• Title/Summary/Keyword: 정보교환 기법

Search Result 689, Processing Time 0.026 seconds

Storage Techniques Using an Object-Relational Database for XML Documents (객체-관계형 데이터베이스를 이용한 XML 문서 저장 기법)

  • Lee, Wol-Young;Yong, Hwan-Seung
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.305-316
    • /
    • 2004
  • XML is becoming the de facto standard for data exchange over the Internet as a semistructured data which properties are irregular and incomplete. Therefore, to handle these data efficiently. what we use storage devices and storage techniques are Primary factors. In this paper, we developed storage techniques, which take the virtues of an object-relational database and support various query types needed for XML query languages without regard to the DTD. The techniques are capable with connecting naturally with conventional data and reducing overheads caused by the characteristics of an XML data model.

Congestion Control Mechanism using Real Time Signaling Information in ATM based MPLS Network (ATM 기반 MPLS 망에서 실시간 신호정보를 이용한 체증 제어 기법)

  • Ahn, Gwi-Im
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.4
    • /
    • pp.462-469
    • /
    • 2007
  • ATM protocol has the techniques such as cell discarding priority, traffic shaping and traffic policing. ATM based MPLS(Multiprotocol Label Switching) is discussed for its provisioning QoS commitment capabilities, traffic engineering and smooth migration for BcN using conventional ATM infra in Korea. This paper proposes preventive congestion control mechanism for detecting HTR(Hard To Reach) LSP(Label Switched Path) in ATM based MPLS systems. In particular, we decide HTR LSP using real time signaling information(etc., PTI,AIS/RDI) for applying HTR concept in circuit switching to ATM based MPLS systems and use those session gap and percentage based control algorithm that were used in conventional PSTN call controls. We concluded that it maximized the efficiency of network resources by restricting ineffective machine attempts. Proposed control can handle 208% call processing and more than 147% success call, than those without control. It can handle 187% BHCA(Busy Hour Call Attempts) with 100 times less than use of exchange memory.

  • PDF

The Methodology for Interoperability between Agent Framework and Information Bus Adapter for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 에이전트 시스템과 인포메이션 버스 어댑터간 상호 운용성을 위한 기법)

  • Park, Sang-Yong;Han, Seung-Wok;Youn, Hee-Yong
    • The KIPS Transactions:PartA
    • /
    • v.13A no.6 s.103
    • /
    • pp.495-500
    • /
    • 2006
  • The role of autonomic and intelligent agents in various environments is getting more important as demand on ubiquitous computing grows. The agents exchange information using the ACL (Agent Communication Language) to autonomously solve the problems. In this paper we propose a way of efficient interoperability technique between the agent framework built based on the international standard FIPA(Foundation for Intelligent Physical Agents) and the CORBA event service-based information bus adapter developed by us. The design and implementation of EMTI (Efficient Message Transport Interface) allowing communication between the information bus adapter which is non-agent platform and JADE platform are presented and its performance is evaluated by letting them exchange a large amount of messages.

A Study on the Performance Improvement in SEcure Neighbor Discovery (SEND) Protocol (보안 이웃 탐색 프로토콜 성능 향상 기법에 관한 연구)

  • Park, Jin-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.85-96
    • /
    • 2008
  • Neighbor Discovery(ND) protocol is used to exchange an information of the neighboring nodes on the same link in the IPv6 protocol environment. For protecting the ND protocol, firstly utilizing Authentication Header(AH) of the IPsec protocol was proposed. But the method has some problems-uses of key exchange protocol is not available and it is hard to distribute manual keys. And then secondly the SEcure Neighbor Discovery(SEND) protocol which protects all of the ND message with digital signature was proposed. However, the digital signature technology on the basis of public key cryptography system is commonly known as requiring high cost, therefore it is expected that there is performance degradation in terms of the availability. In the paper, to improve performance of the SEND protocol, we proposed a modified CGA(Cryptographically Generated Address) which is made by additionally adding MAC(Media Access Control) address to the input of the hash function. Also, we proposed cache mechanism. We compared performance of the methods by experimentation.

Design of Storage for Efficient Retrieval using Melodies based in XML (효율적인 선율 검색을 위한 XML문서의 저장소 설계)

  • Kim, Tae-Wan;Bae, Mi-Sook;Hwang, Bu-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.3-6
    • /
    • 2001
  • 오늘날, 웹과 네트???p의 발달로 인하여 많은 멀티미디어 정보들이 쏟아지고 있고 이에 따라 멀티미디어 정보에 대한 검색 시스템이 활발히 연구중에 있다. 아직까지 음악정보 검색에 대한 연구는 미비한데 최근 XML이 인터넷상에서 정보교환의 표준으로 자리잡으면서 서양음악을 표현하기 위한 방법으로서 MusicXML, ScoreML과 같은 포맷이 고안되었다. 기존의 음악검색기법들이 음악파일에 대해 선율 정보를 검색한 것에 비해 본 논문은 음악을 텍스트로 표현한 XML문서에 대해 멜로디만을 동기 단위로 추출하여 이동도법으로 변환하여 저장함으로서 효율적인 선율 검색이 되도록 데이터베이스 저장소를 설계한다.

