• Title/Summary/Keyword: Address Information

Search Result 3,290, Processing Time 0.034 seconds

Preference-Based Segment Buffer Replacement in Cluster VOD Servers (클러스터 VOD서버에서 선호도 기반 세그먼트 버퍼 대체 기법)

  • Seo, Dong-Mahn;Lee, Joa-Hyoung;Bang, Cheol-Seok;Lim, Dong-Sun;Jung, In-Bum;Kim, Yoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.11
    • /
    • pp.797-809
    • /
    • 2006
  • To support the QoS streams for large scale clients, the internal resources of VOD servers should be utilized based on the characteristics of the streaming media service. Among the various resources in the server, the main memory is used for the buffer space to the media data loaded from the disks and the buffer hit ratio has a great impact upon the server performance. However, if the buffer data with high hit ratio are replaced for the new media data as a result of the number of clients and the required movie titles are increased, the negative impact on the scalability of server performance is occurred. To address this problem, the buffer replacement policy considers the intrinsic characteristics of the streaming media such as the sequential access to large volume data and the highly disproportionate preference to specific movies. In this paper, the preference-based segment buffer replacement policy is proposed in the cluster-based VOD server to exploit the characteristics of the streaming media. Since the proposed method reflects both the temporal locality by the clients' preference and the spatial locality by the sequential access to media data, the buffer hit ratio would be improved as compared to the existing buffer replacement policy. The enhanced buffer hit ratio causes the fact that the performance scalability of the cluster-based VOD server is linearly improved as the number of cluster nodes is increased.

A Study on the memory management techniques using Sensing Data Filtering of Wireless sensor nodes (무선센서노드의 센싱 데이터 필터링을 사용한 메모리 관리 기법에 대한 연구)

  • Kang, Yeon-I;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1633-1639
    • /
    • 2010
  • Recently Wireless sensor networks have been used for many purposes and is active for this study. The various methods to reduce energy consumption, which are actively being studied Wireless sensor network to reduce energy consumption, leading to improve transport efficiency, Cluster can be viewed using the research methods. Cluster method researches consists of a sensor node to the cluster and in among those they take out the Cluster head node and Cluster head node is having collects sensing information of circumferential nodes sensing to sink node transmits. Selected as cluster head sensor nodes so a lot of the energy consumption is used as a cluster head sensor nodes is lose a shorter life span have to be replaced by another sensor node. In this paper, to complement the disadvantages of a cluster-mesh method, proposes to manage memory efficiently about filtering method for sensing data. Filtering method to store the same data sensing unlike traditional methods of data filtering system sensing first sent directly by the hashing algorithm to calculate the hash table to store addresses and Sensing to store data on the calculated address in a manner to avoid duplication occurred later, and sensing data is not duplicated by filtering data to be stored in the hash table is a way.

A Study on Fashion Education Institution's Program on Apparel Prototype in Korea - Focused on Basic Bodice Patternmaking - (국내(國內) 패션관련 교육기관(敎育機關)의 의복원형(衣服原型) 교육실태(敎育實態) 연구(硏究) - 길원형(原型) 평면구성(平面構成)을 중심(中心)으로 -)

  • Lee, Myung-Ock;Sohn, Hee-Soon
    • Journal of Fashion Business
    • /
    • v.5 no.2
    • /
    • pp.129-147
    • /
    • 2001
  • The purpose of this study is to survey and analyze domestic fashion education institution's program on apparel prototype and thereupon, address the problems and find their solutions, and thereby, provide for some basic data useful to improve the basic patterns of apparel and ultimately, help reinforce the professional and practical apparel design education. The results of this study can be summarized as follows; 1. 85.1% of the subjects finished graduate or higher courses. Almost all of the college and junior college teachers finished graduate or higher courses, while only 31.6% of those teaching at technical institutes finished graduate or higher courses. Such a finding suggests that colleges tend to employ their faculty members based on their academic background but that technical institutes value the practical ability of their faculty more. 2. As a result of surveying the types of basic patterns used by teachers, it was found that 72.3% of them were using two or more patterns. The basic pattern preferred most by our teachers was Japanese culture institute's type (71.3%), followed by the US FIT type (24.5%), Lim Won-Ja's type (22.3%), French ESMOD type (17.0%). 96.3% of our apparel design students were making their basic patterns as instructed by their teachers. 3. 67.0% of our students were using their conceived sizes for production of their basic patterns, 14.9% were referring to the ready-made sizes, 8.5% were relying on their teachers' individual experiences, and 9.6% were using their own cord sizes. In order to survey the difference between teachers' sizes (ready-made sizes or individual experienced ones) and business sizes used, the basic body measurements used for ready-made apparels were surveyed to be compared with the national standard body sizes set in 1997 for women aged between 18 and 24. As a result, it was found that the ready-made sizes used for apparel production prototypes than teachers' ones were nearer the national standard sizes. Such a finding suggests that it may well be necessary for teachers to be more connected with the apparel businesses and thereby, teach their students in a more realistic way with correct information. 4. 83.0% of the subject teachers were tacking their basic patterns to be well fitting, and 76.9% of these teachers were tacking the patterns in reference with students' individual body sizes. In all, 97.4% of the subject teachers were guiding the tacking process, which suggests that the flat patternmaking is taught primarily for customized apparels. As a result of comparing the fitness of basic patterns with those of each body part, it was found that teachers were most dissatisfied with the fitness of shoulders and arm hole depth. Therefore, it will be necessary to reclassify the body types or find other drawing techniques to improve the fitness of such body parts. Nevertheless, teachers were willing much (4.18) to develop their own educational basic patterns for themselves. Lastly, it is hoped that this study will be followed up by future studies on educational prototypes covering diverse body shapes and those on practical implementations of those prototypes for students.

