• Title/Summary/Keyword: 파일공유

Search Result 503, Processing Time 0.028 seconds

Research on Conditional Execution Out-of-order Instruction Issue Microprocessor Using Register Renaming Method (레지스터 리네이밍 방법을 사용하는 조건부 실행 비순차적 명령어 이슈 마이크로프로세서에 관한 연구)

  • 최규백;김문경;홍인표;이용석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.763-773
    • /
    • 2003
  • In this paper, we present a register renaming method for conditional execution out-of-order instruction issue microprocessors. Register renaming method reduces false data dependencies (write after read(WAR) and write after write(WAW)). To implement a conditional execution out-of-order instruction issue microprocessor using register renaming, we use a register file which includes both in-order state physical registers and look-ahead state physical registers to share all logical registers. And we design an in-order state indicator, a renaming state indicator, a physical register assigning indicator, a condition prediction buffer and a reorder buffer. As we utilize the above hardwares, we can do register renaming and trace the in-order state. In this paper, we present an improved register renaming method using smaller hardware resources than conventional register renaming method. And this method eliminates an associative lookup and provides a short recovery time.

Design and Implementation of Social Network Real-Time Traffic Broadcast Platform (소셜네트워크 실시간교통 방송 플랫폼 설계 및 구현)

  • Han, Jun-Woo;Lee, Eun-Jin;Kim, Heung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.337-339
    • /
    • 2015
  • As much interest recently location based service, a study to analyze the movement patterns of the users from getting a lot of large amounts of data collected from a GPS installed in the smart device. Also it is recorded in the log file in the form of day-to-day personal computer, the development of a variety of a smart phone, a black box, and navigation. This data is collected by the user have been developed a variety of personalized services. In this paper, using the black box camera, such as the vehicle to form a social network platform that broadcasts real-time traffic utilization real-time video information.

  • PDF

Web Proxy Cache Replacement Algorithms using Object Type Partition (개체 타입별 분할공간을 이용한 웹 프락시 캐시의 대체 알고리즘)

  • Soo-haeng, Lee;Sang-bang, Choi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.5C
    • /
    • pp.399-410
    • /
    • 2002
  • Web cache, which is functionally another word of proxy server, is located between client and server. Web cache has a limited storage area although it has broad bandwidth between client and proxy server, which are usually connected through LAN. Because of limited storage capacity, existing objects in web cache can be deleted for new objects by some rules called replacement algorithm. Hit rate and byte-hit rate are general metrics to evaluate replacement algorithms. Most of the replacement algorithms do satisfy only one metric, or sometimes none of them. In this paper, we propose two replacement algorithms to achieve both high hit rate and byte-hit rate with great satisfaction. In the first algorithm, the cache is appropriately partitioned according to file types as a basic model. In the second algorithm, the cache is composed of two levels; the upper level cache is managed by the basic algorithm, but the lower level is collectively used for all types of files as a shared area. To show the performance of the proposed algorithms, we evaluate hit rate and byte-hit rate of the proposed replacement algorithms using the trace driven simulation.

Analysis of the Functions of Semantic Web Browsers and Their Applications in Education (시맨틱 웹 브라우저들의 기능 분석 및 교육적 활용)

  • Kim, Hee-Jin;Jung, Hyo-Sook;Yoo, Su-Jin;Park, Seong-Bin
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.3
    • /
    • pp.37-49
    • /
    • 2011
  • A user can use resources on the Semantic Web using a Semantic Web browser. In order to utilize the functions of Semantic Web browsers in education, we compared the functions of well-known Semantic Web browsers such as Tabulator, Contextual Search Browser (CSB), Magpie, and Piggy Bank. In order to utilize Semantic Web browsers in education, a user needs to understand the features of each Semantic Web browser and our work can help both teachers and students. Tabulator is an RDF browser that can help to check whether resources can be used for learning and relevance of resources. CSB can be used to search educational resources using a conrtext file that contains the subjects of learning. It can also help learning by showing semantic web resources in the form of triple set as well as by supporting highlighting function. Magpie can help learners without basic knowledge on learning materials by providing interpretation based on a glossary file and related background knowledge. Piggy Bank supports conversion of web resources into semantic web resources and allows to browse semantic web resources in various views as well as to share semantic web resources.

  • PDF

Harmful Traffic Detection by Protocol and Port Analysis (프로토콜과 포트 분석을 통한 유해 트래픽 탐지)

  • Shin Hyun-Jun;Choi Il-Jun;Oh Chang-Suk;Koo Hyang-Ohk
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.172-181
    • /
    • 2005
  • The latest attack type against network traffic appeared by worm and bot that are advanced in DDoS. It is difficult to detect them because they are diversified, intelligent, concealed and automated. The exisiting traffic analysis method using SNMP has a vulnerable problem; it considers normal P2P and other application program to be harmful traffic. It also has limitation that does not analyze advanced programs such as worm and bot to harmful traffic. Therefore, we analyzed harmful traffic out Protocol and Port analysis. We also classified traffic by protocol, well-known port, P2P port, existing attack port, and specification port, apply singularity weight to detect, and analyze attack availability. As a result of simulation, it is proved that it can effectively detect P2P application, worm, bot, and DDoS attack.

