• Title/Summary/Keyword: SmallFile

Search Result 235, Processing Time 0.026 seconds

Building a Log Framework for Personalization Based on a Java Open Source (JAVA 오픈소스 기반의 개인화를 지원하는 Log Framework 구축)

  • Sin, Choongsub;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.8
    • /
    • pp.524-530
    • /
    • 2015
  • A log is for text monitoring and perceiving the issues of a system during the development and operation of a program. Based on the log, system developers and operators can trace the cause of an issue. In the development phase, it is relatively simple for a log to be traced while there are only a small number of personnel uses of a system such as developers and testers. However, it is the difficult to trace a log when many people can use the system in the operation phase. In major cases, because a log cannot be tracked, even tracing is dropped. This study proposed a simplified tracing of a log during the system operation. Thus, the purpose is to create a log on the run time based on an ID/IP, using features provided by the Logback. It saves an ID/IP of the tracking user on a DB, and loads the user's ID/IP onto the memory to trace once WAS starts running. Before the online service operates, an Interceptor is executed to decide whether to load a log file, and then it generates the service requested by a certain user in a separate log file. The load is insignificant since the arithmetic operation occurs in a JVM, although every service must pass through the Interceptor to be executed.

Research on the Application Methods of Big Data within SME Financing: Big data from Trading-area (소상공인의 자금공급 확대를 위한 빅데이터 활용 방안연구)

  • Lee, Ju Hee;Dong, Hak Lim
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.3
    • /
    • pp.125-140
    • /
    • 2018
  • According to statistics, it is shown that domestic SMEs rely on bank loans for the majority of fund procurement. From financial information shortage (Thin file) that does not provide information necessary for credit evaluation from banks such as financial statements. In order to overcome these problems, recently, in alternative finance such as P2P, using differentiated information such as demographics, trading information and the like utilizing Fintech instead of existing financial information, small funds A new credit evaluation method has been expanding to provide SMEs with small amounts of money. In this paradigm of environmental change, in this research, credit evaluation which can expand fund supply to SMEs by utilizing big data based on trade area information such as sales fluctuation, location conditions etc. In this research, we try to find such a solution. By analyzing empirically the big data generated in the trade area, we verify the effectiveness as a credit evaluation factor and try to derive the main parameters necessary for the business performance evaluation of the founder of SMEs. In this research, for 17,116 material businesses in Seoul City that operate the service industry from 2009 to February 2018, we collect trade area information generated for each business location from Big Data specialized company NICE Zini Data Co., Ltd.. We collected and analyzed the data on the locations and commercial areas of the facilities that were difficult to obtain from SMEs and analyzed the data that affected the Corporate financial Distress. It is possible to refer to the variable of the existing unused big data and to confirm the possibility of utilizing it for efficient financial support for SMEs, This is to ensure that commercial lenders, even in general commercial banks, are made to be more prominent in one sector of the financing of SMEs. In this research, it is not the traditional financial information about raising fund of SMEs who have basically the problem of information asymmetry, but a trade area analysis variable is derived, and this variable is evaluated by credit evaluation There is differentiation of research in that it verified through analysis of big data from Trading-area whether or not there is an effect on.

Increase of Tc-99m RBC SPECT Sensitivity for Small Liver Hemangioma using Ordered Subset Expectation Maximization Technique (Tc-99m RBC SPECT에서 Ordered Subset Expectation Maximization 기법을 이용한 작은 간 혈관종 진단 예민도의 향상)

