• Title/Summary/Keyword: Efficient Proof

Search Result 132, Processing Time 0.031 seconds

Agricultural Irrigation Control using Sensor-enabled Architecture

  • Abdalgader, Khaled;Yousif, Jabar H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3275-3298
    • /
    • 2022
  • Cloud-based architectures for precision agriculture are domain-specific controlled and require remote access to process and analyze the collected data over third-party cloud computing platforms. Due to the dynamic changes in agricultural parameters and restrictions in terms of accessing cloud platforms, developing a locally controlled and real-time configured architecture is crucial for efficient water irrigation and farmers management in agricultural fields. Thus, we present a new implementation of an independent sensor-enabled architecture using variety of wireless-based sensors to capture soil moisture level, amount of supplied water, and compute the reference evapotranspiration (ETo). Both parameters of soil moisture content and ETo values was then used to manage the amount of irrigated water in a small-scale agriculture field for 356 days. We collected around 34,200 experimental data samples to evaluate the performance of the architecture under different agriculture parameters and conditions, which have significant influence on realizing real-time monitoring of agricultural fields. In a proof of concept, we provide empirical results that show that our architecture performs favorably against the cloud-based architecture, as evaluated on collected experimental data through different statistical performance models. Experimental results demonstrate that the architecture has potential practical application in a many of farming activities, including water irrigation management and agricultural condition control.

Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment

  • Ning Wang;Huiqing Wang;Xiaoting Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3030-3049
    • /
    • 2023
  • With the development and wide application of hybrid network computing modes like cloud computing, edge computing and fog computing, the customer service requests and the collaborative optimization of various computing resources face huge challenges. Considering the characteristics of network environment resources, the optimized deployment of service resources is a feasible solution. So, in this paper, the optimal goals for deploying service resources are customer experience and service cost. The focus is on the system impact of deploying services on load, fault tolerance, service cost, and quality of service (QoS). Therefore, the alternate node filtering algorithm (ANF) and the adjustment factor of cost matrix are proposed in this paper to enhance the system service performance without changing the minimum total service cost, and corresponding theoretical proof has been provided. In addition, for improving the fault tolerance of system, the alternate node preference factor and algorithm (ANP) are presented, which can effectively reduce the probability of data copy loss, based on which an improved cost-efficient replica deployment strategy named ICERD is given. Finally, by simulating the random occurrence of cloud node failures in the experiments and comparing the ICERD strategy with representative strategies, it has been validated that the ICERD strategy proposed in this paper not only effectively reduces customer access latency, meets customers' QoS requests, and improves system service quality, but also maintains the load balancing of the entire system, reduces service cost, enhances system fault tolerance, which further confirm the effectiveness and reliability of the ICERD strategy.

A Study on the Efficiency Evaluation of the Improvement Project for School Zone Using DEA (DEA를 활용한 어린이보호구역개선사업의 효율성 평가에 관한 연구)

  • Kang, Myung Sik;Kang, Tae Euk;Ju, Jung Hee
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.6
    • /
    • pp.895-906
    • /
    • 2018
  • The improvement project for school zone in Korea is occurring mostly in kindergartens and elementary schools in which children are mainly active, and is being promoted as part of measures to prevent children's traffic accidents. However, since the study on the essential installation facilities and proper level of safety facilities for School zone is lacking, this study relatively evaluated the efficiency of safety facility installation using DEA (Data Envelope Analysis) and suggested improvement plan. We built the facilities and incident data for 28 school zones in Hwaseong City. Six major facilities (Raised intersection, Raised crosswalk, Protective fence, Skid Proof, Speed hump, Speed cameras) that have proven to be effective in the preceding research were analyzed as input factors. As a result of the analysis, only 12 out of 28 showed efficiency and 16 out of efficiency. Effective groups of school zones were found to have fewer installed Protective fences, Skid Proof, and Speed cameras installations than school zones classified as ineffective groups. Protective fences were found to be efficient even if only 47% of the total extension of the school zone was installed, and the number of slip prevention facilities was 8.7 per square km. The number of subjects to be compared is 28, so this study is limited to use as a relative efficiency evaluation index, and it can be grouped into nationwide units and efficiency evaluation can be done for each group.

