• Title/Summary/Keyword: Deployment Model

Search Result 439, Processing Time 0.024 seconds

An Application Layer Multicast Performance Enhancement Scheme (응용 계층 멀티캐스트 성능 향상 기법)

  • Kim Sunghoon;Kang Kyungran;Lee Dongman;Mo Jeonghoon
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.608-619
    • /
    • 2004
  • Application layer multicast(ALM) has been developed as an alternative to support the multi-receiver applications due to the slow deployment of IP multicast. Unlike routers in IP multicast, end systems participating in a ALM session are not optimized for relaying data and have various processing and network capacity. Therefore, with the increased role of end systems, the delay incurred at the end systems occupy large portion of the end-to-end delay. In this paper, we model the end system delay of ALM sessions and analyze its impact on the performance of the existing ALM schemes. Furthermore, we propose an enhanced scheme, based on the existing mesh-based scheme, which reflects the end system delay We also evaluate the performance of the proposed scheme by simulation and show that it reduces the end-to-end delay compared with the existing scheme.

Additive Main Effects and Multiplicative Interaction Analysis of Host-Pathogen Relationship in Rice-Bacterial Blight Pathosystem

  • Nayak, D.;Bose, L.K.;Singh, S.;Nayak, P.
    • The Plant Pathology Journal
    • /
    • v.24 no.3
    • /
    • pp.337-351
    • /
    • 2008
  • Host-pathogen interaction in rice bacterial blight pathosystem was analyzed for a better understanding of their relationship and recognition of stable pathogenicity among the populations of Xanthomonas oryzae pv. oryzae. A total number of 52 bacterial strains isolated from diseased leaf samples collected from 12 rice growing states and one Union Territory of India, were inoculated on 16 rice varieties, each possessing known genes for resistance. Analysis of variance revealed that the host genotypes(G) accounted for largest(78.4%) proportion of the total sum of squares(SS), followed by 16.5% due to the pathogen isolates(I) and 5.1% due to the $I{\times}G$ interactions. Application of the Additive Main effects and Multiplicative Interaction(AMMI) model revealed that the first two interaction principal component axes(IPCA) accounted for 66.8% and 21.5% of the interaction SS, respectively. The biplot generated using the isolate and genotypic scores of the first two IPCAs revealed groups of host genotypes and pathogen isolates falling into four sectors. A group of five isolates with high virulence, high absolute IPCA-1 scores, moderate IPCA-2 scores, low AMMI stability index '$D_i$' values and minimal deviations from additive main effects displayed in AMMI biplot as well as response plot, were identified as possessing stable pathogenicity across 16 host genotypes. The largest group of 27 isolates with low virulence, small IPCA-1 as well as IPCA-2 scores, low $D_i$ values and minimal deviations from additive main effect predictions, possessed stable pathogenicity for low virulence. The AMMI analysis and biplot display facilitated in a better understanding of the host-pathogen interaction, adaptability of pathogen isolates to specific host genotypes, identification of isolates showing stable pathogenicity and most discriminating host genotypes, which could be useful in location specific breeding programs aiming at deployment of resistant host genotypes in bacterial blight disease control strategies.

A Study on Development of Construction Industry's Accounting Information System (건설 산업 회계정보시스템 구축 방안에 대한 연구)

  • Kang, Dong-Il;Yoon, Sung-Yong
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.127-135
    • /
    • 2015
  • This study has become a construction company will help you establish a Management Accounting System target model to move forward. Research method was to present the basic concepts and techniques used in managing complex accounting convergence look at the whole construction industry. For the successful deployment of a construction company management accounting system Responsibility Accounting System, Target Profit, Target Cost, and requires a key technique of Performance Evaluation, which the CEO's firm determination and persistence for support, proactive communication in the field and headquarters staff, the goal organizations and institutions to support the model, the standardization is required. This study is based on case studies in the future through the Delphi Method and AHP are needed.

