• Title/Summary/Keyword: 확장된 연결

Search Result 1,323, Processing Time 0.025 seconds

Multiple Path Security-Aware Routing Protocol Mechanism for Ad Hoc Network (Ad Hoc 네트워크 라우팅 보안을 위한 다중경로 기반의 MP-SAR 프로토콜)

  • Han, In-Sung;Ryou, Hwang-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.260-267
    • /
    • 2008
  • As pervious the SAR(Security Aware Routing)[10] protocol is an secure Ad Hoc network protocol that finds a secure path, it is the security routing protocol that uses the security level of nodes as the routing information. However, the SAR protocol sometimes transfers data through inefficient transmission paths because it always tries to find secure nodes for a safe transmission. Since it is a protocol based on AODV[6], it will cause transmission delay as researching of security routing path. when a node is out of the data transmission range as its battery dying or movement. Although it is possible to connection of nodes because a characteristic of the SAR protocol, the connection is not easy to reconnect when the security level of intermediate node is lower than the level requested by a source node. In this paper, we suggest the MP-SAR based on the SAR to solve the SAR protocol's problem. The MP-SAR seeks multiple secure path for maintenance of data confidentiality using the expanded secure path detection techniques based on the SAR. It can transfer data quickly and reliably by using the shortest efficient path among multiple paths. In the research result, we proved a outstanding performance of MP-SAR than the previous SAR through comparison and analysis.

Study on Development of HDD Integrity Verification System using FirmOS (FirmOS를 이용한 HDD 무결성 검사 시스템 개발에 관한 연구)

  • Yeom, Jae-Hwan;Oh, Se-Jin;Roh, Duk-Gyoo;Jung, Dong-Kyu;Hwang, Ju-Yeon;Oh, Chungsik;Kim, Hyo-Ryoung;Shin, Jae-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.18 no.2
    • /
    • pp.55-61
    • /
    • 2017
  • In radio astronomy, high-capacity HDDs are being used to save huge amounts of HDDs in order to record the observational data. For VLBI observations, observational speeds increase and huge amounts of observational data must be stored as they expand to broadband. As the HDD is frequently used, the number of failures occurred, and then it takes a lot of time to recover it. In addition, if a failed HDD is continuously used, observational data loss occurs. And it costs a lot of money to buy a new HDD. In this study, we developed the integrity verification system of the Serial ATA HDD using FirmOS. The FirmOS is an OS that has been developed to function exclusively for specific purposes on a system having a general server board and CPU. The developed system performs the process of writing and reading specific patterns of data in a physical area of the SATA HDD based on a FirmOS. In addition, we introduced a method to investigate the integrity of HDD integrity by comparing it with the stored pattern data from the HDD controller. Using the developed system, it was easy to determine whether the disk pack used in VLBI observations has error or not, and it is very useful to improve the observation efficiency. This paper introduces the detail for the design, configuration, testing, etc. of the SATA HDD integrity verification system developed.

  • PDF

The Aspectual Theory of the Cybercharacter (사이버캐릭터의 위상론)

  • 이선교
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.182-190
    • /
    • 1999
  • There has been the rapid change of paradigm with the overflow of terms related to computers such as information, digital, cyber, virtual world and the change of time concept on the ground that it is common to change the world into virtual time. This study is about cybercharacters working in air-broadcasting with rapidly-developing internet, The cybercharacters including 3D animation developed from 2D animation are know to be manufactured with use of electronic mediun and computers and to exist in electronics. Though the emergence of the cybercharacters has a lot of gflnetic roots according to their objectives, they have in common that they are made by 3D graphics and they work in the virtual space, The great traits of the cybercharaters lie in the extension of interfacial function and ecological growth. In the cyberspace the interface, the meeting point between a computer and its users is the most important, The cybercharacters as medium providing new ruman interface become effective with growing interest in virtual reality, The cybercharacters also keep the ecological traits, They can also bring about added value with infusion of image and development of the network, These cybercharacters can also play the important parts in the continually developing cyberspace, The successful birth of the cybercharacter are based on, the technological power. assistance of fund and the ctrltural background, The information-entertainment of the cybercharacters functions well with the accompinimene of these three things, The cybercharacters can make a subject which keeps single issue as a central point of the virtual realty, The cybercharacters can also be connected with equity of "Korean knowledge information society" in the cultural rule of the internet and sociocul tural identity, identity.

