• Title/Summary/Keyword: 근접 할당

Search Result 44, Processing Time 0.026 seconds

Building of Database Retrieval System based on Knowledge (지식기반 데이터베이스 검색 시스템의 구축)

  • 박계각;서기열;임정빈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.450-453
    • /
    • 1999
  • In this paper, the cooperative retrieval system to interface between users and DB, image data and knowledge-based database(KDB), being formed in a linguistic knowledge expression, of system is presented. Conventional database retrieval systems provide the data only in case that the data exactly corresponding with users' requirements exist in these systems, but don't in other cases. In order to resolve this problem, if the data users require are not in existence, this system shows the data and image information which are approximate with knowledge-based database materialized by fuzzy clustering and allocation of linguistic label.

  • PDF

Optimal Moving Pattern Extraction of the Moving Object for Efficient Resource Allocation (효율적 자원 배치를 위한 이동객체의 최적 이동패턴 추출)

  • Cho, Ho-Seong;Nam, Kwang-Woo;Jang, Min-Seok;Lee, Yon-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.689-692
    • /
    • 2021
  • This paper is a prior study to improve the efficiency of offloading based on mobile agents to optimize allocation of computing resources and reduce latency that support user proximity of application services in a Fog/Edge Computing (FEC) environment. We propose an algorithm that effectively reduces the execution time and the amount of memory required when extracting optimal moving patterns from the vast set of spatio-temporal movement history data of moving objects. The proposed algorithm can be useful for the distribution and deployment of computing resources for computation offloading in future FEC environments through frequency-based optimal path extraction.

  • PDF

The Evolution of the IT Service Industry in the U.S. National Capital Region: The Case of Fairfax County (미국 수도권 IT서비스산업 집적지의 진화: 페어팩스 카운티를 사례로)

  • Huh, Dongsuk
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.16 no.4
    • /
    • pp.567-584
    • /
    • 2013
  • This study aims to explore an evolutionary path of the IT service industry in Fairfax County using the Cluster Adaptive Cycle model in economic geography. The analysis is based on detailed historical and industrial information obtained through a variety of data sources including local archival materials, economic census, and interviews. This study also performs a shift-share analysis during the period of 1990 to 2011. Using the adaptive cycle model, the local IT service industry is indicated by a trajectory of constant cluster mutation. The evolution of the local IT service industry has been closely related to federal government policy due to the regional specificity of the National Capital Region and the proximity of the Department of Defense. Although the economic downturn of the late 2000s, the local IT service industry has been notable resilience and adapted to a changing market and technological environment. This constant mutation of the local industry is resulted from not only high resilience which is based on the large government procurement market, the reinforcement of adaptive capacity of the local firms and the network of economic agents such as firm and supporting institutions, but also high flexibility of the knowledge-based service industry to a changing business environment.

  • PDF

A Study on the Improvement of Real-Time Traffic QoS using the Delay Guarantee Queue Service Discipline of End-to-End (종단간 지연 큐 서비스 방식을 이용한 실시간 트래픽 QoS 개선에 관한 연구)

  • 김광준;나상동
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.236-247
    • /
    • 2002
  • We propose a cell-multiplexing scheme for the real-time communication service in ATM network and a new service discipline guarantee end-to-end delay based on pseudo-isochronous cell switching. The proposed scheme consists of two level frame hierarchy, upper and lower frame, which is used to assign the bandwidth and to guarantee the requested delay bound, respectively. Since the Proposed algorithm employs two level frame hierarchy, it can overcome the coupling problem which is inherent to the framing strategy It can be comparatively reduce the complexity, and still guarantee the diverse delay bounds of end-to-end. Besides, it consists of two components, traffic controller and scheduller, as the imput traffic description model and regulates the input traffic specification. The function of the traffic controller is to shape real -time traffic to have the same input pattern at every switch along the path. The end-to-end delay is bounded by the scheduller which can limit the delay variation without using per-session jitter controllers, and therefore it can decrease the required buffer size. The proposed algorithm can support the QoS's of non-real time traffic as well as those of real time traffic.

Real-Time Traffic Connection Admission Control of Queue Service Discipline (큐 서비스 방식에서 실시간 트래픽 연결 수락 제어)

  • 나하선;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.5C
    • /
    • pp.445-453
    • /
    • 2002
  • We propose a cell-multiplexing scheme for the real-time communication service in ATM network and a new service discipline guarantee end-to-end delay based on pseudo-isochronous cell switching. The proposed scheme consists of two level frame hierarchy, upper and lower frame, which is used to assign the bandwidth and to guarantee the requested delay bound, respectively. Since the proposed algorithm employs two level frame hierarchy, it can overcome the coupling problem which is inherent to the framing strategy. The proposed scheme consists of two components, traffic controller and scheduller, as the imput traffic description model and regulates the input traffic specification. The function of the traffic controller is to shape real-time traffic to have the same input pattern at every switch along the path. The end-to-end delay is bounded by the scheduller which can limit the delay variation without using per-session jitter controllers, and therefore it can decrease the required buffer size. The proposed algorithm can support the QoS's of non-real time traffic as well as those of real time traffic

