를 바탕으로 향후 Gibraltar 연구의 추가 개선 방향을 제시한다.

CADRAM - Cooperative Agents Dynamic Resource Allocation and Monitoring in Cloud Computing

  • Abdullah, M.;Surputheen, M. Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.95-100
    • /
    • 2022
  • Cloud computing platform is a shared pool of resources and services with various kind of models delivered to the customers through the Internet. The methods include an on-demand dynamically-scalable form charged using a pay-per-use model. The main problem with this model is the allocation of resource in dynamic. In this paper, we have proposed a mechanism to optimize the resource provisioning task by reducing the job completion time while, minimizing the associated cost. We present the Cooperative Agents Dynamic Resource Allocation and Monitoring in Cloud Computing CADRAM system, which includes more than one agent in order to manage and observe resource provided by the service provider while considering the Clients' quality of service (QoS) requirements as defined in the service-level agreement (SLA). Moreover, CADRAM contains a new Virtual Machine (VM) selection algorithm called the Node Failure Discovery (NFD) algorithm. The performance of the CADRAM system is evaluated using the CloudSim tool. The results illustrated that CADRAM system increases resource utilization and decreases power consumption while avoiding SLA violations.

의사결정트리 기반 머신러닝 기법을 적용한 멜트다운 취약점 동적 탐지 메커니즘 (Meltdown Threat Dynamic Detection Mechanism using Decision-Tree based Machine Learning Method)

  • 이재규;이형우
    • 융합정보논문지
    • /
    • 제8권6호
    • /
    • pp.209-215
    • /
    • 2018
  • 본 논문은 동적 샌드박스 도구를 이용하여 최근 급증하고 있는 멜트다운(Meltdown) 악성코드를 사전에 검출 및 차단하는 방법을 제시하였다. 멜트다운 공격 취약점에 대한 패치가 일부 제공되고 있으나 여전히 해당 시스템의 성능 저하 등의 이유로 의도적으로 패치를 적용하지 않는 경우가 많다. 이와 같이 적극적인 패치가 적용되지 않은 인프라를 위해 머신러닝 기법을 이용하여 기존의 시그니처 탐지 방식의 한계를 극복하는 방법을 제시하였다. 우선 멜트다운의 원리를 이해하기 위해 가상 메모리, 메모리 권한 체크, 파이프 라이닝과 추측 실행, CPU 캐시 등 4가지의 운영체제 구동 방식을 분석하고 이를 토대로 멜트다운 악성코드에 리눅스 strace 도구를 활용하여 데이터를 추출하는 메커니즘을 제공하였으며 이를 기반으로 의사 결정 트리 기법을 적용하여 멜트다운 악성코드를 판별하는 메커니즘을 구현하였다.

클라우드 보안성 강화를 위한 연산 효율적인 인스턴스 메모리 모니터링 기술 (Computationally Efficient Instance Memory Monitoring Scheme for a Security-Enhanced Cloud Platform)

  • 최상훈;박기웅
    • 정보보호학회논문지
    • /
    • 제27권4호
    • /
    • pp.775-783
    • /
    • 2017
  • 클라우드 컴퓨팅 기반의 인프라 구축이 활성화됨에 따라, 안전성과 보안성이 강화된 클라우드 구축을 위한 기술이 큰 화두로 인식되고 있다. 이에 대한 방안으로써, 클라우드 사용자 인스턴스의 시스템 보안 강화를 위한 다양한 보안 솔루션이 등장하고 있다. 특히 인스턴스(가상머신)의 메모리 분석을 통한 악성코드 분석 및 탐지에 관한 연구가 활발히 진행되고 있다. 하지만 메모리 분석을 통한 보안 모니터링 기술은 메모리 덤프 시 수반되는 연산 오버헤드로 인해 다수의 인스턴스가 하나의 물리적 서버 노드에서 구동되는 클라우드 플랫폼과 같은 환경으로의 적용에 어려움이 있어왔다. 본 논문에서는 메모리 덤프 시 발생하는 오버헤드를 최소화하기 위해 악성코드 분석 및 탐지에 필요한 인스턴스 메모리의 특정 부분을 모니터링 하는 기술을 제안하고, 부분 메모리 모니터링 기반 악성코드 탐지 시스템을 통해 제안 기술의 실효성을 검증한다.

