• Title/Summary/Keyword: 동적 정보

Search Result 5,261, Processing Time 0.03 seconds

Core-aware Cache Replacement Policy for Reconfigurable Last Level Cache (재구성 가능한 라스트 레벨 캐쉬 구조를 위한 코어 인지 캐쉬 교체 기법)

  • Son, Dong-Oh;Choi, Hong-Jun;Kim, Jong-Myon;Kim, Cheol-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.1-12
    • /
    • 2013
  • In multi-core processors, Last Level Cache(LLC) can reduce the speed gap between the memory and the core. For this reason, LLC has big impact on the performance of processors. LLC is composed of shared cache and private cache. In computer architecture community, most researchers have mainly focused on the management techniques for shared cache, while management techniques for private cache have not been widely researched. In conventional private LLC, memory is statically assigned to each core, resulting in serious performance degradation when the workloads are not fairly distributed. To overcome this problem, this paper proposes the replacement policy for managing private cache of LLC efficiently. As proposed core-aware cache replacement policy can reconfigure LLC dynamically, hit rate of LLC is increases drastically. Moreover, proposed policy uses 2-bit saturating counters to improve the performance. According to our simulation results, the proposed method can improve hit rates by 9.23% and reduce the access time by 12.85% compared to the conventional method.

Analysis of High School Teachers' ICT literacy and Intention to use (고등학교 교사의 ICT 활용 리터러시와 활용 의도에 관한 분석)

  • Go, Ju Eun;Park, Sung Youl
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.4
    • /
    • pp.591-601
    • /
    • 2021
  • This study focuses on the ICT literacy, the perceived value of ICT utilization, and the perceived use of ICT environment as the factors influencing the activation of ICT using classes, in order to identify how these differences affect intended use of ICT. A total of 3,942 high school teachers participated in the survey. Two factor analyses were conducted to verify and check the validities of measurement items for independent and dependent variables. With the research questions, a multiple regression analysis was implemented to verify the predictive power of the independent variables on the teachers' ICT utilization. All the independent variables set in the research issue had a significant influence on the intended use of ICT, which is a dependent variable. ICT utilization was found as the most influential variables followed by the perceived value of ICT utilization, the affective domain of ICT literacy, and the psychomotor domain of ICT literacy, the cognitive domain of ICT literacy, and the perceived use of ICT environment. In order to enhance teachers' ICT utilization in school settings, teachers should understand the educational value of ICT utilization and recognize its necessity and importance.

Outlier Detection By Clustering-Based Ensemble Model Construction (클러스터링 기반 앙상블 모델 구성을 이용한 이상치 탐지)

  • Park, Cheong Hee;Kim, Taegong;Kim, Jiil;Choi, Semok;Lee, Gyeong-Hoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.11
    • /
    • pp.435-442
    • /
    • 2018
  • Outlier detection means to detect data samples that deviate significantly from the distribution of normal data. Most outlier detection methods calculate an outlier score that indicates the extent to which a data sample is out of normal state and determine it to be an outlier when its outlier score is above a given threshold. However, since the range of an outlier score is different for each data and the outliers exist at a smaller ratio than the normal data, it is very difficult to determine the threshold value for an outlier score. Further, in an actual situation, it is not easy to acquire data including a sufficient amount of outliers available for learning. In this paper, we propose a clustering-based outlier detection method by constructing a model representing a normal data region using only normal data and performing binary classification of outliers and normal data for new data samples. Then, by dividing the given normal data into chunks, and constructing a clustering model for each chunk, we expand it to the ensemble method combining the decision by the models and apply it to the streaming data with dynamic changes. Experimental results using real data and artificial data show high performance of the proposed method.

Health Risk Management using Feature Extraction and Cluster Analysis considering Time Flow (시간흐름을 고려한 특징 추출과 군집 분석을 이용한 헬스 리스크 관리)

  • Kang, Ji-Soo;Chung, Kyungyong;Jung, Hoill
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.99-104
    • /
    • 2021
  • In this paper, we propose health risk management using feature extraction and cluster analysis considering time flow. The proposed method proceeds in three steps. The first is the pre-processing and feature extraction step. It collects user's lifelog using a wearable device, removes incomplete data, errors, noise, and contradictory data, and processes missing values. Then, for feature extraction, important variables are selected through principal component analysis, and data similar to the relationship between the data are classified through correlation coefficient and covariance. In order to analyze the features extracted from the lifelog, dynamic clustering is performed through the K-means algorithm in consideration of the passage of time. The new data is clustered through the similarity distance measurement method based on the increment of the sum of squared errors. Next is to extract information about the cluster by considering the passage of time. Therefore, using the health decision-making system through feature clusters, risks able to managed through factors such as physical characteristics, lifestyle habits, disease status, health care event occurrence risk, and predictability. The performance evaluation compares the proposed method using Precision, Recall, and F-measure with the fuzzy and kernel-based clustering. As a result of the evaluation, the proposed method is excellently evaluated. Therefore, through the proposed method, it is possible to accurately predict and appropriately manage the user's potential health risk by using the similarity with the patient.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

Metamorphic Malware Detection using Subgraph Matching (행위 그래프 기반의 변종 악성코드 탐지)

