• Title/Summary/Keyword: 복제 모델

Search Result 169, Processing Time 0.044 seconds

The Peplica Web Server Systems Using Cache Mechanism (Cache 기법을 도입한 복제 웹서버 시스템)

  • Jin, Sang-Hyouk;Jeong, Youn-Jin;Lee, Kwang-Mo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.735-737
    • /
    • 1998
  • 이 논문은 WWW와 데이터베이스의 시스템 통합에 있어서 독립서버로 운영될 때 CGI응용 프로그램의 과부하를 줄이는 복제 서버 시스템 모델[1]에서 데이터베이스 시스템에 매번 연결 및 종료 시 발생되는 접속 시간의 증가를 감소시킬 수 있는 cache기법의 도입과 함께 WWW 서버의 시스템 큐 (queue)의 길이로 시스템 작업량을 측정하여 가장 작업량이 적은 서버를 선택하는 조장자 (coordinator)에 cache정보를 기록하는 기능을 추가하여 보다 원활한 WWW작업 분배를 기대할 수 있고 안전성이 향상된 모델을 제시한다.

  • PDF

Software License Management Agent System for Electronic Commerce (전자 상거래를 위한 소프트웨어 사용권 관리 에이전트 시스템)

  • Yoon, Woo-Seong;Yoon, Jung-Mo;Kim, Tai-Yun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.77-86
    • /
    • 2001
  • With the growth of the EC(Electronic Commerce), Buying and selling software through the internet are expanded. Among the ESD(Electronic Software Distribution) methods, Buy-first method and TrY-before-bu1 method can not solve the illegal copy problem. Recently developed EL(Electronic License) model solve the illegal copy problem by separating the software and license. But this method also can not support various ways for payment. In this paper we propose the software license management system that is a newly form like ESD model. This system proposes NL(New License) to support various payment methods and SC(Software Charge) to insure that a seller takes the software price. Agent of the proposed system offers scalability to other systems and illegal copy protection function bv managing NL and SC.

  • PDF

A Feature-Oriented Method for Extracting a Product Line Asset from a Family of Legacy Applications (레거시 어플리케이션 제품군으로부터 제품라인 자산을 추출하는 휘처 기반의 방법)

  • Lee, Hyesun;Lee, Kang Bok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.7
    • /
    • pp.337-352
    • /
    • 2017
  • Clone-and-own reuse is an approach to creating new software variants by copying and modifying existing software products. A family of legacy software products developed by clone-and-own reuse often requires high maintenance cost and tends to be error-prone due to patch-ups without refactoring and structural degradation. To overcome these problems, many organizations that have used clone-and-own reuse now want to migrate their legacy products to software product line (SPL) for more systematic reuse and management of software asset. However, with most of existing methods, variation points are embedded directly into design and code rather than modeled and managed separately; variation points are not created ("engineered") systematically based on a variability model. This approach causes the following problems: it is difficult to understand the relationships between variation points, thus it is hard to maintain such code and the asset tends to become error-prone as it evolves. Also, when SPL evolves, design/code assets tend to be modified directly in an ad-hoc manner rather than engineered systematically with appropriate refactoring. To address these problems, we propose a feature-oriented method for extracting a SPL asset from a family of legacy applications. With the approach, we identify and model variation points and their relationships in a feature model separate from implementation, and then extract and manage a SPL asset from legacy applications based on the feature model. We have applied the method to a family of legacy Notepad++ products and demonstrated the feasibility of the method.

The Impact of Past Behavior on Intention to Smartphone Application Piracy (과거행동이 스마트폰 애플리케이션 불법복제 의도에 미치는 영향)

  • Kim, Joong Han
    • Journal of Service Research and Studies
    • /
    • v.6 no.2
    • /
    • pp.37-49
    • /
    • 2016
  • Due to the expandability of smartphone, the mobile application market is growing explosively. However, as happens in other digital contents markets, piracy of mobile applications is prevalent. This study investigated the effects of behavioral factors on smartphone application piracy. The research model consists of factors from the theory of planned behavior model - subjective norms, attitudes toward piracy and perceptions of behavioral control. In addition, perceived consequences, past behavior and habit was included. The past behavior of PC software piracy was a meaningful predictor of habit, and habit was found to influence significantly the smartphone piracy intention. The result also shows that perceived benefit had significant effect on attitude, but both perceived legal and technical risk were not significantly related to attitude. Implications for research and practice are discussed.

Proxy-Quorum Based Replication Control Schemes for Mobile Internet Systems (이동형 인터넷 기기를 위한 위임 정족수 기반의 복제데이터 제어 기법)

  • Byun Si-Woo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.51-57
    • /
    • 2004
  • Mobile Internet allows users to request critical information and receive swift responses at any places, but mobile users could suffer from unreliable and ill-timed services due to the characteristics of wireless media, One way that reduces possibility of the unsatisfactory services is data replication. Data Replica1ion, however, inevitably induces the overhead of maintaining replica consistency which requires more expensive synchronization mechanism. We propose a new replicated data management scheme in distributed mobile environment, In order to alleviate negative impact of synchronization message overhead in fault-prone mobile Internet environment, we devise a new replication control scheme called proxy quorum consensus (PQC), PQC minimizes the message overhead by coordinating quorum access activities by means of proxy mediated voting (PMV) which exploits reliable proxy hosts instead of unreliable mobile hosts in voting process, We also propose a simulation model to show the performance of PQC. Based on the results of the performance evaluation, we conclude that PQC scheme outperforms the traditional schemes.

