• Title/Summary/Keyword: data duplication

Search Result 204, Processing Time 0.026 seconds

Duplication-Aware Garbage Collection for Flash Memory-Based Virtual Memory Systems (플래시 메모리 기반의 가상 메모리 시스템을 위한 중복성을 고려한 GC 기법)

  • Ji, Seung-Gu;Shin, Dong-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.3
    • /
    • pp.161-171
    • /
    • 2010
  • As embedded systems adopt monolithic kernels, NAND flash memory is used for swap space of virtual memory systems. While flash memory has the advantages of low-power consumption, shock-resistance and non-volatility, it requires garbage collections due to its erase-before-write characteristic. The efficiency of garbage collection scheme largely affects the performance of flash memory. This paper proposes a novel garbage collection technique which exploits data redundancy between the main memory and flash memory in flash memory-based virtual memory systems. The proposed scheme takes the locality of data into consideration to minimize the garbage collection overhead. Experimental results demonstrate that the proposed garbage collection scheme improves performance by 37% on average compared to previous schemes.

Effect of ASLR on Memory Duplicate Ratio in Cache-based Virtual Machine Live Migration

  • Piao, Guangyong;Oh, Youngsup;Sung, Baegjae;Park, Chanik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.4
    • /
    • pp.205-210
    • /
    • 2014
  • Cache based live migration method utilizes a cache, which is accessible to both side (remote and local), to reduce the virtual machine migration time, by transferring only irredundant data. However, address space layout randomization (ASLR) is proved to reduce the memory duplicate ratio between targeted migration memory and the migration cache. In this pager, we analyzed the behavior of ASLR to find out how it changes the physical memory contents of virtual machines. We found that among six virtual memory regions, only the modification to stack influences the page-level memory duplicate ratio. Experiments showed that: (1) the ASLR does not shift the heap region in sub-page level; (2) the stack reduces the duplicate page size among VMs which performed input replay around 40MB, when ASLR was enabled; (3) the size of memory pages, which can be reconstructed from the fresh booted up state, also reduces by about 60MB by ASLR. With those observations, when applying cache-based migration method, we can omit the stack region. While for other five regions, even a coarse page-level redundancy data detecting method can figure out most of the duplicate memory contents.

A Study on the Configuration and Placement of Bupyeong-office town in Ulsan county During Chosun Dynasty (조선시대 울산군 부평역촌의 구성과 배치에 관한 연구)

  • Hwang, Dae-Il
    • Journal of architectural history
    • /
    • v.23 no.1
    • /
    • pp.21-31
    • /
    • 2014
  • The paper analyzed the excavational data from Bupyeong-office in Ulsan county in Chosun Dynasty, examined the composition of the community estimated at station community, and studied the duration of the community by using the excavated relics. In addition, the paper compared the excavational data with documentary records, studied the location Bupyeong-office, and investigated the size of station community overall. Community compositions such as buildings, residential place, pits, stoves, hemp kilns, cremation tombs, and farming appliances were identified. When compared to excavated relics such as tiles, white porcelain jars, agrayish-blue-powdered celadons, and celadon porcelains from building, residance, and pits, the community existed during 14C~17C. The station location was on the west side to the quarters for Byongmajuldosa of the Left Gyeongsangdo at King's location according to the old maps and documentary records. It is widely expected that No, 201 foundation stone buildings at Pyungsan relic I was related to the station because there was a distinctions on the stone pillar waterway and high quality of location in the size(the front 9 sections ${\times}$ the side 1 section) and the community. According to the building's functions and duplication relations in the community, it is regarded that there were 33~40 ground buildings, 40~45 pitting buildings, storages or 15~30 other purpose buildings, and 5~7 public buildings around No, 210 building in Bupyeong-office town.

A Study on Common Interface providing among Heterogeneous Terminal in Ubiquitous (유비쿼터스 환경에서 이기종 단말기 간의 공통 인터페이스 제공에 관한 연구)

  • Park, Jung-Yeon
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.391-394
    • /
    • 2006
  • This paper deals with the method will be able to support a common interface softly for the different with each other operating system users in next generation ubiquitous network. To controls in proxy servers that data portion be able to use commonly such as each different instruction, metaphor, image based on operating system, icons, it will be able to increases the efficiency of bandwidth use and minimizes a duplication transmission data from inside the bandwidth which is limited. Also it will be able to do method of common user interface provision to support seamless connectivity with each different network devices in the next generation.

  • PDF

An Ontology-based Collaboration System for Service Interoperability (온톨로지 기반의 서비스 상호운용을 위한 협업 시스템)

  • Hwang, Chi-Gon;Moon, Seok-Jae;Jung, Kye-Dong;Choi, Young-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.210-217
    • /
    • 2013
  • The development of collaboration among information systems in accordance with changes in enterprises' business environment brings about the problems of duplication of the existing business services and increase in costs of maintenance. Accordingly, Web service has been suggested as the standard of distributed computing to prevent the duplication of services within the same business domain and to attain the services that are already being utilized. But since the data needed for Web services are not standardized, it is difficult for the users to find services that meet diverse business purposes. In this paper, we construct an ontology-based collaboration system for service interoperability. The ontology can support fusion service by finding services which are existed interdependently under the distributed environment for collaboration processing. The role of the collaborative system includes development, registration and call of services based on ontology. A local systems request collaboration support through the service profile. Collaborative system supports the development of service using the service profiles, represents the semantic association between real data through system ontology, and infers relationship between instances contained in the services. Based on this, we applied the travel booking services for collaboration system. As a result, service can be managed effectively preventing collision in collaborative system, and we verify that the mapping between system is reduced.

