• Title/Summary/Keyword: Star 망

Search Result 89, Processing Time 0.03 seconds

Korean Leading Actors & Directors Network Power Analysis for Audience Stability 1998-2007 (한국영화 주요 배우.감독 네트워크의 관객동원 안정성에 관한 연구 : 1998-2007 영화를 중심으로)

  • Ryu, Seol-Ri;Ryu, Seoung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.6
    • /
    • pp.62-71
    • /
    • 2009
  • This paper is a study on the elected korean leading actors & directors who have stable mobility power for audience and social networking. We elected 153 most reliable Korea actors and directors of stardom" (50 directors, 103 actors); they have to put on the name in the 20 high ranks, and more than twice from the total amount of Korean audience about showing 700 movies by 1998-2007. And then we analyze out 'who might be centre in social networking and social networking between actor and director," through 'Centrality Analysis' using the "UCINET" social networking analysis program Finally, we know 'Kim sang-jin director' is 'key men' and 'star' who reduced uncertainty definitely: For a long time, he combines most stable audience power with broad network successfully.

Retrospective Maximum Likelihood Decision Rule for Tag Cognizance in RFID Networks (RFID 망에서 Tag 인식을 위한 회고풍의 최대 우도 결정 규칙)

  • Kim, Joon-Mo;Park, Jin-Kyung;Ha, Jun;Seo, Hee-Won;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.21-28
    • /
    • 2011
  • We consider an RFID network configured as a star in which tags stationarily move into and out of the vicinity of the reader. To cognize the neighboring tags in the RFID network, we propose a scheme based on dynamic framed and slotted ALOHA which determines the number of slots belonging to a frame in a dynamic fashion. The tag cognizance scheme distinctively employs a rule for estimating the expected number of neighboring tags, identified as R-retrospective maximum likelihood rule, where the observations attained in the R previous frames are used in maximizing the likelihood of expected number of tags. Simulation result shows that a slight increase in depth of retrospect is able to significantly improve the cognizance performance.

Analysis on Narrative Structure of TV Audition Reality Show : Focusing on the and (텔레비전 오디션 리얼리티 쇼의 서사구조 분석 : <스타오디션 위대한 탄생>과 <슈퍼스타 K2>를 중심으로)

  • Choi, So-Mang;Kang, Seung-Mook
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.120-131
    • /
    • 2012
  • This study has attempted to explore the way to construct the reality and its implication of the narrative elements in TV Audition Reality Show. According to the study results, first of all, two audition reality show has added the special tasks to characters based on the competition and has developed the dramatic events sequentially. And they has suggested the course of way between survival and fail, that is, inclusion and exclusion. As that results, audiences has be immersed in the process of the justification of the star(hero) myth and the dealings of musical elements to see dramatized show of narrative. And they knew audition reality show as non-real fiction, so they enjoyed the pleasure spontaneously. These means that the empowered media reproduced the illusion like star(hero) with the purpose of the commercial and political aim and one of the ideology to acquiesce in the appropriateness of the competition.

On-Demand Tunnel Creation Mechanism in Star VPN Topology (성형 VPN 구조에서의 주문형 터널 생성 메커니즘)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.452-461
    • /
    • 2005
  • In the star VPN (Virtual Private Network) topology, the traffic between the communicating two CPE(Customer Premise Equipment) VPN GW(Gateway)s nay be inefficiently transferred. Also, the Center VPN GW nav erperience the overload due to excessive packet processing overhead. As a solution to this problem, a direct tunnel can be established between the communicating two CPE VPN GWs using the IKE (Internet Key Exchange) mechanism of IPSec(IP Security). In this case, however, the tunnel establishment and management nay be complicated. In this paper, we propose a mechanism called' SVOT (Star VPN On-demand Tunnel)', which automatically establishes a direct tunnel between the communicating CPE VPN GWs based on demand. In the SVOT scheme, CPE VPN GWs determine whether it will establish a direct tunnel or not depending on the traffic information monitored. CPE VPN GW requests the information that is necessary to establishes a direct tunnel to the Center VPN GW Through a simulation, we investigate the performance of the scheme performs better than the SYST scheme with respect to scalability, traffic efficiency and overhead of Center VPN GW, while it shows similar performance to the FVST with respect to end-to-end delay and throughput.

