• Title/Summary/Keyword: 인터넷 서비스 분류

Search Result 409, Processing Time 0.028 seconds

Analysis of the Load Balancing Algorithms according to the Request Patterns on the LVS Cluster Systems (LVS 클러스터 시스템의 요구 패턴에 따른 부하 분산 알고리즘 분석)

  • Li, Shan-Hong;Kim, Sung-Ki;Na, Yong-Hee;Min, Byoung-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.151-154
    • /
    • 2002
  • 갈수록 증가하는 인터넷 사용자의 서비스 요구량에 대처하기 위해, 부하 분산 기능을 갖는 클러스터 시스템의 이용이 늘어가고 있다. 본 연구에서는 클라이언트에게 보다 향상된 응답 성능을 제공하기 위해 사용되는 RR(Round Robin), WRR(Weighted Round Robin), LC(Least Connection), WLC(Weighted Least Connection) 부하 분산 알고리즘에 대해서, 클라이언트로부터 인입되는 7 가지 요구 수신 패턴에 따른 부하 분산 응답 특성을 분석하고 그 결과를 논한다. 이를 위해, 실제 시스템의 측정 결과를 토대로 단위 시간 당 인입되는 클라이언트의 요구량 변화를 7 가지 패턴으로 분류하였고, 리눅스 가상 서버(LVS: Linux Virtual Server) 클러스터 시스템을 대상으로 7 가지 요구 패턴에 대한 부하 분산 응답 특성을 얻었다. 본 연구를 통해서 클라이언트 요구랑 변화 패턴에 따른 최적의 부하 분산 알고리즘을 제시할 수 있었다. 본 연구 결과는 향후 효율적인 동적 부하 분산 연구에 좋은 참고가 될 것이다.

  • PDF

The YouTube Video Recommendation Algorithm using Users' Social Category (사용자의 소셜 카테고리를 이용한 유튜브 동영상 추천 알고리즘)

  • Yoo, SoYeop;Jeong, OkRan
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.664-670
    • /
    • 2015
  • With the rapid progression of the Internet and smartphones, YouTube has grown significantly as a social media sharing site and has become popular all around the world. As users share videos through YouTube, social data are created and users look for video recommendations related to their interests. In this paper, we extract users' social category based on their social relationship and social category classification list using YouTube data. We propose the YouTube recommendation algorithm using the extracted users' social category for more accurate and meaningful recommendations. We show experiment results of its validation.

Performance Improvement of Web Browsers for Mobile Phones (저사양 휴대 단말 환경에서 웹브라우저의 성능 개선 방안)

  • Kim, Sang-Heon;Kim, Ji-In;Koh, Seok-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.525-528
    • /
    • 2012
  • 최근 무선 인터넷 서비스의 활성화와 함께 모바일 환경에서 브라우저의 사용이 급증하고 있으며, 모바일 사용자들은 PC 수준의 품질을 요구하고 있다. 이에 따라 모바일 웹브라우저도 WAP 방식이 아닌 풀브라우징(full browsing) 방식으로 전환되고 있다. 하지만, 모바일 단말 환경에서 웹브라우저의 성능에는 많은 제약사항이 존재하며, 부족한 메모리, 저 사양의 CPU, 낮은 네트워크 속도, 그리고 브라우저의 엔진 문제 등으로 인해 여전히 사용자들의 브라우저 로딩에 대한 체감 속도는 낮은 편이다. 본 논문에서는 저사양 휴대 단말 환경에서의 브라우저 로딩 속도를 개선할 수 있는 방안을 제시한다. 제안 방식에서는 텍스트와 이미지 등 데이터 타입을 분류하여 부하가 적게 걸리는 텍스트 레이아웃을 먼저 보여줌으로써 사용자의 체감속도를 향상시키고, 아울러 이미지가 커서 렌더링(rendering) 시간이 오래 걸리는 경우 이미지를 축소하거나 화질을 낮추는 방식으로 렌더링 부하를 줄여서 페이지 로딩 시간을 단축시키는 방법을 사용한다. 실험 결과, 제안 기법을 사용하는 경우 현재 사용하는 방법에 비해 이미지가 적은 Web 페이지의 경우 1st drawing 77.04%, full drawing 5.47%, 이미지가 많은 페이지의 경우 26.32%의 로딩 시간을 단축시킬 수 있음을 확인하였다.

