• Title/Summary/Keyword: network storage

Search Result 1,080, Processing Time 0.04 seconds

Proxy Caching Scheme Based on the User Access Pattern Analysis for Series Video Data (시리즈 비디오 데이터의 접근 패턴에 기반한 프록시 캐슁 기법)

  • Hong, Hyeon-Ok;Park, Seong-Ho;Chung, Ki-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1066-1077
    • /
    • 2004
  • Dramatic increase in the number of Internet users want highly qualified service of continuous media contents on the web. To solve these problems, we present two network caching schemes(PPC, PPCwP) which consider the characteristics of continuous media objects and user access pattern in this paper. While there are plenty of reasons to create rich media contents, delivering this high bandwidth contents over the internet presents problems such as server overload, network congestion and client-perceived latency. PPC scheme periodically calculates the popularity of objects based on the playback quantity and determines the optimal size of the initial fraction of a continuous media object to be cached in proportion to the calculated popularity. PPCwP scheme calculates the expected popularity using the series information and prefetches the expected initial fraction of newly created continuous media objects. Under the PPCwP scheme, the initial client-perceived latency and the data transferred from a remote server can be reduced and limited cache storage space can be utilized efficiently. Trace-driven simulation have been performed to evaluate the presented caching schemes using the log-files of iMBC. Through these simulations, PPC and PPCwP outperforms LRU and LFU in terms of BHR and DSR.

  • PDF

Remote Control of Network-Based Modular Robot (네트웍 기반 모듈라 로봇의 원격 제어)

  • Yeom, Dong-Joo;Lee, Bo-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.77-83
    • /
    • 2018
  • A modular robot that memorizes motion can be easily created and operated because it expresses by hand. However, since there is not enough storage space in the module to store the user-created operation, it is impossible to reuse the created operation, and when the modular robot again memorizes the operation, it changes to another operation. There is no main controller capable of operating a plurality of modular robots at the same time, and thus there is a disadvantage that the user must input directly to the modular robot. To overcome these disadvantages, a remote controller has been proposed that can be operated in the surrounding smart devices by designing web server and component based software using wired and wireless network. In the proposed method, various types of structures are created by connecting to a modular robot, and the reconstructed operation is performed again after storing, and the usefulness is confirmed by regenerating the stored operation effectively. In addition, the reliability of the downloaded trajectory data is verified by analyzing the difference between the trajectory data and the actual trajectory. In the future, the trajectory stored in the remote controller will be standardized using the artificial intelligence technique, so that the operation of the modular robot will be easily implemented.

A Component-Based Framework for Structural Embedding of Mobile Agent System (모바일 에이전트 시스템의 구성적 임베딩을 위한 컴포넌트 기반의 프레임워크)

  • Chung, Wonho;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.33-42
    • /
    • 2012
  • Rapid evolution of wired and wireless technologies results in various types of embedded systems, and the software to be embedded into those devices now needs the flexibility rather than the fixedness which was well-known property for the embedded software in the past. Mobile agent is one of the useful distributed technologies of reducing network load and latency because of its disconnected operations and high asynchrony. In this paper, a component-based mobile agent framework, called EmHUMAN, is designed and implemented for structural embedding into the devices showing different functions and resource constraints. It consists of 3 layers of components. Based on those components, a structural embedding, considering resource constraints of required functions, amount of storage space, computing power, network bandwidth, ${\ldots} $ etc can be performed. The components in each layer can be extended with addition of new components, removing some components and modifying components. EmHUMAN plays the role of a framework for developing mobile agent based distributed systems. It is also a mobile agent system by itself. EmHUMAN provides several utilities as built-in API's, and thus high effectiveness in programming mobile agents can be achieved.

Targeting Analysis of Lumenal Proteins of Chloroplast of Wheat using Proteomic Techniques

  • Kamal, Abu Hena Mostafa;Kim, Da-Eun;Oh, Myoung-Won;Chung, Keun-Yook;Cho, Yong-Gu;Kim, Hong-Sig;Song, Beom-Heon;Lee, Chul-Won;Uozumi, Nobuyuki;Choi, Jong-Soon;Cho, Kun;Woo, Sun-Hee
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2010.05a
    • /
    • pp.14-14
    • /
    • 2010
  • Plastid proteomics are essential organelles present in virtually all cells in plants and green algae. Plastids are responsible for the synthesis and storage of key molecules required for the basic architecture and functions of plant cells. The proteome of plastid, and in particular of chloroplast, have received significant amounts of attention in recent years. Various fractionation and mass spectrometry (MS) techniques have been applied to catalogue the chloroplast proteome and its sub-organelles compartments. To better understanding the function of the lumenal sub-organelles within the thylakoid network, we have carried out a systematical analysis and identification of the lumenal proteins in the thylakoid of wheat by using Tricine-SDS-PAGE, and LTQ-ESI-FTICR mass spectrometry followed by SWISS-PROT database searching. We isolation and fractionation these membrane from fully developed wheat leaves using a combination of differential and gradient centrifugation couple to high speed ultra-centrifuge. After collecting all proteins to eliminate possible same proteins, we estimated that there are 407 different proteins including chloroplast, chloroplast stroma, lumenal, and thylakoid membrane proteins excluding 20 proteins, which were identified in nucleus, cytoplasm and mitochondria. A combination of these three programs (PSORT, TargetP, TMHMM, and TOPPRED) was found to provide a useful tool for evaluating chloroplast localization, transit peptide, transmembranes, and also could reveal possible alternative processing sites and dual targeting. Finally, we report also sub-cellular location specific protein interaction network using Cytoscape software, which provides further insight into the biochemical pathways of photosynthesis. The present work helps understanding photosynthesis process in wheat at the molecular level and provides a new overview of the biochemical machinery of the thylakoid in wheat.

