• Title/Summary/Keyword: Back-end

Search Result 696, Processing Time 0.041 seconds

QoS Guarantee in Partial Failure of Clustered VOD Server (클러스터 VOD 서버의 부분적 장애에서 QoS 보장)

  • Lee, Joa-Hyoung;Jung, In-Bum
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.363-372
    • /
    • 2009
  • For large scale VOD service, cluster servers are spotlighted to their high performance and low cost. A cluster server usually consists of a front-end node and multiple back-end nodes. Though increasing the number of back-end nodes can result in the more QoS streams for clients, the possibility of failures in back-end nodes is proportionally increased. The failure causes not only the stop of all streaming service but also the loss of the current playing positions. In this paper, when a back-end node becomes a failed state, the recovery mechanisms are studied to support the unceasing streaming service. For the actual VOD service environment, we implement a cluster-based VOD servers composed of general PCs and adopt the parallel processing for MPEG movies. From the implemented VOD server, a video block recovery mechanism is designed on parity algorithms. However, without considering the architecture of cluster-based VOD server, the application of the basic technique causes the performance bottleneck of the internal network for recovery and also results in the inefficiency CPU usage of back-end nodes. To address these problems, we propose a new failure recovery mechanism based on the pipeline computing concept.

Exploiting Back-end Fusion in Multi-Core Processors (다중 코어 환경에서의 Back-end Fusion 구현)

  • Park, Jong Hyun;Jeong, I Poom;Ro, Won Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.33-36
    • /
    • 2014
  • 최근 스마트폰이나 태블릿 PC 등의 모바일 디바이스가 상용화 되어감에 따라 그 안에서 핵심적인 처리기능을 담당하는 프로세서의 코어 수가 점차적으로 늘어나고 있다. 많은 수의 코어를 효율적으로 사용하기 위해 여러 가지 메커니즘이 구현되어 있으나, 단일 프로세스를 순차적으로 실행하는 경우 여전히 성능에서의 한계가 존재한다. 병렬화 되어 있지 않은 프로세스의 경우, Amdahl's Law[1]에 따르면 순차적으로 실행을 할 수 밖에 없는 부분이 존재하고, 이 부분은 하나의 코어에서만 실행되기 때문에 많은 연산 자원들이 낭비되는 현상이 발생한다. 본 논문은 다중 코어 환경에서 이러한 잉여자원을 효과적으로 사용하기 위해 Back-end Fusion 이라는 구조를 제안하여 프로세서의 성능 향상을 위한 연구를 진행하였다. Back-end Fusion 이란, 연산 처리를 담당하는 back-end 부분(execution unit, writeback 단계 등)을 필요에 따라 코어 간에 동적으로 재구성하여 성능을 향상시키는 메커니즘이다. 이 재구성된 프로세서의 back-end 를 효율적으로 사용하기 위해, 종속성과 로드 밸런스 등을 고려한 인스트럭션 분배 알고리즘을 함께 제안한다. Intel 사의 x86 Instruction Set Architecture(ISA)를 기반으로 한 시뮬레이터를 이용하여 Back-end Fusion 프로세서의 성능을 측정 해 본 결과 기존의 단일 코어 프로세서에 비해 평균 32.2%의 성능 향상을 확인할 수 있었다.

A Study on Occupant Neck Injury in Rear End Collisions (후방추돌시 탑승자 목 상해 감소를 위한 연구)

  • 이재완;윤경한;박경진
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.8 no.3
    • /
    • pp.130-138
    • /
    • 2000
  • The position of the automobile seat back is very important for the neck injury in the rear-end collisions. The effects of the position have been evaluated experimentally. A sled simulator is utilized with a velocity of 33 km/h. The position is varied by the angle of seat back from 25 to 65 degrees. All the configurations of the seat are fixed except the angle. The neck injuries are calculated by the equations accepted in the industries. Also, the sled tests with other velocities are carried out for the comparison study. Using the results of the test, the effects of seat back strength are discussed to minimize the occupant neck injury in rear end collisions.

  • PDF

Patient Classification Scheme for Patient Information Management in Hospital U-Healthcare System (병원 의료시설 내 U-Healthcare 환경에서 환자 정보 관리를 위한 환자 세분화 기법)

  • Lee, Ki-Jeong;Park, Sung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • UMSN (Ubiquitous Medical Sensor Network) is being used in u-Healthcare system of various medical facilities to identify objects and get information from sensors in real-time. RFID using radio frequency determines objects using Reader, which reads Tags attached to patients. However, there is a security vulnerability wherein Tag send its ID to illegal Reader because Tags always response to Readers request regarding of its Tag ID. In this paper, we propose Tag ID Classification Scheme to reduce Back-end Server traffic that caused by requests to authenticate between Readers and Tags that are attached to medical devices, patients, and sensors; To reduce security threats like eavesdropping and spoofing that sometimes occurred during authentication procedure. The proposed scheme specifies the patient category as a group based on patients Tag ID string. Only allowed Reader can perform authentication procedure with Back-end Server. As a result, we can reduce Back-end Server traffic and security threats.

