• Title/Summary/Keyword: Computing system

Search Result 5,906, Processing Time 0.037 seconds

Scheduling Method of Real-Time Mobile Transaction Manager considering Value of Transactions and Validity of Real-Time Data (트랜잭션의 중요도와 데이터의 유효성을 고려한 실시간 이동 트랜잭션 관리자의 스케줄링 기법)

  • Jo, Suk-Gyeong;Kim, Gyeong-Bae;Lee, Sun-Jo;Bae, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.533-542
    • /
    • 2001
  • In this paper, we present a scheduling method for real-time mobile transaction manager in mobile computing environment. The proposed method checks whether a transaction is executable or not. It is able to by considering not only the deadline of real-time data in mobile hosts. And then, it schedules the real-time mobile transactions by making optimal execution window based on the priority queue, while considering transaction value and deadline. Disconnection with mobile hosts is monitored in selecting the transaction for execution. Using the proposed method reduces the number of restarting times after transaction aborts which is caused by the violation of the validity constraints of real-time data. And in has merits of maximizing the sum of values of real-time mobile transactions which meet the deadline. The performance evaluation demonstrates that the number of committed real-time transactions within the deadline is improved by 20%. This method can be used in real-time mobile transaction manager is such environments as cellular communications, emergency medicine information system and so on.

  • PDF

A Multi-Middleware Bridge for Dynamic Extensibility and Load Balancing in Home Network Environments (홈 네트워크 환경에서의 동적 확장성과 부하분산을 위한 다중 미들웨어 브리지)

  • Kim, Youn-Woo;Jang, Hyun-Su;Song, Chang-Hwan;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.16A no.4
    • /
    • pp.263-272
    • /
    • 2009
  • For implementing the ubiquitous computing environments with smart home infrastructures, various research on the home network have been performed by several research institutes and companies. Due to the various home network middleware that are developed recently, the standardization of the home network middleware is being delayed and it calls for the middleware bridge which solves the interoperability problem among the heterogeneous middlewares. Now the research on the scheme for interoperability and the development of the various bridges are in progress, such as one-to-one bridge supporting interoperability between two middlewares and one-to-many bridge supporting interoperability among the multi-middlewares. However, existing systems and schemes does not consider the dynamic extensibility and performance that is particularly needed in the smart home environments. The middleware bridge should provide bridge extensibility with zero-configuration for non-expert users. It should also provide the load balancing scheme for efficient and proper traffic distribution. In this paper, we propose a Multi-Middleware Bridge(MMB) for dynamic extensibility and load balancing in home network environments. MMB provides bridge scalability and load balancing through the distributed system structure. We also verify the features such as interoperability, bridge extensibility, and the performance of the load balancing algorithm.

A Study on the Calculation of Productive Rate of Return (생산투자수익률 계산방법에 대한 연구)

  • Kim, Jin Wook;Kim, Kun-Woo;Kim, Seok Gon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.95-99
    • /
    • 2015
  • The IRR(internal rate of return) is often used by investors for the evaluation of engineering projects. Unfortunately, it has serial flaws: (1) multiple real-valued IRRs may arise; (2) complex-valued IRRs may arise; (3) the IRR is, in special cases, incompatible with the net present value (NPV) in accept/reject decisions. The efforts of management scientists and economists in providing a reliable project rate of return have generated over the decades an immense amount of contributions aiming to solve these shortcomings. Especially, multiple internal rate of returns (IRRs) have a fatal flaw when we decide to accep it or not. To solve it, some researchers came up with external rate of returns (ERRs) such as ARR (Average Rate of Return) or MIRR (MIRR, Modified Internal Rate of Return). ARR or MIRR. will also always yield the same decision for a engineering project consistent with the NPV criterion. The ERRs are to modify the procedure for computing the rate of return by making explicit and consistent assumptions about the interest rate at which intermediate receipts from projects may be invested. This reinvestment could be either in other projects or in the outside market. However, when we use traditional ERRs, a volume of capital investment is still unclear. Alternatively, the productive rate of return (PRR) can settle these problems. Generally, a rate of return is a profit on an investment over a period of time, expressed as a proportion of the original investment. The time period is typically the life of a project. The PRR is based on the full life of the engineering project. but has been annualised to project one year. And the PRR uses the effective investment instead of the original investment. This method requires that the cash flow of an engineering project must be separated into 'investment' and 'loss' to calculate the PRR value. In this paper, we proposed a tabulated form for easy calculation of the PRR by modifing the profit and loss statement, and the cash flow statement.

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에서의 안전한 그룹 통신)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.60-71
    • /
    • 2006
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.

A Study on the Reformation of Evaluation System for Goodwill under the Current Tax Law (현행 세법상 영업권 평가제도의 개선방안에 관한 연구)

  • Kwak, Young-Min
    • Management & Information Systems Review
    • /
    • v.32 no.1
    • /
    • pp.195-216
    • /
    • 2013
  • This Study investigates evaluation policies for goodwill under the current tax law and suggests improvements as follows. First, even though not appear on the financial statements of acquiree at the date of acquisition, the current corporate tax raw regulates that firms need to estimate purchased goodwill including acquisition amount and additionally recognizable intangible property right with no distinction. According to this rule, purchased goodwill from business combination under the current tax raw has a drawback in overestimating. So, there is need of further improvement on the current related purchased goodwill regime to distinguish additionally recognized intangible property right from purchased goodwill. Second, in the consideration of internally generated goodwill, suggested in the current inheritance and gift tax act as a supplementary evaluation technique, the estimated value of goodwill may contain some bias, since the current regulation uniformly applies to all the companies with no industry characteristics. This may particularly become problematic while computing abnormal earnings, uniformly applying the 10% normal return to all the companies since the normal return is not likely to reflect industry characteristics and thus the computed abnormal earnings may be biased. Therefore, there is need to revise the current regulation relating to the normal return, to convert from the existing 10% rule to the industry average rate of return method.