  • PDF

Physicochemical and Rheological Evaluation of Rice-Whole Soybean Curds Prepared by Microbial Transglutaminase (미생물 Transglutaminase를 이용하여 제조된 쌀 혼합 전두부의 이화학적 및 물성 평가)

  • Jin, Ik-Hun;Lee, Sam-Pin
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.40 no.5
    • /
    • pp.738-746
    • /
    • 2011
  • We manufactured rice-whole soybean curd by a microbial transglutaminase (MTGase) with a mixture of hydrolyzed rice and micronized whole soybean powder (MWSP) and analyzed its rheological properties, including texture, viscoelasticity, protein cross-linking, and surface structure. A 40% rice suspension digested with a Termamyl enzyme at $85^{\circ}C$ for 20 min showed a 9.0% reducing sugar and a consistency of $1.27\;Pa{\cdot}s^n$, resulting in a great reduction in consistency. A MWSP suspension with 22% solid content was transformed into a typical tofu texture. MWSP curd fortified with 7.5% rice showed enhanced texture properties, with a hardness of 639.6 dyne/$cm^2$, and a springiness of 0.96. In a MWSP suspension (18~22% w/v) treated with 5% MTGase, viscoelasticity increased dependently with MWSP concentration, and a 22% MWSP indicated a G' value of 5.1 Pa and a G'' value of 9.0 Pa. Furthermore, soybean proteins present in the 22% MWSP curd largely disappeared or formed polymers with a high molecular weight by MTGase reaction within 30 min. MWSP (22%) fortified with 7.5% rice showed similar polymerization patterns on SDS-PAGE. The surface structure of the rice-MWSP curds was more dense and homogeneous network due to the addition of hydrolyzed rice. However, the surface structure of all rice-MWSP curds became rough and showed a non-homogeneous network after cold storage.

Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data (개인화된 건강 데이터의 대량 처리 모니터링을 위한 메시지 모델 및 동적 버퍼 할당 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.187-193
    • /
    • 2015
  • The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.

A Comparative Study of Reservoir Surface Area Detection Algorithm Using SAR Image (SAR 영상을 활용한 저수지 수표면적 탐지 알고리즘 비교 연구)

  • Jeong, Hagyu;Park, Jongsoo;Lee, Dalgeun;Lee, Junwoo
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_3
    • /
    • pp.1777-1788
    • /
    • 2022
  • The reservoir is a major water supply source in the domestic agricultural environment, and the monitoring of water storage of reservoirs is important for the utilization and management of agricultural water resource. Remote sensing via satellite imagery can be an effective method for regular monitoring of widely distributed objects such as reservoirs, and in this study, image classification and image segmentation algorithms are applied to Sentinel-1 Synthetic Aperture Radar (SAR) imagery for water body detection in 53 reservoirs in South Korea. Six algorithms are used: Neural Network (NN), Support Vector Machine (SVM), Random Forest (RF), Otsu, Watershed (WS), and Chan-Vese (CV), and the results of water body detection are evaluated with in-situ images taken by drones. The correlations between the in-situ water surface area and detected water surface area from each algorithm are NN 0.9941, SVM 0.9942, RF 0.9940, Otsu 0.9922, WS 0.9709, and CV 0.9736, and the larger the scale of reservoir, the higher the linear correlation was. WS showed low recall due to the undetected water bodies, and NN, SVM, and RF showed low precision due to over-detection. For water body detection through SAR imagery, we found that aquatic plants and artificial structures can be the error factors causing undetection of water body.

A Fog-based IoT Service Interoperability System using Blockchain in Cloud Environment (클라우드 환경에서 블록체인을 이용한 포그 기반 IoT 서비스 상호운용 시스템)

  • Kim, Mi Sun;Park, Yong Suk;Seo, Jae Hyun
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.39-53
    • /
    • 2022
  • Cloud of Things (CoT) can provide IoT applications with unlimited storage functions and processing power supported by cloud services. However, in a centralized cloud of things, it can create a single point of failure that can lead to bottleneck problems, outages of the CoT network. In this paper, to solve the problem of centralized cloud of things and interoperate between different service domains, we propose an IoT service interoperability system using distributed fog computing and blockchain technology. Distributed fog is used to provide real-time data processing and services in fog systems located at a geographically close distance to IoT devices, and to enable service interoperability between each fog using smart contracts and distributed ledgers of the blockchain. The proposed system provides services within a region close to the distributed fog entrusted with the service from the cloud, and it is possible to access the services of other fogs without going through the cloud even between fogs. In addition, by sharing a service right token issuance information between the cloud and fog nodes using a blockchain network, the integrity of the token can be guaranteed and reliable service interoperability between fog nodes can be performed.