• Title/Summary/Keyword: rule-based architecture

Search Result 216, Processing Time 0.026 seconds

MANET에서의 상황 인지 구조를 이용한 에너지 보존 라우팅 연구

  • Jin, Un;Lee, Beom-Jae;Ji, Sam-Hyeon;Kim, Sun-Guk;Du, Gyeong-Min;Lee, Kang-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.413-417
    • /
    • 2007
  • Ad hoc 센서 네트워크에서 노드는 제한된 에너지를 가지며, 에너지의 사용률은 토폴로지 구조나 센서 노드의 동작에 의존한다. 본 논문에서는 low power distributed MAC을 개량 하여, MANET에서 clustering 구조의 네트워크를 위한 효율적인 에너지 절약을 위한 새로운 구조를 제안한다. 본 제안된 구조의 특징은 Ad hoc 네트워크에서 에너지에 관련된 배터리 파워나, 노드의 거리, 전송 전력 등의 정보를 활용한 상황 인식을 사용하였다. 에너지 상황 인식을 적용한 제안된 망의 구조는 clustering 형상과 메시지 전송의 성능 및 데이터의 도달 인식을 향성 시킨다. 또한 context aware computing을 이용함으로써, 상황과 정의된 rule에 따라서 노드의 동작과 네크워크 라우팅의 상황에 적응하도록 노드를 조정 할 수 있는 구조이다.

  • PDF

Internet Governance & Politics of Expertise (인터넷 거버넌스와 전문성의 정치)

  • Kim, Ji-Yeon
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.5-20
    • /
    • 2013
  • ICANN has been governing the Domain Name System(DNS) "technically" since 1998. The architecture is called Internet Governance, and it brings about many different discourses; "What does that govern?", "Who delegate its role to ICANN?"," How could the regime ensure fairness?" etc. This article will analyze on Internet Governance by applying the government approach of Foucault, and try to compare two parts, the 'core' and the 'edge' of Internet Governance for method. Whereas the 'core' of it refers the site that be governed by the formal contract directly, the 'edge' as the rest of it means informal friendly relations with ICANN. The 'core' rule was stemmed from technological community such as IAB or IETF historically. They had invented new world and its population to integrate the technical order as protocol and the semiotic order as language, that be based on new government mode. On the other hand, ".KR" domain, one of the 'edges', has been evolved into more heterogeneous system, through contest and conflict between traditional state and Internet Governance. The governed object of ".KR" domain is situated in the crossing of each other the 'protocol user', the 'language-semiotic user' and the' geographical resident'. Here the 'geographical resident' rule was weird for DNS, so that shows the internal lack of Internet Governance. It needs to move to the concept of 'Hangeul(Korean-language) user' rather than the 'geographical resident'.

  • PDF

The Research of Existing Traffic Safety Facilities Condition for Enhancing in School Zone Safety (어린이 보호구역의 안전성 제고를 위한 교통 안전시설 실태연구)

  • Park, Byong-Gyu
    • Journal of Korean Association for Spatial Structures
    • /
    • v.13 no.2
    • /
    • pp.101-109
    • /
    • 2013
  • Children are out future society members but they are not well cared to be safe from various accidents. This is due to facilities were installed upon the children's for adults which can not provide safe traffic environment for children's schooling who are not fare enough experience and matured. "The Rule of declaim for school zone and it's Management"was established in the year 1995 based on the article 11 by the "Road Traffic Low". And 15,136 school zone declared by the above rule. In this study, four elementary schools located in Nowon-gu are selected and analyzed about state of elementary school, scope of school zone, installation of street furniture, and safety signs. The analysis showed that scope of school zone is currently set in 150-meter though the regulation is within 300-meter radius. Therefore, expansion of the scope is required. It is necessary to take control of vehicle during commuting times and holograms which can be noticed in school zone have to be installed as well. Through these improvements, safety zone will be offered to children effectually.

Design of Serendipity Service Based on Near Field Communication Technology (NFC 기반 세렌디피티 시스템 설계)

