• Title/Summary/Keyword: Performance and Cost Analysis.

Search Result 2,447, Processing Time 0.043 seconds

Cache Replacement Strategies considering Location and Region Properties of Data in Mobile Database Systems (이동 데이타베이스 시스템에서 데이타의 위치와 영역 특성을 고려한 캐쉬 교체 기법)

  • Kim, Ho-Sook;Yong, Hwan-Seung
    • Journal of KIISE:Databases
    • /
    • v.27 no.1
    • /
    • pp.53-63
    • /
    • 2000
  • The mobile computing service market is increasing rapidly due to the development of low-cost wireless network technology and the high-performance mobile computing devices. In recent years, several methods have been proposed to effectively deal with restrictions of the mobile computing environment such as limited bandwidth, frequent disconnection and short-lived batteries. Amongst those methods, much study is being done on the caching method - among the data transmitted from a mobile support station, it selects those that are likely to be accessed in the near future and stores them in the local cache of a mobile host. Existing cache replacement methods have some limitations in efficiency because they do not take into consideration the characteristics of user mobility and spatial attributes of geographical data. In this paper, we show that the value and the semantic of the data, which are stored in the cache of a mobile host, changes according to the movement of the mobile host. We argue it is because data that are geographically near are better suited to provide an answer to a users query in the mobile environment. Also, we define spatial location of geographical data has effect on, using the spatial attributes of data. Finally, we propose two new cache replacement methods that efficiently support user mobility and spatial attributes of data. One is based on the location of data and the other on the meaningful region of data. From the comparative analysis of the previous methods and that they improve the cache hit ratio. Also we show that performance varies according to data density using this, we argue different cache replacement methods are required for regions with varying density of data.

  • PDF

Case Analysis of Applications of Seismic Data Denoising Methods using Deep-Learning Techniques (심층 학습 기법을 이용한 탄성파 자료 잡음 제거 적용사례 분석)

  • Jo, Jun Hyeon;Ha, Wansoo
    • Geophysics and Geophysical Exploration
    • /
    • v.23 no.2
    • /
    • pp.72-88
    • /
    • 2020
  • Recent rapid advances in computer hardware performance have led to relatively low computational costs, increasing the number of applications of machine-learning techniques to geophysical problems. In particular, deep-learning techniques are gaining in popularity as the number of cases successfully solving complex and nonlinear problems has gradually increased. In this paper, applications of seismic data denoising methods using deep-learning techniques are introduced and investigated. Depending on the type of attenuated noise, these studies are grouped into denoising applications of coherent noise, random noise, and the combination of these two types of noise. Then, we investigate the deep-learning techniques used to remove the corresponding noise. Unlike conventional methods used to attenuate seismic noise, deep neural networks, a typical deep-learning technique, learn the characteristics of the noise independently and then automatically optimize the parameters. Therefore, such methods are less sensitive to generalized problems than conventional methods and can reduce labor costs. Several studies have also demonstrated that deep-learning techniques perform well in terms of computational cost and denoising performance. Based on the results of the applications covered in this paper, the pros and cons of the deep-learning techniques used to remove seismic noise are analyzed and discussed.

Analysis of Feature Map Compression Efficiency and Machine Task Performance According to Feature Frame Configuration Method (피처 프레임 구성 방안에 따른 피처 맵 압축 효율 및 머신 태스크 성능 분석)

  • Rhee, Seongbae;Lee, Minseok;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.318-331
    • /
    • 2022
  • With the recent development of hardware computing devices and software based frameworks, machine tasks using deep learning networks are expected to be utilized in various industrial fields and personal IoT devices. However, in order to overcome the limitations of high cost device for utilizing the deep learning network and that the user may not receive the results requested when only the machine task results are transmitted from the server, Collaborative Intelligence (CI) proposed the transmission of feature maps as a solution. In this paper, an efficient compression method for feature maps with vast data sizes to support the CI paradigm was analyzed and presented through experiments. This method increases redundancy by applying feature map reordering to improve compression efficiency in traditional video codecs, and proposes a feature map method that improves compression efficiency and maintains the performance of machine tasks by simultaneously utilizing image compression format and video compression format. As a result of the experiment, the proposed method shows 14.29% gain in BD-rate of BPP and mAP compared to the feature compression anchor of MPEG-VCM.

