• Title/Summary/Keyword: zero

Search Result 9,165, Processing Time 0.039 seconds

A Multi-Agent Message Transfer Architecture based on the Messaging Middleware ZeroMQ (메시지 지향 미들웨어 ZeroMQ 기반의 다중 에이전트 메시지 전송 구조)

  • Chang, Hai Jin
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.290-298
    • /
    • 2015
  • This paper suggests a multi-agent message transport architecture based on the message-oriented middleware ZeroMQ. Compared with the other middlewares such as CORBA, Ice, and Thrift, ZeroMQ receives a good score in the evaluation of performance, QoS (Quality of Service), patterns, user friendliness, and resources. The suggested message transfer architecture borrowed many basic concepts like agent platform, AMS (Agent Management System), and MTS (Message Transfer System) from FIPA (Foundation for Intelligent Physical Agents) standard multi-agent specifications, and the architecture inherited the strength of the architecture from the multi-agent framework SMAF (Smart Multi-Agent Framework). The architecture suggested in this paper is a novel peer-to-peer architecture which is not known to the ZeroMQ community. In the suggested architecture, every MTS agent uses only one ZeroMQ router socket to support peer-to-peer communication among MTS agents. The suggested architecture can support closely collaborating software areas such as intelligent robots as well as the traditional application areas of multi-agent architecture. The suggested architecture has interoperability and scalability with the ZeroMQ devices and patterns.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

EXTENDED ZERO-DIVISOR GRAPHS OF IDEALIZATIONS

  • Bennis, Driss;Mikram, Jilali;Taraza, Fouad
    • Communications of the Korean Mathematical Society
    • /
    • v.32 no.1
    • /
    • pp.7-17
    • /
    • 2017
  • Let R be a commutative ring with zero-divisors Z(R). The extended zero-divisor graph of R, denoted by $\bar{\Gamma}(R)$, is the (simple) graph with vertices $Z(R)^*=Z(R){\backslash}\{0\}$, the set of nonzero zero-divisors of R, where two distinct nonzero zero-divisors x and y are adjacent whenever there exist two non-negative integers n and m such that $x^ny^m=0$ with $x^n{\neq}0$ and $y^m{\neq}0$. In this paper, we consider the extended zero-divisor graphs of idealizations $R{\ltimes}M$ (where M is an R-module). At first, we distinguish when $\bar{\Gamma}(R{\ltimes}M)$ and the classical zero-divisor graph ${\Gamma}(R{\ltimes}M)$ coincide. Various examples in this context are given. Among other things, the diameter and the girth of $\bar{\Gamma}(R{\ltimes}M)$ are also studied.

Stable Zero-Velocity Detection Method Regardless of Walking Speed for Foot-Mounted PDR

  • Cho, Seong Yun;Lee, Jae Hong;Park, Chan Gook
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2020
  • In Integration Approach (IA)-based Pedestrian Dead Reckoning (PDR), it is important to detect the exact zero-velocity of the foot with an Inertial Measurement Unit (IMU). By detecting zero-velocity during the stance phase of the foot touching the ground and executing Zero-velocity UPdaTe (ZUPT) at the exact time, stable navigation information can be provided by the PDR. When the pace is fast, however, it is not easy to accurately detect the zero-velocity because of the small stance phase interval and the large signal variance of the corresponding interval. Incorrect zero-velcity detection greatly causes navigation errors of IA-based PDR. In this paper, we propose a method to detect the zero-velocity stably even at high speed by novel buffering of IMU's output data and signal processing of the buffer. And we design a PDR based on this. By analyzing the performance of the proposed Zero-Velocity Detection (ZVD) algorithm and ZVD-based PDR through experiemnts, we confirm that the proposed method can provide accurate navigation information of pedestrians such as firefighters in the indoor space.

A Study on the Design Process of Zero Emission Buildings (ZEB(Zero Emission Building) 디자인 프로세스에 관한 연구)

  • Kang, Hae-Jin;Kang, Soo-Yeon;Park, Jin-Chul;Rhee, Eon-Gu
    • Journal of the Korean Solar Energy Society
    • /
    • v.30 no.2
    • /
    • pp.39-45
    • /
    • 2010
  • Zero Emission Building is abuilding which emits virtually '0(zero)' carbon dioxide. Although simple in concept, ZEB requires totally different approach from conventional building in terms of design, engineering, construction and operation. There are few research on ZEB design process as ZEB design requires understanding and knowledge regarding energy and technology. The study aims to propose a design process of Zero Emission Building for architects. The study examined the concept of Zero Emission Building through intensive literature search. The examples of Zero Emission Buildings were investigated, and strategies and technologies applied to the buildings were analyzed. Various conventional design processes were identified and analyzed to examine the applicability to ZEB design, Finally, a new design process which effectively accommodate the requirement of Zero Emission Building was proposed.

