• Title/Summary/Keyword: hybrid cloud

Search Result 111, Processing Time 0.027 seconds

Trends and Analysis of 4G Wireless User Access Networks Issues (4G 무선가입자망 구축 동향 및 고도화 방안)

  • Hwang, Ho-Young;Hong, Jung-Wan;Kim, Seung-Cheon;Roh, Kwang-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.145-158
    • /
    • 2011
  • Recently, the rapidly increased use of smartphone devices provides both opportunity and problems at the same time to the telecom companies in domestic and world wide. It provides a great opportunity to overcome the market stagnation of the existing voice- centric communications, and also problems of building a highly efficient new wireless access networks to accommodate huge volume of data traffic among smart devices. Facing with the age of keen competition, telecom companies have two kinds of strategies for network transition; a strategy of building uniform LTE -based 4G networks as fast as possible, and a hybrid network enhancement strategy compounding 3G and 4G networks using HSP A+, WiFi, cloud computing, etc. It is difficult to predict which strategy will have more successful outcome in the near future. This paper studies the trends and issues of network enhancement policies and transition strategies to the 4G network era, and tries to draw appropriate and efficient ways for network enhancement and operation.

The Detection of Yellow Sand Using MTSAT-1R Infrared bands

  • Ha, Jong-Sung;Kim, Jae-Hwan;Lee, Hyun-Jin
    • Proceedings of the KSRS Conference
    • /
    • v.1
    • /
    • pp.236-238
    • /
    • 2006
  • An algorithm for detection of yellow sand aerosols has been developed with infrared bands from Moderate Resolution Imaging Spectroradiometer (MODIS) and Multi-functional Transport Satellite-1 Replacement (MTSAT-1R) data. The algorithm is the hybrid algorithm that has used two methods combined together. The first method used the differential absorption in brightness temperature difference between $11{\mu}m$ and $12{\mu}m$ (BTD1). The radiation at 11 ${\mu}m$ is absorbed more than at 12 ${\mu}m$ when yellow sand is loaded in the atmosphere, whereas it will be the other way around when cloud is present. The second method uses the brightness temperature difference between $3.7{\mu}m$ and $11{\mu}m$ (BTD2). The technique would be most sensitive to dust loading during the day when the BTD2 is enhanced by reflection of $3.7{\mu}m$ solar radiation. We have applied the three methods to MTSAT-1R for derivation of the yellow sand dust and in conjunction with the Principle Component Analysis (PCA), a form of eigenvector statistical analysis. As produced Principle Component Image (PCI) through the PCA is the correlation between BTD1 and BTD2, errors of about 10% that have a low correlation are eliminated for aerosol detection. For the region of aerosol detection, aerosol index (AI) is produced to the scale of BTD1 and BTD2 values over land and ocean respectively. AI shows better results for yellow sand detection in comparison with the results from individual method. The comparison between AI and OMI aerosol index (AI) shows remarkable good correlations during daytime and relatively good correlations over the land.

  • PDF

Structure Analysis of Li-ion Battery Using Neutron Beam Source (중성자를 이용한 리튬이온 이차전지 전극 구조분석)

  • Kim, Chang-Seob;Park, Heon-Yong;Liang, Lianhua;Kim, Ji-Young;Seong, Baek-Seok;Kim, Keon
    • Journal of the Korean Electrochemical Society
    • /
    • v.10 no.1
    • /
    • pp.20-24
    • /
    • 2007
  • Lithium ion secondary battery has been applied widely to portable devices, and has been studied for application to high power electric cell system such as power tool or hybrid electronic vehicle. The structure change of the electrodes materials occur when lithium ions move between electrodes. Neutron or X-rays can analyze the structure of electrode. The advantage of X-rays is convenient in test. However X-rays is scattered by electron cloud in atoms. Therefore, The elucidation for correct position of lithium is difficult with X-rays because lithium has small atomic weight. Neutron analysis techniques could solve this problem. In this review, We wish to discuss about structure analysis and the principle of structural characterization method using neutron beam source.

