• Title/Summary/Keyword: File Sharing Technology

Search Result 62, Processing Time 0.022 seconds

On the comparison of mean object size in M/G/1/PS model and M/BP/1 model for web service

  • Lee, Yongjin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.1-7
    • /
    • 2022
  • This paper aims to compare the mean object size of M/G/1/PS model with that of M/BP/1 model used in the web service. The mean object size is one of important measure to control and manage web service economically. M/G/1/PS model utilizes the processor sharing in which CPU rotates in round-robin order giving time quantum to multiple tasks. M/BP/1 model uses the Bounded Pareto distribution to describe the web service according to file size. We may infer that the mean waiting latencies of M/G/1/PS and M/BP/1 model are equal to the mean waiting latency of the deterministic model using the round robin scheduling with the time quantum. Based on the inference, we can find the mean object size of M/G/1/PS model and M/BP/1 model, respectively. Numerical experiments show that when the system load is smaller than the medium, the mean object sizes of the M/G/1/PS model and the M/BP/1 model become the same. In particular, when the shaping parameter is 1.5 and the lower and upper bound of the file size is small in the M/BP/1 model, the mean object sizes of M/G/1/PS model and M/BP/1 model are the same. These results confirm that it is beneficial to use a small file size in a web service.

A Boundary Curve Extraction Method using Triangular Elements of a Lightweight Model (경량 모델의 삼각 요소망으로부터 경계 곡선 추출 방법)

  • Kwon, Ki-Youn
    • Korean Journal of Computational Design and Engineering
    • /
    • v.22 no.1
    • /
    • pp.28-36
    • /
    • 2017
  • Sharing of CAD data plays a key role in the PLM and a lightweight model is widely used for visualizing and sharing a large data. The lightweight model is mainly composed of triangular elements to minimize file size. There is no problem at all to visually confirm the shape based on these triangular elements but there is a limit to numerically calculate the exact position on the curve or surface. In this paper, a boundary curve generation method using triangular elements is proposed to increase the utilization of lightweight models. After matching connectivity of triangular elements, boundary element edges are extracted. Boundary curves are generated by connecting of these boundary element edges. This proposed method has been tested on several models to demonstrate the feasibility.

Implementation of a P2P-based Data Sharing System using JXTA (JXTA를 이용한 P2P 기반 자료공유시스템(JDSS)의 구현)

  • 양광민;주형렬
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.1-22
    • /
    • 2003
  • P2P systems have been studied by many researchers in universities and commercial firms in recent years. In this study. we design and implement a system that makes UP for shortcomings of currently available P2P systems. Gnutella and Napster. The study also includes an efficiency analysis scheme conducted through a series of experimental data. The data sharing system of the study demonstrated duality of roles(client, service) of peers. But, their roles were separated from the existing client-server systems. Also, the study implements mechanism that shows the redundancy of data to communicate efficiently among peers for transferring data. The results of performance measure of the system shows that the amount of information shared by peers increases as the amount of peers increases but with no significant increase in response time. This constant response time is far more stable and faster than current file sharing systems. such as Gnutella and Napster. Business applications such as knowledge management, enterprise information portal management and transfer of data are done by use of supercomputers. They need to extend their systems to equip with more capacity and throughput as the number of clients increases. Moreover, they will face with more complicated problems if integration with new systems exists. If this JDSS is introduced to these business applications. it would easily augment scalability of the system with high performance at less expense.

  • PDF

Synchronization Technique of Mobile Phone using Cloud Service (클라우드 서비스를 이용한 모바일 폰의 동기화 기법)

  • Park, Hung-bog;Seo, Jung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.927-928
    • /
    • 2016
  • In the past, the way of sharing data in various devices was to use a physical method such as USBs. The radical development of communications technology and the users, who possess various multimedia devices, caused the need for the new way that people could share their data in various devices, and providing various digital resources by using the cloud computing service helps people solve the limit to sharing the resources in their PC. Therefore, this paper is to suggest the technology for synchronization of mobile devices, and the user-centered cloud service is applied to the technology. Having conducted the experiment, it has been discovered that applying the synchronization of mobile devices using the cloud service enabled to conduct the auto file synchronization and to minimize the bandwidth consumed during the synchronization process between two devices.