Investigation of Turbulent Analysis Methods for CFD of Gas Dispersion Around a Building (건물주위의 가스 확산사고에 대한 CFD 난류 해석기법 검토)

  • Ko, Min Wook;Oh, Chang Bo;Han, Youn Shik;Do, Kyu Hyung
    • Fire Science and Engineering
    • /
    • v.29 no.5
    • /
    • pp.42-50
    • /
    • 2015
  • Three simulation approaches for turbulence were applied for the computation of propane dispersion in a simplified real-scale urban area with one building:, Large Eddy Simulation (LES), Detached Eddy Simulation (DES), and Unsteady Reynolds Averaged Navier-Stokes (RANS). The computations were performed using FLUENT 14, and the grid system was made with ICEM-CFD. The propane distribution depended on the prediction performance of the three simulation approaches for the eddy structure around the building. LES and DES showed relatively similar results for the eddy structure and propane distribution, while the RANS prediction of the propane distribution was unrealistic. RANS was found to be inappropriate for computation of the gas dispersion process due to poor prediction performance for the unsteady turbulence. Considering the computational results and cost, DES is believed to be the optimal choice for computation of the gas dispersion in a real-scale space.

Mathematical Modeling and Analysis for Water_Tree of Underground Cables (지중 케이블의 수트리에 대한 수학적 모델링 및 분석)

  • Lee, Jung-Woo;Oh, Yong-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.516-522
    • /
    • 2020
  • Water trees can cause considerable damage to the performance of underground cables. Theymay formwithin the dielectric used in buried or water-immersed high voltage cables. They grow in a bush-like or tree-like form, often taking decades before causing damage to a cable's performance. They are usually found on very old underground cables, often in an inaccessible place. It is costly and time-consuming to detect watertrees in underground cables. Tree detection technology, including mathematical modeling,can reduce the maintenance cost and time necessary for detecting these trees.To simulate detection of water trees in this study, a mathematical model ofan XLPE cable and a water tree were developed. The complex water tree structure was simplified, based on two identified patterns of aventedtree. A Matlab simulation was performed to calculate and analyze the capacitance and resistance of a cable insulation layer,based on growth of a watertree. Capacitance size increased about 0.025×10-13[Farads/mm] compared to normal when the tree area of the cable was advanced to 95% of the insulation layer. The resistance value decreased by about 0.5×1016[ohm/m]. These changesand changesshowninaBurkes paper physical modeling simulation are similar.The value of mathematical modeling for detecting water trees and damage to underground cables has been demonstrated.

Design and Implementation of National Language Ability Test System using Korean Style Internet-Based Test added Middle-Server (미들서버방식 한국형 IBT를 이용한 국가언어능력평가 시스템의 설계 및 구현)

  • Chang, Young-Hyun;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.185-192
    • /
    • 2011
  • The purpose of this paper is to propose the design and implementation of a korean style internet-based test system on the basis of efficiency and stability for middle server. The current assessment system has some unstable elements with regard to transmission procedure, cost, system load and stability. This paper proposes a series of activities for the performance improvement of korean style internet-based test system which finally produced various excellent results in the administration of expense control, human resources, and special operational affairs. The proposed system's technological factors using middle server have been tested through a basic simulation pilot system. Actual development procedure starts from the analysis required by improving the shortcomings of existing internet-based test systems. A efficiency comparison with existing system and newly developed system was made in the area of number of operators, abnormal processing, system maintenances. Korean style internet-based test system using middle server has shown great efficiency increased to the maximum of 2 times about the effectiveness of processing for various parts. The korean style internet-based test system using middle server have been given good evaluations with regard to the convenience of their use and the management system for operators and supervisors.

Development of Analytical Model to Predict the Inelastic Moment Capacity of Reinforced Concrete and Masonry Shear Wall (전단벽 구조물의 모멘트 저항능력에 관한 비탄성 해석모델개발)

  • 홍원기;이호범;변근주
    • Magazine of the Korea Concrete Institute
    • /
    • v.5 no.4
    • /
    • pp.123-134
    • /
    • 1993
  • A rapid progress has been made over last decade in the state-of-the-art earthquake structura1 engineering towards a better understanding of both the earthqauke ground motion and structural response. These efforts seek to ensure that there will be no serious injury or loss of life in the event of earthquake, and that structures can be built at minimum cost. The design of structures in general, concrete structures in particular, to resist strong ground input motions is not a simple matter, and analytical models for such structures must be developed from a design perspective that accounts for the complexities of the structural responses. The primary obj ective of earthquake structural engineering research is to ensure the safety of structures by understanding and improving a design methodology. Ideally, this would require the development of an analytical model related to a design methodology that ensures a ductile performance. For the accurate assessment of the adequacy of analytically developed model, experiments conducted to study the inplane inelastic cyclic behavior of structures should verify the analytical approach. The fundamental goal of this paper is to present and demonstrate experimentally verified analytical methods that provide the adequate degree of safety and confidience in the behavior of reinforced concrete structural components. This study further attempts to extend the developed modeling techruque for use by practicing structural engineers for both the analysis and design.Plication of the relaxed diaphragm through left thoracotomy was done and result was excellent as seen on Fig. 5. Cause of eventration of the left hemidiaphragm was due to paralysis of the left phrenic nerve which was tested during thoracotomy.

