• Title/Summary/Keyword: Shared use

Search Result 686, Processing Time 0.023 seconds

Lessons Learned from an Implementation of Plant Monitoring System for Simulation (발전소 감시계통의 Virtual Simulation시 권고사항)

  • Seo In-Yong;Hwang Do-Hyun;Lee Yong-Hwan;Han Hwan-Ho
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.102-107
    • /
    • 2005
  • PMS(Plant Monitoring System) for simulation is the program for training that users such as instructor, operator, and supervisor can operate the plant virtually. Presented in this paper, are some lessons learned from implementation of PMS for simulation. First, this PMS fer simulation is based on LINUX instead of UNIX. These two OS(Operating System) have different platform and compiler version on it, so debugging needs to be done about variable defining part. Second, In LINUX system, the size of shared memory and message queue is already designated as a default value that user has to set up and use the RTAP DB. Third, to decrease the dummy data size, it has to be changed into binary formation. Lastly, PMS software for simulation provides several environments according to the command, so considered should be status monitoring, alarm, system organization, point and group monitoring, history storage and searching function.

  • PDF

Beyond Politeness: A Spoken Discourse Approach to Korean Address Reference Terms

  • Hong, Jin-Ok
    • English Language & Literature Teaching
    • /
    • v.15 no.2
    • /
    • pp.93-119
    • /
    • 2009
  • Internalized Confucian cultural scripts trigger meta-pragmatic thinking in Korean communication. Commonly shared cultural knowledge acts as a powerful constraint upon the behavioral patterns of each participant and this knowledge can be strategically manipulated to avoid confrontations. The strategic use of address reference terms utilizes cultural values as a face-redress mechanism to achieve situation-specific goals. This paper offers a view of Korean address reference terms that rests on four revisions of politeness theory (Brown & Levinson, 1978, 1987). First, the notion of discernment - or 'wakimae' - as a culture-specific mechanism is reanalyzed. Secondly, culture-specific values as another R (ranking of imposition) variable are introduced. Thirdly, a reevaluation of the notion of positive face (respect) is discussed. Finally, the address reference terms in combination with other honorifics by the speaker that can be strategically applied either to threaten or to enhance the face of the hearer is observed. Because Confucianism is embedded in Korean cultural identity, teaching cultural values integrated and their roles in situation-dependent politeness is required in order to understand interactional nature of politeness occurring from particular discourse contexts.

  • PDF

A study on the logistics cost reduction in textile industries by introducing Pad Pool System (PPS(PAD POOL SYSTEM) 도입에 의한 섬유업계 물류비 절감에 관한 연구)

  • Kwon An Sik;Park In Sul
    • Journal of the Korea Safety Management & Science
    • /
    • v.7 no.2
    • /
    • pp.95-106
    • /
    • 2005
  • Many Korean companies are challenged to reduce logistics cost and meet environmental-friendly logistics. The textile companies in harsh competition are requested to make improvement on their logistics environment to cut down the total cost. However, they have reached the limit on improving the manufacturing process. We believe that the logistics department is the most improvable part at present. Improving logistics will be highly effective to cut down the total cost. In this study, we present Pad Pool System(PPS) as the solution to save their logistics cost. PPS, which means the shared use of Styrofoam pads, will enable the textile companies to cut down their cost and strengthen enterprise competitiveness. Also, PPS will be helpful reducing environmental disruption because the system reuses retrieved Styrofoam pads many times.

A Fair Drop-tail Bandwidth Allocation Algorithm for High-speed Routers (고속 라우터를 위한 Drop-tail방식의 공정한 대역할당 알고리즘)

  • 이원일;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6A
    • /
    • pp.910-917
    • /
    • 2000
  • Because the random early detection(RED) algorithm deals all flows with the same best-effort traffic characteristic, it can not correctly control the output link bandwidth for the flows with different traffic characteristics. To remedy this problem, several per-flow algorithms have been proposed. In this paper, we propose a new per-flow type Fair Droptail algorithm which can fairly allocate bandwidth among flows over a shared output link. By evenly allocating buffers per flow, the Fair Droptail can restrict a flow not to use more bandwidth than others. In addition, it can be simply implemented even if it employs the per-flow state mechanism, because the Fair Droptail only keeps each information of flow in active state.

