• Title/Summary/Keyword: Evaluation Scheme

Search Result 1,525, Processing Time 0.024 seconds

An Application Scheme and Comparison for the Education Homepage By the Web Accessability Guidelines (웹 접근성 지침에 의한 교육용 홈페이지의 적용 방안 및 비교 분석)

  • Jung, Deok-Gil;Lee, Jong-Hun;Lho, Young-Uhg
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1142-1147
    • /
    • 2008
  • In recent years, the efforts for standards of Web contents accessibility and the improvements of Web accessibility are expanded in the government, enterprises, and public institutions. In this paper, we examine the Korean Web contents accessibility guidelines, and propose the evaluation scheme for the education homepage by the Web accessibility guidelines using KADO-WAH program which is the evaluation tool for Web accessibility. Also, we propose the improvement scheme for education homepage by modifying the error and warning clauses directed in which are appeared in the evaluation report. And, we evaluate the various education homepages using KADO-WAH, and analyze the comparisons for the Web accessibility guidelines among the education homepages.

High Performance QoS Traffic Transmission Scheme for Real-Time Multimedia Services in Wireless Networks

  • Kang, Moonsik
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.3
    • /
    • pp.182-191
    • /
    • 2012
  • This paper proposes a high performance QoS (Quality of Service) traffic transmission scheme to provide real-time multimedia services in wireless networks. This scheme is based on both a traffic estimation of the mean rate and a header compression method by dividing this network model into two parts, core RTP/UDP/IP network and wireless access parts, using the IEEE 802.11 WLAN. The improvement achieved by the scheme means that it can be designed to include a means of provisioning the high performance QoS strategy according to the requirements of each particular traffic flow by adapting the header compression for real-time multimedia data. A performance evaluation was carried out to show the effectiveness of the proposed traffic transmission scheme.

  • PDF

Flash-Based Two Phase Locking Scheme for Portable Computing Devices (휴대용 정보기기를 위한 플래시 기반 2단계 로킹 기법)

  • Byun Siwoo;Roh Chang-bae;Jung Myunghee
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.59-70
    • /
    • 2005
  • Flash memories are one of best media to support portable computer's storages in mobile computing environment. The features of non-volatility, low power consumption, and fast access time for read operations are sufficient grounds to support flash memory as major database storage components of portable computers. However, we need to improve traditional transaction management scheme due to the relatively slow characteristics of flash operation as compared to RAM memory. in order to achieve this goal, we devise a new scheme called Flash Two Phase Locking (F2PL) scheme for efficient transaction processing. F2Pl improves transaction performance by allowing multi version reads and efficiently handling slow flash write/erase operation in lock management process. We also propose a simulation model to show the performance of F2PL. Based on the results of the performance evaluation, we conclude that F2PL scheme outperforms the traditional scheme.

  • PDF

An Efficient Buffer Management Algorithm for GFR Service (GFR 서비스를 위한 효율적 버퍼관리 알고리즘)

  • Kim, Nam-Hee;Cho, Hae-Sung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.339-343
    • /
    • 2004
  • In this paper, we propose a cell scheduling scheme which can improve the fairness and the goodput through the traffic control in GFR service. For the evaluation of the proposed scheme, we compare the proposed scheme with the existing scheme in the fairness and the goodput. Simulation results show that proposed scheme can improve the fairness and goodput comparing with the existing buffer management scheme.

  • PDF

Management of Discon tinuous Reconstruction In the Evolution Stage of Kinetic Scheme

  • Ohwada Taku;Kobayashi Seijiro
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.189-190
    • /
    • 2003
  • A New kinetic scheme for the compressible Navier-Stokes equations is developed. While the conventional approach, such as KFVS scheme, employs the splitting algorithm and computes the numerical flux on the basis of the collisionless equation, the present approach employs the splitting algorithm in the evaluation of the numerical flux, where the collision effect is explicitly taken into account. However, the initial condition employed in the computation is slightly different from the conventional Chapman-Enskog NS distribution function. The present study also reveals the background of the existing kinetic schemes. such as the KFVS scheme and Gas-Kinetic BGK scheme.

