• Title/Summary/Keyword: Performance Information Use

Search Result 5,688, Processing Time 0.036 seconds

Developing a Big Data Analytics Platform Architecture for Smart Factory (스마트공장을 위한 빅데이터 애널리틱스 플랫폼 아키텍쳐 개발)

  • Shin, Seung-Jun;Woo, Jungyub;Seo, Wonchul
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1516-1529
    • /
    • 2016
  • While global manufacturing is becoming more competitive due to variety of customer demand, increase in production cost and uncertainty in resource availability, the future ability of manufacturing industries depends upon the implementation of Smart Factory. With the convergence of new information and communication technology, Smart Factory enables manufacturers to respond quickly to customer demand and minimize resource usage while maximizing productivity performance. This paper presents the development of a big data analytics platform architecture for Smart Factory. As this platform represents a conceptual software structure needed to implement data-driven decision-making mechanism in shop floors, it enables the creation and use of diagnosis, prediction and optimization models through the use of data analytics and big data. The completion of implementing the platform will help manufacturers: 1) acquire an advanced technology towards manufacturing intelligence, 2) implement a cost-effective analytics environment through the use of standardized data interfaces and open-source solutions, 3) obtain a technical reference for time-efficiently implementing an analytics modeling environment, and 4) eventually improve productivity performance in manufacturing systems. This paper also presents a technical architecture for big data infrastructure, which we are implementing, and a case study to demonstrate energy-predictive analytics in a machine tool system.

Automated Method for Detecting Use-After-Free Vulnerability of Windows System Calls Using Dynamic Symbolic Execution (동적 기호 실행을 이용한 윈도우 시스템 콜 Use-After-Free 취약점 자동 탐지 방법)

  • Kang, Sangyong;Lee, Gwonwang;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.803-810
    • /
    • 2017
  • Recently, social security problems have been caused by the development of the software industry, and a variety of automation techniques have been used to verify software stability. In this paper, we propose a method of automatically detecting a use-after-free vulnerability on Windows system calls using dynamic symbolic execution, one of the software testing methods. First, a static analysis based pattern search is performed to select a target point. Based on the detected pattern points, we apply an induced path search technique that blocks branching to areas outside of interest. Through this, we overcome limitations of existing dynamic symbolic performance technology and verify whether vulnerability exists at actual target point. As a result of applying the proposed method to the Windows system call, it is confirmed that the use-after-free vulnerability, which had previously to be manually analyzed, can be detected by the proposed automation technique.

The Impacts of Media Symbol Variety on Performance in Virtual Teams

  • Shim, Sang-Min;Suh, Kil-Soo;Im, Kun-Shin
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.3
    • /
    • pp.83-97
    • /
    • 2010
  • The purpose of this study is to examine the impacts of media symbol variety on group performance in virtual teams. Symbol variety is defined as the number of ways in which information can be communicated and includes Daft and Lengel [1986]'s multiplicity of cues and language variety. According to media richness theory and media synchronicity theory, the use of media with high symbol variety is assumed to facilitate and promote communications among virtual team members. Therefore, it is expected that the media symbol variety is positively associated with group performance in virtual teams. Furthermore, online relationship building is expected to mediate the impacts of symbol variety on the performance. To confirm the suppositions, a controlled lab experiment was conducted with 60 undergraduate students as subjects. In the experimental virtual teams, subjects were allowed to communicate with other members using text-based messenger with emoticons. Subjects in the control virtual teams were allowed to communicate using only text-based messenger. The direct impact of symbol variety on group performance in virtual teams was found insignificant. However, the online relationship was found to completely mediate the positive impact of symbol variety on group performance. The implications and limitations of this study are also discussed for future research.

  • PDF

An Effect of SNS Performance and Arts Information Service Quality on Initial Trust and Prosumer Activity: Focusing on Dance Performance (SNS 공연예술 정보서비스품질이 초기신뢰와 프로슈머 활동에 미치는 영향: 무용공연을 중심으로)

  • Park, Sun-Woo;Cho, Chul-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.1
    • /
    • pp.199-214
    • /
    • 2016
  • Purpose: The present study was designed to examine the casual relationships among performance and arts information service quality, initial trust, user satisfaction, reuse intention and prosumer activity in social network service(SNS). Also, we intended to explore significant factors on use performance of SNS through causal model analysis in the viewpoint of total effect. Methods: As a survey tool, questionnaire has obtained validity and reliability through literature survey, exploratory survey and pretest and sample 403 was selected. For statistical treatment of pretest and main analysis, SPSS18.0 and AMOS18.0 were employed and structural equation model was employed as analysis method. Results: Result of this study shows as follows. Two factors (precision and reciprocal action) have an effect on user satisfaction, initial trust, reuse intention and prosumer activity. We found that with an importance of initial trust, prosumer activity can be a useful and significant factor in causal relationship of SNS. Conclusion: The present study shows that two factors(precision and reciprocal action) in via of initial trust, were important factors that related companies have to emphasize to raise performance, And also we confirmed new factor 'prosumer activity' through this study. However, the present study has some limitations to be studied in the future.

