• Title/Summary/Keyword: Single file

Search Result 254, Processing Time 0.025 seconds

Analysis of the Data Service Structure for Korean e-Navigation Operation System (한국형 e-Navigation 운영 시스템을 위한 데이터 서비스 구조 분석)

  • Jang, Wonseok;Kim, Beomjun;Kang, Moonseog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.263-266
    • /
    • 2017
  • Numerous maritime safety technologies and systems are being developed to support safe navigation at Sea. e-Navigation is a representative system for maritime safety. It is being developed to maximize the ships safety by applying most maritime safety technologies. The e-Navigation system is being developed by the International Maritime Organization (IMO) with the aim of introducing it by 2019. South Korea has already recognized the importance of maritime safety support technology and is actively introducing e-Navigation. Korean e-Navigation is being designed to provide diverse functions for maritime safety, such as providing an optimal safe route, risk analysis, and weather information. Service modules that provide e-Navigation's each function use different types of data that are difficult to configure as a single database. In this paper, we analyze the data needed for Korean e-Navigation, the data service system structure and types that can effectively support it.

  • PDF

A Development of Synthetic Map Preprocessor for Mobile GIS Visualization based on GML (GML 기반 모바일 GIS 가시화를 위한 Synthetic Map Preprocessor 구축)

  • Song Eun-Ha;Park Yong-Jin;Han Sung-Kook;Jeong Young-Sik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.383-388
    • /
    • 2006
  • Most of GIS services have been operated in single applications, and as data processing and computer and mobile technologies have developed rapidly, users request for efficient sharing between each GIS's own data and various different GIS's. However, since many GIS applications maintain their own data formats, they are incapable of processing data formats different with each other, and do not have a filtering function for mobile GIS. This paper designs an integrated preprocessor, SMP to accept features of various current formats of geographic information such as DXF(Drawing eXchange Format), DWG(DraWinG), SHP(SHaPefile), etc., and to extract core information for describing maps. The geographic information extracted by SMP(Synthetic Map Preprocessor) shows consistency in various formats by visualizing through the integrated view. By generating the extracted core data in GML, it supports rapid access to mobile devices and extensibility of file formats overcoming heterogeneity.

Design and Implementation of iATA-based RAID5 Distributed Storage Servers (iATA 기반의 RAID5 분산 스토리지 서버의 설계 및 구현)

  • Ong, Ivy;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.305-311
    • /
    • 2010
  • iATA (Internet Advanced Technology Attachment) is a block-level protocol developed to transfer ATA commands over TCP/IP network, as an alternative network storage solution to address insufficient storage problem in mobile devices. This paper employs RAID5 distributed storage servers concept into iATA, in which the idea behind is to combine several machines with relatively inexpensive disk drives into a server array that works as a single virtual storage device, thus increasing the reliability and speed of operations. In the case of one machine failed, the server array will not destroy immediately but able to function in a degradation mode. Meanwhile, information can be easily recovered by using boolean exclusive OR (XOR) logical function with the bit information on the remaining machines. We perform I/O measurement and benchmark tool result indicates that additional fault tolerance feature does not delay read/write operations with reasonable file size ranged in 4KB-2MB, yet higher data integrity objective is achieved.

Analysis of Effects of Hidden Nodes and CCA Deferment Algorithm on IEEE 802.15.4 Performance Using ns-2 Simulator (ns-2 시뮬레이터를 이용한 은닉 노드와 CCA 지연 알고리즘이 IEEE 802.15.4 네트워크의 성능에 미치는 영향 분석)

  • Lee, Kang-Woo;Hyun, Gyu-Wan;Shin, Youn-Soon;Ahn, Jong-Suk
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.393-406
    • /
    • 2009
  • This paper introduces two functions added to the current version of ns-2 simulator for better accuracy of IEEE 802.15.4 network simulations. The first one is to automatically place hidden nodes over the ring topology in which the coordinator is centered, when the number of hidden nodes and total number of nodes is given. Collisions of signals can be distinguished into the trace file according to the ways of participation of hidden nodes. The second one is the CCA deferment algorithm described in IEEE 802.15.4-2006 standard which is not implemented in the current version of ns-2. Owing to these additional functions, we can carry out the precise analysis of the performance effects of hidden nodes and CCA deferment algorithm on 802.15.4 networks. Simulation results present at least 66% of performance degradation in throughput and drastic increase of collision probability up to 90% from 65% by just a single hidden node. Besides, 2006 standard for CCA deferment algorithm gives 19% lower collision probability and 38% higher performance.

