• Title/Summary/Keyword: 분산 연결

Search Result 955, Processing Time 0.03 seconds

Threshold based User-centric Clustering for Cell-free MIMO Network (셀프리 다중안테나 네트워크를 위한 임계값 기반 사용자 중심 클러스터링)

  • Ryu, Jong Yeol;Lee, Woongsup;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.114-121
    • /
    • 2022
  • In this paper, we consider a user centric clustering in order to guarantee the performance of the users in cell free multiple-input multiple-output (MIMO) network. In the user centric clustering scheme, by using large scale fading coefficients of the connected access points (APs), each user decides own cluster with the APs having the higher the large scale fading coefficients than threshold value compared to the highest large scale fading coefficient. In the determined user centric clusters, the APs design the beamformers and power allocations in the distributed manner and the APs cooperatively transmit data to users by using beamformers and power allocations. In the simulation results, we verify the performance of user centric clustering in terms of the spectral efficiency and we also find the optimal threshold value in the given configuration.

Estimation of design flood derived by regional frequency analysis (지역빈도분석에 의한 금강유역의 설계홍수량 산정)

  • Da Ye Kim;Seung Jin Maeng
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.104-104
    • /
    • 2023
  • 최근 2017년 청주, 천안의 홍수, 2020년 용담댐 상류와 대청댐 상류의 홍수, 2022년 청주의 도시침수를 비롯한 서울 도심의 침수피해와 같은 홍수 발생은 지역의 국민들에게 막대한 재산상의 피해를 입히고 있다. 국가적 차원에서 치수의 목적을 달성하고 경제적으로 적절한 규모의 수리구조물을 설계하기 위해 하천의 주요지점에 대한 신뢰성 있는 설계홍수량의 제시는 반드시 필요한 현실에 직면해 있다. 특히 해당 지점의 수리시설물은 점빈도분석에 의한 설계홍수량을 적용하나, 관측자료가 없는 미계측 지점에 위치한 수리시설물은 지역빈도분석에 의한 설계홍수량을 산정하여 적용해야 한다. 이에 본 연구에서는 금강 유역을 대상으로 점빈도분석과 지역빈도분석에 의한 설계홍수량 결과를 비교·분석하고자 한다. 지역빈도분석을 위한 수위관측소의 선정은 금강유역 80개 수위관측소 중 장기간 연최대홍수량 자료가 있고 유량자료의 연결성 및 신뢰성이 확보된 46개수위관측소를 대상으로 하였다. 46개 수위관측소의 연최대홍수량 계열을 대상으로 동질성, 독립성 및 이상치 검정을 수행하였으며, 세 가지 검정 모두 적절한 수위 관측소 지점은 36개 지점으로 분석되었다. 36개 수위관측소의 기본통계치(평균, 표준편차, 분산, 왜곡도 및 첨예도)를 산정한 후 3변수 Gamma 분포 계열인 GEV, GLO, GPA의 확률 분포를 적용하였다. 확률 분포별 매개변수는 전산화를 통해 L-모멘트의 차수를 0~4까지 변화시켜 LH-모멘트법에 적용하였다. LH-모멘트법에 의해 산정된 확률 분포들의 매개변수를 적용하여 적합도 검정을 수행하였다. 지역빈도분석을 위해 36개 수위관측소를 K-Means clustering 방법을 통해 4개 지역으로 구분하였다. 이를 통해LH-모멘트의 적정차수와 확률 분포에 따른 점빈도분석(지점 대상)과 지역빈도분석(지역 대상) 결과인 설계홍수량을 산정하였으며, 점빈도분석과 지역빈도분석에 의해 산정된 설계홍수량간의 분석결과를 제시하였다. 본 연구를 통해 수리구조물 설계 시 안정적인 조건 제시 및 관리체계 구축에 기여하고 방재대책 수립 시 경제·사회적 요소를 반영한 합리적 방안을 제시하고자 한다.

  • PDF

Design of Thin-Client Framework for Application Sharing & Optimization of Data Access (애플리케이션 공유 및 데이터 접근 최적화를 위한 씬-클라이언트 프레임워크 설계)

  • Song, Min-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.19-32
    • /
    • 2009
  • In this paper, we design thin-client framework capable of application sharing & data access on the Internet, and apply related skills, such as X windows system, pseudo server, CODA file system, MPI(Message Passing Interface). We suggest a framework for the thin client to access data produced by working on a server optimally as well as to run server side application, even in the case of network down. Additionally, it needed to reflect all local computing changes to remote server when network is restored. To design thin client framework with these characteristics, in this paper, we apply distributed pseudo server and CODA file system to our framework, also utilize MPI for the purpose of more efficient computing & management. It allows for implementation of network independent computing environment of thin client, also provide scalable application service to numerous user through the elimination of bottleneck on caused by server overload. In this paper, we discuss the implementing method of thin client framework in detail.

Detachable zirconia prosthesis using Milled bar and ADD-TOC attachment in partial edentulous mandible: A case report (하악 부분 무치악 환자에서 Milled-bar와 ADD-TOC 부착 장치를 이용한 탈착 가능한 지르코니아 보철물 수복 증례)

  • Min-Sung Sohn;Jung-Bo Huh
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.61 no.1
    • /
    • pp.90-99
    • /
    • 2023
  • Implant overdentures are widely used as a treatment method to restore oral function in completely edentulous or partially edentulous patients with severe bone resorption. Using a milled bar, it is mechanically advantageous as the implant fixtures are splinted. Applying additional attachments to the bar has the advantage of dispersing the stress applied to the implant. In this case, a patient who used implant overdentures using 4 implants wanted to fabricate a new prosthesis due to repeated fractures of the denture and weakened retention. Milled bar with ADD-TOC attachment and zirconia prosthesis were fabricated by CAD-CAM method and mechanically and aesthetically satisfactory results were obtained.

