• 제목/요약/키워드: Side Information

검색결과 3,585건 처리시간 0.036초

Analysis of the Value of Yield Information under Periodic Review Inventory System (정기발주 재고모형에서 공급자 수율 정보 공유의 기대효과 분석)

  • Min, Dai-Ki
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • 제36권3호
    • /
    • pp.61-74
    • /
    • 2011
  • The objective of this study is to evaluate the effects of sharing uncertain yield information with a downstream supply chain player. We are interested in understanding how the amount of yield uncertainty affects the supply-side benefits and/or costs, which has not been considered in the literature, in addition to the customer-side benefits. With that purpose, this work evaluates a supplier who provides yield information in comparison with another supplier who shares no information. We simulate an order-up-to type heuristic policy that is adapted from the literature and reasonably modified to represent yield information sharing with error. From the simulation study, we argue that the customer would experience cost reduction, but the cost for supplier's inventory is increasing when sharing yield information. Furthermore, the amount of benefits and costs are situational and affected by level of yield uncertainty and demand variance. Based on the simulation study, we finally make several recommendations for the supply-side approaches to yield information sharing.

Study on Bilateral Exercise Interface Techniques for Active Rehabilitation of the Upper Limb Hemiplegia (상지 편마비 환자의 능동형 재활운동을 위한 양측성 훈련 인터페이스 기법에 대한 연구)

  • Eom, Su-Hong;Song, Ki-Sun;Jang, Mun-Suck;Lee, Eung-Hyuk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • 제21권6호
    • /
    • pp.510-517
    • /
    • 2015
  • For the self-directed rehabilitation of upper extremity hemiplegia patients, in this paper we propose an interface method capable of doing bilateral exercises in rehabilitation robotics. This is a method for estimating information of movements from the unaffected-side, and projects it to the affected-side in order. That the affected-side is followed the movements of the unaffected-side. For estimation of the unaffected-side movements information, gyro sensor data and acceleration sensor data were fused. In order to improve the measurement error in data fusion, a HDR filter and a complementary filter were applied. Estimated motion information is derived the one side of the drive input of rehabilitation robot. In order to validate the proposed method, experimental equipment is designed to be similar to the body's joints. The verification was performed by comparing the estimation angle data from inertial sensors and the encoder data which were attached to the mechanism.

TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications

  • Seo, Seog Chung;Youn, Taek-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2922-2945
    • /
    • 2018
  • Achieving efficient authentication is a crucial issue for stream data commonly seen in content delivery, peer-to-peer, and multicast/broadcast networks. Stream authentication mechanisms need to be operated efficiently at both sender-side and receiver-side at the same time because of the properties of stream data such as real-time and delay-sensitivity. Until now, many stream authentication mechanisms have been proposed, but they are not efficient enough to be used in stream applications where the efficiency for sender and receiver sides are required simultaneously since most of them could achieve one of either sender-side and receiver-side efficiency. In this paper, we propose an efficient stream authentication mechanism, so called TIM, by integrating Trapdoor Hash Function and Merkle Hash Tree. Our construction can support efficient streaming data processing at both sender-side and receiver-side at the same time differently from previously proposed other schemes. Through theoretical and experimental analysis, we show that TIM can provide enhanced performance at both sender and receiver sides compared with existing mechanisms. Furthermore, TIM provides an important feature for streaming authentication, the resilience against transmission loss, since each data block can be verified with authentication information contained in itself.

A Study on 3D Face Modelling based on Dynamic Muscle Model for Face Animation (얼굴 애니메이션을 위한 동적인 근육모델에 기반한 3차원 얼굴 모델링에 관한 연구)

  • 김형균;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제7권2호
    • /
    • pp.322-327
    • /
    • 2003
  • Based on dynamic muscle model to construct efficient face animation in this paper 30 face modelling techniques propose. Composed face muscle by faceline that connect 256 point and this point based on dynamic muscle model, and constructed wireframe because using this. After compose standard model who use wireframe, because using front side and side 2D picture, enforce texture mapping and created 3D individual face model. Used front side of characteristic points and side part for correct mapping, after make face that have texture coordinates using 2D coordinate of front side image and front side characteristic points, constructed face that have texture coordinates using 2D coordinate of side image and side characteristic points.