Synchronous Reservation Protocol for Variable-sized Messages in a WDM-based Local Network (WDM 망에서 가변 길이의 메시지 전송을 위한 동기 예약 프로토콜)

  • Lee, Jae-Hwoon;Rim, Min-Joong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.6
    • /
    • pp.1-10
    • /
    • 2001
  • In this paper, we propose a synchronous reservation protocol that is efficient for supporting variable sized messages in a wavelength division multiplexing (WDM) based local network using a passive star topology. A. control channel is used to coordinate transmission on data channels. Time is slotted with fixed-sized slots. The network can accommodate a variable number of nodes, and can operate independently of the change of the number of nodes. So, any 'new' node can join the network anytime without network re-initialization. Moreover, with the protocol, we can avoid data channel and destination conflicts. We analyze the performance by using EPA method according to the variation of the end to end propagation delay with respect to one slot time, and validate the results by simulation.

  • PDF

Analysis of fault current in offshore wind farm ccording to the grid connection method (해상풍력 발전단지의 전력망 연계방식에 따른 고장전류 분석)

  • Ahn, Jin-Hong;Kim, Eel-Hwan
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.691-698
    • /
    • 2020
  • The installation cost or the magnitude of the fault current varies depending on the grid connection method of the offshore wind farm. Therefore, there is a need for an efficient power grid connection method considering the capacity and location of the complex. In particular, most power cables in offshore wind farms use 3-core considering cost and efficiency. In the event of a failure such as a short circuit, the entire cable must be replaced, which can lead to significant losses in terms of cost, considering repair costs and turbine downtime. Therefore, in this paper, a radial, ring, and molding method is introduced into a 100 MW wind farm to be installed at Jeju offshore, and a three-phase short circuit failure is performed using a PSCAD/EMTDC program to perform computer analysis. I would like to propose a suitable power grid connection method.

Cognitive Emotional Schema Analysis through Characters' Network in Shakespeare in Love : The Writing Process of Romeo and Juliet and the Subject of Desire (<셰익스피어 인 러브> 인물 관계망을 통한 인지 감성 분석: 『로미오와 줄리엣』의 창작 및 욕망의 주체)

  • Park, Eun Jung;Sohn, Kirak
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.425-435
    • /
    • 2016
  • This paper has the aim to track down the viewers' cognitive emotion of how they are interacting with the story of Shakespeare in Love. Human minds have cognitive and emotional flows while plots, characters, and action-ideas are intertwined in the story of the film. This paper especially focused on the analysis of characters' networks with four statistical data pictures in order to schematize the storytelling architecture on how and why Shakespeare has strongly motivated to write a great star-crossed love play, Romeo and Juliet in his very young age. This paper examines that Shakespeare's subject of desire is to accomplish both a true love and a sincere play which can make the nature of love true. The desire of subject is always slipped aside into scattering with "object a." In the film of Shakespeare in Love, the "object a" is a writing process and has a product of Romeo and Juliet as well.

Bayes Stopping Rule for MAC Scheme Wireless Sensor Networks (무선 센서 망에서 MAC 방식을 위한 Bayes 중지 규칙)

