• Title/Summary/Keyword: Request pattern

Search Result 87, Processing Time 0.055 seconds

Analysis of time-series user request pattern dataset for MEC-based video caching scenario (MEC 기반 비디오 캐시 시나리오를 위한 시계열 사용자 요청 패턴 데이터 세트 분석)

  • Akbar, Waleed;Muhammad, Afaq;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.24 no.1
    • /
    • pp.20-28
    • /
    • 2021
  • Extensive use of social media applications and mobile devices continues to increase data traffic. Social media applications generate an endless and massive amount of multimedia traffic, specifically video traffic. Many social media platforms such as YouTube, Daily Motion, and Netflix generate endless video traffic. On these platforms, only a few popular videos are requested many times as compared to other videos. These popular videos should be cached in the user vicinity to meet continuous user demands. MEC has emerged as an essential paradigm for handling consistent user demand and caching videos in user proximity. The problem is to understand how user demand pattern varies with time. This paper analyzes three publicly available datasets, MovieLens 20M, MovieLens 100K, and The Movies Dataset, to find the user request pattern over time. We find hourly, daily, monthly, and yearly trends of all the datasets. Our resulted pattern could be used in other research while generating and analyzing the user request pattern in MEC-based video caching scenarios.

Worst Case Timing Analysis for DMA I/O Requests in Real-time Systems (실시간 시스템의 DMA I/O 요구를 위한 최악 시간 분석)

  • Hahn Joosun;Ha Rhan;Min Sang Lyul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.4
    • /
    • pp.148-159
    • /
    • 2005
  • We propose a technique for finding the worst case response time (WCRT) of a DMA request that is needed in the schedulability analysis of a whole real-time system. The technique consists of three steps. In the first step, we find the worst case bus usage pattern of each CPU task. Then in the second step, we combine the worst case bus usage pattern of CPU tasks to construct the worst case bus usage pattern of the CPU. This second step considers not only the bus requests made by CPU tasks individually but also those due to preemptions among the CPU tasks. finally, in the third step, we use the worst case bus usage pattern of the CPU to derive the WCRT of DMA requests assuming the fixed-priority bus arbitration protocol. Experimental results show that overestimation of the DMA response time by the proposed technique is within $20\%$ for most DMA request sizes and that the percentage overestimation decreases as the DMA request size increases.

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

A Self-Learning based Adaptive Clustering in a Wireless Internet Proxy Server Environment (무선 인터넷 프록시 서버 환경에서 자체 학습 기반의 적응적 클러스터렁)

  • Kwak Hu-Keun;Chung Kyu-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.7
    • /
    • pp.399-412
    • /
    • 2006
  • A clustering based wireless internet proxy server with cooperative caching has a problem of minimizing overall performance because some servers become overloaded if client request pattern is Hot-Spot or uneven. We propose a self-learning based adaptive clustering scheme to solve the poor performance problems of the existing clustering in case of Hot-Spot or uneven client request pattern. In the proposed scheme, requests are dynamically redistributed to the other servers if some servers supposed to handle the requests become overloaded. This is done by a self-learning based method based dynamic weight adjustment algorithm so that it can be applied to a situation with even various request pattern or a cluster of hosts with different performance. We performed experiments in a clustering environment with 16 PCs and a load balancer. Experimental results show the 54.62% performance improvement of the proposed schemes compared to the existing schemes.

A Peak Load Control-Based Worker-Linker Pattern for Stably Processing Massive I/O Transactions (안정적인 대용량 I/O거래 처리를 위한 Peak Load Control(PLC) 기반의 Worker-Linker 패턴)

  • Lee, Yong-Hwan;Min, Dug-Ki
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.5
    • /
    • pp.312-325
    • /
    • 2006
  • Integration applications, such as EAI, B2Bi, need stable massive data processing systems during overload state cause by service request congestion in a short period time. In this paper, we propose the PLC (Peak Load Control)-based Worker-Linker pattern, which can effectively and stably process massive I/O transactions in spite of overload state generated by service request congestion. This pattern uses the delay time algorithm for the PLC mechanism. In this paper, we also show the example of applying the pattern to business-business integration framework and the experimental result for proving the stability of performance. According to our experiment result, the proposed delay time algorithm can stably control the heavy overload after the saturation point and has an effect on the controlling peak load.

