• Title/Summary/Keyword: Performance attribute

Search Result 446, Processing Time 0.024 seconds

Performance of Spatial Join Operations using Multi-Attribute Access Methods (다중-속성 색인기법을 이용한 공간조인 연산의 성능)

  • 황병연
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.271-282
    • /
    • 1999
  • In this paper, we derived an efficient indexing scheme, SJ tree, which handles multi-attribute data and spatial join operations efficiently. In addition, a number of algorithms for manipulating multi-attribute data are given , together with their computational and I/O complexity . Moreover , we how that SJ tree is a kind of generalized B-tree. This means that SJ-tree can be easily implemented on existing built-in B-tree in most storage managers in the sense that the structure of SJ tree is like that of B-tree. The spatial join operation with spatial output is benchmarked using R-tree, B-tree, K-D-B tree, and SJ tree. Results from the benchmark test indicate that SJ tree out performance other indexing schemes on spatial join with point data.

  • PDF

Classification of Quality Attributes Using Two-dimensional Evaluation Table (수정된 이원평가표를 이용한 품질속성의 분류에 관한 연구)

  • Kim, Gwangpil;Song, Haegeun
    • Journal of the Korea Safety Management & Science
    • /
    • v.20 no.1
    • /
    • pp.41-55
    • /
    • 2018
  • For several decades, attribute classification methods using the asymmetrical relationship between an attribute performance and the satisfaction of that attribute have been explored by numerous researchers. In particular, the Kano model, which classifies quality attributes into 5 elements using simple questionnaire and two-dimensional evaluation table, has gained popularity: Attractive, One-dimensional, Must-be, Indifferent, and Reverse quality. As Kano's model is well accepted, many literatures have introduced categorization methods using the Kano's evaluation table at attribute level. However, they applied different terminologies and classification criteria and this causes confusion and misunderstanding. Therefore, a criterion for quality classification at attribute level is necessary. This study is aimed to suggest a new attribute classification method that sub-categorizes quality attributes using 5-point ordinal point and Kano's two-dimensional evaluation table through an extensive literature review. For this, the current study examines the intrinsic and extrinsic problems of the well-recognized Kano model that have been used for measuring customer satisfaction of products and services. For empirical study, the author conducted a comparative study between the results of Kano's model and the proposed method for an e-learning case (33 attributes). Results show that the proposed method is better in terms of ease of use and understanding of kano's results and this result will contribute to the further development of the attractive quality theory that enables to understand both the customers explicit and implicit needs.

Introduction to a New Reasoning Technique: Code Arrangement-Based Reasoning (새로운 추론 기법 소개: 코드배열기반 추론)

  • Kang, Min-Cheol;Im, Ho-Youn
    • Asia pacific journal of information systems
    • /
    • v.14 no.3
    • /
    • pp.77-92
    • /
    • 2004
  • When humans make decisions, they differentiate classifications of individual attribute variables that affect the decisions according to the importance and pattern of each attribute variables. The present study examines the practicality of the proposed Code Arrangement-Based Reasoning(CABR), which resembles the human's way of reasoning. To this end, we developed a CABR technique that classifies each attribute variable affecting significant impacts on the target variable into a cluster and assigns a code to the cluster. For verifying the proposed technique, both case-based reasoning and CABR were used for the customer continuance judgment problem of an automobile insurance company. Results indicated that the performance of CABR is close to the one of the case-based reasoning. The CABR also shows the possibility of using bio-informatics techniques for organizational data analysis in the future.

Periocular Recognition Using uMLBP and Attribute Features

  • Ali, Zahid;Park, Unsang;Nang, Jongho;Park, Jeong-Seon;Hong, Taehwa;Park, Sungjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6133-6151
    • /
    • 2017
  • The field of periocular biometrics has gained wide attention as an alternative or supplemental means to conventional biometric traits such as the iris or the face. Periocular biometrics provide intermediate resolution between the iris and the face, which enables it to support both. We have developed a periocular recognition system by using uniform Multiscale Local Binary Pattern (uMLBP) and attribute features. The proposed system has been evaluated in terms of major factors that need to be considered on a mobile platform (e.g., distance and facial pose) to assess the feasibility of the use of periocular biometrics on mobile devices. Experimental results showed 98.7% of rank-1 identification accuracy on a subset of the Face Recognition Grand Challenge (FRGC) database, which is the best performance among similar studies.