Characteristics of Manganese Nodule Distribution Pattern using Sub-bottom Profile and Deep Tow Imaging System Data (천부지층자료와 심해영상자료를 활용한 망간단괴 분포 특성 연구)

  • Ko, Young-Tak;Park, Cheong-Kee;Kim, Jong-Guk;Lee, Tae-Gook
    • Journal of the Korean Geophysical Society
    • /
    • v.9 no.4
    • /
    • pp.427-441
    • /
    • 2006
  • Sub-bottom profiler and deep tow imaging system were performed in the KODOS (Korea Deep Ocean Study) area in order to find out controlling factor in nodule formation from the relationship between distribution of Mn nodules and micro-scale topographic change. Although abundance of r- and t- types nodules increase on the seafloor of thin upper transparent layer, no significant correlation was found between the thickness of upper transparent layer and total nodule abundance in the study area. Our results show that distribution pattern of nodule, including abundance, continuity, and facies, can vary with small scale in similar abyssal plain.

  • PDF

Development and Utilization of Mine Management Software: A Review (광산관리 소프트웨어의 개발 현황 및 활용사례 분석)

  • Park, Sebeom;Choi, Yosoon
    • Tunnel and Underground Space
    • /
    • v.25 no.3
    • /
    • pp.221-230
    • /
    • 2015
  • This study examined and analyzed several mine management software programs developed in domestic and oversea countries. In the oversea countries, many companies have developed and commercialized mine management softwares such as Dispatch, $Cat^{(R)}$ $MineStar^{TM}$ and FARA. These softwares provide many functionalities including real-time machine tracking, machine assignment optimization, productivity management, equipment health monitoring and remote control. For the domestic cases, this study reviewed two software programs (i.e., GEMISIMS, Truck-Shovel fleet optimization) developed by several researchers because there is no mine management software currently commercialized in Korea. In addition, this paper reports the two cases at the Jwaneng mine in Botswana and at the Robinson mine in United States where mine management software programs are used to support mine operations.

An Adaptive Tone Injection Scheme using Clipping Noise for PAPR Reduction of OFDM Signals (OFDM 신호의 PAPR 감소를 위해 클리핑 잡음을 이용한 적응적 톤 삽입 기법)

  • Yang, Mo-Chan;Shin, Yo-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11C
    • /
    • pp.1076-1084
    • /
    • 2009
  • We propose an ATI (Adaptive Tone Injection) scheme based on clipping noise for PAPR (Peak-to-Average Power Ratio) reduction of OFDM (Orthogonal Frequency Division Multiplexing) signals. The proposed scheme is composed of three steps: clipping, tone selection, and TI procedures. In the first step, the peak samples in the IFFT (Inverse Fast Fourier Transform) outputs are scaled down by clipping. In the second step, the sub-carrier position where the power of the clipping noise is the maximum, is selected. Finally, the generic TI procedure is performed. Simulation results show that the proposed scheme does not require all the possible combinations of the original TI procedures, while maintaining the PAPR reduction performance.

Feasibility Study for Device-to-Device Communications Using Unlicensed Bands in a Cellular Network (셀룰러 네트워크에서 비면허 대역을 활용한 단말 간 직접통신 타당성 연구)

  • Kim, Hyeon-Min;Kang, Gil-Mo;Shin, Oh-Soon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.2
    • /
    • pp.208-211
    • /
    • 2016
  • Device-to-Device communication(D2D) enables devices in proximity to communicate directly without going through the network infrastructure. In particular, D2D communications in a cellular network can improve the spectral efficiency by allowing the reuse of cellular resources. However, it is not easy to maintain the channel quality of the D2D links and to protect the cellular links from the D2D interferences, since the resource allocations for the cellular users will change with time due to the time-varying nature of the cellular channels. To mitigate the performance degradation of D2D links, we propose to exploit unlicensed bands as auxiliary resources when the D2D links share the uplink cellular resources. The effectiveness of the proposed scheme is verified through simulations.

An Enhanced Genetic Algorithm for Reader Anti-collision in RFID System (RFID 시스템에서의 리더 충돌 방지를 위한 개선된 유전자 알고리즘)

  • Seo, Hyun-Sik;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.85-94
    • /
    • 2008
  • When an RFID reader uses the same frequency or adjacent frequency with neighbor readers, the interference might occur. These interferences cause the RFID reader collision and errors during tag recognition. Therefore, the international standard for RFID and some papers proposed the methods to reduce the reader collision. The reader interference is closely related to the distance between the readers haying interference and used frequency band. In the previous RFID reader anti-collision algorithms, the location of readers inducing interference which is closely related to interference of readers is not considered. Only the reader collision is tried to reduce through frequency transfer after collisions occur or modification of frame size in relation to collision probability based a TDM(Time Division Multiplex). In this paper, the genetic algorithm using two-dimensional chromosome which reflect readers' location is proposed to prevent reader collision effectively. By executing evolutionary operation with two-dimensional chromosome, the location information having influence on reader interference can be used. The repair operation in the proposed algorithm makes all reader stably recognize their tags.