• Title/Summary/Keyword: I/I 분석방법

Search Result 4,078, Processing Time 0.026 seconds

Instruction Level Resource Usage Analysis Method for Embedded Systems (임베디드 시스템에서 명령어 기반의 자원 사용 분석 방법)

  • Cho, Jae-hwang;Jung, Hun;Shin, Dong-Ha;Son, Sung-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.436-439
    • /
    • 2005
  • As mobile computers and embedded systems are becoming popular recently, we need to study how to utilize the resources such as power, space, CPU clocks, and memory efficiently. In traditional embedded system development, we were interested in resource usage based on hardware but, as software is becoming more important, we need to study how to analyze the resource usage based on software. In this research, we propose a new method called 'Instruction Level Resource Usage Analysis Method' and implement it as a resource usage analysis tool called 'I-Debugger'. I-Debugger is constructed on three layers: debugging layer which controls the execution of software on instruction level, statistic layer which gathers real-time data and convert to useful information, and analysis layer which generate useful information to specific applications. We have applied the debugger to some simple problem and found that our method is useful in developing resource efficient embedded systems.

  • PDF

Type I projection sum of squares by weighted least squares (가중최소제곱법에 의한 제1종 사영제곱합)

  • Choi, Jaesung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.2
    • /
    • pp.423-429
    • /
    • 2014
  • This paper discusses a method for getting Type I sums of squares by projections under a two-way fixed-effects model when variances of errors are not equal. The method of weighted least squares is used to estimate the parameters of the assumed model. The model is fitted to the data in a sequential manner by using the model comparison technique. The vector space generated by the model matrix can be composed of orthogonal vector subspaces spanned by submatrices consisting of column vectors related to the parameters. It is discussed how to get the Type I sums of squares by using the projections into the orthogonal vector subspaces.

An Analysis of Behavior between Young and Old Users on Web Navigation (웹 네비게이션에서 일반 사용자와 고령 사용자의 행위 분석)

  • Bae, Yoon-Sun
    • Archives of design research
    • /
    • v.19 no.5 s.67
    • /
    • pp.161-170
    • /
    • 2006
  • In this study, I would like to suggest an idal model of web navigation design which can enhance users' web usability. I would like to prove that when users enjoy web navigation design, they access information much more effectively. Using a survey, I suggest some types of web navigation design for users. After that, I conducted an experiment with 4 types of web navigation designs, which have been developed to reflect varying stages of comprehensibility. My survey focused on three points. First I measured the time they spent to search for information. Secondly, I tested whether they lost their way while searching for information and if they did lose their way, I checked whether they could recover from their errors and find their way back. Thirdly, I investigated whether layout, location and size of the web navigation design factors affected usability. The results of my survey indicated that users spend the shortest time, have the easiest interface, and have least error incidence under the web navigation design to enhance old-aged users' web usability. Thus, developing a universal web navigation design can encourage people to be more involved with the internet.

  • PDF

Analysis of the Type-I/II Error for the Leaky Bucket Policing Algorithm in ATM Networks (ATM망에서 Leaky Bucket 사용 감시 알고리즘의 Type-I/II 에러 분석)

  • 이동호;안윤영;조유제
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.12
    • /
    • pp.1391-1400
    • /
    • 1992
  • In this paper, we suggested a method for evaluating the type-I/II error which is proposed by the CCITT as a criterion for the accuracy of policing algorithms in ATM networks, By the analysis of the type-I/II error of the Leaky Bucket(LB) algorithm, we investigated the relationships between the traffic parameters and the LB parameters to police the mean and peak cell rate effectively in the ON/OFF traffic. We showed that the LB parameters, the leaky rate a and the threshold M of the LB counter, could be determined as a pair of (a, M) satisfying the type-I/II error and minimizing the response time. In the ON/OFF traffic, it has been observed that the a-M characteristic curve of the LB policing algorithm only depends on the burstiness. As the results of the performance analysis, we found that the LB algorithm exhibits a good performance in the peak rate policing, but has some problems in the mean rate policing due to the trade-off between the accuracy and the response time.

  • PDF

Analysis and comparison of ontology development methodologies: based on CMM-I version 1.1 Maturity Level 2 and 3 (온톨로지 개발 방법론 분석 비교 (CMMI 버전 1.1 성숙 단계 2와 3을 기반으로))

  • Choi, Seung-Yong;Kim, Jeong-Ah;Jung, Ran;Bae, Je-Min;Hong, Chan-Ki;Choi, Sung-Woon
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.12
    • /
    • pp.1021-1036
    • /
    • 2007
  • As the requirement of Semantic Web and knowledge management has been rising, ontology developments have been carried out actively. Ontology is now at the point that systematic developing standardization should be made up like the developing a large scale software. Yet, It has not been made to optimize and standardize ontology development methodologies. In this study, to compare ontology development methodologies, METHONTOLOGY, CommonKADS, OTK in foreign countries and EOE in Korea are selected. The evaluating method is to introduce CMM-I version 1.1 framework. Ontology development methodologies have been evaluated in process areas that introduce for CMM-I maturity level 2 and 3. The purpose of this study is to find matured process and weak process in ontology development methodology on the view of process maturity, and suggests the areas to be Improved in it. The result of this study can be applied as basic data to establish and improve ontology development methodology.

