• Title/Summary/Keyword: digital resource

Search Result 713, Processing Time 0.026 seconds

Audio Resource Adaptation (오디오 신호의 적응 방법)

  • 오은미
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1419-1422
    • /
    • 2003
  • Multimedia contents what we call Digital Items include various types of resources such as music, speech, text, video, graphics, and so on. The current Adaptation QoS described in the ISO/IEC 21000-7 CD-Part 7: Digital Item Adaptation, however, lacks adaptation methods for audio signals. The goal of this paper is to provide adaptation methods that are necessary to deal with audio signals. Two operations are introduced in order to adapt audio items. One method is to make use of the functionality of Fine Grain Scalability, and the other is intended to drop the channel of audio output channel. This paper provides a DIA description tool that associates the operators with the corresponding values of the constraint and the utility. Furthermore, the operations are evaluated and compared to alternative solutions.

  • PDF

A Study on Quantitative Software Risk Management Methodology applied Risk Analysis Model (위험분석 모델을 적용한 정량적인 소프트웨어 위험관리 방법론에 관한 연구)

  • Eom, Jung Ho;Lee, Dong Young;Chung, Tai M.
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.133-140
    • /
    • 2009
  • In the paper, we proposed the systematical and quantitative software risk management methodology based on risk analysis model. A software risk management consists of the basic risk management method(BRIMM) and the detailed risk management method(DRIMM). BRIMM is applied to unimportant phases or the phase which also the risk factor does not heavily influence to project. DRIMM is used from the phase which influences highly in project success or the phase where the risk factor is many. Fulfilling risk management combined two methods, we can reduce project's budget, term and resource's usage, and prevent risk with the optimum measures obtained by the exact risk analysis.

A Priority Time Scheduling Method for Avoiding Gateway Bottleneck in Wireless Mesh Networks (무선 메쉬 네트워크에서 게이트웨이 병목 회피를 위한 우선순위 타임 스케줄링 기법)

  • Ryu, Min Woo;Kim, Dae Young;Cha, Si Ho;Cho, Kuk Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.101-107
    • /
    • 2009
  • In existing wireless ad-hoc networks, how to distribute network resources fairly between many users to optimize data transmission is an important research subject. However, in wireless mesh networks (WMNs), it is one of the research areas to avoid gateway bottleneck more than the fair network resource sharing. It is because WMN traffic are concentrated on the gateway connected to backhaul. To solve this problem, the paper proposes Weighted Fairness Time-sharing Access (WFTA). The proposed WFTA is a priority time scheduling scheme based on Weighted Fair Queuing (WFQ).

Resource and Delay Efficient Polynomial Multiplier over Finite Fields GF (2m) (유한체상의 자원과 시간에 효율적인 다항식 곱셈기)

  • Lee, Keonjik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.1-9
    • /
    • 2020
  • Many cryptographic and error control coding algorithms rely on finite field GF(2m) arithmetic. Hardware implementation of these algorithms needs an efficient realization of finite field arithmetic operations. Finite field multiplication is complicated among the basic operations, and it is employed in field exponentiation and division operations. Various algorithms and architectures are proposed in the literature for hardware implementation of finite field multiplication to achieve a reduction in area and delay. In this paper, a low area and delay efficient semi-systolic multiplier over finite fields GF(2m) using the modified Montgomery modular multiplication (MMM) is presented. The least significant bit (LSB)-first multiplication and two-level parallel computing scheme are considered to improve the cell delay, latency, and area-time (AT) complexity. The proposed method has the features of regularity, modularity, and unidirectional data flow and offers a considerable improvement in AT complexity compared with related multipliers. The proposed multiplier can be used as a kernel circuit for exponentiation/division and multiplication.

