• Title/Summary/Keyword: 중복 서비스

Search Result 533, Processing Time 0.038 seconds

Efficient Replication Protocols for Mobile Agent Systems (이동 에이전트 시스템을 위한 효율적인 중복 프로토콜)

  • Ahn, Jin-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.12
    • /
    • pp.907-917
    • /
    • 2006
  • In this paper, we propose a strategy to improve fault-tolerance and scalability of replicated services in mobile agent systems by applying an appropriate passive replication protocol for each replicated service according to whether the service is deterministic or non-deterministic. For this purpose, two passive replication protocols, PRPNS and PRPDS, are designed for non-deterministic and deterministic services respectively. They both allow visiting mobile agents to be forwarded to and execute their tasks on any node performing a service agent, not necessarily the primary agent. Especially, in the protocol PRPDS, after a backup service agent has received each mobile agent request and obtained its delivery sequence number from the primary service agent, the backup is responsible for processing the request and coordinating with the other replica service agents. Therefore, our strategy using the two proposed protocols can promise high scalability of replicated services a large number of mobile agents attempt to access in mobile agent systems. Our simulation results show that the proposed strategy performs much better than the one using only the traditional passive replication protocol.

The Co-Occurrence of Domestic Violence and Child Maltreatment : Perspective from Child Protection Services (아동학대와 가정폭력의 중복발생 연구 : 아동보호서비스의 관점)

  • Kim, Kihyun;Kim, Yong-Hoi;Kim, Kyung-Hee
    • Korean Journal of Social Welfare Studies
    • /
    • v.49 no.4
    • /
    • pp.221-249
    • /
    • 2018
  • This study examined the co-occurrence of child maltreatment and domestic violence in South Korea, using the administrative data from Korean Child Protection Services. Existing literature showed that the co-occurrence rate was high and that the co-occurrence was important in prevention and intervention for child maltreatment. However, few studies have investigated the co-occurrence of child maltreament and domestic violence in South Korea. None of the studies have examined the co-occurrence from the perspective of child protective services. This study analyzed the rate of co-occurrence among abusive families involved with Korean Child Protective Services and examined the relationship between domestic violence and child maltreatment. Results showed that 21.4% of the abusive families had also experienced domestic violence. Various characteristics(i.e., detailed abuse characteristics, psychosocial characteristics of perpetrators) differed between co-occurrence families and maltreatment-only families. Domestic violence was a significant predictor of child maltreatment, but the detailed relationships differed according subtypes of maltreatment. Based on the results, implications for theory and service integration between services for domestic violence victims and child protective services were discussed.

Replication of blockchain application services using kubernetes and blockchain service registry (쿠버네티스와 블록체인 서비스 레지스트리를 이용한 블록체인 서비스 중복실행기법)

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.363-364
    • /
    • 2020
  • 본 논문에서는 쿠버네티스와 블록체인 서비스 레지스트리를 이용한 블록체인 서비스 중복실행 기법을 제안한다. 이 기법은 컨테이너 관리 도구인 쿠버네티스를 이용하여 중복 실행 기법이 적용된 블록체인 서비스를 신속하게 실행할 수 있다. 또한 이 기법은 서비스 접근 위치, 복구를 위한 정보 등을 저장하는 블록체인 서비스 레지스트리를 이용하여 서비스 장애가 발생할 경우에 블록체인 서비스를 견고하게 실행할 수 있다.

  • PDF

An Efficient Method for Detecting Duplicated Documents in a Blog Service System (블로그 서비스 시스템을 위한 효과적인 중복문서의 검출 기법)

  • Lee, Sang-Chul;Lee, Soon-Haeng;Kim, Sang-Wook
    • Journal of KIISE:Databases
    • /
    • v.37 no.1
    • /
    • pp.50-55
    • /
    • 2010
  • Duplicate documents in blog service system are one of causes that deteriorate both of the quality and the performance of blog searches. Unlike the WWW environment, the creation of documents is reported every time in blog service system, which makes it possible to identify the original document from its duplicate documents. Based on this observation, this paper proposes a novel method for detecting duplication documents in blog service system. This method determines whether a document is original or not at the time it is stored in the blog service system. As a result, it solves the problem of duplicate documents retrieved in the search result by keeping those documents from being stored in the index for the blog search engine. This paper also proposes three indexing methods that preserve an accuracy of previous work, Min-hashing. We show most effective indexing method via extensive experiments using real-life blog data.

