• Title/Summary/Keyword: 컴퓨터운영체제

Search Result 525, Processing Time 0.021 seconds

An Efficient Buffer Cache Management Scheme for Heterogeneous Storage Environments (이기종 저장 장치 환경을 위한 버퍼 캐시 관리 기법)

  • Lee, Se-Hwan;Koh, Kern;Bahn, Hyo-Kyung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.5
    • /
    • pp.285-291
    • /
    • 2010
  • Flash memory has many good features such as small size, shock-resistance, and low power consumption, but the cost of flash memory is still high to substitute for hard disk entirely. Recently, some mobile devices, such as laptops, attempt to use both flash memory and hard disk together for taking advantages of merits of them. However, existing OSs (Operating Systems) are not optimized to use the heterogeneous storage media. This paper presents a new buffer cache management scheme. First, we allocate buffer cache space according to access patterns of block references and the characteristics of storage media. Second, we prefetch data blocks selectively according to the location of them and access patterns of them. Third, we moves destaged data from buffer cache to hard disk or flash memory considering the access patterns of block references. Trace-driven simulation shows that the proposed schemes enhance the buffer cache hit ratio by up to 29.9% and reduce the total I/O elapsed time by up to 49.5%.

Design and implementation of the location based map system using linux-based embedded terminals (임베디드 리눅스 단말기를 이용한 위치 기반 전자지도 시스템의 설계 및 구현)

  • Jun, Bong-Gi;Kim, Jeong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.66-74
    • /
    • 2007
  • The most commonly used navigation systems work on Windows CE platforms. Linux-based embedded terminals have price competitiveness, because Linux is a free operation system. In order to develop map services on Linux-based embedded terminals, there were a number of technical hurdles that had to be resolved. Since the Linux-based embedded terminals is a low power, low cost, and small size platform with low processing capabilities, we must have developed the spatial database engine that minimize the number of disk accesses. We solved problems that are the processing korean language and the lack of debugging tools on Linux. In this paper, we has developed the spatial database engine and user interfaces on hand-held terminals based on embedded Linux for implementing the location based map system With view of this implementation results, we confirmed the possibility of using our embedded linux terminal as telematics terminals or navigation terminals.

Modeling and Selecting Optimal Features for Machine Learning Based Detections of Android Malwares (머신러닝 기반 안드로이드 모바일 악성 앱의 최적 특징점 선정 및 모델링 방안 제안)

  • Lee, Kye Woong;Oh, Seung Taek;Yoon, Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.11
    • /
    • pp.427-432
    • /
    • 2019
  • In this paper, we propose three approaches to modeling Android malware. The first method involves human security experts for meticulously selecting feature sets. With the second approach, we choose 300 features with the highest importance among the top 99% features in terms of occurrence rate. The third approach is to combine multiple models and identify malware through weighted voting. In addition, we applied a novel method of eliminating permission information which used to be regarded as a critical factor for distinguishing malware. With our carefully generated feature sets and the weighted voting by the ensemble algorithm, we were able to reach the highest malware detection accuracy of 97.8%. We also verified that discarding the permission information lead to the improvement in terms of false positive and false negative rates.

Analysis and Advice on Cache Algorithms of SSD FTL (SSD FTL 캐시 알고리즘 분석 및 제언)

  • Hyung Bong, Lee;Tae Yun, Chung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • It is impossible to overwrite on an already allocated page in SSDs, so whenever a write operation occurs a page replacement with a clean page is required. To resolve this problem, SSDs have an internal flash translation layer called FTL that maps logical pages managed by a file system of operating system to currently allocated physical pages. SSD pages discarded due to write operations must be recycled through initialization, but since the number of initialization times is limited the FTL provides a caching function to reduce the number of writes in addition to the page mapping function, which is a core function. In this study, we focus on the FTL cache methodologies reducing the number of page writes and analyze the related algorithms, and propose a write-only cache strategy. As a result of experimenting with the write-only cache using a simulator, it showed an improvement of up to 29%.

An Improved Index Structure for the Flash Memory Based F2FS File System

  • Kim, Yong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.1-8
    • /
    • 2022
  • As an efficient file system for SSD(Solid State Drive), F2FS is employed in the kernel of Linux operating system. F2FS applies various methods to improve performance by reflecting the characteristics of flash memory. One of them is improvement of the index structure that contains addresses of data blocks for each file. This paper presents a method for further improving performance by modifying the index structure of F2FS. F2FS manages all index blocks as logical numbers, and an address mapping table is used to find the physical block addresses of index blocks on flash memory. This paper shows performance improvement by applying logical numbers to the last level index blocks only. The count of mapping table search for a data block access is reduced to 1~2 from 1~4.

The Approach of Sociology of Law on Counter-Terrorism using Internet (인터넷을 활용한 테러 대응의 법사회학적 접근 - 예방 홍보 관리방안을 중심으로 -)

  • Park, Yong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.225-234
    • /
    • 2007
  • This research is based on the purpose of awaking the importance to publicity of terrorism prevention in the environment of neo-terrorism and presenting the direction of effective publicity activities of terrorism prevention in the counter-terrorism system. Government publicity through public media plays a significant role in promoting people's participation and improving the awareness. So, to strengthen the terrorism prevention in environmental changes of terror occurrence, active method available for people must be found as publicity method of terrorism prevention suitable for high information society. For this method, this research argued first about relationship between police organization and public as counter-terrorism system and about effective publicity methods of terrorism prevention through active erection of these relationships. This research suggested the operation method through introduction of e-CRM and etc, with ultimate purpose about maximizing the publicity effect of terrorism prevention by using as the advantage of internet these days as possible. And needs of information service activities and other administration strategies of publicity of terrorism prevention are suggested through enlarging the distribution scope of governmental counter-terrorism information materials by strengthening the national publicity activities and using media.