Second-Order G-equivariant Logic Gate for AND Gate and its Application to Secure AES Implementation (AND 게이트에 대한 2차 G-equivariant 로직 게이트 및 AES 구현에의 응용)

  • Baek, Yoo-Jin;Choi, Doo-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제24권1호
    • /
    • pp.221-227
    • /
    • 2014
  • When implementing cryptographic algorithms in mobile devices like smart cards, the security against side-channel attacks should be considered. Side-channel attacks try to find critical information from the side-channel infromation obtained from the underlying cryptographic devices' execution. Especially, the power analysis attack uses the power consumption profile of the devices as the side-channel information. This paper proposes a new gate-level countermeasure against the power analysis attack and the glitch attack and suggests how to apply the measure to securely implement AES.

Distributed Video Coding with Reliability Estimation Based on Spatio-temporal Statistical Characteristics of Side Information (보조정보의 시공간 통계 특성에 기초한 신뢰도 예측에 의한 분산 비디오 부호화)

  • Kim, Jin-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제17권7호
    • /
    • pp.1694-1701
    • /
    • 2013
  • Distributed video coding technique(DVC) is needed for several applications with low bit rate or low encoding resources. However, since conventional DVC schemes have performance limitations and so as one of the several methods to overcome this problem and to improve the coding efficiency, DVC scheme with the moving information of side information has been developed. Based on this system, in this paper, an efficient reliability estimation is introduced to evaluate the blocks composing of side information and send these blocks location to the encoder side. Then, these enable the encoder to selectively encode and to improve the coding performance. Experimental results show that the proposed scheme performs better than the conventional coding scheme.

End-to-End Analysis to Audit Information Systems for Telecommunication Industry (통신산업의 정보시스템 감사를 위한 단대단 분석)

  • Lee, Joong Hee;Lee, Sangwon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 한국컴퓨터정보학회 2013년도 제48차 하계학술발표논문집 21권2호
    • /
    • pp.325-327
    • /
    • 2013
  • Although, there are so much information for telecommunication companies to manipulate and handle. there are still many side-effects in the field of completeness while transmitting information among information systems. Especially, works related to End-to-End Reconciliation bring about side-effects. In this research, we establish a proposed model for end-to-end analysis. After an experiment in a business company, we analyze its experimental results.

  • PDF

Analysis of BER in Slow Frequency-Hopping System with False Alarm and Miss in Side Information (Side Information에 오경보와 미탐지가 존재할 띠 저속 주파수 도약 시스템의 BER분석)

  • 한상진;김용철;강경원;윤희철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제26권11B호
    • /
    • pp.1556-1564
    • /
    • 2001
  • Reed-Solomon code, block interleaving and SI (side information) are frequently used in SFH (slow frequency hopping) system. Erasing those symbols in the hit frequency slot greatly increases the error connection capacity. Packet error rate has been the major performance measure for SFH system. The analysis of BER has been limited to the case of perfect Sl, in which neither miss nor false alarm exists. BER with imperfect Sl has been obtained only by Monte Carlo simulation. In this paper, we present a unified solution to estimate BER with imperfect Sl. It is shown that previous formulae for packet error rate or BER with perfect Sl are special cases in the proposed solution. The computed BER with false alarm and miss of frequency hit is verified by comparing with the simulation result.

  • PDF

The Design for DSRC Communication Technology of On Board Equipment in the Intelligent Transport System (지능형 교통체제에서 차량 단말장치의 DSRC 통신기술 설계)

  • Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제8권4호
    • /
    • pp.135-142
    • /
    • 2012
  • DSRC system is a communication system that consists of road side equipment and on board equipment to provide services of communication technology for intelligent transportation systems. In this paper, we carry out a short-range dedicated high-speed wireless communications via DSRC system based on board equipment that is installed in the vehicle and road side equipment through wireless channels of communication. on board equipment is system that have a memory which initialization information is stored, it loads physical layer and MAC layer, LLC layer, L7 layer in turn. In the upper, it should analyze the various commands that are sent from roadside base stations, and carry out the operation which is in accordance with the command. and also it designs the structure of protocol stack which is TRM Layer loaded that is to initialize on L7 layer and MAC layer and efficiently designs operation between on board equipment and the road side equipment.

A Design of Client BBS System for Secure HVA

  • Park, Jae-Kyung;Kim, Young-Ja
    • Journal of the Korea Society of Computer and Information
    • /
    • 제23권9호
    • /
    • pp.73-80
    • /
    • 2018
  • In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.