Using TPC Model to Understand Broadband Diffusion in Korea (TPC(Technology, Policy and Culture) 모델을 이용한 한국의 초고속인터넷 확산 요인 분석)

  • Kum, Heisung
    • Informatization Policy
    • /
    • v.17 no.3
    • /
    • pp.74-97
    • /
    • 2010
  • This paper investigates factors that have facilitated the rapid diffusion of broadband in South Korea. It finds that the quick spread of broadband access in South Korea is the result of combining the government's strategic ICT policy considering cultural traits, businesses'competitive efforts, and the timely explosion of domestic demand for IT service. This paper also discusses the impact of broadband diffusion on the digital divide. It finds that although there are still regional and age gaps in broadband access, the Korean government and businesses are working to alleviate these problems through various ways from systemic to physical ones. While the deployment of broadband cannot eliminate every issue of the digital divide, broadband access minimizes the digital divide by lowering the barrier to inequitable access to information. This paper concludes with a number of recommendations that address selected policy issues related to the spread of broadband Internet for its successful implementation.

  • PDF

Development of a Supporting Tool for Conceptual Component Modeling and Component Construction on the J2EE Platform (J2EE 플랫폼에서의 개념적 컴포넌트 모델링 및 컴포넌트 생성 지원 도구 개발)

  • Lee, U-Jin;Kim, Min-Jeong;Jeong, Yang-Jae;Yun, Seok-Jin;Choe, Yeon-Jun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.761-770
    • /
    • 2001
  • As software industry is rapidly evolving, IT business enterprises have been meeting with cutthroat competition in developing software. As software reusability, time to market, and maintainability are considered as a competitive edge, software component techniques have lately attracted considerable attention. Currently, although there are some supporting tools for developing software components, they do not have tight connections among component developing processes such as component identification, component modeling, detailed design, code generation, deployment, and testing. And it is restrictive for users to construct various scales of components on component platform architecture. In this paper, we provide an implementation and a design of a supporting tool for constructing platform-independent software components, which covers all development lifecycles of components. In the phase of component modeling, platform independent, conceptual components are identified from domain model information in the view of system partitioning. Detailed design and implementation of a component are performed on the J2EE platform architecture. And the changes on the design model and source codes are consistently managed by using round-trip techniques.

  • PDF

A Study on Analysis Model for Weapon Acquisition Alternatives (국방 무기체계 획득방안 연구 방법론 제안)

  • Lee, Ji-Young
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.91-96
    • /
    • 2019
  • Recently, it is expected for requirement for more scientific research of weapon systems acquisition alternatives with reliability and objectivity. For these needs, study on methodology of weapon systems acquisition alternatives is but on-going, but it is still in its early stages and is unprofessional. We compared general decision making methods, government development program decision making methods, methodologies of weapon systems acquisition alternatives research such as AHP, ANP, KAAM and proposed AHP as weapon acquisition analysis. This study guarantees objectivity and derives scientific research results reliability by analyzing and comparing comprehensive elements such as cost, effectiveness, deployment schedule, program management risk. Further study on AHP weight and other decision making methods is needed considering category of weapon systems and program characteristics.

Script-based cloud integration mechanism to support hybrid cloud implementation (하이브리드 클라우드 구축을 지원하기 위한 스크립트 기반의 클라우드 결합 기법)

  • Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.5
    • /
    • pp.80-92
    • /
    • 2017
  • The popularity of cloud computing has led to the emergence of various types of cloud services, and the hybrid cloud, a deployment model that integrates public cloud and private cloud and offset their shortcomings, is in the spotlight recently. However, the complexity of different clouds integration and the lack of related integration solutions have delayed the adoption of hybrid cloud and cloud strategy by companies and organizations. Therefore, in this paper, we propose a cloud integration mechanism to solve the integration complexity problem. The cloud integration mechanism proposed in this paper consists of integration script that solves the cloud integration by the script based on the hybrid cloud function, a process of creating and executing it, and a script creation model applying the software design pattern. By integrating the various cloud services, we can quickly generate scripts that meet the user's needs. It is expected that the introduction of hybrid cloud and the acquisition of cloud strategy can be accelerated through this proposed integration mechanism.