Research and Development Methodology for Practical Use of Accident Tolerant Fuel in Light Water Reactors

  • Kurata, Masaki
    • Nuclear Engineering and Technology
    • /
    • v.48 no.1
    • /
    • pp.26-32
    • /
    • 2016
  • Research and development (R&D) methodology for the practical use of accident tolerant fuel (ATF) in commercial light water reactors is discussed in the present review. The identification and quantification of the R&D-metrics and the attribute of candidate ATF-concepts, recognition of the gap between the present R&D status and the targeted practical use, prioritization of the R&D, and technology screening schemes are important for achieving a common understanding on technology screening process among stakeholders in the near term and in developing an efficient R&D track toward practical use. Technology readiness levels and attribute guides are considered to be proper indices for these evaluations. In the midterm, the selected ATF-concepts will be developed toward the technology readiness level-5, at which stage the performance of the prototype fuel rods and the practicality of industrial scale fuel manufacturing will be verified and validated. Regarding the screened-out concepts, which are recognized to have attractive potentials, the fundamental R&D should be continued in the midterm to find ways of addressing showstoppers.

Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise

  • Priya, A.Sagaya;Kumar, S.Britto Ramesh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.97-102
    • /
    • 2022
  • Network intrusion detection is becoming an increasing necessity for both organizations and individuals alike. Detecting intrusions is one of the major components that aims to prevent information compromise. Automated systems have been put to use due to the voluminous nature of the domain. The major challenge for automated models is the noise and data imbalance components contained in the network transactions. This work proposes an ensemble model, Attribute Subset Selector Bagging (ASUB) that can be used to effectively handle noise and data imbalance. The proposed model performs attribute subset based bag creation, leading to reduction of the influence of the noise factor. The constructed bagging model is heterogeneous in nature, hence leading to effective imbalance handling. Experiments were conducted on the standard intrusion detection datasets KDD CUP 99, Koyoto 2006 and NSL KDD. Results show effective performances, showing the high performance of the model.

Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures (비단조 접근 구조를 갖는 CP-ABE 방식)

  • Sadikin, Rifki;Moon, SangJae;Park, YoungHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control mechanism without a trusted server. We propose an attribute-based access control mechanism by incorporating a CP-ABE scheme to ensure only authorized users can access the sensitive data. The idea of CP-ABE is to include access control policy in the ciphertexts, in which they can only be decrypted if a user possesses attributes that pass through the ciphertext's access structure. In this paper, we prove a secure CP-ABE scheme where the policy can be expressed in non-monotonic access structures. We further compare the performance of our scheme with the existing CP-ABE schemes.

Palette-based Color Attribute Compression for Point Cloud Data

  • Cui, Li;Jang, Euee S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3108-3120
    • /
    • 2019
  • Point cloud is widely used in 3D applications due to the recent advancement of 3D data acquisition technology. Polygonal mesh-based compression has been dominant since it can replace many points sharing a surface with a set of vertices with mesh structure. Recent point cloud-based applications demand more point-based interactivity, which makes point cloud compression (PCC) becomes more attractive than 3D mesh compression. Interestingly, an exploration activity has been started to explore the feasibility of PCC standard in MPEG. In this paper, a new color attribute compression method is presented for point cloud data. The proposed method utilizes the spatial redundancy among color attribute data to construct a color palette. The color palette is constructed by using K-means clustering method and each color data in point cloud is represented by the index of its similar color in palette. To further improve the compression efficiency, the spatial redundancy between the indices of neighboring colors is also removed by marking them using a flag bit. Experimental results show that the proposed method achieves a better improvement of RD performance compared with that of the MPEG PCC reference software.

A Flexible Attribute-based RBAC Model

  • Kim, Si-Myeong;Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.131-138
    • /
    • 2022
  • In this paper, we propose an FA-RBAC (FA-RBAC) model based on flexible properties. This model is assigned attribute-role-centric, making it easy to manage objects, as efficient as access control, and as the network environment changes, it can provide flexible access control. In addition, fine-grained permissions and simple access control can be achieved while balancing the advantages and disadvantages of the RBAC and ABAC models, reducing the number of access control rules by combining static attribute-based roles and dynamic attribute-based rules, and verifying the validity and performance benefits of the proposed model through comparison analysis and simulation.

BACS : An Experimental Study For Access Control System In Public Blockchain (BACS : 퍼블릭 블록체인 접근 통제 시스템에 관한 실험적 연구)

  • Han, Sejin;Lee, Sunjae;Lee, Dohyeon;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • In this paper, we propose an access control system using cryptography as a method to protect personal data in public blockchain. The proposed system is designed to encrypt data according to the access policy, store it in the blockchain, and decrypt only the person who satisfy the access policy. In order to improve performance and scalability, an encryption mechanism is implemented outside the blockchain. Therefore, data access performance could be preserved while cryptographic operations executed Furthermore it can also improve the scalability by adding new access control modules while preserving the current configuration of blockchain network. The encryption scheme is based on the attribute-based encryption (ABE). However, unlike the traditional ABE, the "retention period", is incorporated into the access structure to ensure the right to be forgotten. In addition, symmetric key cryptograpic algorithms are used for the performance of ABE. We implemented the proposed system in a public blockchain and conducted the performance evaluation.