• Title/Summary/Keyword: base address

Search Result 183, Processing Time 0.029 seconds

A new method for automatic areal feature matching based on shape similarity using CRITIC method (CRITIC 방법을 이용한 형상유사도 기반의 면 객체 자동매칭 방법)

  • Kim, Ji-Young;Huh, Yong;Kim, Doe-Sung;Yu, Ki-Yun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.2
    • /
    • pp.113-121
    • /
    • 2011
  • In this paper, we proposed the method automatically to match areal feature based on similarity using spatial information. For this, we extracted candidate matching pairs intersected between two different spatial datasets, and then measured a shape similarity, which is calculated by an weight sum method of each matching criterion automatically derived from CRITIC method. In this time, matching pairs were selected when similarity is more than a threshold determined by outliers detection of adjusted boxplot from training data. After applying this method to two distinct spatial datasets: a digital topographic map and street-name address base map, we conformed that buildings were matched, that shape is similar and a large area is overlaid in visual evaluation, and F-Measure is highly 0.932 in statistical evaluation.

A Study on Improving the Legal System for the Expedited Preservation of Digital Evidence (디지털 증거의 긴급한 보전을 위한 법제 개선 연구)

  • Ro, Sohyong;Ji, Sungwoo
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.57-73
    • /
    • 2020
  • The proportion of digital evidence in criminal cases has increased, while at the same time, the spread of the Internet has made it easy to delete information that is stored in another place and thus, the Internet is being used to delete online criminal evidence. To respond quickly and effectively to cybercrime, 29 countries signed the Convention on Cybercrime in 2001 through the Council of Europe. Article 16 of the Convention relates to the expedited preservation of stored computer data and requires signatories to adopt legislative measures to enable its competent authorities to order expeditious preservation of specified computer data where there are grounds to believe that the data is particularly vulnerable to loss or modification. More than 60 countries have joined the Convention since 2001 and have made efforts to improve their legal system in line with it. The United States legislated 18 U.S.C. § 2703(f) to preserve electronic evidence pending the issuance of a court order. The German Code of Criminal Procedure §§ 94~95 allows prosecution authorities to seize evidence or issue production orders without court control in urgent circumstances. A custodian shall be obliged to surrender evidence upon a request that evidence be preserved, and non-compliance results in punishment. Japan legislated the Criminal Procedure Act § 197(3) and (4) to establish a legal base for requesting that electronic records that are stored by an ISP not be deleted. The Korean Criminal Procedure Act § 184 outlines procedures for the preservation of evidence but does not adequately address the expeditious preservation of digital evidence that may be vulnerable to deletion. This paper analyzes nine considerations, including request subjects, requirements, and cost reimbursement to establish directions to improve the legal system for the expedited preservation of digital evidence. A new method to preserve online digital evidence in urgent cases is necessary.

The method of grouping query based on EPCIS to improve the RFID application performance in EPC Network (EPC Network 기반 RFID 응용 시스템의 성능 향상을 위한 EPCIS 주소별 그룹 질의 기법)

  • Park, Sung-Jin;Kim, Dae-Hwan;Son, Min-Young;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.18D no.2
    • /
    • pp.111-122
    • /
    • 2011
  • These days RFID application has been developed rapidly. It has been applied to many business areas such as logistics and supply chains. The Electronic Product Code (EPC) Network Architecture, an open global standard, is proposed by EPCglobal for developing RFID enabled systems. People who want to obtain the product information which are master information and event information have to apply with EPC Network Architecture. However, EPCIS which has master information and event information has to be accessed base on each EPC. Therefore, there is lots of duplicate accessing to EPCIS because RFID application has to access the same EPCIS over again which makes all performance down in EPC Network. This paper proposes how to reduce access times to EPCIS using EPC grouping based on EPCIS address. We build EPC Network environment to experiment about performance of RFID application system and we prove the improvement of EPC Network. Our result shows the reducing the EPCIS communication time by maximum 99 percentages.

