• Title/Summary/Keyword: data memory

Search Result 3,343, Processing Time 0.03 seconds

Implementation of a Cluster VOD Server and an Embedded Client based on Linux (리눅스 기반의 클러스터 VOD서버와 내장형에 클라이언트의 구현)

  • Seo Dongmahn;Bang Cheolseok;Lee Joahyoung;Kim Byounggil;Jung Inbum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.435-447
    • /
    • 2004
  • For VOD systems, it is important to provide QoS to more users under the limited resources. To analyze QoS issues in real environment, we implement clustered VOD server and embedded client system based on the Linux open source platform. The parallel processing of MPEG data, load balancing for nodes and VCR like functions are implemented in the server side. To provide more user friendly interface, the general TV is used for a VOD client's terminal and the embedded board is used supporting for VCR functions. In this paper, we measure the performance of the implemented VOD system under the various user requirement features and evaluate the sources of performance limitations. From these analyses, we propose the dynamic admission control method based on the availability memory and network bandwidth. The proposed method enhances the utilization of the system resource for the more QoS media streams.

An Efficient and Secure Query Processing on Valid XML Streams (유효한 XML 스트링에 대한 효율적이고 안전한 질의 처리)

  • Byun, Chang-Woo;An, Eun-Ju;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.235-246
    • /
    • 2009
  • As demands intending to treat an access control on a client side that was conventionally controlled at a server are surged. it needs a way to treat query processing in effective and secure manners in an environment that has limited resources. Because the access control having been previously performed was only focused on safety, there was little effort to consider the access control in terms of efficiency. Researches about security including access control are started as the security issues are cropped up in a recent stream environment. This paper proposes a method for efficient and secure query processing of XML data streams like a PDA and a portable terminal at the client that is in limited resources. Specifically, this study suggests (1) an access control processing that possesses small overhead for attaining a secure result in a limited memory and (2) a way to enhance the performance, finding the parts being capable of optimizing in each processing step for offsetting the overhead caused by an addition of the access control processing. Superiority of the new method was analyzed by experiment.

Improving Search Performance of Tries Data Structures for Network Filtering by Using Cache (네트워크 필터링에서 캐시를 적용한 트라이 구조의 탐색 성능 개선)

  • Kim, Hoyeon;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.6
    • /
    • pp.179-188
    • /
    • 2014
  • Due to the tremendous amount and its rapid increase of network traffic, the performance of network equipments are becoming an important issue. Network filtering is one of primary functions affecting the performance of the network equipment such as a firewall or a load balancer to process the packet. In this paper, we propose a cache based tri method to improve the performance of the existing tri method of searching for network filtering. When several packets are exchanged at a time between a server and a client, the tri method repeats the same search procedure for network filtering. However, the proposed method can avoid unnecessary repetition of search procedure by exploiting cache so that the performance of network filtering can be improved. We performed network filtering experiments for the existing method and the proposed method. Experimental results showed that the proposed method could process more packets up to 790,000 per second than the existing method. When the size of cache list is 11, the proposed method showed the most outstanding performance improvement (18.08%) with respect to memory usage increase (7.75%).

Design And Implementation of Linux Based Parallel Media Stream Server System (리눅스 기반의 고성능 병렬 미디어 스트림 서버 설계 및 구현)

  • 김서균;김경훈;류재상;남지승
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.287-292
    • /
    • 2001
  • Multimedia service systems should have efficient capacity to serve the growing clients and new data. In the general streaming services, users can endure the small amount of time delay at the beginning of service. But they want to have good quality of service. A streaming server tries to transfer video files to clients from a repository of files in real time. The server must guarantee concurrent and uninterrupted delivery of each video stream requested from clients. To achieve its purpose, many stream servers adopt multi-processors, sufficient memory, and RAID or SAN in their systems. In this paper, we propose a Linux-based parallel media streaming server. It is superior to the other systems in the storing structure, fault-tolerance, and service capacity. Since this system supports the web interlace, users can operate easily through the www. This system uses unique striping policy to distribute multimedia files into the parallel storage nodes. If a service request occurs, each storage node transmits striped files concurrently to the client. Its performance is better than the single media streaming service because of the parallel architecture.

