• Title/Summary/Keyword: Evaluation list

Search Result 417, Processing Time 0.025 seconds

A Novel Algorithm for Fast Node-search and Redundancy Reduction in Gossip-based P2P Network (빠른 노드 검색과 부하감소를 위한 새로운 가쉽기반 P2P 네트워크 알고리즘)

  • Zhu, Xiao-Wei;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.619-622
    • /
    • 2009
  • P2P networks are undergoing rapid progress and inspiring numerous developments by gossip-based protocol. Gossip-based protocols for group communication have attractive scalability and reliability properties. We propose a self-organizing algorithm in the sense that the size of neighbor list achieved without any node knowing the group size. We also propose an efficient mechanism to reduce the redundancy of the system by backing up the nodes in the neighbor list. We present the design, theoretical analysis, and a detailed evaluation of the proposed algorithm and its refinements.

  • PDF

A Study on the Electrical and Electronic Architecture of Electric Vehicle Powertrain Domain through Big Data Analysis (빅데이터 분석을 통한 전기차 파워트레인 도메인 전기전자 아키텍처 연구)

  • Kim, Do Kon;Kim, Woo Ju
    • The Journal of Information Systems
    • /
    • v.31 no.4
    • /
    • pp.47-73
    • /
    • 2022
  • Purpose The purpose of this study is to select the electronic architecture concept of the powertrain domain of the electronic platform to be applied to electric vehicles after 2025. Previously, the automotive electrical and electronic architecture was determined only by trend analysis, but the purpose was to determine the scenario based on the data and select it with clear evaluation indicators. Design/methodology/approach This study identified the function to be applied to the powertrain domain of next-generation electric vehicle, estimated the controller, defined the function feature list, organized the scenario candidates with the controller list and function feature list, and selected the final architecture scenario. Findings According to the research results, the powertrain domain of electric vehicles was selected as the architectural concept to apply the DCU (Domain Control Unit) and VCU (Vehicle Control Unit) integrated architecture to next-generation electric vehicles. Although it is disadvantageous or equivalent in terms of cost, it was found to be excellent in most indicators such as stability, security, and hardware demand.

An Improved MList for Efficient Event List Management in Discrete Event Simulation (이산사건 시뮬레이션에서의 효율적인 이벤트 리스트 관리를 위한 MList의 개선 방안)

  • Kim, Seong-Gon;Yim, Dong-Soon
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.29-37
    • /
    • 2009
  • This paper deals with the priority queues exploited for the management of future event list in discrete event simulation. Among several implementations of priority queues, MList which consists of 3 tiers has been known to reveal the good performance. To improve the performance of MList, Dynamic-Shift MList (DSMList) is proposed in this paper. Whenever the number of events in tier 3 exceeds a critical number, DSMList creates new calendar queue in tier 2, then moves events from Tier 3 to the calendar queue. Instead of one calendar queue, therefore, a number of calendar queues are dynamically created in tier 2. Throughout experiments for the performance evaluation of DSMList, it shows that at least 20% improvement is obtained compared with MList.

The Evaluation of Application for Universal Design Principles in Local Government's Public Service Center - Focusing on Five District's Public Service Centers in Gwangju Metropolitan City - (지방자치단체 민원실의 유니버설디자인 적용도 평가 - 광주광역시 구청사를 중심으로 -)

  • Choe, Ah jin;Kim, Mi Hee
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.1
    • /
    • pp.172-180
    • /
    • 2016
  • This study aimed to evaluate how universal design principles are embodied in the Public Service Center. It will be used for planning the basic materials of the interior environmental design for Public Service Center facilities and for developing ways to improve interior environments in order for them to be conveniently used. In studying a method, we conducted an Universal Design check list to evaluate interior environment, targeting five Public Service Center facilities located in Gwangju Metropolitan city. This study investigated the Universal Design suitability of center interior Public Service Center on the basis of the tools for Universal Design check list which was composed of supportive design, adaptable design, communicability, safety-oriented design, and accessible design. Through theoretically considering the services of Gwangju's old city hall public service center, which got divided into common space, public service space, waiting space and informative material space. Evaluation on universal design application level showed that those with best universal design application are supportiveness and safety in public service space, communication efficacy and safety in waiting space and safety and accessibility in informative material space and acceptability in waiting space had the lowest application level.

Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network

  • Zhou, Jingxian;Wang, Zengqi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1773-1795
    • /
    • 2020
  • Unmanned aerial vehicles (UAVs) network are a very vibrant research area nowadays. They have many military and civil applications. Limited bandwidth, the high mobility and secure communication of micro UAVs represent their three main problems. In this paper, we try to address these problems by means of secure clustering, and a security clustering algorithm based on integrated trust value for UAVs network is proposed. First, an improved the k-means++ algorithm is presented to determine the optimal number of clusters by the network bandwidth parameter, which ensures the optimal use of network bandwidth. Second, we considered variables representing the link expiration time to improve node clustering, and used the integrated trust value to rapidly detect malicious nodes and establish a head list. Node clustering reduce impact of high mobility and head list enhance the security of clustering algorithm. Finally, combined the remaining energy ratio, relative mobility, and the relative degrees of the nodes to select the best cluster head. The results of a simulation showed that the proposed clustering algorithm incurred a smaller computational load and higher network security.

Risk Assessment Tools for Invasive Alien Species in Japan and Europe (일본과 유럽의 침입외래생물 생태계위해성평가 기법)

  • Kil, Jihyon;Mun, Saeromi;Kim, Chang-Gi
    • Ecology and Resilient Infrastructure
    • /
    • v.2 no.3
    • /
    • pp.191-197
    • /
    • 2015
  • Invasive alien species are considered to be one of the main factors that cause biodiversity loss. Establishment of management strategies through continuous monitoring and risk assessment is a key element for invasive alien species management policy. In the present study, we introduce examples of ecological risk assessment tools developed in Japan, Germany-Austria and Belgium. Invasive alien species have been designated in Japan based on the assessment of risks to ecosystems, human health and primary industry. German-Austrian Black List Information System categorized alien species into Black List, White List and Grey List according to their risks to biodiversity. In the Harmonia Information System developed in Belgium, invasiveness, adverse impacts on native species and ecosystem functions and invasion stages were assessed and alien species were categorized into Black List, Watch List and Alert List. These international risk assessment tools may be helpful to improve our national risk assessment protocol for the prioritization of invasive alien species management.

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.

Development of Measurement and Evaluation Technique for Software Quality in Design Phase (설계단계에서의 소프트웨어 품질측정과 평가기법 개발)

  • 장영숙;권영식
    • Journal of Korean Society for Quality Management
    • /
    • v.27 no.3
    • /
    • pp.94-112
    • /
    • 1999
  • It is booming to use computer and information owing to the information society. As software applications have grown, so too has the importance of software quality. Therefore, software quality measurement and evaluation are necessary to satisfy the users who are using computers. The ISO/IEC 9126 defines six quality characteristics and twenty-one subcharacteristics including forty inter quality characteristics. We developed software measurement and evaluation technique using the check list in accordance with the ISO/IEC 9126 in design phase. We applied idea and concept of Total Quality Management in order to evaluate and measure the quality of software. Namely, it is the concept such as "you should do it right the first time." or "you have to build quality in the process." We executed the quantitative evaluation of software, also had shown the distinctive result in order that users and developers can find the errors easily. We evaluated the quality of academic softwares in order to verify developing technique at S college. As a result of the evaluation, this college has found it necessary to maintain the software as soon as possible because academic systems are not adequate for users at this present time.

  • PDF

Improvement of Field Assessment List for Slope-stability Estimation (국내외 급경사지 평가표 분석을 통한 개선방안 연구)

  • Son, Young-Jin;Park, Dug-Keun;Oh, Jeong-Rim;Song, Young-Karb
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.509-522
    • /
    • 2010
  • There is a increasing trend in disaster occurrence due to steep-slope failures in urban area during typhoon and torrential rain season in Korea. The underlying hazards that cause slope failure are mainly linked with urbanization and industrialization. To minimize the disaster damages by slope failure, objective and unified evaluation approached are desired. Since currently available evaluation checklists are developed for specific purposed, there is a limitation to adapt those checklists for stability evaluation in natural terrain. This study proposes an improved evaluation checklist based on the comparison of previous checklists and applicability and feasibility are analyzed implementing field application.

  • PDF

- A case study & suggestion for Lecture Evaluation System of University - (강의평가제에 관한 사례연구 -학생대상 설문조사에 근거한 교수 강의평가제 중심으로-)

  • 유지철;김용범;서장훈
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.2
    • /
    • pp.239-253
    • /
    • 2003
  • Lecture Evaluation system is an only way, so far, to evaluate the quality of lectures in our university and yet has several problems. This system does not have any effects on professors; however, it is rather used to threaten assistant professors and/or part-time/full-time lecturers. As a result, students are still dissatisfied with the unchanging lectures of professors. Generally speaking, We should consider new ideas to introduce a head teacher system or improve the lecture evaluation system to open doors wider for teachers, professors do their best to expand students' understanding by practicing the Lecture Evaluation System. In fact, it is hard to keep the objectiveness that the professors estimate the quality of professors. That is why this check list should be restricted only as a guideline among the system. After all, it is expected to bring better educational circumstances when the system functions properly to provide professors to research more.