• Title/Summary/Keyword: 우선순위검색

Search Result 117, Processing Time 0.025 seconds

A load Balancing System for improving the Performance of Semantic Web based Visual Media Retrieval Framework (분산시각 미디어 검색 프레임워크의 성능향상을 위한 부하분산 시스템)

  • Shim, Jun-Yong;Won, Jae-Hoon;Kim, Seh-Chang;Kim, Jung-Sun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10b
    • /
    • pp.213-217
    • /
    • 2006
  • 기존의 Ontology를 이용한 이미지 검색 시스템이나 간단한 구조를 가진 메타데이터 기반의 분산 이미지 검색 시스템들의 단점들을 극복하기 위해 다양한 이미지 제공자들의 자율성을 보장하면서, Semantic 기반의 이미지 검색을 지원하는 분산 시각미디어 검색 프레임워크인 HERMES(The Retrieval Framework for Visual Media Service)가 제안되었다. 분산 환경에서는 시스템의 규모가 커지면서 사용자들의 상호작용 성능을 떨어뜨리지 않으면서 다수의 동시 사용자들을 처리할 수 있는 확장성(Scalability)이 중요한 이슈가 된다. 제안된 프레임워크에서는 서비스를 사용하는 다수의 사용자들이 Broker 서버에 동시에 접속했을 경우 발생하는 Overhead에 대한 문제를 해결 할 수 없었기 때문에 성능의 저하와 확장성을 고려할 수 없는 문제를 안고 있다. 이런 문제를 해결하기 위해서 Broker 서버의 내부 컴포넌트의 수행시간을 측정하고 이를 주기적으로 수집하여 저장하는 Monitoring System이 추가로 연구되었지만, 수집한 정보를 가공하여 다수의 Broker 서버에 대한 부하를 분산하는 알고리즘은 제공되지 않았다. 본 논문에서는 다수의 동시 사용자들이 접속했을 경우에도 성능의 저하 없이 비슷한 수준의 서비스를 제공하기 위해서 Broker 서버를 증설하여 Monitoring System으로부터 각각의 Broker 내부 컴포넌트의 수행시간을 측정하여 저장하고, 저장된 데이터에 대하여 각 Broker들에 대한 우선순위를 결정하는 테이블을 작성한다. 사용자로부터 Query를 입력받는 User Interface는 Broker의 Ranking Table을 참조하여 다수의 Query 수행을 여러 서버로 분산처리하게 함으로써 성능에 대한 신뢰성을 향상 시킬 수 있는 Load Balancing System을 제안한다.할 때 가장 효과적인 라우팅 프로토콜이라고 할 수 있다.iRNA 상의 의존관계를 분석할 수 있었다.수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.의 안정된 방사성표지효율을 보였다. $^{99m}Tc$-transferrin을 이용한 감염영상을 성공적으로 얻을 수 있었으며, $^{67}Ga$-citrate 영상과 비교하여 더 빠른 시간 안에 우수한 영상을 얻을 수 있었다. 그러므로 $^{99m}Tc$-transierrin이 감염 병소의 영상진단에 사용될 수 있을 것으로 기대된다.리를 정량화 하였다. 특히 선조체에서의 도파민 유리에 의한 수용체 결합능의 감소는 흡연에 의한 혈중 니코틴의 축적 농도와 양의 상관관계를 보였다(rho=0.9, p=0.04). 결론: $[^{11}C]raclopride$ PET을 이용하여 비흡연 정

  • PDF

Risk Management and Strategies in Airport Security Check (공항 보안검색에 있어서의 위험관리와 대응과제)

  • Kim, Jae-Woon
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.89-113
    • /
    • 2013
  • Travel by airplane using airport in globalized modern society is familiar to our life but such airport can be a target of terrorists who would threaten our safety. However, aviation terrorism which is represented by 9.11 terror gives horror beyond our imagination to modern people. Since the first airplane hijacking in Peru in 1931 happened, security organization in each nation has taken various prevention measures to block aviation terrorism. The most realistic measures to prevent aviation terrorism would be security check activity to control approach of terrorist that passengers on airplane and cargos are checked to find out dangerous article like explosive etc. But security check activity in Korea shifted to security check activity focused on private security for efficiency of airport operation differently from security check activity in advanced countries where public interests is strengthened according to risk of terror after 9.11 system. That is, since Incheon airport opened in March 2001, security check system focused on the police was changed. Now Incheon international airport Corporation instructs and supervises security check job and private security personnel are in charge of actual security check activity. But this check system has limitation in blocking terror activity by terrorists which is systematized and intelligent as time passes due to deteriorated job satisfaction of private security personnel and confusing supervising system. Accordingly, it is suggested to introduce risk management skill which is one of management strategy of private corporation for security check activity to prevent terror activity. With this skill, risk factors of aviation terror are identified and analyzed regularly, and each process such as setting of priority, activity to reduce risk, and assessment of security is carried out. And it would be necessary to do efforts, for example, to properly change level of security check according to threat of terror such as to place policeman at airport security in case threat of terror is severe. On the other hand, it is necessary to establish national police organization for good communication of security check activity in field and supervising function, which can encourage systematization and specialization of aviation security job.

