• Title/Summary/Keyword: State Service

Search Result 2,266, Processing Time 0.027 seconds

A Method for Automatic Generation of OWL-S Service Ontology

  • Yang, Jin-Hyuk;Chung, In-Jeong
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.114-123
    • /
    • 2006
  • We present in this paper the methodology for automatic generation of OWL-S service model ontology along with the results and issues. First, we extract information related to atomic services and their properties such as IOPE from the UML class diagram, and retrieve information related to the composition of services from the UML state-chart diagram. Then, the XSLT applications utilize the acquired information to generate the OWL-S service model ontology through the predefined mappings between OWL-S constructs for composite services and UML state-chart primitives. For the justification of generated service ontology, several validation checks are performed. Our service ontology generation method is general and fully automatic, as well as effective, in that it is achieved in an environment familiar to developers, and information needed to generate service ontology is provided necessarily during service development. It is also noticeable to facilitate representing the condition with GUI rather than a complex language such as OCL.

ANALYSIS OF THE MMPP/G/1/K QUEUE WITH A MODIFIED STATE-DEPENDENT SERVICE RATE

  • Choi, Doo Il;Kim, Bokeun;Lim, Dae-Eun
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.18 no.4
    • /
    • pp.295-304
    • /
    • 2014
  • We analyze theMMPP/G/1/K queue with a modified state-dependent service rate. The service time of customers upon service initiation is changed if the number of customers in the system reaches a threshold. Then, the changed service time is continued until the system becomes empty completely, and this process is repeated. We analyze this system using an embedded Markov chain and a supplementary variable method, and present the queue length distributions at a customer's departure epochs and then at an arbitrary time.

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).

Encouraging Labor Intellectualization as a Tool for Intellectual Capital Development

  • Palagusyntes, Rostyslav;Shumytska, Halyna;Novosad, Kristina;Katsora, Oleksandr;Dzhuhan, Olha;Danko, Dana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.101-108
    • /
    • 2022
  • The article reviews the means of stimulating and motivating to labor intellectualization in diplomatic service employees. The means considered encourage them to raise the effectiveness in achieving goals. Leveling up of intellectual labor of diplomatic services employees, as well as means of motivation of employees are covered in the Law of Ukraine "On Civil Service". The law defines and regulates the conditions for the performance of intellectual labor entrusted to the staff of diplomatic services, namely: defines the direct rights and responsibilities of employees of diplomatic services, protects the interests and assists citizens of Ukraine abroad, meets the needs of all pressing issues and problems for their benefit.

Energy-efficient Relay MAC with Dynamic Power Control in Wireless Body Area Networks

  • Cai, Xuelian;Yuan, Jingjing;Yuan, Xiaoming;Zhu, Wu;Li, Jiandong;Li, Changle;Ullah, Sana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1547-1568
    • /
    • 2013
  • Wireless body area network (WBAN) is an emerging short-range wireless communication network with sensor nodes located on, in or around the human body for healthcare, entertainment and ubiquitous computing. In WBANs, energy is severely constrained which is the prime consideration in the medium access control (MAC) protocol design. In this paper, we propose a novel MAC protocol named Energy-efficient Relay MAC with dynamic Power Control (ERPC-MAC) to save energy consumption. Without relying on the additional devices, ERPC-MAC employs relaying nodes to provide relay service for nodes which consume energy fast. Accordingly the superframe adjustment is performed and then the network topology can be smoothly switched from single-hop to multi-hop. Moreover, for further energy saving and reliability improvement, the dynamic power control is introduced to adjust the power level whenever a node transmits its packets to the coordinator or the relaying node. To the best of the authors' knowledge, this is the first effort to integrate relay, topology adjustment and power control to improve the network performance in a WBAN. Comprehensive simulations are conducted to evaluate the performance. The results show that the ERPC-MAC is more superior to the existing standard and significantly prolongs the network lifetime.

