• Title/Summary/Keyword: 정보공유시스템

Search Result 3,629, Processing Time 0.039 seconds

Space-Sharing Scheduling Schemes for NOW with Heterogeneous Computing Power (이질적 계산 능력을 가진 NOW를 위한 공간 공유 스케쥴링 기법)

  • Kim, Jin-Sung;Shim, Young-Chul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.7
    • /
    • pp.650-664
    • /
    • 2000
  • NOW(Network of Workstations) is considered as a platform for running parallel programs by many people. One of the fundamental problems that must be addressed to achieve good performance for parallel programs on NOW is the determination of efficient job scheduling policies. Currently most research on NOW assumes that all the workstations in the NOW have the same processing power. In this paper we consider a NOW in which workstations may have different computing power. We introduce 10 classes of space sharing-based scheduling policies that can be applied to the NOW with heterogeneous computing power. We compare the performance of these scheduling policies by using the simulator which accepts synthetically generated sequential and parallel workloads and generates the response time and waiting time of parallel jobs as performance indices of various scheduling strategies. Through the experiments the case when a parallel program is partitioned heterogeneously in proportion to the computing power of workstations is shown to have better performance than when a parallel program is partitioned into parallel processes of the same size. When the owner returns to the workstation which is executing a parallel process, the policy which just lowers the priority of the parallel process shows better performance than the one which migrates the parallel process to a new idle workstation. Among the policies which use heterogeneous partitioning and process priority lowering, the adaptive policy performed best across the wide range of inter-arrival time of parallel programs but when the load imbalance among parallel processes becomes very high, the modified adaptive policy performed better.

  • PDF

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

A User Interest-based View Synchronization Framework for Real-time Groupware over Wired and Wireless Networks (유무선 네트워크 환경에서 실시간 그룹웨어를 위한 사용자 관심 영역에 기반한 뷰 동기화 프레임워크)

  • 최미진;조은영;강경란;이동만
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.369-380
    • /
    • 2003
  • With the proliferation of a wireless support and the advances of mobile devices, there is a growing need of making it available for a wireless network as well. Low bandwidth of a wireless network is one of the major issues that should be considered for extending a synchronous collaboration system developed for a wired network to supuort a wireless network. We propose a priority-based view synchronization scheme, exploiting the relaxed synchronization. The proposed scheme leverages the fact that mobile users need not have the exactly same view as the users in a wired network since they usually have a limited screen size and thus focus only on part of a whole document. We evaluate the performance of a simple group editor with the propose scheme using ns -2. The performance results show that the proposed scheme keeps the message transmission delay low so that mobile users can have synchronous colloboration with wired users without signification delay. The proposed scheme is designed and implemented as a framework to support various kinds of realtime groupware applications, exploiting the existing groupware framework, Habanero. As a client program, we implemented a simple group text editor.

Suggestion of an Fiber Channel-Embedded IPTV STB for Optical Fiber-based IPTV Networks (광섬유 기반 IPTV 네트워크를 위한 FC 내장형 IPTV STB 제안)

  • Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.3
    • /
    • pp.213-219
    • /
    • 2017
  • Recently, the Internet Protocol Television (IPTV) services have become very common, enabling various Internet-based services as well as watching TV. In the IPTV system, a Set-Top box (STB) plays a key role as a network terminal device that transmits and receives realtime multimedia contents. In addition, the IPTV networks are usually supported by broadband optical fiber-base network such as fiber-to-the-home (FTTH), However, a general IPTV STB is regarded as one of the local area network (LAN)-attached devices while sharing the bandwidth of the LAN (e.g., Ethernet). In order to overcome the limited bandwidth utilization by fully facilitating the broadband bandwidth (e.g., 1 Gbps) of the optical fiber-based network, we propose a new FC (Fiber Channel)-embedded IPTV STB which can be directly attached to the optical fiber network. Then, we verify that the impacts of the proposed FC-embedded IPTV STB by organizing the the FC-AL (Fiber Channel-Arbitration Loop) network equipped with the FC-embedded IPTV We measures the average Start-up Delay, Average Reject Ratio and the Number of Concurrent Users through extensive simulations to investigate the performances of the suggested FC-AL-based IPTV network. Surprisingly, the IPTV network architecture with the proposed FC-embedded IPTV STBs has an excellent average start-up delay of less than 10 msec, an acceptable average reject ratio of less than 3 % as well as a linear increase of the number of concurrent users when extending the architecture. This reveals that the proposed FC embedded STB has a superior impacts on the performance of the entire IPTV network by effectively utilizing the broadband bandwidth of the fiber optic-based network.