An analysis of Data Deduplication techniques (데이터 중복 제거 기술 분석)

  • Jho, Min-Jeong;Lee, Chang-hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.305-308
    • /
    • 2016
  • 저장하는 데이터의 용량이 증가함에 따라 데이터들은 효율적으로 보관될 필요성이 증가하였다. 이에 따라, 데이터 용량을 줄이는 기술로 많은 서비스들이 데이터 중복 제거 기술을 사용한다. 본 연구에서는 일부 서비스의 데이터 중복 제거 기술을 분석하고, 데이터 중복 제거 기술의 발전 동향을 예측하고자한다.

Encrypted Data Deduplication Using Key Issuing Server (키 발급 서버를 이용한 암호데이터 중복제거 기술)

  • Kim, Hyun-il;Park, Cheolhee;Hong, Dowon;Seo, Changho
    • Journal of KIISE
    • /
    • v.43 no.2
    • /
    • pp.143-151
    • /
    • 2016
  • Data deduplication is an important technique for cloud storage savings. These techniques are especially important for encrypted data because data deduplication over plaintext is basically vulnerable for data confidentiality. We examined encrypted data deduplication with the aid of a key issuing server and compared Convergent Encryption with a technique created by M.Bellare et al. In addition, we implemented this technique over not only Dropbox but also an open cloud storage service, Openstack Swift. We measured the performance for this technique over Dropbox and Openstack Swift. According to our results, we verified that the encrypted data deduplication technique with the aid of a key issuing server is a feasible and versatile method.

An Adaptive Follow-Me Replication Scheme for Service Profile Management in Virtual Home Environment (가상 홈 환경에서 서비스 프로파일 관리를 위한 적응적 추종 중복 기법)

  • 황진경;권순종;박명순
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.545-558
    • /
    • 2003
  • It is expected that per-user customized services are widely used in next generation Personal Communication Network. The ultimate goal for personalized service is the Virtual home Environment (VHE) providing ´same-look-and-feel´ services for the subscriber wherever he roams to. To provide personalized services for each call, per-user service profiles are frequently referenced, so efficient service profile management is essentially required. To realized the VHE, typically two schemes, can be employed; One is Intelligent Network based service control and the other is a full replication scheme that always replicates profile in user´s current zone. The first scheme is referred as Central scheme and th second scheme is the modified replication scheme of IMT-2000, we refer to as Follow-Me Replication Unconditional (FMRU). Since the Central scheme only depends on the service cal rate and the FMRU is merely dependent on the movement rate, it is apparent that FMRU scheme outperforms the Central scheme if the call to mobility ratio (CMR) is large, and vice versa. In this paper, we propose a new service profile replication schemes, Adaptive Follow-Me Replication (AFMR) that determine replication automatically according to the user´s CMR. We compared the performance of the AFMR with the non-adaptive Follow-Me Replication unconditional on Demand (FMRUD) scheme. Performance results indicate that as the CMR of a user changes AFMR adapts well compared to the existing schemes.

Optimal Object Selection of Integrated Binding Service for Distributed Objects in Wide Area Computing Environments (광역 컴퓨팅 환경에서 분산 객체의 통합 바인딩 서비스의 최적 객체 선정)