An Analysis of Factors Affecting Financial and Operating Efficiency at Regional Public Hospital (지방의료원의 재정 및 운영효율성에 영향을 미치는 요인)

  • Jin Won Noh;Hui Won Jeon;Jung Hoe Kim;Jeong Ha Kim;Hyo Jung Bang;Hae Jong Lee
    • Health Policy and Management
    • /
    • v.33 no.3
    • /
    • pp.355-362
    • /
    • 2023
  • Background: Financial efficiency in monetary units and operational efficiency in non-monetary units are separately classified and evaluated. This is done to prevent the duplication of monetary units and non-monetary units in inputs and outputs. In addition, analyses are conducted to determine the factors that affect each aspect of efficiency. To prevent duplication of monetary and non-monetary units in inputs and outputs, financial efficiency, consisting of monetary units, and operational efficiency, comprising non-monetary units, are separately classified and evaluated. Furthermore, an analysis is conducted to identify the factors that affect each aspect of efficiency. Methods: This study conducted a panel analysis of 34 regional public hospitals and influencing factors on efficiency for 5 years from 2015 to 2019. Financial efficiency and operational efficiency were calculated through data envelopment analysis. Moreover, multiple regression analysis was conducted to identify the factors that influence both financial efficiency and operational efficiency. Results: The factors that affect financial efficiency include the number of medical institutions within the treatment area and the ratio of patients receiving medical care. Additionally, operational efficiency is influenced by the type of medical institution, the number of medical institutions within the treatment area, and the number of nursing positions per 100 beds. Conclusion: In order for regional public hospitals to faithfully fulfill their functions and roles as regional base public hospitals, several measures are necessary. Firstly, continuous monitoring and reasonable support are required to ensure efficient operation and performance. Secondly, a financial support plan tailored to the characteristics of local medical centers is needed. Additionally, local medical centers should strive to enhance their own efficiency.

Privacy Preserving Source Based Deduplication In Cloud Storage (클라우드 스토리지 상에서의 프라이버시 보존형 소스기반 중복데이터 제거기술)

  • Park, Cheolhee;Hong, Dowon;Seo, Changho;Chang, Ku-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.123-132
    • /
    • 2015
  • In cloud storage, processing the duplicated data, namely deduplication, is necessary technology to save storage space. Users who store sensitive data in remote storage want data be encrypted. However Cloud storage server do not detect duplication of conventionally encrypted data. To solve this problem, Convergent Encryption has been proposed. But it inherently have weakness due to brute-force attack. On the other hand, to save storage space as well as save bandwidths, client-side deduplication have been applied. Recently, various client-side deduplication technology has been proposed. However, this propositions still cannot solve the security problem. In this paper, we suggest a secure source-based deduplication technology, which encrypt data to ensure the confidentiality of sensitive data and apply proofs of ownership protocol to control access to the data, from curious cloud server and malicious user.

A Study on Registration Data Analysis of National Immunization Registry Information System (예방접종등록 정보시스템의 등록자료 분석에 관한 연구)

  • Kim, Chang-su;Park, Ok;Kim, Mi-young;Kim, Myung-jin;Lee, Sok-goo;Jung, Hoe-kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1151-1156
    • /
    • 2015
  • In this study, the accuracy duplication and register rate of the vaccination registration data in National Immunization Registry Information System were evaluated and analyzed. Through which undocumented vaccination status data, duplicate data, missing data, errors data into the vaccination registration data were analyzed. In addition, the quality control for the vaccination registration database quality improvement, were proposed for standard error checking. In this paper, we propose an efficient validation of a quality management system of the database.

A Study On The Design of Patient Monitoring System Using RFID/WSN Based on Complex Event Processing (복합 이벤트 처리기반 RFID/WSN을 이용한 환자모니터링 시스템 설계에 관한 연구)

  • Park, Yong-Min;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.10
    • /
    • pp.1-7
    • /
    • 2009
  • Nowadays there are many studies and there's huge development about RFID and WSN which have great developmental potential to many kinds of applications. In particular, the healthcare field is expected to could be securing international competitive power in u-Healthcare and combined medical treatment industry and service. More and more real time application apply RFID and WSN technology to identify, data collect and locate objects. Wide deployment of RFID and WSN will generate an unprecedented volume of primitive data in a short time. Duplication and redundancy of primitive data will affect real time performance of application. Thus, emerging applications must filter primitive data and correlate them for complex pattern detection and transform them to events that provide meaningful, actionable information to end application. In this paper, we design a complex event processing system. This system will process RFID and WSN primitive data and event and perform data transformation. Integrate RFID and WSN system had applied each now in medical treatment through this study and efficient data transmission and management forecast that is possible.

A Design of Hop-by-Hop based Reliable Congestion Control Protocol for WSNs (무선 센서 네트워크를 위한 Hop-by-Hop 기반의 신뢰성 있는 혼잡제어 기법 설계)

  • Heo Kwan;Kim Hyun-Tae;Ra In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1055-1059
    • /
    • 2006
  • In Wireless Sensor Networks(WSNs), a sensor node broadcasts the acquisited sensing data to neighboring other nodes and it makes serious data duplication problem that increases network traffic loads and data loss. This problem is concerned with the conflict condition for supporting both the reliability of data transfer and avoidance of network congestion. To solve the problem, a reliable congestion control protocol is necessary that considers critical factors affecting on data transfer reliability such as reliable data transmission, wireless loss, and congestion loss for supporting effective congestion control in WSNs. In his paper, we proposes a reliable congestion protocol, called HRCCP, based on hop-hop sequence number, and DSbACK by minimizing useless data transfers as an energy-saved congestion control method.