• Title/Summary/Keyword: File priority

Search Result 17, Processing Time 0.028 seconds

Priority-Based Hybrid File Storage Management System Using Logical Volume Manager (논리 볼륨 매니저를 이용한 파일 우선순위 기반의 하이브리드 저장장치 관리 시스템)

  • Choi, Hoonha;Kim, Hyeunjee;No, Jaechun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.12
    • /
    • pp.94-102
    • /
    • 2016
  • Recently, the I/O performance of a single node is rapidly improving due to the advent of high-performance SSD. As a result, the next-generation storage platform based on SSD has received a great deal of attention and such storage platforms are increasingly adopted to commodity servers or data centers that look for the high-bandwidth computation and I/O. However, building all SSD-based storage platform may not be cost-effective because the price per storage capacity is very high as compared to that of HDD. In this paper. we propose a hybrid file management solution, called HyPLVM(Hybrid Priority Logical Volume Manager), which combines the strength of SSD with the desirable aspects of low-price, high-storage capacity HDD. HyPLVM prioritizes the files and directories to be accessed by users, in order to determine the target storage device (SSD/HDD) in which files are allocated, while mitigating the cost of building storage platforms.

Construction of rapid earthquake damage evaluation system - Real-time two-dimensional visualization of ground motion (지진신속피해평가시스템 구축 - 실시간 지진동의 2차원적 영상화)

  • 지헌철;전정수;이희일;박정호;임인섭
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2002.09a
    • /
    • pp.51-60
    • /
    • 2002
  • In this study we developed the visualization scheme of spatial ground-motion measurements in real time by using DSS data. Even though this scheme itself is useful for national earthquake mitigation plans, this scheme could be served as the crucial core for constructing rapid earthquake damage evaluation system. DSS is the abbreviation of Data Subscription Service and this is the pre-assigned request for the seismic stations to send very limited brief data with high priority and negligible transmission load. In addition to visualize the damage area with intensity, the corresponding epicenter can be estimated roughly for quick event alarm. For the interpolation of spatially irregular PGA data, the program, named as surface. of GMT was used with NetCDF grid file format. Since the grid file is similar to a postscript file, the program, called as shading, was coded with C language by using Matpak library in order to convert grid files into image files.

  • PDF

An Integrated File System for Guaranteeing the Quality of Service of Multimedia Stream (멀티미디어 스트림의 QoS를 보장하는 통합형 파일시스템)

  • 김태석;박경민;최정완;김두한;원유집;고건;박승민;김정기
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.9
    • /
    • pp.527-535
    • /
    • 2004
  • Handling mixed workload in digital set-top box or streaming server becomes an important issue as integrated file system gets momentum as the choice for the next generation file system. The next generation file system is required to handle real-time audio/video playback while being able to handle text requests such as web page, image file, etc. Legacy file system provides only best effort I/O service and thus cannot properly support the QoS of soft real-time I/O. In this paper, we would like to present our experience in developing the file system which fan guarantee the QoS of multimedia stream. We classify all application I/O requests into two category: periodic I/O and sporadic I/O. The QoS requirement of multimedia stream could be guaranteed by giving a higher priority to periodic requests than sporadic requests. The proto-type file system(Qosfs) is developed on Linux Operating System.

Traffic signal control system using fuzzy logic (Fuzzy logic을 利用한 交通 信號 control system)

  • 文珠永;李尙培
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1996.10a
    • /
    • pp.180-183
    • /
    • 1996
  • This work discusses simulation results for the fuzzy logic controller tested the project“Fuzzy Ramp Metering Algorithm Implementation.”The performance objectives were, in order of priority, to maximize total vehicle-miles, maximize mainline speeds, and minimize delay per vehicle while maintaining an acceptable ramp queue. In the fuzzy logic controller, the sensors from the on-ramps were helpful in maintaining reasonable ramp queue and mainline congestion because it considered these factors simultaneously. Each metered ramp had a parameter input file, which allowed the controller to be modified without recompiling the software. Consequently, maintenance costs should be minimal.

