• Title/Summary/Keyword: 선택적 공유

Search Result 407, Processing Time 0.026 seconds

Improved Task Scheduling Algorithm Considering the Successive Communication Features of Heterogeneous Message-passing System (메시지 패싱 시스템의 통신 특성을 고려한 개선된 태스크 스케줄링 기법)

  • 노두호;김성천
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.347-352
    • /
    • 2004
  • This thesis deals with a task scheduling on a message-passing system. Scheduling and allocation are very important issues since the inappropriate scheduling of tasks cannot exploit the true potential of the system and it can offset the grain from parallelization. It is difficult to apply previous schemes to message-passing system, because previous schemes assume the shared memory system. This thesis proposes an modified priority function and processor selection technique that consider the problems caused by the difference between previous models and message-passing environments. The priority function includes the cumulative communication cost which causes task execution to be delayed. The processor selection technique avoids the situation that a child task is assigned to the same Processor allocated to its parent task that has other unscheduled child tasks. We showed by some simulations that our modified features of task scheduling algorithm can make the better scheduling results than the previous algorithms.

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

Parallelization of Genome Sequence Data Pre-Processing on Big Data and HPC Framework (빅데이터 및 고성능컴퓨팅 프레임워크를 활용한 유전체 데이터 전처리 과정의 병렬화)

  • Byun, Eun-Kyu;Kwak, Jae-Hyuck;Mun, Jihyeob
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.10
    • /
    • pp.231-238
    • /
    • 2019
  • Analyzing next-generation genome sequencing data in a conventional way using single server may take several tens of hours depending on the data size. However, in order to cope with emergency situations where the results need to be known within a few hours, it is required to improve the performance of a single genome analysis. In this paper, we propose a parallelized method for pre-processing genome sequence data which can reduce the analysis time by utilizing the big data technology and the highperformance computing cluster which is connected to the high-speed network and shares the parallel file system. For the reliability of analytical data, we have chosen a strategy to parallelize the existing analytical tools and algorithms to the new environment. Parallelized processing, data distribution, and parallel merging techniques have been developed and performance improvements have been confirmed through experiments.

An Economic Analysis of Alternative Mechanisms for Optimal IT Security Provision within a Firm (기업 내 최적 정보기술보안 제공을 위한 대체 메커니즘에 대한 경제적 분석)

  • Yu, Seunghee
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.107-117
    • /
    • 2013
  • The main objective of this study lies at examining economic features of IT security investment and comparing alternative mechanisms to achieve optimal provision of IT security resources within a firm. There exists a paucity of economic analysis that provide useful guidelines for making critical decisions regarding the optimal level of provision of IT security and how to share the costs among different users within a firm. As a preliminary study, this study first argues that IT security resources share some unique characteristics of pure public goods, namely nonrivalry of consumption and nonexcludability of benefit. IT security provision problem also suffers from information asymmetry problem with regard to the valuation of an individual user for IT security goods. Then, through an analytical framework, it is shown that the efficient provision condition at the overall firm level is not necessarily satisfied by individual utility maximizing behavior. That is, an individual provision results in a suboptimal solution, especially an underprovision of the IT security good. This problem is mainly due to the nonexcludability property of pure public goods, and is also known as a free-riding problem. The fundamental problem of collective decision-making is to design mechanisms that both induce the revelation of the true information and choose an 'optimal' level of the IT security good within this framework of information asymmetry. This study examines and compares three alternative demand-revealing mechanisms within the IT security resource provision context, namely the Clarke-Groves mechanism, the expected utility maximizing mechanism and the Groves-Ledyard mechanism. The main features of each mechanism are discussed along with its strengths, weaknesses, and different applicability in practice. Finally, the limitations of the study and future research are discussed.

  • PDF

Typicality of Female Main Characters Appearing in the TV Melodrama Genre -From 1992 till 2012- (멜로장르 TV드라마에 나타나는 여성 주인공의 전형성 (1992년부터 2012년까지))

  • Lee, Hwa-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.604-613
    • /
    • 2013
  • Advanced research has often discussed that the melodrama genre reproduces typical female image more than any other genre in setting up female image. However, the advanced research is not based on quantitative methods, so it is hard to say that it has verified the conservativeness or typicality of the melodrama genre. This study applies quantitative research methods for the typicality of female image in the TV melodrama genre and intends to prove it through comparative analysis with the overall genre female image. According to the study result, the TV melodrama genre's shows less change than the overall genre female image. About their appearance, the overall genre female image indicates increase of non-femininity and activeness in their relationship with others; however, in the melodrama genre, women with typical feminine appearance and passive female image have been maintained from 1992 till 2012. In the system in which women shared men's capital in their lover or wife's status, their feminine and beautiful appearance was used as women's physical capital that enhances their possibility to be selected by men. Even in the present that women's economic power has been elevated, however, the melodrama genre still maintains typical female image distinctively. Typicality of such female image shown in the melodrama genre of which major viewers are women seems to represent contemporary women's ambivalent and contradictory desire.