  • PDF

A Study on Analysis and Modification of OAK Metadata Elements (OAK 메타데이터 요소 분석 및 수정(안) 제안에 관한 연구)

  • Rho, Jee-Hyun;Lee, Eun-Ju;Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.1
    • /
    • pp.137-160
    • /
    • 2017
  • OAK(Open Access Korea) is a national repository project to support free access to Korea's open access knowledge information. However various problems and limitations are recognized when organizing and sharing metadata with OAK-IR system. This study aims to suggest a modified metadata standard to improve the quality of OAK metadata. To the end, this study analyzed all metadata elements used by OAK participating organizations and compared the metadata with the metadata of other typical repository systems. In details, metadata organized in 17 OAK participating organizations were analyzed with their metadata specifications, input data examples, and practitioner interviews. And a case study on DSpace, EPrints, BEPress, ETD-db, dCollection was conducted. The final modified OAK metadata elements were suggested through group discussion and coordination by the practitioners of OAK participating organizations, OAK supervisors, and the developers of OAK-IR system.

An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags (HTML 태그 순서를 이용한 불법 사이트 탐지 자동화 기술)

  • Lee, Kiryong;Lee, Heejo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1173-1178
    • /
    • 2016
  • Since the introduction of BitTorrent protocol in 2001, everything can be downloaded through file sharing, including music, movies and software. As a result, the copyright holder suffers from illegal sharing of copyright content. In order to solve this problem, countries have enacted illegal share related law; and internet service providers block pirate sites. However, illegal sites such as pirate bay easily reopen the site by changing the domain name. Thus, we propose a technique to easily detect pirate sites that are reopened. This automated technique collects the domain names using the google search engine, and measures similarity using Longest Common Subsequence (LCS) algorithm by comparing the tag structure of the source web page and reopened web page. For evaluation, we colledted 2,383 domains from google search. Experimental results indicated detection of a total of 44 pirate sites for collected domains when applying LCS algorithm. In addition, this technique detected 23 pirate sites for 805 domains when applied to foreign pirate sites. This experiment facilitated easy detection of the reopened pirate sites using an automated detection system.

ITA-driven IT management (정보기술아키텍쳐 기반의 정보기술 관리)

  • Shin, Dong-Ik
    • Information Systems Review
    • /
    • v.4 no.2
    • /
    • pp.1-17
    • /
    • 2002
  • Proliferation of IT applications and developments lead to many useful yet diverse information systems being used in an organization. Users of information system have been satisfied with useful functions and prompt outputs, however they have become realized the problem of incompatibility of diverse systems and asked for more compatible systems in which more data and software can be shared among users. Information technology architecture (ITA) is suggested as one way of avoiding such problem by many researchers. This paper ananlyzes and introduces the ITA approach used primarily in US governments and in many other organizations. In Korea, many researchers view ITA as a technical concept that deal with interperability and standards. However, ITA is more managerial oriented concept than technical, because it allows us to achieve managerial objective, for example alignment of IT to strategic objectives, with ease and more confidence. This paper proposes the necessity of ITA in IT management and clarifies the relationships of managerial focus with technical focus of ITA.

UML Diagrams Repository System for Requirement Analysis (요구분석을 위한 UML 다이어그램 저장관리 시스템)

  • 이성대;박휴찬
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.657-668
    • /
    • 2002
  • Software life cycle consists of requirement analysis, design, implementation, and maintenance phases, and the product of each phase has various format. The UML normalizes such products, and the class diagram, use case diagram, activity diagram and collaboration diagram are usually used for the requirement analysis phase. Because most of UML development tools store such diagrams in a file, there nay be some difficulties of information retrieval and co-work among users. To cope with the difficulties, this paper proposes a database supported methodology to store and manage the diagrams produced by the requirement analysis. In this methodology, the constituents of class, use case, activity and collaboration diagram are first analyzed and then transformed in the form of relational fables. The constituents of such diagrams are stored as tables in a database, and can be easily retrieved from the database by using some queries. This database supported methodology provides the concurrent sharing and high reuse of diagrams.

Design and Implementation of a Performance Monitoring and Configuration Management Tool for SANtopia (SANtopia를 위한 성능 감시 및 구성 관리 도구의 설계 및 구현)

  • Rim Kee-Wook;Na Yong-Hi;Min Byoung-Joon;Seo Dea-Wha;Shin Bum-Joo
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.53-65
    • /
    • 2003
  • I/O processing speed of relatively sluggish storage devices incurs overall performance degradation in computer systems. As a solution to improve the situation, SAN(Storage Area Network) has been proposed. In order to utilize a SAN system more effectively, where storage devices are directly connected with a high speed network such as Fibre Channel, a proper management tool is needed. In this paper, we present a design and implementation of a performance monitoring and configuration management tool for the SANtopia system which supports global file sharing in the SAN environment The developed tool is to monitor the performance of the Linux hosts composing the SANtopia system and to manage the configuration of the hosts and storage devices. It also supports GUI(Graphic User Interface) environment using the JAVA programming language.

  • PDF