Study on Methodology of Collecting Realtime File Access Event Information (실시간 파일 접근 이벤트 정보 수집 방법에 관한 연구)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.447-448
    • /
    • 2021
  • The boundary-based security architecture has the advantage of easy deployment of security solutions and high operational efficiency. The boundary-based security architecture is easy to detect and block externally occurring security threats, but is inappropriate to block internally occurring security threats. Unfortunately, internal security threats are increasing in frequency. In order to solve this problem, a zero trust model has been proposed. The zero trust model requires a real-time monitoring function to analyze the behavior of a subject accessing various information resources. However, there is a limit to real-time monitoring of file access of a subject confirmed to be trusted in the system. Accordingly, this study proposes a method to monitor user's file access in real time. To verify the effectiveness of the proposed monitoring method, the target function was verified after the demonstration implementation. As a result, it was confirmed that the method proposed in this study can monitor access to files in real time.

  • PDF

High-Resolution Mapping Techniques for Coastal Debris Using YOLOv8 and Unmanned Aerial Vehicle (YOLOv8과 무인항공기를 활용한 고해상도 해안쓰레기 매핑)

  • Suho Bak;Heung-Min Kim;Youngmin Kim;Inji Lee;Miso Park;Tak-Young Kim;Seon Woong Jang
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.2
    • /
    • pp.151-166
    • /
    • 2024
  • Coastal debris presents a significant environmental threat globally. This research sought to improve the monitoring methods for coastal debris by employing deep learning and remote sensing technologies. To achieve this, an object detection approach utilizing the You Only Look Once (YOLO)v8 model was implemented to develop a comprehensive image dataset for 11 primary types of coastal debris in our country, proposing a protocol for the real-time detection and analysis of debris. Drone imagery was collected over Sinja Island, situated at the estuary of the Nakdong River, and analyzed using our custom YOLOv8-based analysis program to identify type-specific hotspots of coastal debris. The deployment of these mapping and analysis methodologies is anticipated to be effectively utilized in managing coastal debris.

Evaluating Relay Beamwidth for Enhanced Coverage and Data Rates in Buoy-Assisted Maritime Communications

  • Kyeongjea Lee;Tae-Woo Kim;Sungyoon Cho;Kiwon Kwon;Dong Ku Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.922-937
    • /
    • 2024
  • Maritime activities are on the rise, there is a growing demand for high-quality communication services that can cover larger areas. However, the transmission of high data rates to maritime users is challenging due to path loss from land base stations, which limits the transmission power. To overcome this challenge, researchers have been exploring the use of buoys in a marine environment as relays for communication technology. This paper proposes a simulation-based approach to investigate the impact of various beamwidths on communication performance when using a buoy as a relay. The objective is to determine the optimal beamwidth that yields the highest data rate for the target location. The approach is based on an offshore wave model where the direction of the buoy changes according to the height of the wave. The study investigates the performance of the relay in the downlink situation using receive beamforming, and the capacity at the user in the three-hop situation is verified using an amplify-and-forward (AF) relay that uses transmit beamforming to the user. The simulation results suggest that the beamwidth of the relay should be adjusted according to the wave conditions to optimize the data rate and relay position that satisfies a data rate superior to the direct path to the target position. Using a buoy as a relay can be a promising solution for enhancing maritime communications, and the simulation-based approach proposed in this paper can provide insights into how to optimize beamwidth for effective communication system design and implementation. In conclusion, the study results suggest that the use of buoys as relays for maritime communication is a feasible solution for expanding coverage and enhancing communication quality. The proposed simulation-based approach provides a useful tool for identifying relay beamwidths for achieving higher data rates in different wave conditions. These findings have significant implications for the design and deployment of communication systems in maritime environments.