  • PDF

A Study of Performance Analysis on Effective Multiple Buffering and Packetizing Method of Multimedia Data for User-Demand Oriented RTSP Based Transmissions Between the PoC Box and a Terminal (PoC Box 단말의 RTSP 운용을 위한 사용자 요구 중심의 효율적인 다중 수신 버퍼링 기법 및 패킷화 방법에 대한 성능 분석에 관한 연구)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.54-75
    • /
    • 2011
  • PoC(Push-to-talk Over Cellular) is an integrated technology of group voice calls, video calls and internet based multimedia services. If a PoC user can not participate in the PoC session for various reasons such as an emergency situation, lack of battery capacity, then the user can use the PoC Box which has a similar functionality to the MM Box in the MMS(Multimedia Messaging Service). The RTSP(Real-Time Streaming Protocol) method is recommended to be used when there is a transmission session between the PoC box and a terminal. Since the existing VOD service uses a wired network, the packet size of RTSP-based VOD service is huge, however, the PoC service has wireless communication environments which have general characteristics to be used in RTSP method. Packet loss in a wired communication environments is relatively less than that in wireless communication environment, therefore, a buffering latency occurs in PoC service due to a play-out delay which means an asynchronous play of audio & video contents. Those problems make a user to be difficult to find the information they want when the media contents are played-out. In this paper, the following techniques and methods were proposed and their performance and superiority were verified through testing: cross-over dual reception buffering technique, advance partition multi-reception buffering technique, and on-demand multi-reception buffering technique, which are designed for effective picking up of information in media content being transmitted in short amount of time using RTSP when a user searches for media, as well as for reduction in playback delay; and same-priority packetization transmission method and priority-based packetization transmission method, which are media data packetization methods for transmission. From the simulation of functional evaluation, we could find that the proposed multiple receiving buffering and packetizing methods are superior, with respect to the media retrieval inclination, to the existing single receiving buffering method by 6-9 points from the viewpoint of effectiveness and excellence. Among them, especially, on-demand multiple receiving buffering technology with same-priority packetization transmission method is able to manage the media search inclination promptly to the requests of users by showing superiority of 3-24 points above compared to other combination methods. In addition, users could find the information they want much quickly since large amount of informations are received in a focused media retrieval period within a short time.

Perception and Practices Regarding Food Allergy of Elementary and Middle School Nutritionists in the Jeonnam Area (전남지역 초등학교와 중학교 영양(교)사의 식품알레르기 관련 업무에 관한 인식 및 수행도)

  • Kim, Young-Mi;Heo, Young-Ran;Ro, Hee-Kyong
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.43 no.1
    • /
    • pp.151-161
    • /
    • 2014
  • As concerns have been raised about the increasing number of children with food allergies, the management of food allergies through the consideration of school meals is an emerging issue. This study investigated the perception and practices regarding food allergy of elementary and middle school nutrition teachers in the Jeonnam area. A total of 236 nutritionists/nutrition teachers participated in the survey and completed questionnaires. The foods most reported to cause allergic reactions were peach, eggs, peanuts, shrimps, mackerel, and milk. Participants reported that the major tasks to be completed for management of food allergies: the estimated number of students with food allergies, the offering of allergy-free or alternative foods and informing families of foods that may cause an allergic reaction. A majority of the participants (94%) recognized that the nutrition teacher has the primary role in managing students with food allergies in school. To manage these students, nutrition teachers mostly reported informing of allergic foods/ingredients in the school menu and the estimation of students with food allergy. The percentage of participants who experienced education programs on food allergies was 16.9%, whereas 97% of participants answered that a good professional education regarding allergies for nutrition teachers is required. The knowledge level evaluated with objective questions was significantly higher than the self-estimated knowledge level. In conclusion, nutrition teachers understood the tasks regarding food allergy thoroughly and that, the tasks are relatively under-practiced. To improve the management of food allergies in school meals, professional education programs regarding food allergies should be provided for nutrition teachers.

Queuing Time Computation Algorithm for Sensor Data Processing in Real-time Ubiquitous Environment (실시간 유비쿼터스 환경에서 센서 데이터 처리를 위한 대기시간 산출 알고리즘)

  • Kang, Kyung-Woo;Kwon, Oh-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.1-16
    • /
    • 2011
  • The real-time ubiquitous environment is required to be able to process a series of sensor data within limited time. The whole sensor data processing consists of several phases : getting data out of sensor, acquiring context and responding to users. The ubiquitous computing middleware is aware of the context using the input sensor data and a series of data from database or knowledge-base, makes a decision suitable for the context and shows a response according to the decision. When the real-time ubiquitous environment gets a set of sensor data as its input, it needs to be able to estimate the delay-time of the sensor data considering the available resource and the priority of it for scheduling a series of sensor data. Also the sensor data of higher priority can stop the processing of proceeding sensor data. The research field for such a decision making is not yet vibrant. In this paper, we propose a queuing time computation algorithm for sensor data processing in real-time ubiquitous environment.

