• Title/Summary/Keyword: Key task

Search Result 520, Processing Time 0.03 seconds

An Offloading Strategy for Multi-User Energy Consumption Optimization in Multi-MEC Scene

  • Li, Zhi;Zhu, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4025-4041
    • /
    • 2020
  • Mobile edge computing (MEC) is capable of providing services to smart devices nearby through radio access networks and thus improving service experience of users. In this paper, an offloading strategy for the joint optimization of computing and communication resources in multi-user and multi-MEC overlapping scene was proposed. In addition, under the condition that wireless transmission resources and MEC computing resources were limited and task completion delay was within the maximum tolerance time, the optimization problem of minimizing energy consumption of all users was created, which was then further divided into two subproblems, i.e. offloading strategy and resource allocation. These two subproblems were then solved by the game theory and Lagrangian function to obtain the optimal task offloading strategy and resource allocation plan, and the Nash equilibrium of user offloading strategy games and convex optimization of resource allocation were proved. The simulation results showed that the proposed algorithm could effectively reduce the energy consumption of users.

Chinese Multi-domain Task-oriented Dialogue System based on Paddle (Paddle 기반의 중국어 Multi-domain Task-oriented 대화 시스템)

  • Deng, Yuchen;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.308-310
    • /
    • 2022
  • With the rise of the Al wave, task-oriented dialogue systems have become one of the popular research directions in academia and industry. Currently, task-oriented dialogue systems mainly adopt pipelined form, which mainly includes natural language understanding, dialogue state decision making, dialogue state tracking and natural language generation. However, pipelining is prone to error propagation, so many task-oriented dialogue systems in the market are only for single-round dialogues. Usually single- domain dialogues have relatively accurate semantic understanding, while they tend to perform poorly on multi-domain, multi-round dialogue datasets. To solve these issues, we developed a paddle-based multi-domain task-oriented Chinese dialogue system. It is based on NEZHA-base pre-training model and CrossWOZ dataset, and uses intention recognition module, dichotomous slot recognition module and NER recognition module to do DST and generate replies based on rules. Experiments show that the dialogue system not only makes good use of the context, but also effectively addresses long-term dependencies. In our approach, the DST of dialogue tracking state is improved, and our DST can identify multiple slotted key-value pairs involved in the discourse, which eliminates the need for manual tagging and thus greatly saves manpower.

The Task and Role of the Quality Improvement Facilitator (QI전담자의 주요 업무 및 역할 규명)

  • Kim, Moon-sook;Kim, Hyun-ah;Kim, Yoon-sook
    • Quality Improvement in Health Care
    • /
    • v.21 no.2
    • /
    • pp.40-56
    • /
    • 2015
  • Objectives: To outline overall duties of quality improvement (QI) performers within a health care organization, thus describing their key tasks, including task element-related frequency, importance and difficulty in enough detail. Methods: A DACUM (Developing A CurriculUM) workshop took place to outline overall job activities of QI performers. To examine the scope of their duty and task, we performed a questionnaire survey of 338 QI performers from 111 hospitals. Results: The results of our survey showed that for the task assigned to each QI performer, there were 10 duties, 31 tasks and 119 task elements. Respondents cited a project planning as the most frequent/important duty, and a research was the highest level of difficulty in their duty. They also said that the most frequent task was index management, the most important task was a business plan, and the highest level of difficulty was a practical application of QI research. QI performers added that the most frequent task element was receipt of patient safety reporting in patient safety system, the most important task element was an analysis for patient safety and its improvement, and the highest level of difficulty was a regional influence analysis related to the patient safety and its improvement. Conclusion: To ensure that QI performers play a pivotal role as a manager to better improve patient safety and the quality of health care services, proper training program for them should be developed by reflecting the results of our study.

A Study of the PMI-based XML Access Control Model in Consideration of the Features of the Public Organization (공공기관의 특성을 고려한 PMI기반의 XML 접근제어 모델에 관한 연구)

  • Cho, Chang-Hee;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.173-186
    • /
    • 2006
  • The local public organizations, to secure the Confidentiality, Integrity, Authentication and Non-Repudiation of cyber administrative environment is giving it a try to consolidate the official documents among them by standardizing all the documents into XML formats together with the establishment of the GPKI(Government Public Key Infrastructure). The Authentication System based on the PKI(Public Key Infrastructure) used by the GPKI, however, provides only the simple User Authentication and thus it results in the difficulty in managing the position, task, role information of various users required under the applied task environment of public organizations. It also has a limitation of not supporting the detailed access control with respect to the XML-based public documents.In order to solve these issues, this study has analyzed the security problems of Authentication and access control system used by the public organizations and has drawn the means of troubleshoot based on the analysis results through the scenario and most importantly it suggests the access control model applied with PMI and SAML and XACML to solve the located problem.

