• 제목/요약/키워드: multiple server

Search Result 512, Processing Time 0.028 seconds

A Design Study of Standard Indicators for Evaluating the Technical Performance of an NCS Core Vocational Competence System (직업기초능력 평가시스템의 기술성능 평가를 위한 표준지표 설계 연구)

  • Kim, Seung-Hee;Chang, Young-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.111-117
    • /
    • 2017
  • The National Competency Standards (NCS) was designed to implement a competence-based society and solve the problem of inconsistency between the industrial field and education, training, and certification system. This study designed and developed the Korean NCS core vocational competence system, in accordance with the NCS, as an infrastructure to solve fundamental problems such as re-education and the social costs that are incurred in the workplace. Further, this study designed and developed standard indicators to evaluate the technical performance of the system for the global advancement of the Korean NCS core vocational competence system. The NCS core vocational competence system has been developed as an appropriate response type for multiple devices such as computers, tablet PCs, and cellular phones. For the global advancement of the Korean NCS core vocational competence system, this study designed and developed 10 performance evaluation indicators in accordance with 10 global standards, such as linkage-target operating system, interface protocol, packet format, encryption, class component, simultaneous access number, supervisor-to-testtaker response speed, server-to-admin response speed, auto-recovery speed for test answers, and real-time answer transmission speed.

Pedigree Indexing of Imported American Brahman Breeder Cattle in the Philippines

  • Bondac, O.L.;Mercado, C.M.;Vera Cruz, N.C.;Palou, R.N.;Jr, J.S.Server
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.10 no.6
    • /
    • pp.614-620
    • /
    • 1997
  • Pedigree data were used to predict the performance of 1,166 imported Americas Brahman breeder cattle, composed of 104 bulls and 1,062 heifers with an average age of 24.4 months (range of 17 to 40 months). A total of 13 full sib, 10 maternal half sib, and 228 paternal half sib groups were identified, each with average group size of 2.08, 2.00, and 4.49, respectively. Only 758 (64.9% of total) imported cattle were found to have at least one ancestor with expected progeny differences (EPDs) reported in the Spring 1995 Brahman Sire Summary. Moderate average accuracy values of .71, .69, .52, and .52 for birth weight, weaning weight, yearling weight, and maternal milk, respectively, were noted for EPDs of the ancestors. Prediction equations were derived by multiple regression analysis of available EPDs of sire, paternal grand sire, and maternal grand sire. Based on pedigree indexes that involve various combinations of available ancestral information, the average predicted EPDs (lbs) for imported cattle were $1.76{\pm}0.54$, $14.93{\pm}4.86$, $25.10{\pm}9.50$, and $5.86{\pm}2.08$ for birth weight, weaning weight, yearling weight, and maternal milk, respectively. Significant correlations (p < .05) were also found between sire and son EPDs (+.27) for yearling weight; and between sire and paternal grand sire EPDs for birth weight (+.34), weaning weight (+.51), yearling weight (+.49), and maternal milk (+.55).

A Study on an Efficient e-business System based on .NET (.NET을 기반으로 한 효율적인 전자상거래 시스템에 관한 연구)

  • 나윤지
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.4
    • /
    • pp.51-58
    • /
    • 2002
  • A electronic business user is increased rapidly, and load of a electronic business system and network traffic are increased rapidly. Also, the data which included an audio and video is increasing in a electronic business system gradually, and According to this an Internet service businessman is paying for an enormous cost for management of a system and a maintenance of a line. It is brought a delay of a response speed about a service wish of a Web customer this system load and network traffic raise. Also, this decreases customer satisfaction and becomes an important factor to decrease competitive power of an e-business enterprise. In this study, we proposed the electronic business system that improved answer delay time about a Web customer in an e-business system based on the .net which was a the latest version of Microsoft company, and analyzed performance of a proposal system through an experiment. In the experiment result, the system that proposed it can have response time to have been improved and fast adaptability about various requests of a Web customer. Also, in a proposed system, a decrease gets a delay of a response speed to occur because of the multiple user done.

  • PDF

Design and Implementation of Web Based Instruction System using Java Server Pages (JSP를 이용한 웹 기반 교수학습 시스템의 설계 및 구현)

  • Jung, Jong-Dae;Nam, Jae-Yeal;Choi, Jae-Gak
    • Journal of The Korean Association of Information Education
    • /
    • v.7 no.3
    • /
    • pp.263-274
    • /
    • 2003
  • Web based instruction (WBI) has been widely used thesedays because the web has various advantages for instruction. However, most of current WBI systems do not support various requirements from students. It is because of the lack of research for structural instruction method. This paper presents a new method of WBI and designs an instruction model to support various requirements from students by implementing dynamic WBI system using JSP to solve current WBI problems. The developed WBI system uses multimedia based instructions. The implemented system focused on the practical instruction by providing the functions of listening, homework, and test on web site. For the similar effects as in the classroom, it supports functions of electronic white board and multimedia data which is consisted of high-quality sound and video data with high degree of compression. Furthermore, the system supports that instructors can design a test using three kinds of basic forms, a multiple-choice test, brief-answer test, essay test, and evaluate the tests easily. It also supports easy management for homework, lecture registration, and many school affairs.

