• 제목/요약/키워드: all token

검색결과 62건 처리시간 0.234초

Design for an Efficient Architecture for a Reflective Memory System and its Implementation

  • Baek, Il-Joo;Shin, Soo-Young;Choi, Jae-Young;Park, Tae-Rim;Kwon, Wook-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1767-1770
    • /
    • 2003
  • This paper proposes an efficient network architecture for reflective memory system (RMS). Using this architecture, the time for broadcasting a shared-data to all nodes can be significantly shortened. The device named topology conversion switch (TCS) is implemented to realize the network architecture. The implemented TCS is applied to the ethernet based real time control network (ERCnet) to evaluate the performance.

  • PDF

Modelling Data Flow in Smart Claim Processing Using Time Invariant Petri Net with Fixed Input Data

  • Amponsah, Anokye Acheampong;Adekoya, Adebayo Felix;Weyori, Benjamin Asubam
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.413-423
    • /
    • 2022
  • The NHIS provides free or highly subsidized healthcare to all people by providing financial fortification. However, the financial sustainability of the scheme is threatened by numerous factors. Therefore, this work sought to provide a solution to process claims intelligently. The provided Petri net model demonstrated successful data flow among the various participant. For efficiency, scalability, and performance two main subsystems were modelled and integrated - data input and claims processing subsystems. We provided smart claims processing algorithm that has a simple and efficient error detection method. The complexity of the main algorithm is good but that of the error detection is excellent when compared to literature. Performance indicates that the model output is reachable from input and the token delivery rate is promising.

Examining Portraits in Digital Fashion Art Non-Fungible Tokens (NFTs) through Baudrillard's Simulation

  • Yoon Kyung Lee
    • 한국의류학회지
    • /
    • 제47권5호
    • /
    • pp.929-942
    • /
    • 2023
  • Web 3.0 enables people and machines to connect, evolve, share, and use knowledge on an unprecedented scale and in new ways, drastically improving our Internet experience. The metaverse is a collective, virtual shared space supporting all digital activities. Prompted by the rapid growth of digital art and digital fashion, this theoretical analysis explores using Jean Baudrillard's simulation concept to create unique digital art non-fungible tokens (NFTs), allowing them to express and communicate ideas like real-world art. Specifically, this study analyzes 120 digital fashion portraits of humans and animals and classifies them under three types of simulacra covering four stages of Baudrillard's simulation process. The result shows that NFT fashion artworks reflect the core features of a digital reality by connecting and transcending the boundaries of cultures, genders, and nationalities. However, in the final simulation stage (the fourth step), the simulacrum can only coexist in the virtual world as a hyperreal object (the Type III of simulacrum): an object more real than reality.

온톨로지 파싱 속도향상을 위한 온톨로지 파서 설계 (Ontology Parser Design for Speed Improvement of Ontology Parsing)

  • 김원필;공현장
    • 전자공학회논문지CI
    • /
    • 제47권4호
    • /
    • pp.96-101
    • /
    • 2010
  • 시맨틱 웹에서 핵심 연구는 온톨로지 파싱의 효율성이다. 온톨로지의 효율적 파싱과 추론은 시맨틱 웹의 궁극적인 목적인 의미적인 정보검색의 기반이 된다. 그러나 기존의 온톨로지 저작도구들은 온톨로지 파싱속도에 있어 효율적이지 못하고 있는 실정이다. 따라서, 본 연구에서는 온톨로지가 기술하는 모든 사실을 빠르게 추출하기 위해 2단계에 걸친 온톨로지 파서를 설계 하였다. 정확하고 빠른 파서의 설계를 위해 토큰 추출기에서 온톨로지의 구문의 토큰을 1단계로 추출하고, 이를 바탕으로 트리플 추출기에서 Statement를 추출한다. 이에 본 연구에서 설계한 파서의 속도는 기존의 도구들의 파서보다 빠른 처리가 이루어 짐을 확인할 수 있었다.