  • PDF

Influence of Lead on Repetitive Behavior and Dopamine Metabolism in a Mouse Model of Iron Overload

  • Chang, JuOae;Kueon, Chojin;Kim, Jonghan
    • Toxicological Research
    • /
    • v.30 no.4
    • /
    • pp.267-276
    • /
    • 2014
  • Exposures to lead (Pb) are associated with neurological problems including psychiatric disorders and impaired learning and memory. Pb can be absorbed by iron transporters, which are up-regulated in hereditary hemochromatosis, an iron overload disorder in which increased iron deposition in various parenchymal organs promote metal-induced oxidative damage. While dysfunction in HFE (High Fe) gene is the major cause of hemochromatosis, the transport and toxicity of Pb in Hfe-related hemochromatosis are largely unknown. To elucidate the relationship between HFE gene dysfunction and Pb absorption, H67D knock-in Hfe-mutant and wild-type mice were given drinking water containing Pb 1.6 mg/ml ad libitum for 6 weeks and examined for behavioral phenotypes using the nestlet-shredding and marble-burying tests. Latency to nestlet-shredding in Pb-treated wild-type mice was prolonged compared with non-exposed wild-types (p < 0.001), whereas Pb exposure did not alter shredding latency in Hfe-mutant mice. In the marble-burying test, Hfe-mutant mice showed an increased number of marbles buried compared with wild-type mice (p = 0.002), indicating more repetitive behavior upon Hfe mutation. Importantly, Pb-exposed wild-type mice buried more marbles than non-exposed wild-types, whereas the number of marbles buried by Hfe-mutant mice did not change whether or not exposed to Pb. These results suggest that Hfe mutation could normalize Pb-induced behavioral alteration. To explore the mechanism of repetitive behavior caused by Pb, western blot analysis was conducted for proteins involved in brain dopamine metabolism. The levels of tyrosine hydroxylase and dopamine transporter increased upon Pb exposure in both genotypes, whereas Hfe-mutant mice displayed down-regulation of the dopamine transporter and dopamine D1 receptor with D2 receptor elevated. Taken together, our data support the idea that both Pb exposure and Hfe mutation increase repetitive behavior in mice and further suggest that these behavioral changes could be associated with altered dopaminergic neurotransmission, providing a therapeutic basis for psychiatric disorders caused by Pb toxicity.

Influencing Factors of Sales Process and Task Education on Sales of Health Functional Food in Door-to-door Saleswomen (건강기능식품 여성 방문판매원의 판매과정, 직무교육 요인이 건강기능식품 매출에 미치는 영향 분석)

  • Nam, Minyoung;Yoon, Sun;Lee, Hae-Young;Chung, Hye-Kyung
    • Journal of the Korean Society of Food Culture
    • /
    • v.29 no.4
    • /
    • pp.326-335
    • /
    • 2014
  • The purpose of this study was to investigate factors influencing sales of health functional foods by door-to-door saleswomen. A total of 450 women who worked as door-to-door salespersons in Seoul were enrolled. The survey questionnaire was composed of five parts as follows: general characteristics, factors related with door-to-door sales process, task education, competency required for door-to-door salespersons, and customer relationship beliefs. The survey was conducted in October 2011. Finally, data on 302 subjects were statistically analyzed using the SPSS 17.0 package program. Reason for sales of health functional foods (p<0.01), time required for sales promotion (p<0.001), difficulties during sales of health functional foods (p<0.05), satisfaction of task education (p<0.01), and failure of salesperson's memory as problems of task education (p<0.01) were significantly associated with sales of health functional foods. However, means of sales promotion, frequency and time of task education, and competency required for door-to-door salespersons were not significantly related with sales of health functional foods. Customer relationship beliefs did not show significant association with sales of health functional foods either. In conclusion, certain factors were associated with sales of health functional foods by door-to-door saleswomen. These results provide an understanding for sales of door-to-door health functional foods and provide basic information for preparation of task education for health functional food saleswomen and marketing.