  • PDF

Problem Analysis and Recommendations of Memory Contents in High School Informatics Textbooks (고등학교 정보 교과서에 제시된 기억 장치 영역 내용의 문제점 분석 및 개선 방안)

  • Lee, Sang-Wook;Suh, Tae-Weon
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.3
    • /
    • pp.37-47
    • /
    • 2012
  • One of the major goals in high school Informatics is for students to develop creative problem-solving abilities based on knowledge on computer science. Thus, the contents of the textbooks should be accurate and appropriate. However, we discovered that the current Informatics textbooks contain the untrue and/or inappropriate descriptions of main memory and virtual memory. The textbooks describe that main memory is composed of RAM and ROM. The virtual memory is described as a technique in which a part of the secondary storage is utilized as main memory to execute an application of which size is larger than that of main memory. In this study, we attempted to uncover the root causes of the fallacies, and suggest the accurate explanations by comparing with renowned books adopted in most schools worldwide including USA. Our study reveals that it is inappropriate to include ROM in main memory from the memory hierarchy perspective. Virtual memory is a technique that provides convenience to programmers, through which an operating system loads the necessary portion of a program from secondary storage to main memory. As for the advantages of virtual memory in the current computer systems, the focus should be on providing the effective multitasking capability, rather than on executing a larger program than the size of main memory. We suggest that it is appropriate to exclude virtual memory in textbooks considering its complexity.

  • PDF

Development of Greenhouse Environment Monitoring & Control System Based on Web and Smart Phone (웹과 스마트폰 기반의 온실 환경 제어 시스템 개발)

  • Kim, D.E.;Lee, W.Y.;Kang, D.H.;Kang, I.C.;Hong, S.J.;Woo, Y.H.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.18 no.1
    • /
    • pp.101-112
    • /
    • 2016
  • Monitoring and control of the greenhouse environment play a decisive role in greenhouse crop production processes. The network system for greenhouse control was developed by using recent technologies of networking and wireless communications. In this paper, a remote monitoring and control system for greenhouse using a smartphone and a computer with internet has been developed. The system provides real-time remote greenhouse integrated management service which collects greenhouse environment information and controls greenhouse facilities based on sensors and equipments network. Graphical user interface for an integrated management system was designed with bases on the HMI and the experimental results showed that a sensor data and device status were collected by integrated management in real-time. Because the sensor data and device status can be displayed on a web page, transmitted using the server program to remote computer and mobile smartphone at the same time. The monitored-data can be downloaded, analyzed and saved from server program in real-time via mobile phone or internet at a remote place. Performance test results of the greenhouse control system has confirmed that all work successfully in accordance with the operating conditions. And data collections and display conditions, event actions, crops and equipments monitoring showed reliable results.

Development and Clinical Evaluation of Wireless Gyro-mouse for the Upper Extremity Disabled to Use Computer (상지장애인의 컴퓨터 사용을 위한 무선 자이로마우스의 개발 및 임상평가)

  • Han Ha-Na;Song Eun-Beom;Kim Chul-Seung;Heo Ji-Un;Eom Gwang-Moon
    • Science of Emotion and Sensibility
    • /
    • v.9 no.2
    • /
    • pp.93-100
    • /
    • 2006
  • This paper aims at the development and clinical evaluation of the wireless gyro-mouse system. The wireless gyro-mouse system is a computer interface with gyro-sensor and wireless communication, for the patients with upper-extremity disabled from the traffic accident or stroke to use the computer software i.e. internet browser. In the development, we focused on, firstly, to make the system wireless for the patients to manipulate the mouse easily even on the bed or wheelchair, secondly, to insert the gyro-sensor into a headband for easy don-and-doff and aesthetic appearance, thirdly, to devise a click switch in case of $C5{\sim}C6$ patients and a head nodding detection in case of C4 patients for sending click message to computer operating system. We performed evaluation experiment for patients with upper-extremities disabled from spinal cord injury. The results show that the displacement error of the cursor position against the target position during linear (vertical/horizontal) movement manipulation decreased with trial number. The click rate per minute also increased with trial number. This indicates the developed wireless gyro-mouse system would be more useful to the patients with repetitive use.

  • PDF

Study on File Recovery Based on Metadata Accoring to Linux Kernel (리눅스 커널에 따른 메타데이터 기반 파일 복원 연구)

  • Shin, Yeonghun;Jo, Woo-yeon;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.77-91
    • /
    • 2019
  • Recent Linux operating systems having been increasingly used, ranging from automotive consoles, CCTV, IoT devices, and mobile devices to various versions of the kernel. Because these devices can be used as strong evidence in criminal investigations, there is a risk of destroying evidence through file deletion. Ext filesystem forensics has been studied in depth because it can recovery deleted files without depending on the kind of device. However, studies have been carried out without consideration of characteristics of file system which may vary depending on the kernel. This problem can lead to serious situations, such as those that can impair investigative ability and cause doubt of evidence ability, when an actual investigation attempts to analyze a different version of the kernel. Because investigations can be performed on various distribution and kernel versions of Linux file systems at the actual investigation site, analysis of the metadata changes that occur when files are deleted by Linux distribution and kernel versions is required. Therefore, in this paper, we analyze the difference of metadata according to the Linux kernel as a solution to this and recovery deleted file. After that, the investigating agency needs to consider the metadata change caused by the difference of Linux kernel version when performing Ext filesystem forensics.