• Title/Summary/Keyword: Time-sharing

Search Result 1,428, Processing Time 0.033 seconds

A Study of Efficient Algorithm for Survivable Network Design with Conduit (관로가 있는 생존가능망 설계에 관한 효율적인 알고리즘 연구)

  • Kang, Hyo-Kwan;Han, Chi-Geun
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.629-636
    • /
    • 2001
  • Network is changed from voice-based network into multimedia-based network by development of communication technology and multimedia service. We need a large bandwidth for multimedia service. The optical fiber is a more suitable medium than existing copper-based cable for large bandwidth. But, it is so expensive than copper-based cable. So, Minimizing total cost becomes a more important concept. In order to construct a minimum cost network, we have to consider existing conduits in network. On the other hand, optical fiber network allows that larger amount of traffic can be transmitted than copper-based network does. However, a failure of a node or link can make a serious damage to the network service. Thus, we have to get multiple paths to support continuous service even if a loss of failure occurs in some point of the network. The network survivability problem is to design the network that can provide reliable service to customers anytime with minimum total cost. In an existing solution of the network survivability problem with conduits, a conduit is considered only one time. But, the conduit is reusable if the network satisfies the required survivability. Proposed algorithm can more effectively considered already existed conduit. Network survivability and edge cost is predetermined. The proposed algorithm finds the best solution by conduit sharing within the limits of network survivability. According to the simulation result, the proposed method can decrease 7% of total cost than an existing method by effective conduits adaption.

  • PDF

An Efficient Peer Connection Scheme for Pure P2P Network Environments (순수 P2P 네트워크 환경을 위한 효율적인 피어 연결 기법)

  • 김영진;엄영익
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.11-19
    • /
    • 2004
  • P2P network environments provide users with direct data transmission and sharing facilities and those environments can be classified into hybrid P2P network environments and pure P2P network environments according to the arbitration mechanism among the peers in the network. In hybrid P2P network environments, there exists a server that maintains index information for the data to be shared and network isolation does not occur because every peer always keeps connection to the server. In pure P2P network environments, however, each peer directly connects to another peer and gets services without server intervention, and so, network isolation can occur when the mediating peer fails to work. In this paper. we propose a scheme for each peer to keep connection to other peers continuously by maintaining IP addresses of its neighbor peers and connecting to the peers when the mediating peer fails to work. Although the P2P application that uses our proposed framework should obtain one or more IP addresses of the neighbor peers manually, after instantiation, the application can do its job while maintaining connection to the network continuously and automatically. To evaluate our proposed scheme, we measured and analyzed the time for a peer to reconnect to the network when the mediating peer fails and the network isolation occurs.

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

The introduction of Traffic Inducement Security System in Korea - Centering on Curriculums - (한국의 교통유도경비 도입방안 -교과과정을 중심으로-)

  • Lee, Sang-Won;Lee,, Seung-Chal
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.147-164
    • /
    • 2010
  • A variety of work zone including road single-sharing construction add surrounding disorder and increase inconvenience of vehicles and pedestrians and furthermore danger of traffic accidents, which sometimes result in human life damages. Traffic delay due to vehicles and users generating in the course of using large-scale multiplex facilities bring about a great economic loss. Now, a lot of regulations and laws related to traffic safety system on construction sites etc. are established, but can not display efficacy desirably. It brings about continuous economic loss due to human life accidents and delay. For the purpose of solving the problems, it is necessary to import systems such as traffic inducement Security (Japan) and traffic controller (CANADA, USA) This article suggest how improve civil safety and reduce Social cost. therefore This thesis aims at analyzing advanced cases of foreign countries, looking into Korean status, and presenting importing ways of traffic inducement Security appropriate to Korea. It is reasonable to grant grade1, grade2, and technical experts to traffic inducement Security who pass regulated educations and examinations. In addition, by reversing regulations and laws, it is necessary only those who have the licenses of traffic induction guarder etc. can establish construction sites and disordered places on roads. Theory educations for education time must include basic educations and expert educations. Basic educations must include understanding regulations and laws and understanding affairs. Expert educations must include traffic control, safety educations, understanding of traffic accidents, operation of traffic control facilities, and traffic accident settlements. Traffic affairs educations must include traffic induction affairs in sites (hand signals, safety material establishment, traffic accident settlements, and urgent treatments).

