• Title/Summary/Keyword: persistent allocation

Search Result 11, Processing Time 0.031 seconds

Garbage Collection Technique for Non-volatile Memory by Using Tree Data Structure (트리 자료구조를 이용한 비 휘발성 메모리의 가비지 수집 기법)

  • Lee, Dokeun;Won, Youjip
    • Journal of KIISE
    • /
    • v.43 no.2
    • /
    • pp.152-162
    • /
    • 2016
  • Most traditional garbage collectors commonly use the language level metadata, which is designed for pointer type searching. However, because it is difficult to use this metadata in non-volatile memory allocation platforms, a new garbage collection technique is essential for non-volatile memory utilization. In this paper, we design new metadata for managing information regarding non-volatile memory allocation called "Allocation Tree". This metadata is comprised of tree data structure for fast information lookup and a node that holds an allocation address and an object ID pair in key-value form. The Garbage Collector starts collecting when there are insufficient non-volatile memory spaces, and it compares user data and the allocation tree for garbage detection. We develop this algorithm in a persistent heap based non-volatile memory allocation platform called "HEAPO" for demonstration.

Performance Analysis of VoIP Services in Mobile WiMAX Systems with a Hybrid ARQ Scheme

  • So, Jaewoo
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.510-517
    • /
    • 2012
  • This paper analyzes the performance of voice-over-Internet protocol (VoIP) services in terms of the system throughput, the packet delay, and the signaling overhead in a mobile WiMAX system with a hybrid automatic repeat request (HARQ) mechanism. Furthermore, a queueing analytical model is developed with due consideration of adaptive modulation and coding, the signaling overhead, and the retransmissions of erroneous packets. The arrival process is modeled as the sum of the arrival rate at the initial transmission queue and the retransmission queue, respectively. The service rate is calculated by taking the HARQ retransmissions into consideration. This paper also evaluates the performance of VoIP services in a mobile WiMAX system with and without persistent allocation; persistent allocation is a technique used to reduce the signaling overhead for connections with a periodic traffic pattern and a relatively fixed payload. As shown in the simulation results, the HARQ mechanism increases the system throughput as well as the signaling overhead and the packet delay.

Performance Evaluation of Semi-Persistent Scheduling in a Narrowband LTE System for Internet of Things (사물인터넷을 위한 협대역 LTE 시스템에서의 준지속적 스케줄링의 성능 평가)

  • Kim, Sunkyung;Cha, Wonjung;So, Jaewoo;Na, Minsoo;Choi, Changsoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1001-1009
    • /
    • 2016
  • In LTE networks, the base station transmits control information over the physical downlink control channel (PDCCH) including scheduling grants, which are used to indicate the resources that the user equipment uses to send data to the base station. Because the size of the PDCCH message and the number of the PDCCH transmissions increase in proportion to the number of user equipments, the overhead of the PDCCH may cause serious network congestion problems in the narrowband LTE (NB-LTE) system. This paper proposes the compact PDCCH information bit allocation to reduce the size of the PDCCH message and evaluates the performance of the semi-persistent scheduling (SPS) in the NB-LTE system. The simulation results show that the SPS can significantly reduce the signaling overhead of the PDCCH and therefore increase the system utilization.

Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems

  • Tian, Wen;Ji, Xiao-Peng;Liu, Weiwei;Zhai, Jiangtao;Liu, Guangjie;Dai, Yuewei;Huang, Shuhua
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.585-598
    • /
    • 2019
  • A cyber-physical system (CPS) is a new mechanism controlled or monitored by computer algorithms that intertwine physical and software components. Advanced persistent threats (APTs) represent stealthy, powerful, and well-funded attacks against CPSs; they integrate physical processes and have recently become an active research area. Existing offensive and defensive processes for APTs in CPSs are usually modeled by incomplete information game theory. However, honeypots, which are effective security vulnerability defense mechanisms, have not been widely adopted or modeled for defense against APT attacks in CPSs. In this study, a honeypot game-theoretical model considering both low- and high-interaction modes is used to investigate the offensive and defensive interactions, so that defensive strategies against APTs can be optimized. In this model, human analysis and honeypot allocation costs are introduced as limited resources. We prove the existence of Bayesian Nash equilibrium strategies and obtain the optimal defensive strategy under limited resources. Finally, numerical simulations demonstrate that the proposed method is effective in obtaining the optimal defensive effect.

