• Title/Summary/Keyword: 접근블록

Search Result 448, Processing Time 0.027 seconds

Developing an Optimal Location Selection Methodology of Unmanned Parcel Service Box (무인택배함의 최적입지 선정을 위한 방법론 개발)

  • Lee, Hyangsuuk;Chen, Maowei;Choo, Sangho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.4
    • /
    • pp.13-24
    • /
    • 2017
  • This paper presents a sequentially combined method of determining location conditions, the number of unmanned parcel service box and their optimal locations. First of all, block, accessibility and main public facilities are considered as location conditions and then set-covering model and p-median model are adopted for deciding the number of unmanned parcel service box and optimal locations, respectively. A case study for a region composed of small housings and multiplex housings in Ansan is conducted to prove the validation and application of the proposed method. The result indicates that 2 unmanned parcel service boxes are necessary in specific public places. The research contributes to resonable choice of unmanned parcel service boxes, crime reduction relevant to delivery man impersonation and economic benefit due to parcel service industry growth.

Improving Flash Translation Layer for Hybrid Flash-Disk Storage through Sequential Pattern Mining based 2-Level Prefetching Technique (하이브리드 플래시-디스크 저장장치용 Flash Translation Layer의 성능 개선을 위한 순차패턴 마이닝 기반 2단계 프리패칭 기법)

  • Chang, Jae-Young;Yoon, Un-Keum;Kim, Han-Joon
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.101-121
    • /
    • 2010
  • This paper presents an intelligent prefetching technique that significantly improves performance of hybrid fash-disk storage, a combination of flash memory and hard disk. Since flash memory embedded in a hybrid device is much faster than hard disk in terms of I/O operations, it can be utilized as a 'cache' space to improve system performance. The basic strategy for prefetching is to utilize sequential pattern mining, with which we can extract the access patterns of objects from historical access sequences. We use two techniques for enhancing the performance of hybrid storage with prefetching. One of them is to modify a FAST algorithm for mapping the flash memory. The other is to extend the unit of prefetching to a block level as well as a file level for effectively utilizing flash memory space. For evaluating the proposed technique, we perform the experiments using the synthetic data and real UCC data, and prove the usability of our technique.

A Translation-based Approach to Hierarchical Task Network Planning (계층적 작업 망 계획을 위한 변환-기반의 접근법)

  • Kim, Hyun-Sik;Shin, Byung-Cheol;Kim, In-Cheol
    • The KIPS Transactions:PartB
    • /
    • v.16B no.6
    • /
    • pp.489-496
    • /
    • 2009
  • Hierarchical Task Network(HTN) planning, a typical planning method for effectively taking advantage of domain-specific control knowledge, has been widely used in complex real applications for a long time. However, it still lacks theoretical formalization and standardization, and so there are some differences among existing HTN planners in terms of principle and performance. In this paper, we present an effective way to translate a HTN planning domain specification into the corresponding standard PDDL specification. Its main advantage is to allow even many domain-independent classical planners to utilize domain-specific control knowledge contained in the HTN specifications. In this paper, we try our translation-based approach to three different domains such as Blocks World, Office Delivery, Hanoi Tower, and then conduct some experiments with a forward-chaining heuristic state-space planner, FF, to analyze the efficiency of our approach.

DEVS Modeling with Hierarchical Planning: HRG-DEVS (계층적 계획을 이용한 이산 사건 시뮬레이션 모델링: HRG-DEVS)

  • Yi, Mi-Ra
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.2
    • /
    • pp.1-12
    • /
    • 2006
  • As the needs of intelligent systems increase, there have been diverse approaches that combine artificial intelligence (AI) and simulation in the last decade. RG-DEVS, which is the basis for this paper, embedded AI planning techniques into the simulation modeling methodology of DEVS, in order to specify dynamically a simulation model. However, a hierarchy concept, which is used for various types of problem solving systems. is not included in the planning of RG-DEVS. The hierarchy concept reduces the computational cost of planning by reducing the search space, and also makes it easy to apply the hierarchical process flow of a target system to planning. This paper proposes Hierarchical RG-DEVS (HRG-DEVS) in an attempt to insert hierarchical planning capability into RG-DEVS. For the verification of the proposed modeling methodology, HRG-DEVS is applied to model the block's world problem of ABSTRIPS, which is a classical planning problem.

  • PDF

Design and Implementation of XCAP Server (XCAP 서버 기능 설계 및 구현)

  • Hyun, Wook;Park, Sun-Ok;Lee, Il-Jin;Kang, Shin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.571-574
    • /
    • 2005
  • XCAP(XML Configuration Access Protocol) which has been proposed in IETF is based on both XML and HTTP protocol. XCAP server maintains user's configuration information for specific application which is described by XML. This protocol can be applied to many application servers for adapting user's preferences. There can be many way to interwork with other application servers. In this paper, we will talk about the experience of designing and implementation of XCAP server and the way of interwork with application servers.

  • PDF

Design of YK2 Cipher Algorithm for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호 알고리즘 설계)

  • Kang, Young-Ku;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3138-3147
    • /
    • 2000
  • EC(Electronic Commerce) which is cone the virtual space through Internet, has the advantage of time and space. On the contrary, it also has weak point like security probelm because anybody can easily access to the system due to open network attribute of Internet. Theretore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solution is the implemonlation of a strong cipher algorithm. YK2(YoungKu Kang) cipher algorithm proposed in this paper is advantage for the EC security and it overcomes the limit of the current 6/1 bits block cipher algorithm using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is degigned for the increase of time complexity and probability calculation by adapting more complex design for key scheduling regarded as one of the important element effected to enciyption.

