The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] file(200hit)

161-180hit(200hit)

  • Evaluation of 'Plug-in' Partial File Modification Mechanisms for Node Systems

    Hiroshi SUNAGA  Ryoichi NAKAMURA  Tetsuyasu YAMADA  

     
    PAPER-Switching and Communication Processing

      Vol:
    E82-B No:3
      Page(s):
    500-511

    Three types of mechanisms were evaluated to determine their applicability to partially modifying an online switching system file and to creating a partial file during the debugging phase. First, the applicability of the basic plug-in mechanism, currently used in commercial switching systems, was evaluated by using data obtained from an initial implementation of PHS and ATM switching systems. It was found to be applicable irrespective of software type (call-processing or OA&M) and service type (PHS or ATM). It was also found to be applicable to both specification changes and service feature additions. Then, an extended plug-in mechanism that is enhanced to be more robust against complicated software behaviour was evaluated by simulation. It was found to cover cases where the basic plug-in mechanism is difficult to apply. Used together, these two mechanisms guarantee stable and effective file management of an online switching system. A plug-in for offline file creation was found to be applicable to almost all types of file modifications, except when the interface definition is significantly changed. These plug-in mechanisms can serve as the basis for managing the files in multimedia communication service systems.

  • The Complexity of an Optimal File Transfer Problem

    Yoshihiro KANEKO  Shoji SHINODA  

     
    LETTER-Graphs and Networks

      Vol:
    E82-A No:2
      Page(s):
    394-397

    A problem of obtaining an optimal file transfer on a file transmission net N is to consider how to distribute, with a minimum total cost, copies of a certain file of information from some vertices to others on N by the respective vertices' copy demand numbers. This paper proves such a problem to be NP-hard in general.

  • Distributed Coupling of Dual-Modes in a Circular Resonator and Low-Profile Dielectric Disk Resonator BPF

    Ikuo AWAI  Arun Chandra KUNDU  

     
    PAPER-Microwave and Millimeter Wave Technology

      Vol:
    E82-C No:2
      Page(s):
    393-401

    A novel method is proposed to calculate the distributed coupling of dual-modes in a circular resonator. New theoretical expressions are devised to accumulate the infinitesimal coupling between orthogonal modes and their validity is justified by the FD-TD analysis and experiments. The distributed coupling concept of a circular disk resonator is applied to a square disk resonator to calculate its resonant frequency. We have fabricated two types of low-profile dual-mode square dielectric disk resonator BPF, using high dielectric constant material (εr = 93) having a dimension of 5 mm 5 mm 1 mm. The filter characteristics are explained by the transmission line circuit model.

  • A Geographic Differential Script File Method for Distributed Geographic Information Systems

    Kyungwol KIM  Yutaka OHSAWA  

     
    PAPER-Spatial and Temporal Databases

      Vol:
    E82-D No:1
      Page(s):
    113-119

    This study presents a method that can be used to manage individual pieces of information in large scale distributed geographic information systems (GIS). In a distributed GIS, ordinary users usually cannot alter any of the contents on the server. The method in this study can be used to alter the content or add individual datums onto these types of non-write-permitted data sets. The authors have called it a 'Geographic Differential Script File' (GDSF). A client creates a GDSF, which contains private information that is to be added onto the served data. The client keeps this file on a local disk. When the user employs the data, he applies the differential script sequence onto the downloaded data in order to retrieve the information. GDSF is a collection of graphic operation commands which insert and delete objects as well as modify operations. GDSF also contains modifications of the attribute information of geographic entities. This method can also be used to revise information that is published on ROM media, e. g. CD-ROM or DVD-ROM, as well as in a distributed environment. In this paper, the method and results of applying it are presented.

  • Disk Allocation Methods Using Genetic Algorithm

    Dae-Young AHN  Kyu-Ho PARK  

     
    PAPER-Computer Systems

      Vol:
    E82-D No:1
      Page(s):
    291-300

    The disk allocation problem examined in this paper is finding a method to distribute a Binary Cartesian Product File on multiple disks to maximize parallel disk I/O accesses for partial match retrieval. This problem is known to be NP-hard, and heuristic approaches have been applied to obtain suboptimal solutions. Recently, efficient methods such as Binary Disk Modulo (BDM) and Error Correcting Code (ECC) methods have been proposed along with the restrictions that the number of disks in which files are stored should be a power of 2. In this paper, a new Disk Allocation method based on Genetic Algorithm (DAGA) is proposed. The DAGA does not place restrictions on the number of disks to be applied and it can allocate the disks adaptively by taking into account the data access patterns. Using the schema theory, it is proven that the DAGA can realize a near-optimal solution with high probability. Comparing the quality of solution derived by the DAGA with the General Disk Modulo (GDM), BDM, and ECC methods through the simulation, shows that 1) the DAGA is superior to the GDM method in all the cases and 2) with the restrictions being placed on the number of disks, the average response time of the DAGA is always less than that of the BDM method and greater than that of the ECC method in the absence of data skew and 3) when data skew is considered, the DAGA performs better than or equal to both BDM and ECC methods, even when restrictions on the number of disks are enforced.

