• Title/Summary/Keyword: 지연 공간

Search Result 655, Processing Time 0.024 seconds

P2P-based Regional Matchmaking Techniques for Distributing Redundant-works in Volunteer Computing Environments (자발적 컴퓨팅 환경에서 중복작업 분배를 위한 P2P 기반 지역적 매치메이킹 기법)

  • Cheon, Eun-Young;Kim, Mi-Kyoung;Kuk, Seung-Hak;Kim, Hyeon-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.831-835
    • /
    • 2009
  • Volunteer computing is a computing paradigm in which the operations of a large-scale application are processed using idle resources of Internet-connected computers. The redundant-work distribution techniques used in the volunteer computing environment cause some problems like delay of the work completion time or inefficiency of the work execution due to continuous requests of the work redistribution because the techniques do not consider the characteristics of works and dynamic resources. To cope with such problems this paper suggests a P2P based regional matchmaking technique which can redistribute works in consideration of the characteristics of the works and the participant resources. The techniques consist of the profiles for works/resources, the module for monitoring the available resources spaces, the protocols for the matching request/reply, the module for match-ratio calculation, and so on.

Provisioning Scheme of Large Volume File for Efficient Job Execution in Grid Environment (그리드 환경에서 효율적인 작업 처리를 위한 대용량 파일 프로비저닝 방안)

  • Kim, Eun-Sung;Yeom, Beon-Y.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.525-533
    • /
    • 2009
  • Staging technique is used to provide files for a job in the Grid. If a staged file has large volume, the start time of the job is delayed and the throughput of job in the Grid may decrease. Therefore, removal of staging overhead helps the Grid operate more efficiently. In this paper, we present two methods for efficient file provisioning to clear the overhead. First, we propose RA-RFT, which extends RFT of Globus Toolkit and enables it to utilize RLS with replica information. RA-RFT can reduce file transfer time by doing partial transfer for each replica in parallel. Second, we suggest Remote Link that uses remote I/O instead of file transfer. Remote link is able to save storage of computational nodes and enables fast file provisioning via prefetching. Through various experiments, we argue that our two methods have an advantage over existing staging techniques.

A Study on the Presumption of Proper Construction Cost of Distribution Facilities by Analyzing Actual Construction Cost (실적공사비 분석을 통한 유통시설물의 적정공사비 추정에 관한 연구)

  • Go, Seong-Seok;Kim, Hyun-Sik;Lee, Hyun-Chul
    • Korean Journal of Construction Engineering and Management
    • /
    • v.9 no.3
    • /
    • pp.108-117
    • /
    • 2008
  • The appearance of the large distribution facility of large enterprise putting first reaches get to the various effect until change of leisure life and life pattern of the consumers from the distribution industry of the interior of a country. Competition of the distribution facility upgrade of the distribution facility and it shows the aspect which becomes the semi-department store, and construction cost is appearing different in proportion to each form or scale. Therefore, purpose of this study was to facilitate amicable construction progress between the owner and the builder through estimating the proper construction cost. This study investigated and analyzed the actual cost of 15 domestic distribution facilities and these datums were used to estimate the proper construction cost. This cost shows that from new project accomplishment through analysis of prediction construction cost for feasibility study from initial plan and design step and can be utilizable elementary data bH decision method to whether or not to propriety of distribution facilities business.

A Study on the Establishment Plan for the Cooperative Repository Libraries Based on Regional Central Libraries (지역대표도서관 중심의 공동보존도서관 설립 방안에 관한 연구)

  • Shin, Ji-Yeon;Kim, You-Seung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.3
    • /
    • pp.129-150
    • /
    • 2011
  • The study aims at discussing issues concerning the establishment of the cooperative repository libraries based on regional central libraries which not only support various types of regional libraries and conduct cooperative businesses with them, but also are responsible for collecting and preserving library materials. The study analyzes concepts and types of cooperative repository libraries by literature review and explores cooperative repository libraries in the United States. Futhermore, it conducts a survey and finds that the regional central libraries do not perform their preservation functions, due to the lack of their manpower and budget. As a result, the study provides an establishment plan for cooperative repository libraries which participant libraries hold ownership of transferred materials and regional central libraries own the right of management. Also, it suggests to expand cooperative repository libraries' service coverage from participants to regional communities.

