• Title/Summary/Keyword: 가상의

Search Result 12,366, Processing Time 0.035 seconds

A P2P Multimedia Streaming Protocol Using Multiple-Peer Binding (다중 피어 결합을 이용한 P2P 멀티미디어 스트리밍 프로토콜)

  • Jung Eui-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.253-261
    • /
    • 2006
  • In spite of the popularity of P2P technology, a multimedia streaming using the P2P technology has been neglected. The reason for this is that the P2P multimedia streaming has suffered from several inherent problems especially poor bandwidth and unreliable connection among peers. We suggest a Multi-Peer Binding Protocol (MPBP) in this paper that provides a virtual single channel composed of multiple connections to several peers to ease these problems. The protocol enables applications to download data from multiple peers simultaneously, so they can achieve throughput improvement and reliable streaming. For this, the MPBP splits media files into small chunks and provides a mechanism for identifying and transmitting each chunk. Implemented MPBP engine focuses on handling an abrupt disconnection from data sending peers and the evaluation result shows the MPBP is able to handle it gracefully. The MPBP is also desisted to support various media types. To verify this, video and audio applications are implemented using the MPBP engine in this paper.

  • PDF

A Study on Informediated code for Analyzing Bytecodes (바이트코드 분석을 위한 중간코드에 관한 연구)

  • Kim, Kyung-Soo;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.107-117
    • /
    • 2006
  • Java language creates class files through Java compiler. Class files include informations involved with achievement of program. We can do analysis and optimization for efficient codes by analyzing class files. This paper analyzes bytecodes using informations of Java class files. We translate stack-based Java bytecodes into 3-address codes. Then we translate into static single assignment form using the 3-address codes. Static single assignment form provides a compact representation of a variable's definition-use information. Static single assignment form is often used as an intermediate representation during code optimization. Static sing1e assignment form renames each occurrence of a variable such that each variable is defined only once.

  • PDF

A Non-linear Variant of Global Clustering Using Kernel Methods (커널을 이용한 전역 클러스터링의 비선형화)

  • Heo, Gyeong-Yong;Kim, Seong-Hoon;Woo, Young-Woon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.11-18
    • /
    • 2010
  • Fuzzy c-means (FCM) is a simple but efficient clustering algorithm using the concept of a fuzzy set that has been proved to be useful in many areas. There are, however, several well known problems with FCM, such as sensitivity to initialization, sensitivity to outliers, and limitation to convex clusters. In this paper, global fuzzy c-means (G-FCM) and kernel fuzzy c-means (K-FCM) are combined to form a non-linear variant of G-FCM, called kernel global fuzzy c-means (KG-FCM). G-FCM is a variant of FCM that uses an incremental seed selection method and is effective in alleviating sensitivity to initialization. There are several approaches to reduce the influence of noise and accommodate non-convex clusters, and K-FCM is one of them. K-FCM is used in this paper because it can easily be extended with different kernels. By combining G-FCM and K-FCM, KG-FCM can resolve the shortcomings mentioned above. The usefulness of the proposed method is demonstrated by experiments using artificial and real world data sets.

Acoustic Target Strength Analysis for Underwater Vehicles Covering Near Field Spherical Wave Source Originated Multiple Bounce Effects (근접장 구면파 소스의 다중 반사 효과를 고려한 수중함의 음향표적강도 해석)

  • Cho, Byung-Gu;Hong, Suk-Yoon;Kwon, Hyun-Wung
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.2
    • /
    • pp.196-209
    • /
    • 2010
  • For the analysis of Acoustic Target Strength(TS) that indicates the scattered acoustic intensity from the underwater vehicles, an analysis program that is applicable to scatterers insonified by spherical wave source in near field is developed. In this program, the Physical Optics(PO) method is embedded as a base component. To increase the accuracy of the program, multiple bounce effects based on Geometrical Optics(GO) method are applied. To implement multiple bounce effects, GO method is used together with PO method. In detail, GO method has a concern in the evaluation of the effective area, and PO method is involved in the calculation of Acoustic Target Strength for the final effective area that is evaluated by GO method. For the embodiment of near field spherical wave source originated multiple bounce effects, image source concept is implemented additively to the existing multiple bounce algorithm which assumes plane wave insonification. Various types of models are tested to evaluate the reliability of the developed program and finally, a submarine is analyzed as an arbitrary scatterer.

Study on Training levee Dimension for Reduction of River Mouth Occlusion (하구폐색저감을 위한 도류제 제원에 관한 연구)

  • Choi, Chang Jin;Choo, Yean Moon;Kim, Sung Bum;Jee, Hong Kee
    • Journal of Wetlands Research
    • /
    • v.16 no.1
    • /
    • pp.139-151
    • /
    • 2014
  • In this study, virtual confluence of $30^{\circ}$, $45^{\circ}$, $60^{\circ}$, $75^{\circ}$ type flowing into main channel was designed to comprehend occlusion phenomenon of the mouth of river, then performed numerical analysis using the RMA-2 and SED2D model of SMS according to application of 40m, 60m, 80m, 100m Training levee corresponding to main channel width ratio. Results of simulations analysis are summarized as follows. Applying appropriate Training levee length determined by numerical analysis results, Training levee dimension for occlusion reduction was studied through the analysis of velocity, water level, bed variation at the Gamchen confluence and Wichen confluence.