Deployment and Performance Analysis of Data Transfer Node Cluster for HPC Environment (HPC 환경을 위한 데이터 전송 노드 클러스터 구축 및 성능분석)

  • Hong, Wontaek;An, Dosik;Lee, Jaekook;Moon, Jeonghoon;Seok, Woojin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.9
    • /
    • pp.197-206
    • /
    • 2020
  • Collaborative research in science applications based on HPC service needs rapid transfers of massive data between research colleagues over wide area network. With regard to this requirement, researches on enhancing data transfer performance between major superfacilities in the U.S. have been conducted recently. In this paper, we deploy multiple data transfer nodes(DTNs) over high-speed science networks in order to move rapidly large amounts of data in the parallel filesystem of KISTI's Nurion supercomputer, and perform transfer experiments between endpoints with approximately 130ms round trip time. We have shown the results of transfer throughput in different size file sets and compared them. In addition, it has been confirmed that the DTN cluster with three nodes can provide about 1.8 and 2.7 times higher transfer throughput than a single node in two types of concurrency and parallelism settings.

Evaluating Village-based Resources for Conserving Nakdong-Jeongmaek (낙동정맥 보전을 위한 마을기반 자원평가)

  • Kim, Tae-Su;Hwang, Shin-Hee;Cho, Ki Hwan;Kim, Su-Jin;Jang, Gab-Sue
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.4
    • /
    • pp.47-58
    • /
    • 2020
  • This study was done to evaluate resources distributed around the Nakdong-Jeongmaek which is the eastern ridge line of the Nakdong-river basin with 437km in length. Here we found and/or searched for thousands of resources within each of 210 villages around the ridge, which were divided into six categories including landscape, natural park, protected area, history, tourism and biodiversity. An inventory was also created using an attribute table in a shape file for identifying the spatial location and property for every resource existing in each village. Each of fields for six-typed resources has 210 records representing each village and resources within it. If a resource exists in a village, '1' is assigned for its existence in its corresponding record. Otherwise, '0' is assigned for its non-existence in the record. The number of '1' on six records for a village is meaning the number of resources contained within a village, which can be a barometer to decide the properties of each village. In this study, we found five core villages containing all kind of resources in it, while 52 villages were found having only a single type of resources within it. The other villages were known to have multiple resources like having two or more ones.

A Flash Memory B+-Tree for Efficient Range Searches (효율적 범위 검색을 위한 플래시 메모리 기반 B+-트리)

  • Lim, Sung-Chae;Park, Chang-Sup
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.9
    • /
    • pp.28-38
    • /
    • 2013
  • During the past decades, the B+-tree has been most widely used as an index file structure for disk-resident databases. For the disk based B+-tree, a node update can be cheaply performed just by modifying its associated disk page in place. However, in case that the B+-tree is stored on flash memory, the traditional algorithms of the B+-tree come to be useless due to the prohibitive cost of in-place updates on flash memory. For this reason, the earlier schemes for flash memory B+-trees usually take an approach that saves B+-tree changes from real-time updates into extra temporary storage. Although that approach can easily prevent frequent in-place updates in the B+-tree, it can suffer from a waste of storage space and prolonged search times. Particularly, it is not allowable to process range searches on the leaf node level. To resolve such problems, we devise a new scheme in which the leaf nodes and their parent node are stored together in a single flash block, called the p-node block.

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.

The study of striping size according to the amount of storage nodes in the Parallel Media Stream Server (병렬 미디어 스트림 서버에서 저장노드수의 변화에 따른 스트라이핑 크기 결정에 관한 연구)

  • Kim, Seo-Gyun;Nam, Ji-Seung
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.765-774
    • /
    • 2001
  • In this paper, we proposed the striping policy for the storage nodes in the Linux-based parallel media stream server. We newly developed a storage clustering architecture, and named it as a system RAID architecture. In this system, many storage cluster nodes are grouped to operate as a single server. This system uses unique striping policy to distribute multimedia files into the parallel storage nodes. If a service request occurs, each storage cluster node transmits striped files concurrently to the clients. This scheme can provide the fair distribution of the preprocessing load in all storage cluster nodes. The feature of this system is a relative striping policy based on the file types, service types, and the number of storage nodes to provide the best service.

  • PDF

Translucent endodontic fiber posts luted with flowable light curing composite resins

  • Park, Youn-Sik;Yang, In-Seok;Kim, Tae-Geon;Yang, Hyon;Kim, Nam-Suk;Kim, Hyun-Syeob;Roh, Hyun-Ki;Park, Mi-Ra;Oh, Won-Mann;Hwang, In-Nam
    • Proceedings of the KACD Conference
    • /
    • 2003.11a
    • /
    • pp.623-623
    • /
    • 2003
  • I. Objectives The aim of this was to evaluate the use possibility of light curing flowable composite resins as a luting agent for translucent fiber posts. II. Materials and Methods 20 single-rooted maxillary central incisors were selected and crown was sectioned below the cemento-enamel junction to obtain a 13 mm ling root. Root canals were filed, cleaned, and shaped to #40 with K-file. Prepared canals were filled with gutta percha and AH26 root canal sealer by lateral condensation method. Teeth were than divided into 4 groups of 5 specimens each. In group 1 and 2, the canal space of each root was enlarged with #3 DT Light post preparation drill (Bisco, USA) to a depth of 9mm from the cervical.(omitted)

  • PDF