An Efficient Management Model of Security Policy in the Unified Threat Management System (통합 보안 시스템에서의 효율적인 보안 정책 관리 모델)

  • Joo, Heon-Sik;Kim, Jong-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.99-107
    • /
    • 2010
  • This paper showed that the integrated system to fortify security was much more efficient than the respective system through the analysis of problems from Firewall and IPS system in the existing security systems. The results of problem analysis revealed that there were the delay of processing time and lack of efficiency in the existing security systems. Accordingly, their performance was evaluated by using the separated Firewall, IPS system, and the integrated system. The result of evaluation shows that the integrated security system this paper suggested is five times faster than the existing one in terms of processing speed of response. This paper demonstrated the excellence of the proposed security system is also more than fivefold in session handling per second and six times process speeding in the CPU processing performance. In addition, several security policies are applied, and it provided a fact that it gave an excellent performance when it comes to protecting from harmful traffic attacks. In conclusion, this paper emphasized that fortifying the integrated security system was more efficient than fortifying the existing one considering in various respects such as cost, management, time, space and so on.

A Repository Utilization System to optimize maintenance of IIoT-based main point Utilities (IIoT 기반한 핵심유틸리티의 유지보수 최적화를 위한 공동 활용 시스템)

  • Lee, Byung-Ok;Lee, Kun-Woo;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.89-94
    • /
    • 2021
  • Recently, manufacturing companies are introducing many intelligent production processes that apply IIoT/ICT to improve competitiveness, and a system that maintains availability, improves productivity, and optimizes management costs is needed as a preventive measure using environmental data generated from air ejectors. Therefore, in this study, a dedicated control board was developed and LoRa communication module was applied to remotely control it to collect and manage information about compressors from cloud servers and to ensure that all operators and administrators utilize common data in real time. This dramatically reduced M/S steps, increased system operational availability, and reduced local server operational burden. It dramatically reduced maintenance latency by sharing system failure conditions and dramatically improved cost and space problems by providing real-time status detection through wired and mobile utilization by maintenance personnel.

Implementation and Performance Evaluation of Migration Agent for Seamless Virtual Environment System in Grid Computing Network (그리드 컴퓨팅 네트워크에서 Seamless 가상 환경 시스템 구축을 위한 마이그레이션 에이전트 구현 및 성능 평가)

  • Won, Dong Hyun;An, Dong-Un
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.11
    • /
    • pp.269-274
    • /
    • 2018
  • MMORPG is a role-playing game that tens of thousands of people access it online at the same time. Users connect to the server through the game client and play with their own characters. If the user moves to a management area of another server beyond the area managed by the server, the user information must be transmitted to the server to be moved. In an actual game, the user is required to synchronize the established and the transferred information. In this paper, we propose a migration agent server in the virtual systems. We implement a seamless virtual server using the grid method to experiment with seamless server architecture for virtual systems. We propose a method to minimize the delay and equalize the load when the user moves to another server region in the virtual environment. Migration Agent acts as a cache server to reduce response time, the response time was reduced by 50% in the case of 70,000 people.

Multi-group Information Management Techniques to efficiently Protect User Privacy in Heterogeneous Environments of 5G (5G의 이질적인 환경에서 사용자 프라이버시를 효율적으로 보호하기 위한 다중 그룹 정보 관리 기법)

  • Kim, Kyoum-Sun;Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.1-7
    • /
    • 2019
  • With the recent commercialization of the next generation of wireless 5G in everyday life, many changes have been made to organizations, industries and businesses of various sizes in various fields. However, although the improved speed and latency of 5G has improved, improvements in encryption, authentication and privacy are still required. In this paper, multiple groups of information management techniques are proposed to efficiently protect users' privacy in the heterogeneous environment of 5G. The proposed technique aims to allow distributed management of users' privacy links by clouding the privacy information generated by different heterogeneous devices to efficiently interface with different groups. Suggestion techniques process user-specific privacy information independently in a virtual space so that users can periodically synchronize their privacy information.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

A Finite Memory Structure Smoothing Filter and Its Equivalent Relationship with Existing Filters (유한기억구조 스무딩 필터와 기존 필터와의 등가 관계)

  • Kim, Min Hui;Kim, Pyung Soo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.2
    • /
    • pp.53-58
    • /
    • 2021
  • In this paper, an alternative finite memory structure(FMS) smoothing filter is developed for discrete-time state-space model with a control input. To obtain the FMS smoothing filter, unbiasedness will be required beforehand in addition to a performance criteria of minimum variance. The FMS smoothing filter is obtained by directly solving an optimization problem with the unbiasedness constraint using only finite measurements and inputs on the most recent window. The proposed FMS smoothing filter is shown to have intrinsic good properties such as deadbeat and time-invariance. In addition, the proposed FMS smoothing filter is shown to be equivalent to existing FMS filters according to the delay length between the measurement and the availability of its estimate. Finally, to verify intrinsic robustness of the proposed FMS smoothing filter, computer simulations are performed for a temporary model uncertainty. Simulation results show that the proposed FMS smoothing filter can be better than the standard FMS filter and Kalman filter.