• Title/Summary/Keyword: VM

Search Result 599, Processing Time 0.025 seconds

Design and Implementation of SK-VM based Avatar E-mail Service System (SK-VM 기반의 Avatar E-mail 서비스 시스템 설계 및 구현)

  • Lee Kyung-Jin;Song Wang-Cheol;Lee Jung-Yun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.212-218
    • /
    • 2005
  • These days, mobile technology is developing very fast. It has increased the usage of the Internet by mobile phones. Nowadays the avatar and game contents services are most popular in mobile phones using the Internet. In this paper, we propose a Client/Server system to combine the animation avatar and e-mail services on SK-VM which are different from simple avatar services. The server which consists of DB (database) module and mail management module is designed in order to manage the information about avatar and the user. The client is designed so as to show the email contents and avatar animation on the mobile phone. This model is intended to reduce the performance overhead on the client as much as possible. We expect that this module would be useful in the mobile phones with limited resources, although the technology is being developed very rapidly.

  • PDF

Vulnerability Defense of On-Zeroboard using CSRF Attack (CSRF 공격기법에 대한 제로보드상의 취약점 방어)

  • Kim, Do-Won;Bae, Su-Yeon;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.57-61
    • /
    • 2014
  • Zeroboard is a public bulletin board that can support PHP and MySQL. It has been used by many people because it is easy to use, but there is no more updates after Zeroboard4. So, there is a problem that its administrator will have nothing to do about it if zeroboard has a vulnerability. In this paper, we will discuss about CSRF(Cross Site request Forgery) which is developed and expanded by XSS(Cross Site Scripting). Also, we will find CSRF attacks and suggest an alternative method using VM-ware. The main features and contributions of the proposed method are as follows. First, make an environment construction using VM-ware and other tools. Second, analyze and prepare vulnerabilities using Proxy server. Performance evaluation will be conducted by applying possible countermeasure.

Optimal Bidding Strategy for VM Spot Instances for Cloud Computing (클라우드 컴퓨팅을 위한 VM 스팟 인스턴스 입찰 최적화 전략)

  • Choi, Yeongho;Lim, Yujin;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.9
    • /
    • pp.1802-1807
    • /
    • 2015
  • The cloud computing service provides physical IT resources to VM instances to users using virtual technique and the users pay cost of VM instances to service provider. The auction model based on cloud computing provides available resources of service provider to users through auction mechanism. The users bid spot instances to process their a job until its deadline time. If the bidding price of users is higher than the spot price, the user will be provided the spot instances by service provider. In this paper, we propose a new bidding strategy to minimize the total cost for job completion. Typically, the users propose bidding price as high as possible to get the spot instances and the spot price get high. we lower the spot price using proposed strategy and minimize the total cost for job completion. To evaluate the performance of our strategy, we compare the spot price and the total cost for job completion with real workload data.

An Efficient VM-Level Scaling Scheme in an IaaS Cloud Computing System: A Queueing Theory Approach

  • Lee, Doo Ho
    • International Journal of Contents
    • /
    • v.13 no.2
    • /
    • pp.29-34
    • /
    • 2017
  • Cloud computing is becoming an effective and efficient way of computing resources and computing service integration. Through centralized management of resources and services, cloud computing delivers hosted services over the internet, such that access to shared hardware, software, applications, information, and all resources is elastically provided to the consumer on-demand. The main enabling technology for cloud computing is virtualization. Virtualization software creates a temporarily simulated or extended version of computing and network resources. The objectives of virtualization are as follows: first, to fully utilize the shared resources by applying partitioning and time-sharing; second, to centralize resource management; third, to enhance cloud data center agility and provide the required scalability and elasticity for on-demand capabilities; fourth, to improve testing and running software diagnostics on different operating platforms; and fifth, to improve the portability of applications and workload migration capabilities. One of the key features of cloud computing is elasticity. It enables users to create and remove virtual computing resources dynamically according to the changing demand, but it is not easy to make a decision regarding the right amount of resources. Indeed, proper provisioning of the resources to applications is an important issue in IaaS cloud computing. Most web applications encounter large and fluctuating task requests. In predictable situations, the resources can be provisioned in advance through capacity planning techniques. But in case of unplanned and spike requests, it would be desirable to automatically scale the resources, called auto-scaling, which adjusts the resources allocated to applications based on its need at any given time. This would free the user from the burden of deciding how many resources are necessary each time. In this work, we propose an analytical and efficient VM-level scaling scheme by modeling each VM in a data center as an M/M/1 processor sharing queue. Our proposed VM-level scaling scheme is validated via a numerical experiment.

