• Title/Summary/Keyword: server performance

Search Result 1,690, Processing Time 0.031 seconds

A Implementation of User Exercise Motion Recognition System Using Smart-Phone (스마트폰을 이용한 사용자 운동 모션 인식 시스템 구현)

  • Kwon, Seung-Hyun;Choi, Yue-Soon;Lim, Soon-Ja;Joung, Suck-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.396-402
    • /
    • 2016
  • Recently, as the performance of smart phones has advanced and their distribution has increased, various functions in existing devices are accumulated. In particular, functions in smart devices have matured through improvement of diverse sensors. Various applications with the development of smart phones get fleshed out. As a result, services from applications promoting physical activity in users have gotten attention from the public. However, these services are about diet alone, and because these have no exercise motion recognition capability to detect movement in the correct position, the user has difficulty obtaining the benefits of exercise. In this paper, we develop exercise motion-recognition software that can sense the user's motion using a sensor built into a smart phone. In addition, we implement a system to offer exercise with friends who are connected via web server. The exercise motion recognition utilizes a Kalman filter algorithm to correct the user's motion data, and compared to data that exist in sampling, determines whether the user moves in the correct position by using a DTW algorithm.

An Energy-Efficient Concurrency Control Method for Mobile Transactions with Skewed Data Access Patterns in Wireless Broadcast Environments (무선 브로드캐스트 환경에서 편향된 엑세스 패턴을 가진 모바일 트랜잭션을 위한 효과적인 동시성 제어 기법)

  • Jung, Sung-Won;Park, Sung-Geun;Choi, Keun-Ha
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.69-85
    • /
    • 2006
  • Broadcast has been often used to disseminate the frequently requested data efficiently to a large volume of mobile clients over a single or multiple channels. Conventional concurrency control protocols for mobile transactions are not suitable for the wireless broadcast environments due to the limited bandwidth of the up-link communication channel. In wireless broadcast environments, the server often broadcast different data items with different frequency to incorporate the data access patterns of mobile transactions. The previously proposed concurrency control protocols for mobile transactions in wireless broadcast environments are focused on the mobile transactions with uniform data access patterns. However, these protocols perform poorly when the data access pattern of update mobile transaction are not uniform but skewed. The update mobile transactions with skewed data access patterns will be frequently aborted and restarted due 4o the update conflict of the same data items with a high access frequency. In this paper, we propose an energy-efficient concurrence control protocol for mobile transactions with skewed data access as well as uniform data access patterns. Our protocol use a random back-off technique to avoid the frequent abort and restart of update mobile transactions. We present in-depth experimental analysis of our method by comparing it with existing concurrency control protocols. Our performance analysis show that it significantly decrease the average response time, the amount of upstream and downstream bandwidth usage over existing protocols.

End-to-end Packet Statistics Analysis using OPNET Modeler Wireless Suite (OPNET Modeler Wireless Suite를 이용한 종단간 패킷 통계 분석)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.265-278
    • /
    • 2011
  • The objective of this paper is to analyze and characterize end-to-end packet statistics after modeling and simulation of WiFi (IEEE 802.11g) and WiMAX (IEEE 802.16e) of a virtual wireless network using OPNET Modeler Wireless Suite. Wireless internal and external network simulators such as Remcom's Wireless InSite Real Time (RT) module, WinProp: W-LAN/Fixed WiMAX/Mobile WiMAX, and SMI system, are designed to consider data transfer rate based on wireless propagation signal strength. However, we approached our research in a different perspective without support for characteristic of these wireless network simulators. That is, we will discuss the purpose of a visual analysis for these packets, how to receive each point packets (e.g., wireless user, base station or access point, and http server) through end-to-end virtual network modeling based on integrated wired and wireless network without wireless propagation signal strength. Measuring packet statistics is important in QoS metric analysis among wireless network performance metrics. Clear packet statistics is an especially essential metric in guaranteeing QoS for WiMAX users. We have found some interesting results through modeling and simulation for virtual wireless network using OPNET Modeler Wireless Suite. We are also able to analyze multi-view efficiency through experiment/observation result.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

Design and Implementation of the Digital Photo Frame based on Ubiquitous (유비쿼터스 기반 전자액자의 설계 및 구현)

  • Lee, Joa-Hyoung;Park, Chong-Myung;Heo, Nan-Sook;Jo, Young-Tae;Kwon, Young-Wan;Han, Woo-Ram;Seon, Ju-Ho;Kim, Jong-Wook;Yoo, Jae-Wook;Lee, Kang-Hee;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.9
    • /
    • pp.1703-1710
    • /
    • 2008
  • As the performance of digital camera keeps going on, the digital camera becomes into wide use recently so that the number of digital images taken by digital camera is increased rapidly. Given the augmentation of digital images, the digital photo frame has appeared for storing and enjoying the digital image and receives attention as the price of digital frame becomes down. However, users with the existing digital frame only could display the digital images and stream media stored in local disk. In the paper, we design and implement a new digital photo frame baled on ubiquitous which could provide a more variety of service to the user. With the proposed digital photo frame, the user could obtain the environment information and the digital image from multimedia sensor network. The users also could enjoy the various stream media stored in the remote streaming server seamlessly. In addition, the user could update the digital image through the web site at anywhere.

