• Title/Summary/Keyword: distributed object

Search Result 746, Processing Time 0.028 seconds

Development of Distributed Interactive Stochastic Combat Simulation (DISCSIM) Model

  • Hong, Yoon-Gee;Kwon, Soon-Jong
    • Journal of the military operations research society of Korea
    • /
    • v.25 no.2
    • /
    • pp.15-30
    • /
    • 1999
  • A number of combat simulation models are scattered and the analytic solution approaches have experienced very difficult computational efforts. Today´s computer communication technology let people to do many unrealistic things possible and the use of those technologies is becoming increasingly prevalent throughout the military operation. Both DIS and ADS are welled defined computer aided military simulations. This study discusses a simulation of stochastic combat network modeling through Internet space. We have developed two separate simulation models, one for clients and another for server, and validated for conducting studies with these models. The object-oriented design was necessary to define the system entities and their relationship, to partition functionality into system entities, and to transform functional metrics into realizations derived from system component behaviors. Heterogeneous forces for each side are assumed at any battle node. The time trajectories for mean number of survivors and combat history at each node, some important combat measures, and relative difference computations between models were made. We observe and may conclude that the differences exit and some of these are significant based on a limited number of experiments.

  • PDF

A Role-Based Access Control Model of Managed Objects in Distributed System Environments (분산시스템 환경에서 관리 객체에 대한 역할기반 접근제어 모델)

  • Choi Eun-Bok
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.75-86
    • /
    • 2003
  • In this paper, we extended hierarchial structure of managed object class to support Role-Based Access Control, and described constraint conditions that have support dynamic temporal function as well as statical temporal function established by management process. And we defined about violation notifications should report to manager when rules violate constraint conditions. Also we presented system architecture that support RBAC with MIB(Management Information Base) of ITU-T recommendation. By access control enforcement and decision function, constraint conditions and activated translation procedure of each roles are described, our system presents dynamic temporal property systematically.

  • PDF

Analysis of Traffic Card Big Data by Hadoop and Sequential Mining Technique (하둡과 순차패턴 마이닝 기술을 통한 교통카드 빅데이터 분석)

  • Kim, Woosaeng;Kim, Yong Hoon;Park, Hee-Sung;Park, Jin-Kyu
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.4
    • /
    • pp.187-196
    • /
    • 2017
  • It is urgent to prepare countermeasures for traffic congestion problems of Korea's metropolitan area where central functions such as economic, social, cultural, and education are excessively concentrated. Most users of public transportation in metropolitan areas including Seoul use the traffic cards. If various information is extracted from traffic big data produced by the traffic cards, they can provide basic data for transport policies, land usages, or facility plans. Therefore, in this study, we extract valuable information such as the subway passengers' frequent travel patterns from the big traffic data provided by the Seoul Metropolitan Government Big Data Campus. For this, we use a Hadoop (High-Availability Distributed Object-Oriented Platform) to preprocess the big data and store it into a Mongo database in order to analyze it by a sequential pattern data mining technique. Since we analysis the actual big data, that is, the traffic cards' data provided by the Seoul Metropolitan Government Big Data Campus, the analyzed results can be used as an important referenced data when the Seoul government makes a plan about the metropolitan traffic policies.

Studies on Physical and Sensory Properties of Premium Vanilla Ice Cream Distributed in Korean Market

  • Choi, Mi-Jung;Shin, Kwang-Soon
    • Food Science of Animal Resources
    • /
    • v.34 no.6
    • /
    • pp.757-762
    • /
    • 2014
  • The object of this study was to investigate the difference in physical and sensory properties of various premium ice creams. The physical properties of the various ice creams were compared by manufacturing brand. The water contents of the samples differed, with BR having the highest value at 60.5%, followed by NT and CS at 57.8% and 56.9%, respectively. The higher the water content, the lower Brix and milk fat contents in all samples. The density of the samples showed almost similar values in all samples (p>0.05). The viscosity of each ice cream had no effect on the water content in any of the brands. Before melting of the ice cream, the total color difference was dependent on the lightness, especially in the vanilla ice cream, owing to the reflection of light on the surface of the ice crystals. The CS product melted the fastest. In the sensory test, CS obtained a significantly higher sweetness intensity score but a lower score for color intensity, probably due to the smaller difference in total color, by which consumers might consider the color of CS as less intense. From this study, the cold chain system for ice cream distribution might be important to decide the physical properties although the concentration of milk fat is key factor in premium ice cream.

A Study on the Anomalous Traffic Handling

  • Lee KeunSoo;Kim Sehun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.619-622
    • /
    • 2004
  • For recent years, hacking is in the trends of making excessive traffic unnecessarily to obstruct the service by getting a system's performance down. And we can also see systems paralyzed in service ability due to the flash crowds of normal traffic to a popular website. This is an important problem certainly solved in the point of QoS guarantee for the clients. It is known that the former is DDoS(Distributed Denial of Service) attack and the latter is FE(Flash Event). These two are samely anomalous traffic because these make excessive congestion on the network or system and downgrade the system's service ability. In this paper, we propose a scheme for protecting the system against anomalous traffic and for guaranteeing the QoS. For this, a server records and maintains the information of clients accessed more than one time before when it is in normal condition. When it falls into the congestion, the records are used for filtering the spoofed IP. We send and receive the ICMP request/reply packet to know whether the IP is spoofed. And we also propose for applying the object spliting of CDN to guarantee the QoS in the initial FE situation.