  • PDF

Priority Assessment of Cyber Threat Indicators (사이버 위협 지표 간 중요도 비교 분석 연구)

  • Lee, Ro-woon;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.951-958
    • /
    • 2021
  • With the growing cyber threat to information assets, it has become important to share threat information quickly. This paper examines the sharing of cyber threat information and presents a method to determine the importance of threat indicators in the information sharing market by calculating weights. The analysis was conducted using AHP techniques, with a pairwise comparison of the four factors(attacker & infected system indicators, role indicators, malicious file indicators, technique & spread indicators) and the details of each factor. Analysis shows that malicious file indicators are the most important among the higher evaluation factors and infected system IP, C&C and Smishing are the most important factors in comparison between detailed items. These findings could be used to measure the preference of consumers and the contribution of information provider for facilitating information sharing.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Individual factors influencing the location decisions of practicing physicians (최근 배출된 전문의의 개원지역 선택에 영향을 미치는 개인요인 분석)

  • 김창엽;윤석준;이진석;김용익
    • Health Policy and Management
    • /
    • v.9 no.3
    • /
    • pp.21-32
    • /
    • 1999
  • The purpose of this study is to assess individual decisive factors for distribution of medical specialists in Korea. A data set was constructed using several published data sources. including the Korean Medical Association's physician master file as a principal source for physician information. Linear logistic regression analysis was performed to assess the relationship between the location of private specialist clinic for practice with six variables related with individual characteristics: age. sex. location of postgraduate training hospital. location of medical school graduated, size of hospital for training, and specialty. Analysis showed that location of practice. classified into urban and rural areas, was significantly associated with the variables of sex. location of postgraduate training hospital. location of medical school. In addition, significant association was found between the location of practice which was categorized into "near-Seoul area" and others, and sex, location of postgraduate training hospital. and location of medical school. We could conclude that to improve area maldistribution of physicians locations of hospitals for training and medical schools have to have the highest priority in the policymaking.icymaking.

  • PDF

Performance Comparison between Expressnet and FDDI for intergrated Voice and Data Traffic (음성과 데이터의 통합트래픽에 대한 Expressnet과 FDDI의 성능비교)

  • Joo, Gi-Ho
    • The Journal of Natural Sciences
    • /
    • v.8 no.2
    • /
    • pp.93-99
    • /
    • 1996
  • In this study, we compare performance of priority schemes of FDDI and Expressnet for integrated voice and data traffic through simulation. The voice capacity of FDDI is higher than that of Expressnet for all cases considered. When compared to Expressnet, FDDI achieves a higher data throughput for file transfer traffic but it incurs a longer delay for interactive traffic.

  • PDF

Performance Analysis of Multimedia CDMA Mobile Communication System Considering Diverse Qos Requirements (멀티미디어 CDMA 이동통신 시스템에서의 다양한 QoS 요구조건을 고려한 성능 분석)

  • Kim, Baek-Hyun;Shin, Seung-Hoon;Kwak Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.1-12
    • /
    • 2002
  • In the multimedia CDMA mobile communication service, it is required to support various applications, such as voice, video, file transfer, e-mail, and Internet access, with guaranteed QoS. In the mixed traffic environment ,which consists of voice, stream data, and packet data, we analyze the network where preemptive priority is granted to delay-intolerant voice service and a buffer is offered to delay-tolerant stream data service. And, for best-effort packet data service, the access control by transmission permission probability is applied to obtain prominent throughput. To analyze the multimedia CDMA mobile communication system, we build a 2-dimensional markov chain model about prioritized-voice and stream data services and accomplish numerical analysis in combination with packet data traffic based on residual capacity equation.

Large Flows Detection, Marking, and Mitigation based on sFlow Standard in SDN

  • Afaq, Muhammad;Rehman, Shafqat;Song, Wang-Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.189-198
    • /
    • 2015
  • Despite the fact that traffic engineering techniques have been comprehensively utilized in the past to enhance the performance of communication networks, the distinctive characteristics of Software Defined Networking (SDN) demand new traffic engineering techniques for better traffic control and management. Considering the behavior of traffic, large flows normally carry out transfers of large blocks of data and are naturally packet latency insensitive. However, small flows are often latency-sensitive. Without intelligent traffic engineering, these small flows may be blocked in the same queue behind megabytes of file transfer traffic. So it is very important to identify large flows for different applications. In the scope of this paper, we present an approach to detect large flows in real-time without even a short delay. After the detection of large flows, the next problem is how to control these large flows effectively and prevent network jam. In order to address this issue, we propose an approach in which when the controller is enabled, the large flow is mitigated the moment it hits the predefined threshold value in the control application. This real-time detection, marking, and controlling of large flows will assure an optimize usage of an overall network.