• Title/Summary/Keyword: Number Portability

Search Result 99, Processing Time 0.022 seconds

Comparison of Failure Rates in Measuring Software Reliability (소프트웨어 신뢰도 측정에서 고장률 비교)

  • Jung, Hye Jung
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.15-20
    • /
    • 2022
  • This research studied the evaluation of reliability among the software quality characteristics: suitability, reliability, usability, portability, maintainability, performance efficiency, security, and compatibility. It proposes a quantitative evaluation of reliability in the measurement of software quality. This study introduces a method for measuring the failure rate included in maturity during reliability evaluation, which is one of the characteristics of software quality, and is a study with experimental data on how the failure rate changes depending on the form of failure data. Focusing on software testing, the failure rate was measured and compared according to the type of failure data by applying it to the software reliability growth model, focusing on the number of failures per day. The failure rate was measured around the failure time found through the 6-day test, and the failure rate was compared with the failure rate proposed by the international standard ISO/IEC 25023 using the measurement results, and the application was reviewed according to the data type.

FAST : A Log Buffer Scheme with Fully Associative Sector Translation for Efficient FTL in Flash Memory (FAST :플래시 메모리 FTL을 위한 완전연관섹터변환에 기반한 로그 버퍼 기법)

  • Park Dong-Joo;Choi Won-Kyung;Lee Sang-Won
    • The KIPS Transactions:PartA
    • /
    • v.12A no.3 s.93
    • /
    • pp.205-214
    • /
    • 2005
  • Flash memory is at high speed used as storage of personal information utilities, ubiquitous computing environments, mobile phones, electronic goods, etc. This is because flash memory has the characteristics of low electronic power, non-volatile storage, high performance, physical stability, portability, and so on. However, differently from hard disks, it has a weak point that overwrites on already written block of flash memory is impossible to be done. In order to make an overwrite possible, an erase operation on the written block should be performed before the overwrite, which lowers the performance of flash memory highly. In order to solve this problem the flash memory controller maintains a system software module called the flash translation layer(FTL). Of many proposed FTL schemes, the log block buffer scheme is best known so far. This scheme uses a small number of log blocks of flash memory as a write buffer, which reduces the number of erase operations by overwrites, leading to good performance. However, this scheme shows a weakness of low page usability of log blocks. In this paper, we propose an enhanced log block buffer scheme, FAST(Full Associative Sector Translation), which improves the page usability of each log block by fully associating sectors to be written by overwrites to the entire log blocks. We also show that our FAST scheme outperforms the log block buffer scheme.

A Ranking Cleaning Policy for Embedded Flash File Systems (임베디드 플래시 파일시스템을 위한 순위별 지움 정책)

  • Kim, Jeong-Ki;Park, Sung-Min;Kim, Chae-Kyu
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.399-404
    • /
    • 2002
  • Along the evolution of information and communication technologies, manufacturing embedded systems such as PDA (personal digital assistant), HPC (hand -held PC), settop box. and information appliance became realistic. And RTOS (real-time operating system) and filesystem have been played essential re]os within the embedded systems as well. For the filesystem of embedded systems, flash memory has been used extensively instead of traditional hard disk drives because of embedded system's requirements like portability, fast access time, and low power consumption. Other than these requirements, nonvolatile storage characteristic of flash memory is another reason for wide adoption in industry. However, there are some technical challenges to cope with to use the flash memory as an indispensable component of the embedded systems. These would be relatively slow cleaning time and the limited number of times to write-and-clean. In this paper, a new cleaning policy is proposed to overcome the problems mentioned above and relevant performance comparison results will be provided. Ranking cleaning policy(RCP) decides when and where to clean within the flash memory considering the cost of cleaning and the number of times of cleaning. This method will maximize not only the lifetime of flash memory but also the performance of access time and manageability. As a result of performance comparison, RCP has showed about 10 ~ 50% of performance evolution compared to traditional policies, Greedy and Cost-benefit methods, by write throughputs.