  • PDF

A Study on Software Development and Legal Regulation (소프트웨어 개발과 법적규제)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.11-20
    • /
    • 2011
  • Internet users and copyright holder have been at the center of a severe legal dispute because file-sharing soft (P2P) through Napster aggravates the violation of copyright as well as takes on the world. Though it is natural that we should hold users a criminal penalty for the illegal use of various computer programs, I think that if the supply of a computer program is generally within a circle of development act, program developer ought not to hold users criminally liable for the unintended illegal act of users. Two main issues are addressed in this work: (i) the basis and validity of legal responsibility and condemnation that appear in the precedent set as to P2P in America, Japan, and Korea. (ii) the necessity of both scientific technology development and efficient legal regulation of copyright holder. For this purpose, software development and legal regulation are reviewed analyzed from viewpoint of the criminal law.

Artifacts Analysis of GoToWebinar and GoToMeeting (화상 회의 애플리케이션 GoToWebinar 및 GoToMeeting 아티팩트 분석 )

  • Soojin Kang;Giyoon Kim;Yangsun Lee
    • Journal of Platform Technology
    • /
    • v.11 no.1
    • /
    • pp.11-22
    • /
    • 2023
  • Various video conferencing and collaboration applications have emerged due to the global epidemic of new viral infections. In addition to real-time video conferencing, video conferencing applications provide features such as chat and file sharing on various platforms. Because various personal information is stored through functions such as chatting, file and screen sharing, these video conferencing applications are the major target of analysis from a digital forensic investigation. In the case of applications that provide cross-platform, the form of stored data is different depending on the platform. Therefore, to utilize data of video conferencing application for forensic investigation, preliminary research on artifacts stored by platform is required. In this paper, we used the video conferencing applications GoToWebinar and GoToMeeting and analyzed the artifacts generated. As a result, we list the main data from a digital forensic investigation. We identify data stored for each platform provided by GoToWebinar and GoToMeeting and organize artifacts that can estimate user behavior. Also, we classify the data that can be acquired according to the role and environment within the video conference.

  • PDF

Development of TIM Module for Construction PDM (PDM 구축을 위한 TIM 모듈개발)

  • 이승우;송준엽
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.307-310
    • /
    • 2001
  • In this paper, development of TIM Module for constructing PDM will be introduced. Technical information relevant product data influences cost, quality, precision and productivity. One of the very important feature of product data is organizing not by oneself but very closed to many technical information such as document, file, image and analysis sheet. To manage various technical information, several kinds of management system are used in multi level of production system. PDM and TIM systems are being developed for suitable purpose and are in need of Network technology, Information Technology, Database, sharing and distributing information. Developed TIM system is based on Web environment. By using this system, we can manage systematic technical information and reduce cost for constructing PDM system. And also we will put to practical use another technical information management system for mold plant.

  • PDF

Implementation of file Access Control Module Using on Windows XP (윈도우 XP 기반의 파일 정책 모듈 설계 및 구현)

  • 성경
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1204-1211
    • /
    • 2004
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, f system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

Microarray Data Sharing System (마이크로어레이 데이터 공유 시스템)

  • Yoon, Jee-Hee;Hong, Dong-Wan;Lee, Jong-Keun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.18-31
    • /
    • 2009
  • Improved reliability of microarray data and its reproducibility lead to recent increment in demand of data sharing and utilization among laboratories, but house-keeping and publicly opened microarray experimental data can hardly be accessed and utilized since they are in heterogeneous formats according to the various experimental methods and microarray platforms. In this paper, we propose a microarray sharing method which can easily retrieve and integrate microarray data from different experiment platforms, data formats, normalization methods, and analysis methods. Our system is based on web-service technology. The biologists of each site are able to search UDDI(Universal Description, Discovery, and Integration) registry, and download microarray data with common data structure of standard format recommended by MGED(Microarray Gene Expression Databases) society. The common data structure defined in this paper consists of IDF(Investigation Design Format), ADF(Array Design Format), SDRF(Sample and Relationship Format), and EDF(Expression Data Format). These components play role as templates to integrate microarray data with various structure and can be stored in standard formats such as MAGE-ML, MAGE-TAB, and XML Schema. In addition, our system provides advanced tools of automatic microarray data submitter and file manager to manipulate local microarray data efficiently.

A Study On The Optimization of Java Class File under Java Card Platform (자바카드 플랫폼상에서 자바 클래스 파일의 최적화 연구)

  • 김도우;정민수
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1200-1208
    • /
    • 2003
  • Java Card technology allows us to run Java applications on smart cards and other memory-constrained devices. Java Card technology supports high security, portability and ability of storing and managing multiple applications. However, constrained memory resources of the Java Card Platform hinder wide deployment of the Java Card applications. Therefore, in this paper we propose a bytecode optimization algorithm to use the memory of a Java Card efficiently. Our algorithm can reduce the size of the bytecode by sharing the memory of the parameters of the catch clause in the try-catch-finally sentence.

  • PDF