  • PDF

Implementation of Bandwidth allocation scheme and Experimental Performance Evaluation on application layer of Foundation Fieldbus (사용자 계층에서 Foundation Fieldbus의 대역폭할당기법구현 및 실험적 검증)

  • Song, Sung-Min;Hong, Seung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.430-433
    • /
    • 2002
  • Fieldbus traffic consists of periodic, time-critical and time-available data. A bandwidth allocation scheme allocates periodic, time-critical and time-available data traffic to the bandwidth-limited network resource. This paper presents an implementation method of the bandwidth allocation scheme in the user layer of Foundation fieldbus. In this study, an experimental model of a Foundation Fieldbus network system is developed. Using the experimental model, validity of the bandwidth allocation scheme is examined. The results obtained from the experimental model show that the proposed scheme restricts the delay of both periodic and time-critical data to a pre-specified bound. The bandwidth allocation scheme also fully utilized the bandwidth resource of the network system.

  • PDF

Performance Evaluation of Conflict Detection Schemes for Concurrent Temporal Tranactions (시간지원 크랙잭션을 위한 충돌 검출 기법의 성능평가)

  • 구경이;하봉옥;김유성
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.1
    • /
    • pp.80-80
    • /
    • 1999
  • As Temporal DataBase Systems(TDBSs) manages both the historical versions and the current version of each data item, a temporal transaction may access more data records than atransaction in traditional database systems. Hence, the concurrency control subsystem of temporaldatabase management system should be able to correctly and efficiently detect actual conflicts amongconcurrent temporal transactions while the cost of detecting conflicts is maintained in low levelwithout detecting false conflicts which cause severe degradation of system throughput.In this paper, Two-Level Conflict Detection(TLCD) scheme is proposed for efficient conflictdetection between concurrent temporal transactions in TDBs. In the proposed TLCD scheme, sincechecking conflict between concurrent temporal transactions is performed at two levels, i, e., logicallevel and physical level, conflicts between concurrent temporal transactions are efficiently and correctlydetected,Furthermore, we also evaluate the performance of the proposed TLCD scheme with those oftraditional conflict detection schemes, logical-level conflict detection scheme and physical-level conflictdetection scheme by simulation approach, The result of the simulation study shows that the proposedTLCD scheme outperforms the previous conflict detection schemes with respect to the averageresponse time.

A Caching Scheme to Support Session Locality in Hierarchical SIP Networks

  • Choi, KwangHee;Kim, Hyunwoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.1
    • /
    • pp.1-9
    • /
    • 2013
  • Most calls of a called user are invoked by the group of calling users. This call pattern is defined as call locality. Similarly Internet sessions including IP telephony calls have this pattern. We define it session locality. In this paper, we propose a caching scheme to support session locality in hierarchical SIP networks. The proposed scheme can be applied easily by adding only one filed to cache to a data structure of the SIP mobility agent. And this scheme can reduce signaling cost, database access cost and session setup delay to locate a called user. Moreover, it distributes the load on the home registrar to the SIP mobility agents. Our performance evaluation shows the proposed caching scheme outperforms the hierarchical SIP scheme when session to mobility ratio is high.

Topology-Aware Fanout Set Division Scheme for QoS-Guaranteed Multicast Transmission

  • Kim, Kyungmin;Lee, Jaiyong
    • Journal of Communications and Networks
    • /
    • v.15 no.6
    • /
    • pp.614-634
    • /
    • 2013
  • The proliferation of real-time multimedia services requires huge amounts of data transactions demanding strict quality-of-service (QoS) guarantees. Multicast transmission is a promising technique because of its efficient network resource utilization. However, high head-of-line (HOL) blocking probability and lack of service-specific QoS control should be addressed for practical implementations of multicast networks. In this paper, a topology aware fanout set division (TAFD) scheme is proposed to resolve these problems. The proposed scheme is composed of two techniques that reduce HOL blocking probability and expedite packet delivery for large-delay branches regarding multicast tree topology. Since management of global topology information is not necessary, scalability of the proposed scheme is guaranteed. Mathematical analysis investigates effects of the proposed scheme and derives optimal operational parameters. The evaluation results show that the TAFD scheme achieves significant delay reduction and satisfies required delay bounds on various multicast networks.

Ultra-light Mutual Authentication Scheme based on Text Steganography Communication

  • Lee, Wan Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.11-18
    • /
    • 2019
  • Previous mutual authentication schemes operate on the basis of validated cryptographic functions and hash functions, but these functions require a certain amount of memory capacity. However, since ultra-lightweight IoT devices have a very small amount of memory capacity, these functions can not be applied. In this paper, we first propose a text steganography communication scheme suitable for ultra-lightweight IoT devices with limited resources, and then propose a mutual authentication scheme based on the text steganography communication. The proposed scheme performs mutual authentication and integrity verification using very small amount of memory. For evaluation, we implemented the proposed scheme on Arduino boards and confirmed that the proposed scheme performs well the mutual authentication and the integrity verification functions.