  • An Ultra High-Speed File Server with 105 Mbytes/s Read Performance Based on a Personal Computer

    Tetsuo TSUJIOKA  Tetsuya ONODA  

     
    PAPER-Network Design, Operation, and Management

      Vol:
    E81-B No:12
      Page(s):
    2503-2508

    This paper proposes a novel ultra high-speed file server based on a personal computer (PC) to provide the instantaneous delivery of huge files, like movie files, graphic images and computer programs, over high-speed networks. In order to improve the sustained sequential read speed from arrays of hard drives to host memory in the server, two key techniques are proposed: "multi-stage striping (MSS)" and the "sequential file system (SFS)." An experimental file server based on a general-purpose PC is constructed and its performance is measured. The results show that the server offers ultra high read speeds, up to 105Mbytes/s, with just 8 hard drives.

  • Network Design and System Performance of FREDERICFile Retrieval Engineering on Distributed EnviRonment and Interactive Communication System

    Mitsuru MIYAUCHI  Masashi SHINONOME  Kenzo TAKAHASHI  Kouki MIYAZAWA  

     
    PAPER-Network Design, Operation, and Management

      Vol:
    E81-B No:12
      Page(s):
    2454-2460

    An extended desktop multimedia conference system named FREDERIC (File Retrieval Engineering on Distributed EnviRonment and Interactive Communication system) has been developed for international cooperative work by sharing CAD and image data among multi-point users. This paper describes the basic network design concept of utilizing the Internet as a best-effort service and ISDN as a high-speed guaranteed service. Service system requirements and designs were developed to access common databases and collaborative work of multimedia information those are shared by customers with desktop computers and to allow remote offices to use a plant walkthrough system. The performance of the prototype system especially focused on the file transmission time which is the key factor in developing and constructing the system. By applying the image compression technology of multi-tone entropy coding, it is shown that the short time CAD data transfer to meet the requirements can be achieved.

  • Millimeter-Wave Multipath Propagation Delay Characteristics in the Outdoor Mobile Radio Environments

    Kazunori KIMURA  Jun HORIKOSHI  

     
    LETTER-Antennas and Propagation

      Vol:
    E81-B No:8
      Page(s):
    1696-1699

    Millimeter-wave propagation characteristics are measured in the outdoor environments. Especially, specific features in the urban area and the open meadowland are compared.

  • File Allocation Designs for Distributed Multimedia Information Networks

    Akiko NAKANIWA  Hiroyuki EBARA  Hiromi OKADA  

     
    PAPER-Heterogeneous Multimedia Servers

      Vol:
    E81-B No:8
      Page(s):
    1647-1655

    In this paper, we study the optimal allocation of multimedia files in distributed network systems. In these systems, the files are shared by users connected with different servers geographically separated, and each file must be stored in at least one of servers. Users can access any files stored in any servers connected with high-speed communication networks. Copies of the files accessed frequently are to be stored in several servers that have databases. So, it is one of the most important problems how to assign the files to servers in view of costs and delays. Considering these problems in heterogeneous network environments, we present a new system model that covers wide range of multimedia network applications like VOD, CALS, and so on. In these systems, it is obvious that there is trading-off relationship between costs and delays. Our objective is to find the optimal file allocation such that the total cost is minimized subject to the total delay. We introduce a 0-1 integer programming formulation for the optimization problem, and find the optimal file allocation by solving these formulae.

  • A High-Resolution Measurement System for Surface Profile of Electric Contact

    Yasuo EBARA  Hideaki SONE  Yoshiaki NEMOTO  Tasuku TAKAGI  

     
    LETTER

      Vol:
    E81-C No:3
      Page(s):
    432-434

    We discussed on relationship between the width of slit ray and the accuracy of the measurement system for surface profile of electric contact. To obtain resolution of 10 [µm], we designed the mechanism which keeps constant the focal length between the object and the lens. As a result, the width of slit ray was clear in the whole surface. A section image could measured exactly and enhanced the resolution.