  • PDF

A CORBA-Based Collaborative Work Supported Medical Image Analysis and Visualization System (코바기반 협업지원 의료영상 분석 및 가시화 시스템)

  • Chun, Jun-Chul;Son, Jae-Gi
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.109-116
    • /
    • 2003
  • In this paper, a CORBA-based collaborative medical image analysis and visualization system, which provides high accessibility and usability of the system for the users on distributed environment is introduced. The system allows us to manage datasets and manipulates medical images such as segmentation and volume visualization of computed geometry from biomedical images in distributed environments. Using Bayesian classification technique and an active contour model the system provides classification results of medical images or boundary information of specific tissue. Based on such information, the system can create real time 3D volume model from medical imagery. Moreover, the developed system supports collaborative work among multiple users using broadcasting and synchronization mechanisms. Since the system is developed using Java and CORBA, which provide distributed programming, the remote clients can access server objects via method invocation, without knowing where the distributed objects reside or what operating system it executes on.

Research for Efficient Massive File I/O on Parallel Programs (병렬 프로그램에서의 효율적인 대용량 파일 입출력 방식의 비교 연구)

  • Hwang, Gyuhyeon;Kim, Youngtae
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.53-60
    • /
    • 2017
  • Since processors are handling inputs and outputs independently on distributed memory computers, different file input/output methods are used. In this paper, we implemented and compared various file I/O methods to show their efficiency on distributed memory parallel computers. The implemented I/O systems are as following: (i) parallel I/O using NFS, (ii) sequential I/O on the host processor and domain decomposition, (iii) MPI-IO. For performance analysis, we used a separated file server and multiple processors on one or two computational servers. The results show the file I/O with NFS for inputs and sequential output with domain composition for outputs are best efficient respectively. The MPI-IO result shows unexpectedly the lowest performance.

A Study on Developing XML Documents and RDB Mapping Using Tag Free XML Development Tools (Tag free XML 개발 툴을 이용한 XML 문서 개발과 RDB 매핑에 관한 연구)

  • Woo, Won-Taek
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.5
    • /
    • pp.37-52
    • /
    • 2006
  • XML architecture is important to wireless or wired presentation. It is also important for data exchange between businesses. XML forces the separation of content from style and gives wired or wireless devices flexibility for interpretation. Separation of content, style, and logic is key to advanced architecture. XML can be exchanged among databases on multiple systems with presentation on wired or wireless devices. An XML schema might need to be defined, or an established DTD might need to be transformed to access a relational database on the server. The purpose of this study is to generate XML documents such as DTD, XML schema, RDB mapping using Tagfree's XML developer tools in order to experience whole processes mentioned above. Overall understanding of data structures of and database processing with XML documents, which is essential to XML programming and database processing, can be accomplished with this study without much endeavor to learn complex XML syntax. The future study can be extended on the subject of web programming with DOM or SAX API.

  • PDF

Quorum-based Key Management Scheme in Wireless Sensor Networks

  • Wuu, Lih-Chyau;Hung, Chi-Hsiang;Chang, Chia-Ming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2442-2454
    • /
    • 2012
  • To ensure the security of wireless sensor networks, it is important to have a robust key management scheme. In this paper, we propose a Quorum-based key management scheme. A specific sensor, called as key distribution server (KDS), generates a key matrix and establishes a quorum system from the key matrix. The quorum system is a set system of subsets that the intersection of any two subsets is non-empty. In our scheme, each sensor is assigned a subset of the quorum system as its pre-distributed keys. Whenever any two sensors need a shared key, they exchange their IDs, and then each sensor by itself finds a common key from its assigned subset. A shared key is then generated by the two sensors individually based on the common key. By our scheme, no key is needed to be refreshed as a sensor leaves the network. Upon a sensor joining the network, the KDS broadcasts a message containing the joining sensor ID. After receiving the broadcast message, each sensor updates the key which is in common with the new joining one. Only XOR and hash operations are required to be executed during key update process, and each sensor needs to update one key only. Furthermore, if multiple sensors would like to have a secure group communication, the KDS broadcasts a message containing the partial information of a group key, and then each sensor in the group by itself is able to restore the group key by using the secret sharing technique without cooperating with other sensors in the group.

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.