• Title/Summary/Keyword: Distributed Server

Search Result 847, Processing Time 0.279 seconds

Middleware for Ubiquitous Healthcare Information System

  • Sain, Mangal;Lee, Hoon-Jae;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.257-260
    • /
    • 2008
  • We build middleware architecture with J2EE and LiveGraph to process different ubiquitous healthcare application's data and process that data into useful information, which can play a most important role in decision making in ubiquitous Healthcare System. Application developers mostly rely on third party middleware, tools and libraries (i.e., webservers, distributed middleware such as CORBA, etc.) to respond the emerging trends of their target domain. With this middleware we tried to enhance the efficiency of application by decrease their memory uses, data processing and decision making on another web module which is independent of each application. For middleware system, we proposed an algorithm by which we can find some important conclusion about different health status likewise ECG, Accelerometer. etc., which can be used in various data processing and determine the current health status. In this paper we also analyze some different low level and high level middleware technology which were used to build different kind middleware likewise CAMUS, MiLAN and try to find the best solution in the form of middleware for Ubiquitous Healthcare Information System.

  • PDF

Dynamic Multi-distributed Web Cluster Group Model for Availability of Web Business (웹 비즈니스의 고가용성을 위한 동적 다중 웹 분산 클러스터 그룹 모델)

  • Lee, Gi-Jun;Park, Gyeong-U;Jeong, Chae-Yeong
    • The KIPS Transactions:PartA
    • /
    • v.8A no.3
    • /
    • pp.261-268
    • /
    • 2001
  • With the rapid growth of the Internet, various web-based businesses are creating a new environment in an imaginary space. However, this expanding Internet and user increase cause an overflow of transmission and numerous subordinate problems. To solve these problems, a parallel cluster system is produced using different methods. This thesis recommends a multi0distribution cluster group. It constructs a MPP dynamic distribution sub-cluster group using numerous low-priced and low-speed systems. This constructed sub-cluster group is then connected with a singular virtual IP to finally serve the needs of clients (users). This multi-distribution cluster group consists of an upper structure based on LVS and a dynamic serve cluster group centered around an SC-server. It conducts the workloads required from users in a parallel process. In addition to the web service, this multi-distribution cluster group can efficiently be utilized for the calculations which require database controls and a great number of parallel calculations as well as additional controls with result from the congestion of service.

  • PDF

Admission Control Method for Efficient Multicast Service in BcN Environment (BcN 환경에서 효과적인 멀티캐스트 서비스를 위한 연결 수락 제어 방안)

  • Jo, Seng-Kyoun;Choi, Seong-Gon;Choi, Jun-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.793-798
    • /
    • 2005
  • We focus on the RP (Rendezvous Point) system model in the multicast network based on BcN (Broadband Convergence Network) integrating broadcasting, telecommunication and Internet with one. Based on the condition multiple queues with different service and single server, when the arrivals tome in group with the site of the group geometrically distributed, we define the relationship between incoming arrival rate and corresponding buffer size. We also investigate the Profit according to both Service Provider and Network Operator Then we make a decision whether a new service request is accepted or not based on given interning rate range.

A Virtual Microscope System for Educational Applications (교육 분야 응용을 위한 가상 현미경 시스템)

  • Cho, Seung-Ho;Beynon, Mike;Saltz, Joel
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.117-124
    • /
    • 2003
  • The system implemented in this paper partitions and stores specimen data captured by a light microscope on distributed or parallel systems. Users ran observe images on computers as we use a physical microscope. Based on the client-server computing model, the system consists of client, coordinator, and data manager. Three components communicate messages. For retrieving images, we implemented the client program with necessary functions for educational applications such at image mark and text annotation, and defined the communication protocol. We performed the experiment for introducing a tape storage which stores a large volume of data. The experiment results showed performance improvement by data partitioning and indexing technique.

Path Prediction-based Dynamic Data Sharing in Network Virtual Environment (네트워크 가상환경에서 경로예측에 의한 동적 데이터 공유)

  • Song, Sun-Hee;Ra, Sang-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10C
    • /
    • pp.956-963
    • /
    • 2006
  • This research studies multi participant consistency and dynamic data shared through 3D scenes in virtual network environments. In a distributed virtual environment of client-server structure, consistency is maintained by the static information exchange; as jerks occur by packet delay when updating messages of dynamic data exchanges are broadcasted frequence, the network bottleneck is reduced by predicting the movement path by using the Dead-reckoning algorithm. In Dynamic data path prediction, the tests the location prediction error between Dead-reckoning convergence interval and error of prediction and actual condition one time above threshold it interpolates a previously location. The shared dynamic data of the 3D virtual environment is implementation using the VRML EAI.

