• Title/Summary/Keyword: Time Weighted Algorithm

Search Result 312, Processing Time 0.024 seconds

A Load Distribution Technique of Web Clustering System based on the Real Time Status of Real Server (웹 클러스터 시스템의 실시간 서버 상태를 기반으로 한 부하분산 방안)

  • Youn, Chun-Kyun
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.427-432
    • /
    • 2005
  • I studied about existent load distribution algorithms and the WLC(Weighted Least Connection) algerian that is using much at present to distribute the connection request of users to real servers efficiently in web cluster system. The efficiency of web cluster system is fallen by load imbalance between servers, because there is problem In inaccurate load status measuring of servers and measuring timing at these load distribution algorithms. In this paper, I suggest an algorithm that distributes load base on various load state of servers by real time using broadcasting RPC(Remote Procedure Call) when a user requests connection, and implement a prototype and experiment its performance. The experiment result shows that load imbalance phenomenon between reai sowers was improved greatly than existing method, and performance of web cluster system was improved by efficiency that response time is shortened.

On the Heterogeneous Postal Delivery Model for Multicasting

  • Sekharan, Chandra N.;Banik, Shankar M.;Radhakrishnan, Sridhar
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.536-543
    • /
    • 2011
  • The heterogeneous postal delivery model assumes that each intermediate node in the multicasting tree incurs a constant switching time for each message that is sent. We have proposed a new model where we assume a more generalized switching time at intermediate nodes. In our model, a child node v of a parent u has a switching delay vector, where the ith element of the vector indicates the switching delay incurred by u for sending the message to v after sending the message to i-1 other children of u. Given a multicast tree and switching delay vectors at each non-root node 5 in the tree, we provide an O(n$^{\frac{5}{2}}$) optimal algorithm that will decide the order in which the internal (non-leaf) nodes have to send the multicast message to its children in order to minimize the maximum end-to-end delay due to multicasting. We also show an important lower bound result that optimal multicast switching delay problem is as hard as min-max matching problem on weighted bipartite graphs and hence O(n$^{\frac{5}{2}}$) running time is tight.

A Nearest Neighbor Query Processing Algorithm Supporting K-anonymity Based on Weighted Adjacency Graph in LBS (위치 기반 서비스에서 K-anonymity를 보장하는 가중치 근접성 그래프 기반 최근접 질의처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.4
    • /
    • pp.83-92
    • /
    • 2012
  • Location-based services (LBS) are increasingly popular due to the improvement of geo-positioning capabilities and wireless communication technology. However, in order to enjoy LBS services, a user requesting a query must send his/her exact location to the LBS provider. Therefore, it is a key challenge to preserve user's privacy while providing LBS. To solve this problem, the existing method employs a 2PASS cloaking framework that not only hides the actual user location but also reduces bandwidth consumption. However, 2PASS does not fully guarantee the actual user privacy because it does not take the real user distribution into account. Hence, in this paper, we propose a nearest neighbor query processing algorithm that supports K-anonymity property based on the weighted adjacency graph(WAG). Our algorithm not only preserves the location of a user by guaranteeing k-anonymity in a query region, but also improves a bandwidth usage by reducing unnecessary search for a query result. We demonstrate from experimental results that our algorithm outperforms the existing one in terms of query processing time and bandwidth usage.

Bandwidth Utilization in Latency-Optimized Fair Queuing Algorithm (최적 레이턴시 기반 공정 큐잉 알고리즘의 대역폭 이용도)

  • Kim, Tae-Joon
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.155-162
    • /
    • 2007
  • WFQ (Weighted Fair Queuing) is the most popular fair queuing algorithm, but it had the inherent drawback of a poor bandwidth utilization, particularly under the traffic requiring a low rate but tight delay bound such as internet phone, It was recently identified that the poor utilization is mainly due to non optimized latency of a flow and then LOFQ(Latency-Optimized Fair Queuing) to overcome the drawback was introduced, LOFQ was also improved through introducing an occupied resource optimization function and the implementation complexity of recursive resource transformation was reduced with revising the transformation scheme. However, the performance of LOFQ has been evaluated by means of simulation, so that there are some difficulties in evaluating the performance in the terms of the accuracy and evaluation time, In this paper, we develop how to analytically compute the bandwidth utilization in LOFQ.

Vulnerable Path Attack and its Detection

  • She, Chuyu;Wen, Wushao;Ye, Quanqi;Zheng, Kesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2149-2170
    • /
    • 2017
  • Application-layer Distributed Denial-of-Service (DDoS) attack is one of the leading security problems in the Internet. In recent years, the attack strategies of application-layer DDoS have rapidly developed. This paper introduces a new attack strategy named Path Vulnerabilities-Based (PVB) attack. In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. The attacker uses a Top M Longest Path algorithm to find M DDoS vulnerable paths that consume considerable resources when sequentially accessing the pages following any of those paths. A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks. Numerical results based on real-traffic simulations reveal the efficiency of the attack strategy and the detection mechanism.

