• Title/Summary/Keyword: 파일 입출력

Search Result 140, Processing Time 0.028 seconds

A Zigbee Profile based Management Protocol (Zigbee Profile기반 관리 프로토콜)

  • Kim, Gangseok;Song, Wang-Cheol
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.965-967
    • /
    • 2009
  • 정보통신 기술의 발전과 사용자들의 다양한 요구들을 충족시키기 위해 유비쿼터스 환경을 기반으로 하는 응용서비스들에 대한 연구가 활발히 연구되고 있다. 이러한 응용들에 사용될 디바이스들에 대한 서비스규격이 표준화되지 않아 상호 호환성을 저해하고 있다. 본 논문에서는 프로토콜 구조가 전혀 다른 무선 센서 네트워크와 외부 네트워크와의 메시지 변환을 위해 또한 이질적인 지그비 디바이스들의 상호 호환성을 높이고 메시지 변환 게이트웨이와 외부네트워크 사이의 관리, 제어, 데이터 입출력의 일관성을 위해 제안하는 프로토콜을 Zigbee Alliance의 지그비 디바이스 프로파일 기반 관리 프로토콜을 제안한다.

Video Summarization with ChatGPT (ChatGPT 를 활용한 영상 요약 모델에 관한 연구)

  • Wonho Lee;Jungyu Kang;Nayoung Seong;Suhyeon Cho ;Youngjong Kim
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.694-695
    • /
    • 2023
  • 최근 ChatGPT 를 각 분야에 활용하는 연구가 활발하게 이루어지고 있다. ChatGPT 는 최신 자연어 처리 모델로, 텍스트를 통해 입출력을 진행한다. 본 논문에서는 이러한 ChatGPT 를 활용하여 영상을 효과적으로 요약할 수 있는 새로운 접근 방식을 제시한다. STT 기술을 사용하여 영상의 자막에 대한 텍스트 파일을 추출하고 이를 ChatGPT 로 요약한다. 최종적으로 기존 텍스트와의 유사도 분석을 통해 유사도가 높은 부분을 선택하여 영상을 편집하고 요약한다.

Design and Implementation of Interface between the Database and the Application Program (데이터베이스와 응용프로그램 사이의 인터페이스 설계 및 구현)

  • Jung, In-Sook;Lee, Chang-Sup;Cho, Chung-Ho
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.34 no.4
    • /
    • pp.139-147
    • /
    • 1997
  • Most of the existing applications developed undter the DOS environment exchange information with the exterior world through reading and writing files in ASCII format. A package program consisting of numerous modules has to exchange data not only between module program and the input/output files but also between module themselves, and hence information exchange via ASCII file is increasingly inefficient and less accurate as the number of modules increases. The present paper describes the design and the implementation of the interface between the module program and the database which stores all the information necessary for the execution of the application. The interface program is then applied to the existing Propeller Design and Analysis System to show that the interface functions smoothly. The development is performed on the personal computer operating under Windows 95 rather than the workstation under Unix operating system to prove that the design and analysis work can be carried out without limit in time and space.

  • PDF

A study on the Conformity of Jaso-Type Code and Optimum Font Code Based On Hunminjeongeum Principle (훈민정음 원리에 기반한 자소형 코드와 최적 폰트 코드의 일치성에 관한 연구)

  • Kim, Kyoungwook;Byun, Jeongyong
    • Annual Conference on Human and Language Technology
    • /
    • 2009.10a
    • /
    • pp.77-80
    • /
    • 2009
  • 훈민정음 창제당시의 모든 한글 음절인 약 399억 음절을 표현하기 위해서 자소형 코드만을 입력하여 이를 조합 음절 형태로 구성하고, 최적 폰트 코드를 출력함으로써 모든 한글을 표현할 수 있었다. 하지만, 이러한 최적 폰트 코드는 모든 한글을 표현하는 데에만 치중하였지만, 키보드로부터 입력되는 자소형 코드와 화면에 음절을 구성하며 출력되는 폰트 코드의 일치하지 않는 문제점이 발생하였다. 이를 해결하기 위해서 본 연구에서는 실험을 통하여 입력된 자소형 코드를 파일입출력을 이용하여 파일로 저장 후 이를 본 연구에서의 옛한글 입력기의 폰트 변환 모듈을 사용하여 음절을 표현하여, 자소형 코드와 폰트 코드와의 일치함을 보이고자 한다.

