• Title/Summary/Keyword: 가상의

Search Result 12,350, Processing Time 0.043 seconds

A Global Framework for Parallel and Distributed Application with Mobile Objects (이동 객체 기반 병렬 및 분산 응용 수행을 위한 전역 프레임워크)

  • Han, Youn-Hee;Park, Chan-Yeol;Hwang, Chong-Sun;Jeong, Young-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.6
    • /
    • pp.555-568
    • /
    • 2000
  • The World Wide Web has become the largest virtual system that is almost universal in scope. In recent research, it has become effective to utilize idle hosts existing in the World Wide Web for running applications that require a substantial amount of computation. This novel computing paradigm has been referred to as the advent of global computing. In this paper, we implement and propose a mobile object-based global computing framework called Tiger, whose primary goal is to present novel object-oriented programming libraries that support distribution, dispatching, migration of objects and concurrency among computational activities. The programming libraries provide programmers with access, location and migration transparency for distributed and mobile objects. Tiger's second goal is to provide a system supporting requisites for a global computing environment - scalability, resource and location management. The Tiger system and the programming libraries provided allow a programmer to easily develop an objectoriented parallel and distributed application using globally extended computing resources. We also present the improvement in performance gained by conducting the experiment with highly intensive computations such as parallel fractal image processing and genetic-neuro-fuzzy algorithms.

  • PDF

Analysis of Performance Requirement for Large-Scale InfiniBand-based DVSM System (대용량의 InfiniBand 기반 DVSM 시스템 구현을 위한 성능 요구 분석)

  • Cho, Myeong-Jin;Kim, Seon-Wook
    • The KIPS Transactions:PartA
    • /
    • v.14A no.4
    • /
    • pp.215-226
    • /
    • 2007
  • For past years, many distributed virtual shared-memory(DVSM) systems have been studied in order to develop a low-cost shared memory system with a fast interconnection network. But the DVSM needs a lot of data and control communication between distributed processing nodes in order to provide memory consistency in software, and this communication overhead significantly dominates the overall performance. In general, the communication overhead also increases as the number of processing nodes increase, so communication overhead is a very important performance factor for developing a large-scale DVSM system. In this paper, we study the performance scalability quantitatively and qualitatively for developing a large-scale DVSM system based on the next generation interconnection network, called the InfiniBand. Based on the study, we analyze a performance requirement of the next-coming interconnection network to be used for developing a performance-scalable DVSM system in the future.

A Method on Retrieving Personalized Information Based on Mutual Trust in Real and Online World (현실과 가상 세계에서 상호 신뢰도에 기반한 개인화 정보의 식별 방법)

  • Kim, Myeonghun;Kim, Sangwook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.5
    • /
    • pp.257-266
    • /
    • 2017
  • Two remarkable problems of recent online social network are information overflow and information overload. Since the mid-1990s, many researches to overcome these issues have been conducted with information recommender systems and context awareness based personalization techniques, the importance of trust or relationship between users to discover influential information has been increasing as recent online social networks become huge. But almost researches have not regarded trust or relationship in real world while reflecting them in online world. In this paper, we present a novel method how to discover influential and spreadable information that is highly personalized to a user. This valuable information is extracted from an information set that consists of lots of information user missed in the past, and we assumes important information is likely to exist in this set.

An Evaluation System for Learning Concentricity on Distance Education (원격강의의 학습집중도 평가 시스템)

  • Choi Byung-Do;Hyun Chul-Sang;Jung Jin-Uk;Kim Dong-Hak;Kim Wook-Hyun;Kim Chong-Gun
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.181-190
    • /
    • 2005
  • The development of web-based distance education surroundings is steadily achieving. However the studying on the learning effect of learners is still weak against development of educational media itself. At present, most of the distance education system is showing limits in the evaluation of the learning effect because the teaming evaluation depends on mid or final-term exams by on-line or off-line. There is a strong point that the distance education is free from space and time. One of present weak points is limitation of evaluating learner's attitude which can estimate learning effects. Earnest teaming attitude at distance education is important factor for improving the learning effects. In this paper, we propose a model for improving the teaming effects by forcing real-time evaluation and returning feedback to learners at the cyber lectures. The developed experimental system is verified its possibilities.

Design and Implementation of Security System for Wargame Simulation System (워게임 시뮬레이션 시스템을 위한 보안시스템 설계 및 구현)

  • Song Jong Seok;Kim Jin Soo;Shin Moon Sun;Ryu Keun Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.369-378
    • /
    • 2005
  • War simulation system is a virtual space that my tactical simulation exercise is held. The data used in this system are considered sensitive and needs to be protected. But suity vulnerabilities and possible security loopholes were not considered when designing the war game simulation system. So currently the systemis highly vulnerable against hackers and data leakages. This paper proposed a security system for war game simulation system based on considering the currently vulunerabilities and possible suity leakages. The proposed security system supports security patches. In this paper, we analyze vulunerabilities of the running environment of current system and we design and implement the security system that is consisted of three components : Authentication System, Encryption System and Network Security System. The security patches are safe and there are no negative effects on the system's performance. The patches are proved to be effective and very reliable towards solving the security vulnerabilities.