  • PDF

Implementation of Mobile Cliented-Server System for Real-Time Processing (실시간 처리 기반의 모바일 클라이언트-서버 시스템 구현)

  • Joo, Hae-Jong;Hong, Bong-Wha
    • The Journal of Information Technology
    • /
    • v.9 no.4
    • /
    • pp.35-47
    • /
    • 2006
  • Many researches are going on with regard to issues and problems related to mobile database systems, which are caused by the weak connectivity of wireless networks, the mobility and the portability of mobile clients. Mobile computing satisfies user's demands for convenience and performance to use information at any time and in any place, but it has many problems to be solved in the aspect of data management. The purpose of our study is to Implement Real-Time Mobile Query Processing System(MQPS) to solve problems related to database hoarding, the maintenance of shared dataconsistency and the optimization of logging, which are caused by the weak connectivity and disconnection of wireless networks inherent in mobile database systems under mobile client server environments. In addition, we proved the superiority of the proposed MQPS by comparing its performance to the C I S(Client-Intercept-Srever) model.

  • PDF

CPU Scheduling with a Round Robin Algorithm Based on an Effective Time Slice

  • Tajwar, Mohammad M.;Pathan, Md. Nuruddin;Hussaini, Latifa;Abubakar, Adamu
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.941-950
    • /
    • 2017
  • The round robin algorithm is regarded as one of the most efficient and effective CPU scheduling techniques in computing. It centres on the processing time required for a CPU to execute available jobs. Although there are other CPU scheduling algorithms based on processing time which use different criteria, the round robin algorithm has gained much popularity due to its optimal time-shared environment. The effectiveness of this algorithm depends strongly on the choice of time quantum. This paper presents a new effective round robin CPU scheduling algorithm. The effectiveness here lies in the fact that the proposed algorithm depends on a dynamically allocated time quantum in each round. Its performance is compared with both traditional and enhanced round robin algorithms, and the findings demonstrate an improved performance in terms of average waiting time, average turnaround time and context switching.

Performance Evaluation and Design of Intrusion Detection System Based on Immune System Model (면역 시스템 모델을 기반으로 한 침입 탐지 시스템 설계 및 성능 평가)

  • 이종성
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.3
    • /
    • pp.105-121
    • /
    • 1999
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of computers. Intrusion Detection System(IDS) has been an active research area to reduce the risk from intruders. We propose a new IDS model, which consists of several computers with IDS, based on the immune system model and describe the design of the IDS model and the prototype implementation of it for feasibility testing and evaluate the performance of the IDS in the aspect of detection time, detection accuracy, diversity which is feature of immune system, and system overhead. The IDSs are distributed and if any of distributed IDSs detect anomaly system call among system call sequences generated by a privilege process, the anomaly system call can be dynamically shared with other IDSs. This makes the IDSs improve the ability of immunity for new intruders.

  • PDF

An Approach for Developing Web Applications by Reusing Components of e-Government Standard Framework

  • Moon, Mikyeong;Kim, Dong-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.45-52
    • /
    • 2015
  • To solve the problem of low inter-operability of systems and low reusability caused by not being standardized and common-shared development foundation between software developers, the government has proposed e-Government(eGov) standard framework. However, the development method based on eGov standard framework is not easy to learn and to use fluently, because it is so dissimilar the existing traditional development method. In this paper, we propose an approach for developing web applications by reusing common components of eGov standard framework, and describe about the case study of developing Can_Pro(Computer Aided Nutritional analysis program for Professionals) based on eGov standard framework. Consequently, we show improvement in productivity and reduction budget through reusability of common components and eGov standard framework.

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

Survey of Temporal Information Extraction

  • Lim, Chae-Gyun;Jeong, Young-Seob;Choi, Ho-Jin
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.931-956
    • /
    • 2019
  • Documents contain information that can be used for various applications, such as question answering (QA) system, information retrieval (IR) system, and recommendation system. To use the information, it is necessary to develop a method of extracting such information from the documents written in a form of natural language. There are several kinds of the information (e.g., temporal information, spatial information, semantic role information), where different kinds of information will be extracted with different methods. In this paper, the existing studies about the methods of extracting the temporal information are reported and several related issues are discussed. The issues are about the task boundary of the temporal information extraction, the history of the annotation languages and shared tasks, the research issues, the applications using the temporal information, and evaluation metrics. Although the history of the tasks of temporal information extraction is not long, there have been many studies that tried various methods. This paper gives which approach is known to be the better way of extracting a particular part of the temporal information, and also provides a future research direction.