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL) (취약성 점검 코드를 자동으로 생성하는 에이전트를 통한 통합 취약성 분석 시스템)

  • 김수용;서정석;조상현;김한성;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.111-122
    • /
    • 2002
  • Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.

A Practical Quality Model for Evaluation of Mobile Services Based on Mobile Internet Device (모바일 인터넷 장비에 기반한 모바일 서비스 평가를 위한 실용적인 품질모델)

  • Oh, Sang-Hun;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.5
    • /
    • pp.341-353
    • /
    • 2010
  • Mobile Internet Device (MID) allows users to flexibly use various forms of wireless internet such as Wi-Fi, GSM, CDMA, and 3G. Using such Internet, MID users can utilize application services. MID usage is expected to grow due to the benefits of portability, Internet accessibility, and other convenience. However, it has resource constraints such as limited CPU power, small memory size, limited battery life, and small screen size. Consequently, MIDs are not capable to hold large-sized complex applications and to process a large amount of data in memory. An effective solution to remedy these limitations is to develop cloud services for the required application functionality, to deploy them on the server side, and to let MID users access the services through internet. A major concern on running cloud services for MIDs is the potential problems with low Quality of Service (QoS) due to the characteristics of MIDs. Even measuring the QoS of such services is more technically challenging than conventional quality measurements. In this paper, we first identify the characteristics of MIDs and cloud services for MIDs. Based on these observations, we derive a number of quality attributes and their metrics for measuring QoS of mobile services. A case study of applying the proposed quality model is presented to show its effectiveness and applicability.

Genomic epidemiology for microbial evolutionary studies and the use of Oxford Nanopore sequencing technology (미생물 진화 연구를 위한 유전체 역학과 옥스포드 나노포어 염기서열분석 기술의 활용)

  • Choi, Sang Chul
    • Korean Journal of Microbiology
    • /
    • v.54 no.3
    • /
    • pp.188-199
    • /
    • 2018
  • Genomic epidemiology exploits various basic microbial research areas. High-throughput sequencing technologies dramatically have been expanding the number of microbial genome sequences available. Abundant genomic data provide an opportunity to perform strain typing more effectively, helping identify microbial species and strains at a higher resolution than ever before. Genomic epidemiology needs to find antimicrobial resistance genes in addition to standard genome annotations. Strain typing and antimicrobial resistance gene finding are static aspects of genomic epidemiology. Finding which hosts infected which other hosts requires the inference of transient transmission routes among infected hosts. The strain typing, antimicrobial resistance gene finding, and transmission tree inference would allow for better surveillance of microbial infectious diseases, which is one of the ultimate goals of genomic epidemiology. Among several high-throughput sequencing technologies, genomic epidemiology will benefit from the more portability and shorter sequencing time of the Oxford Nanopore Technologies's MinION, the third-generation sequencing technology. Here, this study reviewed computational methods for quantifying antimicrobial resistance genes and inferring disease transmission trees. In addition, the MinION's applications to genomic epidemiology were discussed.

Implementation of Smart Device-Based on Platform for the Visually Impaired (시각 장애인을 위한 스마트 장치 기반 플랫폼 구현)

  • Lee, Ook;Choi, Jung-Woon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.538-549
    • /
    • 2019
  • This study suggests a new platform in which VI can communicate with their guardians who serve as a system administrator optimizing personal characteristics. In terms of interaction between platform components, this study can contribute to enhancing stability of walking by giving substantial information to VI through server processing and setups of guardians with real-time interaction to VI through server processing and setups of guardians with real-time interaction. Therefore, developing smart phone applications can facilitate both portability and cost effectiveness, by the users' downloading the application and registration. In terms of guardians' cost, this system is cost-effective because they can access to the administration system through personal computers or smart phones, not through specialized system devices. This system is web-based, which automatically communicates with the surroundings of, such as provides the guardians with the necessary information or approaches to the danger through IoT devices, which results in enhancing safety. Moreover, it is possible for guardians to utilize the personalized platform since the system not only senses personal characteristics but also sends a number of information to VI. a new platform makes it possible for guardians to provide electronic support and interaction with the application with the application users, which contributes to systematic and safe walk for VI.