  • PDF

Ray Effect Analysis Using the Discrete Elements Method in X-Y Geometry (2차원 직각좌표계에서 DEM을 이용한 ray effect의 해석)

  • Choi, Ho-Sin;Kim, Jong-Kyung
    • Journal of Radiation Protection and Research
    • /
    • v.17 no.1
    • /
    • pp.43-56
    • /
    • 1992
  • As one of the methods to ameliorate the ray effects which are the nature of anomalous computational effects due to the discretization of the angular variable in discrete ordinates approximations, a computational program, named TWODET (TWO dimensional Discrete Element Transport), has developed in 2 dimensional cartesian coordinates system using the discrete elements method, in which the discrete angle quadratures are steered by the spatially dependent angular fluxes. The results of the TWODET calculation with K-2, L-3 discrete angular quadratures, in the problem of a centrally located, isotropically emitting flat source in an absorbing square, are shown to be more accurate than that of the DOT 4.3 calculation with S-10 full symmetry angular quadratures, in remedy of the ray effect at the edge flux distributions of the square. But the computing time of the TWODET is about 4 times more than that of the DOT 4.3. In the problem of vacuum boundaries just outside of the source region in an absorbing square, the results of the TWODET calculation are shown severely anomalous ray effects, due to the sudden discontinuity between the source and the vacuum, like as the results of the DOT 4.3 calculation. In the probelm of an external source in an absorbing square in which a highly absorbing medium is added, the results of the TWODET calculation with K-3, L-4 show a good ones like as, somewhat more than, that of the DOT 4.3 calculation with S-10.

  • PDF

Model Based Approach to Estimating Privacy Concerns for Context-Aware Services (상황인식서비스를 위한 모델 기반의 프라이버시 염려 예측)

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.97-111
    • /
    • 2009
  • Context-aware computing, as a core of smart space development, has been widely regarded as useful in realizing individual service provision. However, most of context-aware services so fat are in its early stage to be dispatched for actual usage in the real world, caused mainly by user's privacy concerns. Moreover, since legacy context-aware services have focused on acquiring in an automatic manner the extra-personal context such as location, weather and objects near by, the services are very limited in terms of quality and variety if the service should identify intra-personal context such as attitudes and privacy concern, which are in fact very useful to select the relevant and timely services to a user. Hence, the purpose of this paper is to propose a novel methodology to infer the user's privacy concern as intra-personal context in an intelligent manner. The proposed methodology includes a variety of stimuli from outside the person and then performs model-based reasoning with social theory models from model base to predict the user's level of privacy concern semi-automatically. To show the feasibility of the proposed methodology, a survey has been performed to examine the performance of the proposed methodology.

  • PDF

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.

A Predictive Algorithm using 2-way Collaborative Filtering for Recommender Systems (추천 시스템을 위한 2-way 협동적 필터링 방법을 이용한 예측 알고리즘)

  • Park, Ji-Sun;Kim, Taek-Hun;Ryu, Young-Suk;Yang, Sung-Bong
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.9
    • /
    • pp.669-675
    • /
    • 2002
  • In recent years most of personalized recommender systems in electronic commerce utilize collaborative filtering algorithm in order to recommend more appropriate items. User-based collaborative filtering is based on the ratings of other users who have similar preferences to a user in order to predict the rating of an item that the user hasn't seen yet. This nay decrease the accuracy of prediction because the similarity between two users is computed with respect to the two users and only when an item has been rated by the users. In item-based collaborative filtering, the preference of an item is predicted based on the similarity between the item and each of other items that have rated by users. This method, however, uses the ratings of users who are not the neighbors of a user for computing the similarity between a pair of items. Hence item-based collaborative filtering may degrade the accuracy of a recommender system. In this paper, we present a new approach that a user's neighborhood is used when we compute the similarity between the items in traditional item-based collaborative filtering in order to compensate the weak points of the current item-based collaborative filtering and to improve the prediction accuracy. We empirically evaluate the accuracy of our approach to compare with several different collaborative filtering approaches using the EachMovie collaborative filtering data set. The experimental results show that our approach provides better quality in prediction and recommendation list than other collaborative filtering approaches.

An Improved Estimation Model of Server Power Consumption for Saving Energy in a Server Cluster Environment (서버 클러스터 환경에서 에너지 절약을 위한 향상된 서버 전력 소비 추정 모델)

  • Kim, Dong-Jun;Kwak, Hu-Keun;Kwon, Hui-Ung;Kim, Young-Jong;Chung, Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.19A no.3
    • /
    • pp.139-146
    • /
    • 2012
  • In the server cluster environment, one of the ways saving energy is to control server's power according to traffic conditions. This is to determine the ON/OFF state of servers according to energy usage of data center and each server. To do this, we need a way to estimate each server's energy. In this paper, we use a software-based power consumption estimation model because it is more efficient than the hardware model using power meter in terms of energy and cost. The traditional software-based power consumption estimation model has a drawback in that it doesn't know well the computing status of servers because it uses only the idle status field of CPU. Therefore it doesn't estimate consumption power effectively. In this paper, we present a CPU field based power consumption estimation model to estimate more accurate than the two traditional models (CPU/Disk/Memory utilization based power consumption estimation model and CPU idle utilization based power consumption estimation model) by using the various status fields of CPU to get the CPU status of servers and the overall status of system. We performed experiments using 2 PCs and compared the power consumption estimated by the power consumption model (software) with that measured by the power meter (hardware). The experimental results show that the traditional model has about 8-15% average error rate but our proposed model has about 2% average error rate.