Development of Code System for Systematic Accumulation and Utilization of Disaster Safety Data (재난안전 데이터의 체계적인 축적·활용을 위한 코드체계 개발)

  • Jung, In-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.167-175
    • /
    • 2018
  • To cope with the increasing number of natural disasters in recent years, managers in the National Disaster and Safety Status Control Center, who have considerable experience and skills, are regarded highly important. Although the National Disaster and Safety Status Control Center oversees the disaster-status control tasks in preparation for various natural and social disasters, there is little data due to the frequent replacement of managers. Therefore, this study developed a disaster-safety code system that tracks and manages disaster information, because the current record management and amount of information sharing remains very low. Among 22 natural and social disaster types, this study targeted four types of disasters: heavy snow, strong winds, high seas, and heavy rain. The final disaster-safety data code system was proposed through the following processes: analysis of the code systems of disaster areas in Korea and overseas, setup of the implementation of directions, development of the classification system, and categorization. For the systematic accumulation of data, the four code systems were integrated into one. A prototype system was developed and operated to verify the validity of the proposed code system. The results showed that data were accumulated and services were provided accordingly with respect to the proposed code system. If past data are accumulated and utilized according to the proposed code system in this study, it will be helpful in the decision making process to respond to new types of disasters, based on past experiences.

Dependency Label based Causing Inconsistency Axiom Detection for Ontology Debugging (온톨로지 디버깅을 위한 종속 부호 기반 비논리적 공리 탐지)

  • Kim, Je-Min;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.764-773
    • /
    • 2008
  • The web ontology language(OWL) has become a W3C recommendation to publish and share ontologies on the semantic web. In order to check the satisfiablity of concepts in OWL ontology, OWL reasoners have been introduced. But most reasoners simply report check results without providing a justification for any arbitrary entailment of unsatisfiable concept in OWL ontologies. In this paper, we propose dependency label based causing inconsistency axiom (CIA) detection for debugging unsatisfiable concepts in ontology. CIA is a set of axioms to occur unsatisfiable concepts. In order to detect CIA, we need to find axiom to cause inconsistency in ontology. If precise CIA is gave to ontology building tools, these ontology tools display CIA to debug unsatisfiable concepts as suitable presentation format. Our work focuses on two key aspects. First, when a inconsistency ontology is given, it detect axioms to occur unsatisfiable and identify the root of them. Second, when particular unsatisfiable concepts in an ontology are detected, it extracts them and presents to ontology designers. Therefore we introduce a tableau-based decision procedure and propose an improved method which is dependency label based causing inconsistency axiom detection. Our results are applicable to the very expressive logic SHOIN that is the basis of the Web Ontology Language.

A framework of management for preventing illegal distribution of pdf bookscan file (PDF 형식 북스캔 파일 불법 유통 방지를 위한 관리 프레임워크)

  • Lee, Kuk-Heon;Chung, Hyun-Ji;Ryu, Dae-Gull;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.897-907
    • /
    • 2013
  • Since various smart devices are being developed, a growing number of people are reading eBooks instead of paper books. However, people started making eBooks on their own by scanning paper books because there are not enough eBooks provided from market. The term "Bookscan" was made with this reason. The number of bookscan company is increasing because the equipment is too expensive. However, the commercial activity of bookscan company is against copyright law. Also bookscan files are in danger of being illegally distributed on web, because bookscan companies are not protecting copyright. Publication market follows the same procedure with sound market which was collapsed due to copyright problem. Therefore, the technical methods should be prepared for law system against bookscan. The previous ICOP(Illegal Copyrights Obstruction Program) system has been applied to sound and movie files, but not applied to publication. This paper suggests the framework for bookscan file management based on practical mechanism.

