• 제목/요약/키워드: snapshot

검색결과 191건 처리시간 0.031초

위치기반 서비스를 위한 다중레벨 DBMS에 질의 분류 컴포넌트의 설계 및 구현 (Design and Implementation of Query Classification Component in Multi-Level DBMS for Location Based Service)

  • 장석규;어상훈;김명근;배해영
    • 정보처리학회논문지D
    • /
    • 제12D권5호
    • /
    • pp.689-698
    • /
    • 2005
  • 현재 위치기반 서비스를 제공하기 위하여 다양한 시스템들이 사용되고 있다. 그러나 기존의 시스템들은 상당히 많은 사용자들에게 빠른 서비스를 제공하기에는 적합하지가 않다. 이러한 문제점을 해결하기 위하여 빠른 데이터 처리와 대용량의 데이터 관리를 동시에 지원하는 다중레벨 DBMS를 사용하여야 한다. 스냅샷을 갖는 다중레벨 DBMS는 디스크에 모든 데이터를 가지고 있으며, 빠른 처리를 요구하는 데이터는 스냅샷의 형태로 메인메모리 데이터베이스에서 관리한다. 이 시스템의 성능을 최적화하여 위치기반 서비스를 제공하기 위해서는 스냅샷에 존재하는 데이터를 효율적으로 사용할 수 있도록 질의를 분류하는 컴포넌트가 필요하다. 본 논문에서는 위치기반 서비스를 위한 다중레벨 DBMS에서 질의 분류 컴포넌트를 설계하고 구현한다. 제안된 컴포넌트는 입력된 질의를 메모리 질의, 디스크 질의, 하이브리드 질의로 분류하여 스냅샷 사용율을 높이고, 스냅샷의 일부분을 사용할 수 있도록 질의의 비공간과 공간 필터 조건을 분할하는 메커니즘을 사용하였다. 따라서, 제안된 컴포넌트는 효율적인 질의 분류를 통하여 스냅샷을 최대한 이용함으로써 시스템의 성능을 향상시킨다.

A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge

  • Nirmala, E.;Muthurajkumar, S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3870-3884
    • /
    • 2020
  • The proposed framework of Four Layer Robust Storage in Cloud (FLRSC) architecture involves host server, local host and edge devices in addition to Virtual Machine Monitoring (VMM). The goal is to protect the privacy of stored data at edge devices. The computational intelligence (CI) part of our algorithm distributes blocks of data to three different layers by partially encoded and forwarded for decoding to the next layer using hash and greed Solomon algorithms. VMM monitoring uses snapshot algorithm to detect intrusion. The proposed system is compared with Tiang Wang method to validate efficiency of data transfer with security. Hence, security is proven against the indexed efficiency. It is an important study to integrate communication between local host software and nearer edge devices through different channels by verifying snapshot using lamport mechanism to ensure integrity and security at software level thereby reducing the latency. It also provides thorough knowledge and understanding about data communication at software level with VMM. The performance evaluation and feasibility study of security in FLRSC against three-layered approach is proven over 232 blocks of data with 98% accuracy. Practical implications and contributions to the growing knowledge base are highlighted along with directions for further research.

Intraocular Injection of Muscimol Induces Illusory Motion Reversal in Goldfish

  • Lee, Sang-Yoon;Jung, Chang-Sub
    • The Korean Journal of Physiology and Pharmacology
    • /
    • 제13권6호
    • /
    • pp.469-473
    • /
    • 2009
  • Induced activation of the gamma-aminobutyric $acid_A$ ($GABA_A$) receptor in the retina of goldfish caused the fish to rotate in the opposite direction to that of the spinning pattern during an optomotor response (OMR) measurement. Muscimol, a $GABA_A$ receptor agonist, modified OMR in a concentration-dependent manner. The $GABA_B$ receptor agonist baclofen and $GABA_C$ receptor agonist CACA did not affect OMR. The observed modifications in OMR included decreased anterograde rotation $(0.01\sim0.03\;{\mu}M)$, coexistence of retrograde rotation and decreased anterograde rotation $(0.1\sim30\;{\mu}M)$ and only retrograde rotation $(100\;{\mu}M\sim1\;mM)$. In contrast, the $GABA_A$ receptor antagonist bicuculline blocked muscimol-induced retrograde rotation. Based on these results, we inferred that the coding inducing retrograde movement of the goldfish retina is essentially associated with the GABAA receptor-related visual pathway. Furthermore, from our novel approach using observations of goldfish behavior the induced discrete snapshot duration was approximately 573 ms when the fish were under the influence of muscimol.

