• Title/Summary/Keyword: 버전 제어

Search Result 155, Processing Time 0.022 seconds

The Performance Improvement for Congestion Control under TCP Traffic in Wireless Network (무선네트워크 전송기반에서 프로토콜에 의한 트래픽 혼잡제어)

  • Ra, Sang-Dong;Kim, Moon-Hwan;Lee, Sung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10A
    • /
    • pp.965-973
    • /
    • 2007
  • We analyzed that the loss of data in TCP protocol based wireless networks caused by overlapped responses in bi-directional nodes that were resulted in out of the data sequence. This loss can be prevented by using revised TCP rate control algorithm and the performance of throughput can also be improved. The rate control algorithm is applied when the congestion happens between nodes while traffic packets are retransmitting in TCP bandwidth. In addition to applying the rate control algorithm, we determine the number of system clients in bandwidth and the average of pausing time between transmitting serial files to produce a competitive level so that an efficient performance of rapid retransmitting for the loss of multi-packets. This paper discusses the improvement of congestion control in that the decrease of the loss, firstly, as ensuring an efficient connection rate and, secondly, as using sliding window flow control.

Power Controlled Dual-channel UC Protocol for Mobile Ad Hoc Networks (Ad hoc 네트워크에서 전력 제어 기법을 사용한 Dual-Channel MAC 프로토콜)

  • Kang, Chang-Nam;Han, Do-Hyung;Lee, Eun-Ju;Jaw, Jeong-Woo;Lim, Jea-Yun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.101-104
    • /
    • 2007
  • Ad hoc 네트워크는 기반구조가 없는 무선네트워크이다. Ad hoc 네트워크는 재난지역, 군사지역, 홈 네트워킹 서비스, 텔레매틱스 서비스 같은 곳에서 응용될 수 있다. 최근Ad hoc 네트워크의 처리량을 향상시키기 위해 방향성 안테나를 사용하거나 이중채널을 사용하는MAC프로토콜이 제안되고 있다. DUBMAC프로토콜은 이중채널에 방향성 안테나를 사용하여 처리량 성능을 향상시킨 프로토콜이다. 본 논문에서는 DUDMAC프로토콜에 전력 제어 기법을 적용하여 네트워크의 처리량을 향상시키는 MAC 프로토콜을 제안한다. 제안하는 MAC 프로토콜은 새로운 블로킹 알고리즘을 사용하여 공간 재사용을 향상시킨다. 제안하는 블로킹 알고리즘은 RTS 또는 CTS 수신 시 블로킹 테이블에 저장된 수신세기를 사용하여 기존의 DUDMAC의 블로킹 영역을 FULL_BLOCKING 영역과 SEMI_BLOCKING 영역으로 구분하여 성능을 개선한다. 제안하는 MAC 프로토콜의 처리량 성능은 퀄넷 시뮬레이터 버전 3.8을 사용하여 확인하였다.

  • PDF

A Study on the Technique of the 3D Stereoscopic Cinema (3D 입체영화의 제작 기법 연구 단편영화 <내 생일>을 중심으로)

  • Kim, Byeong-Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.8
    • /
    • pp.994-1004
    • /
    • 2013
  • 3D stereoscopic cinema emerged as a new dominant media format. In principle, the stereoscopic cinema imitate the vision of the human being has two eyes. The stereoscopic cinema is filmed with 2 connected cameras at the same time and projected these 2 different images. With the stereoscopic glasses, the human being can see the overlapped images as a single 3D stereoscopic image. To make 3D stereoscopic cinema, it is very important to systemize the process of the 3D stereoscopic cinema production and to use the principle of the 3D stereoscopic cinema. This paper investigates the possibilities of the using the 3D stereoscopic principles such as the I.O.D, convergence point, parallax and the 3D comfort zone. Using the principle of the 3D stereoscopic cinema can be the technique of directing the film. Using the example of 3D stereoscopic short film My Birthday, I investigate the main technique of the 3D stereoscopic cinema.

An Integrated Tool Model for the Management of Process and Artifact Management on CBD (컴포넌트 기반 개발에서의 프로세스 관리와 산출물 관리를 통합하는 도구의 모델)

  • Kim Young-Hee;Chong Ki-Won
    • Journal of Internet Computing and Services
    • /
    • v.5 no.4
    • /
    • pp.11-22
    • /
    • 2004
  • Works that improve the process and notify the improved process, the product and the change of tasks to all users are essential in achieving project. Existent project management tools support the definition and the change of project activities, and configuration management tools support version check, workspace management. build management. etc. It costs too much to buy each tool. as well as, it is burdensome to learn usage for various tools. Therefore the web-based integrated tool is proposed to manage the process and artifacts at a time in this paper. The proposed tool defines component based development process model. and achieves recording of process progression, processing the request of change, reporting the progression of each task, product registering and change, version recording, artifact or form search, etc. using ebXML. Furthermore, the stakeholders get the systematic management and standardization by sharing information that are necessary in process achievement and configuration management in distributed environment using the integrated management tool.