Effect of Music Training on Categorical Perception of Speech and Music

  • L., Yashaswini;Maruthy, Sandeep
    • Journal of Audiology & Otology
    • /
    • 제24권3호
    • /
    • pp.140-148
    • /
    • 2020
  • Background and Objectives: The aim of this study is to evaluate the effect of music training on the characteristics of auditory perception of speech and music. The perception of speech and music stimuli was assessed across their respective stimulus continuum and the resultant plots were compared between musicians and non-musicians. Subjects and Methods: Thirty musicians with formal music training and twenty-seven non-musicians participated in the study (age: 20 to 30 years). They were assessed for identification of consonant-vowel syllables (/da/ to /ga/), vowels (/u/ to /a/), vocal music note (/ri/ to /ga/), and instrumental music note (/ri/ to /ga/) across their respective stimulus continuum. The continua contained 15 tokens with equal step size between any adjacent tokens. The resultant identification scores were plotted against each token and were analyzed for presence of categorical boundary. If the categorical boundary was found, the plots were analyzed by six parameters of categorical perception; for the point of 50% crossover, lower edge of categorical boundary, upper edge of categorical boundary, phoneme boundary width, slope, and intercepts. Results: Overall, the results showed that both speech and music are perceived differently in musicians and non-musicians. In musicians, both speech and music are categorically perceived, while in non-musicians, only speech is perceived categorically. Conclusions: The findings of the present study indicate that music is perceived categorically by musicians, even if the stimulus is devoid of vocal tract features. The findings support that the categorical perception is strongly influenced by training and results are discussed in light of notions of motor theory of speech perception.

Effect of Music Training on Categorical Perception of Speech and Music

  • L., Yashaswini;Maruthy, Sandeep
    • 대한청각학회지
    • /
    • 제24권3호
    • /
    • pp.140-148
    • /
    • 2020
  • Background and Objectives: The aim of this study is to evaluate the effect of music training on the characteristics of auditory perception of speech and music. The perception of speech and music stimuli was assessed across their respective stimulus continuum and the resultant plots were compared between musicians and non-musicians. Subjects and Methods: Thirty musicians with formal music training and twenty-seven non-musicians participated in the study (age: 20 to 30 years). They were assessed for identification of consonant-vowel syllables (/da/ to /ga/), vowels (/u/ to /a/), vocal music note (/ri/ to /ga/), and instrumental music note (/ri/ to /ga/) across their respective stimulus continuum. The continua contained 15 tokens with equal step size between any adjacent tokens. The resultant identification scores were plotted against each token and were analyzed for presence of categorical boundary. If the categorical boundary was found, the plots were analyzed by six parameters of categorical perception; for the point of 50% crossover, lower edge of categorical boundary, upper edge of categorical boundary, phoneme boundary width, slope, and intercepts. Results: Overall, the results showed that both speech and music are perceived differently in musicians and non-musicians. In musicians, both speech and music are categorically perceived, while in non-musicians, only speech is perceived categorically. Conclusions: The findings of the present study indicate that music is perceived categorically by musicians, even if the stimulus is devoid of vocal tract features. The findings support that the categorical perception is strongly influenced by training and results are discussed in light of notions of motor theory of speech perception.

CIM을 위한 Mini-MAP 네트워크 접속장치의 구현에 관한 연구 (A Study on the Implemention of a Mini-MAP Network Interface Module for CIM)

  • 김현기;이전우;하정현;정하재;채영도
    • 전자공학회논문지B
    • /
    • 제30B권10호
    • /
    • pp.59-68
    • /
    • 1993
  • This paper describes implemation of 'General-purpose ETRI MAP interface module' (GEM) for Mini-MAP network. GEM operates as a Mini-MAP node in our FA system. To communicate between GEM and programmable devices(PD) such as PLC and CNC, serial communication is used. Application programs of a MiNi-MAP host system control and monitor programmable devices via GEM. GEM is implemented and tested on the basis of the MAP 3.0. TBC in the Nini-MAP board performs the function of the MAC sublayer. The LLC sublayer is implemented according to the specification of Class 3 that includes Type 1 and 3. And the MMS services are designed within the scope of implementation class MAP3. All the softwares are implemented under the real-time multitask OS for real-time application of the Mini-MAP and they are loaded into PROMs at the network board of GEM. We tested the LLC functions to make use of a protocol analyzer for the token-passing protocol. Also the MMS conformance test was carried out by exchanging primitives between GEM and a MMS product that had already passed the conformance test. Therefore GEM is proposed as a network tool of Computer Integrated Manufacturing (CIM) to integrate PDs which don't support MAP functions.