"Our first baby was born" Experience in the newly-wed couples: A Qualitative Study (첫 자녀 출산 전후 부부의 관계 경험에 대한 질적 연구 - 적응 과정에 대한 탐색)

  • Choe, Seung-Mi;Gwon, Jeong-Hye
    • The Korean Journal of Woman Psychology
    • /
    • v.17 no.4
    • /
    • pp.679-704
    • /
    • 2012
  • The purpose of this study was to have a phenomenological understanding of the experiences in the marital relationship after the first baby is born. For this purpose, thirteen couples (marriage duration of less than five years; within three years of the child birth) were recruited and semi-structured interviews were conducted. The interview data were analyzed through the open coding, axial coding, and selective coding. In the next step, we derived the marital relationship paradigm after the first baby arrived. The causal/situational conditions that caused changes in the marital relationship were the parenting burden and the marital adjustment level. The central phenomena were parenting and housework burden, which were moderated by the husbands' support. The action/interaction strategies were couple's high awareness and acceptance for their new role and pursuit of the shared meaning of the family. When the strategies were successful, a deeply satisfying feeling and shared values could be obtained. Finally, we identified the core category to integrate of other categories into a conceptual framework, and that is 'the awareness and acceptance for their new role and the pursuit of a sense of We-ness'.

Fabrication Method of High-density and High-uniformity Solder Bump without Copper Cross-contamination in Si-LSI Laboratory (실리콘 실험실에 구리 오염을 방지 할 수 있는 고밀도/고균일의 Solder Bump 형성방법)

  • 김성진;주철원;박성수;백규하;이희태;송민규
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.7 no.4
    • /
    • pp.23-29
    • /
    • 2000
  • We demonstrate the fabrication method of high-density and high-quality solder bump solving a copper (Cu) cross-contamination in Si-LSI laboratory. The Cu cross-contamination is solved by separating solder-bump process by two steps. Former is via-formation process excluding Cu/Ti under ball metallurgy (UBM) layer sputtering in Si-LSI laboratory. Latter is electroplating process including Ti-adhesion and Cu-seed layers sputtering out of Si-LSI laboratory. Thick photoresist (PR) is achieved by a multiple coating method. After TiW/Al-electrode sputtering for electroplating and via formation in Si-LSI laboratory, Cu/Ti UBM layer is sputtered on sample. The Cu-seed layer on the PR is etched during Cu-electroplating with low-electroplating rate due to a difference in resistance of UBM layer between via bottom and PR. Therefore Cu-buffer layer can be electroplated selectively at the via bottom. After etching the Ti-adhesion layer on the PR, Sn/Pb solder layer with a composition of 60/40 is electroplated using a tin-lead electroplating bath with a metal stoichiometry of 60/40 (weight percent ratio). Scanning electron microscope image shows that the fabricated solder bump is high-uniformity and high-quality as well as symmetric mushroom shape. The solder bumps with even 40/60 $\mu\textrm{m}$ in diameter/pitch do not touch during electroplating and reflow procedures. The solder-bump process of high-uniformity and high-density with the Cu cross-contamination free in Si-LSI laboratory will be effective for electronic microwave application.

  • PDF

Predict ion-based Concurrency Control for A Large Scale Networked Virtual Environment Supporting Various Navigation Speed (다양한 이동속도를 지원하는 대규모 네트웍 가상 환경을 위한 예측 기반 동시성 제어)