  • Jeon, Tae-Joo;Bong, Jung-Kyun;Kim, Hee-Joung;Kim, Myung-Jin;Lee, Jong-Doo
    • The Korean Journal of Nuclear Medicine
    • /
    • v.36 no.6
    • /
    • pp.344-356
    • /
    • 2002
  • Purpose: RBC blood pool SPECT has been used to diagnose focal liver lesion such as hemangioma owing to its high specificity. However, low spatial resolution is a major limitation of this modality. Recently, ordered subset expectation maximization (OSEM) has been introduced to obtain tomographic images for clinical application. We compared this new modified iterative reconstruction method, OSEM with conventional filtered back projection (FBP) in imaging of liver hemangioma. Materials and Methods: Sixty four projection data were acquired using dual head gamma camera in 28 lesions of 24 patients with cavernous hemangioma of liver and these raw data were transferred to LINUX based personal computer. After the replacement of header file as interfile, OSEM was performed under various conditions of subsets (1,2,4,8,16, and 32) and iteration numbers (1,2,4,8, and 16) to obtain the best setting for liver imaging. The best condition for imaging in our investigation was considered to be 4 iterations and 16 subsets. After then, all the images were processed by both FBP and OSEM. Three experts reviewed these images without any information. Results: According to blind review of 28 lesions, OSEM images revealed at least same or better image quality than those of FBP in nearly all cases. Although there showed no significant difference in detection of large lesions more than 3 cm, 5 lesions with 1.5 to 3 cm in diameter were detected by OSEM only. However, both techniques failed to depict 4 cases of small lesions less than 1.5 cm. Conclusion: OSEM revealed better contrast and define in depiction of liver hemangioma as well as higher sensitivity in detection of small lesions. Furthermore this reconstruction method dose not require high performance computer system or long reconstruction time, therefore OSEM is supposed to be good method that can be applied to RBC blood pool SPECT for the diagnosis of liver hemangioma.

Usability Testing of Open Source Software for Digital Archiving (디지털 아카이브 구축을 위한 공개 소프트웨어 사용성 평가)

  • Jeon, Kyungsun;Chang, Yunkeum
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.3
    • /
    • pp.247-271
    • /
    • 2018
  • This research aims to explore the possibility of open source software for creating digital archives of small organizations or ordinary people that run short of budget and professional workforce and may easily create digital archives without the help of a professional. To do so, this study suggested three open source software, AtoM, ArchivesSpace, and Omeka, for such use, and conducted usability tests with system designers and users who had no experience with open source software. The results of the usability testing was that AtoM, which was developed to support the records management system and user services of small organizations, proved satisfactory to both system designers and users. ArchivesSpace had too many required fields with it to create archives. Omeka greatly satisfied the system designers because it is possible to create archives with simple inputs on the item level. However, Omeka, which focuses on exhibition functions while neglecting search functions, registered low satisfaction among the users. Based on the results of the usability testing, this study suggested selection criteria of open source software for small organizations or ordinary individuals, namely, purposes, license, characteristics, service creation environment, advantages and disadvantages, functions, metadata, file type, and interoperability.

Gemcitabine Plus Paclitaxel as Second-line Chemotherapy in Patients with Advanced Non-Small Cell Lung Cancer

  • Baykara, Meltem;Coskun, Ugur;Berk, Veli;Ozkan, Metin;Kaplan, Muhammet Ali;Benekli, Mustafa;Karaca, Halit;Inanc, Mevlude;Isikdogan, Abdurrahman;Sevinc, Alper;Elkiran, Emin Tamer;Demirci, Umut;Buyukberber, Suleyman
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.10
    • /
    • pp.5119-5124
    • /
    • 2012
  • Purpose: The aim of this retrospective study was to determine response rates, progression-free survival (PFS), overall survival (OS) and toxicity of gemcitabine and paclitaxel combinations with advanced or metastatic non-small cell lung cancer patients (NSCLC) who have progressive disease after platinum-based first-line chemotherapy. Methods: We retrospectively evaluated the file records of patients treated with gemcitabine plus paclitaxel in advanced or metastatic NSCLC cases in a second-line setting. The chemotherapy schedule was as follows: gemcitabine $1500mg/m^2$ and paclitaxel 150 mg/m2 administered every two weeks. Results: Forty-eight patients (45 male, 3 female) were evaluated; stage IIIB/IV 6/42; PS0, 8.3%, PS1, 72.9%, PS2, 18.8%; median age, 56 years old (range 38-76). Six (12.5%) patients showed a partial response (PR), 13 (27.1%) stable disease (SD), and 27 (56.3%) progressive disease (PD). The median OS was 6.63 months (95% CI 4.0-9.2); the median PFS was 2.7 months (95% CI 1.8-3.6). Grade 3 and 4 hematologic toxicities, including neutropenia (n=4, 8.4%), and anemia (n=3, 6.3%) were encountered, but no grade 3 or 4 thrombocytopenia. One patient developed febrile neutropenia. There were no interruption for reasons of toxicity and no exitus related to therapy. Conclusion: The combination of two-weekly gemcitabine plus paclitaxel was an effective and well-tolerated second-line chemotherapy regimen for advanced or metastatic NSCLC patients previously treated with platinum-containing chemotherapy. Although the most common and dose limiting toxicities were neutropenia and neuropathy, this regimen was tolerated well by the patients.