A study on the improvement of the protective shield construction method and explosion-proof tube performance for tunnel blasting (터널 발파에 대한 방호쉴드 공법 및 방폭튜브 성능 개선 연구)

  • Sang-Hwan Kim;Soo-Jin Lee;Jung-Nam Kwon;Dong-gyun Yoo;Yong-Woo Kim;Kwang-Eun Cho
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.25 no.4
    • /
    • pp.285-303
    • /
    • 2023
  • Interest in building underground spaces is increasing for the creation of downtown infrastructure and efficient space utilization. A representative method of utilizing underground space is a tunnel, and in addition to road tunnels, the construction of utility tunnels such as power conduits and utility conduits is gradually increasing. The current basic tunnel construction method can be divided into NATM (New Austrian Tunnelling Method) and TBM (Tunnel Boring Machine). The NATM is a reliable method, but it is accompanied by vibration and noise due to blasting. In the case of the TBM excavation method, there are disadvantages in terms of construction period and construction cost, but it is possible to improve economic feasibility by introducing appropriate complementary methods. In this study, a blasting method was develop using the NATM after TBM pre-excavation using the protective shield method. This is a method that compensates for the disadvantages of each tunnel construction method, and is expected to reduce construction costs, blasting vibration, and noise. In order to review the performance of the developed method, an experiment was conducted to evaluate the performance of explosion-proof tube to which a protective shield scale model was applied, and the impact of blasting vibration of the protective shield method was analyzed.

A Study on the Current Status of Application of Construction Management in Pusan National University Yangsan Hospital and Guidelines for CM Improvement (양산 부산대학교병원의 건설사업관리 적용현황과 발전 방향)

  • Park, Jong-Soon;Shin, Chang-Joon;Yoo, Byeong-Gi;Chun, Jae-Youl
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.5-12
    • /
    • 2008
  • The construction of Pusan National University Yangsan Hospital is a new construction of a medical town in Yangsan. It is a case that CMr participated in the project from planning to post-completion. It shows an actual proof of Construction Management business applied CM by each phase. In this case, CMr selected the design-build contractor in the planning phase and technically performed CM businesses in every single phase such as design and construction schedule management regarding application of Fast Track technique, procurement management and contract administration in phases based on the Fast-tract; technique, design review, VE in the design phase, change order management in the construction phase and operating and maintenance in the post-construction phase. This study would go far toward applying CM to Mega Turnkey projects by analyzing the problems of CMr's practical application to the project and providing guidelines for effective and efficient CM business implementation especially in the Turnkey projects.

  • PDF

A Study on Extraction of Mobile Forensic Data and Integrity Proof (모바일 포렌식 자료의 추출과 무결성 입증 연구)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.177-185
    • /
    • 2007
  • Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper. We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

A Study on Handwritten Digit Categorization of RAM-based Neural Network (RAM 기반 신경망을 이용한 필기체 숫자 분류 연구)

  • Park, Sang-Moo;Kang, Man-Mo;Eom, Seong-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.201-207
    • /
    • 2012
  • A RAM-based neural network is a weightless neural network based on binary neural network(BNN) which is efficient neural network with a one-shot learning. RAM-based neural network has multiful information bits and store counts of training in BNN. Supervised learning based on the RAM-based neural network has the excellent performance in pattern recognition but in pattern categorization with unsupervised learning as unsuitable. In this paper, we propose a unsupervised learning algorithm in the RAM-based neural network to perform pattern categorization. By the proposed unsupervised learning algorithm, RAM-based neural network create categories depending on the input pattern by itself. Therefore, RAM-based neural network for supervised learning and unsupervised learning should proof of all possible complex models. The training data for experiments provided by the MNIST offline handwritten digits which is consist of 0 to 9 multi-pattern.