Pattern-cutting design for zero-waste fashion practice (제로 웨이스트 패션 실천을 위한 패턴 커팅 설계)

  • Hyunju Kim;Hyunshin, Na
    • The Research Journal of the Costume Culture
    • /
    • v.31 no.1
    • /
    • pp.18-33
    • /
    • 2023
  • Zero-waste pattern cutting is a groundbreaking sustainable fashion practice. However, few brands and designers have pursued this method because it requires creative pattern design that diverges from the existing process of using pattern slopers. Therefore, application within the fashion industry is not sufficient. Therefore, in an attempt to highlight the key characteristics of zero-waste pattern design, this study classifies and analyzes cases in which similar designs employ zero-waste pattern-cutting techniques. We hope to make zero-waste pattern design more accessible by presenting realistic pattern-cutting guidelines. To this end, theoretical research on relevant literature, previous research, and online resources and an empirical analysis of cases involving zero-waste pattern cutting were conducted in parallel. As a result of the study, we were able to classify the factors of zero-waste pattern design in terms of fabric use, design, and composition. Regarding materials, our research revealed the importance of appropriate fabric width, understanding the difference between waste minimization and minimal fabric use, and easy reuse and recycling. In terms of design, the simultaneous progress of pattern and design work, adjustable loose silhouettes, and the use of surplus fabric for functional and decorative details emerged as key characteristics. For composition, we found that size adjustment limits, arrangement irregularity, and pattern shapes were crucial elements and that various arrangements revealed unlimited design potential.

Bayesian Analysis of a Zero-inflated Poisson Regression Model: An Application to Korean Oral Hygienic Data (영과잉 포아송 회귀모형에 대한 베이지안 추론: 구강위생 자료에의 적용)

  • Lim, Ah-Kyoung;Oh, Man-Suk
    • The Korean Journal of Applied Statistics
    • /
    • v.19 no.3
    • /
    • pp.505-519
    • /
    • 2006
  • We consider zero-inflated count data, which is discrete count data but has too many zeroes compared to the Poisson distribution. Zero-inflated data can be found in various areas. Despite its increasing importance in practice, appropriate statistical inference on zero-inflated data is limited. Classical inference based on a large number theory does not fit unless the sample size is very large. And regular Poisson model shows lack of St due to many zeroes. To handle the difficulties, a mixture of distributions are considered for the zero-inflated data. Specifically, a mixture of a point mass at zero and a Poisson distribution is employed for the data. In addition, when there exist meaningful covariates selected to the response variable, loglinear link is used between the mean of the response and the covariates in the Poisson distribution part. We propose a Bayesian inference for the zero-inflated Poisson regression model by using a Markov Chain Monte Carlo method. We applied the proposed method to a Korean oral hygienic data and compared the inference results with other models. We found that the proposed method is superior in that it gives small parameter estimation error and more accurate predictions.

Comparison of Time and Frequency Resources of DFT-s-OFDM Systems Using the Zero-Tail and Unique Word (Zero Tail과 Unique Word를 사용하는 DFT-s-OFDM 시스템들의 시간과 주파수 자원 비교)

  • Kim, Byeongjae;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1715-1720
    • /
    • 2016
  • In the upcoming 5-generation mobile communication system, various techniques for improving the power efficiency and spectral efficiency have been proposed. 5G mobile communication system also have been studied a lot of multi-carrier-based modulation techniques like the 4G mobile communication system. In this paper, we analyzed the conventional system structure of the Zero-tail DFT-s-OFDM and UW (Unique Word) -DFT-s-OFDM system based on DFT-s-OFDM system in these techniques. UW and zero are added and used each system, and CP is removed. the result of quality of systems for simulation, OOB(Out of Band) power of Zero-tail DFT-s-OFDM and UW-DFT-s-OFDM use the less time resource as long as CP length, also both systems are reduced about 11dB than DFT-s-OFDM system. In these result, Zero-tail DFT-s-OFDM and UW-DFT-s-OFDM system are more effective than DFT-s-OFDM system.

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

Asymmetric volatility models with non-zero origin shifted from zero : Proposal and application (원점이 이동한 비대칭-변동성 모형의 제안 및 응용)

  • Ye Jin Lee;Sun Young Hwang;Sung Duck Lee
    • The Korean Journal of Applied Statistics
    • /
    • v.36 no.6
    • /
    • pp.561-571
    • /
    • 2023
  • Volatility of a time series is defined as the conditional variance on the past information. In particular, for financial time series, volatility is regarded as a time-varying measure of risk for the financial series. To capture the intrinsic asymmetry in the risk of financial series, various asymmetric volatility processes including threshold-ARCH (TARCH, for short) have been proposed in the literature (see, for instance, Choi et al., 2012). This paper proposes a volatility function featuring non-zero origin in which the origin of the volatility is shifted from the zero and therefore the resulting volatility function is certainly asymmetric around zero and achieves the minimum at a non-zero (rather than zero) point. To validate the proposed volatility function, we analyze the Korea stock prices index (KOSPI) time series during the Covid-19 pandemic period for which origin shift to the left of the zero in volatility is shown to be apparent using the minimum AIC as well as via parametric bootstrap verification.