• Title/Summary/Keyword: 평가 실행

Search Result 1,781, Processing Time 0.036 seconds

ANC Caching Technique for Replacement of Execution Code on Active Network Environment (액티브 네트워크 환경에서 실행 코드 교체를 위한 ANC 캐싱 기법)

  • Jang Chang-bok;Lee Moo-Hun;Cho Sung-Hoon;Choi Eui-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.610-618
    • /
    • 2005
  • As developed Internet and Computer Capability, Many Users take the many information through the network. So requirement of User that use to network was rapidly increased and become various. But it spend much time to accept user requirement on current network, so studied such as Active network for solved it. This Active node on Active network have the capability that stored and processed execution code aside from capability of forwarding packet on current network. So required execution code for executed packet arrived in active node, if execution code should not be in active node, have to take by request previous Action node and Code Server to it. But if this execution code take from previous active node and Code Server, bring to time delay by transport execution code and increased traffic of network and execution time. So, As used execution code stored in cache on active node, it need to increase execution time and decreased number of request. So, our paper suggest ANC caching technique that able to decrease number of execution code request and time of execution code by efficiently store execution code to active node. ANC caching technique may decrease the network traffic and execution time of code, to decrease request of execution code from previous active node.

Developing a Model for Quality Evaluation of Text Database Contents (데이터베이스 품질 평가를 위한 모형 개발-텍스트 데이터베이스 내용을 중심으로-)

  • 장혜란
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.4
    • /
    • pp.83-97
    • /
    • 2000
  • Bascd on thc ~esuhs of previous cvalnation cfforts, a database qualily evaluation model. applicable to text databases, is developed. Focusing on dalahase contents. 5 evaluation criteria consisting of 16 clanmts a e delined. For each clcmcnt, data collcctioll method along u,ilh measuing process is eslablished. h d an evalualion scales ale also provided. The concludn~g section suggests several areas for impleinenlalion and h u e development.

  • PDF

Partial Scan Performance Evaluation of Iterative Method of Testability Measurement(ITEM) (시험성 분석 기법(ITEM)의 부분 스캔 성능 평가)

  • 김형국;이재훈;민형복
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.11
    • /
    • pp.11-20
    • /
    • 1998
  • Testability analysis computes controllabilities and observabilities of all lines of a circuit and then evaluates fault coverage. The values of controllability and observability as well as fault coverage produced by testability analysis are used for applications of testability analysis. ITEM was evaluated as a fault coverage tool. But the values of controllability and observability at all lines of circuits must be estimated as a performance measure of testability tools for another application such as partial scan. In this paper, partial scan method based on sensitivity analysis which estimates relative improvement of detectability of circuits after scanning a flip-flop is used for performance evaluation of ITEM. Performance of ITEM, with respect to testability values on each net, has been measured by comparing ITEM and STAFAN. Partial scan performance achieved by ITEM is very similar to that of STAFAN, but ITEM takes less CPU time. Therefore ITEM is very efficient for partial scan application because ITEM runs faster for very large circuits in which execution time is critical.

  • PDF

Convergence Characteristics of Ant Colony Optimization with Selective Evaluation in Feature Selection (특징 선택에서 선택적 평가를 사용하는 개미 군집 최적화의 수렴 특성)

  • Lee, Jin-Seon;Oh, Il-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.10
    • /
    • pp.41-48
    • /
    • 2011
  • In feature selection, the selective evaluation scheme for Ant Colony Optimization(ACO) has recently been proposed, which reduces computational load by excluding unnecessary or less promising candidate solutions from the actual evaluation. Its superiority was supported by experimental results. However the experiment seems to be not statistically sufficient since it used only one dataset. The aim of this paper is to analyze convergence characteristics of the selective evaluation scheme and to make the conclusion more convincing. We chose three datasets related to handwriting, medical, and speech domains from UCI repository whose feature set size ranges from 256 to 617. For each of them, we executed 12 independent runs in order to obtain statistically stable data. Each run was given 72 hours to observe the long-time convergence. Based on analysis of experimental data, we describe a reason for the superiority and where the scheme can be applied.

A Study on the Application of Cost Risk Exposure methods by the Probabilistic Evaluation on the Construction Projects (확률적 평가에 의한 건설공사 비용 위험도 측정의 적용성에 관한 연구)

  • Cho Jea-Ho;Chun Jae-Youl
    • Korean Journal of Construction Engineering and Management
    • /
    • v.1 no.1 s.1
    • /
    • pp.63-71
    • /
    • 2000
  • The paper considers two non-deterministic methods of analysing the risk exposure in a cost estimate The fist method(referred to as the 'conventional statistical' method) analyses cost data directly, to describe a probability distribution for total cost. The second method(referred to as the 'Monte Carlo simulation' method) interprets cost data directly, to generate a probability distribution for total costs from the descriptions of elemental cost distribution. The common practice of allowing for risk through an all-embracing contingency sum or percentage addition is challenged. Rather than excluding conventional, non-deterministic methods, they are here presented as possibly the only of effective foundation on which to risk management in cost estimating.

