• Title/Summary/Keyword: Tier system

Search Result 343, Processing Time 0.027 seconds

Designing of Multi-tier GIS Architecture for Distributed Network Environment

  • Nie, Yoshinori;Nakamura, Morikazu;Miyagi, Hayao;Onaga, Kenji
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.541-544
    • /
    • 2000
  • This paper presents a multitier GIS architecture to adapt to large-scale distributed networks and to improve data transfer performance with intelligent caching technique. We design this system using UML based on object-oriented analysis. We show some advantages in our proposed system against the ordinary GIS, in special, suitability to distributed networks.

  • PDF

Estimation of Domestic Greenhouse Gas Emission of Refrigeration and Air Conditioning Sector adapting 2006 IPCC GL Tier 2b Method (국내 냉동 및 냉방부문 온실가스 배출량 산정 - 2006 IPCC GL Tier 2b 적용 -)

  • Shin, Myung-Hwan;Lyu, Young-Sook;Seo, Kyoung-Ae;Lee, Sue-Been;Lim, Cheolsoo;Lee, Sukjo
    • Journal of Climate Change Research
    • /
    • v.3 no.2
    • /
    • pp.117-128
    • /
    • 2012
  • The Government of South Korea has continued its effort to fixate virtuous circle of economic growth and climate change response to cope with international demands and pressure to commitment for greenhouse gas reduction effectively. Nationally, Korean Government has established "Enforcement of the Framework Act on Low carbon, Green Growth"(2010. 4. 13) to implement national mid-term GHG mitigation goal(30% reduction by 2020 compare to BAU), which established the foundation for phased GHG mitigation by setting up the sectoral and industrial goal, adopting GHG and Energy Target Management System. Also, follow-up measures are taken such as planning and control of mid-term and short-term mitigation target by detailed analysis of potential mitigation of sector and industry, building up the infrastructure for periodic and systematic analysis of target management. Likewise, it is required to establish more accurate, reliable and detailed sectoral GHG inventory for successfully establishment and implement the frame act. In comparison to the $CO_2$ emission, Especially fluorinated greenhouse gases (HFCs, PFCs, $SF_6$) are lacking research to build the greenhouse gas inventories to identify emissions sources and collection of the applicable collection activities data. In this study, with the refrigeration and air conditioning sector being used to fluorine refrigerant(HFCs) as the center, greenhouse gas emission estimation methodology for evaluating the feasibility of using this methodology look over and mobile air conditioning, fixed air conditioning, household refrigeration equipment, commercial refrigeration equipment for the greenhouse gas emissions were calculated. First look at in terms of methodology, refrigeration and air conditioning sector GHG emissions in developing country-specific emission factors and activity data of the industrial sector the construction of the DB is not enough, it's 2006 IPCC Guidelines Tier 2a (emission factor approach) rather than the Tier 2b (mass balance approach) deems appropriate, and each detail by process, sectoral activity data more accurate, if DB is built Tier 2a (emission factor approach) can be applied will also be judged. Refrigeration and air conditioning sector in 2009 due to the use of refrigerant greenhouse gas emissions ($CO_2eq.$) assessment results, portable air conditioner 1,974,646 ton to year, fixed-mount air conditioner 1,011,754 ton to year, household refrigeration unit 4,396 ton to year, commercial refrigeration equipment 1,263 ton to year was estimated to total 2,992,037 tons.

Interference and Capacity Approximation using Riemann-Zeta Function in Multi-Tier CDMA Cellular Systems (다중 셀 CDMA 셀룰라 시스템에서 Riemann-Zeta 함수를 이용한 간섭과 용량 근사식)

  • 김호준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7A
    • /
    • pp.503-510
    • /
    • 2003
  • In CDMA cellular system, because all users share the frequency resource the signals of other user becomes interference which influences the communication quality. The system capacity defined the number of connected users within a cell is determined by the amount of interference, therefore the exact estimation of interference is important to system performance evaluation. In this paper, we propose an approximated function which calculates other cell interference in terms of Riemann-Zeta function in CDMA cellular systems, and compare with simulation results in other to verify its usefulness. The upper and lower bounds of system capacity calculated with the proposed approximated function gives almost alike result with the simulation. The proposed interference bounds are useful to calculate system capacity and to evaluate some algorithm in a hierarchical cellular systems where various propagation environments are mixed.

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

Partial Offloading System of Multi-branch Structures in Fog/Edge Computing Environment (FEC 환경에서 다중 분기구조의 부분 오프로딩 시스템)

  • Lee, YonSik;Ding, Wei;Nam, KwangWoo;Jang, MinSeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1551-1558
    • /
    • 2022
  • We propose a two-tier cooperative computing system comprised of a mobile device and an edge server for partial offloading of multi-branch structures in Fog/Edge Computing environments in this paper. The proposed system includes an algorithm for splitting up application service processing by using reconstructive linearization techniques for multi-branch structures, as well as an optimal collaboration algorithm based on partial offloading between mobile device and edge server. Furthermore, we formulate computation offloading and CNN layer scheduling as latency minimization problems and simulate the effectiveness of the proposed system. As a result of the experiment, the proposed algorithm is suitable for both DAG and chain topology, adapts well to different network conditions, and provides efficient task processing strategies and processing time when compared to local or edge-only executions. Furthermore, the proposed system can be used to conduct research on the optimization of the model for the optimal execution of application services on mobile devices and the efficient distribution of edge resource workloads.