An Overview of Operations and Applications of HF Ocean Radar Networks in the Korean Coast (한국연안 고주파 해양레이더망 운영과 활용 개관)

  • Kim, Ho-Kyun;Kim, Jung-Hoon;Son, Young-Tae;Lee, Sang-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.351-375
    • /
    • 2018
  • This paper aims to i) introduce the characteristics of HF ocean radar and the major results and information produced by the radar networks in the Korean coasts to the readers, ii) make an up-to-date inventory of the existing radar systems, and iii) share the information related to the radar operating skill and the ocean current data application. The number of ocean radars has been showing a significant growth over the past 20 years, currently deploying more than 44 radars in the Korean coasts. Most of radars are in operation at the present time for the purposes related to the marine safety, tidal current forecast and understanding of ocean current dynamics, mainly depending on the mission of each organization operating radar network. We hope this overview paper may help expand the applicability of the ocean radar to fisheries, leisure activity on the sea, ocean resource management, oil spill response, coastal environment restoration, search and rescue, and vessel detection etc., beyond the level of understanding of tidal and ocean current dynamics. Additionally we hope this paper contributes further to the surveillance activity on our ocean territory by founding a national ocean radar network frame and to the domestic development of ocean radar system including signal processing technology.

An Analysis on the Purchase Satisfaction, Repurchase Intention and Recommendation according Toothpaste Choice Standard (치약선택기준에 따른 구매만족, 재구매 의도 및 권유 의사 분석)

  • Han, Ye-Seul;Lee, Ji-Eun;Moon, Hak-Jin;Lim, Soon-Ryun;Cho, Young-Sik
    • Journal of dental hygiene science
    • /
    • v.15 no.1
    • /
    • pp.77-82
    • /
    • 2015
  • The purpose of this study was to understand the buying behavior characteristics of the customers. Also, it was intended to provide information to provide companies marketing strategy. The criteria of purchasing toothpaste was to try to understand the impact on satisfaction, recommendation and repurchase Intention. The study was surveyed 248 customers who re-buy the toothpaste in oral care products showroom at university dental hospital. Statistical analysis was performed using PASW Statistics 18.0 and AMOS 18.0 at the 5% significance level. The results were as follows: 'Flavor', 'Price', 'Brand', 'Function', 'Design' of toothpaste and satisfaction showed a positive correlation. Satisfaction and repurchase intention, Recommendation showed a positive correlation. Selection criteria that affect the satisfaction when customers buy toothpaste, 'Function' was the greatest and others became the order of the 'Brand', 'Flavor', 'Price'. Satisfaction affect the recommendation and repurchase Intention. If customers are satisfied with the toothpaste products, showed the Repurchase Intention, have shown opinion that is willing to recommend this product to others. Therefore, dentistry and manufacturers of toothpaste must share a lot of information about toothpaste with customers. Also, information, function, flavor of toothpaste as well as other oral care product, It will be a needed the continuing research and development.

An Relational Analysis between Humidity, Temperature and Fire Occurrence using Public Data (공공데이터를 이용한 습도 및 온도와 실화 발생 간의 관계분석)

  • Song, Dong-Woo;Kim, Ki-Sung;Lee, Su-Kyung
    • Fire Science and Engineering
    • /
    • v.28 no.2
    • /
    • pp.82-90
    • /
    • 2014
  • According to recent government's 3.0 operating paradigm for the opening and sharing of public information, relationship between humidity, temperature and fire occurrence were analyzed using the data in National Weather Service and National Emergency Management Agency. In order to analyze the relationships between humidity, temperature and fire occurrence, hourly frequency of fire occurrence compared with humidity and temperature ranges was suggested as an analysis method. Tendencies of fire occurrence frequencies were examined through this and characteristics of detailed attributes could be statistically identified. Results about hourly frequencies of fire occurrence by classifying the humidity ranges in each region showed increasing frequencies in all areas where the humidity is lower. Hourly frequencies of fire occurrence according to temperature ranges were identified to be similar in each area as well. In addition, characteristics of objects' attributes were analyzed including types of fire, igniting source of fire, initial complex, reasons of fire occurrence, and distinctive directions were suggested. Suggested method in this paper could be practically used when suggesting the frequency in each category in fire occurrence statistics of National Fire Information System.