• Title/Summary/Keyword: Web Storage

Search Result 346, Processing Time 0.026 seconds

A Optimized Design on IP-Networked Storage for I/O-intensive application (I/O-intensive 애플리케이션의 IP 네트워크 기반 스토리지의 최적 설계)

  • Shin, Young-Ho;Han, Sung-Geun;Kim, Kyu-Seok;Kim, Joo-Yeong;Park, Nam-Kyu;Lee, Hyuk-ro
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1628-1631
    • /
    • 2015
  • 웹을 통한 다수의 정보서비스와 전산자원을 공동으로 활용하는 경우에 있어서는, 구성자원에 대한 통합과 공동 활용이 상당히 중요한 요소이다. 일반적으로 웹 서비스를 위한 구성요소로서는 Web, WAS, 데이터베이스, 검색엔진 등의 다양한 소프트웨어를 통합, 운영하게 된다. 또한, 투입비용에 대한 효과적인 측면과 서비스 연속성 측면에서 서버의 공유 및 공유 스토로지에 대한 요구를 피할 수 없게 된다. 본 논문에서는 전체적인 서비스의 성능에 커다란 영향을 미치는 Back-end Tier의 검색서버를 통하여, IP 네트워크 기반의 스토리지 I/O에 대한 성능측정을 수행하였고, 그 성능실험의 결과에 따라 해당 애플리케이션에 최적의 스토리지 설계하고, 애플리케이션의 특성별로 최적의 스토리지를 할당하여 정보서비스의 전체적인 성능향상을 이루었다.

Metadata System for XML-based ECG Management Supporting Interoperability (상호연동성을 지원하는 XML기반의 심전도 데이터 관리를 위한 메타데이터 시스템)

  • Koo, Heung-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.6
    • /
    • pp.704-709
    • /
    • 2006
  • In this study, we suggest the effective storage structure and management method for XML-based electrocardiography(ECG) data to support the interoperability between medical information systems, and implement the metadata system of ECG data providing the web-based information service. ECG matadata management system include functions for storing and managing as well as reporting PDF service of ECG data. We analyzed a characteristics of the data and access patterns for XML-based ECG and then used the non-partitioning storing method and indexing the extracted metadata from the HL7 aECC for supporting the quick search. We, using the template mechanism, converts the XML-based results data into various formats in order to provide services of the ECG reporting.

Composition and Analysis of Linear Component Counting based Multiple Indexing (직선성분 계수 기반 다중 인덱싱 구성 및 분석)

  • Park, Je-Ho;Lim, Sang-Min
    • Journal of the Semiconductor & Display Technology
    • /
    • v.9 no.3
    • /
    • pp.17-21
    • /
    • 2010
  • As the compact and easily accessible handheld devices, such as cellular phones and MP3 players equipped with image acquisition functionality, are becoming widely available among common users, various applications of images are rapidly increasing. Image related services and software such as web-based image presentation and image manipulation for personal or commercial purpose enable users to view contents of remote image archive and to manipulate enormous amount of images in local or network based storage as well. It is necessary for users to identify the images efficiently so that the same images are perceived as one physical entity instead of recognizing them as different images as the trends are getting stronger. In order to support this environment, we propose a method that generates image identifiers or indexing for images within a solid and efficient manner. The proposed image identifier utilizes multiple index values. The integration of component index values creates a unique composite value that can be used as a file name, file system identifier, or database index. Our experimental results on generation of constituent index values have shown favorable results.

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

Research Trends Analysis of Big Data: Focused on the Topic Modeling (빅데이터 연구동향 분석: 토픽 모델링을 중심으로)

  • Park, Jongsoon;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.1-7
    • /
    • 2019
  • The objective of this study is to examine the trends in big data. Research abstracts were extracted from 4,019 articles, published between 1995 and 2018, on Web of Science and were analyzed using topic modeling and time series analysis. The 20 single-term topics that appeared most frequently were as follows: model, technology, algorithm, problem, performance, network, framework, analytics, management, process, value, user, knowledge, dataset, resource, service, cloud, storage, business, and health. The 20 multi-term topics were as follows: sense technology architecture (T10), decision system (T18), classification algorithm (T03), data analytics (T17), system performance (T09), data science (T06), distribution method (T20), service dataset (T19), network communication (T05), customer & business (T16), cloud computing (T02), health care (T14), smart city (T11), patient & disease (T04), privacy & security (T08), research design (T01), social media (T12), student & education (T13), energy consumption (T07), supply chain management (T15). The time series data indicated that the 40 single-term topics and multi-term topics were hot topics. This study provides suggestions for future research.