  • PDF

A Study on Integrated Identification System of Scanned Cartoons and Copyrighted Books (북스캔 만화 및 도서 저작물 통합 식별 시스템에 관한 연구)

  • Kim, Tae-Hyun;Yoon, Hee-Don;Kang, Ho-Gap;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.19-25
    • /
    • 2016
  • This study aims to develop sound ecosystem of scanned cartoons and books through the effective identification technology developed as a part of the project granted from the Korea Copyright Commission (Project title: Identification and Copy Protection Technology of Scanned Text/Comic Books). This study shows a model integrating the scanned book identification system with the existing system that identifies scanned cartoons. The model suggested in this study is expected to give a help in reducing the author's damages due to the indiscriminate illegal reproduction, which tends to expand with high quality scanners and editing softwares.

Adaptive Server Selection Mechanism in the Replicated Web Server Environment (복제 웹 서버 환경에서 적응력 있는 서버 선택 메커니즘)

  • 김선호;신용태
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.9
    • /
    • pp.495-502
    • /
    • 2004
  • A rapid growth of the Internet user and rich media content cause an excessive server load and high network traffic, and thus it decreases the quality of service. A solution to this problem is to distribute the content on multiple replicated servers. However, in this circumstance, clients face additional task of selecting the best server to provide proper so${\gamma}$vice which clients request. This paper is intended to propose an adaptive server selection mechanism for a client request based on distance and server load. This will offer a fast and scalable service in response to the increase of massive and realtime multimedia content and contribute to floating a new business model of digital content service.

A Korean Multi-speaker Text-to-Speech System Using d-vector (d-vector를 이용한 한국어 다화자 TTS 시스템)

  • Kim, Kwang Hyeon;Kwon, Chul Hong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.469-475
    • /
    • 2022
  • To train the model of the deep learning-based single-speaker TTS system, a speech DB of tens of hours and a lot of training time are required. This is an inefficient method in terms of time and cost to train multi-speaker or personalized TTS models. The voice cloning method uses a speaker encoder model to make the TTS model of a new speaker. Through the trained speaker encoder model, a speaker embedding vector representing the timbre of the new speaker is created from the small speech data of the new speaker that is not used for training. In this paper, we propose a multi-speaker TTS system to which voice cloning is applied. The proposed TTS system consists of a speaker encoder, synthesizer and vocoder. The speaker encoder applies the d-vector technique used in the speaker recognition field. The timbre of the new speaker is expressed by adding the d-vector derived from the trained speaker encoder as an input to the synthesizer. It can be seen that the performance of the proposed TTS system is excellent from the experimental results derived by the MOS and timbre similarity listening tests.

A Study on Copyright Protection Method of Web Image Contents (웹 이미지 콘텐츠 저작권보호 방법에 관한 연구)

  • Yi, Yeong-Hun;Cho, Man-Gi;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.37-43
    • /
    • 2015
  • Technical treatments of image contents on the web include the copy protection method such as the image capture protection technology and the traitor tracing method to detect unauthorized duplications through watermarking insertion or feature information technology. However, these two methods have their own weaknesses. The image capture protection method is unable to protect illegal captures when the URLs of image sources are exposed. The traitor tracing method is fundamentally unable to protect illegal captures due to its post-treatment method. Besides, the weakness of using the copyright information display technology involves easy removal of copyright information from copyrighted contents. This paper suggests a model of the web image contents protection system which makes it hard to separate copyright information from web image contents and allows image contents to be shown only in the authorized websites.

A P2P Network Design with Dynamic Topology Cloning (동적 위상 복제를 이용한 P2P 네트워크 설계)

  • 구태완;김은규;이성룡;정연진;이광모
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.433-435
    • /
    • 2003
  • Peer­To­Peer(P2P) 네트워크 모델은 기존의 클라이언트/서버(Client/Server:C/S) 네트워크 모델에 비해 중앙 네트워크상의 트래픽 회피라는 측면에서 현재 활발히 연구되고 있는 분야이다. 그러나 P2P 네트워크 모델은 확장성, 네트워크에 참여하는 노드들의 수에 대한 제약, 구성된 네트워크 모델 기반에서 정보 및 공유 가능한 자원들의 검색에 대한 어려움 등의 많은 문제점들이 있다. 본 논문에서는 효과적인 정보 및 자원의 검색을 위해 정형화된 P2P 네트워크 모델을 기반으로 하여 P2P 네트워크 모델이 가지고 있는 특성들을 고려하여 동적으로 구성 가능한 위상 구조를 제시한다.

  • PDF