  • Park, Jin-Kyung;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.7
    • /
    • pp.53-61
    • /
    • 2008
  • Consider a typical wireless sensor network in which stem nodes form the backbone network of mesh topology while each stem node together with leaf nodes in its vicinity forms a subnetwork of star topology. In such a wireless sensor network, we must heed the following when we design a MAC scheme supporting the packet delivery from a leaf node to a stem node. First, leaf nodes are usually battery-powered and it is difficult to change or recharge their batteries. Secondly, a wireless sensor network is often deployed to collect and update data periodically. Late delivery of a data segment by a sensor node causes the sink node to defer data processing and the data segment itself to be obsolete. Thirdly, extensive signaling is extremely limited and complex computation is hardly supported. Taking account of these facts, a MAC scheme must be able to save energy and support timeliness in packet delivery while being simple and robust as well. In this paper, we propose a version of ALOHA as a MAC scheme for a wireless sensor network. While conserving the simplicity and robustness of the original version of ALOHA, the proposed version of ALOHA possesses a distinctive feature that a sensor node decides between stop and continuation prior to each delivery attempt for a packet. Such a decision needs a stopping rule and we suggest a Bayes stopping rule. Note that a Bayes stopping rule minimizes the Bayes risk which reflects the energy, timeliness and throughput losses. Also, a Bayes stopping rule is practical since a sensor node makes a decision only using its own history of delivery attempt results and the prior information about the failure in delivery attempt. Numerical examples confirm that the proposed version of ALOHA employing a Bayes stopping rule is a useful MAC scheme in the severe environment of wireless sensor network.

A Study on Optimization of Transmission network platform using for DWDM in Optical fiber system (파장분할 광통신 방식을 이용한 전송망 구축의 최적화 방안 연구)

  • Kim, Sang-Kyun;Woo, Mi-Ae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.1117-1120
    • /
    • 2003
  • DWDM(DensedWavelengthDivisionMultiplexing)은 광 파이버를 이용하여 기존의 통신보다 높은 대역폭(B/W)을 얻기 위한 기술로 여러 신호를 각각 다른 파장으로 변조해 하나의 Fiber 를 통해 전송하는 방식이며, 기본적으로 EDFA(Erbium Doped Fiber Amplifier), AWG(Arrayed Wave guide Grating), OADM(Optical Add/Drop Multiplexer) 등의 주요 부품과 여러 광 관련 부품들로 구성돼 있으며, 다수의 파장을 MUX(AWG)에서 다중화하고, 장거리 전송을 위해 OA(EDFA)에서 광신호를 증폭하게 된다 그리고 일부 특정 파장만 Add/Drop하기 위해 OADM이 놓이게 되며, 또한 선로(광섬유)의 손실을 보상하기 위해 필요한 구간에 리피터(EDFA)를 두어 광신호를 증폭 송신하며 수신단에서는 들어오는 여러 파장을 OA(EDFA)를 통해 증폭한 후 DEMUX(AWG)에서 역 다중화해 수신하게 된다. 이와 같은 DWDM방식을 이용한 Network는 Star, Mesh, Ring 등의 다양한 형태로 구성될 수 있으며, 초기에는 Point-to-Point 방식의 장거리 전송에 주로 사용돼 왔으나 Metro 구간의 Traffic 이 급격히 증가하면서 Metro- DWDM Network 이 부각되고 있어 본 논문에서는 현재 SK Telecom에서 상용화되고 있는 1,600G DWDM과 Metro-DWDM간의 망 구축의 최적화 방안을 연구해 본다.

  • PDF

신규 가입자망 기술의 경제성 평가를 위한 망 구조모형과 그 응용

  • 류태규;이정동;김태유
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2000.11a
    • /
    • pp.45-67
    • /
    • 2000
  • Broadband access technologies plays an important role in the national information infrastructure. In the evolution path of the information infrastructure, the relative economics of alternative access technology is the most critical determining factor. In this paper, we discuss the economics of local loop access technologies of existing technologies, such as, ADSL, HFC, and new PLC. To do this, we suggest appropriate configuration of access network system and its associated numerical equations. To modelize access network system and drive the numerical equations, we consider the DS (Double Star) and the T&B (Tree & Brench) architecture and analyse the adequate block diagram of each access system for each technology We introduce the density of subscriber as a key variable and the equation of allocating optimal number of cell in a service area. We analyze the relative economics of local loop architecture in two different situations, that is, urban and rural. From the empirical implementation, we found that for the case of urban area, where the cost of cable and infrastructure is not necessary, there is not much difference in the cost per one subscriber. However, for the case of rural region, we found that there is remarkable difference in the cost per one subscriber among technologies. Therefore we conclude that the economics of local loop architecture is depend on the density of subscriber and existing network infrastructures. we hope that this paper contribute to the optimal technology selection of consmer, technology Providers, and government.

  • PDF