2,393 research outputs found

    Hadoop Performance Analysis Model with Deep Data Locality

    Get PDF
    Background: Hadoop has become the base framework on the big data system via the simple concept that moving computation is cheaper than moving data. Hadoop increases a data locality in the Hadoop Distributed File System (HDFS) to improve the performance of the system. The network traffic among nodes in the big data system is reduced by increasing a data-local on the machine. Traditional research increased the data-local on one of the MapReduce stages to increase the Hadoop performance. However, there is currently no mathematical performance model for the data locality on the Hadoop. Methods: This study made the Hadoop performance analysis model with data locality for analyzing the entire process of MapReduce. In this paper, the data locality concept on the map stage and shuffle stage was explained. Also, this research showed how to apply the Hadoop performance analysis model to increase the performance of the Hadoop system by making the deep data locality. Results: This research proved the deep data locality for increasing performance of Hadoop via three tests, such as, a simulation base test, a cloud test and a physical test. According to the test, the authors improved the Hadoop system by over 34% by using the deep data locality. Conclusions: The deep data locality improved the Hadoop performance by reducing the data movement in HDFS

    Development and Validation of a Postpartum Care Mobile Application for First-time Mothers

    Get PDF
    PURPOSE: The aims of the study were to develop mobile application for postpartum care of first-time mothers and to validate it's effect. METHODS: Using a nonequivalent control group pretest-posttest design, 52 first-time mothers were recruited (26 each in experimental and control) and the experimental group used the mobile application for 6 weeks after delivery. Postpartum self-care knowledge and confidence, infant care knowledge and confidence, and postpartum depressive mood (Edinburgh Postnatal Depression Scale) were measured before discharge from the hospital and 6 weeks later. RESULTS: Women who have used the postpartum care mobile application reported higher levels of postpartum self-care knowledge (p=.030) and confidence (p=.023) infant care knowledge (p=.001) and confidence (p=.004), while scores of postpartum depression (p=.021) were lower than those in the control group. CONCLUSION: The postpartum-care mobile application developed in this research may be effective in reinforcing knowledge and confidence for postpartum self-care and infant care and in reducing postpartum depressive mood

    The Advances of Laparoscopic Gastrectomy for Gastric Cancer

    Get PDF
    Laparoscopic gastrectomy is evolving. With the increasing expertise and experience of oncologic surgeons in the minimally invasive surgery for gastric cancer, the indication for laparoscopic gastrectomy is expanding to advanced cases. Many studies have demonstrated the benefits of minimally invasive surgery, including reduced risk of surgery-related injury, reduced blood loss, less pain, and earlier recovery. In order to establish concrete evidence for the suitability of minimal invasive surgery for gastric cancer, many multicenter RCTs, comparing the short- and long-term outcomes of laparoscopic versus open surgery, are in progress. Advances in laparoscopic gastrectomy are moving toward increasingly minimally invasive approaches that enable the improvement of the quality of life of patients, without compromising on oncologic safety

    Atomic Resolution Imaging of Rotated Bilayer Graphene Sheets Using a Low kV Aberration-corrected Transmission Electron Microscope

    Get PDF
    Modern aberration-corrected transmission electron microscope (TEM) with appropriate electron beam energy is able to achieve atomic resolution imaging of single and bilayer graphene sheets. Especially, atomic configuration of bilayer graphene with a rotation angle can be identified from the direct imaging and phase reconstructed imaging since atomic resolution Moir pattern can be obtained successfully at atomic scale using an aberration-corrected TEM. This study boosts a reliable stacking order analysis, which is required for synthesized or artificially prepared multilayer graphene, and lets graphene researchers utilize the information of atomic configuration of stacked graphene layers readily.ope

    Beyond slurry-cast supercapacitor electrodes: PAN/MWNT heteromat-mediated ultrahigh capacitance electrode sheets

