• Title/Summary/Keyword: 적합도 공유 기법

Search Result 105, Processing Time 0.025 seconds

A Study on the Replication Consistency Model for the Mapping System on the Client-Sewer Environment (클라이언트-서버 환경의 매핑 시스템 개발을 위한 복제 일관성 모델에 관한 연구)

  • Lee, Byung-Wook;Park, Hong-Gi
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.5 no.2 s.10
    • /
    • pp.193-205
    • /
    • 1997
  • It is required for multi-users to share massive mapping data effectively that distributed data model in the Client-Server environment is developed for the replication consistency. The existing model is not effective to the long transaction just like a mapping system, since it does not account lot consistency between GUI screen and database replications even though it emphasizes on the replication consistency. The performance of concurrency control is very important for those long transactions, especially the mapping systems. This model is to support consistency between GUI screen and replicas using display locks. It suggests consistency model improving process performance by modifying memory consistency model and optimistic concurrency control for mapping data's characteristics.

  • PDF

Improving Constructability for Partnering in Large Hospital Construction Projects (대형병원 프로젝트의 시공성 증대를 위한 파트너링 모델 구축)

  • Kim Sang-Il
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.3 s.19
    • /
    • pp.153-165
    • /
    • 2004
  • Most engineering tasks require collaboration between many users in major hospital construction projects that have many reconstructions. Loss and change orders occurred in factors such as information exchange, misunderstandings, advanced technology in hospital projects. Moreover, changes in context, costs, requirements, deadlines, etc. require negotiation of issues that may modify important project characteristics. The objective of this paper is to reduce reconstruction for the pre-construction process of hospital projects, reconstruction factors were analyzed in recent hospital construction project the system was established in order to solve reconstruction factors, and this system was validated through applying to the real project. Therefore it is a major challenge to make high level of communication and to have mutual understanding.

A Study on Interference Analysis between Base Stations with FDD and TDD Modes for IMT-2000 (FDD 및 TDD 모드 채용 IMT-2000 시스템 기지국간 간섭분석 연구)

  • 이일근;이형수;이정규;신경철;김경태
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.12 no.1
    • /
    • pp.11-17
    • /
    • 2001
  • This paper introduces an interference analyzer based on the statistical approach called the Monte Carlo methodology, which has been chosen as one of the interference analyzing techniques in ITU-R. Furthermore, using the interference analyzer developed in this paper with modified Hata model, computer simulation is performed to examine probability of interference affecting between the base stations with FDD and TDD modes for IMT-2000. Through the simulation results, it is confirmed that two different systems with FDD/TDD modes of same frequency bands can be simultaneously used in a cell without significant interference, under the parameter conditions specified in this paper.

  • PDF

A Study on Secure Group Key Management Based on Agent for Multicast Data Transmission (멀티캐스트 전송을 위한 에이전트 기반의 안전한 그룹 키 관리방안 연구)

  • Kim, Bo-Seung;Kim, Jung-Jae;Zhang, Feng-De;Shin, Yong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.436-444
    • /
    • 2011
  • As practical use degree of multicasting increase, security for multicast is recognized as an important issue. Previous research in the area of secure multicast has mainly focused on group key management. The most important thing about the security of multicast is that only authorized members of this group will be able to access the data. The member of access to multicast communication is to use cryptography with a common shared session encryption key. We propose decentralized group key management based on agent for dynamic multicast with large groups and frequent joins or leaves in this paper. Whole group divide to several subgroup using agent technology and each agent manage members of each subgroup. Also, when rekeying updates that using one-way hash function can prevent the key exposure, and reduce the key distribution delay.

A Study on an Impedance Matching Technique for Rail Power Line Communication (레일 전력선통신을 위한 임피던스 정합방안 연구)

  • Seo, Ill-Kwon;Ahn, Seung-Ho;Kim, Chul-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.202-207
    • /
    • 2016
  • An auxiliary real-time train communications system among drivers, train-traffic controllers and field workers is necessary to share hazard information (i.e. rockfall detection, track maintenance) in low visibility zones (long tunnels and steep curved track). To develop the appropriate communication system, this paper proposes a new way of power line communication using the rail track (Rail - PLC), which has little noise and distortion of attenuation. Therefore, it is important to measure the impedance of the rail and to apply an impedance matching technique to increase the transmission characteristic of the Rail - PLC. This study would evaluate the reflection and the transmission characteristics of the rail using a network analyzer and an impedance matching transformer. The suitable impedance matching ratio was 1:3.28 from the result of back-to-back testing. The results confirmed that the transformer can improve the performance of the transmission signal in Rail - PLC using an impedance matching technique.