Discovery Methods of Similar Web Service Operations by Learning Ontologies (온톨로지 학습에 의한 유사 웹 서비스 오퍼레이션 발견 방법)

  • Lee, Yong-Ju
    • The KIPS Transactions:PartD
    • /
    • v.18D no.2
    • /
    • pp.133-142
    • /
    • 2011
  • To ensure the successful employment of semantic web services, it is essential that they rely on the use of high quality ontologies. However, building such ontologies is difficult and costly, thus hampering web service deployment. This study automatically builds ontologies from WSDL documents and their underlying semantics, and presents discovery methods of similar web service operations using these ontologies. The key ingredient is techniques that cluster parameters in the collection of web services into semantically meaningful concepts, and capture the hierarchical relationships between the words contained in the tag. We implement an operation retrieval system for web services. This system finds out a ranked set of similar operations using a novel similarity measurement method, and selects the most optimal operation which satisfies user's requirements. It can be directly used for the web services composition.

Intelligence in the Internet Era: Understanding OSINT and Case Analysis (인터넷 시대의 정보활동: OSINT의 이해와 적용사례분석)

  • Lee, Wan-Hee;Yun, Min-Woo;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.259-278
    • /
    • 2013
  • With advances of information technology (IT) and the Internet, it became much easier to search and collect information through many different types of web search engine. Such information only restricted to the intelligence services became available to the public, and the increased open source changed the intelligence collection activities of governments. Open Source Intelligence (OSINT) was introduced to organize and analyze the large volumes of information. OSINT is actively used after the 9/11 terrorist attack, and the United States government invest a huge amount of budget to conduct research and develope technology about OSINT. Although many Western countries recognize the importance of OSINT and deal with open source as priority, South Korea has not fully understand the important role of OSINT. Therefore, this study introduces the fundamental principles of OSINT and provides practical examples of OSINT usage. OSINT is an effective source to prevent terrorist attacks as well as a variety of crimes. Extensive discussion and suggestions for future usages are provided.

  • PDF

A Study on the Development Strategies for e-commerce Innovation (e-커머스 서비스 혁신을 위한 발전전략 연구)

  • Kwon, Hyeog In;Baek, Bo Hyun;Ahn, Yea Jin;Lee, Jin Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.217-232
    • /
    • 2020
  • The purpose of this study is to organize prior research related to e-commerce activation factors available to stakeholders in the online distribution industry, and to conduct FGI with e-commerce experts to calculate the importance of each factor in order based on the 3 Level Service Model of Kwon Hyeog-in (2010), the key factors derived through the preceding study and the FGI were structured and the weighting of each factor was derived using AHP methodology. In the higher factors, the private sector (0.542) > communes (0.237) > public (0.2222) appeared to be important. Sub-factories included 'search service development' (0.0970)', 'recommendation service development (0.0805)', 'consumer needs analysis (0.0534)', 'consumer consumption pattern analysis (0.0505)' and 'other platform-linked service development (0.0450)', in the order of weighting down, indicating each of the factors within the top 15 priority. The results of this study will be utilized throughout the e-commerce industry as well as e-commerce enterprises, providing an academic foundation for the rapidly growing e-commerce ecosystem.

A Study on Music Contents Recommendation Service using Emotional Words (감성어휘를 이용한 음악콘텐츠 추천 서비스의 연구)

  • Jang, Eun-Ji
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.43-48
    • /
    • 2008
  • And this study intends to discuss especially the one using emotional filter among various information processing methods. The existing music recommendation service on the web has a weak point that it makes the user feel bored by recommending songs only with similar feeling of the same genre, because music is classified by tune, melody, atmosphere and genre before recommendation. The service using emotion filter, suggested in this study, recommends the song and lyrics appropriate to the current emotional state of the user by abstracting emotional words that could reflect the sensitivity of human and then search the words within lyrics to match in order to overcome the weak point of the existing service. This study starts where the current emotional status for the user is being input. As for the range to choose, there are the seven representatives of emotion which are, love, separation, joy, sorrow-gloom, happiness-lonesome, and anger. As the service receives input of user's emotion, it matches the emotional words appropriate for the emotion input with the lyrics, and ranks the lyrics in the order of priority, so that it recommends the song and it lyrics to the user.

  • PDF

Strategies for College Entrance Based on Big Data Analysis -Case Study of college in Central Region- (빅데이터 분석에 기반한 대학 입시홍보 -중부권 전문대학교 사례-)

  • Bae, Jungho;Burm, Eunae
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.25-33
    • /
    • 2022
  • The purpose of this study is to provide the basic data for establishing a unique admissions promotion strategy for each university and to innovate the paradigm of university admissions promotion through the examples of central universities in the practice of PR promotion based on big data analysis. To this end, prior literature related to university publicity (marketing), and recognition of prospective college students who visited the university, and database data were defined and analyzed as big data. As a result, first, the preliminary studies related to college entrance exam promotion (marketing) increased dramatically in the 2000s and 2010s as part of preparing for countermeasures against population decline in school age. Responding to the need for an admissions promotion strategy to accelerate visits to prospective college students, the database data analysis result suggested the selection and concentration of entrance exam strategies based on the university's regional and academic characteristics.