• Title/Summary/Keyword: 특성정보 파일

Search Result 550, Processing Time 0.032 seconds

Performance Analysis of Flash Translation Layer Algorithms for Windows-based Flash Memory Storage Device (윈도우즈 기반 플래시 메모리의 플래시 변환 계층 알고리즘 성능 분석)

  • Park, Won-Joo;Park, Sung-Hwan;Park, Sang-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.4
    • /
    • pp.213-225
    • /
    • 2007
  • Flash memory is widely used as a storage device for potable equipments such as digital cameras, MP3 players and cellular phones because of its characteristics such as its large volume and nonvolatile feature, low power consumption, and good performance. However, a block in flash memories should be erased to write because of its hardware characteristic which is called as erase-before-write architecture. The erase operation is much slower than read or write operations. FTL is used to overcome this problem. We compared the performance of the existing FTL algorithms on Windows-based OS. We have developed a tool called FTL APAT in order to gather I/O patterns of the disk and analyze the performance of the FTL algorithms. It is the log buffer scheme with full associative sector translation(FAST) that the performance is best.

The Trace Analysis of SaaS from a Client's Perspective (클라이언트관점의 SaaS 사용 흔적 분석)

  • Kang, Sung-Lim;Park, Jung-Heum;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Recently, due to the development of broadband, there is a significant increase in utilizing on-demand Saas (Software as a Service) which takes advantage of the technology. Nevertheless, the academic and practical levels of digital forensics have not yet been established in cloud computing environment. In addition, the data of user behavior is not likely to be stored on the local system. The relevant data may be stored across the various remote servers. Therefore, the investigators may encounter some problems in performing digital forensics in cloud computing environment. it is important to analysis History files, Cookie files, Temporary Internet Files, physical memory, etc. in a viewpoint of client, since the SaaS basically uses the web to connects the internet service. In this paper, we propose the method that analysis the usuage trace of the Saas which is the one of the most popular cloud computing services.

Conformance Testing Tool Implementation for XML Encryption Products (XML 암호화 제품을 위한 표준적합성 시험도구 구현)

  • Chae Han-Na;Rhee Gwang-Soo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.435-440
    • /
    • 2006
  • XML encryption is to provide confidentiality service, though not limited to, for web contents. XML encryption can be applied to entire data files as opaque objects, or more frequently to various parts of XML documents, supporting various encryption granularity. It is this characteristic that makes XML encryption a more efficient alternative for data confidentiality in various web applications than is possible with SSL/TLS, IPsec, PGP, or S/MIME. It is essential for successful deployment of XML encryption to achieve interoperability among the products implementing this technology, which requires the products to implement the XML encryption standards correctly. Conformance testing is to test if products implement the relevant standard correctly. In this paper we present a conformance testing method for XML encryption products and implement it. We will first look at XML encryption standards developed by W3C, and extract test criteria. Then we propose a testing method in which the encryption capability and the decryption capability of a product are tested separately. The proposed methody is actually implemented as a GUI-based testing tool and some test results are presented.

A Study On Distributed Remote Lecture Contents for QoS Guarantee Streaming Service (QoS보장형 스트리밍 서비스를 위한 분산 원격강의 컨텐츠에 대한 연구)

  • Choi, Yong-jun;Ku, Ja-hyo;Leem, In-taek;Choi, Byung-do;Kim, Chong-gun
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.603-614
    • /
    • 2002
  • Delivery efficiency of e-learning media can be influenced by authoring processes. Generally, a moving picture recorded by video camera can be delivered to student by multimedia streaming service, using media server technology. A e-learning media authored by lecture authoring tool is played in a student application by download-based delivery system. Recently, some animation know-how are applied to author e-learning media by hand-operation. In this paper, we suggest a client-based streaming service for the e-leaning media consists of media files and integration data The lecture of e-learning media nay be divided into some time-based small blocks. Each blocks can be located distributed site. The student system gather those blocks by download-scheduling. This is a valid method for QoS guarantee streaming services. In addition to our study, lecturers can author composite e-learning media includes media files and dynamic web pages simply, The distributed e-learning media files of our study is managed by multi-author and updated rapidly.

A Method to Customize the Variability of EJB-Based Components (EJB 기반 컴포넌트의 가변성 맞춤화 기법)

  • Min Hyun-Gi;Kim Sung-Ahn;Lee Jin-Yeal;Kim Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.6
    • /
    • pp.539-549
    • /
    • 2006
  • Component-Based Development (CBD) has emerged as a new effective technology that reduces development cost and time-to-market by assembling reusable components in developing software. The degree of conformance to standards and common features in a domain largely determines the reusability of components. In addition, variability within commonality should also be modeled and customization mechanism for the variability should be designed into components. Enterprise JavaBeans (EJB) is considered a most suitable environment for implementing components. However. the reusability of EJB is limited because EJB does not have built-in variability design mechanisms. In this paper, we present efficient variability design techniques for implementing components in EJB. We propose a method to customize the variability of EJB-based components by applying three variability design mechanisms; selection, plug-in, and external profile. And we elaborate the suitable situations where each variability design mechanism can be applied, and conduct a technical comparison to other approaches available.

