• Title/Summary/Keyword: 요소그룹

Search Result 841, Processing Time 0.029 seconds

Design of an Leader Election Protocol in Mobile Ad Hoc Distributed Systems (분산 이동 시스템에서 선출 프로토콜의 설계)

  • Park, Sung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.53-62
    • /
    • 2008
  • The Election paradigm can be used as a building block in many practical problems such as group communication, atomic commit and replicated data management where a protocol coordinator might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need an election protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile ad hoc computing environment. Mobile ad hoc systems are more prone to failures than conventional distributed systems. Solving election in such an environment requires from a set of mobile nodes to choose a unique node as a leader based on its priority despite failures or disconnections of mobile nodes. In this paper, we describe a solution to the election problem from mobile ad hoc computing systems. This solution is based on the Group Membership Detection algorithm.

A Study on the Development of Standard Indicators for College & University Libraries' Evaluation (대학도서관평가 표준지표 개발에 관한 연구)

  • Kim, Giyeong;Choi, Sang-Ki;Kim, Ju-Sup;Ahn, Hye-Rim
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.3
    • /
    • pp.303-334
    • /
    • 2014
  • This study aims to develop standard indicators and methodology for college & university libraries' evaluation based on the agreement among various stake-holders, then suggests a new evaluation system. For the goal, we identify purposes and required conditions, then develop indicators for the evaluation through open-ended interviews, a questionnaire survey, and focus group for reaching an agreement on the included indicators among the stake-holders, finally we construct the overall evaluation structure and weighting system. The overall structure is developed based on process-centered approach, then both the internal and functional viewpoint and external and service-oriented viewpoint are considered. The weighting system is based on the balance among the process categories, such as resources, process, and output elements. Additionally, we suggest methodology for the evaluation and annual improvement process for ongoing improvement of the evaluation system. We expect that the results from this study will contribute not only to the evaluation activities but also to active discussions on library performance and its predictor factors.

A Real-Time Intrusion Detection based on Monitoring in Network Security (네트워크 보안에서 모니터링 기반 실시간 침입 탐지)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.9-15
    • /
    • 2013
  • Recently, Intrusion detection system is an important technology in computer network system because of has seen a dramatic increase in the number of attacks. The most of intrusion detection methods do not detect intrusion on real-time because difficult to analyze an auditing data for intrusions. A network intrusion detection system is used to monitors the activities of individual users, groups, remote hosts and entire systems, and detects suspected security violations, by both insider and outsiders, as they occur. It is learns user's behavior patterns over time and detects behavior that deviates from these patterns. In this paper has rule-based component that can be used to encode information about known system vulnerabilities and intrusion scenarios. Integrating the two approaches makes Intrusion Detection System a comprehensive system for detecting intrusions as well as misuse by authorized users or Anomaly users (unauthorized users) using RFM analysis methodology and monitoring collect data from sensor Intrusion Detection System(IDS).

Factors Affecting Injury Severity in Pedestrian-Vehicle Crash by Novice Driver (초보 운전자에 의한 보행자-차량 교통사고의 심각도 영향 요인 분석)

  • Choe, Sae-Ro-Na;Park, Jun-Hyeong;O, Cheol
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.4
    • /
    • pp.43-51
    • /
    • 2011
  • Since a variety of factors are associated with crash occurrence, the analysis of causes of crash is a hard task for traffic researchers and engineers. Among contributing factors leading to crash, the characteristics of driver is of keen interest. This study attempted to identify factors affecting the severity of pedestrian in the collision between pedestrian and vehicle. In particular, our analyses were focused on the novice driver. A binary logistic regression technique was adopted for the analyses. The results showed that driver's age, crash location, and the frequency of violations were dominant factors for the severity. Findings are expected to be useful information for deffective policy- and education-based countermeasures.

An Automatic Object Extraction Method Using Color Features Of Object And Background In Image (영상에서 객체와 배경의 색상 특징을 이용한 자동 객체 추출 기법)

  • Lee, Sung Kap;Park, Young Soo;Lee, Gang Seong;Lee, Jong Yong;Lee, Sang Hun
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.459-465
    • /
    • 2013
  • This paper is a study on an object extraction method which using color features of an object and background in the image. A human recognizes an object through the color difference of object and background in the image. So we must to emphasize the color's difference that apply to extraction result in this image. Therefore, we have converted to HSV color images which similar to human visual system from original RGB images, and have created two each other images that applied Median Filter and we merged two Median filtered images. And we have applied the Mean Shift algorithm which a data clustering method for clustering color features. Finally, we have normalized 3 image channels to 1 image channel for binarization process. And we have created object map through the binarization which using average value of whole pixels as a threshold. Then, have extracted major object from original image use that object map.