A Study of Social Service Extension and Reorganization in Welfare State -Focusing on Social Service in Germany- (복지국가의 사회서비스 제도화 및 재구조화에 대한 고찰 - 독일의 사례를 중심으로-)

  • Park, Su-Sie
    • Korean Journal of Social Welfare
    • /
    • v.61 no.3
    • /
    • pp.155-177
    • /
    • 2009
  • This is a study to review provision and production system of social services in European welfare states and find out implications to Korea. Firstly, trends of social service extension and reorganization in welfare state restructuring process, and approaches in interventions to social service system are theoretically discussed. In this discussion, we focus on the discussion of Jessop's workfare in social service extension and reorganization and the concept of innovation in intervention to social service system by state. Then, In order to look at details of reorganization of social service system through restructuring of European welfare states, German case is reviewed. In this review, the reorganization of social service provision and production system in Germany is analyzed through the comparison with the pre-existing system in terms of relationships with public sector as well as between public and private sector respectively. Finally, implications of the European and German experiences to Korea are explored. In order to do so, the state of social services in Korea is examined whilst comparing to the European development process of social services. Also, pros and cons of the electronic voucher scheme, which transforming the social service provision system in Korea, are discussed then challenges in Korean social service delivery system are discussed.

  • PDF

Construction of Customer Appeal Classification Model Based on Speech Recognition

  • Sheng Cao;Yaling Zhang;Shengping Yan;Xiaoxuan Qi;Yuling Li
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.258-266
    • /
    • 2023
  • Aiming at the problems of poor customer satisfaction and poor accuracy of customer classification, this paper proposes a customer classification model based on speech recognition. First, this paper analyzes the temporal data characteristics of customer demand data, identifies the influencing factors of customer demand behavior, and determines the process of feature extraction of customer voice signals. Then, the emotional association rules of customer demands are designed, and the classification model of customer demands is constructed through cluster analysis. Next, the Euclidean distance method is used to preprocess customer behavior data. The fuzzy clustering characteristics of customer demands are obtained by the fuzzy clustering method. Finally, on the basis of naive Bayesian algorithm, a customer demand classification model based on speech recognition is completed. Experimental results show that the proposed method improves the accuracy of the customer demand classification to more than 80%, and improves customer satisfaction to more than 90%. It solves the problems of poor customer satisfaction and low customer classification accuracy of the existing classification methods, which have practical application value.

Extending the BR2K technique to enhance the robustness of blockchain application services

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.125-134
    • /
    • 2022
  • In this paper, we propose an extension method of the BR2K technique for enhancing the robustness of blockchain application services. The BR2K (Blockchain application, Replication & Recovery technique using Kubernetes) technique was recently developed to support the robustness of blockchain services through service replication and rapid restart. The proposed technique extends the existing BR2K technique to provide a state version, which is meta-information about the service state, and a method for safely managing it, and use the state version to determine the timing for service state recovery. Also, the technique provides systematic service state backup for service recovery and joining of new service nodes by utilizing the version information and the service registry which acts as a service recovery center in the BR2K technique. Based on this, it is possible to support new service nodes to join the replication service with consistency. As a result, new service nodes can be quickly added to the BR2K service in operation, enhancing the robustness of the BR2K service. In addition, the extended method is applied to the pilot blockchain application service and tested in a Kubernetes environment composed of virtual machines to confirm the validity of service replication consistency and rapid service recovery in the event of node failures.

Enhancing Irregular Repetition Slotted ALOHA with Polarization Diversity in LEO Satellite Networks

  • Su, Jingrui;Ren, Guangliang;Zhao, Bo;Ding, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3907-3923
    • /
    • 2020
  • An enhanced irregular repetition slotted ALOHA (IRSA) protocol is proposed by using polarization characteristic of satellite link and MIMO detection in low earth orbit (LEO) satellite networks, which is dubbed polarized MIMO IRSA (PM-IRSA). In the proposed scheme, one or two packets in one slot can be decoded by employing polarized MIMO detection, and more than two collided packets in multiple slots which can construct the virtual MIMO model can be decoded by the MIMO detection algorithm. The performance of the proposed scheme is analyzed with the density evolution (DE) approach and the degree distribution is optimized to maximize the system throughput by using a differential evolution. Numerical results certify our analysis and show that the normalized throughput of the proposed PM-IRSA can achieve 1.89 bits/symbol.

Segment Training Based Individual Channel Estimation for Multi-pair Two-Way Relay Network with Power Allocation

  • He, Xiandeng;Zhou, Ronghua;Chen, Nan;Zhang, Shun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.566-578
    • /
    • 2018
  • In this paper, we design a segment training based individual channel estimation (STICE) scheme for the classical two-way relay network (TWRN) with multi-pair sources (MPS) and amplify-and-forward (AF). We adopt the linear minimum mean square error (LMMSE) channel estimator to minimize the mean square error (MSE) without channel estimation error, where the optimal power allocation strategy from the relay for different sources is obtained. Then the MSE gains are given with different source pairs among the proposed power allocation scheme and the existing power allocation schemes. Numerical results show that the proposed method outperforms the existing ones.