• Title/Summary/Keyword: information overload

Search Result 530, Processing Time 0.029 seconds

An Efficient Protocol for Causal Message Delivery in Distributed Mobile Systems (분산 이동 시스템에서 인과적 메시지 전달을 위한 효율적인 프로토콜)

  • 노성주;정광식;이화민;유헌창;황종선
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.143-154
    • /
    • 2003
  • There is a growing trend in developing system for distributed mobile system that supports services - job flow management, video conference, replicated data management and resource allocation. Supporting these services, applications have to use causally ordered message delivery. Previous proposals that provide causally ordered message delivery have problems such as communication overhead, message delaying, scalability, computing overload of mobile host. In this paper, we proposed efficient protocol for causally ordered message delivery using the methods that MSS maintains dependency information matrix between MSS and MH, Piggybacking dependency information about each immediate predecessor message. Proposed algorithm, when compared with previous proposals, provides a low message overhead, and low probability of unnecessary inhibition in delivering messages. Also, it consider resource restriction of MH and low bandwidth of wireless communication by computing most of algorithm at MSS, and reduce processing delay by executing causally ordered message delivery a unit of MH.

3D lattice information space for TV contents based on spatial metaphor : TV interface perspective (공간적 은유를 적용한 3D 격자구조의 TV 콘텐츠 정보공간 제안 : TV 인터페이스 사용성 관점에서)

  • Lee, Jae-Gil;Shin, Donghee
    • Journal of Digital Contents Society
    • /
    • v.15 no.5
    • /
    • pp.651-661
    • /
    • 2014
  • The complexity to search a specific content over TV platform is drastically increasing. Based on previous studies from computer data management system, we propose a new method that helps users to search and select content effectively. In general, contents over computers are represented by spatial metaphor, which replicates our physical environment and value systems about space. We suggest 3D lattice structure to construct information space for TV platform. Users can infer relevance between contents via special clue in information space, so as to select content more easily. Also, they can search contents through its temporal property that also represented in space. We make full use of our natural capability that can reduce additional overload to learning new interface. The results of this study can be significant and heuristic contributions, as they can be applied to diverse service areas utilizing video contents.

A Building Method of High Availability Protection Architecture in Next Generation Network (NGN) Information Security System (차세대통신망(NGN) Infrastructure에서의 정보보호시스템 고가용성 차단구조 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.483-489
    • /
    • 2007
  • The high availability of information security system shall be primarily studied in relation to the Next Generation Network(NGN) Information Security infrastructure, because it is very important to maintain availability at each moment as a variety of intrusions occur continuously. The high availability of the security system can be realized with the topology and configuration properly defined to fully utilize the recovery function of the security system in the thoroughly planned optimized method. The active-active high availability on the NGN information security infrastructure system in is assured by letting the failover mechanism operate upon the entire structure through the structural design and the implementation of functions. The proposed method reduces the system overload rating due to trouble packets and improves the status of connection by SNMP polling trap and the ICMP transport factor by ping packet.

  • PDF

Evaluation of functional wireless sensor node based Ad-hoc network for indoor healthcare monitoring (실내 건강모니터링을 위한 Ad-hoc기반의 기능성 무선센서노드 평가)

  • Lee, Dae-Seok;Do, Kyeong-Hoon;Lee, Hun-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.313-316
    • /
    • 2009
  • A novel approach for electrocardiogram (ECG) analysis within a functional sensor node has been developed and evaluated. The main aim is to reduce data collision, traffic over loads and power consumption in healthcare applications of wireless sensor networks (WSN). The sensor node attached on the patient's bodysurface around the heart can perform ECG analysis based on a QRS detection algorithm to detect abnormal condition of the patient. Data transfer is activated only after detected abnormality in the ECG. This system can reduce packet loss during transmission by reducing traffic overload. In addition, it saves power supply energy leading to more reliable, cheap and user-friendly operation in the WSN based ubiquitous health monitoring.

