• Title/Summary/Keyword: virtual block

Search Result 168, Processing Time 0.024 seconds

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

  • Ong, Ivy;Lim, Hyo-Taek
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.53-62
    • /
    • 2011
  • With the steady growth of mobile technology and applications, demand for more storage in mobile devices has also increased. A lightweight block-level protocol, Internet Advanced Technology Attachment (iATA), has been developed to deliver a cost-effective storage network solution for mobile devices to obtain more storage. This paper seeks to contribute to designing and implementing Load Balancing (LB), Network Monitoring (NM) and Write Replication (WR) modules to improve the protocol's scalability and data availability. LB and NM modules are invoked to collect system resources states and current network status at each associate node (server machine). A dynamic weight factor is calculated based on the collected information and sent to a referral server. The referral server is responsible to analyze and allocate the most ideal node with the least weight to serve the client. With this approach, the client can avoid connecting to a heavily loaded node that may cause delays in subsequent in-band I/O operations. Write replication is applied to the remaining nodes through a WR module by utilizing the Unison file synchronization program. A client initially connected to node IP A for write operations will have no hindrances in executing the relevant read operations at node IP B in new connections. In the worst case scenario of a node crashing, data remain recoverable from other functioning nodes. We have conducted several benchmark tests and our results are evaluated and verified in a later section.

A Study on 'Diagram' as a Digital Design process - Through G. Deleuze's 'machine abstraite' and Peter Eisenman, Ben Van Berkel's 'Diagram'- (디지털 디자인 프로세스로 본 다이어그램(Diagram)에 관한 연구 - 질 들뢰즈의 '추상기계'와 피터 아이젠만, 벤 반 버클의 '다이어그램'을 중심으로 -)

  • Kang Hoon
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.3 s.56
    • /
    • pp.201-210
    • /
    • 2006
  • Among the architects who use diagrams as a digital design process, especially through Peter Eisenman and Ben van Berkel's works, we have specifically got the meaning of their diagrams. Their diagrams act as 'the block of becoming' and we can regard the diagrams not only as a tool of devenir including architect's root thoughts beyond a tool of schematic presentation, but also as architect's intention including devenir thought. And in the case of diagrams which the architects use, we can recognize that architects' intentions are to think that Deleuze's 'machine abstraite' evolve the diagram into various and transformed form. That is to say, Peter Eisenman interprets the machine abstraite as a root thought of devenir by using diagram as medium to reveal the virtual. And Ben van Berkel transforms the diagram by including all external conditions into selected diagram which shows the abstract relations to the elements. We can get the meaning of the machine abstraite from these cases well. This study will play an important role in giving good usage of the diagram in making a form of contemporary digital architecture and showing the direction of form creation field.

Image Segmentation Algorithm for Fish Object Extraction (어류객체 추출을 위한 영상분할 알고리즘)

  • Ahn, Soo-Hong;Oh, Jeong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1819-1826
    • /
    • 2010
  • This paper proposes the image segmentation algorithm to extracts a fish object from a fish image for fish image retrieval. The conventional algorithm using gray level similarity causes wrong image segmentation result in the boundary area of the object and the background with similar gray level. The proposed algorithm uses the reinforced edge and the adaptive block-based threshold for the boundary area with weak contrast and the virtual object to improve the eroded or disconnected object in the boundary area without contrast. The simulation results show that the percentage of extracting the visual-fine object from the test images is under 90% in the conventional algorithm while it is 97.7% in the proposed algorithms.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

An Augmented Reality System for the Construction Industry and Its Impact on Workers' Situational Awareness

  • Abbas, Ali;Seo, JoonOh;Kim, MinKoo
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.129-136
    • /
    • 2020
  • Augmented reality (AR) technology assists construction workers by superimposing additional virtual information onto their real worksite environments. Ideally, this provides them with a better understanding of their tasks and hence boosts task performance. However, the additional information that AR places in users' field of view could limit their ability to understand what is going on in their surroundings and to predict how conditions may change in the near future. AR-assisted systems on construction sites could therefore expose their users to safety risks due to disturbance from the system. Hence, it is important to understand how AR-assisted systems can block users' understanding of their immediate environments, and in turn, how worksite safety in the construction industry could be improved through better design of such systems. This preliminary research conducted a laboratory experiment that simulated rebar inspection tasks and compared the situational awareness of AR users against that of subjects using traditional paper-based inspection methods, as measured by the Situation Awareness Rating Technique. Based on the results, we discuss the safety impact of head-mounted AR-assisted displays on situational awareness during construction tasks.