Technique to Reduce Container Restart for Improving Execution Time of Container Workflow in Kubernetes Environments (쿠버네티스 환경에서 컨테이너 워크플로의 실행 시간 개선을 위한 컨테이너 재시작 감소 기법)

  • Taeshin Kang;Heonchang Yu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.3
    • /
    • pp.91-101
    • /
    • 2024
  • The utilization of container virtualization technology ensures the consistency and portability of data-intensive and memory volatile workflows. Kubernetes serves as the de facto standard for orchestrating these container applications. Cloud users often overprovision container applications to avoid container restarts caused by resource shortages. However, overprovisioning results in decreased CPU and memory resource utilization. To address this issue, oversubscription of container resources is commonly employed, although excessive oversubscription of memory resources can lead to a cascade of container restarts due to node memory scarcity. Container restarts can reset operations and impose substantial overhead on containers with high memory volatility that include numerous stateful applications. This paper proposes a technique to mitigate container restarts in a memory oversubscription environment based on Kubernetes. The proposed technique involves identifying containers that are likely to request memory allocation on nodes experiencing high memory usage and temporarily pausing these containers. By significantly reducing the CPU usage of containers, an effect similar to a paused state is achieved. The suspension of the identified containers is released once it is determined that the corresponding node's memory usage has been reduced. The average number of container restarts was reduced by an average of 40% and a maximum of 58% when executing a high memory volatile workflow in a Kubernetes environment with the proposed method compared to its absence. Furthermore, the total execution time of a container workflow is decreased by an average of 7% and a maximum of 13% due to the reduced frequency of container restarts.

A Study on the Characteristics of Oddly Shaped Stone's Arrangement at Donggwoldo (동궐도(東闕圖)에 나타난 괴석(怪石)의 배치특성에 관한 연구)

  • Jung, Woo-Jin;Kim, Hwa-Ok;Park, Yool-Jin
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.32 no.2
    • /
    • pp.12-26
    • /
    • 2014
  • This study has researched the forms of arrangement and use of the oddly shaped stones which were used at palaces during Joseon Dynasty based on arrangements of stones as shown in Donggwoldo(東闕圖), and tried to identify its special features. The sorts of stone's arrangements which set formal patterns by assisting an axis in Donggwoldo can be classified as the single type using one stone, the symmetrical type using 2 stones symmetrically and the parallel type using 3 or more stones. The single type was used to endow a focal point and to accent centrality by arranging a stone on the axis performed from formal shaped buildings. The symmetrical type was used to show order and hierarchy by placing two odd-shaped stones on either side of a building. And the parallel type which is arranged three stones side by side, is put a middle stone on the central axis line to determine strong directional and frontality. Also similarity to method of arrangement of stones can be found from planting trees in a prominent way for scenery or planting trees symmetrically. Stones and trees can be chosen according to nature and scale of places and basically their effects of formation of axis and creating typical space is same. Based on these respect, the characteristics of arrangement of stones shown in Donggwoldo can be briefly summarized as follows. First, the oddly shaped stones were used by creating a centripetal space in order to show a grade of rank. Second, the distances among stones could be adjusted to the sizes of the architecture which was at the center. The aim was to provide stability through the balanced composition between the central axis and symmetrical structures. Third, the form of regularity was added by using stone vase in consideration of irregular shape of stone causing interference in forming regular symmetry. Fourth, a centrality was emphasized by adding change to central stones in the parallel type used 3 erect stones. Fifth, the sizes of stone were limited in order to make smooth for the mix and adjustment of its position with the types of other garden ornaments, so the oddly shaped stones in palace have portability. Sixth, the oddly shaped stones in palace which were appreciated as inspirational object basically were a sculpture of the same quality with suiseki (壽石), and the appreciative method, the composition and shape had developed in the same texture. Finally, the even number of stones by parallel type were arranged by equal partition. But odd number of stones followed the method with symmetrical arrangement on its center stone. These principles of stone arrangement are judged as distinguishing methods which oddly shaped stones was made and used in Joseon palaces.