    Get PDF
    Supercapacitors (SCs) have garnered considerable attention as an appealing power source for forthcoming smart energy era. An ultimate challenge facing the SCs is the acquisition of higher energy density without impairing their other electrochemical properties. Herein, we demonstrate a new class of polyacrylonitrile (PAN)/multi-walled carbon tube (MWNT) heteromat-mediated ultrahigh capacitance electrode sheets as an unusual electrode architecture strategy to address the aforementioned issue. Vanadium pentoxide (V2O5) is chosen as a model electrode material to explore the feasibility of the suggested concept. The heteromat V2O5 electrode sheets are produced through one-pot fabrication based on concurrent electrospraying (for V2O5 precursor/MWNT) and electrospinning (for PAN nanofiber) followed by calcination, leading to compact packing of V2O5 materials in intimate contact with MWNTs and PAN nanofibers. As a consequence, the heteromat V2O5 electrode sheets offer three-dimensionally bicontinuous electron (arising from MWNT networks)/ion (from spatially reticulated interstitial voids to be filled with liquid electrolytes) conduction pathways, thereby facilitating redox reaction kinetics of V2O5 materials. In addition, elimination of heavy metallic foil current collectors, in combination with the dense packing of V2O5 materials, significantly increases (electrode sheet-based) specific capacitances far beyond those accessible with conventional slurry-cast electrodes.ope

    The Analysis of Antecedents for the Video Telephony Service Adoption: From the Value-Based Perspective

    Get PDF
    Korean Telecommunications Industry has a large scale market and boasts on high service quality and high technologies enough to provide the Video Telephony Service (VTS) satisfactorily. For many years, Korean telephone companies have been investing enormous sums to advertise their services widely and to allow their customers to change their cell phones for the third-generation (3G) devices indispensable for the service. However, despite their efforts, the VTS adoption rate in Korea is very low and it seems that customers seldom feel the necessity to use. From this viewpoint, it becomes necessary to find the antecedents influencing the intention to use for the VTS empirically. For this purpose, we proposed several hypotheses from the perspective of the Value-based Adoption Model (VAM). VAM is a conceptual model suggested to overcome some limitations of the Technology Acceptance Model (TAM) in explaining the adoption of new Information and Communication Technology (ICT) such as Mobile Internet where customers play the role of service consumer rather than simply technology users. We conducted a survey on 125 samples and found that customers perceive the value of VTS when they can recognize the service is functionally useful (Perceived Usefulness) and when they feel they can put themselves forward by using it (Self-Expression). On the other hand, the other factors including Technical Complexity, Privacy Concern and Perceived Price (Fee) don’t have statistically significant influences on the Perceived Value of VTS

    A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks

    Full text link
    As NIST is putting the final touches on the standardization of PQC (Post Quantum Cryptography) public key algorithms, it is a racing certainty that peskier cryptographic attacks undeterred by those new PQC algorithms will surface. Such a trend in turn will prompt more follow-up studies of attacks and countermeasures. As things stand, from the attackers' perspective, one viable form of attack that can be implemented thereupon is the so-called "side-channel attack". Two best-known countermeasures heralded to be durable against side-channel attacks are: "masking" and "hiding". In that dichotomous picture, of particular note are successful single-trace attacks on some of the NIST's PQC then-candidates, which worked to the detriment of the former: "masking". In this paper, we cast an eye over the latter: "hiding". Hiding proves to be durable against both side-channel attacks and another equally robust type of attacks called "fault injection attacks", and hence is deemed an auspicious countermeasure to be implemented. Mathematically, the hiding method is fundamentally based on random permutations. There has been a cornucopia of studies on generating random permutations. However, those are not tied to implementation of the hiding method. In this paper, we propose a reliable and efficient verification of permutation implementation, through employing Fisher-Yates' shuffling method. We introduce the concept of an n-th order permutation and explain how it can be used to verify that our implementation is more efficient than its previous-gen counterparts for hiding countermeasures.Comment: 29 pages, 6 figure
    corecore