• Title/Summary/Keyword: Efficient Execution System

Search Result 299, Processing Time 0.029 seconds

Development of an efficient Service Management on Jini HomeNetwork (지니 홈네트워크상의 효율적인 서비스 관리 시스템 개발)

  • Jung, Jun-Young;Jung, Min-Soo;Kim, Kwang-Soo
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.1017-1024
    • /
    • 2003
  • Jini is a promising HomeNetworking middleware of computing environment based on Java Technology. To support Homenetwork service based on Jini, Jini device requires a successive operation and complicated management. In this paper, our service management system is a service provider component and lookup service component including automation module. Our automatin module privide searching and setting function of a library, runtime environment and class file system cinfiguration information for Jini service. Our system can be accomplished by automation of runtime environment, simplification of service management structure, visualization of service execution.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

The Study for Cloud-native Application of Public Sector Information System on Considerations during Project Execution (공공부문 정보시스템의 클라우드 네이티브 적용을 위한 적합성 검토방안 및 사업진행 시 고려사항에 대한 연구)

  • Jin Won Choi;Eun Suk Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.27-35
    • /
    • 2024
  • In accordance with the cloud conversion of public sector information systems and the implementation of cloud native introduction policies, review items were presented to review the cloud native of information systems for stable and efficient cloud native deployment. By presenting cloud native considerations when promoting a project, we propose a plan to flexibly respond to policy and business changes and improve development quality and productivity to operate cloud services stably. In order for information project managers to switch to a cloud-native-based information system in order to efficiently utilize the cloud as a cloud, they must decide whether to introduce cloud-native through suitability review questions and sufficiently review development and operation costs and efficiency to promote the project. As a result of conducting a focus group interview (FGI) with a council of cloud native experts, there was an opinion that information systems can be operated in a cloud-native manner even with a monolithic structure. By fully considering the circumstances of each system, development quality and productivity, we expect to be able to operate improved to provide a stable cloud service.

Safety Techniques-Based Improvement of Task Execution Process Followed by Execution Maturity-Based Risk Management in Precedent Research Stage of Defense R&D Programs (국방 선행연구단계에서 안전분석 기법에 기반한 수행프로세스의 개선 및 수행성숙도 평가를 활용한 위험 관리)

  • Choi, Se Keun;Kim, Young-Min;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.89-100
    • /
    • 2018
  • The precedent study stage of defense programs is a project stage that is conducted to support the determination of an efficient acquisition method of the weapon system determined by the requirement. In this study, the FTA/FMEA technique was used in the safety analysis process to identify elements to be conducted in the precedent study stage and a methodology for deriving the key review elements through conceptualization and tailoring was suggested. To supplement the key elements derived from the existing research, it is necessary to analyze various events that may arise from key elements. To accomplish this, the HAZOP technique for safety analysis in other industrial fields was used to supplement the results of kdy element derivation. We analyzed and modeled the execution procedure by establishing input/output information and association with the key elements of the precedent study stage derived by linking HAZOP/FTA/FMEA techniques. In addition, performance maturity was evaluated for performance of precedent study, and a risk-based response manual was generated based on inter-working information with key elements with low maturity. Based on the results of this study, it is possible to meet the performance, cost, and schedule of the project implementation through application of the key elements and procedures and the risk management response manual in the precedent study stage of the defense program.

A Study on the Establishment of Database for the Efficient Management of Unexecuted Urban Planning Facilities (미집행 도시계획시설의 효율적 관리를 위한 DB구축 방안에 관한 연구)

  • KIM, Kwang-Yeol;KIM, Shin-Hey;BAEK, Tae-Kyung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.3
    • /
    • pp.1-11
    • /
    • 2020
  • The purpose of this study is to conduct an analysis for classification of unexecuted urban planning facilities using the Geographic Information System(GIS) to prepare measures for systematic and efficient management of unexecuted urban planning facilities and to find ways to establish national territory information for continuous management and operation by database of spatial data of classified unexecuted urban planning facilities. For this purpose, the present state of urban management plan, thematic map, cadastral map, satellite image of Korea Land Information System(KLIS) were collected from Miryang City, and qualitative analysis of the execution and non-execution of urban planning facilities was conducted by combining the layer of urban planning facilities, satellite images, and continuous cadastral layers of cadastral maps with classified and processed owner attribute information. According to the analysis, the unexecuted facilities were derived as unexecuted facilities, as most of the private land, without any current status roads or facilities created in satellite imagery. In addition, although the current status road was opened, the facilities that included some private land were derived as facilities that were recognized and executed by the local government as the de facto controlling entity through public transportation. The derived unexecuted urban planning facilities were divided into layers of shape data and the unexecuted property data were organized to quickly and accurately identify the status of non-executed and statistical information. In this study, we proposed an analysis plan that introduced GIS technology for scientific and rational analysis of unexecuted urban planning facilities and the establishment of reliable spatial data, and proposed a plan to establish a database for connection with existing systems and use of information.

