• Title/Summary/Keyword: Shared Information

Search Result 2,118, Processing Time 0.029 seconds

Reliability Estimation for a Shared-Load System Based on Freund Model

  • Hong, Yeon-Woong;Lee, Jae-Man;Cha, Young-Joon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.6 no.2
    • /
    • pp.1-7
    • /
    • 1995
  • This paper considers the reliability estimation of a two-component shared-load system based on Freund model. Maximum likelihood estimator, order restricted maximum likelihood estimator and uniformly minimum variance unbiased estimator of the reliability function for the system are obtained. Performance of three estimators for moderate sample sizes is studied by simulation.

  • PDF

Performance of the Finite Difference Method Using Cache and Shared Memory for Massively Parallel Systems (대규모 병렬 시스템에서 캐시와 공유메모리를 이용한 유한 차분법 성능)

  • Kim, Hyun Kyu;Lee, Hyo Jong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.108-116
    • /
    • 2013
  • Many algorithms have been introduced to improve performance by using massively parallel systems, which consist of several hundreds of processors. A typical example is a GPU system of many processors which uses shared memory. In the case of image filtering algorithms, which make references to neighboring points, the shared memory helps improve performance by frequently accessing adjacent pixels. However, using shared memory requires rewriting the existing codes and consequently results in complexity of the codes. Recent GPU systems support both L1 and L2 cache along with shared memory. Since the L1 cache memory is located in the same area as the shared memory, the improvement of performance is predictable by using the cache memory. In this paper, the performance of cache and shared memory were compared. In conclusion, the performance of cache-based algorithm is very similar to the one of shared memory. The complexity of the code appearing in a shared memory system, however, is resolved with the cache-based algorithm.

Design and Implementation of a Collaborative Software Development Management System (협업적 소프트웨어 개발 관리 시스템의 설계 및 구현)

  • Han, Kwan-Hee;Song, Hee-Seok
    • Journal of Information Technology Services
    • /
    • v.5 no.2
    • /
    • pp.79-92
    • /
    • 2006
  • Since software development team members have been more geographically spread due to the globalization of business and Internet technologies, the management of deliverables and communication efforts for developing high-quality software products on time is becoming more complicated. Among the functional requirements for collaborative software development management, the manipulation of shared information objects is essential for the collaborative work among distributed development team members. This paper proposes an integrated information object management framework comprised of a so-called BOC (Bill Of Class) scheme and a standardized software part dictionary for managing shared information objects efficiently among distributed co-workers. In order to manage these complex information objects, the proposed framework adopt product structures represented by Bills Of Materials (BOM) as stems for integrating the various information objects. Based on the proposed framework, a collaborative software development management system (CSDMS) is implemented, and the functionalities and the structure of the system are also described in this paper. The proposed system provides sufficient functionalities for the change management of information objects and the management of their relationship to other objects rather than existing system.

Hyperledger Blockchain Design for Sharing, Spreading, and Protecting National Cybersecurity Information

  • Park, Dea-woo;Lee, Sang-hyeon
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.2
    • /
    • pp.94-99
    • /
    • 2020
  • Real cyberterrors are invisible and difficult to identify. Even after a cyberattack, its origin and cause are difficult to determine. Cyberterrorism results in invisible cyberwars, and it is believed that World War IV will begin with a cyberwarfare. For national cybersecurity, information on cybersecurity must be collected, shared, and disseminated. In this study, we investigate a blockchain system designed based on the World Cybersecurity Agreement. National cybersecurity information is linked to the hyperledger blockchain system network through the National Cybersecurity Center. National cybersecurity information designs and uses a secure protocol for protection; further, it is collected, shared, and disseminated to treaty countries. National cybersecurity information is shared and spread by the hyperledger blockchain system, and it uses a cyberdefense system that responds to the cyberattacks and their origin. This paper serves as a policy and legislation guideline for forming a World Cybersecurity Agreement between countries.

Information-Sharing Patterns of A Directed Social Network: The Case of Imhonet

  • Lee, Danielle
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.7-17
    • /
    • 2017
  • Despite various types of online social networks having different topological and functional characteristics, the kinds of online social networks considered in social recommendations are highly restricted. The pervasiveness of social networks has brought scholarly attention to expanding the scope of social recommendations into more diverse and less explored types of online social networks. As a preliminary attempt, this study examined the information-sharing patterns of a new type of online social network - unilateral (directed) network - and assessed the feasibility of the network as a useful information source. Specifically, this study mainly focused on the presence of shared interests in unilateral networks, because the shared information is the inevitable condition for utilizing the networks as a feasible source of personalized recommendations. As the results, we discovered that user pairs with direct and distant links shared significantly more similar information than the other non-connected pairs. Individual users' social properties were also significantly correlated with the degree of their information similarity with social connections. We also found the substitutability of online social networks for the top cohorts anonymously chosen by the collaborative filtering algorithm.