  • PDF

A Comparative Study on Similarity Measure Techniques for Cross-Project Defect Prediction (교차 프로젝트 결함 예측을 위한 유사도 측정 기법 비교 연구)

  • Ryu, Duksan;Baik, Jongmoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.6
    • /
    • pp.205-220
    • /
    • 2018
  • Software defect prediction is helpful for allocating valuable project resources effectively for software quality assurance activities thanks to focusing on the identified fault-prone modules. If historical data collected within a company is sufficient, a Within-Project Defect Prediction (WPDP) can be utilized for accurate fault-prone module prediction. In case a company does not maintain historical data, it may be helpful to build a classifier towards predicting comprehensible fault prediction based on Cross-Project Defect Prediction (CPDP). Since CPDP employs different project data collected from other organization to build a classifier, the main obstacle to build an accurate classifier is that distributions between source and target projects are not similar. To address the problem, because it is crucial to identify effective similarity measure techniques to obtain high performance for CPDP, In this paper, we aim to identify them. We compare various similarity measure techniques. The effectiveness of similarity weights calculated by those similarity measure techniques are evaluated. The results are verified using the statistical significance test and the effect size test. The results show k-Nearest Neighbor (k-NN), LOcal Correlation Integral (LOCI), and Range methods are the top three performers. The experimental results show that predictive performances using the three methods are comparable to those of WPDP.

Risk-Targeted Seismic Performance of Steel Ordinary Concentrically Braced Frames Considering Seismic Hazard (지진재해도를 고려한 철골 보통중심가새골조의 위험도기반 내진성능)

  • Shin, Dong-Hyeon;Hong, Suk-Jae;Kim, Hyung-Joon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.30 no.5
    • /
    • pp.371-380
    • /
    • 2017
  • The risk-targeted seismic design concept was first included in ASCE/SEI 7-10 to address problems related to the uniform-hazard based seismic concept that has been constructed without explicitly considering probabilistic uncertainties in the collapse capacities of structures. However, this concept is not yet reflected to the current Korean building code(KBC) because of insufficient strong earthquake data occurred at the Korean peninsula and little information on the collapse capacities of structures. This study evaluates the risk-targeted seismic performance of steel ordinary concentrically braced frames(OCBFs). To do this, the collapse capacities of prototype steel OCBFs are assessed with various analysis parameters including building locations, building heights and soil conditions. The seismic hazard curves are developed using an empirical spectral shape prediction model that is capable of reflecting the characteristics of earthquake records. The collapse probabilities of the prototype steel OCBFs located at the Korean major cities are then evaluated using the risk integral concept. As a result, analysis parameters considerably influence the collapse probabilities of steel OCBFs. The collapse probabilities of taller steel OCBFs exceed the target seismic risk of 1 percent in 50 years, which the introduction of the height limitation of steel OCBFs into the future KBC should be considered.