Mutation Analysis of the Dimer Forming Domain of the Caspase 8 Gene in Oral Submucous Fibrosis and Squamous Cell Carcinomas

  • Menon, Uthara;Poongodi, V;Raghuram, Pitty Hari;Ashokan, Kannan;Govindarajan, Giri Valanthan Veda;Ramanathan, Arvind
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.11
    • /
    • pp.4589-4592
    • /
    • 2015
  • Background: Missense and frame-shift mutations within the dimer forming domain of the caspase 8 gene have been identified in several cancers. However, the genetic status of this region in precancerous lesions, like oral submucous fibrosis (OSMF), and well differentiated oral squamous cell carcinomas (OSCCs) in patients from southern region of India is not known, and hence the present study was designed to address this issue. Materials and Methods: Genomic DNA isolated from biopsy tissues of thirty one oral submucous fibrosis and twenty five OSCC samples were subjected to PCR amplification with intronic primers flanking exon 7 of the caspase 8 gene. The PCR amplicons were subsequently subjected to direct sequencing to elucidate the status of mutation. Results: Sequence analysis identified a frame-shift and a novel missense mutation in two out of twenty five OSCC samples. The frame-shift mutation was due to a two base pair deletion (c.1225_1226delTG), while the missense mutation was due to substitution of wild type cysteine residue with phenylalanine at codon 426 (C426F). The missense mutation, however, was found to be heterozygous as the wild type C426C codon was also present. None of the OSMF samples carried mutations. Conclusions: The identification of mutations in OSCC lesions but not OSMF suggests that dimer forming domain mutations in caspase 8 may be limited to malignant lesions. The absence of mutations in OSMF also suggests that the samples analyzed in the present study may not have acquired transforming potential. To the best of our knowledge this is the first study to have explored and identified frame-shift and novel missense mutations in OSCC tissue samples.

Analysis of Media Characteristic for Information Acquisition of Male Beauty for Industrial Promotion Strategy (남성 뷰티 산업의 광고 전략을 위한 남성 뷰티 트렌드의 정보획득 매체특성 연구)

  • KO, Kwangil;Kim, Hye-kyun
    • Journal of Digital Contents Society
    • /
    • v.17 no.4
    • /
    • pp.279-286
    • /
    • 2016
  • Recently, the cosmetics industry considers male customers as a consumptive, active customer base who also have purchasing power with their stronger desire for their personal image enhancement. Male-preferred image brands have entered the era of unlimited competition through social media, thus increasing the acquisition of male beauty. Therefore, the information for designing favorable image strategies should be examined. This paper examines male awareness, determined by the degree of appearance management based on four categories (i.e., hair and skin care, makeup, foot and hand care, and plastic surgery). Based on the research, the paper proposes a data service to address the spatial and temporal separation problem between TV CF (the major media for recognizing information) and online $caf{\acute{e}}$/blog the major media for obtaining detailed information.

Numerical study of the seismic behavior of steel frame-tube structures with bolted web-connected replaceable shear links

  • Lian, Ming;Cheng, Qianqian;Zhang, Hao;Su, Mingzhou
    • Steel and Composite Structures
    • /
    • v.35 no.3
    • /
    • pp.305-325
    • /
    • 2020
  • Beams of steel frame-tube structures (SFTSs) typically have span-to-depth ratios of less than five. This makes a flexural beam unsuitable for such an application because the plastic hinges at the beam-ends cannot be adequately developed. This leads to lower ductility and energy dissipation capacities of SFTSs. To address this, SFTSs with bolted web-connected replaceable shear links (SFTS-BWSLs) are proposed. In this structural system, a web-connected replaceable shear link with a back-to-back double channel section is placed at the mid-length of the deep beam to act as a ductile fuse. This allows energy from earthquakes to be dissipated through link shear deformation. SFTS and SFTS-BWSL buildings were examined in this study. Several sub-structures were selected from each designed building and finite element models were established to study their respective hysteretic performance. The seismic behavior of each designed building was observed through static and dynamic analyses. The results indicate that the SFTS-BWSL and SFTS have similar initial lateral stiffness and shear leg properties. The SFTS-BWSL had lower strength, but higher ductility and energy dissipation capacities. Compared to the SFTS, the SFTS-BWSL had lower interstory drift, base shear force, and story shear force during earthquakes. This design approach could concentrate plasticity on the shear link while maintaining the residual interstory drift at less than 0.5%. The SFTS-BWSL is a reliable resistant system that can be repaired by replacing shear links damaged due to earthquakes.