  • Jun, Byung-Taek;Jeong, Chang-Won;Joo, Su-Chong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1499-1502
    • /
    • 2002
  • 최근 분산 컴퓨팅 환경은 인터넷 기반으로 규모가 확장됨에 따라 광역 컴퓨팅 환경으로 변화되고 있다. 이러한 환경에서 클라이언트가 원하는 객체나 자원들의 투명성을 제공하는 메커니즘은 필수적이다. 그러나 기준의 네이밍 또는 트레이딩 서비스가 다루는 객체에 대한 식별자는 이름 대 주소 그리고 속성 대 주소의 한쌍으로 이루어져 위치에 따라 객체나 자원에 대한 식별자를 변경해야 하는 문제점을 갖는다. 특히, 이동 객체와 중복객체에 대한 위치 서비스는 더더욱 제공하기 어렵다. 이러한 문제점을 해결하기 위해 식별자를 이름/속성에 따르는 객체 핸들 그리고 컨택 주소로 나누고 각각 독립적인 서비스로 관리하는 통합 바인딩 서비스를 제안하였다. 본 논문에서는 통합 바인딩 서비스에서 위치서비스가 관리하는 컨택 레코드 상에 컨택 주소가 여러 개가 등록이 되어 있을 경우, 중복된 객체를 의미한다. 이러한 중복된 객체들 중에 이들이 존재하는 서버의 부하정보를 이용하여 하나의 컨택 주소를 선택하는 과정을 보였다.

  • PDF

Service Quality at Sales Encounter: Need Hierarchy Model (판매접점에서 서비스품질의 욕구위계모델에 관한 연구)

  • 전인수;김은화
    • Asia Marketing Journal
    • /
    • v.6 no.1
    • /
    • pp.1-16
    • /
    • 2004
  • 서비스품질의 차원과 위계에 대한 논의가 최근 들어 늘어나고 있다. 그 이유는 서비스품질, 고객만족, 고객의 긍정적 행동의향, 수익성 간의 선순환 때문이다. 차원모델은 SERVQUAL과 SERVPERF 모델이 있고 위계모델은 Grönroos(1984)모델과 미국학자들이 개발한 모델이 대표적이다. 최근들어 이들을 결합한 하이브리드모델이 제안되고 있다. 하지만 기존의 하이브리드모델은 차원과 위계를 결합하여 일반성은 높지만 위계를 정하는 이론적 근거가 분명하지 않다. 본 연구는 욕구위계이론 중 Herzberg(1968)의 두 요인이론에 근거하여 서비스품질의 위계모델을 제시하려 한다. 이를 위해 CIT로 판매접점에서 고객이 느끼는 결정적 사건(critical incidents)을 조사하였다. 먼저 중복요인과 단독요인으로 나누고 각각을 다시 불만족중심과 만족중심으로 나눌 때 이들 결정적 사건이 잘 분류되었다. 분류결과 신뢰성은 불만족중심 중복요인, 응답성은 만족중심 중복요인, 공감성은 단독만족요인으로 나타났다. 본 연구에서 제시하는 서비스품질의 욕구위계모델에 따르면 신뢰성, 응답성, 공감성의 순으로 서비스품질이 중요하다. 확신성과 유형성은 따로 분류되는 결정적 사건이 없어 만족, 불만족 요인을 도와주는 조절요인으로 볼 수 있다.

  • PDF

A Study on Determinants of IT Shared Services Adoption: Focus on Korean Financial Institutions (IT쉐어드서비스 도입에 관한 영향요인 연구: 국내 금융기관을 중심으로)

  • Keum, Chang-Keun;Yi, Seon-Gyu
    • Information Systems Review
    • /
    • v.10 no.1
    • /
    • pp.21-45
    • /
    • 2008
  • Over the years a lot of organizations or enterprises are spending the majority of their IT budgets on IT resources procurement and maintenance. IT resources are typically duplicated in each Region, Division, and/or Business Unit. The biggest sources of cost savings come directly from the reduction in maintenance cost and the elimination of duplicated resources. Global corporations are investing heavily in shared services implementations in order to stay competitive in an industry environment. A number of financial services firms have turned to IT shared services to reduce the level of IT asset and infrastructure redundancies. Recently, Korean financial services industry is moving to diversification(bank, securities, insurance, etc.) and consolidation(M&A, strategic alliance, etc.), and wants the elimination of duplicated IT resources. This research is intended to find out and demonstrate the factors having a significant effect on adoption of IT shared services center in finance services industry.