• Title/Summary/Keyword: Date's Scheme

Search Result 32, Processing Time 0.031 seconds

A Scheduling Scheme for Flexible Flow Shop with Release Date and Due Date (시작시기와 납기를 고려하는 유연흐름공장의 일정계획)

  • Lee, J.H.;Kim, S.S.
    • IE interfaces
    • /
    • v.11 no.3
    • /
    • pp.1-13
    • /
    • 1998
  • This paper addresses a scheduling scheme for Flexible Flow Shop(FFS) in the case that a factory is a sub-plant of an electronic device manufacturing plant. Under this environment, job orders for the sub-plants in the production route are generated together with job processing time bucket when the customer places orders for final product. The processing time bucket for each job is a duration from possible release date to permissible due date. A sub-plant modeled FFS should schedule these jobs orders within time bucket. Viewing a Printed Circuit Board(PCB) assembly line as a FFS, the developed scheme schedules an incoming order along with the orders already placed on the scheduled. The scheme consists of the four steps, 1)assigning operation release date and due date to each work cells in the FFS, 2)job grouping, 3)dispatching and 4)machine allocation. Since the FFS scheduling problem is NP-complete, the logics used are heuristic. Using a real case, we tested the scheme and compared it with the John's algorithm and other dispatching rules.

  • PDF

Efficient Threshold Schnorr's Signature Scheme (Schnorr 전자서명을 이용한 효율적인 Threshold 서명 기법)

  • 양대헌;권태경
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.69-74
    • /
    • 2004
  • Threshold digital signature is very useful for networks that have no infrastructure such as ad hoc network Up to date, research on threshold digital signature is mainly focused on RSA and DSA. Though Schnorr's digital signature scheme is very efficient in terms of both computation and communication. its hard structure using interactive proof prevents conversion to threshold version. This paper proposes an efficient threshold signature. scheme based on the Schnorr's signature. It has a desirable property of scalability and reduces runtime costs by precomputation.

Minimum Bandwidth Guarantee for Optical Burst Switching Networks (광 버스트 스위칭망에서 최소 대역폭 보장)

  • 오승훈;김영한
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.59-66
    • /
    • 2003
  • We propose the novel optical burst switching scheme to guarantee a minimum bandwidth for multiple classes. To date, QoS studies on OBS network are capable of differentiating two classes, but have difficulties in providing a minimum bandwidth lot several classes because of lower classes' collision with the highest class bursts in the networks. To solve that problem, in our proposed scheme we assign time zones in a data channel for each class periodically, making one burst have top priority at least its zone. Also, the new burst assembling algorithm, as well as the way of managing data channel, is necessarily proposed to coordinate with the proposed OBS scheme. Through the evaluation, we show that the worst-case end-to-end delay is small enough and the received bandwidth of the lower classes is still assured regardless of the traffic load of the highest class.

Numerical Simulation of Mold Filling Processes of Castings by using of Predictor-two step Corrector-VOF

  • Xun, Sun;Junqing, Wang;Hwang, Ho-Young;Choi, Jeong-Kil
    • Journal of Korea Foundry Society
    • /
    • v.22 no.6
    • /
    • pp.299-303
    • /
    • 2002
  • 수정된 SIMPLE법과 VOF의 결합으로 predictor-two step corrector-VOF라고 불리는 새로운 알고리즘이 주조 시 용탕 충전과정을 해석하기 위해 개발되었다. 운동량보존으로부터 유도된 새 2단계 속도 경계조건 처리법은 용탕의 자유표면을 추적하는 데 사용되었다. 본 연구에서는 2개의 예제 계산을 통해 계산정확도와 속도에 대한 Courant 수의 영향을 살펴보았다. 그 결과 적당한 Courant 수의 증가는 계산 정확도의 감소 없이 용탕 계산 속도를 향상시킬 수 있는 것으로 나타났다. 또한 만족할 만한 계산 정확도와 효율이 이 알고리즘의 실제 제품 해석을 통해 얻어졌다.

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

From Paris and Shanghai to Singapore: A Multidisciplinary Study in Evaluating the Provenance and Dating of Two of Liu Kang's Paintings

  • Lizun, Damian
    • Journal of Conservation Science
    • /
    • v.37 no.4
    • /
    • pp.322-339
    • /
    • 2021
  • This paper focuses on the dating and provenance of two paintings, Climbing the hill and View from St. John's Fort by the prominent Singaporean artist Liu Kang (1911-2004). Climbing the hill, from the National Gallery Singapore collection, was believed to have been created in 1937, based on the date painted by the artist. However, a non-invasive examination unveiled evidence of an underlying paint scheme and a mysterious date, 1948 or 1949. These findings prompted a comprehensive technical study of the artwork in conjunction with comparative analyses of View from St. John's Fort (1948), from the Liu family collection. The latter artwork is considered to be depicting the same subject matter. The investigation was carried out with UVF, NIR, IRFC, XRR, digital microscopy, PLM and SEM-EDS to elucidate the materials and technique of both artworks and find characteristic patterns that could indicate a relationship between both paintings and assist in correctly dating Climbing the hill. The technical analyses were supplemented with the historical information derived from the Liu family archives. The results showed that Climbing the hill was created in 1948 or 1949 on top of an earlier composition painted in Shanghai between 1933 and 1937. As for the companion View from St. John's Fort from 1948, the artist reused an earlier painting created in France in 1931. The analytical methods suggested that Liu Kang used almost identical pigment mixtures for creating new artworks. However, their painting technique demonstrates some differences. Overall, this study contributes to the understanding of Liu Kang's painting materials and his working practice.