A PMIPv6 Routing Optimization Mechanism using the Routing Table on the MAG (MAG의 라우팅 테이블을 이용한 PMIPv6 라우팅 최적화 기법)

  • Han, Byung-Jin;Lee, Jae-Min;Lee, Jong-Hyouk;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.889-892
    • /
    • 2008
  • 최근 이동 중에도 인터넷을 사용하고자하는 사용자의 요구에 맞추어 노드의 이동성을 제공하기 위한 기술들이 개발되고 있다. 그 중 대표적인 기술이 네트워크 계층에서의 이동성 관리 기법인 Mobile IP 기술이다. Mobile IP 기술은 크게 두 가지 분류로 나눌 수 있다. 하나는 호스트가 직접 핸드오프에 대한 시그널링을 수행하는 호스트 기반 이동성 관리 기술이고, 다른 하나는 네트워크 엔터티가 호스트를 대신하여 호스트의 이동에 따른 시그널링을 수행하는 네트워크 기반 이동성 관리 기술이다. 전자의 대표적인 프로토콜은 Mobile IPv6, Fast Mobile IPv6, Hierarchical Mobile IPv6가 있고, 후자의 대표적인 프로토콜은 Proxy Mobile IPv6 기법이 있다. 그 중, 최근 가장 주목 받고 있는 기술은 Proxy Mobile IPv6이다. 네트워크 기반 이동성 관리라는 개념이 서비스 제공자와 기기 제조사에게 모두 이득을 주는 방식이기 때문이다. 하지만 Proxy Mobile IPv6는 아직 개발 중인 기법이라 최적화에 대한 논의가 끝나지 않았다. 특히 Proxy Mobile IPv6 도메인 내에서의 라우팅 최적화에 대한 논의는 활발하게 이루어지고 있다. 본 논문에서는 Proxy Mobile IPv6의 네트워크 엔터티인 Mobile Access Gateway의 라우팅 테이블을 이용한 라우팅 최적화 기법을 제안한다. 또한 제안한 기법이 가져오는 성능향상과 효과에 대해 분석한다.

Collaborative Tag-based Filtering for Recommender Systems (효과적인 추천 시스템을 위한 협업적 태그 기반의 여과 기법)

  • Yeon, Cheol;Ji, Ae-Ttie;Kim, Heung-Nam;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.157-177
    • /
    • 2008
  • Even in a single day, an enormous amount of content including digital videos, posts, photographs, and wikis are generated on the web. It's getting more difficult to recommend to a user what he/she prefers among these contents because of the difficulty of automatically grasping of content's meanings. CF (Collaborative Filtering) is one of useful methods to recommend proper content to a user under these situations because the filtering process is only based on historical information about whether or not a target user has preferred an item before. Collaborative Tagging is the process that allows many users to annotate content with descriptive tags. Recommendation using tags can partially improve, such as the limitations of CF, the sparsity and cold-start problem. In this research, a CF method with user-created tags is proposed. Collaborative tagging is employed to grasp and filter users' preferences for items. Empirical demonstrations using real dataset from del.icio.us show that our algorithm obtains improved performance, compared with existing works.