  • 이은희;이동만;한승현;현순주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.202-204
    • /
    • 2001
  • 가상 세계의 공유 개념은, 특히 사용자들이 인터넷 같이 대규모 네트웍을 통해 지역적으로 분산된 경우는 복제가 수용할 수 있는 상호작용 성능을 제공하기 때문에 각 사용자의 사이트에 정보를 복제함으로써 확장된다. 그러나, 다수의 동시 갱신은 replicas간의 일관되지 않은 뷰를 일으키게 될 것이다. 따라서, 동시성 제어가 복제자들간에 일관된 상태를 유지하도록 하기 위한 중요한 요소가 된다. 우리는 단지 대상 객체의 주변에 있는 사용자들만이 소유권 요청을 다중 전송하게 하는 확장성 있는 예측기반 동시성 제어 스킴을 제안했었다. 이 작업에서, 우리는 모든 사용자들이 동일한 속도론 가지고 가상 세계를 이동한다고 가정했다. 이것은, 그러나, 좀더 사실성을 더하기 위해 사용자가 가상 세계와 상호작용을 할 매 그들의 이동속도를 변경하도록 하는 네트웍 게임같은 네트웍 가상 환경에서는 너무 common 하다. 본 논문은 다양한 속도를 가진 사자를 지원하기 위한 확장을 제안한다. 확장된 스킴은 다른 속도의 수만큼의 다중 Entity Radii를 가지며 각 속도를 가진 사용자에게 분리된 큐를 할당한다. 각 큐는 다음 소유자 후보를 예측하기 위해 동시에 예측을 수행하고 선택된 후보들간에서 최소의 Predicted Collision Time을 가지는 최종 후보자가 선택된다. 이는 사용자의 속도에 기반을 둔 적절한 Entity Radius를 사용함으로써 소유권의 timely advanced transfer과, 다른 이돔 속도와 latency를 가지는 사용자들 간의 간섭을 줄임으로써 공정(공평)한 소유권 양도, 그리고 불필요한 소유권 전송을 줄임으로써 놓은 예측 정확도를 제공한다.성을 지닌 AMMQL 학습법은 로봇축구와 같이 끊임없이 실시간적으로 변화가 일어나는 다중 에이전트 환경에서 특히 높은 효과를 볼 수 있다. 본 논문에서는 AMMQL 학습방법의 개념을 소개하고, 로봇축구 에이전트의 동적 위치 결정을 위한 학습에 어떻게 이 학습방법을 적용할 수 있는지 세부 설계를 제시한다.다.으로서 hemicellulose구조가 polyuronic acid의 형태인 것으로 사료된다. 추출획분의 구성단당은 여러 곡물연구의 보고와 유사하게 glucose, arabinose, xylose 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重) $3.50{\sim}3.99kg$사이의 아

  • PDF

Data Replicas Relocation Strategy in Mobile Computing System Environment (이동 컴퓨팅 시스템 환경에서 데이터 복제 재배치 기법)

  • Choe, Gang-Hui;Jo, Tae-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2587-2596
    • /
    • 1999
  • Recently, by the extension of skills like LAN, the wireless telecommunication network and the satelite services make it possible for the mobile computer users to access a database. A method to use the replicated database on a server to get new data without missing any information has been being studied. So far we have used the Static Replica Allocation(SRA) for the replication which is the method of the replication on the server. This method is to replicate the data on the replica server after a moving host is transferred to a cell. Since the network of the SRA is very good, and if there are few moving users, no trouble will happen. But if there is no moving users in a cell, the data will not be shared. Therefore, this paper is about the study of the method of relocation after replicating the data to the cells for the users(User Select Replica Allocation : USRA). We also analyze the access rate and the possibility which are closely related to the moving frequency of the mobile hosts and the numbers of the cells. As a result, We show that the 120% lower access cost and the 40%∼50% gains are achieved from the low mobility

  • PDF

A Study on Consumer Value Perception through Social Big Data Analysis: Focus on Smartphone Brands (소셜 빅데이터 분석을 통한 소비자 가치 인식 연구: 신규 스마트폰을 중심으로)

  • Kim, Hyong-Jung;Kim, Jin-Hwa
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.1
    • /
    • pp.123-146
    • /
    • 2017
  • The information that consumers share in the SNS (Social Networking Service) has a great influence on the purchase of consumers. Therefore, it is necessary to pay attention to new research methodology and advertising strategy using Social Big Data. In this context, the purpose of this study is to quantitatively analyze customer value through Social Big Data. In this study, we analyzed the value structure of consumers for the three smartphone brands through text mining and positive/negative image analysis. Analysis result, it was possible to distinguish the emotional aspects (sensitivity) and rational aspects (rationality) for customer value per brand. In the case of the Galaxy S7 and iPhone 6S, emotional aspects were important before the launch, but the rational aspects was important after release date. On the other hand, in the case of the LG G5, emotional aspects were important before and after launch. We can propose two core advertising strategies based on analyzed consumer value. When developing advertising strategy in the case of the Galaxy S7, there is a need to emphasize the rational aspects of product attributes and differentiated functions. In the case of the LG G5, it is necessary to consider the emotional aspects of happiness, excitement, pleasure, and fun that are felt by using products in advertising strategy. As a result, this study will provide a good standard for actual advertising strategy through consumer value analysis. Advertising strategies are primarily driven by intuition or experience. Therefore, it is important to develop advertising strategies by analyzing consumer value through social big data analysis.