  • PDF

A personalized recommendation procedure with contextual information (상황 정보를 이용한 개인화 추천 방법 개발)

  • Moon, Hyun Sil;Choi, Il Young;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.15-28
    • /
    • 2015
  • As personal devices and pervasive technologies for interacting with networked objects continue to proliferate, there is an unprecedented world of scattered pieces of contextualized information available. However, the explosive growth and variety of information ironically lead users and service providers to make poor decision. In this situation, recommender systems may be a valuable alternative for dealing with these information overload. But they failed to utilize various types of contextual information. In this study, we suggest a methodology for context-aware recommender systems based on the concept of contextual boundary. First, as we suggest contextual boundary-based profiling which reflects contextual data with proper interpretation and structure, we attempt to solve complexity problem in context-aware recommender systems. Second, in neighbor formation with contextual information, our methodology can be expected to solve sparsity and cold-start problem in traditional recommender systems. Finally, we suggest a methodology about context support score-based recommendation generation. Consequently, our methodology can be first step for expanding application of researches on recommender systems. Moreover, as we suggest a flexible model with consideration of new technological development, it will show high performance regardless of their domains. Therefore, we expect that marketers or service providers can easily adopt according to their technical support.

Control Networks for Information Systems Development : Organizational and Agency Theory Perspectives (조직 이론과 대리 이론 관점에서 본 정보시스템 개발의 통제 네트워크에 관한 연구)

  • Hong, Sa-Neung
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.71-90
    • /
    • 2012
  • Although it has been studied for a long time in various disciplines, most of control theories remain being developed by analyzing relatively simple tasks. Even recent research on control of information systems development explains only a small part of control phenomena observed in the real world projects. This research focuses on identifying and analyzing the concepts and structures in order to make them useful for understanding and explaining control of information systems development comprehensively This investigation utilizes the complementary relationship between views on control from organizational and economic perspectives. A conceptual framework developed by integrating previous research on control allows us to analyze the development of information systems for control purposes. The results of discussion about control mechanisms and network can be used as guidelines for designing control systems in real projects. Analysis of control networks shows that control of development projects requires quite complex networks intertwining a variety of controllers and controlees. The results of this research are expected to contribute to correcting the unbalanced status of IS research which has emphasized too heavily on planning and implementation, and deepening and widening our understanding about controlling development projects. Practitioners can use the results as guidelines for designing control mechanisms and networks, and get alerted by them about the agency risks inherent in outsourced developments.

A Java Distributed Batch-processing System using Network of Workstation (워크스테이션 네트워크를 이용한 자바 분산 배치 처리 시스템)

  • Jeon, Jin-Su;Kim, Jeong-Seon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.583-594
    • /
    • 1999
  • With the advance of VLSI and network technologies, it has now become a common practice to deploy a various forms of distributed computing environments. A study shows that a lot of network-aware computers are in an idle state for considerable amount of time depending on the types of users and time frames of the day. If we can take the full advantage of those idle computers, we can obtain the enormous combined processing power without further costly investment. In this paper, we present a distributed batch-processing system, called the Java Distributed Batch-processing System (JDBS), which allows us to execute CPU-intensive, independent jobs across a pool of idle workstations on top of extant distributed computing environments. Since JDBS is implemented using a Java programming language, it not only extends the scope of machine types that can be joined to the pool, but makes it a lot easier to build an entire system. Besides, JDBS is scalable and fault-tolerant due to its multi-cluster organization and intelligent strategies. A graphical user interface is also provided to facilitate the registration and unregistration, job submission, and job monitoring.