Comparison and Analysis of Information Exchange Distributed Algorithm Performance Based on a Circular-Based Ship Collision Avoidance Model (원형 기반 선박 충돌 피항 모델에 기반한 정보 교환 분산알고리즘 성능 비교 분석)

  • Donggyun Kim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.401-409
    • /
    • 2023
  • This study compared and analyzed the performance of a distributed area search algorithm and a distributed probability search algorithm based on information exchange between ships. The distributed algorithm is a method that can search for an optimal avoidance route based on information exchange between ships. In the distributed area search algorithm, only a ship with the maximum cost reduction among neighboring ships has priority, so the next expected location can be changed. The distributed stochastic search algorithm allows a non-optimal value to be searched with a certain probability so that a new value can be searched. A circular-based ship collision avoidance model was used for the ship-to-ship collision avoidance experiment. The experimental method simulated the distributed area search algorithm and the distributed stochastic search algorithm while increasing the number of ships from 2 to 50 that were the same distance from the center of the circle. The calculation time required for each algorithm, sailing distance, and number of message exchanges were compared and analyzed. As a result of the experiment, the DSSA(Distributed Stochastic Search Algorithm) recorded a 25%calculation time, 88% navigation distance, and 84% of number of message exchange rate compared to DLSA.

Architectural Refactoring of Real-Time Software Design for Predictable Controls of Artificial Heart (인공심장의 예측 가능한 제어를 위한 실시간 소프트웨어 설계 구조의 개선)

  • Jeong, Se-Hun;Kim, Hee-Jin;Park, Sang-Soo;Cha, Sung-Deok
    • The KIPS Transactions:PartA
    • /
    • v.18A no.6
    • /
    • pp.271-280
    • /
    • 2011
  • Time-Triggered Architecture (TTA), one of real-time software design paradigms which executes tasks in timely manner, has long been advocated as being better suited in fore-sighting system behavior than event-triggered architecture (ETA). To gain this valuable feature of TTA, however, precise task designing process is mandatory. Alternatively, ETA tries to execute tasks whenever paired events are occurred. It provides intuitive and flexible basement to add/remove tasks and, moreover, better response time performance. However ETA is difficult to analyze because system behavior might be different depending on the order of interrupts detected by the system. Many previous researches recommended TTA when developing safety-critical real-time systems, but cost problem of task designing process and insufficient consensus for applying rigorous software engineering practice are still challenging in practice. This paper describes software refactoring process which applying TTA approach into ETA based embedded software in artificial heart system. We implemented dedicated interrupt monitoring program to capture existing tasks' real-time characteristics. Based on the captured information, proper task designing process is done. Real-time analysis using RMA (Rate-Monotonic Analysis) verified that new design guarantees timeliness of the system. Empirical experiments revealed that revised design is as efficient, when measured in terms of system's external output, as the old design and enhances predictability of the system behavior as well.

Performance Comparison between Random CA Group Authentication and Home CA Authentication in Mobile Ad hoc Network (모바일 애드혹 네트워크에서 임의의 CA 그룹을 이용한 이동노드의 인증과 홈 CA를 이용한 인증방법의 성능 비교)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.40-48
    • /
    • 2008
  • Security of self organized mobile ad hoc networks is an important issue because administration information in the networks is managed by the constituent nodes. Especially authentication mechanism is necessary for trust setup between newly joining nodes and the network. The authentication models and protocols which are based on the wireline infrastructure could not be practical for mobile ad hoc network. Although public key algorithm-based method is widely used for authentication, it is not easy to be applied to mobile ad hoc networks because they do not have infrastructure such as centralized CA which is needed for certificate verification. In this paper, we consider the public key based random CA group method proposed in [1] to provide efficient authentication scheme to mobile ad hoc networks and analyze the performance of the method, which is then compared to the home CA method. From the analysis results, we see that the random CA method where the function of CA is distributed to some mobile nodes and the authentication information is propagated to randomly chosen CAs shows higher reliability and lower cost than home CA method.