• Title/Summary/Keyword: source static

Search Result 417, Processing Time 0.028 seconds

24 Pulse Current Source Inverter For Reducing the Harmonics in Output Currents (출력전류의 고조파 저감을 위한 24펄스 전류형 인버어터)

  • 유철로;이공희;이성룡;한우용
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.41 no.1
    • /
    • pp.24-31
    • /
    • 1992
  • A 24 pulse current source inverter for reducing the harmonics in output currents is presented in this paper. The proposed system operates a 24 pulse inverter by adding only tap changing circuit which consists of several taps and static switching elements to the 12 pulse inverter, which is the double connected 3 phase 6 pulse inverter with an auto transfomer. Also to optimize the effectiveness of the harmonic reduction, the optimum turn ratio and tap changing control angle of auto transfomer are decided by digital simulation and its validity is verified with experiment. And under the optimum condition, it is clarified that the harmonics components involved in the output current of the proposed inverter are nearly equal to those of the conventional 24 pulse inverter.

  • PDF

Transent Thermal Stresses in a Thin Circular Disk due to a Moving Point Source of Heat on a Concentric Circle (원판(圓板)에서 동심원상(同心圓上)을 이동(移動)하는 열원(熱源)에 의(依)한 과도적(過渡的) 열응력해석(熱應力解析))

  • Hyo-Chul,Kim
    • Bulletin of the Society of Naval Architects of Korea
    • /
    • v.12 no.2
    • /
    • pp.13-34
    • /
    • 1975
  • Analytical solutions for the transient temperature distribution and quasi-static thermal stresses which arise in a thin circular disk of finite radius subjected to an instantaneous point source acting in its interior have been obtained. And the solutions have been extended to the case of a moving heat source with the aid of the Duhamel's superposition integral. The solutions given are in the form of double infinite serieses, and their numerical results have been compared with the experimental temperature histories. It can be found out that the theoretical histories of thermal stresses show a good agreement with the experimental results and the theoretical histories of thermal stresses show a good qualitative agreement with a physical phenomena. The solutions can be applied to the problems such as a flame hardening of the cylindrical machine elements and a circular patch welding or a circular cutting of the structural member.

  • PDF

A Proxy Acknowledgement Mechanism for TCP Variants in Mobile Ad Hoc Networks

  • Oo, May Zin;Othman, Mazliza;O'Farrell, Timothy
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.238-245
    • /
    • 2016
  • A sequence number checking technique is proposed to improve the performance of TCP connections in mobile ad hoc networks. While a TCP connection is initialized, a routing protocol takes the responsibility for checking the hop count between a source and destination pair. If the hop count is greater than a predefined value, the routing protocol decides to use a proxy node. The responsibility of a proxy node is to check the correctness of data packets and inform the missing packets by sending an acknowledgement from a proxy node to the source node. By doing so, the source node is able to retransmit any missing packet in advance without waiting until an end-to-end acknowledgement is received from the destination. Simulation results show that the proposed mechanism is able to increase throughput up to 55% in static network and decrease routing overhead up to 95%in mobile network.

Ubiquitous Data Warehosue: Integrating RFID with Mutidimensional Online Analysis (유비쿼터스 데이터 웨어하우스: RFID와 다차원 온라인 분석의 통합)

  • Cho, Dai-Yon;Lee, Seung-Pyo
    • Journal of Information Technology Services
    • /
    • v.4 no.2
    • /
    • pp.61-69
    • /
    • 2005
  • RFID is used for tracking systems in various business fields these days and these systems brought considerable efficiencies and cost savings to companies. Real-time based information acquired through RFID devices could be a valuable source of information for making decisions if it is combined with decision support tools like OLAP of a data warehouse that has originally been designed for analyzing static and historical data. As an effort of extending the data source of a data warehouse, RFID is combined with a data warehouse in this research. And OLAP is designed to analyze the dynamic real-time based information gathered through RFID devices. The implemented prototype shows that ubiquitous computing technology such as RFID could be a valuable data source for a data warehouse and is very useful for making decisions when it is combined with online analysis. The system architecture of such system is suggested.

Traffic Seasonality aware Threshold Adjustment for Effective Source-side DoS Attack Detection

  • Nguyen, Giang-Truong;Nguyen, Van-Quyet;Nguyen, Sinh-Ngoc;Kim, Kyungbaek
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2651-2673
    • /
    • 2019
  • In order to detect Denial of Service (DoS) attacks, victim-side detection methods are used popularly such as static threshold-based method and machine learning-based method. However, as DoS attacking methods become more sophisticated, these methods reveal some natural disadvantages such as the late detection and the difficulty of tracing back attackers. Recently, in order to mitigate these drawbacks, source-side DoS detection methods have been researched. But, the source-side DoS detection methods have limitations if the volume of attack traffic is relatively very small and it is blended into legitimate traffic. Especially, with the subtle attack traffic, DoS detection methods may suffer from high false positive, considering legitimate traffic as attack traffic. In this paper, we propose an effective source-side DoS detection method with traffic seasonality aware adaptive threshold. The threshold of detecting DoS attack is adjusted adaptively to the fluctuated legitimate traffic in order to detect subtle attack traffic. Moreover, by understanding the seasonality of legitimate traffic, the threshold can be updated more carefully even though subtle attack happens and it helps to achieve low false positive. The extensive evaluation with the real traffic logs presents that the proposed method achieves very high detection rate over 90% with low false positive rate down to 5%.