An Investigation of the Selection Process of Mathematically Gifted Students

  • Lee, Kyung-Hwa;Park, Kyung-Mee;Yim, Jae-Hoon
    • Research in Mathematical Education
    • /
    • v.7 no.3
    • /
    • pp.139-150
    • /
    • 2003
  • The purpose of this paper is to review the gifted education from a reflective perspective. Especially, this research touches upon the issues of selection process from a critical point of view. Most of the problems presented in the mathematics competition or in the programs for preparing such competitions share the similar characteristic: the circumstances that are given for questions are too artificial and complicated; problem solving processes are superficially and fragmentally related to mathematical knowledge; and the previous experience with the problem very much decides whether a student can solve the problem and the speed of problem solving. In contrast, the problems for selecting students for Gifted Education Center clearly show what the related mathematical knowledge is and what kind of mathematical thinking ability these problems intend to assess. Accordingly, the process of solving these problems can be considered an important criterion of a student's mathematical ability. In addition, these kinds of problems can encourage students to keep further interest, and can be used as tasks for mathematical investigation later. We hope that this paper will initiate further discussions on issues derived from the mathematically gifted student selection process.

  • PDF

Image Segmentation Algorithm Based on Geometric Information of Circular Shape Object (원형객체의 기하학적 정보를 이용한 영상분할 알고리즘)

  • Eun, Sung-Jong;WhangBo, Taeg-Keun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.99-111
    • /
    • 2009
  • The result of Image segmentation, an indispensable process in image processing, significantly affects the analysis of an image. Despite the significance of image segmentation, it produces some problems when the variation of pixel values is large, or the boundary between background and an object is not clear. Also, these problems occur frequently when many objects in an image are placed very close by. In this paper, when the shape of objects in an image is circular, we proposed an algorithm which segment an each object in an image using the geometric characteristic of circular shape. The proposed algorithm is composed of 4 steps. First is the boundary edge extraction of whole object. Second step is to find the candidate points for further segmentation using the boundary edge in the first step. Calculating the representative circles using the candidate points is the third step. Final step is to draw the line connecting the overlapped points produced by the several erosions and dilations of the representative circles. To verify the efficiency of the proposed algorithm, the algorithm is compared with the three well-known cell segmentation algorithms. Comparison is conducted by the number of segmented region and the correctness of the inner segment line. As the result, the proposed algorithm is better than the well-known algorithms in both the number of segmented region and the correctness of the inner segment line by 16.7% and 21.8%, respectively.

  • PDF

Rothko's Painting-Image and the Expansion of the Real: Lacan, Zizek, and Wilber (로스코의 회화이미지와 실재의 확장 : 라깡, 지젝, 그리고 윌버)

  • Bae, Chul-young
    • Journal of Korean Philosophical Society
    • /
    • v.117
    • /
    • pp.85-111
    • /
    • 2011
  • Topics with which chis paper deals are as following; (1)Zizek's interpretation of Rothko's painting, (2)Lacan's gaze and picture, (3)the real as object a, (4)primal jouissance and death-drive, (5)a new identity of man-emptiness in Zizek, (6) existential level and existential conflict, (7)a variety of meanings of emptiness, (8)transpecsonal drive and meditation, (9) the different Real-Emptiness, (10)Rochko's painting and transpersonal drive.

The Publicity of Reasons and the Requirement of Non-Interference (이유의 공지성과 방해하지 않음의 요구조건)

  • Sung, Changwon
    • Journal of Korean Philosophical Society
    • /
    • v.117
    • /
    • pp.113-136
    • /
    • 2011
  • According to the thesis of the publicity of reasons, practical reasons are public in their nature: the normative force of reasons may extend across different agents. Wallace argues that the normative mode of public reasons can be exhausted by what he calls the requirement of non-interference. I argue that the publicity thesis as he presents it equally applies to both (non-special) interpersonal relations and special relationships. At first, Wallace's version of the publicity thesis may seem incompatible with the fact that there exists reasons of positive aid. He says that when these reasons obtain in the case of interpersonal relations, they are accommodated by relevant specific moral principles. I defend this claim by showing that there is a kind of internal relation between the publicity thesis and moral principles in question. It is true that the reasons of positive aid obtain in the case of special relationships as well. I show that in this case such reasons are grounded by the requirements of the given special relationships themselves. I argue that the logical consequence of these claims is what I call the dualistic conception of our practical reasoning about what to do and that this dualism does not raise a serious challenge to the publicity thesis. The overall arguments of this paper, I believe, make us to be "realistic" about the philosophical significance of the thesis in question in moral discourses.