Comparative Study of Vertical Axillary Muscle Sparing and Posterolateral Thoracotomy (수직액와 근육보존 개흉술과 후측방개흉술의 비교연구)

  • Seong, Suk-Hwan;Won, Tae-Hui
    • Journal of Chest Surgery
    • /
    • v.27 no.12
    • /
    • pp.1008-1014
    • /
    • 1994
  • Increased interest in alternative approach to thoractomy has developed because of the considerable morbidity associated with the standard posterolateral thoracotomy[ST]. Muscle sparing thoracotomy is appeared as excellent alternative because of less postoperative pain and morbidity than standard posterolateral one. Vertical axillary muscle sparing thoracotomy[VM] is the newly revised modified muscle sparing thoracotomy that overcomes the disadvantages of previous lateral muscle sparing thoracotomy such as seroma, cosmetic problems, and need of subcutaneous drains. We conducted a prospective study of 45 consecutive patients to compare postoperative pain, muscle strength of serratus anterior and latissimus dorsi, and range of motion of the shoulder girdle between ST and VM group. There were no difference in preoperative status, surgical procedure, morbidity, mortality and hospital stay between two groups. But there were significant less postoperative narcotics requirements, more preserved latissimus dorsi and serratus anterior muscle strength, nd larger range of motion of shoulder girdle [ especially flexion and internal rotation in VM group. The opening time was prolonged[p<0.01] but closing time was less in VM group [p<0.01]. The sum of opening and closing time was not different in two group. The length of incision line was shorter in VM group. The vertical skin incision was concealed by the upper arm.In conclusion vertical axillary muscle sparing thoracotomy is good alternative for various intrathoracic procedures with less postoperative pain, well preserved muscle strength,increased range of motion of the shoulder girdle and impressive cosmetic outcome.

  • PDF

Pilot Study on Recruiting Medical Checkup Participant by Mail Survey among Korean Vietnam Veterans (베트남 참전군인에서 우편으로 검진대상자를 모집하기 위한 예비조사)

  • Yi, Sang-Wook;Hong, Jae-Seok;Ohrr, Hee-Choul
    • Journal of Preventive Medicine and Public Health
    • /
    • v.36 no.2
    • /
    • pp.171-178
    • /
    • 2003
  • Objective : The aim of this study was to identify the validity of recruiting medical checkup participants of Vietnam veterans using a mail survey, and to identify the 'Vietnam service related characteristics' and 'general characteristics' of Vietnam veterans groups, Method : In this study, a total 900 veterans were randomly selected from the list of Vietnam veterans from f964 to 1973. The veterans were classified into 5 groups, taking into consideration their registered status in the Ministry of Patriots and Veterans Affairs: the VRD (veterans who have agent orange-related diseases), VSD (veterans who have agent orange-suspected disease), VM (veterans who peformed meritorious deeds during the war), VR (veterans who were registered with the Ministry of Patriots and Veterans Affair) and OV (other veterans) groups. By means of postal surveys, the veterans' intention to participate in the medical checkup for our research, and their socioeconomic and general characteristics were investigated. 52 surveys were returned due to the subjects not residing at the listed address, and were excluded from the analysis. Result : 699 of the 848 veterans (82.4%) responded to the survey, of which 619 (88.6%) intended to participate in the medical checkup for our research. The S veterans groups all had similar ages, Vietnam service period, Agent Orange exposure, troop characteristic and wartime class, with the exception of VM, who were older, and with a greater number of officers than the other 4 groups, There was a big difference in the health statius among the Vietnam veterans group. The VM and OV were much healthier than VRD, VSD and VR groups, The socioeconomic stati of the VRD, VSD and VR groups were lower than those of the VM and OV groups. Conclusion : Although there were some limitations, the recruitment, by mail, of medical checkup participants from Vietnam veterans is a valid and feasible method. The VM and OV groups were much healthier, and with higher socioeconomic stati, than the VRD, VSD, and VR groups.