  • PDF

해양사고 예방을 위한 분석과 평가 기법 조사 연구

  • Jeong, Bo-Yeong;Yang, Won-Jae;Im, Jeong-Bin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.06a
    • /
    • pp.465-467
    • /
    • 2013
  • 해양사고 예방을 위해서는 과학적이고 체계적인 해양사고 분석과 평가 및 예측이 우선 필요하다. 이 논문에서는 기존에 연구 개발된 다양한 해양사고 분석과 평가 방법을 검토하였다. 연구결과, 구체적이고 실행 가능한 연구접근 방법과 다양한 분석과 평가기법이 개발되어 있음을 알았다. 특히, IMO의 공식안전성평가(FSA) 절차가 세계적으로 표준화된 규준으로 자리매김하고 있다. 특히, 미국의 유명한 선급 ABS와 노르웨이의 선급 DNV에서 다양한 분석과 평가기법을 보고하였다. 특히, 불확실성이 배제된 위기허용기준(Risk Acceptance Criteria)의 개발이 가장 중요한 요소임을 확인하였다. 향후 해양사고 예방에 적용할 수 있는 고도의 분석과 평가 기법 실용화를 지속 연구할 예정이다.

  • PDF

Design and Implementation an Evaluating System for Programming Assignment Applying Smart Client (스마트 클라이언트를 적용한 프로그래밍 과제평가 시스템 설계 및 구현)

  • Jang, Jung-Il;Ji, Jeong-Hoon;Woo, Gyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1380-1382
    • /
    • 2007
  • 인터넷의 발달로 온라인 원격강의나 E-Learning 형태의 교육이 많이 확산되었다. 온라인 교육의 확산으로 웹을 기반으로 하는 클라이언트 소프트웨어들이 많이 개발되어 사용되고 있다. 특히 교과목의 특성상 실습위주로 진행되는 프로그래밍 관련 교과목에서는 자동화 된 과제평가 시스템이 필요하다. 프로그래밍 과제평가 시스템에서는 과제제출, 소스코드 업로드, 컴파일 및 실행, 채점, 표절검사 등의 과제평가를 위한 기본적인 작업들을 수행된다. 위와 같은 작업들이 모두 평가시스템 서버에서 진행되기 때문에 서버에 많은 부하가 걸린다. 또한 공정한 평가를 위해 보안이 최우선적으로 고려되어야 한다. 본 논문에서는 스마트 클라이언트 기술을 이용한 과제평가 시스템을 설계하고 구현하였다. 본 시스템에서는 과제평가 시스템의 서비스를 분산시켜 시스템의 부하를 줄이고, 보안을 향상시킴으로써 학생들에게 공정한 평가를 가능하게 하였다.

Action Research about Intervention to the Aggressive Behaviors of Junseo (2세 학급 준서의 공격적인 문제행동 지도 실행연구)

  • Won, Kye Son;Kim, Su Jin;Oh, A Rum
    • Korean Journal of Childcare and Education
    • /
    • v.11 no.1
    • /
    • pp.23-42
    • /
    • 2015
  • The purpose of this study was to find and to apply an effective intervention method to deal with the aggressive behaviors of Junseo, who is in a classroom for two-year olds. First, we collected the data about the aggressive behaviors by ABC event sampling, journal, recording the frequency of behaviors and the interview with the parents. Second, we drew an inference to the reason for his behaviors and tried to find an appropriate method to deal with them with colleagues and the professor. A time-out was applied to Junseo's aggressive behaviors and alternately, his parents were asked to applause him frequently on appropriate behaviors at home. The aggressive behaviors became better gradually while the intervention method was monitored and assessed for feedback. As a result, the approach procedure, which was used in this study, was suggested to deal with the aggressive behaviors of young children. And supporting the system for operating this procedure was further discussed.

Classifying Windows Executables using API-based Information and Machine Learning (API 정보와 기계학습을 통한 윈도우 실행파일 분류)

  • Cho, DaeHee;Lim, Kyeonghwan;Cho, Seong-je;Han, Sangchul;Hwang, Young-sup
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1325-1333
    • /
    • 2016
  • Software classification has several applications such as copyright infringement detection, malware classification, and software automatic categorization in software repositories. It can be also employed by software filtering systems to prevent the transmission of illegal software. If illegal software is identified by measuring software similarity in software filtering systems, the average number of comparisons can be reduced by shrinking the search space. In this study, we focused on the classification of Windows executables using API call information and machine learning. We evaluated the classification performance of machine learning-based classifier according to the refinement method for API information and machine learning algorithm. The results showed that the classification success rate of SVM (Support Vector Machine) with PolyKernel was higher than other algorithms. Since the API call information can be extracted from binary executables and machine learning-based classifier can identify tampered executables, API call information and machine learning-based software classifiers are suitable for software filtering systems.

Address Space Maintaining Scheme for Fast Program Execution in Linux-based Systems (Linux 기반에서 빠른 프로그램 실행을 위한 주소 공간 유지 기법)

  • Noh, Seung Joon;Kang, Dong Hyun;Kim, Junghan;Kim, Inhyeok;Eom, Young Ik
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.12
    • /
    • pp.786-791
    • /
    • 2015
  • The environment of Internet of Things (IoT) wherein various devices are connected through the Internet with value-added network functions, is currently a subject of active study. Accordingly, the existing computing environment based on desktop or mobile systems is being expanded into a computing environment of more diverse devices. Because the response of program launching is important in terms of User Experience (UX) in IoT environments, the technology for guaranteeing rapid response of program launching in IoT devices is getting the focus of much current research. In this paper we analyze the Zygote technique, which is being used for faster program execution in Android systems, and, based on our results, we propose an address space maintaining scheme for the rapid launching of programs for use in Linux-based systems. Our scheme utilizes the Copy on Write (CoW) technique in Linux systems as well as the Zygote technique of Android systems. In order to evaluate the proposed scheme, we implemented our scheme on Linux systems and performed several experiments. The experimental results show that the proposed scheme shortens the launching time up to 99%, compared to the existing technique.