An Analysis on Enterprise Competitive Advantage Determination Factors to Effect Enterprise Results for Each SaaS Business Model: focusing on Group-Wares, POS-System, CRM and ERP (SaaS 비즈니스 모델별 서비스 기업 경쟁력 결정 요인분석: 그룹웨어, POS 시스템, CRM 및 ERP를 중심으로)

  • Kim, Shin-Pyo;Lee, Choon-Yeul
    • Journal of Digital Convergence
    • /
    • v.6 no.2
    • /
    • pp.65-76
    • /
    • 2008
  • Recently, software distribution method, along with advent of era of Web 2.0, is rapidly evolving from ASP(Application Service Provider) method into SaaS(Soft as a Service) method due to development in concepts and technologies including SOA(Service Oriented Architecture) Web Service, On Demand and Component. Determining factor in market competitiveness of newly emerging SaaS business model will be analyzed by focusing on Group-Wares, POS(Point of Sale) System, CRM(Customer Relationship Management) and ERP(Enterprise Resource Planning), which are the most representative SaaS business models in Korea. It is anticipated that the outcome of analysis of determining factors for market competitiveness for each of the main SaaS Business Models acquired through questionnaire survey can be utilized as important benchmarking material in setting the direction of cultivating SaaS market by the government as well as new entries into SaaS market.

  • PDF

Simulation Analysis for Configuring Web Clusters (웹 클러스터 구성을 위한 시뮬레이션 분석)

  • Kang, Sung-Yeol;Song, Young-Hyo
    • Journal of Digital Convergence
    • /
    • v.6 no.2
    • /
    • pp.117-125
    • /
    • 2008
  • High-volume web sites often use clusters of servers with load balancing as a way to increase the performance, scalability, and availability of the sites. Load balancing, usually performed by load balancer in front of such clusters, is a technique to spread workload between several computers or resources, in order to get optimal resource utilization or response time. In this paper we examine the performance for several configurations of cluster-based web servers using a simulation approach. We investigate two types of buffering scheme (common and local) for web clusters and three load balancing policies (uniformly random, round robin, and least queue first), using response time as a performance measure. We also examine two basic approaches of scaling web clusters: adding more servers of same type or upgrading the capacity of the servers in the clusters.

  • PDF

Porting of Z-Stack and Implementation of UART on the TI CC2530 (TI CC2530 상의 Z-Stack 이식 및 UART 구현)

  • Kim, Byungsoon
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.525-530
    • /
    • 2012
  • Wireless sensor networks consist of resource constraint devices which typically send data measured by sensors attached to the end devices towards a coordinator. One of the best solution for wireless sensor networks is ZigBee, where it is wireless standard introduced for low power, low cost wireless communication with moderate data rates. In this paper, we present porting of Z-Stack and implementation of UART on the TI CC2530. We show that our implemented board works correctly in terms of transmitting and receiving data via serial port.

Application of Congnitive Radio Technology on Next-Generation Terminal (인지 무선 기술의 차세대 단말 적용)

  • Bae, Jung-Nam;Lee, So-Young;Chung, Kyou-Il;Kim, Jin-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.117-120
    • /
    • 2009
  • In this paper, a CR(Cognitive Radio) based on SDR(Software Defined Radio) is the technology combined a method selecting available frequency by recognizing surroundings with a learning algorithm continuously updating basic functions for communication and various environment parameters. Recently, as increasing demands with development of wireless communication service, CR is in the spotlight as technology using frequency resource efficiently. In order to apply CR system to the terminal and implement it, the research field to be preceded can be divided large as a hardware part and a software part. It can be also divided into RF processing and digital signal processing in the hardware part. In this paper, we look over preceding techniques required for applying CR system to the terminal, and research the forms of the terminal when they practically apply to the terminal.

  • PDF

A Study on ERP package Assessment Model in Business Firms

  • Yim, Ki-Heung
    • Journal of Digital Convergence
    • /
    • v.2 no.2
    • /
    • pp.101-118
    • /
    • 2004
  • Many IT specialists say that ERP (Enterprise Resource Planning) is the best way to manage resources in enterprise effectively Lots of companies are using ERP solutions in the hope of getting competitiveness and employing global standard business practice. Wishing to take advantage of ERP S/W, companies have a preference for purchasing it and outsourcing ERP project. This paper focuses on ERP Package assessment model in business firms. This paper finds out what differences there are in purchasing ERP S/W for organization characteristics and building characteristics, and suggests some guidelines of S/W development to vendors. The results would be strong implications for ERP vendors. Especially this paper identifies what the reasons and the checkpoints are when firms introduce ERP S/W. To do this, this paper uses empirical data obtained from companies in South Korea and analyzes it using statistical software.

  • PDF

A Study on Improvement Stability of Cloud Service using Attack Information Collection (공격정보 수집을 이용한 클라우드 서비스의 안전성 향상에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.73-79
    • /
    • 2013
  • Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.