Efficient Process Checkpointing through Fine-Grained COW Management in New Memory based Systems (뉴메모리 기반 시스템에서 세밀한 COW 관리 기법을 통한 효율적 프로세스 체크포인팅 기법)

  • Park, Jay H.;Moon, Young Je;Noh, Sam H.
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.132-138
    • /
    • 2017
  • We design and implement a process-based fault recovery system to increase the reliability of new memory based computer systems. A rollback point is made at every context switch to which a process can rollback to upon a fault. In this study, a clone process of the original process, which we refer to as a P-process (Persistent-process), is created as a rollback point. Such a design minimizes losses when a fault does occur. Specifically, first, execution loss can be minimized as rollback points are created only at context switches, which bounds the lost execution. Second, as we make use of the COW (Copy-On-Write)mechanism, only those parts of the process memory state that are modified (in page units) are copied decreasing the overhead for creating the P-process. Our experimental results show that the overhead is approximately 5% in 8 out of 11 PARSEC benchmark workloads when P-process is created at every context switch time. Even for workloads that result in considerable overhead, we show that this overhead can be reduced by increasing the P-process generation interval.

Efficient Implementation of SVM-Based Speech/Music Classification on Embedded Systems (SVM 기반 음성/음악 분류기의 효율적인 임베디드 시스템 구현)

  • Lim, Chung-Soo;Chang, Joon-Hyuk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.30 no.8
    • /
    • pp.461-467
    • /
    • 2011
  • Accurate classification of input signals is the key prerequisite for variable bit-rate coding, which has been introduced in order to effectively utilize limited communication bandwidth. Especially, recent surge of multimedia services elevate the importance of speech/music classification. Among many speech/music classifier, the ones based on support vector machine (SVM) have a strong selling point, high classification accuracy, but their computational complexity and memory requirement hinder their way into actual implementations. Therefore, techniques that reduce the computational complexity and the memory requirement is inevitable, particularly for embedded systems. We first analyze implementation of an SVM-based classifier on embedded systems in terms of execution time and energy consumption, and then propose two techniques that alleviate the implementation requirements: One is a technique that removes support vectors that have insignificant contribution to the final classification, and the other is to skip processing some of input signals by virtue of strong correlations in speech/music frames. These are post-processing techniques that can work with any other optimization techniques applied during the training phase of SVM. With experiments, we validate the proposed algorithms from the perspectives of classification accuracy, execution time, and energy consumption.

A Real-Time Hardware Design of CNN for Vehicle Detection (차량 검출용 CNN 분류기의 실시간 처리를 위한 하드웨어 설계)

  • Bang, Ji-Won;Jeong, Yong-Jin
    • Journal of IKEEE
    • /
    • v.20 no.4
    • /
    • pp.351-360
    • /
    • 2016
  • Recently, machine learning algorithms, especially deep learning-based algorithms, have been receiving attention due to its high classification performance. Among the algorithms, Convolutional Neural Network(CNN) is known to be efficient for image processing tasks used for Advanced Driver Assistance Systems(ADAS). However, it is difficult to achieve real-time processing for CNN in vehicle embedded software environment due to the repeated operations contained in each layer of CNN. In this paper, we propose a hardware accelerator which enhances the execution time of CNN by parallelizing the repeated operations such as convolution. Xilinx ZC706 evaluation board is used to verify the performance of the proposed accelerator. For $36{\times}36$ input images, the hardware execution time of CNN is 2.812ms in 100MHz clock frequency and shows that our hardware can be executed in real-time.

A Efficient Debugging Method for Java Programs (자바 프로그램을 위한 효율적인 디버깅 방법)

  • 고훈준;유원희
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.170-176
    • /
    • 2002
  • Java language is a representative object-oriented language that is used at the various platform and fields. A structure of java language is simpler than traditional procedural-oriented language because of characters of object-oriented language But it is difficult to debug complicated java programs. Debugging has always been a costly part of software development. Syntax errors of java programs is easily found by the current debugging system. But it is difficult to locate logical errors included in java programs. Traditional debugging techniques locating logical errors in java program have been still used with conventional methods that are used at procedural-oriented languages. Unfortunately, these traditional methods are often inadequate for the task of isolating specific program errors. Debugger users may spend considerable time debugging code of program development with sequential methods according as program size is large and is complicated. It is important to easily locate errors included in java program in the software development. In this paper, we apply algorithmic debugging method that debugger user can easily debug programs to java program. This method executes a program and makes an execution tree from calling relation of functions. And it locates errors at the execution tree. So, Algorithmic debugging method can reduce the number of debugging than conventional sequential method.

  • PDF