  • PDF

The Improved-Scheme of Password using Final Approval Time (최종 승인시간을 이용하는 개선된 패스워드 기법)

  • Ji, Seon-Su;Lee, Hee-Choon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.3
    • /
    • pp.57-63
    • /
    • 2011
  • The internet is currently becoming popularized and generalized in our daily life. Recently, a lot of hacking tools have appeared on the internet. And damage size and seriousness the measurement is impossible. The password security protects oneself and information is the tool which is essential for from the internet, if this emphasizes no matter how, does not go to extremes. If applies a encryption, a 7 character password is sufficient, so long as attackers don't pick easily guessed values. In this paper, entering password using the virtual keyboard, I propose a new and improved one time password algorithm using information a part of ID and final approval time.

Item based Reputation Management for Ensuring Reliabilities in P2P Environments (P2P 환경에서 신뢰성 보장을 위한 아이템 기반 평판 관리)

  • Park, yong-hun;Bok, kyoung-soo;Yoo, jae-soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2012.05a
    • /
    • pp.37-38
    • /
    • 2012
  • 개인 컴퓨터의 보급과 중앙집중식 처리의 한계로 인해 P2P 기술에 대한 관심이 부각됨에 따라 피어들에 대한 평판을 관리하는 방법들이 연구되고 있다. 본 논문에서는 피어들의 평가와 더불어 피어가 포함하는 아이템들에 대한 평가를 위한 모델을 제안한다. 제안하는 기법은 P2P 환경에서 아이템 공유를 위한 평판 관리 기법 과 악의 피어 검출 방법으로 구성된다. 제안하는 기법은 아이템을 공유하는 피어들 간에 악의 피어에 대한 정보를 상호 교환하여 악의 피어 검출의 정확성을 향상시킨다.

  • PDF

Dynamic Slot Re-assignment Scheme for Network Merge in Swarming Drone Networks (군집 드론 네트워크에서 네트워크 결합을 위한 동적 슬롯 재할당 기법)

  • Lee, Jong-Kwan;Lee, Minwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.156-164
    • /
    • 2019
  • In this paper, we propose an efficient dynamic slot re-assignment scheme for swarming drone networks in which networks members merged and split frequently. The leader drone of each network recognizes the slot allocation information of neighbor networks by periodic information exchange among between the drones. Using the information, the leader drone makes a decision how to reallocate the slots between members in case of network merge. The non-competitive method in the proposed scheme can re-assign the slots without any slot collision and shows always superior performance than competitive scheme. The competitive method in the proposed scheme reduces the number of slots that should be re-assigned in case of network merge. The experimental performance analysis shows that the proposed scheme performs better or at least equal to the performance of the competitive scheme in a swarming drone network.

A Pipelined Loading Mechanism for a Hierarchical VOD Server Based on DVD Jukebox (DVD 쥬크박스 기반의 계층적 VOD 서버 구성을 위한 파이프라인 로딩 기법)

  • 최황규
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.3
    • /
    • pp.391-406
    • /
    • 2002
  • In order to realize a practical VOD system, it is necessary for a high-capacity and cost-effective hierarchical VOD server based on tertiary storages such as DVD jukebox. In such a system, it is possible to transfer multiple streams to users by alternatively swapping DVDs using the fixed number of drives. But it takes a long time for loading DVD to a drive. In this paper, we propose a primitive pipelined loading mechanism for hiding the loading time to swap DVDs in a hierarchical VOD server based on DVD jukebox. We also propose a enhanced pipelined loading mechanism for increasing the maximum admittable streams with the fixed number of drives. The enhanced mechanism caches the initial segment of each stream on a disk storage allowing faster data transfer. The performance analysis shows that the proposed mechanisms can admit the maximum allowed stream capacity under the fixed number of disk drives.

  • PDF

An approach to analyzing QOS items by implementing the Data Warehouse for the PSTN traffic (전화망 트래픽 정보 데이터웨어하우스 구축을 통한 서비스품질요소 분석 방안)

  • 조유희;박길주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.727-729
    • /
    • 1999
  • 최근 기업의 정보기술에 대한 중요성이 부각되면서 통신업체를 비롯하여 다양한 업종에서 데이터웨어하우징 기법과 연계한 통합 정보 시스템을 이미 구축하였거나 서둘러 구축하고 있다. 본 논문에서는 교환기에서 출력하고 있는 원시트래픽데이터를 기반으로 전화망 트래픽정보 데이터웨어하우스(Data Warehouse, 이하 DW)를 구축할 경우, 이를 통해 보다 다양한 서비스 품질 분석이 가능함을 보이고자 한다. 지금까지 트래픽 데이터는 최번시의 데이터만을 대상으로 단편적인 분석만 수행해왔는데, DW 구축을 통해 이를 전 시간대 데이터로 그 대상 범위로 확장하고, 분석 항목도 보다 다양화 가능하며, 또 기존의 정형화된 질의 형식이 나니라, 비정형화된 질의를 수행할 수 있다. DW 구축시 전화망에서 측정 가능한 완료율을 포함한 폭주율, 화중율, 오번호율 등 품질요소들에 대하여 보다 세분화하여 심층 분석가능하고, 시간차원, 지역차원을 기준으로 다각적으로 분석가능하다. 뿐만 아니라, DW 구축에서는 다차원 모델링을 적용하기 때문에 어느 계층의 사용자 요구사항이라도 신속하게 원하는 정보에 접근하도록 지원할 수 있다.

  • PDF