• Title/Summary/Keyword: Recovery Scheme

Search Result 479, Processing Time 0.03 seconds

An adaptive fault tolerance strategy for cloud storage

  • Xiai, Yan;Dafang, Zhang;Jinmin, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5290-5304
    • /
    • 2016
  • With the growth of the massive amount of data, the failure probability of the cloud storage node is becoming more and more big. A single fault tolerance strategy, such as replication and erasure codes, has some unavoidable disadvantages, which can not meet the needs of the today's fault tolerance. Therefore, according to the file access frequency and size, an adaptive hybrid redundant fault tolerance strategy is proposed, which can dynamically change between the replication scheme and erasure codes scheme throughout the lifecycle. The experimental results show that the proposed scheme can not only save the storage space(reduced by 32% compared with replication), but also ensure the fast recovery of the node failures(increased by 42% compared with erasure codes).

Permutation Algorithm for fast Hadamard Transform (고속하다마드 변환을 위한 치환기법)

  • Nam, Ji-Tak;Park, Jin-Bae;Choi, Yun-Ho;Joo, Young-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 1997.07b
    • /
    • pp.616-619
    • /
    • 1997
  • The spectrum-recovery scheme in Hadamard transform spectroscopy is commonly implemented with a fast Hadamard transform (FHT). When the Hadamard or simplex matrix corresponding to the mask does not have the same ordering as the Hadamard matrix corresponding to the FHT, a modification is required. When the two Hadamard matrices are in the same equivalence class, this modification can be implemented as a permutation scheme. This paper investigates permutation schemes for this application. This paper is to relieve the confusion about the applicability of existing techniques, reveals a new, more efficient method: and leads to an extension that allows a permutation scheme to be applied to any Hadamard or simplex matrix in the appropriate equivalence class.

  • PDF

Reconstruction Scheme of lost Blocks in Block Coded Images (블록 코딩 영상에서 손실 블록의 재구성 기법)

  • Yoo Kyeong-Jung;Lee Bu-Kwon
    • Journal of Digital Contents Society
    • /
    • v.6 no.2
    • /
    • pp.113-118
    • /
    • 2005
  • In this paper, the reconstruction scheme of lost block in the transmission of block coded image is proposed. Due to differential coding of dc coefficient in JPEG images when JPEG image are transmitted over wireless communications, the effect of errors can destroy entire blocks of the image. Therefore, we aim to reconstruct the lost information using correlation between the lost block and its neighbor blocks. In order to evaluate the performance of this scheme, we inserted some intentional block error into the test images. And we obtained good results objectively and subjectively by experiments.

  • PDF

Revenue Reconciled Transmission Pricing Using Optimal Power Flow in a Competitive Electricity Market (OPF를 이용한 경쟁적 전력시장에서의 송전가격 수익보정어 관한 연구)

  • Joung, Sang-Houn;Chung, Koo-Hyung;Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.624-626
    • /
    • 2003
  • Transmission pricing is one of important issues related to competitive electricity markets since rational pricing scheme ensures a fair competition between this market participants. Transmission pricing scheme is classified briefly into marginal cost pricing and embedded cost pricing. In economic efficiency, marginal cost pricing is more adequate for competitive electricity market. However, this pricing scheme requires revenue reconciliation since it cannot ensure full recovery of Transco's revenue requirements. This paper presents a new revenue reconciliation to maximize social welfare. For this analysis, this paper provides the results applied by various revenue reconciliation methodologies.

  • PDF

An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks

  • Byun, Sang-Seon
    • Journal of Information Processing Systems
    • /
    • v.12 no.1
    • /
    • pp.73-82
    • /
    • 2016
  • In cognitive radio networks (CRNs), the performance of the transmission control protocol (TCP) at the secondary user (SU) severely drops due to the mistrigger of congestion control. A long disruption is caused by the transmission of primary user, leading to the mistrigger. In this paper, we propose a cross-layer approach, called a CR-aware scheme that enhances TCP performance at the SU. The scheme is a sender side addition to the standard TCP (i.e., TCP-NewReno), and utilizes an explicit cross-layer signal delivered from a physical (or link) layer and the signal gives an indication of detecting the primary transmission (i.e., transmission of the primary user). We evaluated our scheme by implementing it onto a software radio platform, the Universal Software Radio Peripheral (USRP), where many parts of lower layer operations (i.e., operations in a link or physical layer) run as user processes. In our implementation, we ran our CR-aware scheme over IEEE 802.15.4. Furthermore, for the purpose of comparison, we implemented a selective ACK-based local recovery scheme that helps TCP isolate congestive loss from a random loss in a wireless section.