  • Lee, Kyoung-Jun;Hong, Sung-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.293-304
    • /
    • 2011
  • The world of ubiquitous computing is one in which we will be surrounded by an ever-richer set of networked devices and services. Especially, mobile phone now becomes one of the key issues in ubiquitous computing environments. Mobile phones have been infecting our normal lives more thoroughly, and are the fastest technology in human history that has been adapted to people. In Korea, the number of mobile phones registered to the telecom company, is more than the population of the country. Last year, the numbers of mobile phone sold are many times more than the number of personal computer sold. The new advanced technology of mobile phone is now becoming the most concern on every field of technologies. The mix of wireless communication technology (wifi) and mobile phone (smart phone) has made a new world of ubiquitous computing and people can always access to the network anywhere, in high speed, and easily. In such a world, people cannot expect to have available to us specific applications that allow them to accomplish every conceivable combination of information that they might wish. They are willing to have information they want at easy way, and fast way, compared to the world we had before, where we had to have a desktop, cable connection, limited application, and limited speed to achieve what they want. Instead, now people can believe that many of their interactions will be through highly generic tools that allow end-user discovery, configuration, interconnection, and control of the devices around them. Serendipity is an application of the architecture that will help people to solve a concern of achieving their information. The word 'serendipity', introduced to scientific fields in eighteenth century, is the meaning of making new discoveries by accidents and sagacity. By combining to the field of ubiquitous computing and smart phone, it will change the way of achieving the information. Serendipity may enable professional practitioners to function more effectively in the unpredictable, dynamic environment that informs the reality of information seeking. This paper designs the Serendipity Service based on NFC (Near Field Communication) technology. When users of NFC smart phone get information and services by touching the NFC tags, serendipity service will be core services which will give an unexpected but valuable finding. This paper proposes the architecture, scenario and the interface of serendipity service using tag touch data, serendipity cases, serendipity rule base and user profile.

A Study on Merchant Server Construction based on the Personalization (개별화를 기반으로 한 Merchant Server 구축에 관한 연구)

  • 황병연
    • The Journal of Society for e-Business Studies
    • /
    • v.3 no.2
    • /
    • pp.95-112
    • /
    • 1998
  • With the advent and proliferation of the Internet, Electronic Commerce(EC) on the Internet has become one of the most rapidly growing area and has been the subject of much research lately. EC is commercial transactions using computers in virtual environment through computer networks. The computer system deals with various ranges of things such as products, services, and information on EC. In this paper we describe the construction methods of web site based on the personalization, Also, we present the personalization technology and architecture of the P-Commerce proposed in this paper. Finally, we describe the methods constructing EC site using P-Commerce solution.

  • PDF

K-WFMS: An Intelligent Workflow Management System for Changing Organization (조직변화에 유연한 지능형 워크플로우 자동화 시스템: K-WFMS)

  • Lee, Ha-Bin;Park, Sung-Joo
    • Asia pacific journal of information systems
    • /
    • v.11 no.3
    • /
    • pp.149-164
    • /
    • 2001
  • In this paper, an adaptive workflow management system, called K-WFMS, is proposed. The K-WFMS integrates database system and knowledge-based system to automate business processes that are executed with complex and various business rules such as task scheduling, role resolution, and exception handling rules. The K-WFMS is adaptable in the sense that it allows its users to change workflow schema in the course of workflow execution as well as it provides rule-based modeling constructs to handle predictable exceptions during workflow modeling. The overall architecture and implementation of K-WFMS are explained, and the change propagation mechanism to maintain validity of workflow model is suggested.

  • PDF

Fuzzy Polynomial Neural Networks based on GMDH algorithm and Polynomial Fuzzy Inference (GMDH 알고리즘과 다항식 퍼지추론에 기초한 퍼지 다항식 뉴럴 네트워크)

  • 박호성;윤기찬;오성권
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.05a
    • /
    • pp.130-133
    • /
    • 2000
  • In this paper, a new design methodology named FNNN(Fuzzy Polynomial Neural Network) algorithm is proposed to identify the structure and parameters of fuzzy model using PNN(Polynomial Neural Network) structure and a fuzzy inference method. The PNN is the extended structure of the GMDH(Group Method of Data Handling), and uses several types of polynomials such as linear, quadratic and modified quadratic besides the biquadratic polynomial used in the GMDH. The premise of fuzzy inference rules defines by triangular and gaussian type membership function. The fuzzy inference method uses simplified and regression polynomial inference method which is based on the consequence of fuzzy rule expressed with a polynomial such as linear, quadratic and modified quadratic equation are used. Each node of the FPNN is defined as fuzzy rules and its structure is a kind of neuro-fuzzy architecture Several numerical example are used to evaluate the performance of out proposed model. Also we used the training data and testing data set to obtain a balance between the approximation and generalization of proposed model.