Performance Analysis of VoIP Services in Mobile WiMAX Systems with a Hybrid ARQ Scheme

  • So, Jaewoo
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.510-517
    • /
    • 2012
  • This paper analyzes the performance of voice-over-Internet protocol (VoIP) services in terms of the system throughput, the packet delay, and the signaling overhead in a mobile WiMAX system with a hybrid automatic repeat request (HARQ) mechanism. Furthermore, a queueing analytical model is developed with due consideration of adaptive modulation and coding, the signaling overhead, and the retransmissions of erroneous packets. The arrival process is modeled as the sum of the arrival rate at the initial transmission queue and the retransmission queue, respectively. The service rate is calculated by taking the HARQ retransmissions into consideration. This paper also evaluates the performance of VoIP services in a mobile WiMAX system with and without persistent allocation; persistent allocation is a technique used to reduce the signaling overhead for connections with a periodic traffic pattern and a relatively fixed payload. As shown in the simulation results, the HARQ mechanism increases the system throughput as well as the signaling overhead and the packet delay.

Video Quality Control Scheme for Efficient Bandwidth Utilization of HTTP Adaptive Streaming in a Multiple-Clients Environment (다중 클라이언트 환경에서 HTTP 적응적 스트리밍의 효율적인 대역폭 활용을 위한 비디오 품질 조절 기법)

  • Kim, Minsu;Kim, Heekwang;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.45 no.1
    • /
    • pp.86-93
    • /
    • 2018
  • When multiple clients share bandwidth and receive a streaming service, HTTP Adaptive Streaming has a problem in that the bandwidth is measured inaccurately due to the ON-OFF pattern of the segment request. To solve the problem caused by the ON-OFF pattern, the proposed PANDA (Probe AND Adapt) determines the quality of the segment to be requested while increasing the target bandwidth. However, since the target bandwidth is increased by a fixed amount, there is a problem in low bandwidth utilization and a slow response to changes in bandwidth. In this paper, we propose a video quality control scheme that improves the low bandwidth utilization and slow responsiveness of PANDA. The proposed scheme adjusts the amount of increase in the target bandwidth according to the bandwidth utilization after judging the bandwidth utilization by comparing the segment download time and the request interval. Experimental results show that the proposed scheme can fully utilize the bandwidth and can quickly respond to changes in bandwidth.

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

On the Cautious blasting pattern of Weak zone of NAMSAN NO. twin Tunneling (남산1호터널 쌍굴 굴진공사 정밀발파 작업에 대한 안전도검토)

  • Huh, Ginn
    • Explosives and Blasting
    • /
    • v.8 no.4
    • /
    • pp.3-22
    • /
    • 1990
  • The $\varphi{4.5}$ meters pilot tunneling work is almost done to the $\varphi{11.3}$ meters twin tunnel of NAM SAN No1. The south side pit of 400 meters is weak zone of Rock status, so client request us to allow the cautious blasting pattern for drilling on the condition of 0.2 kine vibration allowance limited for the safety of side running tunnel. The pattern of cautious blasting carried out by 6 time divided fiving on the round drilling depth of 1.20 meters(1.10) and also applied control blasting method with line drilling due to the reduction of vibration.

  • PDF

Flow Pattern Analysis of Artificial Valves Using High Speed Camera and Image Processing Technique (고속 사진기와 영상처리 기법을 이용한 인공판막의 흐름 분석.)

  • Lee, Dong-Hyeok;Kim, Hee-Chan;Seo, Soo-Won;Min, Byoung-Goo
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1993 no.11
    • /
    • pp.81-84
    • /
    • 1993
  • Artificial Heart Valve is the one of the most important artificial organ which has been implanted to many patients. The most important problems related to the artificial heart valve prosthesis are thrombosis and hemolysis. Usual method to test against this problem in vivo experiment, which is complex and hard work. Nowadays the request for In vitro Artificial Heart Valve testing system is increasing. Several papers has announced us flow pattern of Artificial Heart Valve is highly correlated with thrombosis and hemolysis. They usually gel flow pattern by LDA, it is also hard work and has narrow measuring region. In this reason we have determined to develop PTV(Particle Tracking Velocimetry). By using High-speed camera and image processing technique, flow pattern could be relatively easily obtained. Parachute and Bileaflet Artificial Heart Valve designed by SNU were testified.

  • PDF