Retransmission Scheme to Guarantee QoS for Multimedia Receivers in Multicast Environments (멀티캐스트 환경에서 멀티미디어 수신노드의 QoS를 보장하는 재전송 기법)

  • Kim, Ki-Young
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.7
    • /
    • pp.835-843
    • /
    • 2006
  • Multicast can send one copy of each packet to each member of the multicast group. Network resource is utilized effectively, consequently, it is suitable for one-to-many environments. reliability and flow control, however, are not supported basically, it is not suitable or transmission of multimedia data which have a time restriction. In this paper, we present a network model and a multicast retransmission scheme The proposed scheme remove ack-explosion from sender through local recovery and performs local retransmission when time restriction is satisfied on receiver by considering the state of receiver's buffer. Mathematical analysis and simulation are conducted to prove performance of the proposed scheme. The results are shown that the proposed scheme consumes a lower network bandwidth than the existing network model and guarantees QoS of receivers.

  • PDF

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

  • Li, Guojia;You, Lin;Hu, Gengran;Hu, Liqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2865-2878
    • /
    • 2021
  • As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.

Studies on the Superovulation and Collection of microinjectable Embryos in Korean Native Goats (Capra hircus aegagrus) (한국 재래산양에서의 과배란유기와 외래유전자 주입에 적합한 수정란의 회수에 관한 연구)

  • ;;Igor Goldman
    • Korean Journal of Animal Reproduction
    • /
    • v.21 no.4
    • /
    • pp.373-379
    • /
    • 1997
  • This study was carried out to determine the hormone treatment scheme for an efficient superovulation and optimal recovery time for obtaining pronuclear embryos suitable for DNA injection in Korean native goats. For a superovulation, FSH(5.6mg) was given over four days in twice daily injections with (FSH/hCG group) or without(FSH group) hCG(100 IU) co-injection at the time of 7th FSH injection. Estrus cycle was synchronized by norgestomet ear-implantation for 11 days and its removal at the time of 6th FSH injection. Among the treated goats, the percentage of ovulated goats, which were examined at 70 to 76 h following implant removal, was greater in FSH/hCG group than in FSH group (100% vs 36.4%) but there was no significant difference in the mean numbers of ovulation points and fertilization rates between the two groups. To optimize hCG treatment scheme and recovery time, we injected hCG at the time of 7th (FSH/hCGa) or 8th(FSH/hCGb) FSH injection and then examined the developmental stage of the embryos recovered at different times after implant removal. In FSH/hCGa group, significant portions(31 to 44%) were beyond 1-cell stage, which was non-injectable, irrespective of their recovery time. However, in FSH/hCGb group recovered at 70 to 76 h after implant removal, great portions(69%) were fertilized and most of them(96.6%) were injectable 1-cell stage. Considering together the fertilization rate and developmental stage of recovered embryos, it is recommendable to administrate hCG at the time of final 8th FSH injection and collect the embryos at 70 to 76 h after implant removal to obtain injectable embryos as many as possible in Korean native goats.

  • PDF

A Voice Coding Technique for Application to the IEEE 802.15.4 Standard (IEEE 802.15.4 표준에 적용을 위한 음성부호화 기술)

  • Chen, Zhenxing;Kang, Seog-Geun
    • Journal of Broadcast Engineering
    • /
    • v.13 no.5
    • /
    • pp.612-621
    • /
    • 2008
  • Due to the various constraints such as feasible size of data payload and low transmission power, no technical specifications on the voice communication are included in the Zigbee standard. In this paper, a voice coding technique for application to the IEEE 802.15.4 standard, which is the basis of Zigbee communication, is presented. Here, both high compression and good waveform recovery are essential. To meet those requirements, a multi-stage discrete wavelet transform (DWT) block and a binary coding block consisting of two different pulse-code modulations are exploited. Theoretical analysis and simulation results in an indoor wireless channel show that the voice coder with 2-stage DWT is most appropriate from the viewpoint of compression and waveform recovery. When the line-of-sight component is dominant, the voice coding scheme has good recovery capability even in the moderate signal-to-noise power ratios. Hence, it is considered that the presented scheme will be a technical reference for the future recommendation of voice communication exploiting Zigbee.

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.