• Title/Summary/Keyword: 완전

Search Result 8,481, Processing Time 0.037 seconds

Study on the Network Architecture and the Wavelength Assignment Algorithm for All-Optical Transport Network (완전 광전달망에 적합한 망 구조와 파장 할당 알고리즘 연구)

  • 강안구;최한규;양근수;조규섭;박창수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1048-1058
    • /
    • 1999
  • This paper compares some architectures to achieve the optimized WDM architecture for all optical transport network, the comparison is presented in terms of the number of required wavelength and LT. These architecture types are PPWDM, SHWDM, DHWDM and fully optical WDM. Topology is a static ring network where the routing pattern is fixed and traffic pattern has uniform demand. This paper also proposes an algorithm for the wavelength assignment for a folly optical WDM ring network which has full mesh traffic pattern. The algorithm is based on heuristic algorithm which assigns traffic connections according to their respective shortest path. Traffic described here that is to be passed through can be routed directly within the optical layer instead of having the higher layer to handle it.

  • PDF

Effective Generation of Minimal Perfect hash Functions for Information retrival from large Sets of Data (대규모의 정보 검색을 위한 효율적인 최소 완전 해시함수의 생성)

  • Kim, Su-Hee;Park. Se-Young
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.9
    • /
    • pp.2256-2270
    • /
    • 1998
  • The development of a high perfoffilance index system is crucial for the retrieval of information from large sets o[ data. In this study, a minimal perfect hash function (MPHF), which hashes m keys to m buckets with no collisions, is revisited. The MOS algorithm developed bv Heath is modified to be successful for computing MPHFs of large sets of keys Also, a system for generating MPHFs for large sets of keys is developed. This system computed MPHFs for several large sets of data more efficiently than Heath's. The application areas for this system include those for generating MPHFs for the indexing of large and infrequently changing sets of data as well as information stored in a medium whose seek time is very slow.

  • PDF

Complete Fracture of Totally Implantable Venous Catheter (완전 거치형 정맥도관의 완전 절단)

  • Kim, Jung-Tae;Chang, Woon-Ha;Oh, Tae-Yoon
    • Journal of Chest Surgery
    • /
    • v.39 no.12 s.269
    • /
    • pp.946-948
    • /
    • 2006
  • The patient was a 42-year-old female with breast cancer who had an implantable central venous catheter inserted percutaneously into left subclavian vein for chemotherapy. The postinsertion chest x ray revealed that there was no compressive sigh of catheter. Three months after insertion of the catheter, the patient was admitted to the hospital for 4th chemotherapy. The port was accessed but blood could not be aspirated and the catheter could not be flushed. A chest x ray revealed that the catheter was completely transected at the point where the catheter passed under the clavicle. Percutaneous removal of the distal fragment of the catheter was accomplished. The patient was discharged after successful removal of fragment of catheter.

Performance Evaluation of Multi-Module Software System with Imperfect Debugging and Module Dependency (모듈의존성을 갖는 불완전수리 다항모듈 소프트웨어의 성능평가에 관한 연구)

  • Kim, U-Jung;Lee, Chong Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.9
    • /
    • pp.5652-5659
    • /
    • 2014
  • The purpose of this study was to introduce a software task processing evaluation model that considers the following situations: i) a software system is integratedly composed of several number of modules, ii) each modules has its corresponding module task, iii) all module tasks are tested simultaneously, and iv) the processing times of the module tasks are mutually dependent. The software task completion probability with the module dependency was derived using the joint distribution function of Farlie [11]. The results showed that the task completion probability of software increases with increasing module dependency parameter.

(A Study of an Exact Match and a Partial Match as an Information Retrieval Technique) (완전 매치와 부분 매치 검색 기법에 관한 연구)

  • 김영귀
    • Journal of the Korean Society for information Management
    • /
    • v.7 no.1
    • /
    • pp.79-95
    • /
    • 1990
  • A retrieval technique was defined as a technique for comparing the document representations. So this study classified retrieval technique in terms of the charactristics of the retrieved set of documents and the representations that are used. The distinction is whether the set of retrieved documents contains only documents whose representations are an exact match with the query, or a partial match with query. For a partial match, the set of retrieved document will include also those that are an exact match with the query. Boolean-logic as one of the exact match retrieval techniques is in current in most of the large operational information retrieval systems despite of its problems and limitatlons. Partial match as an alternative technique has also various problems. Existing information retrieval systems are successful in aSSisting the user whose needs are well- defined (e.g. Boolean-logic), to retrieve relevant documents but it should be successful in providing retrieval assistance to the browser whose information requirements is ill-defined.

  • PDF

Estimable functions of less than full rank linear model (불완전계수의 선형모형에서 추정가능함수)

  • Choi, Jaesung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.2
    • /
    • pp.333-339
    • /
    • 2013
  • This paper discusses a method for getting a basis set of estimable functions of less than full rank linear model. Since model parameters are not estimable estimable functions should be identified for making inferences proper about them. So, it suggests a method of using full rank factorization of model matrix to find estimable functions in easy way. Although they might be obtained in many different ways of using model matrix, the suggested full rank factorization technique could be one of much easier methods. It also discusses how to use projection matrix to identify estimable functions.

Design of Wave Absorber for a Perfectly Conduction Sphere Using the Eigenfunction Series Solution form a Coated Sphere (코팅된 구의 고유함수 해를 이용한 완전도체구의 전파흡수체의 설계)

  • 심재은;전중창;김효태
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.4
    • /
    • pp.18-24
    • /
    • 1999
  • The design method of a wave absorber for a perfectly conducting sphere is presented. The backscattered field from a coated sphere can be represented as the sum of the reflected field and the creeping wave. The wave absorber for a curved surface has been designed from that the reflection coefficient of the reflected field is zero. For the design of wave absorber for a small sized conducting sphere, the creeping wave should be considered as well as the reflected field. The perfect absorbing conditions are numerically searched using the Newton-Raphson method from the backscattered field of the eigenfunction series solution from a coated sphere. The wave absorber designed by this method exhibits a superior performance of absorption to that designed from the plate type absorbing condition.

  • PDF

Full mouth rehabilitation of fully edentulous patient using implant hybrid prosthesis (완전무치악 환자에서 임플란트 하이브리드보철물을 이용한 전악 수복 증례)

  • Park, Sang-Yong;Kim, Yoon-Young;Park, Won-Hee;Lee, Young-Soo
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.53 no.3
    • /
    • pp.228-233
    • /
    • 2015
  • Loss of teeth may not only imply impaired oral function and loss of alveolar bone but is also often accompanied by reduced self-confidence. This results in a larger problem with the fully edentulous patient. The patient introduced in this study showed multiple missing teeth and mobility of remaining teeth and wanted to have fixed dental prosthesis using implants. Remaining teeth were extracted because of periodontally bad prognosis. This article reports a satisfactory clinical and esthetic outcome of full mouth rehabilitation using implant hybrid prosthesis in fully edentulous patient.

A Study on Pattern Extraction and Complete Elimination Method of Private Information (개인정보의 패턴 추출과 완전삭제방법에 관한 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.143-146
    • /
    • 2012
  • Enforcement of private information preservation law the infringement accident which is still caused by despite with private information outflow occurs. The private information outflow avoids finance and to become the fire tube. Analyzes the pattern of private information from search of private information and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private information which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private information protection and it did the pattern extraction and a complete elimination experiment of private information.

  • PDF

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF