• Title/Summary/Keyword: 계층분석적방법

Search Result 1,186, Processing Time 0.035 seconds

Performance Evaluation of Multi-Hop Transmissions in IEEE 802.15.6 UWB WBAN (IEEE 802.15.6 UWB WBAN에서 다중 홉 전송에 대한 성능 평가)

  • Kim, Ho-Sung;Hwang, Ho Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1313-1319
    • /
    • 2017
  • In this paper, we evaluate the performance of multi-hop transmissions in IEEE 802.15.6 ultra wide band (UWB) wireless body area network (WBAN). The packet structure in the physical layer, and encoding and decoding are considered for multi-hop transmissions in IEEE 802.15.6 UWB WBAN. We analyze the data success rate and energy efficiency of multi-hop transmissions with considering the length of data payload, transmission power, and distances between the nodes in IEEE 802.15.6 UWB WBAN. Through simulations, we evaluate the data success rate and energy efficiency of multi-hop transmissions with varying the length of data payload, transmission power, and distances between the nodes in IEEE 802.15.6 UWB WBAN. Finally, we can select an energy-efficient multi-hop transmission in IEEE 802.15.6 UWB WBAN depending on the length of data payload, transmission power, and distances between the nodes.

XPERT : An XML Query Processing System using Relational Databases (관계형 DBMS를 이용한 XML 질의 처리 시스템 XPERT의 개발)

  • Jung Min-Kyoung;Hong Dong-Kweon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • This paper introduces the development XPERT(XML Query Processing Engine using Relational Technologies) which is based on relational model. In our system we have used a decomposed approach to store XML files in relational tables. XML queries are translated to SQLs according to the table schema, and then they are sent to the relational DBMS to get the results back. Our translation scheme produces AST(Abstract Syntax Tree) by analyzing XQuery expressions at first. And on traversing AST proper SQLs are generated. Translated SQLs can reduce the number of joins by using path information and utilize dewey number to preserve document originated orderings among compoments in XML. In addition we propose the efficient algorithms of XPath and XQuery translation. And finally we show the implementation of our prototype system for the functional evaluations.

Mobile IP local pre-registration scheme for accommodating real-time data traffics in cdma2000 Networks (cdma2000 네트워크에서 실시간 데이터 트래픽을 수용하기 위한 Mobile IP 지역내 사전등록 기법)

  • 박민철;임재성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7A
    • /
    • pp.493-502
    • /
    • 2003
  • In this paper, to solve some problems of the Mobile IP and local registration strategy we propose a method that can effectively support real-time traffics sensitive to delay time and packet loss. The proposed method reduces the registration time after a Mobile Node's movement between networks by carrying out the pre-registration for the domain which it will move into the network information of the link layer of cdma2000 system, at the boundary cell's handoff zone. Through the cost analysis and simulation it is shown that the proposed scheme yield a better performance compared with the Mobile IP and local registration strategies in terms of packet loss for parameters; variation of the velocity of a Mobile Node, and a distance between the Mobile Node and home networks, etc.

A novel page replacement policy associated with ACT-R inspired by human memory retrieval process (인간 기억 인출 과정을 응용하여 설계된 ACT-R 기반 페이지 교체 정책)

  • Roh, Hong-Chan;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.18D no.1
    • /
    • pp.1-8
    • /
    • 2011
  • The cache structure, which is designed for assuring fast accesses to frequently accessed data, resides on the various levels of computer system hierarchies. Many studies on this cache structure have been conducted and thus many page-replacement algorithms have been proposed. Most of page-replacement algorithms are designed on the basis of heuristic methods by using their own criteria such as how recently pages are accessed and how often they are accessed. This data-retrieval process in computer systems is analogous to human memory retrieval process since the retrieval process of human memory depends on frequency and recency of the retrieval events as well. A recent study regarding human memory cognition revealed that the possibility of the retrieval success and the retrieval latency have a strong correlation with the frequency and recency of the previous retrieval events. In this paper, we propose a novel page-replacement algorithm by utilizing the knowledge from the recent research regarding human memory cognition. Through a set of experiments, we demonstrated that our new method presents better hit-ratio than the LRFU algorithm which has been known as the best performing page-replacement algorithm for DBMS caches.

An AHP-based Assessment Criteria Decision System for National Research and Development Tasks (AHP 기반 국가 연구개발 과제 평가 기준 결정 시스템)

  • Park, Seong-Ho;Oh, Jae-Taek;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.405-410
    • /
    • 2020
  • Professionalism, objectivity, and fairness are highly required in the assessment of tasks in national research and development projects. Experts in the technologies should thus focus on the task's plan in the review process. The same scores in the assessment, however, do not mean that the judges don't have the same opinions. Another problem is the possibility that different weights can be applied for evaluation indexes. This study proposed an AHP-based assessment criteria decision system for national research and development tasks to reduce errors in task assessment and selection and improve the professionalism and fairness by objectifying the evaluation criteria of each index. As a result, the assessment criteria were objectified for each index in the projects. In addition, the professionalism and fairness of experts were secured in the process of setting assessment criteria for each index based on the given marks of weights.

A Study of Practical Field Application Cryptographic Module through Evaluation Derived by Connection Indicators (품질 연계지표 평가방법을 사용한 암호화 모듈 실무현장 적용체계 연구)

  • Noh, SiChoon;Na, SangYeob
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.55-60
    • /
    • 2014
  • In this study, we propose a cryptographic module quality evaluation system referenced by ISO/IEC 9000 quality system with Quality, Quality Factor, Quality Subfactor, Metric. Practical application process encryption algorithm based on the encryption algorithm to encrypt the pros and cons valuation of diagnosis, point selection algorithm, analysis, and quality items(quality factor), eliciting constraints derived, such as the cryptographic module design quality evaluation system is set to step 5. The five steps are examples of field-based diagnostic tool for cryptographic operations, the most essential work to be done in order to derive one will work. 2-Factor encryption module for connection between indicator items(quality factor) to identify and ensure the quality of the item the constraints of the environment are two kinds of cryptographic operations. This study is an encryption module and a practical field application system, it presents the standardized model. We have to meet the rapid changes in information technology. The environment, development and the encryption algorithm applied to model a wide variety of on-site development encryption will be able to expect the efficiency.

A Proposal for One-Hand Control Schemes of First-Person Viewpoint Mobile Games (1인칭 시점 모바일 게임의 한 손 조작 방식 제안)

  • Jung, InHoo;Kim, Sun-Jeong;Lee, Seung-Hwan
    • Journal of Korea Game Society
    • /
    • v.16 no.6
    • /
    • pp.49-58
    • /
    • 2016
  • This paper proposes three schemes of one-hand control that can be used in the First-Person Viewpoint mobile games and evaluates them. Displaying virtual controllers on the screen, the existing mobile games use schema that allows users use both hands. In the First-Person Viewpoint mobile games, however, one-hand control is possible because smaller number of functions for viewpoint movement is required. This research proposes three one-hand control schemes for First-Person Viewpoint movement and rotation, and evaluates them using AHP. The experiment results prove that one-hand control schemes are more useful than both-hands control schemes for the mobile game users.

Revealing Hidden Relations between Query-Words for an Efficient Inducing User's Intention of an Information Search (효율적 검색의도 파악을 위한 쿼리 단어 가시화에 관한 연구)

  • Kwon, Soon-Jin;Hong, Chul-Eui;Kim, Won-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.44-52
    • /
    • 2012
  • This paper proposes to increase an efficiency of somebody searching information by a visualization of an unseen query words with well-selected user's intent structures. If a search engine identifies user's intent to pursue information, it would be an effective search engine. To do so, it is needed that relationships between query-words are to be visible after recovering words lost during formulated, and that an intention structure/elements is to be established. This paper will review previous studies, after then, define a simple structure of the search intent, and show a process to expand and to generate the query words appropriate to the intent structure with a method for the visualization of the query words. In this process, some examples and tests are necessary that one of the multiple intent structured layers is to assign to a range of query-words. Increasing/Decreasing an efficiency are analyzed to find. Future research is needed how to automate a process to extend structural nodules of user's intent.

Improvement to Video Display Time Delay when TV Channel switching in Variable Bit Rate Mode of Terrestrial MMS (지상파 MMS 가변 비트율 모드 방송에서 TV 채널 전환 시 발생하는 영상 표출 시간 지연의 개선)

  • Park, Sung-hwan;Chang, Hae-rang;Jeon, Hyoung-joon;Kwon, Soon-chul;Lee, Seung-hyun
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.775-781
    • /
    • 2015
  • EBS started 2HD MMS experimental broadcasting for the first time in Korea on Feb. 11, 2015. It uses the picture compression technique based on MPEG-2 CODEC, and applies the result of the experiment about variable bit rates and changes according to the scanning types, 1080i and 720p. But when changing channels, the delay in displaying picture occurs because of the operation of the variable GOP on MMS broadcasting, which optimizes image quality by application variable bit rates. In this study, verified the relationship between the decoding time of I frames and the GOP set in the encoding step by experimenting and analyzing ON-AIR TS. By using the verification data and adjusts the Encoder GOP parameters, improved the different video display time delays according to the scanning mode 1080i and 720p.

Security Framework for Intelligent Predictive Surveillance Systems (지능형 예측감시 시스템을 위한 보안 프레임워크)

  • Park, Jeonghun;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.77-83
    • /
    • 2020
  • Recently, intelligent predictive surveillance system has emerged. It is a system that can probabilistically predict the future situation and event based on the existing data beyond the scope of the current object or object motion and situation recognition. Since such intelligent predictive monitoring system has a high possibility of handling personal information, security consideration is essential for protecting personal information. The existing video surveillance framework has limitations in terms of privacy. In this paper, we proposed a security framework for intelligent predictive surveillance system. In the proposed method, detailed components for each unit are specified by dividing them into terminals, transmission, monitoring, and monitoring layers. In particular, it supports active personal information protection in the video surveillance process by supporting detailed access control and de-identification.