Continuous Multiple Prediction of Stream Data Based on Hierarchical Temporal Memory Network (계층형 시간적 메모리 네트워크를 기반으로 한 스트림 데이터의 연속 다중 예측)

  • Han, Chang-Yeong;Kim, Sung-Jin;Kang, Hyun-Syug
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.11-20
    • /
    • 2012
  • Stream data shows a sequence of values changing continuously over time. Due to the nature of stream data, its trend is continuously changing according to various time intervals. Therefore the prediction of stream data must be carried out simultaneously with respect to multiple intervals, i.e. Continuous Multiple Prediction(CMP). In this paper, we propose a Continuous Integrated Hierarchical Temporal Memory (CIHTM) network for CMP based on the Hierarchical Temporal Memory (HTM) model which is a neocortex leraning algorithm. To develop the CIHTM network, we created three kinds of new modules: Shift Vector Senor, Spatio-Temporal Classifier and Multiple Integrator. And also we developed learning and inferencing algorithm of CIHTM network.

A method for improving wear-leveling of flash file systems in workload of access locality (접근 지역성을 가지는 작업부하에서 플래시 파일시스템의 wear-leveling 향상 기법)

  • Jang, Si-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.108-114
    • /
    • 2008
  • Since flash memory cannot be overwritten, new data are updated in new area. If data are frequently updated, garbage collection which is achieved by erasing blocks, should be performed to reclaim new area. Hence, because the count of erase operations is limited due to characteristics of flash memory, every block should be evenly written and erased. However, if data with access locality are processed by cost benefit algorithm with separation of hot block ad cold block though the performance of processing is hight wear-leveling is not even. In this paper, we propose CB-MB (Cost Benefit between Multi Bank) algorithm in which hot data are allocated in one bank and cold data in another bank, and in which role of hot bank and cold bank is exchanged every period. CB-MB shows that its performance is 30% better than cost benefit algorithm with separation of cold block and hot block its wear-leveling is about a third of that in standard deviation.

Comparison procedure in evaluation analysis of source code comparison on Embedded system (정보기기 소스코드 유사성 분석에서 목적물 검증)

  • Nam, SangYep;Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.31-38
    • /
    • 2021
  • In order to analyze the similarity of the source code object material, the source code on both sides must be able to be compiled and executed. In particular, in the case of hardware-integrated software, it is necessary to check whether the hardware interface matches. However, currently, the source code is provided in an incomplete state which is not original of source code used in developing steps. The complainant confirms that the executing characteristics are similar to their own in the expression and function of the output, and request an evaluation. When a source code compilation error occurs during the evaluation process, the experts draw a flowchart of the source code and applies the method of tracing the code flow for each function as indirect method. However, this method is indirect and the subjective judgment is applied, so there is concern about the contention of objectivity in the similarity evaluation result. In this paper, the problems of unverified source code similarity analysis and improvement directions are dealt with, through the analysis cases of source code disputes applied to embedded systems.

Development of device for cat healthcare monitoring using Smartphone

  • Nam, Heung Sik;Lee, Moon Joo;Kim, Geon A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.157-163
    • /
    • 2022
  • In this paper, we propose to develop a Bluetooth Health Device Profile (HDP)-based smartphone system to utilize it for early detection of urinary tracts diseases that occur a lot in cats. Therefore, based on Bluetooth HDP, we developed a device and mobile application system (Mycatner®) that can monitor cat activity, toilet usage, urinary disease, and health status, and evaluated its availability to monitor cat health status. The specific feature of this system is that it can measure the number of cat urination frequencies to identify abnormal conditions suspected of urinary tract diseases early, and second, it can be tested with urine test paper and shared with animal hospitals, reducing time and cost. As a result, it is evaluated that the developed device capable of wireless monitoring the urinary system health status of cats is the first in our knowledge.

Vegetation Height and Age Estimation using Shuttle Radar Topography Mission and National Elevation Datasets (SRTM과 NED를 이용한 식생수고 및 수령 추정)

  • Kim, Jin-Woo;Heo, Joon;Sohn, Hong-Gyoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1D
    • /
    • pp.203-209
    • /
    • 2006
  • SAR (Synthetic Aperture Radar) technology, which is not influenced by cloud cover because of using electromagnetic wave of long wavelength, has an advantage in mapping the earth. NASA, recognizing these strong points of SAR, launched SRTM (Shuttle Radar Topography Mission), and acquired the topographic information of the earth. SRTM and NED (National Elevation Data) of USGS were used for the research and vegetation height map was produced through differentiating the two data. Correlation between SRTM-NED and planting year was analyzed to see the relationship. Strong correlation was detected and it shows the feasibility of estimating timber age and eventually creating timber age map from SRTM-NED. Additional analyses were conducted to check if the linearity is influenced by regional characteristics and forest uniformity. As results, the correlation between SRTM-NED and timber age is influenced by roughness of the terrain. Overall, this paper shows that timber age estimation using SRTM and NED can be sufficiently practical.