  • PDF

Numerical Experiments on the Evaluation of Effective Permeability and Tunnel Excavation in the Three Dimensional Fracture Network Model (3차원 균열연결망 모델에서의 유효투수계수 평가 및 터널굴착 지하수 유동해석에 대한 수치실험)

  • 장근무
    • Tunnel and Underground Space
    • /
    • v.8 no.4
    • /
    • pp.275-286
    • /
    • 1998
  • The effective permeability and the representative element volume(REV) of fracture network model were evaluated based on the parameters such as permeability tensor, principal permeability and the direction of principal permeability. The effective permeability ranges between the harmonic mean and the arithmetic mean of the local permeabilities of subdivided blocks. From the numerical experiments, which were for investigating the influence of model volume on the variation of flux for the cubic models, it was found that the variation of flux became reduced as the model volume approached REV. The variation of groundwater flux into the tunnel in the fracture network model was mainly dependent on the ratio of the tunnel length to model size rather than REV. And it was found that groundwater flux into the tunnel was not completely consistent between the fracture network model and the equivalent porous media model, especially when the ratio of the tunnel length to model size is small.

  • PDF

Utilization of Non-Volatile RAM Write Buffer for FTL (FTL(Flash Translation Layer)을 위한 비휘발성 메모리 기반 쓰기 버퍼의 활용)

  • Park, Sung-Min;Jung, Ho-Young;Yoon, Kyeong-Hoon;Cha, Jae-Hyuk;Kang, Soo-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.261-266
    • /
    • 2006
  • 최근 낸드 플래시 메모리는 임베디드 저장 장치로서 많이 사용되고 있을 뿐만 아니라 플래시 메모리의 저장 용량의 대용량화로 하드 디스크를 대체하는 SSD(solid state disk) 같은 제품이 출시되고 있다. 플래시 메모리는 하드디스크에 비하여 저전력, 빠른 접근성, 물리적 안정성 등의 장점이 있지만 읽기와 쓰기의 연산의 불균형적인 비용과 덮어 쓰기가 안 되고 쓰기 전에 해당 블록을 지워야하는 부가적인 작업을 수행해야 한다. 이와 같은 특징은 플래시 메모리의 쓰기 성능을 저하 시키고 기존의 하드디스크를 대체하는 것을 어렵게 만든다. 이와 같은 플래시 메모리의 단점을 해결하기 위해서 본 논문에서 비휘발성 메모리와 플래시 메모리를 함께 사용하는 방법을 제안한다. 최근 MRAM, FeRAM, PRAM과 같은 차세대 메모리 기술의 발전과 배터리 백업 메모리의 가격 하락으로 인하여 비휘발성 메모리의 상품적 가치가 높아지고 있다. 하지만 아직까지 용량 대비 가격이 비효율적이기 때문에 소용량의 비휘발성 메모리를 활용하여 플래시 메모리의 쓰기 연산에 대한 단점을 보완하는 방법을 제안한다. 본 논문에서는 FTL 에서 비휘발성 메모리를 쓰기 버퍼로 이용한 여러 가지 버퍼 관리 정책을 실험하였고 각 관리 정책에 따른 플래시 메모리의 성능 향상을 측정하였다. 실험을 통하여 최대로 읽기의 횟수는 90% 감소, 쓰기 횟수는 33% 감소, 소거 횟수는 50% 감소 효과를 보였다.

  • PDF

An Improvement of missing pet rescue system based on Smart Contract (스마트 컨트랙트 기반의 유실 애완동물 구조 시스템 개선)

  • Kwon, Hyeok-dong;Kim, Hyun-jun;Jang, Kyoung-bae;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.786-794
    • /
    • 2020
  • For systematic pet management, the pet registration system has established. It makes the owner of the pet is given greater responsibility through the pet registration system but it also provided with welfare. One of the advantages of the pet registration system is that prepare system what return to owner quickly and safety through information inquiry when the pets are lost. But there are some conflict with the law in the information inquiry, so it occurs interfere the system. In this paper, we propose using the Smart Contract to finding the missing animal effectively. Proposed method discloses only the partially information. Thus it will be eliminated conflict parts, and increases the information accessibility to increase the number of people who can inquiry information. In addition, keeping the RFID inquired feature for compatible with the existing system. The smart contract querying enables quickly and precision access to information. Lastly, compare the proposed method with existing method to see the improvement.

NFT Utilization Method in e-Sports

  • Chung Gun, Lee;Su-Hyun, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.47-53
    • /
    • 2023
  • In this paper, based on the generalization and popularization of NFT, the utilization idea of using NFT in e-sports was proposed. We considered ways to utilize NFTs to make access to e-sports easy for all users and to secure users from various age groups. To this end, cases of NFTs with diversity in e-sports platforms were analyzed by type, and the degree of use of NFTs in e-sports was identified through a survey. As a result of the study, it was found that the NFT experience in the e-sports game was highly satisfactory and the desire to experience it again was strong. As NFTs have ownership and scarcity as important characteristics, they can respond well to the demand for owning unique items in e-sports. In addition, in marketing, by promoting limited edition products with scarcity, it is possible to promote marketing that creates value with high profitability. When using NFT in e-sports, various NFT functions are combined regardless of the type of sport, so NFT can become an economic infrastructure.