Study of an Efficient Method for Securing Evidence During the Fire Investigation (화재조사 시 증거물의 효율적인 확보 방안에 관한 연구)

  • Ye, Su-Jo;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.43-47
    • /
    • 2016
  • The recent changes in the judicial system in South Korea, including the stronger trial-centrism and legal market opening, have made fire investigations seek more scientific evidence and structure. The collection of physical evidence is very important to prove the substantial truth of a fire at the court. Without the appropriate physical proof, the credibility of a fire investigation is lost as evidence in a court. Therefore, the fire investigation team needs to carefully handle the fire site and fire initiation evidence because evidence of a fire incident can be destroyed easily by chemical and physical damage. In addition, the fire investigation team also needs to carefully record the collections of any evidence including pictures and their analysis. This study proposed the needs of the procedure manual and guidelines that can provide a step-by-step process of fire investigations in South Korea. This study also helps fire investigation agencies to secure fire-scene evidence to distinctly investigate the facts of fire. The guidelines and manual can eventually improve the ways for the fire investigation processes in South Korea.

New gTLD Program: Uniform Rapid Suspension System and Trademark Clearinghouse (신규 일반 최상위 도메인의 도입과 통일신속정지제도(URS)에 대한 연구)

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.21 no.2
    • /
    • pp.113-131
    • /
    • 2011
  • Recently, the Internet Corporation for Assigned Names and Numbers (ICANN) announced the expansion of the number of generic top-level domains (gTLDs) beyond the current 22 gTLDs, and the gTLD Applicant Guidebook for ICANN's new gTLD program is now under consideration for approval. ICANN also introduces a "Trademark Clearinghouse" and the "Uniform Rapid Suspension (URS)" procedure to protect trademarks and expedite dispute resolution and save costs. The Trademark Clearinghouse is a central repository for information to be authenticated, stored and disseminated, pertaining to the rights of the trademark holders. Trademark holders would voluntarily provide data of their trademarks from all over the world, and it would assist a trademark watch service provided by the new gTLD registry for trademark holders and potential domain name registrants. The URS is a part of the new gTLD dispute resolution mechanisms created by ICANN to resolve cybersquatting disputes. A complainant in a URS proceeding must establish three elements that are very similar to the existing UDRP to succeed, but supposedly more expedited and cost efficient. Since the URS provides that it only protects court validated and registered trademarks, it is not clear whether unregistered marks used in commerce are protected under the URS. The URS escalates the complainant's burden of proof from a preponderance of evidence standard under the UDRP to a clear and convincing evidence standard. The notices to a respondent shall be sufficient if the URS Provider sends the notice of Complaint to the addresses listed in the Whois contact information. As registrants who wish to conceal their true identity often subscribe to the privacy/proxy service and the complainant's high rate of success in the UDRP proceeding is relevant to the respondents' default rate, the URS's simple notice requirement would deprive respondents of a fair opportunity to assert their rights over the disputed domain names.

  • PDF

Analysis of Expander Network on the Hypercube (하이퍼큐브에서의 익스팬드 네트워크 분석)

  • 이종극
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.674-684
    • /
    • 2000
  • One key obstacle which has been identified in achieving parallel processing is to communicate effectively between processors during execution. One approach to achieving an optimal delay time is to use expander graph. The networks and algorithms which are based on expander graphs are successfully exploited to yield fast parallel algorithms and efficient design. The AKS sorting algorithm in time O(logN) which is an important result is based on the use of expanders. The expander graph also can be applied to construct a concentrator and a superconcentrator. Since Margulis found a way to construct an explicit linear expander graph, several expander graphs have been developed. But the proof of existence of such graphs is in fact provided by a nonconstructive argument. We investigate the expander network on the hypercube network. We prove the expansion of a sin81e stage hypercube network and extend this from a single stage to multistage networks. The results in this paper provide a theoretical analysis of expansion in the hypercube network.

  • PDF