• 제목/요약/키워드: digital resource

검색결과 711건 처리시간 0.024초

오디오 신호의 적응 방법 (Audio Resource Adaptation)

  • 오은미
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅲ
    • /
    • pp.1419-1422
    • /
    • 2003
  • Multimedia contents what we call Digital Items include various types of resources such as music, speech, text, video, graphics, and so on. The current Adaptation QoS described in the ISO/IEC 21000-7 CD-Part 7: Digital Item Adaptation, however, lacks adaptation methods for audio signals. The goal of this paper is to provide adaptation methods that are necessary to deal with audio signals. Two operations are introduced in order to adapt audio items. One method is to make use of the functionality of Fine Grain Scalability, and the other is intended to drop the channel of audio output channel. This paper provides a DIA description tool that associates the operators with the corresponding values of the constraint and the utility. Furthermore, the operations are evaluated and compared to alternative solutions.

  • PDF

위험분석 모델을 적용한 정량적인 소프트웨어 위험관리 방법론에 관한 연구 (A Study on Quantitative Software Risk Management Methodology applied Risk Analysis Model)

  • 엄정호;이동영;정태명
    • 디지털산업정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.133-140
    • /
    • 2009
  • In the paper, we proposed the systematical and quantitative software risk management methodology based on risk analysis model. A software risk management consists of the basic risk management method(BRIMM) and the detailed risk management method(DRIMM). BRIMM is applied to unimportant phases or the phase which also the risk factor does not heavily influence to project. DRIMM is used from the phase which influences highly in project success or the phase where the risk factor is many. Fulfilling risk management combined two methods, we can reduce project's budget, term and resource's usage, and prevent risk with the optimum measures obtained by the exact risk analysis.

무선 메쉬 네트워크에서 게이트웨이 병목 회피를 위한 우선순위 타임 스케줄링 기법 (A Priority Time Scheduling Method for Avoiding Gateway Bottleneck in Wireless Mesh Networks)

  • 류민우;김대영;차시호;조국현
    • 디지털산업정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.101-107
    • /
    • 2009
  • In existing wireless ad-hoc networks, how to distribute network resources fairly between many users to optimize data transmission is an important research subject. However, in wireless mesh networks (WMNs), it is one of the research areas to avoid gateway bottleneck more than the fair network resource sharing. It is because WMN traffic are concentrated on the gateway connected to backhaul. To solve this problem, the paper proposes Weighted Fairness Time-sharing Access (WFTA). The proposed WFTA is a priority time scheduling scheme based on Weighted Fair Queuing (WFQ).

유한체상의 자원과 시간에 효율적인 다항식 곱셈기 (Resource and Delay Efficient Polynomial Multiplier over Finite Fields GF (2m))

  • 이건직
    • 디지털산업정보학회논문지
    • /
    • 제16권2호
    • /
    • pp.1-9
    • /
    • 2020
  • Many cryptographic and error control coding algorithms rely on finite field GF(2m) arithmetic. Hardware implementation of these algorithms needs an efficient realization of finite field arithmetic operations. Finite field multiplication is complicated among the basic operations, and it is employed in field exponentiation and division operations. Various algorithms and architectures are proposed in the literature for hardware implementation of finite field multiplication to achieve a reduction in area and delay. In this paper, a low area and delay efficient semi-systolic multiplier over finite fields GF(2m) using the modified Montgomery modular multiplication (MMM) is presented. The least significant bit (LSB)-first multiplication and two-level parallel computing scheme are considered to improve the cell delay, latency, and area-time (AT) complexity. The proposed method has the features of regularity, modularity, and unidirectional data flow and offers a considerable improvement in AT complexity compared with related multipliers. The proposed multiplier can be used as a kernel circuit for exponentiation/division and multiplication.

SaaS 비즈니스 모델별 서비스 기업 경쟁력 결정 요인분석: 그룹웨어, POS 시스템, CRM 및 ERP를 중심으로 (An Analysis on Enterprise Competitive Advantage Determination Factors to Effect Enterprise Results for Each SaaS Business Model: focusing on Group-Wares, POS-System, CRM and ERP)

  • 김신표;이춘열
    • 디지털융복합연구
    • /
    • 제6권2호
    • /
    • pp.65-76
    • /
    • 2008
  • Recently, software distribution method, along with advent of era of Web 2.0, is rapidly evolving from ASP(Application Service Provider) method into SaaS(Soft as a Service) method due to development in concepts and technologies including SOA(Service Oriented Architecture) Web Service, On Demand and Component. Determining factor in market competitiveness of newly emerging SaaS business model will be analyzed by focusing on Group-Wares, POS(Point of Sale) System, CRM(Customer Relationship Management) and ERP(Enterprise Resource Planning), which are the most representative SaaS business models in Korea. It is anticipated that the outcome of analysis of determining factors for market competitiveness for each of the main SaaS Business Models acquired through questionnaire survey can be utilized as important benchmarking material in setting the direction of cultivating SaaS market by the government as well as new entries into SaaS market.