Comparison Analysis of Estimation Models of Hourly Horizontal Global Solar Radiation for Busan, Korea (부산지역에 적합한 시간당 수평면 전일사량 산출모델의 비교분석)

  • Kim, Kee Han;Oh, Kie-Whan
    • Journal of the Korean Solar Energy Society
    • /
    • v.33 no.5
    • /
    • pp.9-17
    • /
    • 2013
  • Hourly horizontal global solar radiation has been used as one of significant parameters in a weather file for building energy simulations, which determines the quality of building thermal performance. However, as about twenty two weather stations in Korea have actually measured the horizontal global sola radiation, the weather files collected in other stations requires solar data simulation from the other meteorological parameters. Thus, finding the reliable complicated method that can be used in various weather conditions in Korea is critically important. In this paper, three solar simulation models were selected and evaluated through the reliability test with the simulated hourly horizontal global solar radiation against the actually measured solar data to find the most suitable model for the south east area of Korea. Three selected simulation models were CRM, ZHM, and MRM. The first two models are regression type models using site-fitted coefficients which are derived from the correlation between measured solar data and local meteorological parameters from the previous years, and the last model is a mechanistic type model using the meteorological data to calculate conditions of atmospheric constituents that cause absorption and scattering of the extraterrestrial radiation on the way to the surface on the Earth. The evaluation results show that ZHM is the most reliable model in this area, yet a complicated hybrid simulation methods applying the advantages of each simulation method with the monthly-based weather data is needed.

Performance Evaluation of SSD Cache Based on DM-Cache (DM-Cache를 이용해 구현한 SSD 캐시의 성능 평가)

  • Lee, Jaemyoun;Kang, Kyungtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.409-418
    • /
    • 2014
  • The amount of data located in storage servers has dramatically increased with the growth in cloud and social networking services. Storage systems with very large capacities may suffer from poor reliability and long latency, problems which can be addressed by the use of a hybrid disk, in which mechanical and flash memory storage are combined. The Linux-based SSD(solid-state disk) uses a caching technique based on the DM-cache utility. We assess the limitations of DM-cache by evaluating its performance in diverse environments, and identify problems with the caching policy that it operates in response to various commands. This policy is effective in reducing latency when Linux is running in native mode; but when Linux is installed as a guest operating systems on a virtual machine, the overhead incurred by caching actually reduces performance.

Development of Day Fog Detection Algorithm Based on the Optical and Textural Characteristics Using Himawari-8 Data

  • Han, Ji-Hye;Suh, Myoung-Seok;Kim, So-Hyeong
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.1
    • /
    • pp.117-136
    • /
    • 2019
  • In this study, a hybrid-type of day fog detection algorithm (DFDA) was developed based on the optical and textural characteristics of fog top, using the Himawari-8 /Advanced Himawari Imager data. Supplementary data, such as temperatures of numerical weather prediction model and sea surface temperatures of operational sea surface temperature and sea ice analysis, were used for fog detection. And 10 minutes data from visibility meter from the Korea Meteorological Administration were used for a quantitative verification of the fog detection results. Normalized albedo of fog top was utilized to distinguish between fog and other objects such as clouds, land, and oceans. The normalized local standard deviation of the fog surface and temperature difference between fog top and air temperature were also assessed to separate the fog from low cloud. Initial threshold values (ITVs) for the fog detection elements were selected using hat-shaped threshold values through frequency distribution analysis of fog cases.And the ITVs were optimized through the iteration method in terms of maximization of POD and minimization of FAR. The visual inspection and a quantitative verification using a visibility meter showed that the DFDA successfully detected a wide range of fog. The quantitative verification in both training and verification cases, the average POD (FAR) was 0.75 (0.41) and 0.74 (0.46), respectively. However, sophistication of the threshold values of the detection elements, as well as utilization of other channel data are necessary as the fog detection levels vary for different fog cases(POD: 0.65-0.87, FAR: 0.30-0.53).

Multi-Obfuscation Approach for Preserving Privacy in Smart Transportation

  • Sami S. Albouq;Adnan Ani Sen;Nabile Almoshfi;Mohammad Bin Sedeq;Nour Bahbouth
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.139-145
    • /
    • 2023
  • These days, protecting location privacy has become essential and really challenging, especially protecting it from smart applications and services that rely on Location-Based Services (LBS). As the technology and the services that are based on it are developed, the capability and the experience of the attackers are increased. Therefore, the traditional protection ways cannot be enough and are unable to fully ensure and preserve privacy. Previously, a hybrid approach to privacy has been introduced. It used an obfuscation technique, called Double-Obfuscation Approach (DOA), to improve the privacy level. However, this approach has some weaknesses. The most important ones are the fog nodes that have been overloaded due to the number of communications. It is also unable to prevent the Tracking and Identification attacks in the Mix-Zone technique. For these reasons, this paper introduces a developed and enhanced approach, called Multi-Obfuscation Approach (MOA that mainly depends on the communication between neighboring fog nodes to overcome the drawbacks of the previous approach. As a result, this will increase the resistance to new kinds of attacks and enhance processing. Meanwhile, this approach will increase the level of the users' privacy and their locations protection. To do so, a big enough memory is needed on the users' sides, which already is available these days on their devices. The simulation and the comparison prove that the new approach (MOA) exceeds the DOA in many Standards for privacy protection approaches.

