• Title/Summary/Keyword: 질의 복구

Search Result 82, Processing Time 0.028 seconds

Fast Query Recovery for Multimedia CE Devices (멀티미디어 CE 기기를 위한 빠른 질의 복구 기법)

  • Jin, Hee-Gyu;Lee, Ki-Yong;Woo, Kyoung-Gu
    • Journal of KIISE:Databases
    • /
    • v.35 no.3
    • /
    • pp.286-295
    • /
    • 2008
  • Multimedia consumer electronics(CE) devices, such as MP3 players, PMPs, and digital cameras, are electronic equipments used to record, play or create multimedia data. Most multimedia CE devices provide uses with the ability to search multimedia stored in the device and browse the search results. One of the unique requirements in multimedia CE devices is that the search results displayed in the screen must be restored quickly when the device powers off and later back on. For this purpose, the existing methods (1) re-execute the original search query, and (2) move the cursor to the original position in the search results. However, this approach may be inefficient when the number of records in the result set is large. In this paper, we propose an efficient method for multimedia CE devices that can quickly restore the search results displayed in the screen when the device powers off and later back on. The proposed method can retrieve the original search results in the screen quickly by saving and loading some information about the query evaluation plan. Though the performance evaluation, we show that the proposed method provides excellent performance regardless of the number of records in tile result set or the original cursor position.

Analysis of the Restoration Actual Conditions on the Quarries II (토석채취지의 복구 실태 분석 II)

  • Park, Jae Hyeon
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.4
    • /
    • pp.558-566
    • /
    • 2012
  • This study was conducted to offer preliminary data for a natural restoration by the actual condition survey of quarries after extracting rock materials. The mountain restoration area according to a farming and fishing village organize project was restored by green landscape after quarry. However, planting tree species were died due to poor maintenance and administration after restoration works and surface soil loss and erosion occurred during a summer rainfall season because of poor slope greening. It will be needed to review restoration constructions to establish a natural friendly and flawless construction through the selection of optimum restoration works and the examination of soil and geological characteristics. In addition, it is necessary to apply cost-reducing program of restoration constructions. Quarry areas could be restored by the selection of simple and optimum construction works because the most areas were dominant in earth-sand rocks, soft-rocks, and weather-rocks. In addition, the restoration construction project should be examined thoroughly by restoration specialists during green restoration planning and review processes.

Fail-over Mechanisms based on Anycast for Stable IPv6 Recursive DNS Services (안정적인 IPv6 리커시브 DNS 서비스를 위한 애니캐스트 기반의 실패 복구 방안 연구)

  • Suh, Yu-Hwa;Kim, Kyung-Min;Shin, Yong-Tae;Song, Kwang-Ho;Kim, Weon;Park, Chan-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.108-117
    • /
    • 2007
  • Recursive DNS is configured as primary or secondary DNS on user PC and performs domain name resolution corresponding user's DNS query. At present, the amount of DNS traffic is occupied high rate in the total internet traffic and the internet traffic would be increased by failure of IPv6 DNS queries and responses as IPv6 transition environment. Also, existing Recursive DNS service mechanisms is unstable on malicious user's attack same as DoS/DDoS Attack and isn't provide to user trust DNS service fail-over. In this paper, we propose IPv6 Recursive DNS service mechanisms for based on anycast for improving stability. It is that fail-over Recursive DNS is configured IPv6 Anycast address for primary Recursive DNS's foil-over. this mechanisms increases reliability and resiliency to DoS/DDoS attacks and reduces query latency and helps minimize DNS traffic as inducing IPv6 address.