Public Shared Service Centers for Collaborative Government: A Case Study of the United States and the United Kingdom (협업정부 구현을 위한 행정공유서비스센터 도입방안 연구 - 정부 공유서비스센터 선진국 사례연구를 기반으로 -)

  • Hong, Kil Pyo;Chung, Choong Sik;Kim, Pan Suk
    • Informatization Policy
    • /
    • v.21 no.3
    • /
    • pp.33-55
    • /
    • 2014
  • Public Shared Service Centers (PSSC) consolidate functions such as human resources, information technology, financial management or accounting into one office to serve an organization. A prominent example from the United States is the Federal Information Technology Shared Services Strategy. It supports mission, administrative, and infrastructure-related IT functions through providing organizations in the Executive Branch of the Federal Government (Federal Agencies) with policy guidance on the full range and lifecycle of intra- and inter-agency information technology (IT) shared services. This study looks at the Federal Information Technology Shared Services Strategy in order to draw lessons for fostering collaborative government through the use of PSSC. It finds the following factors are critical for success when implementing IT shared services: (1) agency leadership must be solidly behind their IT shared service plan, or the needed changes will not happen at the business unit, program, or system levels; (2) there must be a move away from internally-centered, program-specific thinking, and a move toward a paradigm of consuming and providing IT shared services with multiple groups whenever possible; and (3) successfully managing "loss of control" issues is central, and optimizing business processes is essential to move from stove-piped workflows to processes that work across the agency enterprise and beyond. Therefore, the study suggests that a Korean model of PSSC implementation be introduced, and that good IT Governance is a crucial component of PSSC strategies.

Design of the Charge-Shared Switching MDAC for a Pipelined A/D Converter (Pipelined A/D 변환기 용 Charge-Shared Switching MDAC의 설계)

  • 박만규;이종훈;김상호;김상민;손영철;김대정;김동명
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.69-72
    • /
    • 2002
  • This paper proposed a new charge-shared switching MDAC for a pipelined A/D converter The proposed architecture accomplishes the same function of a conventional multiplying-digital-to-analog converter (MDAC). By adopting the proposed scheme, about 40% of the total capacitances could be reduced and the speed of the MDAC increases. The performance of the charge-shared switching MDAC has been Proved by HSPICE simulations.

  • PDF

SyncNote: A Shared Whiteboard Android Application Supporting the XMPP (SyncNote: XMPP를 지원하는 공유 화이트보드 안드로이드 어플리케이션)

  • Jin, Jae-Hwan;Park, Jongmoon;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1375-1382
    • /
    • 2013
  • A shared whiteboard provides a drawing workplace that can be shared with peoples in real time. Since it supports rich drawing mechanisms for collaboration or communication, it is used as an effective tool in group work such as virtual meeting. In this paper, we present an XMPP client application named SyncNote that supports the shared whiteboard facility. For this, we propose an extension of the open standard communication protocol XMPP to provide the shared whiteboard facility. The SyncNote application runs on the Android platform, providing effective communication through sharing the drawings and images created by a group of users.

Reducing False Sharing based on Memory Reference Patterns in Distributed Shared Memory Systems (분산 공유 메모리 시스템에서 메모리 참조 패턴에 근거한 거짓 공유 감속 기법)

  • Jo, Seong-Je
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1082-1091
    • /
    • 2000
  • In Distributed Shared Memory systems, false sharing occurs when two different data items, not shared but accessed by two different processors, are allocated to a single block and is an important factor in degrading system performance. The paper first analyzes shared memory allocation and reference patterns in parallel applications that allocate memory for shared data objects using a dynamic memory allocator. The shared objects are sequentially allocated and generally show different reference patterns. If the objects with the same size are requested successively as many times as the number of processors, each object is referenced by only a particular processor. If the objects with the same size are requested successively much more than the number of processors, two or more successive objects are referenced by only particular processors. On the basis of these analyses, we propose a memory allocation scheme which allocates each object requested by different processors to different pages and evaluate the existing memory allocation techniques for reducing false sharing faults. Our allocation scheme reduces a considerable amount of false sharing faults for some applications with a little additional memory space.

  • PDF

A Study on the Application of Block Chain Ethereum Technology to Activate Digital Contents Trading as Sharing economy - data encryption and modify merkle tree-

  • Min, Youn-a;Baek, Yeong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.73-80
    • /
    • 2018
  • The shared economy began with the concept of sharing the physical and intellectual assets of individuals with others. Nowadays, the concept of shared economy is becoming one of the industries as an enterprise type. Especially, with the development of the Internet and smart devices, various forms of shared economy have been developed in accordance with the need of sharing of individual income. Digital content is also a shareable commodity and it is seeking to utilize it as an item of shared economy. Accordingly, when digital contents are used as a shared economy, there are various possible threats -security threats that may arise in the course of transactions, potential for theft, alteration and hacking of contents. In this paper, we propose transaction method and content protection method using block chain-ethereum technology to reduce security threats and transparent transactions that can occur in digital contents transactions. Through the proposed method, the trust of the consumer and the supplier can be measured and the encryption can be performed considering the characteristics of the data to be traded. Through this paper, it is possible to increase the transparency of smart transaction of digital contents and to reduce the risk of content distortion, hacking, etc.