• Title/Summary/Keyword: Performance Information Use

Search Result 5,694, Processing Time 0.042 seconds

Overlay Multicast for File Distribution using Virtual Sources (파일전송의 성능향상을 위한 다중 가상소스 응용계층 멀티캐스트)

  • Lee Soo-Jeon;Lee Dong-Man;Kang Kyung-Ran
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.289-298
    • /
    • 2006
  • Algorithms for application-level multicast often use trees to deliver data from the source to the multiple receivers. With the tree structure, the throughput experienced by the descendant nodes will be determined by the performance of the slowest ancestor node. Furthermore, the failure of an ancestor node results in the suspension of the session of all the descendant nodes. This paper focuses on the transmission of data using multiple virtual forwarders, and suggests a scheme to overcome the drawbacks of the plain tree-based application layer multicast schemes. The proposed scheme elects multiple forwarders other than the parent node of the delivery tree. A receiver receives data from the multiple forwarders as well as the parent node and it can increase the amount of receiving data per time unit. The multiple forwarder helps a receiver to reduce the impact of the failure of an ancestor node. The proposed scheme suggests the forwarder selection algorithm to avoid the receipt of duplicate packets. We implemented the proposed scheme using MACEDON which provides a development environment for application layer multicast. We compared the proposed scheme with Bullet by applying the implementation in PlanetLab which is a global overlay network. The evaluation results show that the proposed scheme enhanced the throughput by 20 % and reduced the control overhead over 90 % compared with Bullet.

CORE-Dedup: IO Extent Chunking based Deduplication using Content-Preserving Access Locality (CORE-Dedup: 내용보존 접근 지역성 활용한 IO 크기 분할 기반 중복제거)

  • Kim, Myung-Sik;Won, You-Jip
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.59-76
    • /
    • 2015
  • Recent wide spread of embedded devices and technology growth of broadband communication has led to rapid increase in the volume of created and managed data. As a result, data centers have to increase the storage capacity cost-effectively to store the created data. Data deduplication is one way to save the storage space by removing redundant data. This work propose IO extent based deduplication schemes called CORE-Dedup that exploits content-preserving access locality. We acquire IO traces from block device layer in virtual machine host, and compare the deduplication performance of chunking method between the fixed size and IO extent based. At multiple workload of 10 user's compile in virtual machine environment, the result shows that 4 KB fixed size chunking and IO extent based chunking use chunk index 14500 and 1700, respectively. The deduplication rate account for 60.4% and 57.6% on fixed size and IO extent chunking, respectively.

A Study on the Perceived Risk and the Pre-Purchase Intention of Internet Shopping Mall Users according to Gender (인터넷 쇼핑몰 이용자의 성별에 따른 구매 전 지각된 위험과 구매의도에 관한 연구)

  • Kang, Young-Sin;Ahn, Byeong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.213-223
    • /
    • 2007
  • The aims of this study are to determine if the perceived risk of e commerce affect the Internet shopping mall users'decision to pre-purchase an item via e commerce, to find out if there are differences among the induced perceived risk according to gender, and to verify if the perceived risk according to gender have a correlation to a person's decision to pre-purchase an item via e commerce. It was found from the analysis of the collected data that there are five factors of perceived risk of e commerce: economic risk, the product performance risk, social risk, technology/time loss risk, and privacy risk. First, the collected data were analyzed to determine if the perceived risk of e commerce affect people's purchase intentions, and on the matter of whether there are differences among the pre-perceived risk according to sender, As regards the differences among the relationships between the pre-perceived risk of e commerce and the purchase intention of the Internet shopping mall users based on gender. It can thus be concluded that the pre-perceived risk of e commerce affect the Internet shopping mall users purchase intention. Different results were obtained, though, according to sender. This means e commerce purchasers can use these results to recognize the risk of e commerce.