  • PDF

Edge Computing-based Differential Positioning Method for BeiDou Navigation Satellite System

  • Wang, Lina;Li, Linlin;Qiu, Rui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.69-85
    • /
    • 2019
  • BeiDou navigation satellite system (BDS) is one of the four main types of global navigation satellite systems. The current system has been widely used by the military and by the aerospace, transportation, and marine fields, among others. However, challenges still remain in the BeiDou system, which requires rapid responses for delay-sensitive devices. A differential positioning algorithm called the data center-based differential positioning (DCDP) method is widely used to avoid the influence of errors. In this method, the positioning information of multiple base stations is uploaded to the data center, and the positioning errors are calculated uniformly by the data center based on the minimum variance or a weighted average algorithm. However, the DCDP method has high delay and overload risk. To solve these problems, this paper introduces edge computing to relieve pressure on the data center. Instead of transmitting the positioning information to the data center, a novel method called edge computing-based differential positioning (ECDP) chooses the nearest reference station to perform edge computing and transmits the difference value to the mobile receiver directly. Simulation results and experiments demonstrate that the performance of the ECDP outperforms that of the DCDP method. The delay of the ECDP method is about 500ms less than that of the DCDP method. Moreover, in the range of allowable burst error, the median of the positioning accuracy of the ECDP method is 0.7923m while that of the DCDP method is 0.8028m.

Human-in-the-loop experiments design for workload effectiveness verification of multiple-UAV operators (복수무인기 운용자의 임무과부하지표 효용성 검증을 위한 human-in-the-loop 실험 설계 및 구현)

  • Lim, Hyung-Jin;Choi, Seong-Hwan;Shin, Eun-Chul;Oh, Jang-Jin;Kim, Byoung Soo;Kim, Seungkeun;Yang, Ji Hyun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.4
    • /
    • pp.284-291
    • /
    • 2017
  • There is no doubt that advances in UAV technology have improved military performance. However, these advances require humans to adapt to new and complex operational systems. UAV has been rapidly expanding to a variety of fields such as reconnaissance, transportation, communication and aerial photographing recently. Also, with the development of UAV automation technology, one operator is able to supervisory-control multiple-UAVs. However, as the number of assigned UAV increases, the amount of information increases and this results in the workload of the operator increasing and deterioration in controlling performance. Accordingly, there is a need for a model to determine the level of overload an operator may encounter with regard to multiple-UAV but nationally this kind of research is currently lacking. Therefore, this paper provides an experimental platform for evaluating workload index effectiveness integrating multiple-UAV operational environments, GCS, and eye-tracking system followed by a limited survey of domestic and international studies of multi-UAV overload studies.

Data Acquisition System Applying TMO for GIS Preventive Diagnostic System (GIS 예방진단시스템을 위한 TMO 응용 데이터 수집 시스템)

  • Kim, Tae-Wan;Kim, Yun-Gwan;Jang, Cheon-Hyeon
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.481-488
    • /
    • 2009
  • GIS is used to isolate large power electrical equipment using SF6 gas. While GIS has simple structure, it has few break down, relatively high reliability. But it is hard to check up faults for reason of pressure. Faults of GIS should have a ripple effect on community and be hard to recovery. Consequently, GIS imports a preventive diagnostic system to find internal faults in advance. It is most important that reliability on the GIS preventive diagnostic system, because it estimates abnormality of system by analysis result of collected data. But, exist system which used central data management is low efficiency, and hard to guarantee timeliness and accuracy of data. To guarantee timeliness and accuracy, the GIS preventive diagnostic system needs accordingly to use a real-time middleware. So, in this paper, to improve reliability of the GIS preventive diagnostic system, we use a middleware based on TMO for guaranteeing timeliness of real-time distributed computing. And we propose an improved GIS preventive diagnostic system applying data acquisition, monitoring and control methods based on the TMO model. The presented system uses the Communication Control Unit(CCU) for distributed data handling which is supported by TMO. CCU can improve performance of the GIS preventive diagnostic system by guaranteeing timeliness of data handling process and increasing reliability of data through the TMO middleware. And, it has designed to take full charge of overload on a data acquisition task had been processed in an exist server. So, it could reduce overload of the server and apply distribution environment from now. Therefore, the proposed system can improve performance and reliability of the GIS preventive diagnostic system and contribute to stable operation of GIS.

