• Title/Summary/Keyword: Desktop method

Search Result 134, Processing Time 0.033 seconds

Comparison of age of air and air change effectiveness between supply diffuser types (공조취출방식에 따른 공기의 나이 및 환기효율 비교)

  • Cho, D.W.
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.11 no.1
    • /
    • pp.117-124
    • /
    • 1999
  • In this study, three different supply diffuser types(desktop, floor and ceiling) are compared in view of their ability to distribute supply air to the workstation breathing zone. The measurements on the age of air and the air change effectiveness using the tracer gas method are carried out to analyze the ventilation performance for provision of fresh air between the diffusers. The desktop diffuser type could deliver air directly to the occupants breathing zone with a high degree of effectiveness. The measured local air change effectiveness of the desktop diffuser in the breathing zone was usually 1.13 to 1.23 times greater than that of ceiling and floor diffusers. When the minimum outside air change rate as specified using ASHRAE Standard 62R is supplied with a desktop diffuser type, the volume of outside air can be reduced 13 to 23%, resulting in a commensurate in ventilation energy use.

  • PDF

Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy (Cloud HSM와 edge-DRM Proxy를 활용한 안전한 원격근무 환경 강화 연구)

  • Kim, Hyunwoo;Lee, Junhyeok;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.25-30
    • /
    • 2021
  • Due to the current COVID-19 pandemic, companies and institutions are introducing virtual desktop technology, one of the logical network separation technologies, to establish a safe working environment in a situation where remote work is provided. With the introduction of virtual desktop technology, companies and institutions can operate the network separation environment more safely and effectively, and can access the business network quickly and safely to increase work efficiency and productivity. However, when introducing virtual desktop technology, there is a cost problem of high-spec server, storage, and license, and it is necessary to supplement in terms of operation and management. As a countermeasure to this, companies and institutions are shifting to cloud computing-based technology, virtual desktop service (DaaS, Desktop as a Service). However, in the virtual desktop service, which is a cloud computing-based technology, the shared responsibility model is responsible for user access control and data security. In this paper, based on the shared responsibility model in the virtual desktop service environment, we propose a cloud-based hardware security module (Cloud HSM) and edge-DRM proxy as an improvement method for user access control and data security.

Client Rendering Method for Desktop Virtualization Services

  • Jang, Su Min;Choi, Won Hyuk;Kim, Won Young
    • ETRI Journal
    • /
    • v.35 no.2
    • /
    • pp.348-351
    • /
    • 2013
  • Cloud computing has recently become a significant technology trend in the IT field. Among the related technologies, desktop virtualization has been applied to various commercial applications since it provides many advantages, such as lower maintenance and operation costs and higher utilization. However, the existing solutions offer a very limited performance for 3D graphics applications. Therefore, we propose a novel method in which rendering commands are not executed at the host server but rather are delivered to the client through the network and are executed by the client's graphics device. This method prominently reduces server overhead and makes it possible to provide a stable service at low cost. The results of various experiments prove that the proposed method outperforms all existing solutions.

An Efficient Scheduling Method Taking into Account Resource Usage Patterns on Desktop Grids (데스크탑 그리드에서 자원 사용 경향성을 고려한 효율적인 스케줄링 기법)

  • Hyun Ju-Ho;Lee Sung-Gu;Kim Sang-Cheol;Lee Min-Gu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.7
    • /
    • pp.429-439
    • /
    • 2006
  • A desktop grid, which is a computing grid composed of idle computing resources in a large network of desktop computers, is a promising platform for compute-intensive distributed computing applications. However, due to reliability and unpredictability of computing resources, effective scheduling of parallel computing applications on such a platform is a difficult problem. This paper proposes a new scheduling method aimed at reducing the total execution time of a parallel application on a desktop grid. The proposed method is based on utilizing the histories of execution behavior of individual computing nodes in the scheduling algorithm. In order to test out the feasibility of this idea, execution trace data were collected from a set of 40 desktop workstations over a period of seven weeks. Then, based on this data, the execution of several representative parallel applications were simulated using trace-driven simulation. The simulation results showed that the proposed method improves the execution time of the target applications significantly when compared to previous desktop grid scheduling methods. In addition, there were fewer instances of application suspension and failure.

Analyses and Considerations for Data base Security Requirements for Desktop Virtualization (데스크톱 가상화를 위한 데이터 보안 요구 사항 분석 및 고찰)

  • Wu, Daming;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.634-636
    • /
    • 2015
  • As the expansion of enterprise scale and the increase of staff, the amount of terminal is increasing as well. It is very difficult to the system manager of traditional data protection scheme to manage and maintenance for the large number of terminals. This problem can be solved by desktop virtualization, which use traditional security problems still exist and new security problems occur at the same time. Using desktop virtualization, it needs a method of automatic security protection. In this paper, the desktop virtualization security requirements are discussed.