Digital Watermarking using the Channel Coding Technique (채널 코딩 기법을 이용한 디지털 워터마킹)

  • Bae, Chang-Seok;Choi, Jae-Hoon;Seo, Dong-Wan;Choe, Yoon-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3290-3299
    • /
    • 2000
  • Digital watermarking has similar concepts with channel coding thechnique for transferring data with minimizing error in noise environment, since it should be robust to various kinds of data manipulation for protecting copyrights of multimedia data. This paper proposes a digital watermarking technique which is robust to various kinds of data manipulation. Intellectual property rights information is encoded using a convolutional code, and block-interleaving technique is applied to prevent successive loss of encoded data. Encoded intelloctual property rithts informationis embedded using spread spectrum technique which is robust to cata manipulation. In order to reconstruct intellectual property rights information, watermark signalis detected by covariance between watermarked image and pseudo rando noise sequence which is used to einbed watermark. Embedded intellectual property rights information is obtaned by de-interleaving and cecoding previously detected wtermark signal. Experimental results show that block interleaving watermarking technique can detect embedded intellectial property right informationmore correctly against to attacks like Gaussian noise additon, filtering, and JPEG compression than general spread spectrum technique in the same PSNR.

  • PDF

Development of Moving Object Management System for Vehicle Monitoring/Control Management in e-Logistics Environment (e-Logistics 환경에서 차량관제를 위한 이동체 관리 시스템 개발)

  • Kim, Dong-Ho;Lee, Hye-Jin;Lee, Hyun-Ah;Kim, Jin-Suk
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1231-1238
    • /
    • 2004
  • By virtue of the advanced Internet technology, there are lots of research works for e-Logistics which means virtual business activities or service architecture based on the Internet among the logistics companies. Because e-Logistics environment requires more dynamic and global service area, conventional vehicle monitoring and control technologies innate many problems in terms of Integrating, storing and sharing the location data. It needs the development of the moving object technology in order to resolve efficiently the limitations. In this paper, we propose the whole components of the moving object management system which supports the advanced sharing the location information as well as the integration of location data. We are sure the suggested system can be adopted to construct the next generation-logistics vehicle monitoring and control system by reducing the overall cost and time.

Pattern Similarity Retrieval of Data Sequences for Video Retrieval System (비디오 검색 시스템을 위한 데이터 시퀀스 패턴 유사성 검색)

  • Lee Seok-Lyong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.347-356
    • /
    • 2006
  • A video stream can be represented by a sequence of data points in a multidimensional space. In this paper, we introduce a trend vector that approximates values of data points in a sequence and represents the moving trend of points in the sequence, and present a pattern similarity matching method for data sequences using the trend vector. A sequence is partitioned into multiple segments, each of which is represented by a trend vector. The query processing is based on the comparison of these vectors instead of scanning data elements of entire sequences. Using the trend vector, our method is designed to filter out irrelevant sequences from a database and to find similar sequences with respect to a query. We have performed an extensive experiment on synthetic sequences as well as video streams. Experimental results show that the precision of our method is up to 2.1 times higher and the processing time is up to 45% reduced, compared with an existing method.

Design of YK2 Cipher Algorithm for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호 알고리즘 설계)

  • Kang, Young-Ku;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3138-3147
    • /
    • 2000
  • EC(Electronic Commerce) which is cone the virtual space through Internet, has the advantage of time and space. On the contrary, it also has weak point like security probelm because anybody can easily access to the system due to open network attribute of Internet. Theretore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solution is the implemonlation of a strong cipher algorithm. YK2(YoungKu Kang) cipher algorithm proposed in this paper is advantage for the EC security and it overcomes the limit of the current 6/1 bits block cipher algorithm using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is degigned for the increase of time complexity and probability calculation by adapting more complex design for key scheduling regarded as one of the important element effected to enciyption.

  • PDF

High-rate BCI spelling System using eye-closed EEG signals (닫힌 눈(eye-closed) EEG신호를 이용한 높은 비율BCI 맞춤법 시스템)

  • Nguyen, Trung-Hau;Yang, Da-lin;Kim, Jong-Jin;Chung, Wan-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.18 no.2
    • /
    • pp.31-36
    • /
    • 2017
  • This study aims to develop an BCI speller utilizing eye-closed and double-blinking EEG based on asynchronous mechanism. The proposed system comprised a signal processing module and a graphical user interface (virtual keyboard-VK) with 26 English characters plus a special symbol. A detected "eye-closed" event induces the "select" command, whereas a "double-blinking" (DB) event functions the "undo" command. A three-class support vector machine (SVM) classifier involving EEG signal analysis of three groups of events ("eye-open"-idle state, "eye-closed", and "double -blinking") is proposed. The results showed that the proposed BCI could achieve an overall accuracy of 92.6% and a spelling rate of 5 letters/min on average. Overall, this study showed an improvement of accuracy and the spelling rate resulting from in the feasibility and reliability of implementing a real-world BCI speller.

  • PDF