Implementation and Performance Evaluation of Platform Independent Performance Enhanced Software Streaming Technology (플랫폼 독립적 성능 개선 소프트웨어 스트리밍 기술 구현 및 성능평가)

  • O, Chang-Hun;Jeon, Yong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.490-501
    • /
    • 2011
  • Software streaming technology is a service method which can support several application software via streaming in networks. In this paper, we propose a platform independent PESS(performance Enhanced Software Streaming) technology. We design and implement the technology based on Java language. The main features in the implemented system are both platforms to be used in multiple operating systems in addition to Windows system and enhanced performance. In the implemented streaming method, application software is placed on the server and only necessary packs are transmitted in an instant. By virtual file system and clients' virtual registry, if necessary, the users' request is processed by transmitting a very small pack unit. Therefore, server load can be reduced and the streaming speed can also be improved. We present the implementation results and evaluate several performance characteristics of the proposed system.

A New Mobile Content Adaptation Based on Content Provider-Specified Web Clipping (컨텐츠 제공자 지정 웹 클리핑 방식의 이동 인터넷 컨텐츠 변환)

  • Yang, Seo-Min;Lee, Hyuk-Joon
    • The KIPS Transactions:PartB
    • /
    • v.11B no.1
    • /
    • pp.35-44
    • /
    • 2004
  • Web contents created for desktop screens give rise to problems when they are to be displayed on the small screens of mobile terminals. While in some cases some of the objects of a page may not be displayable due to the lack of browser capability, the entire page may not be displayable due to the incompatibility with the browser in other cases. In this paper, we introduce a new mobile content adaptation approach based on web clipping, which transforms an original page into one that is optimally displayed on a mobile terminal. In this method, a source page is automatically clipped and transformed according to the clip specification made by the content provider using a clip editing tool. The clip editing tool allows the user to specify group clips, multi-level cups and dynamic clips as well as simple clips, and the presentation layout through a graphic user interface. Based on the clip specifications, each clip is transformed into an intermediate meta-language document, which in turn is transformed into a presentation page in the target markup language. Transcoding of image objects in major image file formats is also supported.

SPECIFIC ANALYSIS OF WEB CAMERA AND HIGH RESOLUTION PLANETARY IMAGING (웹 카메라의 특성 분석 및 고해상도 행성촬영)

  • Park, Young-Sik;Lee, Dong-Ju;Jin, Ho;Han, Won-Yong;Park, Jang-Hyun
    • Journal of Astronomy and Space Sciences
    • /
    • v.23 no.4
    • /
    • pp.453-464
    • /
    • 2006
  • Web camera is usually used for video communication between PC, it has small sensing area, cannot using long exposure application, so that is insufficient for astronomical application. But web camera is suitable for bright planet, moon, it doesn't need long exposure time. So many amateur astronomer using web camera for planetary imaging. We used ToUcam manufactured by Phillips for planetary imaging and Registax commercial program for a video file combining. And then, we are measure a property of web camera, such as linearity, gain that is usually using for analysis of CCD performance. Because of using combine technic selected high quality image from video frame, this method on take higher resolution planetary imaging than one shot image by film, digital camera and CCD. We describe a planetary observing method and a video frame combine method.

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.

Performance of TCP without congestion control (혼잡제어를 하지 않는 TCP의 성능)

  • Oh, Hong-Kyun;Kim, Eun-Gi
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.229-234
    • /
    • 2004
  • In this study, the performance is compared between RFC compatible normal TCP and several speed constraints Ignored TCP. To do these, the main algorithms that constraints the transmit rate of TCP are modified. We have modified TCP protocol stack in a Linux kernel to compare the speeds between the standard TCP and our modified TCP. We find that if the destination is short distance away from the source and packet error is scarce then the speed differences between normal and modified TCP nay be negligible. However, if the destination is far away from the source and slow start algorithm is not adopted then the transfer time for small file is different greatly In addition, if packet error occurred frequently, our modified TCP is faster than the standard TCP regardless of distance.