Treatment with Phytoestrogens Reversed Triclosan and Bisphenol A-Induced Anti-Apoptosis in Breast Cancer Cells

  • Lee, Geum-A;Choi, Kyung-Chul;Hwang, Kyung-A
    • Biomolecules & Therapeutics
    • /
    • v.26 no.5
    • /
    • pp.503-511
    • /
    • 2018
  • Triclosan (TCS) and bisphenol A (BPA) are endocrine-disrupting chemicals that interfere with the hormone or endocrine system and may cause cancer. Kaempferol (Kaem) and 3,3'-diindolylmethane (DIM) are phytoestrogens that play chemopreventive roles in the inhibition of carcinogenesis and cancer progression. In this study, the influence of TCS, BPA, Kaem, and DIM on proliferation and apoptotic abilities of VM7Luc4E2 breast cancer cells were examined. MTT assay revealed that TCS ($0.1-10{\mu}M$), BPA ($0.1-10{\mu}M$) and E2 ($0.01-0.0001{\mu}M$) induced significant cell proliferation of VM7Luc4E2 cells, which was restored to the control (0.1% DMSO) by co-treatment with Kaem ($30{\mu}M$) or DIM ($15{\mu}M$). Reactive oxygen species (ROS) production assays showed that TCS and BPA inhibited ROS production of VM7Luc4E2 cells similar to E2, but that co-treatment with Kaem or DIM on VM7Luc4E2 cells induced increased ROS production. Based on these results, the effects of TCS, BPA, Kaem, and DIM on protein expression of apoptosis and ROS production-related markers such as Bax and Bcl-xl, as well as endoplasmic reticulum (ER) stress-related markers such as $eIF2{\alpha}$ and CHOP were investigated by Western blot assay. The results revealed that TCS, and BPA induced anti-apoptosis by reducing ROS production and ER stress. However, Kaem and DIM effectively inhibited TCS and BPA-induced anti-apoptotic processes in VM7Luc4E2 cells. Overall, TCS and BPA were revealed to be distinct xenoestrogens that enhanced proliferation and anti-apoptosis, while Kaem and DIM were identified as natural chemopreventive compounds that effectively inhibited breast cancer cell proliferation and increased anti-apoptosis induced by TCS and BPA.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

A Dynamic Task Distribution approach using Clustering of Data Centers and Virtual Machine Migration in Mobile Cloud Computing (모바일 클라우드 컴퓨팅에서 데이터센터 클러스터링과 가상기계 이주를 이용한 동적 태스크 분배방법)

  • Mateo, John Cristopher A.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.103-111
    • /
    • 2016
  • Offloading tasks from mobile devices to available cloud servers were improved since the introduction of the cloudlet. With the implementation of dynamic offloading algorithms, mobile devices can choose the appropriate server for the set of tasks. However, current task distribution approaches do not consider the number of VM, which can be a critical factor in the decision making. This paper proposes a dynamic task distribution on clustered data centers. A proportional VM migration approach is also proposed, where it migrates virtual machines to the cloud servers proportionally according to their allocated CPU, in order to prevent overloading of resources in servers. Moreover, we included the resource capacity of each data center in terms of the maximum CPU in order to improve the migration approach in cloud servers. Simulation results show that the proposed mechanism for task distribution greatly improves the overall performance of the system.

A Study on Applicability Evaluation of digital Photogrammetry for Settlement Measurement of Soil Contaminated with Heavy Metals (중금속으로 오염된 지반의 침하계측을 위한 수치사진측량의 적용성 평가)

  • Han, Jung-Geun;Park, Jeong-Jun;You, Seung-Kyong;Yun, Jung-Mann;Hong, Gigwon
    • Journal of the Korean Geosynthetics Society
    • /
    • v.19 no.4
    • /
    • pp.85-93
    • /
    • 2020
  • This study describes the results of laboratory model test on settlement of soil contaminated with heavy metals, in order to evaluate the applicability of VMS to the measurement of gound settlements generated during the purification of contaminated soil. The measurement results for settlement of contaminated soil were compared using a 3D-Visual Monitoring System (VMS) based on digital photogrammetry and a total station. The test result showed that the settlement of the soil contaminated with heavy metals occurred a lot in the experimental condition in which the hydrophilic filter was applied. The minimum and maximum error ranges of VMS were calculated as ±0.36mm and ±0.87mm, respectively, and the error of VMS was satisfied in all experimental conditions. The average error rate of VMS was lower in the hydrophilic filter condition than in the hydrophobic filter condition. Therefore, it was evaluated that VMS can be applied to measure the settlement of contaminated soil.