Extraction of Network Threat Signatures Using Latent Dirichlet Allocation (LDA를 활용한 네트워크 위협 시그니처 추출기법)

  • Lee, Sungil;Lee, Suchul;Lee, Jun-Rak;Youm, Heung-youl
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2018
  • Network threats such as Internet worms and computer viruses have been significantly increasing. In particular, APTs(Advanced Persistent Threats) and ransomwares become clever and complex. IDSes(Intrusion Detection Systems) have performed a key role as information security solutions during last few decades. To use an IDS effectively, IDS rules must be written properly. An IDS rule includes a key signature and is incorporated into an IDS. If so, the network threat containing the signature can be detected by the IDS while it is passing through the IDS. However, it is challenging to find a key signature for a specific network threat. We first need to analyze a network threat rigorously, and write a proper IDS rule based on the analysis result. If we use a signature that is common to benign and/or normal network traffic, we will observe a lot of false alarms. In this paper, we propose a scheme that analyzes a network threat and extracts key signatures corresponding to the threat. Specifically, our proposed scheme quantifies the degree of correspondence between a network threat and a signature using the LDA(Latent Dirichlet Allocation) algorithm. Obviously, a signature that has significant correspondence to the network threat can be utilized as an IDS rule for detection of the threat.

Water, Energy, Cooperation, and Conflict inthe Kura-Araks Basin of the South Caucasus

  • Campana, Michael E.
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.3-3
    • /
    • 2011
  • After the dissolution of the Soviet Union, the Kra-Araks Basin (KAB) became an international river basin with respect to the South Caucasus states of Armenia, Azerbaijan, and Georgia. However, there are no agreements regarding water allocation, water quality, or ecosystem maintenance among the aforementioned riparians. The main water problems in the basin include not only water quantity and quality, but also the lack of joint management. The aforementioned countries share many similar circumstances: location in a politically unstable but strategic region bureaucratic and structural issues; and more importantly, ongoing ethnic and related conflicts. Despite these obstacles, the countries recognize that they depend greatly on the basin, whose waters they must share. To that end, they proposed and participated in the joint NATO-OSCE South Caucasus River Monitoring (SCRMP) project between 2002 and 2009.The SCRMP sought to investigate and characterize the surface water quality in the KAB by providing equipment and training to all three countries. Several years' worth of water quality data were collected in the KAB: major ions; heavy metals; POPs (persistent organic pollutants); and radionuclides; The North Atlantic Treaty Organization (primary funder) and the Organization for Security and Co-operation in Europesupported the SCRMP not only to build capacity but also to promote cooperation and minimize conflict over water and other resources, thus providing a measure of security for Europe and other regions. The South Caucasus is a strategically-important region, functioning as a bridge between Asia and Europe. Energy-rich Azerbaijan seeks to become a key player in trade by serving as a transportation and energy hub between the energy and mineral-rich Central Asian KUT countries (Kazakhstan, Uzbekistan, and Turkmenistan) and Western Asia, Europe, and other areas. The presentation will summarize the scientific results of the SCRMP, elucidate the regional water-energy-security nexus, discuss future work in the region, and explain why the world needs to be concerned about the KAB and the entire South Caucasus.

  • PDF

Channel State-Aware Joint Dynamic Cell Coordination Scheme using Adaptive Modulation and Variable Reuse Factor in OFDMA (OFDMA 하향링크에서 적응적 변조와 여러 개의 재사용 지수를 동시에 사용하고 채널 상태를 고려한 동적 셀 코디네이션)

  • Byun, Dae-Wook;Ki, Young-Min;Kim, Dong-Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1A
    • /
    • pp.24-33
    • /
    • 2007
  • In this paper, two different dynamic cell coordination strategies for frequency flat and selective fading are proposed for efficient subcarrier allocation in the joint consideration of adaptive modulation and variable frequency reuse in the channel-aware OFDMA downlink multicellular environment. Compared to a conventional OFDMA system without cell coordination, where system throughput may become degraded due to the persistent interference from other cells, the proposed system dynamically allows RNC to apply different reuse factors on each subchannel and scheduling in consideration of channel and interference conditions of individual users so as to increase the system throughput and guarantee QoS of each user. In a frequency flat fading, the dynamic scheme with the proposed scheduling achieves on average three times larger throughput than the conventional dynamic scheme [8]. In a selective fading channel, the proposed schemes showed 2.6 times as large throughput as that of a single reuse factor of one for all subchannels.