  • PDF

A Study on Efficient Test & Evaluation Methods in Naval Ship Acquisitions (함정사업 시험평가의 효율적 수행방안에 관한 연구)

  • Kim, Jaeyong;Choi, Woensug;Hong, Sukyoon;Chung, Hyungyun;Song, Jeehun;Im, Wooseok;Kwon, Hyunwung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.703-711
    • /
    • 2016
  • The purposes of this study is to identify the problems arising from current Test & Evaluation process of the naval ship acquisition program and to suggest methods to increase the acquisition efficiency. Considering that the present rule of developmental test &evaluation(DT&E) and operational test & evaluation(OT&E) has caused an inefficiency effect on the acquisition procedures due to the limited practices on it, the DT&E and OT&E procedures through test & evaluation master plan(TEMP) is proposed based on the selective practices of the defense instruction articles. Also, considering characteristics of naval ship acquisitions, efficient procedure systems are derived through case analysis results by comparing each performances of the system. The suggested methods are able to meet the requirements of the changed acquisition environments and also increase efficiency of acquisition systems by adoption of DT&E and OT&E combined test scheme.

The Design and Implementation of Ontology for Simulation based Architecture Framework (ONT-AF) in Military Domain (SBA AF의 구축을 지원하는 온톨로지의 설계 및 구현(ONT-SAF))

  • Kwon, Youngmin;Sohn, Mye;Lee, Wookey
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.3
    • /
    • pp.233-241
    • /
    • 2012
  • Architecture framework (AF) is a guideline to define components needed to develop and operate enterprise architecture (EA), and to define relationships among the components. There are many architecture frameworks to operate EA of governments and businesses such as Zachman framework, DoDAF, TOGAF, FEAF, and TEAF. DoDAF is the most representative AF to support the development of the EA in the military domain. DoDAF is composed of eight viewpoints and 40 views that are affiliated with the viewpoints. To develop an AF for a specific goal, system architects decide a set of views. Furthermore, they determine data that are needed for a view modeling. However, views and data in DoDAF are structurally inter-related explicitly and/or implicitly. So, developing an AF for a specific goal is going to be a project to be carried out over a long haul. To reduce the burden of its development, in this paper, we develop ONT-SAF (Ontology for DoDAF) that can infer inter-relationships like referential and transitive relationships and the sequences among the views. Furthermore, to promote reusability and consistency of the views and the data within an AF, we adopt the view-data separation strategy. ONT-DAT contains classes like 'viewpoint', 'view', 'data', 'expression method', and 'reference model', and 11 properties including 'hasView.' To prove the effectiveness of ONT-SAF, we perform a case study.

Implementation of a Context-Awareness based UoC(Ubiquitous System on Chip) for Ad-Hoc Network (Ad-Hoc Network에서 복합 멀티 센서 기반의 UoC(Ubiquitous computing on Chip)에 의한 Context-aware System Architecture 구현)

  • Doo, Kyoung-Min;Kim, Young-Sam;Chi, Sam-Hyun;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.509-512
    • /
    • 2008
  • Ubiquitous Computing System란, 언제 어디서나 통신 및 컴퓨팅이 가능하고 컴퓨팅 시스템이 상호간에 정보를 공유하고 협력하는 컴퓨팅 시스템이다. 이로써 기존의 컴퓨팅 환경과 같이 사용자와 컴퓨터간의 대화형 상호작용이 아닌 물리적인 환경 상황(Context)등을 시스템이 스스로 인식하고 이를 기반으로 사용자와의 상호 작용을 지원하는 상황인식 기술이 필수적인 요소로 부각되고 있다. 또한, Ubiquitous Computing System을 위해 사용자 및 주변 환경 정보를 감지하는 센서(Sensor) 기술이 필요하다. 하지만 사용자 및 주변 환경으로부터 입력되는 불확실하거나 모호한 상황정보에 대한 표현과 추론에 대한 연구는 부족한 실정이다. 본 논문은 이런 이유에서 Rule-based System을 기반으로 CRS와 DOS의 개념을 도입한 새로운 상황인식 기반의 Architecture를 제안하고, 이를 VHDL을 통해 SoC로 구현하였다. CRS를 통해 실시간으로 다양한 센서에서 들어오는 많은 데이터에 가중치를 부여하여 각 센서마다 중요도를 달리 부여한다. 이로써, System은 Sensor 입력 값의 중요도에 따라 처리 순서를 우선적으로 부여하여 처리 속도를 높인다. 또, DOS를 통해 각양각색의 사용자에게 획일적인 서비스를 제공하는 것이 아니라 상황 변화의 패턴에 따라 개별화되고 특화된 서비스를 제공한다. 마지막으로, Ubiquitous Computing System의 향후 발전 가능성을 예상하고, 본 논문에서 제시한 Context-aware Architecture에 의해 구현된 UoC의 유용성을 짐작해 본다.

  • PDF