  • PDF

Availability of Mobile Art in Smartphone Environment of Augmented Reality Content Industrial Technology (증강현실 콘텐츠 산업기술의 스마트폰 환경 모바일 아트 활용 가능성)

  • Kim, Hee-Young;Shin, Chang-Ok
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.48-57
    • /
    • 2013
  • Smartphones provide users with environment for communication and sharing information and at the same time play an important role of mobile technology and mobile art development. Smartphone technology-related researches are being accelerated especially with the advent of mobile Augmented Reality(AR) age, but the studies on user participation that is essential for AR content industry were insufficient. In that regard, the assistance from mobile art area that has already developed these characteristics is essential. Thus, this article is to classify mobile art that has not been studied a lot domestically into feature phone usage and smartphone usage and to analyze each example case with the three most used methods. The usage of feature phones which use the sound and images of mobile devices can be divided into three: installation and performing methods, single channel video art method and five senses communication method. On the other hand, the usage of smartphones that use sensors, cameras, GPS and AR can be divided into location-based AR, marker-based AR and markerless AR. Also, as a result of examining mobile AR content utilization technology by industries, combined methods are utilized; tourism and game-related industries use location-based AR, education and medicine-related industries use marker-based AR, and shopping-related industries use markerless AR. The development of AR content industry is expected to be accelerated with mobile art that makes use of combined technology method and constant communication method through active participation of users. The future development direction of mobile AR industry is predicted to have minimized HMD, integration of hologram technology and artificial intelligence and make the most of big data and social network so that we could overcome the technological limitation of AR.

An Analysis on Success Factors and Importance of Six Sigma Innovation in Small and Medium Venture Companies (중소·벤처기업의 6시그마 혁신 성공요인 및 중요도 분석)

  • Lee, Seolbin;Park, Jugyeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.527-536
    • /
    • 2018
  • This study examined the success factors of six sigma innovation in small- and medium-sized venture companies. The findings are summarized as follows. The importance of 20 items in a total of 4 factors showed that corporate vision was number one in the manager's support, followed by program composition, passionate support, high performance guarantee, and quality activity continuity. This suggests that all members can operate the program by the structured system with a sense of united goal under the company-offered vision as a community when the goal, idea or vision of six sigma activities are shared to members of the entire organization. In addition, high success can be achieved when supported by company-wide enthusiasm and high compensation for sharers' innovative efforts of six sigma at the same time. Small- and medium-sized venture companies should develop brisk six sigma activities of advanced precision parts in such an environment that the technology competition is becoming increasingly fierce. The six sigma movement should be developed as a niche strategy for small organizations with united vision sharing by company-wide operational commitment and high self-esteem for the organizational characteristics of small- and medium-sized venture companies run by key minority organizations and members.

Impact Analysis of R&D Activity on GDP through S&T Papers and Patents (연구개발(R&D)활동이 GDP에 미치는 영향 분석: 과학기술논문과 특허의 매개를 통하여)

  • Kim, In Ja;Oh, Yun Jung;Kim, Yeon Hee
    • Journal of Korea Technology Innovation Society
    • /
    • v.19 no.3
    • /
    • pp.658-685
    • /
    • 2016
  • In technology economic theory, technology innovation through R&D is regarded as a core element of economic growth. This research analyzes how R&D input factor (R&D as a percentage of GDP, total number of researchers, the proportion of science and engineering degree) affects GDP, economic outcome variable, through mediating variable (S&T papers, patent registration). The most effective variable among R&D activity variables is following order: the number of S&T papers (0.967), the total number of researchers (0.373), the proportion of R&D expenditure (0.191), the number of patent registration (0.049), the proportion of science and engineering degree (0.007). It is that the proportion R&D expenditure and the total number of researchers shows greater indirect impact through S&T papers and patent than the direct impact on GDP. This implies the importance of high-quality human resources training and the necessity of maintaining the scale of R&D fund or the importance on GDP. Moreover, S&T papers turns out to have the greatest effect on GDP and implies new outcome and value by sharing and expanding new knowledge and technology created by R&D