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF

Activities of IEA SolarPACES & Task Programs (IEA SolarPACES 및 Task 활동)

  • Kang, Yong-Heack;Kim, Jong-Kyu;Lee, Hyun-Jin
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2011.04a
    • /
    • pp.246-249
    • /
    • 2011
  • SolarPACES is an international cooperative network bringing together teams of national exports from around the world to focus on the development and marketing of concentrating solar power systems (also known as solar thermal power systems). It is one of a number of collaborative programs, called Implementing Agreements, managed under the umbrella of the International Energy Agency to help find solutions to worldwide energy problems. Technology development is at the core of the work of SolarPACES. Member countries work together on activities aimed at solving the wide range of technical problems associated with commercialization of concentrating solar technology, including large-scale system tests and the development of advanced technologies, components, instrumentation, and systems analysis techniques. In addition to technology development, market development and building of awareness of the potential of concentrating solar technologies are key elements of the SolarPACES program The Implementing Agreement specifies broad "Tasks," or thematic areas of work SolarPACES currently has three ongoing tasks, focusing on concentrating solar electric power systems (Task I), solar chemistry research (Task II), and solar technology and applications (Task III). An Operating Agent, nominated by the ExCo, is responsible for overseeing the work of each task Each task maintains a detailed program of work that defines all task activities, including their objectives, participants, plans, and budgets. In addition to technical reports of the activities and their participants, accomplishments and progress are summarized in the SolarPACES annual report. Many SolarPACES activities involve close cooperation among member countries (either through sharing of task activities or, occasionally, cost-sharing), although some cooperation is limited to sharing of information and results with other participants. In this paper, structure, works, and members of SolarPACES and Korean activies in the SolarPACES are introduced.

  • PDF

Activities of IEA SolarPACES & Task Programs (IEA SolarPACES 및 Task 활동)

  • Kang, Yong-Heack;Kim, Jong-Kyu;Lee, Hyun-Jin
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2011.11a
    • /
    • pp.320-323
    • /
    • 2011
  • SolarPACES is an international cooperative network bringing together teams of national experts from around the world to focus on the development and marketing of concentrating solar power systems (also known as solar thermal power systems). It is one of a number of collaborative programs, called Implementing Agreements, managed under the umbrella of the International Energy Agency to help find solutions to worldwide energy problems. Technology development is at the core of the work of Solar PACES. Member countries work together on activities aimed at solving the wide range of technical problems associated with commercialization of concentrating solar technology, including large-scale system tests and the development of advanced technologies, components, instrumentation, and systems analysis techniques. In addition to technology development, market development and building of awareness of the potential of concentrating solar technologies are key elements of the Solar PACES program. The Implementing Agreement specifies broad "Tasks," or thematic areas of work. SolarPACES currently has three ongoing tasks, focusing on concentrating solar electric power systems (Task I), solar chemistry research (Task II), and solar technology and applications (Task III). An Operating Agent, nominated by the ExCo, is responsible for overseeing the work of each task. Each task maintains a detailed program of work that defines all task activities, including their objectives, participants, plans, and budgets. In addition to technical reports of the activities and their participants, accomplishments and progress are summarized in the SolarPACES annual report. Many SolarPACES activities involve close cooperation among member countries (either through sharing of task activities or, occasionally, cost-sharing), although some cooperation is limited to sharing of information and results with other participants. In this paper, structure, works, and members of SolarPACES and Korean activies in the SolarPACES are introduced.

  • PDF

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.

Cryptographic Key Generation Method Using Biometrics and Multiple Classification Model (생체 정보와 다중 분류 모델을 이용한 암호학적 키 생성 방법)

  • Lee, Hyeonseok;Kim, Hyejin;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1427-1437
    • /
    • 2018
  • While biometric authentication system has been in general use, research is ongoing to apply biometric data to public key infrastructure. It is a significant task to generate a cryptographic key from biometrics in setting up a public key of Bio-PKI. Methods for generating the key by quantization of feature vector can cause data loss and degrade the performance of key extraction. In this paper, we suggest a new method for generating a cryptographic key from classification results of biometric data using multiple classifying models. Our proposal does not cause data loss of feature vector so it showed better performance in key extraction. Also, it uses the multiple models to generate key blocks which produce sufficient length of the key.

KI-HABS: Key Information Guided Hierarchical Abstractive Summarization

  • Zhang, Mengli;Zhou, Gang;Yu, Wanting;Liu, Wenfen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4275-4291
    • /
    • 2021
  • With the unprecedented growth of textual information on the Internet, an efficient automatic summarization system has become an urgent need. Recently, the neural network models based on the encoder-decoder with an attention mechanism have demonstrated powerful capabilities in the sentence summarization task. However, for paragraphs or longer document summarization, these models fail to mine the core information in the input text, which leads to information loss and repetitions. In this paper, we propose an abstractive document summarization method by applying guidance signals of key sentences to the encoder based on the hierarchical encoder-decoder architecture, denoted as KI-HABS. Specifically, we first train an extractor to extract key sentences in the input document by the hierarchical bidirectional GRU. Then, we encode the key sentences to the key information representation in the sentence level. Finally, we adopt key information representation guided selective encoding strategies to filter source information, which establishes a connection between the key sentences and the document. We use the CNN/Daily Mail and Gigaword datasets to evaluate our model. The experimental results demonstrate that our method generates more informative and concise summaries, achieving better performance than the competitive models.