  • Applicability Evaluation of Service Feature Enhancement Using Plug-in Modification Technique

    Keiichi KOYANAGI  Hiroshi SUNAGA  Tetsuyasu YAMADA  Hiromasa IKEDA  

     
    PAPER-Communication Software

      Vol:
    E81-B No:1
      Page(s):
    58-65

    The Non-stop Service-Enhanceable Software (NOSES) platform was developed as part of our overall plan to establish a communications software platform that can be customized for use by various communications systems, such as STM, ATM and IN. The developed NOSES techniques are call-recovery restart, system file update, and on-line partial file modification, so called "Plug-in"; they were achieved by using dynamic program modification. A system-file update inevitably affects calls in service, despite efforts to save in-service calls by copying the call data from the old file to the new one. We therefore developed a different approach: Plug-in modification. This paper evaluates the applicability of the plug-in mechanism of the NOSES platform. Plug-in is a dynamic partial-file modification technique that does not affect calls in service in a communication switching system. In order to apply plug-in program modification widely, the static and dynamic properties of the modified software must be considered. Therefore, an applicability judgement matrix is introduced. The evaluated applicability of plug-in based on case studies and field data was about 60% for service feature additions and modifications. Thus, plug-in is effective for file maintenance of switching systems from the viewpoint of quick provisioning of new service features and bug fixes.

  • False Drop Analysis of Set Retrieval with Signature Files

    Hiroyuki KITAGAWA  Yoshiharu ISHIKAWA  

     
    PAPER-Databases

      Vol:
    E80-D No:6
      Page(s):
    653-664

    Modern database systems have to support complex data objects, which appear in advanced data models such as object-oriented data models and nested relational data models. Set-valued objects are basic constructs to build complex structures in those models. Therefore, efficient processing of set-valued object retrieval (simply, set retrieval) is an important feature required of advanced database systems. Our previous work proposed a basic scheme to apply superimposed coded signature files to set retrieval and showed its potential advantages over the B-tree index based approach using a performance analysis model. Retrieval with signature files is always accompanied by mismatches called false drops, and proper control of the false drops is indispensable in the signature file design. This study intensively analyzes the false drops in set retrieval with signature files. First, schemes to use signature files are presented to process set retrieval involving "has-subset," "is-subset," "has-intersection," and "is-equal" predicates, and generic formulas estimating the false drops are derived. Then, three sets of concrete formulas are derived in three ways to estimate the false drops in the four types of set retrieval. Finally, their estimates are validated with computer simulations, and advantages and disadvantages of each set of the false drop estimation formulas are discussed. The analysis shows that proper choice of estimation formulas gives quite accurate estimates of the false drops in set retrieval with signature files.

  • Parallel File Access for Implementing Dynamic Load Balancing on a Massively Parallel Computer

    Masahisa SHIMIZU  Yasuhiro OUE  Kazumasa OHNISHI  Toru KITAMURA  

     
    PAPER

      Vol:
    E80-D No:4
      Page(s):
    466-472

    Because a massively parallel computer processes vast amounts of data and generates many access requests from multiple processors simultaneously, parallel secondary storage requires large capacity and high concurrency. One effective method of implementation of such secondary storage is to use disk arrays which have multiple disks connected in parallel. In this paper, we propose a parallel file access method named DECODE (dynamic express changing of data entry) in which load balancing of each disk is achieved by dynamic determination of the write data position. For resolution of the problem of data fragmentation which is caused by the relocation of data during a write process, the concept of "Equivalent Area" is introduced. We have performed a preliminary performance evaluation using software simulation under various access statuses by changing the access pattern, access size and stripe size and confirmed the effectiveness of load balancing with this method.

  • Three-Mode Failure Model for Reliability Analysis of Distributed Programs

    Tatsuhiro TSUCHIYA  Yoshiaki KAKUDA  Tohru KIKUNO  

     
    PAPER-Distributed Systems

      Vol:
    E80-D No:1
      Page(s):
    3-9

    The distributed program reliability (DPR) is a useful measure for reliability evaluation of distributed systems. In previous methods, a two-mode failure model (working or failed) is assumed for each computing node. However, this assumption is not realistic because data transfer may be possible by way of a computing node even when this node can neither execute programs nor handle its data files. In this paper, we define a new three-mode failure model for representing such a degraded operational state of computing nodes, and present a simple and efficient analysis method based on graph theory. In order to represent the degraded operational state, a given graph expressing a distributed system is augmented by adding new edges and vertices. By traversing this augmented graph, the reliability measure can be computed. Examples show the clear difference between the results of our proposed method and those of the previous ones.

  • Similar Key Search Files Based on Hashing

    Sheng-ta YANG  Eiichi TANAKA  

     
    LETTER-Databases

      Vol:
    E80-D No:1
      Page(s):
    101-105

    The storage utilizations of existing similar key search files based on B+-tree and extensible hashing were under 70% and should be improved. A similar key search file based on extensible hashing with partial expansion and that on linear hashing with partial expansion are proposed. Computer simulations on about 230 thousand English words show that the storage utilizations of the files with 32 expansive steps are about 97%.

