• Title/Summary/Keyword: Information Delay

Search Result 5,532, Processing Time 0.031 seconds

A Block Relocation Algorithm for Reducing Network Consumption in Hadoop Cluster (하둡 클러스터의 네트워크 사용량 감소를 위한 블록 재배치 알고리즘)

  • Kim, Jun-Sang;Kim, Chang-Hyeon;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.11
    • /
    • pp.9-15
    • /
    • 2014
  • In this paper, We propose a block reallocation algorithm for reducing network traffic in Hadoop cluster. The scheduler of Hadoop cluster receives a job from users. And the job is divided into multiple tasks assigned to nodes. At this time, the scheduler allocates the task to the node that satisfied data locality. If a task is assigned to the node that does not have the data(block) to be processed, the task is processed after the data transmission from another node. There is difference of workload among nodes because blocks in cluster have different access frequency. Therefore, the proposed algorithm relocates blocks according to the task allocation pattern of Hadoop scheduler. Eventually, workload of nodes are leveled, and the case of the task processing in a node that does not have the block to be processing is reduced. Thus, the network traffic of the cluster is also reduced. We evaluate the proposed block reallocation algorithm by a simulation. The simulation result shows maximum 23.3% reduction of network consumption than default delay scheduling for jobs processing.

Low Power TLB Supporting Multiple Page Sizes without Operation System (운영체제 도움 없이 멀티 페이지를 지원하는 저전력 TLB 구조)

  • Jung, Bo-Sung;Lee, Jung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.1-9
    • /
    • 2013
  • Even though the multiple pages TLB are effective in improving the performance, a conventional method with OS support cannot utilize multiple page sizes in user application. Thus, we propose a new multiple-TLB structure supporting multiple page sizes for high performance and low power consumption without any operating system support. The proposed TLB is organised as two parts of a S-TLB(Small TLB) with a small page size and a L-TLB(Large TLB) with a large page size. Both are designed as fully associative bank structures. The S-TLB stores small pages are evicted from the L-TLB, and the L-TLB stores large pages including a small page generated by the CPU. Each one bank module of S-TLB and L-TLB can be selectively accessed base on particular one and two bits of the virtual address generated from CPU, respectively. Energy savings are achieved by reducing the number of entries accessed at a time. Also, this paper proposed the simple 1-bit LRU policy to improve the performance. The proposed LRU policy can present recently referenced block by using an additional one bit of each entry on TLBs. This method can simply select a least recently used page from the L-TLB. According to the simulation results, the proposed TLB can reduce Energy * Delay by about 76%, 57%, and 6% compared with a fully associative TLB, a ARM TLB, and a Dual TLB, respectively.

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.

Performance Analysis of Adaptive SC/MRC Diversity Combining using in AWGN (AWGN환경에서 적응형 SC/MRC 다이버시티 컴바이너 성능분석)

  • Yun, Deok-Won;Huh, Sung-Uk;Kim, Chun-Won;Choi, Yong-Tae;Lee, Won-Cheol
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.757-763
    • /
    • 2018
  • It is very difficult to achieve sufficient data rate and required quality of service due to the time-varying nature of the radio channel and various jammers such as path loss, delay, Doppler, shadowing and interference. Especially, the propagation path between the transmitting antenna and the tracking antenna mounted on the fuselage during the test and evaluation of the projectile system considered in this paper is based on the rapid movement of the projectile, the interference due to multipath fading due to the terrain, The propagation path may be blocked. In order to effectively improve the multipath fading occurring in the wireless communication system, a diversity combiner technique is required. In this paper, to derive the design and improvement schemes for the space diversity combiner technique among the diversity combiner schemes, the BER performance of maximum ratio combining (MRC) and selection combining (SC) In an adaptive SC / MRC diversity combiner that operates with MRC when it is lower than the specified threshold criterion when comparing the SNR between two signals received from the channel and operates with SC at high and combines the two received signals The BER performance of the system was compared and analyzed.

Coupling Detection in Sea Ice of Bering Sea and Chukchi Sea: Information Entropy Approach (베링해 해빙 상태와 척치해 해빙 변화 간의 연관성 분석: 정보 엔트로피 접근)

  • Oh, Mingi;Kim, Hyun-cheol
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_2
    • /
    • pp.1229-1238
    • /
    • 2018
  • We examined if a state of sea-ice in Bering Sea acts as a prelude of variation in that of Chukchi Sea by using satellites-based Arctic sea-ice concentration time series. Datasets consist of monthly values of sea-ice concentration during 36 years (1982-2017). Time series analysis armed with Transfer entropy is performed to describe how sea-ice data in Chukchi Sea is affected by that in Bering Sea, and to explain the relationship. The transfer entropy is a measure which identifies a nonlinear coupling between two random variables or signals and estimates causality using modification of time delay. We verified this measure checked a nonlinear coupling for simulated signals. With sea-ice concentration datasets, we found that sea-ice in Bering Sea is influenced by that in Chukchi Sea 3, 5, 6 months ago through the transfer entropy measure suitable for nonlinear system. Particularly, when a sea-ice concentration of Bering Sea has a local minimum, sea ice concentration around Chukchi Sea tends to decline 5 months later with about 70% chance. This finding is considered to be a process that inflow of Pacific water through Bering strait reduces sea-ice in Chukchi Sea after lowering the concentration of sea-ice in Bering Sea. This approach based on information theory will continue to investigate a timing and time scale of interesting patterns, and thus, a coupling inherent in sea-ice concentration of two remote areas will be verified by studying ocean-atmosphere patterns or events in the period.