Continuous Sutures for Microarterial Anastomosis (미세혈관 수술시 혈관개존율 향상을 위한 연구)

  • Jung, Young-Sik;Jeong, Jae-Ho;Choi, See-Ho;Seul, Jung-Hyun
    • Journal of Yeungnam Medical Science
    • /
    • v.3 no.1
    • /
    • pp.237-241
    • /
    • 1986
  • In clinical microsurgery, limitation of space often prohibits rotation of a double clamp in an end-to-end anastomosis, or shortage of length of the secondary vessel in an end-to-side anastomosis does not allow visualization of the back wall. In these situation, back wall repair is extremely difficult. To overcome this problem, we use continuous suture technique without rotation of double clamp for end-to-end and end-to-side anastomosis of the 40 rat femoral arteries. After continuous sutures for microarterial anastomosis, the following results were obtained: Continuous sutures are useful in anastomosis where there is unavoidable limited access to the posterior wall and for some of the larger vessels now being anastomosed in free flap and other reconstructive surgery.

  • PDF

A Case Study on Implementation of UI Development Tool for Web Environment ERP System (Web 환경 ERP시스템의 UI개발도구 구현 사례 연구)

  • Lee, Kang Su;Leam, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.13-24
    • /
    • 2019
  • Each company has different business processes. Since it is impossible that an ERP system contains every different business processes, the productivity of customizing and maintenance well-matched for the business process of a company is the key to successful implementation. This ERP UI development tool was developed for better connection to back-end in terms of customizing and maintenance, integration with design, providing various tools for higher productivity, reusability, and standardized user interface so that it enhances the productivity, meets the UI standard, and copes with upcoming changes of business process. In the further study, the study on the service automation and integrated development environment with front-end and back-end providing through the advanced user convenience development for front-end designer and front-end generator would be carried out.

Design and Implementation of a Ubiquitous Health Care System based on Sensor Network (센서네트워크에 기반한 유비쿼터스 헬스케어 시스템의 설계 및 구현)

  • Kim, Jeong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • In this paper, we have implemented a ubiquitous healthcare system that can measure and check human's health in anytime and anywhere. The implemented prototype are composed of both front-end and back-end. The front-end have several groups: environment sensor group such as temperature, humidity, photo, voice sensor, health sensor group such as blood pressure, heart beat, electrocardiogram, spo2 sensor, gateway for wired/wireless communication, and RFID reader to identify personal. The back-end has a serial forwarder to propagate measurment results, monitor program, and medical information server The implemented sensor node constructs a sensor network using the Zigbee protocol and is ported the tinyOS. The data gathering base node is linux-based terminal that can transfer a sensed medial data through wireless LAN. And, the medical information server stores the processed medical data and can promptly notify the urgent status to the connected medical team. Through our experiments, we've confirmed the possibility of ubiquitous healthcare system based on sensor network using the Zigbee.

Design and Implementation of a ubiquitous health care system (유비쿼터스 헬스 케어 시스템의 설계 및 구현)

  • Kim, Jeong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.921-924
    • /
    • 2007
  • In this paper, we have implemented a ubiquitous healthcare system that can measure and check human's health in anytime and anywhere. The implemented prototype are composed of both front-end and back-end. The front-end have several groups: environment sensor group such as temperature, humidity, photo, voice sensor, health sensor group such as blood pressure, heart beat, electrocardiogram, spo2 sensor, gateway for wired/wireless communication, and RFlD reader to identify personal. The back-end has a serial forwarder to propagate measurment results, monitor program, and medical information server. The implemented sensor node constructs a sensor network using the Zigbee protocol and is ported the TinyOS. The data gathering base node is linux-based terminal that can transfer a sensed medial data through wireless LAN. And, the medical information server stores the processed medical data and can promptly notify the urgent status to the connected medical team. Through our experiments, we've confirmed the possibility of ubiquitous healthcare system based on sensor network using the Zigbee.

  • PDF

A Scheme of Computational Time Reduction on Back-End Server Using Computational Grid (계산 그리드를 이용한 백엔드 서버의 계산시간 단축 방안)

  • Hong, Seong-Pyo;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2695-2701
    • /
    • 2012
  • We need privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect user's privacy in RFID system. The hash-chain based protocol that Ohkubo et. al proposed is the most secure protocol, that satisfies all of the essential security requirements, among existing protocols. But, this protocol has a disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the hash-chain based protocol.

Uncertainty Cases in Economic Evaluation of Back-End Nuclear Fuel Cycle (후행 핵연료주기 경제성 평가의 불확실성 사례)

  • Kim, Hyung-Joon;Cho, Chun-Hyung;Lee, Kyung-Ku
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.6 no.2
    • /
    • pp.141-145
    • /
    • 2008
  • Due to the uncertainties resulting from cost projection, evaluation over long term period, and adequacy of applied discount rate, the economic assessment for back-end fuel cycle is different from each organizations or individuals. In this paper, the features and limitations of some noticeable economic evaluations were investigated and analysed to contribute for the public participation and back-end fuel cycle policy related researches. As a result of analysis, we found that the reprocess and recycling is more economical than direct disposal option, but the result includes high uncertainty that depends on the input parameters.

  • PDF