  • Kwon, Jong-Hoon;Lee, Je-Hyun;Jeong, Hyun-Cheol;Lee, Hee-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.37-47
    • /
    • 2011
  • In the recent years, malicious codes called malware are having shown significant increase due to the code obfuscation to evade detection mechanisms. When the code obfuscation technique is applied to malwares, they can change their instruction sequence and also even their signature. These malwares which have same functionality and different appearance are able to evade signature-based AV products. Thus, AV venders paid large amount of cost to analyze and classify malware for generating the new signature. In this paper, we propose a novel approach for detecting metamorphic malwares. The proposed mechanism first converts malware's API call sequences to call graph through dynamic analysis. After that, the callgraph is converted to semantic signature using 128 abstract nodes. Finally, we extract all subgraphs and analyze how similar two malware's behaviors are through subgraph similarity. To validate proposed mechanism, we use 273 real-world malwares include obfuscated malware and analyze 10,100 comparison results. In the evaluation, all metamorphic malwares are classified correctly, and similar module behaviors among different malwares are also discovered.

Analysis of Control Performance in Gap Size of MR Damper (MR Damper의 Gap Size에 따른 제어성능 분석)

  • Heo, Gwang Hee;Jeon, Seung Gon;Seo, Sang Gu;Kim, Dae Hyeok
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • In this study, the flow path width (Gap Size), which is the flow path of fluid, was selected differently among various factors that determine the Ccontrol Force of MR damper, and the change of Control Force was confirmed accordingly. For this purpose, two MR dampers with a Gap Size of 1.0mm and 1.5mm were fabricated, respectively, and dynamic load experiments were conducted according to changes in applied current and vibration conditions The experimental results showed that the minimum Control Force was 3.2 times higher than 1.5mm in the case of 1.0mm Gap Size, and the maximum Control Force was 2.3 times higher than 1.5mm in the case of 1.0mm Gap Size. In addition, the increased width of the Control Force according to applied current was 34N for Gap Size 1.0mm, and 12.7N for Gap Size 1.5mm. As the gap Size increased, the overall Control Force and the increase in the Control Force by the applied current decreased. Next, the dynamic range, which is a performance evaluation index of the semi-active Control device, was 2.3 on average under 1.0mm condition and 2.8 on average under 1.5mm condition, confirming the possibility of utilization as a semi-active Control device.

Modern Pentathlon's Sports Spirit and A Study on Leader's Ethical Exploration

  • Han, Doryung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.119-126
    • /
    • 2021
  • The modern pentathlon is an exercise in which people and people compete, as well as exercise without equipment, exercise using equipment, and exercise with animals, and it is an exercise that includes static and dynamic exercise. The ethical issues of modern pentathlon athletes are also related to the poor environment and economic reasons, and the athlete's ethical awareness, attitude, and spirit have a great influence on the athlete's mental environment. In this study, the direction of improvement of ethical problems, which are different as important issues in modern sports, was examined, and qualitative research methods were applied to explore the sports spirit and ethics of the modern pentathlon. Correct sports should not deviate from the intended purpose of the exercise or cause or force the athlete to suffer physical or mental pain. In sports, compensatoryism can be a direct cause of improved performance or record-breaking, but sometimes it can also cause distorted athletes. Air doping has ethical issues that can cause controversy over the health or fairness of athletes, mental and physical damage to athletes, and harm. Responsibilities and ethical issues of athletes who take prohibited substances or leaders or supervisors who neglect or encourage them should be treated as very important matters. In the sports field, the reward system that is subordinate to the athlete's or leader's performance is related to the athlete's or leader's livelihood. For a fair and just game progression, it is necessary to break away from the development of athletes who are only focused on performance. The problem of Unethical issues must be overcome by emphasizing the restoration of ethics that are reasonably recognized in ideology and logic.

Emission Rates Estimation by Vehicle Type in Seoul Using the Vehicle Inspection Data (차량 검사 데이터를 활용한 서울시 자동차 유형별 배출 가스량 원단위 산정)

  • Lee, Hyosun;Han, Yohee;Park, Shin Hyoung;Hwang, Ho Hyun;Kim, Youngchan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.177-191
    • /
    • 2021
  • One of the major causes of serious air pollution worldwide is emissions from road transportation. A number of countries are working to reduce vehicle emissions, and the Seoul Metropolitan Government is also implementing active policies to reduce emissions by setting a target of 40% by 2030. Implementing these policies requires the introduction of practical indicators. Most of the domestic emissions are calculated by the emission coefficient, a function of speed at the National Institute of Environmental Research under the Ministry of Environment, but the dynamic variable speed is limited to being used as an indicator of the number of eco-friendly vehicles. Therefore, this study calculated the emission rates in Seoul using the vehicle registration data of Seoul and the vehicle inspection data from the Korea Transportation Safety Authority. The tendency of emissions was determined according to key variables such as vehicle type, fuel and mileage. Emissions were based on carbon monoxide, hydrocarbons, nitrogen oxides and particulate matter measured by vehicle inspection from the Korea Transportation Safety Authority. As a result, the emission rates showed a significant trend according to the model year and mileage. This can be used as a policy indicator to preferentially switch commercial vehicles with old model years and long mileage when switching eco-friendly vehicles in Seoul.