• Title/Summary/Keyword: computer design

Search Result 17,164, Processing Time 0.044 seconds

Design and Implementation of the Flash File System that Maintains Metadata in Non-Volatile RAM (메타데이타를 비휘발성 램에 유지하는 플래시 파일시스템의 설계 및 구현)

  • Doh, In-Hwan;Choi, Jong-Moo;Lee, Dong-Hee;Noh, Sam-H.
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.2
    • /
    • pp.94-101
    • /
    • 2008
  • Non-volatile RAM (NVRAM) is a form of next-generation memory that has both characteristics of nonvolatility and byte addressability each of which can be found in nonvolatile storage and RAM, respectively. The advent of NVRAM may possibly bring about drastic changes to the system software landscape. When NVRAM is efficiently exploited in the system software layer, we expect that the system performance can be significantly improved. In this regards, we attempt to develop a new Flash file system, named MiNVFS (Metadata in NVram File System). MiNVFS maintains all the metadata in NVRAM, while storing all file data in Flash memory. In this paper, we present quantitative experimental results that show how much performance gains can be possible by exploiting NVRAM. Compared to YAFFS, a typical Flash file system, we show that MiNVFS requires only minimal time for mounting. MiNVFS outperforms YAFFS by an average of around 400% in terms of the total execution time for the realistic workloads that we considered.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

PMS : Prefetching Strategy for Multi-level Storage System (PMS : 다단계 저장장치를 고려한 효율적인 선반입 정책)

  • Lee, Kyu-Hyung;Lee, Hyo-Jeong;Noh, Sam-Hyuk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.1
    • /
    • pp.26-32
    • /
    • 2009
  • The multi-level storage architecture has been widely adopted in servers and data centers. However, while prefetching has been shown as a crucial technique to exploit sequentiality in accesses common for such systems and hide the increasing relative cost of disk I/O, existing multi-level storage studies have focused mostly on cache replacement strategies. In this paper, we show that prefetching algorithms designed for single-level systems may have their limitations magnified when applied to multi-level systems. Overly conservative prefetching will not be able to effectively use the lower-level cache space, while overly aggressive prefetching will be compounded across levels and generate large amounts of wasted prefetch. We design and implement a hierarchy-aware lower-level prefetching strategy called PMS(Prefetching strategy for Multi-level Storage system) that applicable to any upper level prefetching algorithms. PMS does not require any application hints, a priori knowledge from the application or modification to the va interface. Instead, it monitors the upper-level access patterns as well as the lower-level cache status, and dynamically adjusts the aggressiveness of the lower-level prefetching activities. We evaluated the PMS through extensive simulation studies using a verified multi-level storage simulator, an accurate disk simulator, and access traces with different access patterns. Our results indicate that PMS dynamically controls aggressiveness of lower-level prefetching in reaction to multiple system and workload parameters, improving the overall system performance in all 32 test cases. Working with four well-known existing prefetching algorithms adopted in real systems, PMS obtains an improvement of up to 35% for the average request response time, with an average improvement of 16.56% over all cases.

A Priority Signal Control Strategy for Vulnerable Considering Traffic Flow - Focusing on crosswalks in coordinated arterial sections - (교통흐름을 고려한 교통약자 우선신호 운영방안 연구 -연동화 가로구간내 횡단보도를 대상으로-)

  • Ryu, Junil;Kim, Wonchul;Kim, Hyoungchul
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.4
    • /
    • pp.12-19
    • /
    • 2014
  • A signal plan focused on vehicle traffic could easily overlook vulnerable priority signals, although the importance of vulnerable movements is increasingly recognized in recent years. Especially, the vulnerable are sometimes faced with dangerous situations when crossing roads with a signal plan based on design values of average, non-vulnerable persons. This study is focused on how to minimize the vehicle delay while simultaneously considering traffic flow and providing traffic safety by increasing road crossing time for pedestrians. For this purpose, a priority signal control strategy for the vulnerable, considering vehicle traffic flow, has been tested. Practical implication and a microscopic computer simulation has shown that the proposed method could provide a small decrease (about 6.2%) in pedestrian delay, a small increase (about 8.5~13.3%) in travel speed of passing traffic, and a considerable decrease (16.2~26.9%) in vehicle travel time. These findings suggest that the proposed signal control strategy could increase pedestrian safety and diminish delay of vehicle travel.

Bioequivalency and Pharmacokinetics of Two Clarithromycin Tablets (Clarithromycin 정제의 생물학적 동등성 및 약물동태)