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

A Case Study of the Forecasting Volcanic Ash Dispersion Using Korea Integrated Model-based HYSPLIT (한국형 수치예보모델 기반의 화산재 확산 예측시스템 구축 및 사례검증)

  • Woojeong Lee;Misun Kang;Seungsook Shin;Hyun-Suk Kang
    • Atmosphere
    • /
    • v.34 no.2
    • /
    • pp.217-231
    • /
    • 2024
  • The Korea Integrated Model (KIM)-based real-time volcanic ash dispersion prediction system, which employs the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, has been developed to quantitatively predict volcanic ash dispersion in East Asia and the Northwest Pacific airspace. This system, known as KIM-HYSPLIT, automatically generates forecasts for the vertical and horizontal spread of volcanic ash up to 72 hours. These forecasts are initiated upon the receipt of a Volcanic Ash Advisory (VAA) from the Tokyo Volcanic Ash Advisory Center by the server at the Korea Meteorological Administration (KMA). This system equips KMA forecasters with diverse volcanic ash prediction information, complemented by the Unified Model (UM)-based HYSPLIT (UM-HYSPLIT) system. Extensive experiments have been conducted using KIM-HYSPLIT across 128 different volcanic scenarios, along with qualitative comparisons with UM-HYSPLIT. The results indicate that the ash direction predictions from KIM-HYSPLIT are consistent with those from UM-HYSPLIT. However, there are slight differences in the horizontal extent and movement speed of the volcanic ash. Additionally, quantitative verifications of the KIM-HYSPLIT forecasts have been performed, including threat score evaluations, based on recent eruption cases. On average, the KIMHYSPLIT forecasts for 6 and 12 hours show better quantitative alignment with the VAA forecasts compared to UM-HYSPLIT. Nevertheless, both models tend to predict a broader horizontal spread of the ash cloud than indicated in the VAA forecasts, particularly noticeable in the 6-hour forecast period.

The Posthuman Queer Body in Ghost in the Shell (1995) (<공각기동대>의 현재성과 포스트휴먼 퀴어 연구)

  • Kim, Soo-Yeon
    • Cross-Cultural Studies
    • /
    • v.40
    • /
    • pp.111-131
    • /
    • 2015
  • An unusual success engendering loyalty among cult fans in the United States, Mamoru Oshii's 1995 cyberpunk anime, Ghost in the Shell (GITS) revolves around a female cyborg assassin named Motoko Kusanagi, a.k.a. "the Major." When the news came out last year that Scarlett Johansson was offered 10 million dollars for the role of the Major in the live action remake of GITS, the frustrated fans accused DreamWorks of "whitewashing" the classic Japanimation and turning it into a PG-13 film. While it would be premature to judge a film yet to be released, it appears timely to revisit the core achievement of Oshii's film untranslatable into the Hollywood formula. That is, unlike ultimately heteronormative and humanist sci-fi films produced in Hollywood, such as the Matrix trilogy or Cloud Atlas, GITS defies a Hollywoodization by evoking much bafflement in relation to its queer, posthuman characters and settings. This essay homes in on Major Kusanagi's body in order to update prior criticism from the perspectives of posthumanism and queer theory. If the Major's voluptuous cyborg body has been read as a liberating or as a commodified feminine body, latest critical work of posthumanism and queer theory causes us to move beyond the moralistic binaries of human/non-human and male/female. This deconstruction of binaries leads to a radical rethinking of "reality" and "identity" in an image-saturated, hypermediated age. Viewed from this perspective, Major Kusanagi's body can be better understood less as a reflection of "real" women than as an embodiment of our anxieties on the loss of self and interiority in the SNS-dominated society. As is warned by many posthumanist and queer critics, queer and posthuman components are too often used to reinforce the human. I argue that the Major's hybrid body is neither a mere amalgam of human and machine nor a superficial postmodern blurring of boundaries. Rather, the compelling combination of individuality, animality, and technology embodied in the Major redefines the human as always, already posthuman. This ethical act of revision-its shifting focus from oppressive humanism to a queer coexistence-evinces the lasting power of GITS.