• Title/Summary/Keyword: 블룸

Search Result 75, Processing Time 0.022 seconds

Design and Implementation of Multiple Filter Distributed Deduplication System Applying Cuckoo Filter Similarity (쿠쿠 필터 유사도를 적용한 다중 필터 분산 중복 제거 시스템 설계 및 구현)

  • Kim, Yeong-A;Kim, Gea-Hee;Kim, Hyun-Ju;Kim, Chang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.1-8
    • /
    • 2020
  • The need for storage, management, and retrieval techniques for alternative data has emerged as technologies based on data generated from business activities conducted by enterprises have emerged as the key to business success in recent years. Existing big data platform systems must load a large amount of data generated in real time without delay to process unstructured data, which is an alternative data, and efficiently manage storage space by utilizing a deduplication system of different storages when redundant data occurs. In this paper, we propose a multi-layer distributed data deduplication process system using the similarity of the Cuckoo hashing filter technique considering the characteristics of big data. Similarity between virtual machines is applied as Cuckoo hash, individual storage nodes can improve performance with deduplication efficiency, and multi-layer Cuckoo filter is applied to reduce processing time. Experimental results show that the proposed method shortens the processing time by 8.9% and increases the deduplication rate by 10.3%.

An Analysis of Bloom's Cognitive Domain Questions in the Home Economics area of the "Technology.Home Economics" Textbooks (중학교 "기술.가정" 교과서의 가정영역에 나타난 Bloom의 인지적 영역 질문 분석)

  • Kim, Hyun-Hee;Park, Mi-Jeong;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.22 no.1
    • /
    • pp.97-115
    • /
    • 2010
  • The purpose of this study was to analyze the frequency, level, and location of Bloom's cognitive domain questions in the middle school home economics(HE) text books applied to the 7th curriculum. Analyzed textbooks were selected 15 textbooks per a grade produced from 5 publishing firms. The result of this study followed: First, the biggest number of questions belonged to Bloom's cognitive domain in HE: text was in 1st grade (36.9%), following 2nd(33.6%) and 3th(29.5%). Most questions the HE textbooks according to Bloom's cognitive domain consisted of those about the understanding(28.9%), application(28.3%) and knowledge(21.8%). Second, in case of the location of questions, the subcategory of Questions after Reading occupied 49.2% of all in Bloom's cognitive questions, the case of Questions During Reading was 36.7%, and the subcategory of Questions Before Reading was 14.1%. The rate of understanding questions was the highest as 43.2% in the Bloom's cognitive domain, and the application questions' rate were 28.4%. Analyzed the questions located in questions, the result showed that application-level questions in textbooks were the highest with 36.7%, Regarding to the questions located after Reading, the knowledge question occupied the highest with 33.4%, and next was the understanding questions(26.8%), following the application questions(21,7%).

  • PDF

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

eRPL : An Enhanced RPL Based Light-Weight Routing Protocol in a IoT Capable Infra-Less Wireless Networks (사물 인터넷 기반 기기 간 통신 무선 환경에서 향상된 RPL 기반 경량화 라우팅 프로토콜)

  • Oh, Hayoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.357-364
    • /
    • 2014
  • The first mission for the IoT based hyper-connectivity communication is developing a device-to-device communication technique in infra-less low-power and lossy networks. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.

Development of Studio Lectures to Develop Systematic Model Making Skills in Industrial Design Engineering Major (디자인공학전공에서의 체계적 모형 제작 스킬 함양을 위한 스튜디오 강의 개발)

  • Sungjoon Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.153-160
    • /
    • 2023
  • The process of verifying design concepts and ideas by producing real or equivalent model is essential in the product development process. Against this background, the purpose of this study is to consider the case of developing subjects that can systematically cultivate the ability to produce model from the basic stage to a certain level or higher, focusing on design engineering majors. As a theoretical consideration for this, prior studies related to making such as modeling or prototyping in related areas and majors such as industrial design are considered, followed by Bloom's revised taxonomy model and Hioshi Ishikawa's industrial design program as a methodological consideration for curriculum development. Finally, by applying this, we propose a new course that includes a lecture plan corresponding to the 16th week of learning, which is a general semester of university education. As a result of the study, it was confirmed that producing a physical model was still essential for the development of a new design, and accordingly, it was also necessary to establish a systematic curriculum suitable for the major area. Since the scope of this study extends to the development of subjects, in subsequent studies, it is necessary to consider the contents such as verification and reflection of the utility as competency education through actual application and suggestion of improved subject design.