Comparative Study of Machine learning Techniques for Spammer Detection in Social Bookmarking Systems (소셜 복마킹 시스템의 스패머 탐지를 위한 기계학습 기술의 성능 비교)

  • Kim, Chan-Ju;Hwang, Kyu-Baek
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.345-349
    • /
    • 2009
  • Social bookmarking systems are a typical web 2.0 service based on folksonomy, providing the platform for storing and sharing bookmarking information. Spammers in social bookmarking systems denote the users who abuse the system for their own interests in an improper way. They can make the entire resources in social bookmarking systems useless by posting lots of wrong information. Hence, it is important to detect spammers as early as possible and protect social bookmarking systems from their attack. In this paper, we applied a diverse set of machine learning approaches, i.e., decision tables, decision trees (ID3), $na{\ddot{i}}ve$ Bayes classifiers, TAN (tree-augment $na{\ddot{i}}ve$ Bayes) classifiers, and artificial neural networks to this task. In our experiments, $na{\ddot{i}}ve$ Bayes classifiers performed significantly better than other methods with respect to the AUC (area under the ROC curve) score as veil as the model building time. Plausible explanations for this result are as follows. First, $na{\ddot{i}}ve$> Bayes classifiers art known to usually perform better than decision trees in terms of the AUC score. Second, the spammer detection problem in our experiments is likely to be linearly separable.

A Design Method of Three-phase IPMSM and Clamping Force Control of EMB for High-speed Train (고속철도차량의 EMB 적용을 위한 3상 IPMSM의 설계 및 제동압부력 제어)

  • Baek, Seung-Koo;Oh, Hyuck-Keun;Kwak, Min-ho;Kim, Seog-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.578-585
    • /
    • 2018
  • This paper proposes a design method for a 3-phase interior permanent magnet synchronous motor (IPMSM) and clamping force control method for an electro-mechanical brake (EMB) using co-simulation for a high-speed train (HST). A traditional pneumatic brake system needs much space for the compressor, brake reservoir, and air pipe. However, an EMB system uses up to 50% less space due to the use of a motor and electric wires for controlling the brake caliper. In addition, it can reduce the latency time for brake control because of the fast response and precise control. A train that has many brakes is advantageous for safety because of the control by sharing the braking force. In this paper, a driving method for a cam-shaft-type EMB is modeled. It is different from the ball-screw-type brakes that are widely used in automobiles. In addition, a co-simulation method is proposed using JMAG and Matlab/Simulink. The IPMSM was designed and analyzed with the JMAG tool, and the control system was simulated using Matlab/Simulink. The effectiveness of the co-simulation results of the mechanical clamping force and braking force was verified by comparison with the clamping force specifications of a HEMU-430X HST.

The 4th.industrial revolution and Korean university's role change (4차산업혁명과 한국대학의 역할 변화)

  • Park, Sang-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.235-242
    • /
    • 2018
  • The interest about 4th Industrial Revolution was impressively increased from newspapers, iindustry, government and academic sectors. Especially AI what could be felt by the skin of many peoples, already overpassed the ability of the human's even in creative areas. Namely, now many people start fo feel that the effect of the revolution is just infront of themselves. There were several issues in this trend, the ability of deep learning by machine, the identity of the human, the change of job environment and the concern about the social change etc. Recently many studies have been made about the 4th industrial revolution in many fields like as AI(artificial intelligence), CRISPR, big data and driverless car etc. As many positive effects and pessimistic effects are existed at the same time and many preventing actions are being suggested recently, these opinions will be compared and analyzed and better solutions will be found eventually. Several educational, political, scientific, social and ethical effects and solutions were studied and suggested in this study. Clear implication from the study is that the world we will live from now on is changing faster than ever in the social, industrial, political and educational environment. If it will reform the social systems according to those changes, a society (nation or government) will grasp the chance of its development or take-off, otherwise, it will consume the resources ineffectively and lose the competition as a whole society. But the method of that reform is not that apparent in many aspects as the revolution is progressing currently and its definition should be made whether in industrial or scientific aspect. The person or nation who will define it will have the advantage of leading the future of that business or society.