Determination of a priority for leakage restoration considering the scale of damage in for water distribution systems (피해규모를 고려한 상수도시스템 누수복구 우선순위 선정)

  • Ryul Kim;Min Jun Kim;Hui Geun Kwon;Young Hwan Choi
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.215-215
    • /
    • 2023
  • 누수는 상수도시스템 내에서 발생할 수 있는 대표적인 비정상상황 중 하나이다. 누수는 발생 직후부터 경제적으로 직접적인 영향을 미치는 것과 함께 토사 내에서 유입되는 이물질 등으로 수질적인 문제 또한 발생할 수 있다. 이와 같은 이유로 누수는 발생에 대한 신속한 인지가 요구되며 이에 따른 신속한 복구가 필요하다. 하지만 기존의 데이터 기반 누수 탐사방법은 일반적으로 누수의 유무만을 인지하기 때문에 발생한 누수에 대한 규모의 정량적인 평가가 어려우며 이는 현재의 누수탐사 방법이 누수의 규모에 따른 복구 우선순위를 고려하기에는 부적절한 방법이라는 것을 의미한다. 따라서, 본 연구에서는 다중 누수시나리오 대해 누수 여부뿐만 아니라 누수 규모, 위치 등을 식별할 수 있는 수리해석 모델 기반 누수탐사 기법을 개발하였고, 이 기법을 활용하여 정량적인 누수량을 식별하여 누수 규모에 따른 누수복구 우선순위를 선정하는 프레임워크를 개발하였다. 이때, 누수복구 우선순위 선정 시 수리학적, 경제적, 사회적 인자 등을 고려하였으며, 각 인자 별 가중치를 통해 최종 복구 우선순위를 선정하였다.

  • PDF

Continuos Query Method for Moving Objects using Grid Index based on Spark Streaming (Spark Streaming 기반의 그리드 색인을 이용하는 이동객체를 위한 연속 질의 기법)

  • Choi, Do-jin;Song, Seokil
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.67-68
    • /
    • 2015
  • 이 논문에서는 Spark Stream의 Discretized Streams 모델을 기반의 그리드 인덱스를 제안하고, 이를 이용한 이동객체를 위한 연속질의 기법을 제안한다. 제안하는 연속질의 처리 방법은 Spark 의 RDD 모델을 이용하여 그리드 색인 및 연속질의 목록을 구현하여, 시스템 고장 시에도 빠르게 복구할 수 있는 내 장애성을 확보 하였다.

  • PDF

Analysis of Hotel Customer Complaint and Recovery Strategy Using Critical Incident Technique (결정적 사건기법을 이용한 호텔 고객불평과 복구전략 분석)

  • Yoon, Sung-Wook;Seo, Mi-Ok
    • Journal of Global Scholars of Marketing Science
    • /
    • v.15 no.1
    • /
    • pp.61-79
    • /
    • 2005
  • A critical incident technique(CIT) was employed to show the results of empirical findings regarding hotel services. The major purpose of this study was to describe and analyze service failures from the customers' point of view and thus suggest strategic implications for hotel service providers. Four-hundred sixteen service failure anecdotes from hotel customers were classified using Hoffman et al.'s(1995) approach. The CIT data showed the three major categories and eleven sub-categories and revealed that, in general, tangible recovery(e.g., upgrade, free meal, discount) was more effective than intangible one(e.g., explanation, canned apology, manager's apology). Interestingly, however, sincere apology seemed to be a better recovery strategy than other types of tangible recovery. Furthermore, the results showed that severity of service failure had its own impact on customers' perception regarding hotel's service recovery efforts. In particular, irrespective of service recovery, severity of service problem was negatively related to intention to repurchase. Managerial implications and future research agenda was also discussed.

  • PDF

자력복구 적응 채널등화기를 위한 Run and Go 알고리즘 (Run and Go Algorithm for Blind Equalization)

  • Chung, Won-Zoo
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.62-68
    • /
    • 2006
  • In this paper, we propose an adaptation strategy for blind equalizers, which combines a blind algorithm based on high order statistics and the decision directed LMS algorithm. In contrast to 'Stop-and-Go' algorithm, where adaptation is stopped for unreliable signals, the proposed algorithm applies high order statistics (HOS) blind algorithm to the unreliable signals and applies DD-LMS for the reliable signals. The proposed algorithm, named 'Run-and-Go' algorithm, inherits minimum MSE performance of DD-LMS and acquisition ability of blind algorithms. Furthermore, by updating the reliable signal region according to signal quality in each iteration, the convergence speed and acquisition ability is further improved.

