• Title/Summary/Keyword: information overload

Search Result 531, Processing Time 0.03 seconds

Operation Policy for Enhancing Availability of a Web Server against DoS Attacks (서비스 거부 공격에 대응한 웹서버 가용성 향상을 위한 운용 정책 방안)

  • Baik, Nam-Kyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.735-744
    • /
    • 2008
  • This paper proposes a 'secure node' to be robust against network-based DoS attacks. The secure node selectively accepts new sessions based on the Zipf's law while a link is in the overload state. Our scheme calculates a threshold value for overload state, and provides a dynamic service mechanism for enhancing availability of a web server. The simulation results show performance improvement of the proposed scheme in terms of completion/connection ratios.

An Onboard Printer Server Based on Embedded Linux (Embedded Linux 기반의 내장형 프린터 서버)

  • Cha, Kyung-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.309-314
    • /
    • 2009
  • PC users could experience some inconvenience when they use their PC that was physically connected to network printers shared by other People in the network due to the overload. This paper shows how to resolve this kind of overload problem and established the embedded printer system based on embedded Linux system which performs the printer server in order for any users in the of ice to do printing work more smoothly via current network. It's own capabilities and functions were verified throughout the various tests in practical environment.

Exact analysis for overload of a charge-pump phase-locked loop (Charge-pump 위상 동기 회로의 과부하에 대한 정확한 해석)

  • 최은창;이범철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.12
    • /
    • pp.3069-3085
    • /
    • 1996
  • This paper shows an accurate charge-pump PLL model which considers the wave-form distortion in high speed operation of charge-pump PLL, the leakage current in loop filter, and a physical limit in charge-pump. With proposed model of charge-pump PLL, overload and stability are derived theoretically and the results are compared to the conventional model. Unlike the ideal charge-pump PLL that simplifies calculations, it is possible to analyze the transient-state and the steady-state at the same time with proposed accurate model. Thus, charge-pump over load, in the transient-state and the stead-state of charge-pump, is accuragely analyzed and the results are confirmed with simulation.

  • PDF

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

Study on the Relationship between Adolescents' Self-esteem and their Sociality -Focusing on the Moderating Effect of Gender -

  • Kim, Kyung-Sook;Lee, Duk-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.147-153
    • /
    • 2016
  • In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.

Bayesian Regression Modeling for Patent Keyword Analysis

  • Choi, JunHyeog;Jun, SungHae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.125-129
    • /
    • 2016
  • In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.

Development of Web-based Bio-Image Retrieval System (웨이블릿 변환을 이용한 실시간 화재 감지 알고리즘)

  • Cheong, Kwang-Ho;Ko, Byoung-Chul;Nam, Jae-Yeal
    • Annual Conference of KIPS
    • /
    • 2006.11a
    • /
    • pp.227-230
    • /
    • 2006
  • A content-based image retrieval system using MPEG-7 is designed and implemented in this thesis. The implemented system uses existing MPEG-7 Visual Descriptors. In addition, a new descriptor for efficient retrieval of bio images is proposed and utilized in the developed content-based image retrieval system. Comparing proposed CBSD(Compact Binary Shape Descriptor) with Edge Histogram Descriptor(EHD) and Region Shape Descriptor(RSD), it shows good retrieval performance in NMRR. The proposed descriptor is robust to large modification of brightness and contrast and especially improved retrieval performance to search images with similar shapes. Also proposed system adopts distributed architecture to solve increased server overload and network delay. Updating module of client efficiently reduces downloading time for metadata. The developed system can efficiently retrieve images without causing server's overload.

  • PDF

Effects of Bring Your Own Device (BYOD) Attributes on Work-to-life Conflict

  • Cong Qi
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.831-862
    • /
    • 2023
  • The rapid adoption of smartphones and tablets among employees has recently forced organizations to proactively embrace bring your own device (BYOD). The situation of COVID-19 makes the concept of BYOD even paramount. Allowing employees to bring their own mobile devices to the workplace has helped companies realize productivity gains and cost benefits. However, BYOD has also blurred the boundaries between work and personal life, thereby creating a stressful environment for employees (Doargajudbur and Hosanoo, 2023). This study explores the relationships between several BYOD attributes and investigates the effects of these attributes on work-to-life conflict. It contributes by introducing workplace connectivity after hours as a new dimension of BYOD attribute to influence work-to-life conflict. Based on boundary theory, a theoretical model is developed and tested with an online survey. The results reveal that flexibility and workplace connectivity after hours positively influence productivity, and flexibility helps to relieve instead of increase work overload. Meanwhile, a higher level of flexibility and productivity can help reduce work-to-life conflict, and a higher level of work overload induces a higher level of work-to-life conflict.

A Methodology of Conjoint Segmentation for Internet Shopping Malls Using Customer's Surfing Data (인터넷 쇼핑몰 방문자의 행위 분석을 이용한 컨조인트 시장세분화 방법론에 대한 연구)

  • Lee, Dong-Hoon;Kim, Soung-Hie
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.04a
    • /
    • pp.187-196
    • /
    • 2000
  • A lot of Internet shopping malls strive for obtaining a competitive advantage over others in an increasingly tighter electronic marketplace. To this end, understanding customer preference toward products (or services) and administering appropriate marketing strategy is essential for their continuous survival. However, only a few marketing researchers and practicioners focused on this issue, compared with academic and industry efforts devoted to traditional market segmentation. In this paper, we suggest a methodology of conjoint segmentation for electronic shopping malls. Traditional market segmentation methodologies based on customer's profile sometimes fail to utilize abundant information given while navigating around cyber shopping malls. In this methodology, we do not impose information overload to the customer for preference elicitation, but this methodology, we do not impose information overload to the customer for preference elicitation, but capture automatically generated surfing or buying data and analyze them to get useful market segmentation information. The methodology consists of 4-stages: 1) analyzing legacy homepages, 2) data preparation, 3) estimating and interpreting the result, and 4) developing marketing mix. Our methodology was to give useful guidelines for market segmentation to companies working in the electronic marketplace.

  • PDF

Extended Service Filtering Technique for Overload Control of Televoting Service Required for the Specialized Resources of Intelligent Peripheral (지능형 정보제공 시스템의 특수 지원을 이용하여 제공되는 전화투표 서비스의 과부하 제어를 위한 확장된 서비스 필터링 기법)

  • Jeong, Gwang-Je
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1727-1738
    • /
    • 1996
  • This paper proposes a extended service filtering technique to solve overload control problems inService Con-trol Poin(SCP) due to Televoting (VOT) services with heavy traffic characteristics. Also, this paper compares this new technique with existing IN overload control lechniques, and calculate steady state call blocking probabilities in In under overload conditions. The proposed technique considers SCP overload and IN CS-1services such as VOT service that need to use the specialized resources of IP. This technique uses first an activating step which SCP sends service filtering request to SSP and IP for the start of service filtering. Then, in the filtering step SSP sendas filtering results to SCP periodically or each N-calls.Also,when filtering time-out timer expired or call counter value exceeded maximum number of calls,SSP stops service filtering,and sends ser-vice filteing response to SCP in the deactivating step. The application of this techique to VOT service defined in IN CS-1 service is investigated and analyzed by using an analytical VOT service model.In order to apply this technique to VOT service, this paper also discusses VOT service and the corresponding N architecture including Service Switching Point(SSP),SCP and IP. Then this paper also constructs an analytical VOT service model,and calculates SCP and SSP/IP(circuit)call blocking probablities.With the application of this new technique,this paper shows good performance enhancements in SCP call blocking probability.

  • PDF