A Study on How to Build a Disaster Recovery System that can Minimize Recovery Time Objective(RTO) and Recovery Point Objective(RPO) to Ensure Business Continuity (비즈니스 연속성 보장을 위한 복구 시간 목표(RTO) 및 복구 지점 목표(RPO)를 최소화할 수 있는 재해복구시스템 구축 방안 연구)

  • Kang, Hyun-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.91-99
    • /
    • 2021
  • In the current business environment where dependence on IT has increased rapidly, the risk from disasters or cyber-attacks is also increasing. Business continuity, the ability to continue to provide service in the event of a business disruption caused by a disaster, is essential. In other words, you need to have a plan in place to keep your core business functions uninterrupted with rapid recovery within a predetermined Recovery Time Objective (RTO) and Recovery Point Objective (RPO) time frame. In this paper, we propose a disaster recovery system construction method that can minimize RTO and RPO to ensure business continuity. The system configuration adopts Tier 7 disaster recovery model, synchronous storage replication, hot disaster recovery site, and operation management automation solution. This ensures continuity of core business with virtually no data loss and minimal RTO and RPO.

A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks

  • Zhang, Bo;Huang, Kai-zhi;Chen, Ya-jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2595-2618
    • /
    • 2018
  • In this paper, we investigate secure communication with the presence of multiple eavesdroppers (Eves) in a two-tier downlink dense heterogeneous network, wherein there is a macrocell base station (MBS) and multiple femtocell base stations (FBSs). Each base station (BS) has multiple users. And Eves attempt to wiretap a macrocell user (MU). To keep Eves ignorant of the confidential message, we propose a physical-layer security scheme based on cross-layer cooperation to exploit interference in the considered network. Under the constraints on the quality of service (QoS) of other legitimate users and transmit power, the secrecy rate of system can be maximized through jointly optimizing the beamforming vectors of MBS and cooperative FBSs. We explore the problem of maximizing secrecy rate in both non-colluding and colluding Eves scenarios, respectively. Firstly, in non-colluding Eves scenario, we approximate the original non-convex problem into a few semi-definite programs (SDPs) by employing the semi-definite relaxation (SDR) technique and conservative convex approximation under perfect channel state information (CSI) case. Furthermore, we extend the frame to imperfect CSI case and use the Lagrangian dual theory to cope with uncertain constraints on CSI. Secondly, in colluding Eves scenario, we transform the original problem into a two-tier optimization problem equivalently. Among them, the outer layer problem is a single variable optimization problem and can be solved by one-dimensional linear search. While the inner-layer optimization problem is transformed into a convex SDP problem with SDR technique and Charnes-Cooper transformation. In the perfect CSI case of both non-colluding and colluding Eves scenarios, we prove that the relaxation of SDR is tight and analyze the complexity of proposed algorithms. Finally, simulation results validate the effectiveness and robustness of proposed scheme.

Management System of On-line Mode Client-cluster (온라인 모드 클라이언트-클러스터 운영 시스템)

  • 박제호;박용범
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.4 no.2
    • /
    • pp.108-113
    • /
    • 2003
  • Research results have demonstrated that conventional client-server databases have scalability problem in the presence of many concurrent clients. The multi-tier architecture that exploits similarities in clients' object access behavior partitions clients into logical clusters according to their object request pattern. As a result, object requests that are served inside the clusters, server load and request response time can be optimized. Management of clustering by utilizing clients' access pattern-based is an important component for the system's goal. Off-line methods optimizes the quality of the global clustering, the necessary cost and clustering schedule needs to be considered and planned carefully in respect of stable system's performance. In this paper, we propose methods that detect changes in access behavior and optimize system configuration in real time. Finally this paper demonstrates the effectiveness of on-line change detection and results of experimental investigation concerning reconfiguration.

  • PDF

State-of-the-art 3D GIS: System Development Perspectives

  • Kim, Kyong-Ho;Lee, Ki-Won;Lee, Jong-Hun;Yang, Young-Kyu
    • Proceedings of the KSRS Conference
    • /
    • 1998.09a
    • /
    • pp.153-158
    • /
    • 1998
  • Since the mid-1990′s, researches on 3D GIS have been regarded as one of main issues both in the academic sites and commercial vendors; recently, some prototyped systems or the first versioned software systems of commercial basis are being reported and released. Unlike conventional 2D GIS, which consists in intelligent structured GIS or desktop GIS, every 3D GIS has its own distinguished features according to data structure-supporting capability, GIS-styled functionality, external database accessibility, interfacing extents with 2D GIS, 3D visualization/texture mapping ability, and so forth. In this study, technical aspects related to system development, SERI-Web3D GIS ver. 1.2, are explained. Main features in this revised 3D GIS can be summarized: 2-tier system model(client-server), VGFF(Virtual GIS File Format), internal GIS import, Feature manager(zoning, layering, visualization evironment), Scene manager(manage 3D geographic world), Scene editor, Spatial analyzer(Intersect, Buffering, Network analysis), VRML exporter. While, most other 3D GISes or cartographic mapping systems may be categorized into 3D visualization systems handling terrain height-field processing, 2D GIS extension modules, or 3D geometric feature generation system using orthophoto image: actually, these are eventually considered as several parts of "real 3D GIS". As well as these things, other components, especially web-based 3D GIS, are being implemented in this study: Surface/feature integration, Java/VRML linkage, Mesh/Grid problem, LOD(Level of Detail)/Tiling, Public access security problem, 3-tier architecture extension, Surface handling strategy for VRML.

  • PDF