A Study of Air Cargo Logistic System Process (항공물류 시스템 프로세스의 개선에 관한 연구)

  • Lee, Hwi-Young;Lee, Jae-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.179-187
    • /
    • 2009
  • The national boundary's meanings turn to weak according to advent of Global enterprises. The place for design a product and marketing are separated to actual market. R&D is to the area where the knowledge activity is well, and low skilful product assembling is to the place the low wage is acceptable. It shows that the importance of net work structure. From early 90's, production system is diversified to markets where with the consumer as the central as multifarious items and creation new demands through consumer's participation into manufacturing process. This phenomenon show that logistics structures adapt to demand of technical variation, and the development of e-business with VAN(:value added network) and EDI(:Electronic data interchange) prove it. This study tried to analyze utilitarian assay about systems those land, sea, air logistics through documents research, and this study also present the direction of logistics system of airline company and goal of development on the based to the model of domestic airline company accordingly.

Efficient Access Management Scheme for Machine Type Communications in LTE-A Networks (LTE-A 네트워크 환경에서 MTC를 위한 효율적인 접근관리 기법)

  • Moon, Jihun;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.287-295
    • /
    • 2017
  • Recently, MTC (Machine Type Communication) is known as an important part to support IoT (Internet of Things) applications. MTC provides network connectivities between MTC devices without human intervention. In MTC, a large number of devices try to access over communication resource with a short period of time. Due to the limited communication resource, resource contention becomes severe and it brings about access failures of devices. To solve the problem, it needs to regulate device accesses. In this paper, we present an efficient access management scheme. We measure the number of devices which try to access in a certain time period and predict the change of the number of devices in the next time period. Using the predicted change, we control the number of devices which try to access. To verify our scheme, we conduct experiments in terms of success probability, failure probability, collision probability and access delay.

Conversion of Large RDF Data using Hash-based ID Mapping Tables with MapReduce Jobs (맵리듀스 잡을 사용한 해시 ID 매핑 테이블 기반 대량 RDF 데이터 변환 방법)

  • Kim, InA;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.236-239
    • /
    • 2021
  • With the growth of AI technology, the scale of Knowledge Graphs continues to be expanded. Knowledge Graphs are mainly expressed as RDF representations that consist of connected triples. Many RDF storages compress and transform RDF triples into the condensed IDs. However, if we try to transform a large scale of RDF triples, it occurs the high processing time and memory overhead because it needs to search the large ID mapping table. In this paper, we propose the method of converting RDF triples using Hash-based ID mapping tables with MapReduce, which is the software framework with a parallel, distributed algorithm. Our proposed method not only transforms RDF triples into Integer-based IDs, but also improves the conversion speed and memory overhead. As a result of our experiment with the proposed method for LUBM, the size of the dataset is reduced by about 3.8 times and the conversion time was spent about 106 seconds.

  • PDF

Discussion on East Asian Economic Community (동아시아 지역협력강화와 경제공동체 추진에 관한 고찰: 중-일 관계를 중심으로)

  • MIN, Kyoungsik
    • International Area Studies Review
    • /
    • v.15 no.1
    • /
    • pp.195-218
    • /
    • 2011
  • Discussion of Economic Community in East Asia are active. This trend began in the late 20th from the EU and North America's regional economic integration is in response to the movement. East Asia in the late 1990s to the actual for the FTA, it was not very active. As East Asian Economic Community became one of agendas for ASEAN+3 Leaders' meeting since 2004. Japan has been positioned itself as a leading country in East Asia. However, the emergence of China in the East Asian economic community have been changes. Moreover, East Asian countries began concerns over regional economic community with frequent conclusions of FTAs and China is leading the discussion on strengthening economic cooperation in the region. Some of it in terms of economic community in East Asia will not be smooth. First, East Asian countries do not have a common goal. Second, East Asian countries have a lot of diversity. Third, China and Japan are expected to compete in the championship. Therefore, East Asian economic community should be approached in the long-term perspective.

EDF: An Interactive Tool for Event Log Generation for Enabling Process Mining in Small and Medium-sized Enterprises

  • Frans Prathama;Seokrae Won;Iq Reviessay Pulshashi;Riska Asriana Sutrisnowati
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.101-112
    • /
    • 2024
  • In this paper, we present EDF (Event Data Factory), an interactive tool designed to assist event log generation for process mining. EDF integrates various data connectors to improve its capability to assist users in connecting to diverse data sources. Our tool employs low-code/no-code technology, along with graph-based visualization, to help non-expert users understand process flow and enhance the user experience. By utilizing metadata information, EDF allows users to efficiently generate an event log containing case, activity, and timestamp attributes. Through log quality metrics, our tool enables users to assess the generated event log quality. We implement EDF under a cloud-based architecture and run a performance evaluation. Our case study and results demonstrate the usability and applicability of EDF. Finally, an observational study confirms that EDF is easy to use and beneficial, expanding small and medium-sized enterprises' (SMEs) access to process mining applications.

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.