Design of IoT Gateway based Event-Driven Architecture for Intelligent Buildings. (IoT 게이트웨이 기반 지능형 건물의 이벤트 중심 아키텍쳐 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.256-259
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The gateway based RESTful technology responsible for handling clients' requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in intelligent building IoT environment.

  • PDF

Analysis of the Relationship between Human Risk Factors and Evacuation Behavior for Tunnel Safety (터널안전에 대한 인적위험 요소와 대피행동 간의 관계분석)

  • Baek, Chung-Hyun;Park, Sea-Man;Choi, Byong-Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.535-546
    • /
    • 2019
  • The purpose of this research was to analyze the relationship between human risk factors and evacuation behavior stages for tunnel safety. Therefore, we conducted a survey using a structured questionnaire on the relationship between safety facilities and safety behavior in order to derive an optimized interaction between the two. The research subjects were 141 tunnel users who understand the tunnel environment. The survey period was from June 24, 2018, to September 28, 2018. As data analysis methods, we employed a frequency analysis, a multiple regression analysis, and an independent-sample t-test. In the analysis of the correlation between the human risk factors and the major variables of evacuation behavior, the evacuation phases 1, 2, and 3 were all correlated with acceleration and delay, and the human risk factors were partially correlated. In the multiple regression analysis, the will to comply with laws (${\beta}=0.188$, p=0.034) and information recognition within the tunnel (${\beta}=0.220$, p=0.009) were factors that influence the relationship between human risk factors and evacuation behavior, indicating 12% explanatory power of the impact of human risk factors for the acceleration of evacuation behavior 3. The important variables between human risk factors and evacuation behavior were compliance with laws and information recognition in tunnels. Hence, it is necessary to study the elements that interact with the environment in the tunnel.

Apriori Based Big Data Processing System for Improve Sensor Data Throughput in IoT Environments (IoT 환경에서 센서 데이터 처리율 향상을 위한 Apriori 기반 빅데이터 처리 시스템)

  • Song, Jin Su;Kim, Soo Jin;Shin, Young Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.277-284
    • /
    • 2021
  • Recently, the smart home environment is expected to be a platform that collects, integrates, and utilizes various data through convergence with wireless information and communication technology. In fact, the number of smart devices with various sensors is increasing inside smart homes. The amount of data that needs to be processed by the increased number of smart devices is also increasing, and big data processing systems are actively being introduced to handle it effectively. However, traditional big data processing systems have all requests directed to cluster drivers before they are allocated to distributed nodes, leading to reduced cluster-wide performance sharing as cluster drivers managing segmentation tasks become bottlenecks. In particular, there is a greater delay rate on smart home devices that constantly request small data processing. Thus, in this paper, we design a Apriori-based big data system for effective data processing in smart home environments where frequent requests occur at the same time. According to the performance evaluation results of the proposed system, the data processing time was reduced by up to 38.6% from at least 19.2% compared to the existing system. The reason for this result is related to the type of data being measured. Because the amount of data collected in a smart home environment is large, the use of cache servers plays a major role in data processing, and association analysis with Apriori algorithms stores highly relevant sensor data in the cache.

AI Fire Detection & Notification System

  • Na, You-min;Hyun, Dong-hwan;Park, Do-hyun;Hwang, Se-hyun;Lee, Soo-hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.63-71
    • /
    • 2020
  • In this paper, we propose a fire detection technology using YOLOv3 and EfficientDet, the most reliable artificial intelligence detection algorithm recently, an alert service that simultaneously transmits four kinds of notifications: text, web, app and e-mail, and an AWS system that links fire detection and notification service. There are two types of our highly accurate fire detection algorithms; the fire detection model based on YOLOv3, which operates locally, used more than 2000 fire data and learned through data augmentation, and the EfficientDet, which operates in the cloud, has conducted transfer learning on the pretrained model. Four types of notification services were established using AWS service and FCM service; in the case of the web, app, and mail, notifications were received immediately after notification transmission, and in the case of the text messaging system through the base station, the delay time was fast enough within one second. We proved the accuracy of our fire detection technology through fire detection experiments using the fire video, and we also measured the time of fire detection and notification service to check detecting time and notification time. Our AI fire detection and notification service system in this paper is expected to be more accurate and faster than past fire detection systems, which will greatly help secure golden time in the event of fire accidents.

Implementation of High-radix Modular Exponentiator for RSA using CRT (CRT를 이용한 하이래딕스 RSA 모듈로 멱승 처리기의 구현)

  • 이석용;김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.81-93
    • /
    • 2000
  • In a methodological approach to improve the processing performance of modulo exponentiation which is the primary arithmetic in RSA crypto algorithm, we present a new RSA hardware architecture based on high-radix modulo multiplication and CRT(Chinese Remainder Theorem). By implementing the modulo multiplier using radix-16 arithmetic, we reduced the number of PE(Processing Element)s by quarter comparing to the binary arithmetic scheme. This leads to having the number of clock cycles and the delay of pipelining flip-flops be reduced by quarter respectively. Because the receiver knows p and q, factors of N, it is possible to apply the CRT to the decryption process. To use CRT, we made two s/2-bit multipliers operating in parallel at decryption, which accomplished 4 times faster performance than when not using the CRT. In encryption phase, the two s/2-bit multipliers can be connected to make a s-bit linear multiplier for the s-bit arithmetic operation. We limited the encryption exponent size up to 17-bit to maintain high speed, We implemented a linear array modulo multiplier by projecting horizontally the DG of Montgomery algorithm. The H/W proposed here performs encryption with 15Mbps bit-rate and decryption with 1.22Mbps, when estimated with reference to Samsung 0.5um CMOS Standard Cell Library, which is the fastest among the publications at present.