  • PDF

A Study on Advanced RF4CE Key Agreement for Device Convergence Security (디바이스 융합 보안을 위한 향상된 RF4CE 키 교환 기법에 관한 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Han, Kyu-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.970-976
    • /
    • 2010
  • Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.

An Efficient Management and Sliding Window Query for Real-Time Stream Data to Require frequent Update (빈번한 변경을 요구하는 실시간 스트림 데이터의 효율적 관리 및 슬라이딩 윈도우 질의)

  • Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.509-516
    • /
    • 2008
  • Recently, the operator modules to control external devices are concerned about automatic management system to process continuously changed signals. These signals are the stream data of which characteristics are several numbers. a short report interval and asynchronous report time. It is necessary that the system brings about high accuracy and real time process for stream data. The typical queries of these systems consist of the current query to search the latest signal value, the snapshot query at a past time, the sliding window query from a past time to current. In this paper, we propose the efficient method to manage the above signals by using a file structured database in small-size operating systems. We also propose a query model to accommodate various queries including the sliding window query. The file database in the QNX adopts a delta version and a shared memory buffering method for the resource limit of a small storage and a low computing power.

The Study of Industrial Trends in Automotive Sensors Industry (차량용 센서 산업분석 및 발전방안)

  • Heo, Pil-sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.829-832
    • /
    • 2009
  • Recently, IT-centered convergence between different industries has undergone rapid expansion, accompanied by major advances in u-IT development and digital convergence. Notably, in the automotive-IT convergence sector, automotive sensors and electronic devices interact closely and intelligently with each other, thereby increasing driver safety and convenience and creating the optimal driving environment. This has led to the generation of value-added for the future-oriented automotive industry. Sensing technologies - which are used to monitor traffic situations and transmit correct information (or warnings) on the road traffic situation to car drivers, and to provide accurate information to road traffic controllers - represent both the birth of high-safety, intelligent automotive technologies and the key to automotive manufacturing. In view of these developments, this paper examines the characteristics and structure of the automotive sensor industry, and outlines the policy implications for the automotive sensor industry with regard to the development of the automotive-IT convergence industry.

  • PDF

Adjusting Edit Scripts on Tree-structured Documents (트리구조의 문서에 대한 편집스크립트 조정)

  • Lee, SukKyoon;Um, HyunMin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.2
    • /
    • pp.1-14
    • /
    • 2019
  • Since most documents used in web, XML, office applications are tree-structured, diff, merge, and version control for tree-structured documents in multi-user environments are crucial tasks. However research on edit scripts which is a basis for them is in primitive stage. In this paper, we present a document model for understanding the change of tree-structured documents as edit scripts are executed, and propose a method of switching adjacent edit operations on tree-structured documents based on the analysis of the effects of edit operations. Mostly, edit scripts which are produced as the results of diff on tree-structured documents only consist of basic operations such as update, insert, delete. However, when move and copy are included in edit scripts, because of the characteristics of their complex operation, it is often that edit scripts are generated to execute in two passes. In this paper, using the proposed method of switching edit operations, we present an algorithm of transforming the edit scripts of X-treeESgen, which are designed to execute in two passes, into the ones that can be executed in one pass.

Concurrency Control with Dynamic Adjustment of Serialization Order in Multilevel Secure DBMS (다단계 보안 데이타베이스에서 직렬화 순서의 동적 재조정을 사용한 병행수행 제어 기법)

  • Kim, Myung-Eun;Park, Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.15-28
    • /
    • 1999
  • In Multilevel Secure Database Management System(MLS/DBMS), we assume that system has a security clearance level for each user and a classification level for each data item in system and the objective of these systems is to protect secure information from unauthorized user. Many algorithms which have been researched have focus on removing covert channel by modifying conventional lock-based algorithm or timestamp-based algorithm. but there is high-level starvation problem that high level transaction is aborted by low level transaction repeatedly. In order to solve this problem, we propose an algorithm to reduce high-level starvation using dynamic adjustment of serialization order, which is basically using orange lock. Because our algorithm is based on a single version unlike conventional secure algorithms which are performed on multiversion, it can get high degree of concurrency control. we also show that it guarantees the serializability of concurrent execution, and satisfies secure properties of MLS/DBMS.

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.