Assessing e-Book Success Model based on the Information System Success Model (정보 시스템 성공 모형을 적용한 e-Book 성공 모형의 평가)

  • Oh, Chang-Gyu
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.4
    • /
    • pp.61-82
    • /
    • 2012
  • With the proliferation of the e-Book industry, people are increasingly interacting with e-Book as information systems. While e-Book contains the components regarded as an information system(IS), few studies have been conducted to assess the success of e-Book from IS perspective. This study proposed and empirically evaluated an e-Book success model. Structural equation modeling techniques were applied to the data collected by questionnaire from 241 users of e-Book. Every relationship among constructs was significantly supported by the data. This finding provided theoretical implications to extend existing e-Book research into the broader IS research area. Furthermore, this study illustrated the use of multi-group structural analysis to test the differences in structural weights between high e-Book and high paper book utility groups. The managerial implications of the results in setting different relationships and allocating appropriate paths to vitalize the e-Book market were discussed.

Performance Comparison of Korean Tongue and Groove Joint between Hand-made and Pre-cut (주먹장 접합부의 수가공과 기계가공의 성능비교)

  • Kim, Gwang-Chul;Kim, Jun-Ho
    • Journal of the Korean Wood Science and Technology
    • /
    • v.44 no.5
    • /
    • pp.664-676
    • /
    • 2016
  • Recently, the demand on the Hanok have been increased with social change. However, Hanok has a major problem of a rising costs caused by hand-made process. So, performance comparison between hand-made process and pre-cut process was conducted to modularize the joints in Hanok. Douglas-fir was used to manufacture the structural size dovetail joints by hand-made and pre-cut precess. The bending strengths on joints with two process were evaluated. The average ultimate load of pre-cut joints was 1.5 times higher than that of hand-made joints. F-test results in both process showed a great relationships between ultimate load and tenon's size variation. The length and thickness of tenon showed a proportional relationship with the ultimate load, but the tenon width showed inverse proportion with the ultimate load. This results may be used as basic data for the joint modularization of Hanok.

The Study for the Method of Network Security Domain Architecture Designing (네트워크 보안도메인 아키텍처 설계방법 연구)

  • Noh, Si-Choon
    • Journal of Digital Contents Society
    • /
    • v.8 no.2
    • /
    • pp.165-171
    • /
    • 2007
  • The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security domain is the concept to distinguish the domain from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security domain could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every domain. For the establishment of security domain it is needed to show what criterion of net work should be set up. This study is to research the criterion for topology factor, security domain. structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture. The purpose of this paper is to suggest the necessity of development of security mechanism and the distinguished blocking function according to the level of security domain.

  • PDF

A Study of Web Navigation Design to Improve Usability of Old-aged Users (고령자의 사용편의성을 위한 웹 네비게이션 디자인에 관한 연구)

  • Bae, Yoon-Sun;Lee, Hyun-Ju
    • Archives of design research
    • /
    • v.19 no.1 s.63
    • /
    • pp.129-140
    • /
    • 2006
  • In this study, I would like to suggest a new model of web navigation design which can enhance old-aged users web usability. I would like to prove that when users enjoy web navigation design, older-users access information much more effectively. Using a survey, suggest some types of web navigation designed for old-aged users. After that, based on the result of the prepatory survey, I conducted an experiment with 4 types of web navigation designs, which have been developed to reflect varying stages of comprehensibility. My survey focused three points. First I tested whether they lost their way while searching for information. Secondly, if they did lose their way, I checked whether they could recover from their errors and find their way back. Thirdly, I investigated whether layout, location and size of the web navigation design factors affected usability. The results of my survey indicated that old-aged users spend the shortest time, have the easiest interface, and have least error incidence under the web navigation design to enhance old-aged users web usability.Thus, developing a web navigation design for old-aged users can encourage older people to be more involved with the internet, especially in the aging society.

  • PDF

An Efficient Multicast Architecture for IP-Based Mobile Core Networks (IP기반 모바일 코어 네트워크에서의 효율적인 멀티캐스트 아키텍처)

  • Kim Won-Tea;Kim Hyo-Eun;Park Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.6 s.348
    • /
    • pp.9-22
    • /
    • 2006
  • When the legacy multicast routing protocols are adopted in If-based mobile core networks, there are some problems such as traffic injection from unnecessary sources, traffic overhead by group management and router performance degradation by large amount of multicast session information. In this paper, we propose a stateless multicast mechanism which has no need to maintain multicast information for session status and reduces redundant network overhead for maintaining multicast tree. In addition interworking with IGMPv3 gets rid of traffic from unnecessary sources which have no registration from receivers. The operations of essential components including a gateway node for interworking with the legacy Internet multicast network, a gateway node for transparency to radio access network and a intermediate node in mobile core networks, are definitely defined and the proposed communication architecture is completed. Finally we evaluate and approve the performance of the proposed architecture by means of well-designed network simulation.