• Title/Summary/Keyword: Evaluation of Portability

Search Result 50, Processing Time 0.025 seconds

Design and Implementation of Interface Middleware for Improved Portability on General Operating System (범용 운영체제의 이식성 향상을 위한 인터페이스 미들웨어 설계 및 구현)

  • Kim, Yeon-Il;Lee, Sang-Gil;Lee, Seung-Il;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.17-28
    • /
    • 2015
  • The applications program that running on Operating System has high dependence. Because environment of OS and standard libraries that supports are different. For those reason, Applications that perform the same function should be implemented in accordance with the new operating system. This results in a temporal and economic waste not only in subsequent maintenance of application but also in management. Even though, to solve this problem Cygwin or MinGW has been distributed, they do not support the portability of the application but provide a virtual environment and the tool. Therefore, in this paper, we design the wrapper format interface middleware using the POSIX and standard C library to support the application performing the same function on virtual environment and without code modification. The middleware can be selectively loading the API that is classified by basic and extend. This allows to managing the application size efficiently. Also, perform the comparative experiments and performance evaluation for application, on equipped with the Interface Middleware Linux, Unix, Windows and on Cygwin.

A Study on the Analysis and the Improvement of the MyData System from a Consumer Behavior Perspective (소비자행동 측면에서의 마이데이터 제도 분석 및 개선방안 연구)

  • Young-Jong Lee;Seong-Yeob Lee
    • Industry Promotion Research
    • /
    • v.9 no.3
    • /
    • pp.163-174
    • /
    • 2024
  • MyData is a new entity that strengthens the rights of information subjects through the 'right to data portability' and utilizes data to enable hyper-personalized services using personal information. Korea's MyData system is recognized globally as an outstanding system in that it is creating a new MyData industry by granting the right to information self-determination through the 'right to request data transmission'. Now in its third year, this study evaluates Korea's MyData system from a consumer behavior perspective and identifies issues for improvement. To this end, this study reviewed previous research on the relationship between regulatory policy and consumer behavior to determine the applicability of a consumer behavior perspective in institutional evaluation. In addition, in a study on consumer behavior related to MyData, variables that affect the use of MyData were investigated and evaluation items from a consumer behavior perspective were derived. As a result of evaluating Korea's MyData system from a consumer behavior perspective, it was found that the factors considered important by consumers were appropriately reflected in the system. However, in cases where there are dual values of ease of use and personal information protection, regulatory aspects tend to take priority. Therefore, in order to revitalize the MyData industry, it is essential to implement market-friendly system improvements without compromising consumer rights. This study is differentiated from existing studies in that it attempted to derive a plan for system improvement by combining empirical consumer behavior research and regulatory policy research.

Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism

  • Cui, Chaoyuan;Wu, Yun;Li, Yonggang;Sun, Bingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1722-1741
    • /
    • 2017
  • Intrusion detection techniques based on virtual machine introspection (VMI) provide high temper-resistance in comparison with traditional in-host anti-virus tools. However, the presence of semantic gap also leads to the performance and compatibility problems. In order to map raw bits of hardware to meaningful information of virtual machine, detailed knowledge of different guest OS is required. In this work, we present VDSM, a lightweight and general approach based on driver separation mechanism: divide semantic view reconstruction into online driver of view generation and offline driver of semantics extraction. We have developed a prototype of VDSM and used it to do intrusion detection on 13 operation systems. The evaluation results show VDSM is effective and practical with a small performance overhead.

A File System for Large-scale NAND Flash Memory Based Storage System

  • Son, Sunghoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.1-8
    • /
    • 2017
  • In this paper, we propose a file system for flash memory which remedies shortcomings of existing flash memory file systems. Besides supporting large block size, the proposed file system reduces time in initializing file system significantly by adopting logical address comprised of erase block number and bitmap for pages in the block to find a page. The file system is suitable for embedded systems with limited main memory since it has small in-memory data structures. It also provides efficient management of obsolete blocks and free blocks, which contribute to the reduction of file update time. Finally the proposed file system can easily configure the maximum file size and file system size limits, which results in portability to emerging larger flash memories. By conducting performance evaluation studies, we show that the proposed file system can contribute to the performance improvement of embedded systems.

Implementation of a Virtual Machine Monitor for ARMv7 Architecture (ARMv7 구조를 위한 가상 머신 모니터 구현)

  • Oh, Seung-Jae;Shin, Dongha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.3
    • /
    • pp.145-153
    • /
    • 2013
  • Virtualization technology has been applied in IA-32 based server or desktop systems. Recently it has been applied in ARM based mobile systems. Virtualization technology provides many useful features that are not possible in operating system level such as isolation, interposition, encapsulation and portability. In this research, we implement an ARM based VMM(Virtual Machine Monitor) by using the following techniques. First, we use "emulation" to virtualize the processor. Second, we use "shadow page tables" to virtualize the memory. Finally, we use a simple "pass-through I/O" to virtualize the device. Currently the VMM runs ARM Linux kernel 3.4.4 on a BeagleBoard-xM, and we evaluated the performance of the VMM using lmbench and dhrystone. The result of the evaluation shows that our VMM is slower than Xen on ARM that is implemented using paravirtualization but has good performance among the VMMs using full-virtualization.