  • Kang, Won Ku;Park, Sun Young;Park, Yong Soon;Woo, Jong Su;Choi, Kyung Eob;Kwon, Kwang Il
    • Korean Journal of Clinical Pharmacy
    • /
    • v.9 no.1
    • /
    • pp.49-54
    • /
    • 1999
  • This study was carried out to compare the bioavailability of Hanmi clarithromycin (250 mg/tablet) with that of $Klaricid^{(R)}$ The bioavailability was examined on 20 volunteers who received a single dose (500 mg) of each drug in the fasting state in a randomized balanced 2-way crossover design. After dosing, blood samples were collected for a period of 12 hours. Plasma samples were analyzed for clarithromycin and roxithromycin(internal standard) by HPLC/Coulometric BCD. The pharmaco-kinetic parameters ($AUC_{0-l2hr}$, Cmax, Tmax, $AUC_{inf}$, Ka, Kel, $t_{1/2}$, Vd/F and Cl/F) were calculated from the plasma clarithromycin concentration-time data of each volunteer. The computer program 'WinNonlin' was used for compartmental analysis. One compartment model with first-order input, from order output with lag time, weighting factor $l/y^2$ was chosen as the appropriate pharmacokinetic model. The major pharmacokinetic parameters ($AUC_{0-l2hr},\;AUC_{inf}$, Cmax and Tmax) of Hanmi clarithromycin were $10.7\pm0.5\;{\mu}g{\cdot}hr{\cdot}ml^{-1},\;12.7\pm0.7\;{\mu}g{\cdot}hr{\cdot}ml^{-1},\;1.7\pm0.1\;{\mu}g/ml\;and\;2.0\pm0.2\;hr$, respectively, and those of $Klaricid^{(R)}\;were\;9.8\pm0.5\;{\mu}g{\cdot}hr{\cdot}ml^{-1},\;11.7\pm0.6\;{\mu}g{\cdot}hr{\cdot}ml^{-1},\;1.6\pm0.1\;{\mu}g/ml\;and\;2.1\pm0.1\;hr$, respectively. The differences in mean values of $AUC_{0-l2hr},\;AUC_{inf}$ and Cmax between two products were $9.88\%,\;8.94%\;and\;6.59\%$, respectively. The least significant differences at $\alpha=0.05$ for $AUC_{0-l2hr},\;AUC_{inf}$ and Cmax were $16.08\%,\;17.81\%\;and\;18.94\%$, respectively. Though the plasma clarithromycin concentrations of Hanmi clarithromycin were higher than those of $Klaricid^{(R)}$ at all observed times, the bioavailability of Hanmi clarithromycin appeared to be bioequivalent with that of $Klaricid^{(R)}$. The Ka, Kel, $t_{1/2}$, Vd/F and Cl/F of the Hanmi clarithromycin were $2.69\pm0.53\;hr^{-1},\;0.18\pm0.01 hr^{-1},\;3.9\;hr,\;248.8\pm11.4\;L\;and\;43.7\pm2.6\;L/hr$, respectively, and those of $Klaricid^{(R)} were 2.19\pm0.51\;hr^{-1},\;0.18\pm0.02\;hr^{-1},\;3.7\;hr,\;266.7\pm22.4\;L\;and\;45.3\pm2.8L/hr$, respectively. There were no statistically significant differences between two drugs in all pharmacokinetic parameters.

  • PDF

Research and development on image luminance meter of road tunnel internal and external (도로터널 내/외부의 영상휘도 측정기 연구개발)

  • Jang, Soon-Chul;Park, Sung-Lim;Ko, Seok-Yong;Lee, Mi-Ae
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2015
  • This paper introduces the development of imaging luminance meter which measures the luminances of external/internal road tunnel. The developed imaging luminance meter complies with both L20 method and Veiling luminance method of the international standards, CIE88. In this paper the L20 method is mainly presented because most of tunnels currently adapt L20 method. The developed system has an embedded computer to operate at stand-alone. The system has a ethernet port, a heater, a fan, a defroster, a wiper and sun shielder. Compensation algorithm is applied for correcting non-linear responses to the luminance and integration time. The accuracy of measurement is less than 1% when it calibrated at the public certification institute. The developed system was also tested at the real field, road tunnel. The test results were very similar with the reference luminance meter and showed that the developed system operates well at the real field. Partial sensor saturations were happened to show the less luminance, because there were the high reflecting objects in the real field. Further study should be followed for high luminance measurement.

A Study on the Measures to Activate Education Field of Maker Movement in Korea (국내 메이커 운동의 교육 분야 활성화 방안 연구)

  • Oh, Soo-Jin;Baek, Yun-Cheol;Kwon, Ji-Eun
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.483-492
    • /
    • 2019
  • The culture and education are very active with the active policy and support to form the government's Maker Movement. The purpose of this study is to grasp the current status of the education sector of the domestic maker movement, which is increasing recently, and to propose a plan for activating maker education for the development of a positive direction. To this end, first, the current status and problems of domestic maker training are derived through in-depth interviews with existing maker training operators and participants. Second, based on the contents of the interview script, keyword analysis and its characteristics through the qualitative survey analysis program (NVIVO) are identified. Third, based on the analysis results, we propose a plan and development direction for domestic maker education. Based on the educators who performed maker training and the students involved, professional maker teachers were required for the professionalism of education, and the expansion of maker channels and professional networking of participating students was required. In addition, there was a need for specialized programs and appropriate policy support that reflected the characteristics of maker training. This study aims at contributing to the activation of maker education, which is a major field of maker movement, by helping to improve concrete support methods, training related educators, and educational environment for maker education.

ROUTE/DASH-SRD based Point Cloud Content Region Division Transfer and Density Scalability Supporting Method (포인트 클라우드 콘텐츠의 밀도 스케일러빌리티를 지원하는 ROUTE/DASH-SRD 기반 영역 분할 전송 방법)

  • Kim, Doohwan;Park, Seonghwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.849-858
    • /
    • 2019
  • Recent developments in computer graphics technology and image processing technology have increased interest in point cloud technology for inputting real space and object information as three-dimensional data. In particular, point cloud technology can accurately provide spatial information, and has attracted a great deal of interest in the field of autonomous vehicles and AR (Augmented Reality)/VR (Virtual Reality). However, in order to provide users with 3D point cloud contents that require more data than conventional 2D images, various technology developments are required. In order to solve these problems, an international standardization organization, MPEG(Moving Picture Experts Group), is in the process of discussing efficient compression and transmission schemes. In this paper, we provide a region division transfer method of 3D point cloud content through extension of existing MPEG-DASH (Dynamic Adaptive Streaming over HTTP)-SRD (Spatial Relationship Description) technology, quality parameters are further defined in the signaling message so that the quality parameters can be selectively determined according to the user's request. We also design a verification platform for ROUTE (Real Time Object Delivery Over Unidirectional Transport)/DASH based heterogeneous network environment and use the results to validate the proposed technology.