• Title/Summary/Keyword: Performance Information Use

Search Result 5,650, Processing Time 0.032 seconds

A connection caching technique using host grouping (호스트 그루핑을 이용하는 연결 캐슁 기법)

  • 양수미;조유근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.9
    • /
    • pp.2373-2384
    • /
    • 1996
  • Connection caching technique is widely used to reduce the overhead incurred by frequency connection establishment in distributed computing environment using connection oriented protocol. We present an efficient connection caching scheme where we divide the system into several host groups and connection between the hosts in the same group is kept prior to others. In other words it makes the connection kept longer by sharing the connection use information between hosts in the same group. Every host group consists of hosts which have heavy intercommunication. And we present performance evaluation of the effect of host grouping upon connection caching and performance comparison of various grouping in several aspects includingmeanservice request interarrival time, mean service time, group size, grouping and type of group. Simulation results show that host grouping is effective in evrey performance criterion and proper grouping of hosts enhances the performance. We also present analysis results for Markov process model of our scheme which are consistent with the simulation results.

  • PDF

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

An Empirical Study on Acceptance Intention Towards Healthcare Wearable Device (기술 및 개인적 특성이 헬스케어 웨어러블 디바이스 수용의도에 미치는 영향에 관한 연구)

  • Lee, Sang-Il;Yoo, Wang-Jin;Park, Hyun-Sun;Kim, Sang-Hyun
    • The Journal of Information Systems
    • /
    • v.25 no.2
    • /
    • pp.27-50
    • /
    • 2016
  • Purpose The purpose of this study is to examine the effect of the acceptance intention towards healthcare wearable device in Korea. Specifically, this study attempted to identify the relationships among the acceptance intention towards healthcare wearable device, technical characteristics and user's personal characteristic based on UTAUT(Unified Theory of Acceptance and Use of Technology) model. Design/methodology/approach For this purpose of research, we conducted against consumers who use the wearable devices and we collected data from 219 wearable device users. The analyses were conducted using SPSS and AMOS19.0 which is powerful structural equation modeling (SEM) software. Findings The main findings are as followed; First, functional diversity, wearability, trend sensitivity and health perception are significantly related to performance expectancy, while visual aesthetic and enjoyment are not significantly related. Second, performance expectancy and effort expectancy are significantly related to acceptance intention towards healthcare wearable device. Third, effort expectancy is significantly related to performance expectancy.

A Study on the Affecting Factors and Performance of IS Organizational Innovation - Use of the IS Development Methodology as an Object of Innovation - (IS 조직혁신의 영향요인과 성과에 관한 연구 - IS 개발방법론을 혁신 대상으로 -)

  • Chang, Yoon-Hee
    • Asia pacific journal of information systems
    • /
    • v.12 no.3
    • /
    • pp.135-167
    • /
    • 2002
  • This research focuses on the IS development methodology as an object of innovation in an IS organization. It has two main research objectives. It was intended to understand the critical affecting factors which have an effect on the processing of each level in the dynamic and evolving innovation process. There are two levels of innovation process: initiation and implementation. It was also intended to understand the performance of IS organizational innovation. We found three main results by the LISREL analysis. First, main factors affecting initiation level of innovation are innovative tendency of IS members, communication level of IS organization, existence of champion manager, IS performance gap, executive supporting to IS, and relative advantage of IS development methodology. At the implementation level, it was understood that the existence of champion manager, executive support, and relative advantage of IS development methodology were the main factors promoting to use the innovation, and the complexity of innovation was a negative factor adopting the usage of innovation. Second, the quality of the previous level in the gradual innovation activities gives very notable affection to the continuous next level. Finally, it was found that the qualitative performance like the documentation, collaborative team approach, IS developer's awareness and ability corresponding to their task and so on was improved due to the IS organizational innovation. This research provides the standard framework for the IS organizational innovation in a structural way. In the practical aspect, it may be used as the principle for introducing and using the IS development methodology.

A Hybrid Approach on Matrix Multiplication

  • Tolentino Maribel;Kim Myung-Kyu;Chae Soo-Hoan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06a
    • /
    • pp.400-402
    • /
    • 2006
  • Matrix multiplication is an important problem in linear algebra. its main significance for combinatorial algorithms is its equivalence to a variety of other problems, such as transitive closure and reduction, solving linear systems, and matrix inversion. Thus the development of high-performance matrix multiplication implies faster algorithms for all of these problems. In this paper. we present a quantitative comparison of the theoretical and empirical performance of key matrix multiplication algorithms and use our analysis to develop a faster algorithm. We propose a Hybrid approach on Winograd's and Strassen's algorithms that improves the performance and discuss the performance of the hybrid Winograd-Strassen algorithm. Since Strassen's algorithm is based on a $2{\times}2$ matrix multiplication it makes the implementation very slow for larger matrix because of its recursive nature. Though we cannot get the theoretical threshold value of Strassen's algorithm, so we determine the threshold to optimize the use of Strassen's algorithm in nodes through various experiments and provided a summary shown in a table and graphs.