A Theoretical Review on the Intangible Assets Valuation Techniques of Income Approach (무형자산평가에 관한 이론적 고찰 - 소득접근법의 평가기법을 중심으로 -)

  • Ahn, Jeong-Keun
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.1
    • /
    • pp.207-224
    • /
    • 2015
  • The purpose of this study is to review the various valuation techniques of intangible assets. The value of intangible asset by the income approach can be measured as the present value of the economic benefit over the intangible asset's remaining useful life. The typical methods used in intangible asset economic income projections include extrapolation method, life cycle analyses, sensitivity analyses, simulation analyses, judgment method, and tabula rasa method. There are several methods available for estimating capitalization rates and discount rates for intangible asset, in which we have discussed market extraction method, capital asset pricing model, built-up method, discounted cash flow model, and weighted average cost of capital method. As the capitalization methods for intangible asset, relief-from-royalty method, excess earnings capitalization method, profit split method, residual from business enterprise method, postulated loss of income method and so on have been reviewed.

A Multistriped Checkpointing Scheme for the Fault-tolerant Cluster Computers (다중 분할된 구조를 가지는 클러스터 검사점 저장 기법)

  • Chang, Yun-Seok
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.607-614
    • /
    • 2006
  • The checkpointing schemes should reduce the process delay through managing the checkpoints of each node to fit the network load to enhance the performance of the process running on the cluster system that write the checkpoints into its global stable storage. For this reason, a cluster system with single IO space on a distributed RAID chooses a suitable checkpointng scheme to get the maximum IO performance and the best rollback recovery efficiency. In this paper, we improved the striped checkpointing scheme with dynamic stripe group size by adapting to the network bandwidth variation at the point of checkpointing. To analyze the performance of the multi striped checkpointing scheme, we applied Linpack HPC benchmark with MPI on our own cluster system with maximum 512 virtual nodes. The benchmark results showed that the multistriped checkpointing scheme has better performance than the striped checkpointing scheme on the checkpoint writing efficiency and rollback recovery at heavy system load.

Three-Dimensional GSIS for Determination of Optimal Route (3차원 GSIS를 이용한 최적노선 선정)

  • Kang, In-Joon;Choi, Hyun;Park, Hun-Shik
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.11 no.1 s.24
    • /
    • pp.71-75
    • /
    • 2003
  • The highway is greatly changed by the constant economic growth for a long times the traffic situation such as the large volumes and the performance vehicles, the performance enlargement of vehicles, the high speedization, etc., due to growth economic. A study of an optimal route selection model is researched over late 1980s by development of computer and GSIS, and consisted including research about the optimal route that uses digital terrain model in domestic such as the earth volume calculations, the mass curve output and the automation system construction. Lately, the study of the driving simulation of the highway and the virtual reality using VGIS(Virtual Geographic Information System) is researched. This study shows when the alternative highway selection considered surrounding facilities, development plan and according to estimate amount of traffic and the additional possibility of view analysis and environment effect analysis element will study through 3D simulation method.

  • PDF

Simulator for Management of Tracking Information of Digital Content (콘텐츠추적정보 관리 시뮬레이터)

  • Lee, Seung-Won;Choi, Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.48-55
    • /
    • 2012
  • The number of digital content used in mobile devices such as smartphones or tablet PCs has been rapidly increasing along with the development of IT industry. At the same time, studies on digital content management are actively conducted. One of the previous studies defined CTI(Content Tracking Information) for efficient management of the information on digital content usage between mobile devices in an area in which the internet is inaccessible, and suggested ways to deal with CTI management, reduction of the overhead and a technique of collecting as many CTIs as possible within a short time. This paper presents the design and implementation of a simulator capable of verifying the logic and the performance of the CTI management method. This tool simulates a mobile environment where devices move around in the internet inaccessible area and propagates digital contents each other. It shows several advantages including the efficient synchronization of CTI management and overhead reduction.

Analysis on the Types of Future Keywords and IT Needs by Industry (미래 IT니즈 유형 도출과 산업별 IT니즈 분석)

  • Kim, You-Jin;Cho, Byung-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.100-110
    • /
    • 2012
  • This study aims to figure out IT needs internalized in our daily lives through expert FGI, examine the general characteristics of them by verifying and classifying them through a survey, and also analyze the chief fields of industry for future society by the types of IT needs. Through this analysis, the paper suggests the directivity of future IT technology, and it can be utilized as foundational data to develop IT convergence technology. First of all, according to the result of drawing the keywords through the concrete future IT needs by the detailed activities through the FGI, this study found intellectualization, integration, virtualization, automation, customization, and safety, etc. According to the result of classifying the IT needs through the survey based on that and examining the characteristics, this study classified them into emphasis on life automation, emphasis on intellectual authenticity, emphasis on information search and convenience, and emphasis on convergence. And each type showed different general characteristics from one another. And in future society, the area of energy was valued the most, and the importance of industry showed somewhat difference by the types of IT needs.