패션 일러스트레이션에 반영된 포스트휴먼의 신체 표현특징 (The Expressive Characteristics of the Posthuman Body in Fashion Illustration)

  • 최정화
    • 한국의류학회지
    • /
    • 제35권9호
    • /
    • pp.1085-1098
    • /
    • 2011
  • In the $21^{st}$ century, technology is a tool for the expansion of the five senses and physical ability that works as an element for posthuman identity. This study analyzes and theorizes on the characteristics of the posthuman body in fashion illustration. The method of this study analyzes documentaries about posthuman and fashion illustration. The results are as follow. Posthuman body types are classed as hybrid body, plastic surgery body, and digital body. The characteristics of the posthuman body are categorized as ultra- functional prosthetic, mythical undifferentiated, radical plastic surgery type and post-physical digitization type. The ultra-functional prosthetic type shows a restored body and upgraded functional body through a machine hybrid, cyborg suit and mannequin hybrid. It is a break from classical gender identity to form a nerve sense extension that displays physical and abstract power. The mythical undifferentiated type shows a therianthropic form, parts of an animal body, radical skin and gender bending. It represents the return to an undifferentiated world, the desire of a powerful being and the possibility of radical transformation. The radical plastic surgery type shows a photomontage of an ideal body, transgendered body, grotesque body marking, absence of partial or overall face organ and the expansion of abnormal body organs. It represents the expression of narcissism, unconscious desire, fantasy, fear and suggests an alternative ideality, sexual attachment and ambiguous gender identity. The post-physical digitization type shows an imperfect form or duplicated ego image through the omission of the body silhouette or detailed form, fragmented image using net, representative self like optical illusion using typography, an imperfect vague silhouette and immaterial body outline through the use of virtual light. It represents the lack of desire, narcissism, fluidity in a virtual space, the continued creation of a new self, ambiguous gender identity and the liberation of environment, sex, and race. Likewise, the posthuman in fashion illustration shows the absence of a species boundary, destruction of classical gender identity, a new personality and virtual self image.

Classification of HDAC8 Inhibitors and Non-Inhibitors Using Support Vector Machines

  • Cao, Guang Ping;Thangapandian, Sundarapandian;John, Shalini;Lee, Keun-Woo
    • Interdisciplinary Bio Central
    • /
    • 제4권1호
    • /
    • pp.2.1-2.7
    • /
    • 2012
  • Introduction: Histone deacetylases (HDAC) are a class of enzymes that remove acetyl groups from ${\varepsilon}$-N-acetyl lysine amino acids of histone proteins. Their action is opposite to that of histone acetyltransferase that adds acetyl groups to these lysines. Only few HDAC inhibitors are approved and used as anti-cancer therapeutics. Thus, discovery of new and potential HDAC inhibitors are necessary in the effective treatment of cancer. Materials and Methods: This study proposed a method using support vector machine (SVM) to classify HDAC8 inhibitors and non-inhibitors in early-phase virtual compound filtering and screening. The 100 experimentally known HDAC8 inhibitors including 52 inhibitors and 48 non-inhibitors were used in this study. A set of molecular descriptors was calculated for all compounds in the dataset using ADRIANA. Code of Molecular Networks. Different kernel functions available from SVM Tools of free support vector machine software and training and test sets of varying size were used in model generation and validation. Results and Conclusion: The best model obtained using kernel functions has shown 75% of accuracy on test set prediction. The other models have also displayed good prediction over the test set compounds. The results of this study can be used as simple and effective filters in the drug discovery process.