  • PDF

An Improved Rayleigh Fading Compensation Algorithm with Modified Sinc Interpolation (수정된 Sinc 보간법을 이용한 새로운 Rayleigh 페이딩 보상 알고리즘)

  • 이창재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10A
    • /
    • pp.1492-1498
    • /
    • 2000
  • Pilot symbol aided modulation (PSAM) using the conventional sinc interpolation (CSI) achieves nearly the same BER performance as Caver' optimal Wiener interpolation but with much less complexity. The CSI, however, has to use a non-rectangular window function that is applied to the sinc function to smooth out the abrupt truncation of rectangular window. In this paper, we propose the modified sinc interpolation (MSI). With the weighting factor the MSI scheme with no window has almost the same BER performance as the CSI scheme using window, In addition, if we use the MSI with a window its BER performance gets close to that of the theoretical one. We assume the multicarrier QAM system and an optimal frame structure for performance evaluation.

  • PDF

Hyper Parameter Tuning Method based on Sampling for Optimal LSTM Model

  • Kim, Hyemee;Jeong, Ryeji;Bae, Hyerim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.137-143
    • /
    • 2019
  • As the performance of computers increases, the use of deep learning, which has faced technical limitations in the past, is becoming more diverse. In many fields, deep learning has contributed to the creation of added value and used on the bases of more data as the application become more divers. The process for obtaining a better performance model will require a longer time than before, and therefore it will be necessary to find an optimal model that shows the best performance more quickly. In the artificial neural network modeling a tuning process that changes various elements of the neural network model is used to improve the model performance. Except Gride Search and Manual Search, which are widely used as tuning methods, most methodologies have been developed focusing on heuristic algorithms. The heuristic algorithm can get the results in a short time, but the results are likely to be the local optimal solution. Obtaining a global optimal solution eliminates the possibility of a local optimal solution. Although the Brute Force Method is commonly used to find the global optimal solution, it is not applicable because of an infinite number of hyper parameter combinations. In this paper, we use a statistical technique to reduce the number of possible cases, so that we can find the global optimal solution.

Performance Analysis of Authentication Protocols of GPS, Galileo and BeiDou

  • Jeon, Da-Yeon;Gaybullaev, Turabek;Noh, Jae Hee;Joo, Jung-Min;Lee, Sang Jeong;Lee, Mun-Kyu
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Global Navigation Satellite System (GNSS) provides location information using signals from multiple satellites. However, a spoofing attack that forges signals or retransmits delayed signals may cause errors in the location information. To prevent such attacks, authentication protocols considering the navigation message structure of each GNSS can be used. In this paper, we analyze the authentication protocols of Global Positioning System (GPS), Galileo, and BeiDou, and compare the performance of Navigation Message Authentication (NMA) of the above systems, using several performance indicators. According to our analysis, authentication protocols are similar in terms of performing NMA and using Elliptic Curve Digital Signature Algorithm (ECDSA). On the other hand, they are different in several ways, for example, whether to perform Spreading Code Authentication (SCA), whether to use digital certificates and whether to use Timed Efficient Stream Loss-tolerant Authentication (TESLA). According to our quantitative analysis, the authentication protocol of Galileo has the shortest time between authentications and time to first authenticated fix. We also show that the larger the sum of the navigation message bits and authentication bits, the more severely affected are the time between authentications and the time to first authenticated fix.

Parameter Optimization of SOVA for the 3GPP complied Turbo code (3GPP 규격의 터보 복호기구현을 위한 SOVA 파라미터 최적화)

  • 김주민;고태환;정덕진
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.157-160
    • /
    • 2000
  • In order to design a low complexity and high performance SOVA decoder for Turbo Codes, we need to analyze the decoding performance with respect to several important design parameters and find out optimal values for them. Thus, we use a scaling factor of soft output and a update depth as the parameters and analyze their effect on the BER performance of the SOVA decoder. finally, we shows the optimal values of them for maximum decoding performance of SOVA decoder for 3GPP complied Turbo codes.

  • PDF

Performance of multi-level QAM transceiver with adaptive power control in fixed wireless channel

  • Lee, Seong-Choon;Lee, Yong-Hwan
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.533-536
    • /
    • 2000
  • We consider the design of quadrature amplitude modulation (QAM) transceivers f3r fixed wireless communications. The use of adaptive power control in the transmitter (Tx) can provide BER performance robust to fading and improved BER performance. The BER performance is evaluated by analytical and simulation results when multi-level QAM transceiver employing power control in the Tx is applied to fixed wireless channel with flat fading and frequency selective fading. The effect of power control parameters such as power control range and power control step size is investigated

  • PDF