  • PDF

Efficient Continuous Skyline Query Processing Scheme over Large Dynamic Data Sets

  • Li, He;Yoo, Jaesoo
    • ETRI Journal
    • /
    • v.38 no.6
    • /
    • pp.1197-1206
    • /
    • 2016
  • Performing continuous skyline queries of dynamic data sets is now more challenging as the sizes of data sets increase and as they become more volatile due to the increase in dynamic updates. Although previous work proposed support for such queries, their efficiency was restricted to small data sets or uniformly distributed data sets. In a production database with many concurrent queries, the execution of continuous skyline queries impacts query performance due to update requirements to acquire exclusive locks, possibly blocking other query threads. Thus, the computational costs increase. In order to minimize computational requirements, we propose a method based on a multi-layer grid structure. First, relational data object, elements of an initial data set, are processed to obtain the corresponding multi-layer grid structure and the skyline influence regions over the data. Then, the dynamic data are processed only when they are identified within the skyline influence regions. Therefore, a large amount of computation can be pruned by adopting the proposed multi-layer grid structure. Using a variety of datasets, the performance evaluation confirms the efficiency of the proposed method.

Design of Internet GIS Integration System using CORBA (CORBA를 이용한 인터넷 GIS 통합 시스템 설계)

  • Gang, Byeong-Geuk;Nam, Gwang-U;Kim, Sang-Ho;Lee, Seong-Ho;Ryu, Geun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.193-202
    • /
    • 2001
  • Currently, the components of the GIS have been physically run on a stand-alone system. With rapid advances in internet technology, GIS users require that they are able to not only access they heterogeneous and remote GIS database as well as their own information, but also share them. However, these GIS have the defects that can not handle formats different from own data format. Therefore, in this paper, we propose to integrate the components of the heterogeneous and remote GIS using CORBA in order to solve these problems, which is a distributed object technology, the mediator and wrapper technology in client and server layers.

  • PDF

Design and Implementation of an Extended Directory System for Management of the DFR Attributes (DFR 속성 관리를 위한 확장된 디렉토리 시스템의 설계 및 구현)

  • Im, Jae-Hong;Kim, Yeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1542-1552
    • /
    • 1996
  • This paper presents a design and implementation of an extended directory system in manage and provide an effective search operation of the DFR(Document Filing and Retrieval) Object's attributes. For this, the design and implementation of a configuration model for interworking between the DFR and directory systems, an association mechanisms between two application's operation, extended directory schema and extended DIT(Directory Information Tree) are described. In a distributed environment, the interworking between the DFR and directory system implemented by using QUIPU 8.0 of ISODE(ISO Development Environment) directory system is tested. based on the result of this paper, an extended model of the directory system is proposed for proving search operation of various application's objects.

  • PDF

SecureJMoblet : Secure Mobile Agent System based on Jini2.0 (SecureJMoblet : Jini2.0 기반의 안전한 이동에이전트 시스템)

  • Yu Yang-Woo;Moon Nam-Doo;Lee Myung-Joon
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.439-450
    • /
    • 2004
  • Mobile agents are autonomous and dynamic entities that can migrate among various nodes in the network. Java's Jini framework facilitates mobile agent system development, providing hey features for distributed network programming. However, due to the security weakness, Jinil.0 service has a fundamental limitation on developing mobile agent systems which support secure remote communications. In this paper, we describe a Jini2.0-based secure mobile agent system named SecureJMoblet. On the top of Jini2.0, the system provides basic functionalities of a mobile agent system such as creation, transfer and control. In addition, with the SeureJS developed for secure JavaSpace service, SecureJMoblet supports a secure object repository and a reliable communication among mobile agents.

Development of the Remote-Educating Communication Tool using DCOM Voice Module (DCOM 음성 모듈을 이용한 원격 대화식 학습 도구의 개발)

  • Jang, Seung-Ju
    • The KIPS Transactions:PartA
    • /
    • v.10A no.2
    • /
    • pp.173-180
    • /
    • 2003
  • This paper proposes Remote Educating Communication Tool (RECT) that allows students and teachers to communicate using Web-based Bulletin Board System. The distance teaching using DCOM (Distributed Component Object Model) voice module is used to enhance academic accomplishments for students in computer class. The DCOM voice module to be used in distance learning is designed, implemented and applied to teachers and students in the computer class in order to measure and analyze academic results. The RECT server provides Q&A sessions between students and teachers in the BBS using recording and playback functions. The client RECT includes recording and playback functions. The client module of RECT receives and uses DCOM module. When recording, the client transmits voice files with the recorded content to the server.