A Code Authentication System of Counterfeit Printed Image Using Multiple Comparison Measures (다중 비교척도에 의한 영상 인쇄물 위조 감식 시스템)

  • Choi, Do-young;Kim, Jin-soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.4
    • /
    • pp.1-12
    • /
    • 2018
  • Currently, a large amount of printed matter associated with code authentication method are diffused widely, however, they have been reproduced with great precision and distributed successively in illegal ways. In this paper, we propose an efficient code authentication method which classifies authentic or counterfeit with smart-phone, effectively. The proposed method stores original image code in the server side and then extracts multiple comparison measures describing the original image. Based on these multiple measures, a code authentication algorithm is designed in such a way that counterfeit printed images may be effectively classified and then the recognition rate may be highly improved. Through real experiments, it is shown that the proposed method can improve the recognition rate greatly and lower the mis-recognition rate, compared with single measure method.

Development of Distributed Interactive Stochastic Combat Simulation (DISCSIM) Model

  • Hong, Yoon-Gee;Kwon, Soon-Jong
    • Journal of the military operations research society of Korea
    • /
    • v.25 no.2
    • /
    • pp.15-30
    • /
    • 1999
  • A number of combat simulation models are scattered and the analytic solution approaches have experienced very difficult computational efforts. Today´s computer communication technology let people to do many unrealistic things possible and the use of those technologies is becoming increasingly prevalent throughout the military operation. Both DIS and ADS are welled defined computer aided military simulations. This study discusses a simulation of stochastic combat network modeling through Internet space. We have developed two separate simulation models, one for clients and another for server, and validated for conducting studies with these models. The object-oriented design was necessary to define the system entities and their relationship, to partition functionality into system entities, and to transform functional metrics into realizations derived from system component behaviors. Heterogeneous forces for each side are assumed at any battle node. The time trajectories for mean number of survivors and combat history at each node, some important combat measures, and relative difference computations between models were made. We observe and may conclude that the differences exit and some of these are significant based on a limited number of experiments.

  • PDF

The Performance Study of a Virtualized Multicore Web System

  • Lu, Chien-Te;Yeh, C.S. Eugene;Wang, Yung-Chung;Yang, Chu-Sing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5419-5436
    • /
    • 2016
  • Enhancing the performance of computing systems has been an important topic since the invention of computers. The leading-edge technologies of multicore and virtualization dramatically influence the development of current IT systems. We study performance attributes of response time (RT), throughput, efficiency, and scalability of a virtualized Web system running on a multicore server. We build virtual machines (VMs) for a Web application, and use distributed stress tests to measure RTs and throughputs under varied combinations of virtual cores (VCs) and VM instances. Their gains, efficiencies and scalabilities are also computed and compared. Our experimental and analytic results indicate: 1) A system can perform and scale much better by adopting multiple single-VC VMs than by single multiple-VC VM. 2) The system capacity gain is proportional to the number of VM instances run, but not proportional to the number of VCs allocated in a VM. 3) A system with more VMs or VCs has higher physical CPU utilization, but lower vCPU utilization. 4) The maximum throughput gain is less than VM or VC gain. 5) Per-core computing efficiency does not correlate to the quality of VCs or VMs employed. The outcomes can provide valuable guidelines for selecting instance types provided by public Cloud providers and load balancing planning for Web systems.

An Implementation of Image Security System Based on Web (웹기반 화상 감시 시스템의 구현)

  • Park Young-Seak;Cho Pyung-Kee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.1
    • /
    • pp.74-81
    • /
    • 2000
  • In this paper we have developed an image security system based on Internet Web in order to overcome the problem of existing systems that use the dedicated network. The developed system resolves the safety problem of the centralized control model by adapting the distributed control model based on Web, and has the functions of remote control and automatic monitoring for grouped multiple sites on remote Web browser. And the system can operate various computers or operating system because it' s operating software was designed by the concepts of Java Virtual Machine and Virtual Instrument. Also, our system has not need of additional cost for network construction by using Internet and can greatly improve the managemental efficiency of system because the maintenance and publishing of software updates can be performed through Web Server.

  • PDF

Network Session Analysis For BotNet Detection (봇넷 탐지를 위한 네트워크 세션 분석)

  • Park, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2689-2694
    • /
    • 2012
  • In recent years, cyber crimes were intended to get financial benefits through malicious attempts such as DDoS attacks, stealing financial information and spam. Botnets, a network composed of large pool of infected hosts, lead such malicious attacks. The botnets have adopted several evasion techniques and variations. Therefore, it is difficult to detect and eliminate them. Current botnet solutions use a signature based detection mechanism. Furthermore, the solutions cannot cover broad areas enough to detect world-wide botnets. In this paper, we propose IRC (Internet Relay Chat) that is used to control the botnet communication in a session channel of IRC servers connected through the analysis of the relationship of the channel and the connection with the server bot-infected hosts and how to detect.