  • PDF

웹 클러스터 구성을 위한 시뮬레이션 분석 (Simulation Analysis for Configuring Web Clusters)

  • 강성열;송영효
    • 디지털융복합연구
    • /
    • 제6권2호
    • /
    • pp.117-125
    • /
    • 2008
  • High-volume web sites often use clusters of servers with load balancing as a way to increase the performance, scalability, and availability of the sites. Load balancing, usually performed by load balancer in front of such clusters, is a technique to spread workload between several computers or resources, in order to get optimal resource utilization or response time. In this paper we examine the performance for several configurations of cluster-based web servers using a simulation approach. We investigate two types of buffering scheme (common and local) for web clusters and three load balancing policies (uniformly random, round robin, and least queue first), using response time as a performance measure. We also examine two basic approaches of scaling web clusters: adding more servers of same type or upgrading the capacity of the servers in the clusters.

  • PDF

TI CC2530 상의 Z-Stack 이식 및 UART 구현 (Porting of Z-Stack and Implementation of UART on the TI CC2530)

  • 김병순
    • 디지털콘텐츠학회 논문지
    • /
    • 제13권4호
    • /
    • pp.525-530
    • /
    • 2012
  • 무선 센서 네트워크는 일반적으로 엔드 장치에 연결된 센서가 측정한 데이터를 코디네이터에게로 전달하는 자원이 한정된 장치들로 구성된다. 지그비는 무선 센서 네트워크에서 가장 많이 사용되는 프로토콜 중의 하나로서, 적정한 데이터 전송률을 가지면서 저전력, 저비용의 무선 통신을 지원하기 위해 표준으로 도입되었다. 이 논문에서는 TI의 CC2530 상에서 TI의 지그비 프로토콜 스택 이식과 UART 인터페이스를 구현하는 방법에 관하여 논의한다. 시리얼 포트를 통한 데이터 전송 과정을 시현함으로써 구현한 보드가 올바르게 동작됨을 보인다.

인지 무선 기술의 차세대 단말 적용 (Application of Congnitive Radio Technology on Next-Generation Terminal)

  • 배정남;이소영;정규일;김진영
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2009년도 정보통신설비 학술대회
    • /
    • pp.117-120
    • /
    • 2009
  • In this paper, a CR(Cognitive Radio) based on SDR(Software Defined Radio) is the technology combined a method selecting available frequency by recognizing surroundings with a learning algorithm continuously updating basic functions for communication and various environment parameters. Recently, as increasing demands with development of wireless communication service, CR is in the spotlight as technology using frequency resource efficiently. In order to apply CR system to the terminal and implement it, the research field to be preceded can be divided large as a hardware part and a software part. It can be also divided into RF processing and digital signal processing in the hardware part. In this paper, we look over preceding techniques required for applying CR system to the terminal, and research the forms of the terminal when they practically apply to the terminal.

  • PDF

A Study on ERP package Assessment Model in Business Firms

  • 임기흥
    • 디지털융복합연구
    • /
    • 제2권2호
    • /
    • pp.101-118
    • /
    • 2004
  • Many IT specialists say that ERP (Enterprise Resource Planning) is the best way to manage resources in enterprise effectively Lots of companies are using ERP solutions in the hope of getting competitiveness and employing global standard business practice. Wishing to take advantage of ERP S/W, companies have a preference for purchasing it and outsourcing ERP project. This paper focuses on ERP Package assessment model in business firms. This paper finds out what differences there are in purchasing ERP S/W for organization characteristics and building characteristics, and suggests some guidelines of S/W development to vendors. The results would be strong implications for ERP vendors. Especially this paper identifies what the reasons and the checkpoints are when firms introduce ERP S/W. To do this, this paper uses empirical data obtained from companies in South Korea and analyzes it using statistical software.

  • PDF

공격정보 수집을 이용한 클라우드 서비스의 안전성 향상에 관한 연구 (A Study on Improvement Stability of Cloud Service using Attack Information Collection)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권2호
    • /
    • pp.73-79
    • /
    • 2013
  • Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.