  • PDF

Shadow Recovery for Column-based Databases (컬럼-기반 데이터베이스를 위한 그림자 복구)

  • Byun, Si-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2784-2790
    • /
    • 2015
  • The column-oriented database storage is a very advanced model for large-volume data transactions because of its superior I/O performance. Traditional data storages exploit row-oriented storage where the attributes of a record are placed contiguously in hard disk for fast write operations. However, for search-mostly data warehouse systems, column-oriented storage has become a more proper model because of its superior read performance. Recently, solid state drive using flash memory is largely recognized as the preferred storage media for high-speed data analysis systems. In this research, we propose a new transaction recovery scheme for a column-oriented database environment which is based on a flash media file system. We improved traditional shadow paging schemes by reusing old data pages which are supposed to be invalidated in the course of writing a new data page in the flash file system environment. In order to reuse these data pages, we exploit reused shadow list structure in our column-oriented shadow recovery(CoSR) scheme. CoSR scheme minimizes the additional storage overhead for keeping shadow pages and minimizes the I/O performance degradation caused by column data compression of traditional recovery schemes. Based on the results of the performance evaluation, we conclude that CoSR outperforms the traditional schemes by 17%.

I/O Performance Analysis about Memory Allocation of the UBIFS (UBIFS 메모리 할당에 관한 I/O 성능 분석)

  • Lee, Jaekang;Oh, Sejin;Chung, Kyungho;Yun, Taejin;Ahn, Kwangseon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.4
    • /
    • pp.9-18
    • /
    • 2013
  • Flash memory is mostly used on smart devices and embedded systems because of its nonvolatile memory, low power, quick I/O, resistant shock, and other benefits. Generally the typical file systems base on the NAND flash memory are YAFFS2, JFFS2, UBIFS, and etc. In this paper, we had variously made an experiment regarding I/O performance using our schemes and the UBIFS of the latest Linux Kernel. The proposed I/O performance analyses were classified as a sequential access and a random access. Our experiment consists of 6 cases using kmalloc(), vmalloc(), and kmem_cache(). As a result of our experiment analyses, the sequential reading and the sequential rewriting increased by 12%, 11% when the Case 2 has applied vmalloc() and kmalloc() to the UBI subsystem and the UBIFS. Also, the performance improved more by 7.82%, 6.90% than the Case 1 at the random read and the random write.

Design and Implementation of Transactional Write Buffer Cache with Storage Class Memory (트랜잭션 단위 쓰기를 보장하는 스토리지 클래스 메모리 쓰기 버퍼캐시의 설계 및 구현)

  • Kim, Young-Jin;Doh, In-Hwan;Kim, Eun-Sam;Choi, Jong-Moo;Lee, Dong-Hee;Noh, Sam-H.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.247-251
    • /
    • 2010
  • Using SCM in storage systems introduce new potentials for improving I/O performance and reliability. In this paper, we study the use of SCM as a buffer cache that guarantees transactional unit writes. Our proposed method can improve storage system reliability and performance at the same time and can recover the storage system immediately upon a system crash. The Proposed method is based on the LINUX JBD(Journaling Block Device), thus reliability is equivalent to JBD. In our experiments, the file system that adopts our method shows better I/O performance even while guaranteeing high reliability and shows fast file system recovery time (about 0.2 seconds).

Development strategy for an information exchange subsystem as a part of Construction Project Lifecycle Management System(CPLMS) (건설 프로젝트 생애주기 관리를 위한 정보교환 서브시스템 개발방안)

  • You, Seok-Joon
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.77-82
    • /
    • 2007
  • This paper discusses on implementation methods for providing data exchange capability of the Construction Project Lifecycle Management System (CPLM). Because most information media currently used in the construction industry are computer files, the system must be capable of handling various file types; however, The goals of PLM cannot be achieved if the contents of the files are communicated freely, which can only be achieved using a standardized information model that has comprehensive coverage of all information produced within the projects (i.e., a BlM). Several methods of adopting the model are investigated here, and a transitional implementation method for K-IFC is suggested, in which a file-based exchange backed by the BlM can evolve into object-level transactions of the BIM with not only advanced data integrity and security, but also improved communications between the project participants.

  • PDF

A File System for User Special Functions using Speed-based Prefetch in Embedded Multimedia Systems (임베디드 멀티미디어 재생기에서 속도기반 미리읽기를 이용한 사용자기능 지원 파일시스템)

  • Choe, Tae-Young;Yoon, Hyeon-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.625-635
    • /
    • 2008
  • Portable multimedia players have some different properties compared to general multimedia file server. Some of those properties are single user ownership, relatively low hardware performance, I/O burst by user special functions, and short software development cycles. Though suitable for processing multiple user requests at a time, the general multimedia file systems are not efficient for special user functions such as fast forwards/backwards. Soml' methods has been proposed to improve the performance and functionality, which the application programs give prediction hints to the file system. Unfortunately, they require the modification of all applications and recompilation. In this paper, we present a file system that efficiently supports user special functions in embedded multimedia systems using file block allocation, buffer-cache, and prefetch. A prefetch algorithm, SPRA (SPeed-based PRefetch Algorithm) predicts the next block using I/O patterns instead of hints from applications and it is resident in the file system, so doesn't affect application development process. From the experimental file system implementation and comparison with Linux readahead-based algorithms, the proposed system shows $4.29%{\sim}52.63%$ turnaround time and 1.01 to 3,09 times throughput in average.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.