스냅샷을 가지는 다중 레벨 공간 DBMS에서의 효율적인 스냅샷 교체 기법 (Efficient Snapshot Replacement Technique in Multi-Level Spatial DBMS with Snapshot)

  • 오은석;어상훈;김호석;배해영
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 가을 학술발표논문집 Vol.32 No.2 (2)
    • /
    • pp.196-198
    • /
    • 2005
  • 오늘날 우리가 사용할 수 있는 정보의 양은 실로 막대하면서도 지속적으로 늘어가고 있는 추세이며, 동시에 데이터들의 신속한 처리에 대한 관심이 늘고 있다. 특히 GIS에서 사용되는 대용량 데이터나 빠른 처리 속도가 요구되는 인증 시스템 데이터와 같은 다양한 종류의 데이터 특성을 고려하여 효율적인 관리를 하는 데이터베이스 관리 시스템을 필요로 하고 있다. 스냅샷 데이터를 갖는 다중 레벨 공간 DBMS는 대용량, 또는 빠른 트랜잭션 처리 속도가 필요한 데이터들을 효율적으로 관리하는 데이터베이스 관리 시스템으로서, 대용량 데이터는 디스크 데이터베이스에서 그리고 빠른 트랜잭션 처리를 요구하는 데이터들은 스냅샷의 형태로 메모리 데이터베이스에서 관리한다. 메모리 데이터베이스에 저장되는 스냅샷은 상대적으로 더욱 중요한 스냅샷들이 집중적으로 생성되거나 스냅샷이 가진 특성이 변화될 경우, 메모리 데이터베이스 내에서의 저장 가치를 잃을 수가 있다. 따라서 메모리 데이터베이스에 불필요한 스냅샷들이 축적되는 문제를 해결하고 메모리의 이용성과 성능을 보존하기 위해서 효율적으로 스냅샷들을 교체하는 기법이 필요하다. 본 논문에서는 다중 레벨 공간 DBMS에서 질의 패턴을 이용한 효율적인 스냅샷 교체 기법을 제안한다. 제안된 기법은 메모리 데이터베이스 내에서 스냅샷에 대한 교체요청이 있을 경우, 메모리 데이터베이스 및 메모리 관리 시스템의 상창을 분석하여 주어진 상황에 대응하는 스냅샷 교체 기법을 수행한다.

  • PDF

SARAPAN-A Simulated-Annealing-Based Tool to Generate Random Patterned-Channel-Age in CANDU Fuel Management Analyses

  • Kastanya, Doddy
    • Nuclear Engineering and Technology
    • /
    • 제49권1호
    • /
    • pp.267-276
    • /
    • 2017
  • In any reactor physics analysis, the instantaneous power distribution in the core can be calculated when the actual bundle-wise burnup distribution is known. Considering the fact that CANDU (Canada Deuterium Uranium) utilizes on-power refueling to compensate for the reduction of reactivity due to fuel burnup, in the CANDU fuel management analysis, snapshots of power and burnup distributions can be obtained by simulating and tracking the reactor operation over an extended period using various tools such as the $^*SIMULATE$ module of the Reactor Fueling Simulation Program (RFSP) code. However, for some studies, such as an evaluation of a conceptual design of a next-generation CANDU reactor, the preferred approach to obtain a snapshot of the power distribution in the core is based on the patterned-channel-age model implemented in the $^*INSTANTAN$ module of the RFSP code. The objective of this approach is to obtain a representative snapshot of core conditions quickly. At present, such patterns could be generated by using a program called RANDIS, which is implemented within the $^*INSTANTAN$ module. In this work, we present an alternative approach to derive the patterned-channel-age model where a simulated-annealing-based algorithm is used to find such patterns, which produce reasonable power distributions.

간섭기반 스냅샷 분광편광위상측정의 열 안정성 분석 (Thermal stability analysis of interferometric snapshot spectro-polarimeter)

  • 최인호;뎀베레바마라;제야쿠마르폴마단;최석현;김준호;백병준;김대석
    • 반도체디스플레이기술학회지
    • /
    • 제17권3호
    • /
    • pp.70-74
    • /
    • 2018
  • In typical spectroscopic ellipsometry, the optical and geometrical properties of thin film and nano pattern can be obtained by measuring the polarization state of light reflected/transmitted from the object by rotating a analyzer or a compensator. We proposed a snapshot spectroscopic ellipsometric system based on a modified Michelson interferometer to overcome the time-consuring measurement principle due to rotating part. The proposed system provides spectral ellipsometric parameters (psi, delta) in real time by using a single spectral interference signal generated in the interferometric polarization module. However, it has a long-term stability problem resulting in delta(k) drift. In this paper, it is experimentally proved that the drift problem is caused by anisotropic refractive index change of the beam intersection layer in beam splitter of interferometer.

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.