  • PDF

Approximate Lost Data Recovery Scheme for Data Centric Storage Environments in Wireless Sensor Networks (무선 센서 네트워크 데이터 중심 저장 환경을 위한 소실 데이터 근사 복구 기법)

  • Seong, Dong-Ook;Park, Jun-Ho;Hong, Seung-Wan;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.21-28
    • /
    • 2012
  • The data centric storage (DCS) scheme is one of representative methods to efficiently store and maintain data generated in wireless sensor networks. In the DCS schemes, each node has the specified data range for storing data. This feature is highly vulnerable to the faults of nodes. In this paper, we propose a new recovery scheme for the lost data caused by the faults of nodes in DCS environments. The proposed scheme improves the accuracy of query results by recovering the lost data using the spatial continuity of physical data. To show the superiority of our proposed scheme, we simulate it in the DCS environments with the faults of nodes. In the result, our proposed scheme improves the accuracy by about 28% through about 2.5% additional energy consumption over the existing scheme.

A Implementation of TRS Application System for Power Utility Quick Repair (전력설비 기동보수를 위한 TRS 응용시스템 구현)

  • Song, Jae-Ju;Shin, Jin-Ho;Lee, Jung-Li;Yi, Bong-Jae;Cho, Sun-Ku
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2939-2941
    • /
    • 2005
  • 한전에서 핵심사업으로 구축된 신 배전정보 시스템은 전반적인 배전업무 수행은 물론, 전기고장신고 콜센터를 통한 복구처리 등 전력설비 기동보수와 같은 대고객업무에도 효과적으로 활용하고 있다. 하지만 콜센타에 의해 접수된 전기고장 정보와 이동중인 기동 보수차량 간에 시스템적인 연계가 불가능하여 이미 구축된 고장위치 도면정보, 설비속성 정보 등과 같이 복구에 필요한 정보를 현장에서의 활용이 어려운 실정이었다. 이러한 배경에서 기동보수 차량의 위치를 모바일 환경에서 상시 파악하여 고장지점으로 신속히 출동시키게 하고, 현장에서는 고장접수정보와 계통정보 등을 제공하여 고장설비를 신속 복구함으로서 고객서비스의 질을 높이기 위한 TRS 응용 시스템를 구현하고 그 결과를 기술하였다.

  • PDF

Improved Key-Recovery Attacks on HMAC/NMAC-MD4 (HMAC/NMAC-MD4에 대한 향상된 키 복구 공격)

  • Kang, Jin-Keon;Lee, Je-Sang;Sung, Jae-Chul;Hong, Seok-Hie;Ryu, Heui-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.63-74
    • /
    • 2009
  • In 2005, Wang et al. discovered devastating collision attacks on the main hash functions from the MD4 family. After the discovery of Wang, many analysis results on the security of existing hash-based cryptographic schemes are presented. At CRYPTO'07, Fouque, Leurent and Nguyen presented full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5[4]. Such attacks are based on collision attacks on the underlying hash function, and the most expensive stage is the recovery of the outer key. At EUROCRYPT'08, Wang, Ohta and Kunihiro presented improved outer key recovery attack on HMAC/NMAC-MD4, by using a new near collision path with a high probability[2]. This improves the complexity of the full key-recovery attack on HMAC/NMAC-MD4 which proposed by Fouque, Leurent and Nguyen at CRYPTO'07: The MAC queries decreases from $2^{88}$ to $2^{72}$, and the number of MD4 computations decreases from $2^{95}$ to $2^{77}$. In this paper, we propose improved outer key-recovery attack on HMAC/NMAC-MD4 with $2^{77.1246}$ MAC queries and $2^{37}$ MD4 computations, by using divide and conquer paradigm.