Parallel Range Query Processing with R-tree on Multi-GPUs (다중 GPU를 이용한 R-tree의 병렬 범위 질의 처리 기법)

  • Ryu, Hongsu;Kim, Mincheol;Choi, Wonik
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.522-529
    • /
    • 2015
  • Ever since the R-tree was proposed to index multi-dimensional data, many efforts have been made to improve its query performances. One common trend to improve query performance is to parallelize query processing with the use of multi-core architectures. To this end, a GPU-base R-tree has been recently proposed. However, even though a GPU-based R-tree can exhibit an improvement in query performance, it is limited in its ability to handle large volumes of data because GPUs have limited physical memory. To address this problem, we propose MGR-tree (Multi-GPU R-tree), which can manage large volumes of data by dividing nodes into multiple GPUs. Our experiments show that MGR-tree is up to 9.1 times faster than a sequential search on a GPU and up to 1.6 times faster than a conventional GPU-based R-tree.

Interference Pricing based Resource Allocation for D2D Communications in Cellular Networks

  • Li, Xiaomeng;Lv, Tiejun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4166-4182
    • /
    • 2018
  • We consider the Device-to-Device (D2D) communications in cellular networks where each cellular user (CU) shares the same resource with multiple D2D users (DUs). In this paper, we aim to maximize the energy efficiency (EE) of the D2D networks, subject to an interference constraint required by the CU. Since the cellular and D2D communications belong to different networks, we consider to incentivize base station (BS) while assisting the DUs. To this end, we propose a Stackelberg game based interference pricing framework for the considered D2D communications in cellular networks. Unlike most of the existing methods, we use interference pricing framework to jointly address the EE resource allocation problem and the interference management in our networks rather than only improve the EE of the DUs or protect cellular networks. In particular, BS and all the users do not need all channel state information, which is more realistic in practice. In addition, two different pricing strategies are also proposed. Based on the two strategies, we analyze the equilibrium of the game. Moreover, in the first strategy, the upper and lower boundaries of the interference price are obtained. The closed-form expression is gained with a backward induction for the second strategy. Both offer valuable insights to the considered scenarios. Finally, compared with the existing work, the EE of the D2D communications is significantly improved. The advantageous performance of our scheme are demonstrated by the simulation results.

An analysis of mobile communication environment by a socio-technical approach (사회기술적 접근방식을 통한 모바일 통신환경 분석)

  • Lee, Hyun Kyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.2
    • /
    • pp.59-69
    • /
    • 2013
  • By the end of 2012, there were 5.1 billion mobile communication subscribers in South Korea. The majority of subscriptions (97.3 percent) were for mobile phones, particularly smartphones. From 2010 to 2012, the number of mobile phone subscriptions increased 2,000 percent, growing from an initial subscriber base of 150 million. This paper explores the changing mobile communication landscape from a socio-technological perspective to understand the underlying drivers of change and their effects on the South Korean populace. A content analysis of 11,156 electronic newspaper articles mentioning mobile communication in South Korea and occurring between 2010 and 2012 was conducted. 5,119 keywords were extracted based on frequency statistics and further analyzed to determine the drivers of change. Based on this analysis, we conclude that South Korea's mobile communication environment is focused on rapid expansion of technology with minor consideration given to the social aspects of this change. This has resulted in several negative consequences and we urge for new policies by government and industry to address this gap.

Development of Stakeholder Analysis Framework for Collaborative Tourism development (협력적 관광개발을 위한 이해집단 분석틀 개발에 관한 연구)

  • Shin, Yong-Seok
    • Journal of the Korean Geographical Society
    • /
    • v.44 no.5
    • /
    • pp.647-660
    • /
    • 2009
  • Although tourism has been quite popular as development strategy, the outcomes may vary dependent upon managing stakeholders involved. Thus, stakeholder management has been the subject of growing research interests recently. Collaboration theory was suggested as an alternative to this question; however, collaboration theory may provide potential benefits, it lacks in consideration into stakeholder power relations. The purpose of this paper is two foleded. One is to examine critically collaboration theory in the context of tourism development, and address the necessity of stakeholder analysis framework, and the other is to provide the framework. This paper argues that careful analysis of stakeholders from diverse perspectives should be done in advance, and presents stakeholder analysis framework which consists of six analysis indicators: interest, perspective, power base(resource), involvement, influence, and legitimacy. The framework consists of three stages: (1) identifying stakeholder, (2) assessing stakeholder, and (3) establishing strategies. It is argued that the framework in this paper can be useful to analyze stakeholders and to set up strategy for more collaborative tourism development.