Analysis of an M/G/1/K Queueing System with Queue-Length Dependent Service and Arrival Rates (시스템 내 고객 수에 따라 서비스율과 도착율을 조절하는 M/G/1/K 대기행렬의 분석)

  • Choi, Doo-Il;Lim, Dae-Eun
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.27-35
    • /
    • 2015
  • We analyze an M/G/1/K queueing system with queue-length dependent service and arrival rates. There are a single server and a buffer with finite capacity K including a customer in service. The customers are served by a first-come-first-service basis. We put two thresholds $L_1$ and $L_2$($${\geq_-}L_1$$ ) on the buffer. If the queue length at the service initiation epoch is less than the threshold $L_1$, the service time of customers follows $S_1$ with a mean of ${\mu}_1$ and the arrival of customers follows a Poisson process with a rate of ${\lambda}_1$. When the queue length at the service initiation epoch is equal to or greater than $L_1$ and less than $L_2$, the service time is changed to $S_2$ with a mean of $${\mu}_2{\geq_-}{\mu}_1$$. The arrival rate is still ${\lambda}_1$. Finally, if the queue length at the service initiation epoch is greater than $L_2$, the arrival rate of customers are also changed to a value of $${\lambda}_2({\leq_-}{\lambda}_1)$$ and the mean of the service times is ${\mu}_2$. By using the embedded Markov chain method, we derive queue length distribution at departure epochs. We also obtain the queue length distribution at an arbitrary time by the supplementary variable method. Finally, performance measures such as loss probability and mean waiting time are presented.

Subgraph Searching Scheme Based on Path Queries in Distributed Environments (분산 환경에서 경로 질의 기반 서브 그래프 탐색 기법)

  • Kim, Minyoung;Choi, Dojin;Park, Jaeyeol;Kim, Yeondong;Lim, Jongtae;Bok, Kyoungsoo;Choi, Han Suk;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.141-151
    • /
    • 2019
  • A network of graph data structure is used in many applications to represent interactions between entities. Recently, as the size of the network to be processed due to the development of the big data technology is getting larger, it becomes more difficult to handle it in one server, and thus the necessity of distributed processing is also increasing. In this paper, we propose a distributed processing system for efficiently performing subgraph and stores. To reduce unnecessary searches, we use statistical information of the data to determine the search order through probabilistic scoring. Since the relationship between the vertex and the degree of the graph network may show different characteristics depending on the type of data, the search order is determined by calculating a score to reduce unnecessary search through a different scoring method for a graph having various distribution characteristics. The graph is sequentially searched in the distributed servers according to the determined order. In order to demonstrate the superiority of the proposed method, performance comparison with the existing method was performed. As a result, the search time is improved by about 3 ~ 10% compared with the existing method.

Implementation of the Large-scale Data Signature System Using Hash Tree Replication Approach (해시 트리 기반의 대규모 데이터 서명 시스템 구현)

  • Park, Seung Kyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.19-31
    • /
    • 2018
  • As the ICT technologies advance, the unprecedently large amount of digital data is created, transferred, stored, and utilized in every industry. With the data scale extension and the applying technologies advancement, the new services emerging from the use of large scale data make our living more convenient and useful. But the cybercrimes such as data forgery and/or change of data generation time are also increasing. For the data security against the cybercrimes, the technology for data integrity and the time verification are necessary. Today, public key based signature technology is the most commonly used. But a lot of costly system resources and the additional infra to manage the certificates and keys for using it make it impractical to use in the large-scale data environment. In this research, a new and far less system resources consuming signature technology for large scale data, based on the Hash Function and Merkle tree, is introduced. An improved method for processing the distributed hash trees is also suggested to mitigate the disruptions by server failures. The prototype system was implemented, and its performance was evaluated. The results show that the technology can be effectively used in a variety of areas like cloud computing, IoT, big data, fin-tech, etc., which produce a large-scale data.

  • PDF

A Study on Cell-Broadcasting Based Security Authentication System and Business Models (셀 브로드캐스팅 보안 인증시스템 및 비즈니스 모델에 관한 연구)

  • Choi, Jeong-Moon;Lee, Jungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.325-333
    • /
    • 2021
  • With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.

Development of CanSat System With 3D Rendering and Real-time Object Detection Functions (3D 렌더링 및 실시간 물체 검출 기능 탑재 캔위성 시스템 개발)

  • Kim, Youngjun;Park, Junsoo;Nam, Jaeyoung;Yoo, Seunghoon;Kim, Songhyon;Lee, Sanghyun;Lee, Younggun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.8
    • /
    • pp.671-680
    • /
    • 2021
  • This paper deals with the contents of designing and producing reconnaissance hardware and software, and verifying the functions after being installed on the CanSat platform and ground stations. The main reconnaissance mission is largely composed of two things: terrain search that renders the surrounding terrain in 3D using radar, GPS, and IMU sensors, and real-time detection of major objects through optical camera image analysis. In addition, data analysis efficiency was improved through GUI software to enhance the completeness of the CanSat system. Specifically, software that can check terrain information and object detection information in real time at the ground station was produced, and mission failure was prevented through abnormal packet exception processing and system initialization functions. Communication through LTE and AWS server was used as the main channel, and ZigBee was used as the auxiliary channel. The completed CanSat was tested for air fall using a rocket launch method and a drone mount method. In experimental results, the terrain search and object detection performance was excellent, and all the results were processed in real-time and then successfully displayed on the ground station software.