A study on Partition Allocation Techniques of iATA-based Virtual Storage (iATA 기반의 가상 스토리지 파티션 할당 기법에 관한 연구)

  • Park, Sungjin;Chun, Jooyoung;Lim, Hyotaek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.68-71
    • /
    • 2009
  • iATA(Internet Advanced Technology Attachment)는 TCP/IP 네트워크를 통해 원격의 대용량의 가상 저장 공간을 자신의 로컬 디스크 처럼 활용이 가능하게 하는 기술로 이는 모바일 기기(PDA, 휴대폰 등)와 같은 저장 공간의 부족문제를 가지고 있는 장치에 적용하여 저장 공간의 부족 문제를 근본적으로 해결할 수 있는 솔루션이라 할 수 있다. iATA는 SCSI 하드디스크가 장착된 시스템에서만 서버를 구축해야만 하는 iSCSI와는 달리 일반 가정이나 사무실에서 주로 사용하는 ATA 하드 디스크에도 서버 구축이 가능한 확장성을 가지고 있으며 이는 iATA의 최대 장점 중 하나라 할 수 있다. 또한, Web 사이트를 통해 많은 사람들이 iATA 서비스를 이용하여 자신의 모바일 기기에서의 저장공간 문제를 극복할 수 있으며, 최근 사회 문제로 크게 대두되고 있는 개인 정보 유출의 폐해를 막기 위해 개인 인증시 OpenSSL과 MD5를 이용한 보안/암호화 기법을 사용하여 개인 정보 유출에 의한 불이익 및 개인 정보 악용으로 인한 범죄를 막을 수 있다. 하지만, 기존의 iATA상에서는 디스크 관리가 서버에서만 가능하다는 문제점이 있다. 즉, 사용자만의 개인공간을 가질 수가 없다. 이처럼 개인 사진이나, 다이어리같은 정보들을 관리 할 수 없는 문제점을 해결하기 위해 클라이언트에서 자신만의 디스크 공간을 가질 수 있게 파티션을 할당해주고, 그 공간을 클라이언트만의 공간으로 만들어 주는 기술을 개발하는데 그 목적이 있다.

  • PDF

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

Design of Mixed Reality Visualization System for Operational Situation Using Cloud-based Geospatial Information (클라우드 기반 지리공간정보를 활용한 작전상황 혼합현실 가시화 시스템 설계)

  • Youngchan Jang;Jaeil Park;Eunji Cho;Songyun Kwak;Sang Heon Shin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.1
    • /
    • pp.60-69
    • /
    • 2024
  • The importance of geospatial information is increasingly highlighted in the defense domain. Accurate and up-to-date geospatial data is essential for situational awareness, target analysis, and mission planning in millitary operations. The use of high-resolution geospatial data in military operations requires large storage and fast image processing capabilities. Efficient image processing is required for tasks such as extracting useful information from satellite images and creating 3D terrain for mission planning, In this paper, we designed a cloud-based operational situation mixed reality visualization system that utilizes large-scale geospatial information distributed processed on a cloud server based on the container orchestration platform Kubernetes. We implemented a prototype and confirmed the suitability of the design.

Remote Control of Network-Based Modular Robot (네트웍 기반 모듈라 로봇의 원격 제어)

  • Yeom, Dong-Joo;Lee, Bo-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.77-83
    • /
    • 2018
  • A modular robot that memorizes motion can be easily created and operated because it expresses by hand. However, since there is not enough storage space in the module to store the user-created operation, it is impossible to reuse the created operation, and when the modular robot again memorizes the operation, it changes to another operation. There is no main controller capable of operating a plurality of modular robots at the same time, and thus there is a disadvantage that the user must input directly to the modular robot. To overcome these disadvantages, a remote controller has been proposed that can be operated in the surrounding smart devices by designing web server and component based software using wired and wireless network. In the proposed method, various types of structures are created by connecting to a modular robot, and the reconstructed operation is performed again after storing, and the usefulness is confirmed by regenerating the stored operation effectively. In addition, the reliability of the downloaded trajectory data is verified by analyzing the difference between the trajectory data and the actual trajectory. In the future, the trajectory stored in the remote controller will be standardized using the artificial intelligence technique, so that the operation of the modular robot will be easily implemented.

A Study on Research Data Management Services of Research University Libraries in the U.S. (대학도서관의 연구데이터관리서비스에 관한 연구 - 미국 연구중심대학도서관을 중심으로 -)

  • Kim, Jihyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.3
    • /
    • pp.165-189
    • /
    • 2014
  • This study examined the current practices of Research Data Management (RDM) services recently built and implemented at research university libraries in the U.S. by analyzing the components of the services and the contents presented in their web sites. The study then analyzed the content of web pages describing the services provided by 31 Research Universities/Very High research activity determined based on the Carnegie Classification. The analysis was based on 9 components of the services suggested by previous studies, including (1) DMP support; (2) File organization; (3) Data description; (4) Data storage; (5) Data sharing and access; (6) Data preservation; (7) Data citation; (8) Data management training; (9) Intellectual property of data. As a result, the vast majority of the universities offered the service of DMP support. More than half of the universities provided the services for describing and preserving data, as well as data management training. Specifically, RDM services focused on offering the guidance to disciplinary metadata and repositories of relevance, or training via individual consulting services. More research and discussion is necessary to better understand an intra- or inter-institutional collaboration for implementing the services and knowledge and competency of librarians in charge of the services.