An Empirical Study on the Industrial Cluster in Korea (한국의 산업클러스터에 관한 실증연구)

  • Jeong, Byeong-Sun;Pak, Rae-Hyeon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.10 no.1
    • /
    • pp.19-43
    • /
    • 2007
  • The purpose of this study is to distinguish industrial clusters in Korea. Based on I/O table in 2000, coefficient matrix was calculated and factor analysis was performed on the matrix. Among 38 derived industrial clusters, 5 of them were unreported clusters, which were indistinguishable. Once these 38 industrial clusters were differentiated according to I/O table, final results of clusters were produced as I/O table was converted into KSIC (Korean Standard Industry Code). Since existing studies on industrial cluster have been focused on qualitative methods such as case studies and interviews, it is expected that this study could contribute to carry out more systematic and efficient methodology.

  • PDF

Conditions and potentials of Korean history research based on 'big data' analysis: the beginning of 'digital history' ('빅데이터' 분석 기반 한국사 연구의 현황과 가능성: 디지털 역사학의 시작)

  • Lee, Sangkuk
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.6
    • /
    • pp.1007-1023
    • /
    • 2016
  • This paper explores the conditions and potential of newly designed and tried methodology of big data analysis that apply to Korean history subject matter. In order to advance them, we need to pay more attention to quantitative analysis methodologies over pre-existing qualitative analysis. To obtain our new challenge, I propose 'digital history' methods along with associated disciplines such as linguistics and computer science, data science and statistics, and visualization techniques. As one example, I apply interdisciplinary convergence approaches to the principle and mechanism of elite reproduction during the Korean medieval age. I propose how to compensate for a lack of historical material by applying a semi-supervised learning method, how to create a database that utilizes text-mining techniques, how to analyze quantitative data with statistical methods, and how to indicate analytical outcomes with intuitive visualization.

Analysis of Mutual Authentication, Key generation and Key exchange mechanism of IEEE 802.11i (IEEE 802-11i의 상호인증과 키 생성 및 교환 메커니즘 분석)

  • 박지혜;문일현;이옥연;김창범
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.249-253
    • /
    • 2003
  • 기존의 무선 랜의 보안상의 문제점들을 해결하기 위하여 사용자와 인증자사이의 상호인증과 키를 교환하는 메커니즘이 요구된다. 이것을 보안하기 위해 IEEE 802.11i에서 키 체계와 4-Way Handshake를 제안하였다. 본 논문에서 언급되는 키 생성 및 교환 메커니즘은 사용자와 서버간의 인증된 마스터키를 통한 사용자와 인증자의 상호인증과, 키 생성과 키 교환하는 방법에 초점을 맞추고 있다. 이러한 키를 생성하기 위한 Pairwise 키 체계와 키 교환을 위한 4-Way Handshake, 4-Way Handshake에서 사용되는 EAPOL-Key message에 대하여 분석하였다.

  • PDF

A Study on the Development of the Weapon System Effectiveness Indices (I) (한국적 무기체계 효과지수 개발에 관한 연구 (I) -무기체계 효과측정 방법론-)

  • Min, Kye-Ryo;Park, Kyung-Soo
    • Journal of the military operations research society of Korea
    • /
    • v.5 no.1
    • /
    • pp.123-135
    • /
    • 1979
  • Weapon System effectiveness indices are a key factor to the cost-effectiveness analysis in the process of allocating national resources in an optimal fashion. First part of this paper reviews the need of weapon -effectiveness indices, historical development of methodologies on military strength evaluation with various models of indices, and the interrelation-ship between weapon effectiveness indices and war-game. Second part of this paper analyzes the concepts and usage of the already developed methodologies, i .e., index of power, weapon lethality index (W.L.I.), index of fire power potential (I.F.P), fire power potential (F. P. P), and weapon effectiveness indices/weighted unit value (W. E. I/W. U. V.). Finally, weaknesses and limits of these methodologies are compared and evaluated. Result of this research shows that the W. L. I, I. F. P, and F. P. P seem to possess many non-scientific or ambiguous facets, but the W. E. I/W. U. V method produces more detailed, inclusive, and reasonable indices. The paper concludes with the emphasis on the importance of the provision of the theoretical bases to develop effectiveness indices which can be used to evaluate Korean weapon systems, and the early establishment of a specialized research group to manage and develop methodologies on the weapon effectiveness indices.

  • PDF