An Efficient Algorithm of Network Bandwidth Allocations for Multimedia Services (멀티미디어 서비스를 위한 효율적인 대역폭 할당)

  • 김정택;고인선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1112-1123
    • /
    • 2002
  • Providing a multimedia service requires efficient network bandwidth allocation scheduling. Typically, transmission of information with bursty characteristics, such as a video data stream, utilizes some type of smoothing technique that reduces the transmission rate fluctuation. While capable of a drastic reduction in the peak transmission rate, even the optimum smoothing algorithm proposed to date, however, is rather inadequate for multi-stream applications that share network bandwidth since such an algorithm has been designed and applied toward handling each independent stream. In this paper, we proposed an efficient bandwidth allocation algorithm that addresses these shortcomings. The proposed bandwidth allocation algorithm is divided into two steps, a static bandwidth allocation and a dynamic bandwidth allocation. In the former case, the peak rate reduction is achieved by maintaining the accumulated data in the user buffer at a high level, whereas the concept of real demand factor is employed to meet the needs of multi-stream bandwidth allocation in the latter case, Finally, the proposed algorithm's performance was verified with ExSpect 6.41, a Petri net simulation tool.

Design and Implementation of an Embedded Spatial MMDBMS for Spatial Mobile Devices (공간 모바일 장치를 위한 내장형 공간 MMDBMS의 설계 및 구현)

  • Park, Ji-Woong;Kim, Joung-Joon;Yun, Jae-Kwan;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.1 s.13
    • /
    • pp.25-37
    • /
    • 2005
  • Recently, with the development of wireless communications and mobile computing, interest about mobile computing is rising. Mobile computing can be regarded as an environment where a user carries mobile devices, such as a PDA or a notebook, and shares resources with a server computer via wireless communications. A mobile database refers to a database which is used in these mobile devices. The mobile database can be used in the fields of insurance business, banking business, medical treatment, and so on. Especially, LBS(Location Based Service) which utilizes location information of users becomes an essential field of mobile computing. In order to support LBS in the mobile environment, there must be an Embedded Spatial MMDBMS(Main-Memory Database Management System) that can efficiently manage large spatial data in spatial mobile devices. Therefore, in this paper, we designed and implemented the Embedded Spatial MMDBMS, extended from the HSQLDB which is an existing MMDBMS for PC, to manage spatial data efficiently in spatial mobile devices. The Embedded Spatial MMDBMS adopted the spatial data model proposed by ISO(International Organization for Standardization), provided the arithmetic coding method that is suitable for spatial data, and supported the efficient spatial index which uses the MBR compression and hashing method suitable for spatial mobile devices. In addition, the system offered the spatial data display capability in low-performance processors of spatial mobile devices and supported the data caching and synchronization capability for performance improvement of spatial data import/export between the Embedded Spatial MMDBMS and the GIS server.

  • PDF

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

Failure Detection and Resilience in HRing Overlay Network (HRing 오버레이 네트워크에서 실패 탐지 및 회복)

  • Gu, Tae-Wan;Lee, Kwang-Mo
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.21-33
    • /
    • 2007
  • An overlay network is a virtual network which is constructed on top of a physical computer network. A node in the overlay network is connected through virtual or logical links, where each link corresponds to a path of the links in the underlying physical network. Overlay networks are suitable for sharing heterogeneous resources in distributed environments, However, overlay networks are limited for achieving reliable communication that failure detection in overlay networks is a very important issue. In this paper, we review conditions of conventional failure detection and propose a new approach to failure detection and resilience which can be applied to HRing (Hierarchical Ring) overlay networks. The proposed method consists of the failure detection and the failure resilience phases. Because it utilizes the characteristics of the HRing overlay network for failure detection, it can reduce unnecessary network traffic and provide better scalability and flexibility. We also analyzed and evaluated the performance of the proposed approach through simulations.

  • PDF

Late Comer and Error Recovery Process for Home Network Environment with Session Management (세션 관리 기능을 포함한 홈 네트워크 환경에서의 지각자 및 오류 복구 처리)

  • Kim, Hak-Joon;Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.666-672
    • /
    • 2008
  • This paper explains late comer and error recovery process for home network environment with session management. This system consists of an ED, ES, and ER. ED is an agent that detects an error by hooking techniques for multimedia distance education based on home network environment with session management. ES is an agent that is an error sharing system for multimedia distance education based on home network environment with session management. ER is a system that is suitable for recovering software error for multimedia distance education based on home network environment with session management. This paper explains a performance analysis of an error recovery system running on distributed multimedia environment using the rule-based DEVS modeling and simulation techniques. The proposed method is more efficient than the other method in comparison with error ration and processing time.

  • PDF