A Differentiation Strategy to Improve Educational Competitiveness of Education Department in Undergraduate: Employment Rate and Curriculum Nature of Pedagogy Relation Department (학부과정 교육학과의 교육 경쟁력 제고를 위한 차별화 전략 : 교육학 계열학과의 취업률 및 교육과정 특성 분석에 기초하여)

  • Oh, Kyoung-Hee;Lee, Jee-Young
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.4
    • /
    • pp.801-818
    • /
    • 2013
  • This paper focuses on a differentiation strategy to improve educational competitiveness of education department. The reason is that education department stand now on the brink of a precipice because of low employment rate. For this, I researched on 'employment rate' and 'curriculum nature' of educational technology department of YW university and A university, lifelong education department of S university and D university, educational psychology department of SW university which are all related to pedagogy relation department recording relatively high-employment rate. Through the date, I'd like to emphasize that competitiveness of education department depends on a differentiation strategy and that strategy must be based on the influence of education with the consideration of obligation and characterization. And we find that a influence of education can be demonstrated in two aspects : a rational scheme's side and lively culture's side. In the rational scheme aspects, diversification and specialization of curriculum content considering department characteristics and curriculum management including mentoring and sense of realism are emphasized. On the side of culture scheme, positive involvement of members, outlook on the world defined by the concepts like challenge and passion to the future, a sense of community. These discussions will be a guide role on the future researches which focuses on improving competitiveness of education department.

A Study on Considerations in the Authority Control to Accommodate LRM Nomen (LRM 노멘을 수용하기 위한 전거제어시 고려사항에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.109-128
    • /
    • 2021
  • This paper is to explore considerations in authority control to accommodate LRM nomen entities through the literature reviews, the analysis of RDA rules, and the opinion survey of domestic catalog experts. As a result, for authority control, considerations were proposed in the aspect of nomen's attribute elements, catalog description, and MARC authority format. First, it is necessary to describe in as much detail as possible the category, the scheme, intended audience, the context of use, the reference source, the language, the script, the script conversion as the attributes of the nomen with the status of identification, note, and indifferentiated name indicators added in RDA. Second, the description method of attribute elements and relational elements of nomen can be unstructured, structured, identifier, and IRI as suggested in RDA, and vocabulary encoding scheme (VES) and string encoding scheme (SES) should be written for structured description, Also, cataloging rules for structuring authorized access points and preferred names/title should be established. Third, an additional expansion plan based on Maxwell's expansion (draft) was proposed in order to prepare the MARC 21 authority format to reflect the LRM nomen. (1) The attribute must be described in 4XX and 5XX so that the attribute can be entered for each nomen, and the attributes of the nomen to be described in 1XX, 5XX and 4XX are presented separately. (2) In order to describe the nomen category, language, script, script conversion, context of use, and date of usage as a nomen attribute, field and subfield in MARC 21 must be added. Accordingly, it was proposed to expand the subfield of 368, 381, and 377, and to add fields to describe the context of use and date of usage. The considerations in authority control for the LRM nomen proposed in this paper will be the basis for establishing an authority control plan that reflects LRM in Korea.

An Anonymous asymmetric public key traitor tracing scheme (익명성을 보장하는 비대칭 공개키 공모자 추적 기법)

  • 최은영;이동훈;홍도원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.49-61
    • /
    • 2004
  • In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber's anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously and one purchases multimedia contents without giving a lot of information about his lifestyle, habits, and etc, but anonymity control is provided, i.e., a data supplier can date traitors.

Interoperability between NoSQL and RDBMS via Auto-mapping Scheme in Distributed Parallel Processing Environment (분산병렬처리 환경에서 오토매핑 기법을 통한 NoSQL과 RDBMS와의 연동)

  • Kim, Hee Sung;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2067-2075
    • /
    • 2017
  • Lately big data processing is considered as an emerging issue. As a huge amount of data is generated, data processing capability is getting important. In processing big data, both Hadoop distributed file system and unstructured date processing-based NoSQL data store are getting a lot of attention. However, there still exists problems and inconvenience to use NoSQL. In case of low volume data, MapReduce of NoSQL normally consumes unnecessary processing time and requires relatively much more data retrieval time than RDBMS. In order to address the NoSQL problem, in this paper, an interworking scheme between NoSQL and the conventional RDBMS is proposed. The developed auto-mapping scheme enables to choose an appropriate database (NoSQL or RDBMS) depending on the amount of data, which results in fast search time. The experimental results for a specific data set shows that the database interworking scheme reduces data searching time by 35% at the maximum.