A study on the follow-up management system of Continuous Quality Improvement activity (CQI 활동 후 사후관리 체계 조사연구)

  • Hyun, Seok-Kyun;Yu, Seung-Hum;Oh, Hyohn-Joo
    • Korea Journal of Hospital Management
    • /
    • v.7 no.2
    • /
    • pp.99-123
    • /
    • 2002
  • This study was conducted to determine whether follow-up management is carried out continuously following CQI activity and to analyze the factors behind the success and failure of follow-up management. Past presentations from 1994-1999 of CQI coordinators and lecturers from various institutions who presented at The Korean Society of Quality Assurance in Health Care(KoSQA) on the conditions of follow-up management in each institution were analyzed. The results of this study were as follows; Since the number of subjects on CQI increased each year at symposiums, this has expanded to all medical institutions. Although medical institutions usually conduct 11-20 subjects on CQI per year, there were many such occasions where more than 31 subjects were conducted. Moreover, institutions with less than 800 beds have come up with more projects than those with more than 800 beds, thus 23.3% of these institutions had at least 1 person involved in 4 projects. This had created an overload of responsibilities for specific persons' involvement, prompting them to incline toward formalities in their work rather than substantial activities. Among the projects presented at the symposiums, 51.7% demonstrated that follow-up management could be carried out. In particular, 55.3% of the projects from provincial regions could carry out follow-up management compared to 48.8% in Seoul. Moreover, it was demonstrated that 80% of the projects from institutions with 600-799 beds carried out follow-up management most effectively. With regards to previous presentations, the older they were, it was found that follow-up management could not be effectively carried out. Some institutions that responded that follow-up management was carried out effectively in their institutions were found to have conducted follow-up management without any inspection strategies or the appropriate tools. CQI activities were executed and terminated with no consistency and team members had no real concern for it. The most important factors that contribute to an effective follow-up management are the need for concern and interest from the directors of the hospitals, from the relevant departments and team members in addition to the role of the supervising department, follow-up management through management of target goals, consistency in tasks along with communication between all team members. The biggest problems were perceived to be overload of work due to accumulation of proposed projects in addition to lack of awareness pertaining to follow-up management. CQI is beneficial for all staff for the improvement of the mind and business administration and thus it is believed to be desirable. To carry out follow-up management effectively, leadership, analysis and application of information, follow-up management and planning, as well as quality management are perceived to be essential, on the other hand, the results showed a significant difference. To prevent CQI activities from becoming just an activity, the basic system should be reconstructed and augmented based on the problems derived from the results of this study. Moreover, we hope this study will be used as reference material that would encourage the administration of follow-up management after CQI activities in most hospitals. Furthermore, various studies on follow-up management should be conducted for CQI activities in the future.

  • PDF

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping (대역폭 감소를 적용한 MPEG-4 미디어 전송시의 암호화 기법 연구)

  • Shin, Dong-Kyoo;Shin, Dong-Il;Park, Se-Young
    • The KIPS Transactions:PartB
    • /
    • v.15B no.6
    • /
    • pp.575-584
    • /
    • 2008
  • According to the network condition, the communication network overload could be occurred when media transmitting. Many researches are being carried out to lessen the network overload, such as the filtering, load distributing, frame dropping and many other methods. Among these methods, one of effective method is frame dropping that reduces specified video frames for bandwidth diminution. B frames are dropped and then I, P frames are dropped according to dependency among the frames in frame dropping. This paper proposes a scheme for protecting copyrights by encryption, when we apply frame dropping to reduce bandwidth of media following MPEG-4 file format. We designed two kinds of frame dropping: first one stores and then sends the dropped files and the other drops frames in real-time when transmitting. We designed three kinds of encryption methods in which DES algorithm is used to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I, P-VOP. Based on these three methods, we implemented a digital right management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption and quality of video sequences to select an optimal method, and there is no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in encryption and decryption of frames was obtained when we apply the macro block and motion vector encryption in I, P-VOP.