  • PDF

Bus 형 LAN의 Contention-Token 혼합형 프로토콜에 관한 연구

  • 김정선
    • 정보와 통신
    • /
    • 제4권4호
    • /
    • pp.505-524
    • /
    • 1987
  • Nowaday all the countries of the world have studied the various problems caused in operating their own ports efficiently. Ship delay in the port is attributal to the inefficient operation in the navigation aids, the cargo handling, the storage and transfer facilities, and to the inefficient allocation of gangs or to a bad service for ships. Among these elements the allocation of gangs is the predominating factor in minimizing ship's turn round time. At present, in the case of Pusan Port. the labour union and stevedoring companies allocate gangs in every hatches of ships by a rule of thumb, just placing emphasis on minimizing ship's turn round time, without applying the principle of allocation during the cargo handling. Owing to this the efficiency of the cargo handling could not be expected to be maximized and this unsystematic operation result in supplying human resources of much unnecessary surplus gangs. Therefore in this paper the optimal size and allocation of gangs for minimizing the ship's turn round time is studied and formularized. For the determination of the priority for allocation the evaluation function, namely $F=PHi^{n}{\times}(W+H)$, can be obtained; where, PHI : Principal Hatch Index W : Total Cargo Weight represented in Gang-Shifts H : Total Number of Ship's hatches and also for the optimal size of gangs the average number of gang allocated per shift (Ng), namely Ng=W/PHI, is used. The proposed algorithm is applied to Pusan Port and its validity is verified.

  • PDF

Approximate Analysis of MAC Protocol with Multiple Self-tokens in a Slotted Ring

  • Sakuta, Makoto;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • 제5권3호
    • /
    • pp.249-257
    • /
    • 2003
  • Ring networks are very commonly exploited among local area and metropolitan area networks (LAN/MAN), whereas cells or small fixed-size packets are widely used in synchronized ring networks. In this paper, we present an analytical method for evaluating the delay-throughput performance of a MAC protocol with multiple self-tokens in a slotted ring network under uniform traffic. In our analysis, we introduce the stationary probability, which indicates the number of packets in a node. Also, it is assumed that each node has a sufficiently large amount of self-tokens, and a slotted ring has the symmetry. The analytical results with respect to delay-throughput performance have similar values to computer simulated ones. Furthermore, in order to achieve fair access under non-uniform traffic, we propose an adaptive MAC protocol, where the number of self-tokens in a node dynamically varies, based on the number of packets transmitted within a specified period. In the proposed protocol, when the number of packets transmitted by a node within a specified period is larger than a specified threshold, the node decreases the number of self-tokens in a per-node distributed method. That results in creating free slots in the ring, thus all nodes can obtain an equal opportunity to transmit into the ring. Performance results obtained by computer simulation show that our proposed protocol can maintain throughput fairness under non-uniform traffic.

토큰키와 해쉬함수를 이용한 RFID 인증 프로토콜 설계 (Design of an RFID Authentication Protocol Using Token Key and Hash Function)

  • 나영남;한재균
    • 전자공학회논문지 IE
    • /
    • 제48권2호
    • /
    • pp.52-60
    • /
    • 2011
  • RFID는 무선통신을 사용하는 방법이다. 하지만 인증 및 보안성을 위한 메커니즘을 사용하고 있지 않다. 그러므로 다중인식 공격이나 도청공격과 같은 공격에는 매우 취약하다. 또한 RFID 시스템의 특성상 태그의 제한된 환경적 요소 때문에 인증 프로토콜을 설계하는데 제약이 크다. 그렇다고 보안성이 없는 RFID를 사용할 경우 기업의 정보와 상품의 정보를 노출하게 되며, 공격자가 RFID 시스템에 침입하여 물류 시스템을 정지 시킬 수 있다. 그래서 본 논문은 태그에 대한 무제한적인 접근이 아닌 인증된 리더만 접속 가능하도록 태그와 리더간의 인증 메커니즘을 설계하고 또한 키 분배를 정의하여 새로운 인증 프로토콜을 제안하고자 한다.