Evaluation of Cluster-Based System for the OLTP Application

  • Hahn, Woo-Jong;Yoon, Suk-Han;Lee, Kang-Woo;Dubois, Michel
    • ETRI Journal
    • /
    • v.20 no.4
    • /
    • pp.301-326
    • /
    • 1998
  • In this paper, we have modeled and evaluated a new parallel processing system called Scalable Parallel computer Architecture based on Xbar (SPAX) for commercial applications. SMP systems are widely used as servers for commercial applications; however, they have very limited scalability. SPAX cost-effectively overcomes the SMP limitation by providing both scalability and application portability. To investigate whether the new architecture satisfies the requirements of commercial applications, we have built a system model and a workload model. The results of the simulation study show that the I/O subsystem becomes the major bottleneck. We found that SPAX can still meet the I/O requirement of the OLTP workload as it supports flexible I/O subsystem. We also investigated what will be the next most important bottleneck in SPAX and how to remove it. We found that the newly developed system network called Xcent-Net will not be a bottleneck in the I/O data path. We also show the optimal configuration that is to be considered for system tuning.

  • PDF

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

A Study on the Development of Evaluation Model for Selecting a Standard for DITA using AHP (AHP를 이용한 국방정보기술표준 선정 평가 모델 개발에 관한 연구)

  • Kim, Ja-Hee;Kim, Woo-Je;Cho, Hyun-Ki;Lee, Eun-Young;Seo, Min-Woo
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.96-105
    • /
    • 2012
  • Recently, the interoperability has become more important to enhance the net-centric capabilities of the warfighter. DITA (Defense Information Technical stAndard) is the set of IT standards for improving interoperability, scalability, effectiveness, and efficiency. In this paper, we analyzed the standardizing process to derive the selection criteria and structurized the derived selection criteria using the KJ (Kawakita Jiro) method. Finally, we developed an evaluation model for selecting a standard for DITA using AHP (Analytic Hierarchy Process). As a result, we present eight selection criteria (maintainability, trend, stability, portability, effect of other standard, constraint of the network, and applicability to the systems). We also applied some examples that several IT standards to our selection model for validating the model. We expect our model to help to decide objectively whether the new standard can be listed in DITA.

An Analysis of Software Portability and Productivity Evaluation (소프트웨어 이식성 분석과 생산성 평가)

  • Lee, J.K.;Shin, S.K.;Nam, S.S.;Park, K.C.
    • Electronics and Telecommunications Trends
    • /
    • v.14 no.5 s.59
    • /
    • pp.16-27
    • /
    • 1999
  • 폭발적으로 증가하는 소프트웨어에 대한 수요를 만족하기 위해 소프트웨어 생산성을 향상시키려는 노력이 증대되어 왔다. 이런 추세에 맞추어 개발된 소프트웨어를 이식하는 방법들이 연구되어 왔으며, 새로운 환경으로 효율적으로 이식함으로써 소프트웨어의 생산성을 향상시키려는 시도가 잇달았다. 본 논문에서는 이러한 관점에서 소프트웨어 이식 시 문제점들을 살펴보고, 실제 경험한 ATM 교환 소프트웨어에 대한 이식 저해 요인과 이식된 소프트웨어의 생산성에 대한 평가를 2개의 대표적인 프로젝트 규모 모델에 적용하여 평가하였다. 또한 기존 모델에 적용하는 과정에서의 문제점을 제시함으로써 향후 교환 소프트웨어의 프로젝트 규모 모델에 의한 평가방법을 정립하는 데 기초자료로 활용될 수 있도록 하였다.

The Influence of Smartphone Use on Marine Traffic Safety (스마트폰 사용이 선박통항안전에 미치는 영향에 관한 연구)

  • Shin, Daewoon;Park, Youngsoo;Park, Jinsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.2
    • /
    • pp.131-138
    • /
    • 2017
  • Lately, Internet-based vessels have begun to appear at sea with the development of ICT. Thereby crews have gained easy Internet access through increased smartphone portability. However, the side effects of smartphone use while on watch, have not been studied seriously despite being a reality. In this study, simulation experiments were carried out using a Ship Handling Simulator in order to distinguish the risks of using a smartphone while on watch. Proximity Evaluation, Control Evaluation, Subjective Evaluation and Situation Awareness to the dangerous situation were used to quantify risk during simulation, and analysis results were compared with cases when using and not using a smartphone. It was found that the degree of risk increased between 1.3 to 3 times given smartphone use. Consequently, this paper represents foundation for the restriction of smartphone use and proposes smartphone usage guideline for ship navigation.