Developing A Revitalization Planning and Design Guideline for Enhancing Land Use Performance of a Shrinking City

  • Yang, Shu;Kim, Jun-Hyun;Sohn, Wonmin;Kotval-K, Zeenat
    • Journal of People, Plants, and Environment
    • /
    • v.23 no.4
    • /
    • pp.387-398
    • /
    • 2020
  • Background and objective: Land vacancy is a persistent issue in most urban areas in the United States, yet few case studies have examined how vacant lots are used and the functions they serve in local communities. The purposes of this study were to provide a new revitalization planning and design proposal for the Durant-Tuuri-Mott (DTM) target area in the shrinking city of Flint, MI, USA, and to assess the final planning and design guideline through an analysis of vacant land redevelopment alternatives. Methods: For developing a revitalization planning and design guideline, this study developed several design modules with three main design themes. Then, landscape performance of the final design proposals was analyzed by three development scenarios, based on implementation level: 100%, 75%, and 50%. These development scenarios were based on the local context and different implementation budgets needed to adopt the proposed design modules. To generate a comprehensive development plan by optimizing design module allocation in the study area, this research employed a system-oriented approach, analyzing the existing cultural, natural, and built environments. A community participant process was adopted to collect stakeholders' opinions on future development. Results: By utilizing landscape performance metrics to quantify the environmental, social, and economic benefits, this study developed optimized development scenarios and a master plan for the reuse and redevelopment of existing vacant lots across DTM neighborhoods and analyzed the benefits of each. Conclusion: This research offers a flexible design method for balancing objectives in vacant land redevelopment that can be applied in other shrinking cities.

Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States (유비쿼터스 서비스 상태지속을 지원하는 안전한 Jini 서비스 구조)

  • Kim, Sung-Ki;Jung, Jin-Chul;Park, Kyung-No;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.157-166
    • /
    • 2008
  • The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.

A Study of Staffing Estimation for Nursing Manpower Demand in Hospital (병원간호인력의 수요추정에 관한 연구 -환자분류체계에 의한 간호인력 수요추계의 방법을 중심으로-)

  • 김유겸
    • Journal of Korean Academy of Nursing
    • /
    • v.16 no.3
    • /
    • pp.108-122
    • /
    • 1986
  • Changing concepts of health care, are stimulating the demand for health care, thereby orienting society to health care rights to such an extent that they are deemed as fundamental ones inalienable to man. Concomitantly, qualitative as well as quantative improvement is being sought in the nursing service field. Today, efforts are being made in various areas, especially to qualitatively improve nursing services. A second issue concerns proper staffing. It is important to study staffing, in as much as it continues to be the most persistent and critical problem facing hospital nursing administrators today. It involves quantity, quality, and utilization of nursing personnel. A great deal of attention has been focused on this problem since mid 1930's when nursing services began to be felt as an important segment of hospital operation representing the largest single item of hospital budgets. Traditionally, the determination and allocation of nursing personnel resources has relied heavily on gloval approaches which make use of fixed staff-to-patient ratios. It has long been recognized that these ratios are insensitive to variations between institutions and among individual patients. Therefore, the aim of this thesis is to point to the urgent need for the development of methodology and criteria suited to the reality of Korea. The present research selected one place, the W Christian Hospital, and was conducted over a period 10 days from January, and nurses who were them on duty in their unit. The total num-her of patients surveyed was 1,426 and that of 354. The research represents many variables affecting the direct patient care time using the result from the direct observation method, then using a calculation method to estimate the relationship between the patients care time and selected variables in the hospital setting. The amount of direct patient care time varies with many factors, such 89 the patients age. diagnosis and time in hospital. Differences are also found from hospital, clinic to clinic, ward to ward, and even shift to shift. In this research, the calculation method of estimating the required member of nursing staff is obtained by dividing the time of productive patient care activity(with the time of patient care observed), by the sum of the productive time that each the staff can supply, i.e., 360 minutes, which is obtained by deducting the time for personal activities. The results indicate a substantial difference between the time of productive patient care observed directing and the time of the productive patient care estimated using calculating method. If we know accurately the time of the direct patient care on a shift, there required number of staff members calculated if the proper method can be determinded should be able the time of the direct patient care be estimated by the patient classification system, but this research has shown this system to be in accurate in Korea. There are differences in the recommended time of productive patient care and the required number of nursing staff depending upon which method is used. The calculated result is not very accurate, so more research is needed on the patient classification system.

  • PDF