Analysis on the Age of Air and the Air Change Effectiveness of the Personal Environmental Module System in Intelligent Buildings

  • Cho, Dongwoo
    • Architectural research
    • /
    • v.1 no.1
    • /
    • pp.47-53
    • /
    • 1999
  • An interesting of desktop air-conditioning system is the Personal Environmental Module(PEM) System. The PEM system allows the occupant to choose the desired temperature, air volume and direction of the discharged air. In this study, the measurements on the age of air and the air change effectiveness, using the tracer gas method, are carried out to analyze the ventilation performance for provision of fresh air near the breathing zone by the PEM. The relations between the PEM for optimal control and other factors related to indoor air quality, and the ventilation for the PEM are examined. Also, three different supply diffuser types(desktop, floor and ceiling) are compared in view of their ability to distribute supply air to the workstation breathing zone. The desktop diffuser type could deliver air directly to the occupants breathing zone with a high degree of effectiveness. The minimum local age of air was measured in the breathing zone, which is directly supplied with air from the PEM diffusers, and the measured local air change effectiveness of the desktop diffuser in the breathing zone was about 1.13 to 1.23 times greater than that of the ceiling and floor diffusers. When the minimum outside air change rate as specified using ASHRAE Standard 62R is supplied with a desktop diffuser type, the volume of outside air can be reduced 13 to 23%, resulting in a commensurate in ventilation energy use.

  • PDF

Structural Optimal Design of the Frame of a Desktop Servo Pressing Machine (탁상용 압입기 프레임의 구조최적설계)

  • Lee, Boo-Youn;Jung, Jin-Uk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.7
    • /
    • pp.3142-3150
    • /
    • 2013
  • Present research deals with an optimal design of the C-type frame of a desktop pressing machine to minimize its deformation which plays an important role in accuracy of the machine. Deformation pattern of the frame is analyzed by the finite element method. Design parameters are defined for the frame to derive an optimal design. Displacement and weight sensitivities of the parameters are analyzed using the method of the parametric study. On the basis of the response curves for the parameters, optimal designs of the frame are proposed. Effectiveness of the optimal design is verified by analyses in the viewpoint of the deformation and weight of the frame. Deformation of the optimized frame without increase of the weight is 87.5 % of the original frame.

The Applicability Assessment of Environmental Flows Method by Hydrological Approach (수문학적 접근법에 의한 환경유량 산정기법의 적용성 평가)

  • Kim, Joo Cheol;Choi, Yong Joon
    • Journal of Korean Society on Water Environment
    • /
    • v.26 no.2
    • /
    • pp.208-214
    • /
    • 2010
  • This study aimed at the introduction of desktop method for assessment of environmental flows developed by International Water Management Institute (IWMI) recently and its application to Geum river basin. This scheme simulated the influence on aquatic ecosystem caused by watershed development and in turn the decrease of water quantity keeping the river's own flow regime. It was found to be as very effective method although it had simple structure. Flow duration curves for different environmental classes at Sutong and Gongjoo sites were estimated according to the natural conditional scenario of Geum river basin and the results were relatively compared well with the previous studies. The behaviors of monthly average runoff time series of both sites showed the level of A class. The results of this study would provide the fundamental data to establish the future plans of monitoring or management for aquatic ecosystem of Geum river basin.

Approximation Method of Environmental Flows based on Flow Duration Curves (유황곡선을 기반으로 한 환경유량의 개략산정법)

  • Kim, Joo-Cheol;Lee, Sang-Jin;Ko, Ick-Hwan;Woo, Dong-Hyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.933-937
    • /
    • 2010
  • This study aimed at the introduction of desktop method for assessment of environmental flows developed by IWMI(International Water Management Institute) recently and its application to Geum river basin. This scheme simulated the influence on aquatic ecosystem caused by watershed development and in turn the decrease of water quantity keeping the river's own flow regime. It was found to be as very effective method although it had simple structure. Flow duration curves for different environmental classes at Sutong and Gongjoo sites were estimated according to the natural conditional scenario of Geum river basin and the results were relatively compared well with the previous studies. The behaviors of monthly average runoff time series of both sites showed the level of A class. The results of this study would provide the fundamental data to establish the future plans of monitoring or management for aquatic ecosystem of Geum river basin.

  • PDF

A Study on Image Acquisition and Usage Trace Analysis of Stick-PC (Stick-PC의 이미지 수집 및 사용흔적 분석에 대한 연구)

  • Lee, Han Hyoung;Bang, Seung Gyu;Baek, Hyun Woo;Jeong, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.307-314
    • /
    • 2017
  • Stick-PC is small and portable, So it can be used like a desktop if you connect it to a display device such as a monitor or TV anytime and anywhere. Accordingly, Stick-PC can related to various crimes, and various evidence may remain. Stick-PC uses the same Windows version of the operating system as the regular Desktop, the artifacts to be analyzed are the same. However, unlike the Desktop, it can be used as a meaningful information for forensic investigation if it is possible to identify the actual user and trace the usage by finding the traces of peripheral devices before analyzing the system due to the mobility. In this paper, We presents a method of collecting images using Bootable OS, which is one of the image collection methods of Stick-PC. In addition, we show how to analyze the trace of peripheral connection and network connection trace such as Display, Bluetooth through the registry and event log, and suggest the application method from the forensic point of view through experimental scenario.