  • PDF

An Empirical Study on the Factors Affecting the Intention to Use M2E Services

  • Sang Hoon Lee;Min-Ju Kim;Su-Yeon Kim
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.792-811
    • /
    • 2023
  • Recently, Web 3.0 services such as virtual currency, block chain, and NFT are attracting public attention. Users who depended on platforms are moving away from being dependent on service providers and moving to Web 3.0 services. Representative services of Web 3.0 include P2E (Play to Earn) and M2E (Move to Earn). In the case of P2E, various studies have been conducted as it is widely covered in the press and media, but research on M2E is relatively lacking. This study attempts to identify the intention to use M2E by using the expanded technology acceptance model. External factors were selected based on M2E's own characteristics and personal characteristics, a research model was designed, and the proposed hypotheses were verified through factor analysis and goodness of model fit. As a result of the study, it was confirmed that profitability, innovativeness, and self-expression had a positive effect on perceived characteristics, and that perceived usefulness, perceived enjoyment, and social influence had a positive effect on intention to use. Through the research results, practical implications for efficient service operation that meets the needs of users are presented to M2E platform providers.

A Development of Fusion Processor Architecture for Efficient Main Memory Access in CPU-GPU Environment (CPU-GPU환경에서 효율적인 메인메모리 접근을 위한 융합 프로세서 구조 개발)

  • Park, Hyun-Moon;Kwon, Jin-San;Hwang, Tae-Ho;Kim, Dong-Sun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.151-158
    • /
    • 2016
  • The HSA resolves an old problem with existing CPU and GPU architectures by allowing both units to directly access each other's memory pools via unified virtual memory. In a physically realized system, however, frequent data exchanges between CPU and GPU for a virtual memory block result bottlenecks and coherence request overheads. In this paper, we propose Fusion Processor Architecture for efficient access of main memory from both CPU and GPU. It consists of Job Manager, Re-mapper, and Pre-fetcher to control, organize, and distribute work loads and working areas for GPU cores. These components help on reducing memory exchanges between the two processors and improving overall efficiency by eliminating faulty page table requests. To verify proposed algorithm architectures, we develop an emulator based on QEMU, and compare several architectures such as CUDA(Compute Unified Device Architecture), OpenMP, OpenCL. As a result, Proposed fusion processor architectures show 198% faster than others by removing unnecessary memory copies and cache-miss overheads.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

CORE-Dedup: IO Extent Chunking based Deduplication using Content-Preserving Access Locality (CORE-Dedup: 내용보존 접근 지역성 활용한 IO 크기 분할 기반 중복제거)

  • Kim, Myung-Sik;Won, You-Jip
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.59-76
    • /
    • 2015
  • Recent wide spread of embedded devices and technology growth of broadband communication has led to rapid increase in the volume of created and managed data. As a result, data centers have to increase the storage capacity cost-effectively to store the created data. Data deduplication is one way to save the storage space by removing redundant data. This work propose IO extent based deduplication schemes called CORE-Dedup that exploits content-preserving access locality. We acquire IO traces from block device layer in virtual machine host, and compare the deduplication performance of chunking method between the fixed size and IO extent based. At multiple workload of 10 user's compile in virtual machine environment, the result shows that 4 KB fixed size chunking and IO extent based chunking use chunk index 14500 and 1700, respectively. The deduplication rate account for 60.4% and 57.6% on fixed size and IO extent chunking, respectively.

Cloud Messaging Service for Preventing Smishing Attack (스미싱 공격 방지를 위한 클라우드 메시징 서비스)

  • Park, Hyo-Min;Kim, Wan-Seok;Kang, So-Jeong;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.285-293
    • /
    • 2017
  • They are rapidly evolving malicious attacks on smart devices, and to timely protect the smart devices from these attacks has become a very important issue. In particular, smishing attack has emerged as one of the most important threats on the smartphone. In this paper, we propose the cloud service that can fundamentally protect the user from the risk of smishing attack. The proposed scheme provides cloud messaging service that can filter text messages including URLs in the user's smart device, view and manage them through a virtual machine provided by a cloud server. The existing techniques for preventing smshing attacks protect only malicious code of a known pattern and there is the possibility of error such as FP(False Positive) or FN(False Negative). However, since the proposed method automatically filters all text messages including URLs, storing, viewing, and managing them in their own storage space on the cloud server, it can completely block the installation of malwares(malicious codes) on the user's smart device through smishing attacks.