A Study on the Fault Detection of ASIC using Dynamic Pattern Method (Dynamic Pattern 기법을 이용한 주문형 반도체 결함 검출에 관한 연구)

  • Shim, Woo-Che;Jung, Hae-Sung;Kang, Chang-Hun;Jie, Min-Seok;Hong, Gyo-Young;Ahn, Dong-Man;Hong, Seung-Beom
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.560-567
    • /
    • 2013
  • In this paper, it is proposed the fault detection method of the ASIC, without the Test Requirement Document(TRD), extracting internal logic circuit and analyzed the function of the ASIC using the multipurpose development program and simulation. If there don't have the TRD, it is impossible to analyze the operation of the circuit and find out the fault detection in any chip. Therefore, we make the TRD based on the analyzed logic data of the ASIC, and diagnose of the ASIC circuit at the gate level through the signal control of I/O pins using the Dynamic Pattern signal. According to the experimental results of the proposed method, we is confirmed the good performance of the fault detection capabilities which applied to the non-memory circuit.

Performance Improvement of the Face Recognition Using the Properties of Wavelet Transform (웨이블릿 변환의 특성을 이용한 얼굴 인식 성능 개선)

  • Park, Kyung-Jun;Seo, Seok-Yong;Koh, Hyung-Hwa
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.726-735
    • /
    • 2013
  • This paper proposed face recognition methods about performance improvement of the face recognition using the properties of wavelet transform. Using discrete wavelet transform is Daubechies D4 filter that is similar to mother wavelet transform. For discrete wavelet transform method, In this case, by using LL subband only we can reduce processing time and amount of memory in recognition processing. To improve recognition ratio without further loss of 2 dimensional data changing, We applies 2D LDA. We perform SVM training algorithm to the feature vector obtained by 2D LDA. Experiment is performed using ORL database set and Yale database set by Matlab program. Test result shows that proposed method is superior to existence methods in recognition rate and performance time.

Real-time 2-D Separable Median Filter (실시간 2차원 Separable 메디안 필터)

  • Jae Gil Jeong
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.3
    • /
    • pp.321-330
    • /
    • 2002
  • A 2-D median filter has many applications in various image and video signal processing areas. The rapid development in VLSI technology makes it possible to implement a real-time or near real-time 2-D median filter with reasonable cost. For the efficient VLSI implementation, the algorithm should have characteristics such as small memory requirements, regular computations, and local data transfers. This paper presents an architecture of the real-time two-dimensional separable median filter which has appropriate characteristics for the VLSI implementation. For the efficient two-dimensional median filter, a separable two-dimensional median filtering structure and a bit-sliced pipelined median searching algorithm are used. A behavioral simulator is implemented with C language and used for the analysis of the presented architecture.

  • PDF

PRMS: Page Reallocation Method for SSDs (PRMS: SSDs에서의 Page 재배치 방법)

  • Lee, Dong-Hyun;Roh, Hong-Chan;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.395-404
    • /
    • 2010
  • Solid-State Disks (SSDs) have been currently considered as a promising candidate to replace hard disks, due to their significantly short access time, low power consumption, and shock resistance. SSDs, however, have drawbacks such that their write throughput and life span are decreased by random-writes, nearly regardless of SSDs controller designs. Previous studies have mostly focused on better designs of SSDs controller and reducing the number of write operations to SSDs. We suggest another method that reallocates data pages that tend to be simultaneously written to contiguous blocks. Our method gathers write operations during a period of time and generates write traces. After transforming each trace to a set of transactions, our method mines frequent itemsets from the transactions and reallocates the pages of the frequent itemsets. In addition, we introduce an algorithm that reallocates the pages of the frequent itemsets with moderate time complexity. Experiments using TPC-C workload demonstrated that our method successfully reduce 6% of total logical block access.