  • Individual Identification by Unifying Profiles and Full Faces

    Hiroto SHINGAI  Ryuzo TAKIYAMA  

     
    PAPER-Image Processing,Computer Graphics and Pattern Recognition

      Vol:
    E79-D No:9
      Page(s):
    1274-1278

    An individual identification system is developed. In this system, we unify profile curve identification and full face image identification to obtain more successful recognition rate. In profile cruve identification process, the P-type Fourier descriptor is made use of. In full face image identification process, mosaic density values are made use of. A combination of the two processes shows higher recognition rates than those obtained by each single process.

  • Nonadaptive Fault-Tolerant File Transmission in Rotator Graphs

    Yukihiro HAMADA  Feng BAO  Aohan MEI  Yoshihide IGARASHI  

     
    PAPER

      Vol:
    E79-A No:4
      Page(s):
    477-482

    A directed graph G = (V,E) is called the n-rotator graph if V = {a1a2an|a1a2an is a permutation of 1,2,,n} and E = {(a1a2an,b1b2bn)| for some 2 i n, b1b2bn = a2aia1ai+1an}. We show that for any pair of distinct nodes in the n-rotator graph, we can construct n - 1 disjoint paths, each length < 2n, connecting the two nodes. We propose a nonadaptive fault-tolerant file transmission algorithm which uses these disjoint paths. Then the probabilistic analysis of its reliability is given.

  • Capacitance-Voltage Characteristics of Buried-Channel MOS Capacitors with a Structure of Subquarter-Micron pMOS

    Masayasu MIYAKE  Yukio OKAZAKI  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E79-C No:3
      Page(s):
    430-436

    High-frequency capacitance-voltage (C-V) characteristics of buried-channel MOS capacitors with a structure of subquarter-micron pMOS have been measured and analyzed, emphasizing transient behavior. The C-V characteristics, including transient behavior, of buried-channel MOS capacitors that have a counter-doped p layer at the surface of n substrate are very similar to those of surface-channel MOS capacitors of n substrate if the counter-doped layer is shallow enough to be fully inverted at large positive bias. As gate voltage is decreased, equilibrium capacitance for inversion (accumulation for the counter-doped layer) reaches a minimum value and then slightly increases to saturate, which is peculiar to buried-channel capacitors. The gate voltage for minimum capacitance, which has been used to estimate the threshold voltage, changes dramatically by illumination even in room light. Net doping profiles of n-type dopant can be obtained from pulsed C-V characteristics even for buried-channel capacitors. For MOS capacitors with thinner gate oxide (5 nm), steady-state C-V curve is not an equilibrium one but a deep depletion one at room temperature. This is because holes are drained away by tunneling through the thin gate oxide.

  • Security Mechanism of Privacy Enhanced Shared File System Suitable for Mobile Access

    Atsushi SHIMBO  Toshinari TAKAHASHI  Masao MUROTA  

     
    PAPER

      Vol:
    E79-A No:1
      Page(s):
    102-109

    This paper describes a novel shared file system, whose main features are enhanced security and its concurrency control mechanism. The system is especially suitable for access from mobile hosts. Users can edit their shared files concurrently. Shared files are encrypted and decrypted only by clients, and the file server cannot know the contents. The server asynchronously receives the edited parts, which are already encrypted, and merges them into the current version, deciphering neither the stored file nor the encrypted editing data. We call the mechanism 'privacy enhanced merging'. The mechanism and the underlying encryption algorithm, shared file data structure and procedures followed by clients and the server are shown.

  • An Economical Analysis for a Hybrid Data Backup System

    Masanori ODAGIRI  Tadashi DOHI  Naoto KAIO  Shunji OSAKI  

     
    PAPER-Reliability and Fault Analysis

      Vol:
    E79-A No:1
      Page(s):
    118-125

    This article considers a hybrid data backup model for a file system, which combines both conventional magnetic disk (MD) and write-once, read-many optical disk (OD). Since OD recently is a lower cost medium as well as a longer life medium than the ordinary MD, this kind of backup configuration is just recognized to be important. We mathematically formulate the hybrid data backup model and obtain the closed-form average cost rate when the system failure time and the recovery time follow exponential distributions. Numerical calculations are carried out to obtain the optimal backup policy, which is composed of two kinds of backup sizes from the main memory to MD and from MD to OD and minimizes the average cost rate. In numerical examples, the dependence of the optimal backup policy on the failure and the recovery mechanism is examined.

161-180hit(200hit)