  • PDF

Implementation of an Efficient Microbial Medical Image Retrieval System Applying Knowledge Databases (지식 데이타베이스를 적용한 효율적인 세균 의료영상 검색 시스템의 구현)

  • Shin Yong Won;Koo Bong Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.93-100
    • /
    • 2005
  • This study is to desist and implement an efficient microbial medical image retrieval system based on knowledge and content of them which can make use of more accurate decision on colony as doll as efficient education for new techicians. For this. re first address overall inference to set up flexible search path using rule-base in order U redure time required original microbial identification by searching the fastest path of microbial identification phase based on heuristics knowledge. Next, we propose a color ffature gfraction mtU, which is able to extract color feature vectors of visual contents from a inn microbial image based on especially bacteria image using HSV color model. In addition, for better retrieval performance based on large microbial databases, we present an integrated indexing technique that combines with B+-tree for indexing simple attributes, inverted file structure for text medical keywords list, and scan-based filtering method for high dimensional color feature vectors. Finally. the implemented system shows the possibility to manage and retrieve the complex microbial images using knowledge and visual contents itself effectively. We expect to decrease rapidly Loaming time for elementary technicians by tell organizing knowledge of clinical fields through proposed system.

  • PDF

Study on Local Path Control Method based on Beam Modeling of Obstacle Avoidance Sonar (장애물회피소나 빔 모델링 기반의 국부경로제어 기법 연구)

  • Kim, Hyun-Sik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.2
    • /
    • pp.218-224
    • /
    • 2012
  • Recently, as the needs of developing the micro autonomous underwater vehicle (AUV) are increasing, the acquisition of the elementary technology is urgent. While they mostly utilizes information of the forward looking sonar (FLS) in conventional studies of the local path control as an elementary technology, it is desirable to use the obstacle avoidance sonar (OAS) because the size of the FLS is not suitable for the micro AUV. In brief, the local path control system based on the OAS for the micro AUV operates with the following problems: the OAS offers low bearing resolution and local range information, it requires the system that has reduced power consumption to extend the mission execution time, and it requires an easy design procedure in terms of its structures and parameters. To solve these problems, an intelligent local path control algorithm based on the beam modeling of OAS with the evolution strategy (ES) and the fuzzy logic controller (FLC), is proposed. To verify the performance and analyze the characteristic of the proposed algorithm, the course control of the underwater flight vehicle (UFV) is performed in the horizontal plane. Simulation results show that the feasibility of real application and the necessity of additional work in the proposed algorithm.

Robust determination of control parameters in K chart with respect to data structures (데이터 구조에 강건한 K 관리도의 관리 모수 결정)

  • Park, Ingkeun;Lee, Sungim
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.6
    • /
    • pp.1353-1366
    • /
    • 2015
  • These days Shewhart control chart for evaluating stability of the process is widely used in various field. But it must follow strict assumption of distribution. In real-life problems, this assumption is often violated when many quality characteristics follow non-normal distribution. Moreover, it is more serious in multivariate quality characteristics. To overcome this problem, many researchers have studied the non-parametric control charts. Recently, SVDD (Support Vector Data Description) control chart based on RBF (Radial Basis Function) Kernel, which is called K-chart, determines description of data region on in-control process and is used in various field. But it is important to select kernel parameter or etc. in order to apply the K-chart and they must be predetermined. For this, many researchers use grid search for optimizing parameters. But it has some problems such as selecting search range, calculating cost and time, etc. In this paper, we research the efficiency of selecting parameter regions as data structure vary via simulation study and propose a new method for determining parameters so that it can be easily used and discuss a robust choice of parameters for various data structures. In addition, we apply it on the real example and evaluate its performance.

Implementation of Monitoring System of the Living Waste based on Artificial Intelligence and IoT (AI 및 IoT 기반의 생활 폐기물 모니터링 시스템 구현)

  • Kim, Sang-Hyun;Kang, Young-Hoon;Yoon, Dal-Hwan
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.302-310
    • /
    • 2020
  • In this paper, we have implemented the living waste analysis system based on IoT and AI(Artificial Intelligence), and proposed effective waste process and management method. The Jeju location have the strong point to devise a stratagem and estimate waste quantization, rather than others. Especially, we can recognized the amount variation of waste to the residence people compare to the sightseer number, and the good example a specific waste duty. Thus this paper have developed the IoT device for interconnecting the existed CCTV camera, and use the AI algorithm to analysis the waste image. By using these decision of image analysis, we can inform their deal commend and a decided information to the map of the waste cars. In order to evaluate the performance of IoT, we have experimented the electromagnetic compatibility under a national official authorization KN-32, KN61000-4-2~6, and obtained the stable experimental results. In the further experimental results, we can applicable for an data structure for precise definition command by using the simulated several waste image with artificial intelligence algorithm.