Warning Classification Method Based On Artificial Neural Network Using Topics of Source Code (소스코드 주제를 이용한 인공신경망 기반 경고 분류 방법)

  • Lee, Jung-Been
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.273-280
    • /
    • 2020
  • Automatic Static Analysis Tools help developers to quickly find potential defects in source code with less effort. However, the tools reports a large number of false positive warnings which do not have to fix. In our study, we proposed an artificial neural network-based warning classification method using topic models of source code blocks. We collect revisions for fixing bugs from software change management (SCM) system and extract code blocks modified by developers. In deep learning stage, topic distribution values of the code blocks and the binary data that present the warning removal in the blocks are used as input and target data in an simple artificial neural network, respectively. In our experimental results, our warning classification model based on neural network shows very high performance to predict label of warnings such as true or false positive.

Estimation of Aircraft Stability Derivatives Using a Subsonic-supersonic Panel Method (아음속 초음속 패널법을 이용한 항공기 안정성 미계수 예측)

  • Gong, Hyo-Joon;Lee, Hyung-Ro;Kim, Beom-Soo;Lee, Seung-Soo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.5
    • /
    • pp.385-394
    • /
    • 2012
  • A computer program that can estimate static, dynamic stability and control derivatives using a subsonic-supersonic panel method is developed. The panel method uses subsonic-supersonic source and elementary horse shoe vortex distributions, and their strengths are determined by solving the boundary condition approximated with a thin body assumption. In addition, quasi-steady analysis on the body fixed coordinate system allows the estimation of damping coefficients of aircraft 3 axes. The code is validated by comparing the neutral point, roll and pitch damping of delta wings with published analysis results. Finally, the static, dynamic stability and control derivatives of F-18 are compared with experimental data as well as other numerical results to show the accuracy and the usefulness of the code.

Open Source Software Security Issues and Applying a Secure Coding Scheme (오픈 소스의 소프트웨어 보안 문제 및 시큐어 코딩 적용방안)

  • Kim, Byoungkuk
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.487-491
    • /
    • 2017
  • Open source software allows the users to freely use, copy, distribute and modify source code without any particular limitations, and this offers the advantages of low entry cost, fast and flexible development, compatibility, reliability and safety. The emergence of many useful open source projects has the advantage of achieving high levels of output with lower costs and time commitment for software development. However, this also increases the risks caused by the security vulnerabilities of the used open source software. There is still no separate process to verify security in using open source software. In this paper, we analyze the security weakness in open source and propose a secure coding scheme in adopting open source, which is known to be highly reliable from a security point of view.

Static Control Flow Analysis of Binary Codes (이진 코드의 정적 제어 흐름 분석)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.70-79
    • /
    • 2010
  • We perform static program analysis for the binary code. The reason you want to analyze at the level of binary code, installed on your local computer, run the executable file without source code. And the reason we want to perform static analysis, static program analysis is to understand what actions to perform on your local computer. In this paper, execution flow graph representing information such as the execution order among functions and the flow of control is generated. Using graph, User can find execution flow of binary file and calls of insecure functions at the same time, and the graph should facilitate the analysis of binary files. In addition, program to be run is ensured the safety by providing an automated way to search the flow of execution, and program to be downloaded and installed from outside is determined whether safe before running.

Analytical Study on Software Static/Dynamic Verification Methods for Deriving Enhancement of the Software Reliability Test of Weapon System (무기체계 소프트웨어 신뢰성 시험 개선점 도출을 위한 소프트웨어 정적/동적 검증 분석 사례연구)

  • Park, Jihyun;Choi, Byoungju
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.7
    • /
    • pp.265-274
    • /
    • 2019
  • The reliability test performed when developing the weapon system software is classified into static test and dynamic test. In static test, checking the coding rules, vulnerabilities and source code metric are performed without executing the software. In dynamic test, its functions are verified by executing the actual software based on requirements and the code coverage is measured. The purpose of this static/dynamic test is to find out defects that exist in the software. However, there still exist defects that can't be detected only by the current reliability test on the weapon system software. In this paper, whether defects that may occur in the software can be detected by static test and dynamic test of the current reliability test on the weapon system is analyzed through experiments. As a result, we provide guidance on improving the reliability test of weapon system software, especially the dynamic test.