Effect of Perceived Value on Memories, Attitudes, and Loyalty: Social Enterprise Products (사회적기업 제품의 지각된 가치가 기억, 태도, 그리고 충성도에 미치는 영향)

  • Park, Sang-Keum;Lee, Yong-Ki;Yoo, Dongkuen
    • Journal of Distribution Science
    • /
    • v.13 no.12
    • /
    • pp.73-84
    • /
    • 2015
  • Purpose - Various social issues have arisen since the beginning of the 21st century therefore, enterprises that disregarded social issues have become unsustainable, and social enterprises have appeared to address these issues. A social enterprise is a social mission-focused organization that uses a market-based strategy and has a vulnerable business structure. To be self-sustainable, a social enterprise should make consumers aware of the value that it provides and secure its profitability through consumer consumption. From this perspective, this study investigates the relationship between perceived value (utilitarian and hedonic) and loyalty, and examines how memory and attitudes play mediating roles between perceived value and loyalty. For these purposes, the author developed a structural model consisting of several variables. In this model, perceived value, which was utilitarian and hedonic, was proposed to affect the memory and attitudes toward social enterprise products, thus increasing loyalty. Therefore, memory and attitudes were proposed as core mediating variables between perceived value and loyalty. Research design, data, and methodology - To analyze the proposed model, data were collected from 582 respondents and analyzed using SPSS 21.0 and AMOS 21.0. To test unidimensionality and the nomological validity of the measures of each construct, we employed a scale refinement procedure. The results of the reliability test with Cronbach's α and confirmatory factor analysis warranted the unidimensionality of the measures for each construct. In addition, the nomological validity of the measures was warranted from the results of the correlation analysis. The result of the overall model analysis demonstrated a good fit (χ2=529.881, df=144, χ2/df=3.680, p-value=0.000, GFI=0.905, NFI=0.948, CFI=0.961, RMR=0.036, RMSEA=0.068). Results - The findings are summarized as follows. First, the hedonic and utilitarian value of social enterprise products had positive effects on memory and attitudes. Second, the hedonic value of social enterprise products more strongly affects memory and attitudes than utilitarian value. Third, memory and attitudes had positive effects on loyalty. Lastly, memory had a stronger effect on loyalty than attitudes. Conclusions - The purchase rate of social enterprises' products increases only if the products are included in the "information search" and "alternative evaluation" processes in consumers' purchase decision-making processes. Therefore, a social enterprise must actively promote the fact that it pursues a social value, and shares both the hedonic and utilitarian values of its products. Accordingly, because hedonic value has a more significant impact on a company and attitudes, a social enterprise should develop hedonic values for product consumption, thereby leading consumers who care about value consumption to purchase its products. Moreover, a social enterprise must maintain good memories and attitudes for consumers because memory does not change over time, although attitude does. The limitations of this study and suggestions for future research are as follows. This study viewed "consumer loyalty" as the success factor of social enterprises, thereby considers an "increase in sales" as the success factor. Therefore, in future studies, diverse factors, including social contribution and word-of-mouth intention, should be regarded. In addition, future studies need to thoroughly review and make assurances about the relationship between memory and attitude.

Youth Startup Firms: A Case Study on the Survival Strategy for Creating Business Performance (청년창업기업의 창업초기 생존전략 : 중진공 청년전용자금 활용기업 사례)

  • Lee, Seung-Chang;Lim, Won-Ho;Suh, Eung-Kyo
    • Journal of Distribution Science
    • /
    • v.12 no.6
    • /
    • pp.81-88
    • /
    • 2014
  • Purpose - Entrepreneurship promotion is emerging as an important economic growth agenda. However, in Korea, entrepreneurship has weakened because of the collapse of the venture bubbles of the 2000s and the global economic recession in 2008, which have induced the business community to choose stability over risk. The Korean government has been implementing several support projects to inspire and promote youth entrepreneurship through various means including financial assistance; however, the perpetuation rate of young entrepreneurship is still low as compared to advanced economies such as the US and EU. This case study focuses on the Youth Start-Up Business Support Program of the Small & Medium Business Corporation, and explores practical alternatives. Further, it aims to suggest managerial factors and a conceptual model for change management factors affecting the business performance creation of a startup company, based on the Small and medium Business Corporation's young venture startup fund. Research design, data, and methodology - Many studies examine the current progress and issues of startup firms, for example, a lack of systematic cultivation of entrepreneurship and startup business training, lack of commercialization funding for youth startup businesses, lack of mentoring, and inadequate infrastructure. From prior research, we address four factors, namely, personal managerial capabilities, innovative business model, sufficient cash flow, and social network, affecting startup companies' business performance. This study involved a sample survey of 200 young entrepreneurs to investigate casual relations between the four factors and business performance. A regression analysis was used to verify the hypotheses. Results - First, in relation to differences in the founder's personal characteristics, age, sales amount, and number of employees significantly impact business performance. Second, regarding the causal relation between the four factors for creating business performance, an innovative business model and social networking have supported the hypotheses, revealing that the more that a start-up founder has an innovative business model and social networking, the more the start-up firms are likely to have better performance (e.g., sales volume, employment, ROE, ROI, etc.). Although the founder's competency and sufficient cash flow have no significant relationship with business performance, the mean value was higher performance for high founder's competency and sufficient cash flow. Conclusions - This study provides basic data on policy support strategies of the Small and Medium Business Corporation, to help young entrepreneurs achieve their start-up business goals. It shows that young entrepreneurship startup firms should strive to explore ideas to satisfy customers' needs, and that changes in customer value and the continuous innovation of business model differentiation are required to actively respond to change management. Moreover, at the infant startup stage, they should activate social network programs to share information, thereby offsetting resource scarcity and managing business risk. Further, the establishment of a long-term vision and the implementation of training programs in related specific fields should be supported to strengthen founders' personal capabilities.