A mechanism for end-to-end secure communication in heterogeneous tactical networks (이기종 전술통신망 종단간 암호화 통신을 위한 메커니즘)

  • Park, Cheol-Yong;Kim, Ki-Hong;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.625-634
    • /
    • 2014
  • Tactical networks is being operated in configuration that consisting of a variety of characteristics communication equipments and heterogeneous networks. In this configurations, end-to-end communication can be achieved using interworking gateway for converting the data format of the network and using encryption algorithm of the networks. The use of mechanism results in a problem that secure data cannot be transferred directly, reprocessing and processing delay of communication in heterogeneous tactical networks. That is, for encoding and decoding of data, the decryption of encrypted data and re-encryption processing must be required at the gateway between different networks. In this paper proposes to mechanism for end-to-end secure communication in heterogeneous tactical networks. Using the proposed method, end-to-end secure communication between heterogeneous tactical networks(PSTN-UHF networks) which removes the necessity of a gateway for converting data into data formats suitable for network to remove a transmission delay factor and enable real-time voice and data communication and achieve end-to-end security for heterogeneous tactical networks. we propose a novel mechanism for end-to-end secure communication over PSTN and UHF networks and evaluate against the performance of conventional mechanism. Our proposal is confirmed removal of security vulnerabilities, end-to-end secure communication in heterogeneous tactical networks.

A Study on Development of BIM-based Asset Management Model for Maintenance of the Bridge (교량의 유지관리를 위한 BIM기반 자산관리 모델 개발에 관한 연구)

  • Kang, Jong-Min;Lee, Dong-Youl;Park, Jong-Bum;Lee, Min-Jae
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.5
    • /
    • pp.3-11
    • /
    • 2012
  • The most of domestic bridge has an used life under 30 years, Future maintenance budgets can be expected to increase. However, because of bridge maintenance budgets are limited, demand for asset management being performed to achieve required performance within available budget is increasing. To perform effective asset management of bridges should be made the best use of information to occur in all phase of construction project. Therefore, the development of system and DB is required to support asset management by effective information management. The objective of this study is the development of the BIM-based bridge asset management model. Through previous research survey, BIM capabilities and asset management components were established and mutual linkages were examined. Bridge asset management model was composed of alternate assessment model. In addition, BIM-based asset management model was performed case studies to verify feasibility and applicability. The proposed model can be applied to a current bridge maintenance procedures and supported to perform effective bridge maintenance tasks within a limited budget.

A Parallel Processing Technique for Large Spatial Data (대용량 공간 데이터를 위한 병렬 처리 기법)

  • Park, Seunghyun;Oh, Byoung-Woo
    • Spatial Information Research
    • /
    • v.23 no.2
    • /
    • pp.1-9
    • /
    • 2015
  • Graphical processing unit (GPU) contains many arithmetic logic units (ALUs). Because many ALUs can be exploited to process parallel processing, GPU provides efficient data processing. The spatial data require many geographic coordinates to represent the shape of them in a map. The coordinates are usually stored as geodetic longitude and latitude. To display a map in 2-dimensional Cartesian coordinate system, the geodetic longitude and latitude should be converted to the Universal Transverse Mercator (UTM) coordinate system. The conversion to the other coordinate system and the rendering process to represent the converted coordinates to screen use complex floating-point computations. In this paper, we propose a parallel processing technique that processes the conversion and the rendering using the GPU to improve the performance. Large spatial data is stored in the disk on files. To process the large amount of spatial data efficiently, we propose a technique that merges the spatial data files to a large file and access the file with the method of memory mapped file. We implement the proposed technique and perform the experiment with the 747,302,971 points of the TIGER/Line spatial data. The result of the experiment is that the conversion time for the coordinate systems with the GPU is 30.16 times faster than the CPU only method and the rendering time is 80.40 times faster than the CPU.