Analysis of Critical Success Factors for E-Commerce through Comparative Study among Korea, U.S.A. and Japan (전자상거래의 성공요인: 한.미.일 비교 분석)

  • Sung, Tae-Kyung
    • Asia pacific journal of information systems
    • /
    • v.13 no.4
    • /
    • pp.171-189
    • /
    • 2003
  • The three main purposes of this paper are to (1) identify critical success factors(CSFs) for electronic commerce(EC), (2) investigate the explanatory power of these CSFs on firm performance, and (3) compare differences in evaluating CSFs and explaining impact of CSFs on performance among Korea, Japan, and U.S.A. EC firms. Through a literature review and interviews with managers in EC firms, a list of 16 CSFs consisting of 111 items was compiled. In the second stage, questionnaires were administered to managers of EC companies in Seoul, Korea, Tokyo, Japan, and Texas, U.S.A. Survey results show that CSFs have very significant explanatory power for firm performance in Korea, Japan, and U.S.A. While security, privacy, technical expertise, information about goods/services, and variety of goods/services are the most explanatory CSFs in Korea and Japan, evaluation of EC operations, technical expertise, and ease of use show most explanatory power in U.S.A. In general, respondents in Korean and Japan evaluate CSFs quite differently compared to U.S.A counterparts.

Improvement of Recognition Performance for Limabeam Algorithm by using MLLR Adaptation

  • Nguyen, Dinh Cuong;Choi, Suk-Nam;Chung, Hyun-Yeol
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.4
    • /
    • pp.219-225
    • /
    • 2013
  • This paper presents a method using Maximum-Likelihood Linear Regression (MLLR) adaptation to improve recognition performance of Limabeam algorithm for speech recognition using microphone array. From our investigation on Limabeam algorithm, we can see that the performance of filtering optimization depends strongly on the supporting optimal state sequence and this sequence is created by using Viterbi algorithm trained with HMM model. So we propose an approach using MLLR adaptation for the recognition of speech uttered in a new environment to obtain better optimal state sequence that support for the filtering parameters' optimal step. Experimental results show that the system embedded with MLLR adaptation presents the word correct recognition rate 2% higher than that of original calibrate Limabeam and also present 7% higher than that of Delay and Sum algorithm. The best recognition accuracy of 89.4% is obtained when we use 4 microphones with 5 utterances for adaptation.

Vehicle Shadow Detection in Thermal Videos (열 영상에서의 차량 그림자 제거 기법)

  • Kim, Ji-Man;Choi, Eun-Ji;Lim, Jeong-Eun;Noh, Seung-In;Kim, Dai-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.369-371
    • /
    • 2012
  • Shadow detection and elimination is a critical issue in vision-based system to improve the detection performance of moving objects. However, traditional algorithms are useless at night time because they used the chromaticity and brightness information from the color image sequence. To obtain the high detection performance, we can use the thermal camera and there are shadows by the heat not the light. We proposed a novel algorithm to detect and eliminate the shadows using the thermal intensity and the locality property. By combining two results of the intensity-based and locality-based, we can detect the shadows by the heat and improve the detection performance of moving object.

A Two-bit Bus-Invert Coding Scheme With a Mid-level State Bus-Line for Low Power VLSI Design

  • Yoon, Myungchul
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.14 no.4
    • /
    • pp.436-442
    • /
    • 2014
  • A new bus-invert coding circuit, called Two-bit Bus-Invert Coding (TBIC) is presented. TBIC partitions a bus into a set of two-bit sub-buses, and applies the bus-invert (BI) algorithm to each sub-bus. Unlike ordinary BI circuits using invert-lines, TBIC does not use an invert-line, so that it sends coding information through a bus-line. To transmit 3-bit information with 2 bus-lines, TBIC allows one bus-line to have a mid-level state, called M-state. TBIC increases the performance of BI algorithm, by suppressing the generation of overhead transitions. TBIC reduces bus transitions by about 45.7%, which is 83% greater than the maximum achievable performance of ordinary BI with invert-lines.

Improved Upper Bounds on Low Density Parity Check Codes Performance for the Input Binary AWGN Channel

  • Yu Yi;Lee, Moon-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.323-326
    • /
    • 2002
  • In this paper, we study the improved bounds on the performance of low-density parity-check (LDPC) codes over binary-input additive white Gaussian noise (AWGN) channels with belief propagation (BP) decoding in log domain. We define an extended Gallager ensemble based on a new method of constructing parity check matrix and make use of this way to improve upper bound of LDPC codes. At the same time, many simulation results are presented in this paper. These results indicate the extended Gallager ensembles based on Hamming codes have typical minimum distance ratio, which is very close to the asymptotic Gilbert Varshamov bound and the superior performance which is better than the original Gallager ensembles.

  • PDF

Feasibility and Performance Analysis of RDMA Transfer through PCI Express

  • Choi, Min;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.95-103
    • /
    • 2017
  • The PCI Express is a widely used system bus technology that connects the processor and the peripheral I/O devices. The PCI Express is nowadays regarded as a de facto standard in system area interconnection network. It has good characteristics in terms of high-speed, low power. In addition, PCI Express is becoming popular interconnection network technology as like Gigabit Ethernet, InfiniBand, and Myrinet which are extensively used in high-performance computing. In this paper, we designed and implemented a evaluation platform for interconnect network using PCI Express between two computing nodes. We make use of the non-transparent bridge (NTB) technology of PCI Express in order to isolate between the two subsystems. We constructed a testbed system and evaluated the performance on the testbed.