  • PDF

A Study of consumer's behavior and classifications by advertising techniques of mobile character (모바일 캐릭터의 광고기법에 따른 타켓별 유형분류와 소비자 반응 연구)

  • 강대인;주효정
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.393-402
    • /
    • 2004
  • The mobile advertisement has varied on lifestyle of people, who live aninformation-oriented society with portable equipment such as web phone and PDA(Personal Digital Assistant). Also, the advertising has expended mobile techniques and its application field unpredictably. The intrinsic characteristic of misdistribution, reach, and convenience in mobile advertisement add up the capacity of a location, information and individualize. This market condition leads the basic audio focused formal mobile advertisement to the new mobile Internet environment with an additional able of data communication. Moreover, the type of SMS (Short Message Service), Graphic, Wep Push, and ridchmedia, which based on music, basic graphic, voice, and letters transfer by mobile terminal and the mobile character is present inevitably correlation with pixel art and animation in 2D(Two Dimensions) techniques. Thus, this research appoints the importance and its role of mobile advertisement that is core of the business marketing in new media era. To activate mobile market, the mobile companies classify the characteristic of consumers with developed commercial use of mobile character and research their behavior to meet optimal mobile character in business.

  • PDF

A Deep Learning Approach with Stacking Architecture to Identify Botnet Traffic

  • Kang, Koohong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.123-132
    • /
    • 2021
  • Malicious activities of Botnets are responsible for huge financial losses to Internet Service Providers, companies, governments and even home users. In this paper, we try to confirm the possibility of detecting botnet traffic by applying the deep learning model Convolutional Neural Network (CNN) using the CTU-13 botnet traffic dataset. In particular, we classify three classes, such as the C&C traffic between bots and C&C servers to detect C&C servers, traffic generated by bots other than C&C communication to detect bots, and normal traffic. Performance metrics were presented by accuracy, precision, recall, and F1 score on classifying both known and unknown botnet traffic. Moreover, we propose a stackable botnet detection system that can load modules for each botnet type considering scalability and operability on the real field.

Proposal of Future News Service - Focusing of Fashion News (미래뉴스 서비스를 위한 사용자 경험조사 - 패션 뉴스를 중심으로)

  • Cho, Hyun-Hee;Lee, Yu-Yeng;Ryoo, Han-Young
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.907-910
    • /
    • 2009
  • With the growth of the internet, news was enlarged from paper to web. News would be going to have a new formality through technical improvement of web. The aim of this study was to needs about the news that would be newly shown with a future growth. News is reputed to be a piece of information which is not known to the general public and coexists in our life. Therefore, news has an its significant in substance when applied to daily-life of the users. This study analyzes based on 16 fields of news-contents. Fashion was a choice for this study after selection of 8 items. Women with an emotional propensity to consume were targeted as an example of the interface of new in the days to come. The user's experience about Fashion news in daily-life was carried out to deduce the elements of design of Fashion news in the days to come. As a result, the needs of user could be classified into classes of interface, flat form.

  • PDF

Big data-based information recommendation system (빅데이터 기반 정보 추천 시스템)

  • Lee, Jong-Chan;Lee, Moon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.443-450
    • /
    • 2018
  • Due to the improvement of quality of life, health care is a main concern of modern people, and the demand for healthcare system is increasing naturally. However, it is difficult to provide customized wellness information suitable for a specific user because there are various medical information on the Internet and it is difficult to estimate the reliability of the information. In this study, we propose a user - centered service that can provide customized service suitable for users rather than simple search function by classifying big data as text mining and providing personalized medical information. We built a big data system and measured the data processing time while increasing the Hadoop slave node for efficient big data analysis. It is confirmed that it is efficient to build big data system than existing system.

A Study on ICS/SCADA System Web Vulnerability (제어시스템의 웹 취약점에 대한 현황과 연구)

  • Kim, Hee-Hyun;Yoo, Jinho
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.15-27
    • /
    • 2019
  • In the past, the control system was a closed network that was not connected to the external network. However, in recent years, many cases have been opened to the outside for the convenience of management. Are connected to the Internet, and the number of operating control systems is increasing. As a result, it is obvious that hackers are able to make various attack attempts targeting the control system due to external open, and they are exposed to various security threats and are targeted for attack. Industrial control systems that are open to the outside have most of the remote management ports for web services or remote management, and the expansion of web services through web programs inherits the common web vulnerability as the control system is no exception. In this study, we classify and compare existing web vulnerability items in order to derive the most commonly tried web hacking attacks against control system from the attacker's point of view. I tried to confirm.