A Study on the Expected Effect of Mobile Prepaid Payment for the Activation of Food Waste Volume-Rate System (음식물 종량제 활성화를 위한 모바일 선불결제 적용에 따른 기대효과 연구)

  • Kim, YongIl;Kim, SeungCheon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.47-54
    • /
    • 2020
  • This study proposes an NFC-based payment system that considers user convenience while expanding the existing payment method for RFID-based individual food and logistics waste equipment. In line with this trend, I proposed to apply NFC to the existing RFID-based food meter to release the food in the meantime and to address the problem of re-carrying due to card loss, card not possessed, and non-filling, and the question that could not be identified by various cumbersome procedures. NFC's function alone has been certified for its convenience, which led to its introduction and research in the period of time. Of course, we need to negotiate fees with the transportation card company, but if we see a market share related to transportation card soon, we think smooth negotiations will take place. NFC method will be expanded to all phones with iPhone NFC opening. Therefore, in the next study, we intend to apply the payment system in NFC by linking with local currency, mobile vouchers, and card companies, which are being paid as respective payment means according to the recent emergency support system for COVID-19.

The Concept of Finding Aids

  • Sinn, Dong-Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.93-109
    • /
    • 2003
  • Finding aids have existed from the time when ancient archives appeared, With this long history, they have been used in most of Western archives, and thus, it is one of the most familiar tasks generally performed by archivists. However, ironically, this accustomed concept has not been an academic object to many researchers. Especially, in this electronic age, finding aids are even more complicated in their forms and meanings. This paper intends to address the concept(s) of finding aids as reflected in the archival literature in North America. The paper will attempt to illustrate how the concept of finding aid has evolved both conceptually and practically in archives and archival science and how circumstantial and social elements affect this concept. It Seems that the concept of finding aids has developed from the broad and integrated concept of provenance and pertinence to the narrower and practical sense considering the use by the public. It also turns out that the concept has advanced from a mere technical tool for describing records to an access tool for maximum availability. Not surprisingly, the concept of finding aids have changed as archival science and the profession has advanced and diversified. It is crucial for the archival community to understand changes in the practice and the concept of finding aids that will enable the preparation of higher quality finding aids enabling the optimum use of archives.

Reduction of Authentication Cost Based on Key Caching for Inter-MME Handover Support (MME 도메인간 핸드오버 지원을 위한 키캐싱 기반 인증비용의 감소기법)

  • Hwang, Hakseon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.209-220
    • /
    • 2013
  • Handover is the technology to minimize data lose of mobile devices and make continuous communication possible even if the device could be moved from one digital cell site to another one. That is, it is a function that enables the mobile user to avoid the disconnection of phone conversations when moving from a specific mobile communication area to another. Today, there are a lot of ongoing researches for fast and efficient hand-over, in order to address phone call's delay and disconnection which are believed to be the mobile network's biggest problems, and these should essentially be resolved in all mobile networks. Thanks to recent technology development in mobile network, the LTE network has been commercialized today and it has finally opened a new era that makes it possible for mobile phones to process data at high speed. In LTE network environment, however, a new authentication key must be generated for the hand-over. In this case, there can be a problem that the authentication process conducted by the hand-over incurs its authentication cost and delay time. This essay suggests an efficient key caching hand-over method which simplifies the authentication process: when UE makes hand-over from oMME to nMME, the oMME keeps the authentication key for a period of time, and if it returns to the previous MME within the key's lifetime, the saved key can be re-used.