System model reduction by weighted component cost analysis

  • Kim, Jae-Hoon;Skelton, Robert-E.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10b
    • /
    • pp.524-529
    • /
    • 1993
  • Component Cost Analysis considers any given system driven by a white noise process as an interconnection of different components, and assigns a metric called "component cost" to each component. These component costs measure the contribution of each component to a predefined quadratic cost function. One possible use of component costs is for model reduction by deleting those components that have the smallest component cost. The theory of Component Cost Analysis is extended to include finite-bandwidth colored noises. The results also apply when actuators have dynamics of their own. When the dynamics of this input are added to the plant, which is to be reduced by CCA, the algorithm for model reduction process will be called Weighted Component Cost Analysis (WCCA). Closed-form analytical expressions of component costs for continuous time case, are also derived for a mechanical system described by its modal data. This is very useful to compute the modal costs of very high order systems beyond Lyapunov solvable dimension. A numerical example for NASA's MINIMAST system is presented.presented.

  • PDF

Minimizing the Average Distance of Separated Points on the Plane in the L1-Distance

  • Kim, Jae-Hoon
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.1
    • /
    • pp.1-4
    • /
    • 2012
  • Given separated points divided by a line, called a wall, in a plane, we aim to make a gate in the wall to connect the separated points to each other. In this setting, the problem is to find a location for the gate that minimizes the average distance between the points. The problem is a variant of the well-known facility location problem, which is extensively studied in the fields of operations research, location theory, theoretical computer science, and so on. In this paper, we consider the $L^1$-distance of the points in the plane. The points are projected onto the wall and so the problem is transformed to a proximity problem of points on a line. Then it is shown that the transformed problem is related to the weighted median problem of points on the line. Therefore, we obtain an O(n log n)-time algorithm to solve our problem.

Traffic Shaper in consideration of UPC/NPC in ATM Networks (ATM망에서 UPC/NPC를 고려한 트래픽 정형화기)

  • 조태경;최병욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.12B
    • /
    • pp.2003-2015
    • /
    • 2000
  • 본 논문에서는 ATM 망을 구성하고 있는 노드(node) 간의 셀(cell) 전송시에 출력 링크(output link)로 전송된 셀이 수신 노드에서 수행하는 UPC/NPC에 의해 손실되지 않는 트래픽 정형화기(shaper)를 제안한다. 제안한 정형화기는 비실시간 가변비트율(nrt-VBR) 트래픽을 대상으로 한 것으로 각 ATM 연결(connection)에 대해 독립된 큐(queue)를 할당하였으며, 출력 링크로 전송할 셀을 저장하고 있는 큐를 선정하기 위해 모든 큐에 대해 Generic Cell Rate Algorithm(GCRA)를 수행하여 큐의 상태를 결정하고, 그 결과 전송 가능 상태에 있는 모든 큐들을 대상으로 본 논문에서 제안한 시간의존 확률적 스케줄링(time-dependent probability scheduling) 알고리즘을 적용하여 특정 큐를 선택하여 셀을 전송한다. 제안한 정형화기의 성능평가를 위해 WRR(Weighted Round Robin) 스케줄링 알고리즘을 사용한 정형화기 및 WFQ(Weighted Fair Queueing) 스케줄링 알고리즘을 적용한 정형화기에 대한 모의실험을 하였으며, 그 결과 제안한 정형화기는 비실시간 가변비트율(nrt-VBR) 트래픽의 정형화(shaping)에 우수한 성능을 나타냄을 확인하였다.

  • PDF

Scheduling for Parallel Machines with Family Setup Times (패밀리 셋업이 존재하는 병렬기계 일정계획 수립)

  • Kwon Ick-Hyun;Shin Hyun-Joon;Eom Dong-Hwan;Kim Sung-Shick
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.30 no.1
    • /
    • pp.27-41
    • /
    • 2005
  • This paper considers identical parallel machine scheduling problem. Each job has a processing time. due date. weight and family type. If a different type of job is followed by prior job. a family setup is incurred. A two phased heuristic is presented for minimizing the sum of weighted tardiness. In the first phase. using roiling horizon technique. group each job into same family and schedule each family. In the second phase. assign each job to machines using schedule obtained in the first phase. Extensive computational experiments and comparisons among other algorithms are carried out to show the efficiency of the proposed algorithm.

A Novel Weighting Factor Method in NLOS Environment

  • Guan, Xufeng;Hur, SooJun;Choi, JeongHee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.2
    • /
    • pp.108-116
    • /
    • 2011
  • Non-line-of-sight (NLOS) error is the most common and also a major source of errors in wireless location system. A novel weighting factor (NWF) method is presented in this paper, based on the RSS(Received Signal Strength) measurements, path loss model and Circular Disk of Scatterers Model (CDSM). The proposed positioning method effectively weighted the TOA distance measurements for each Base Station (BS). Simulation results show that the proposed method efficiently weighted the distance measurements and achieve higher localization accuracy than that of Linear Line of Position (LLOP) and Believable Factor Algorithm (BFA).