• Title/Summary/Keyword: Channel management

Search Result 1,335, Processing Time 0.027 seconds

The design and fabrication of management system for weight measuring food wastes for indoor

  • Seo, Chang Ok;Kim, Gye Kuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.35-40
    • /
    • 2017
  • A weight-rate disposal system for food waste has been implemented in all over the country. The food waste disposal system is a system paying service charge according to the volume of food waste, which means the more we produce waste, the more we have to pay as much.Since this policy was introduced, each of apartment, villa, etc and other buildings must install the food waste disposal system. We can say that there are strong points in this paper for us to install a weight monitor on the channel of the floor each, accumulate the fares automatically and collect the fares at the end of every month.

Developing Trend of an Ubiquitous Interface Technologies (유비쿼터스 인터페이스 기술의 개발 동향)

  • Lee, Hyeon-Jae;O, Chang-Heon
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.299-311
    • /
    • 2005
  • This article introduces developing trends of an "Ubiquitous Interface" as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. "Ubiquitous Interface" is include a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These "Ubiquitous Interface" able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended candidates are RFID, NFC, Multi-mode mobile terminal, Wearable computer and OSGi for integrated digital home networking system as a future ubiquitous interface. These candidates are have to have flexibility and multiple physical communication channel for seamless service hand over and serve easy connection at huge USN to user. And, must have flexible software structure and multi-functional middleware. Consequently, for more enhance performance of an ubiquitous interface and developing, need more structured and integrated future plan.

  • PDF

Core Analysis during Transition from 37-Element Fuel to CANFLEX-NU Fuel in CANDU 6

  • Jeong, Chan-Joon;Suk, Ho-Chun
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1998.05a
    • /
    • pp.169-174
    • /
    • 1998
  • An 1200-day time-dependent fuel-management for the transition from 37-element fuel to CANFLEX-NU fuel in a CANDU 6 reactor has been simulated to show the compatibility of the CANFLEX-NU fuel with the reactor operation. The simulation calculation were carried out with the RFSP code, provided by cell averaged hel properties obtained from the POWDERPUFS-V code. The refueling scheme for both fuels was an eight bundle shift art a time. The simulation results show that the maximum channel and bundle powers were maintained below the licence limit of the CANDU 6. This indicates that the CANFLEX-NU fuel bundle is compatible with the CANDU 6 reactor operation during the transition period.

  • PDF

CRT-Based Color Image Zero-Watermarking on the DCT Domain

  • Kim, HyoungDo
    • International Journal of Contents
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2015
  • When host images are watermarked with CRT (Chinese Remainder Theorem), the watermark images are still robust in spite of the damage of the host images by maintaining the remainders in an unchanged state within some range of the changes that are incurred by the attacks. This advantage can also be attained by "zero-watermarking," which does not change the host images in any way. This paper proposes an improved zero-watermarking scheme for color images on the DCT (Discrete Cosine Transform) domain that is based on the CRT. In the scheme, RGB images are converted into YCbCr images, and one channel is used for the DCT transformation. A key is then computed from the DC and three low-frequency AC values of each DCT block using the CRT. The key finally becomes the watermark key after it is combined four times with a scrambled watermark image. When watermark images are extracted, each bit is determined by majority voting. This scheme shows that watermark images are robust against a number of common attacks such as sharpening, blurring, JPEG lossy compression, and cropping.

On the Handover Performance of a Tri-threshold Bandwidth Reservation CAC Scheme

  • Tung, Hoi Yan;Tsang, Kim Fung;Lee, Lap To;Lam, Ka Lun;Sun, Yu Ting;Kwan, Shiu Keung Ronald;Chan, Sammy
    • ETRI Journal
    • /
    • v.29 no.1
    • /
    • pp.113-115
    • /
    • 2007
  • A dynamic tri-threshold call admission control scheme has been developed. This scheme supports voice, data, and multimedia services and it complies with the universal mobile telecommunications system. The performance of the proposed scheme is evaluated under varying handover rates. The QoS performance-including channel utilization, call dropping probability, and blocking probability-is investigated. The performance of the developed scheme is found to be encouraging.

  • PDF

Development of A Plagiarism Detection System Using Web Search and Morpheme Analysis (인터넷 검색과 형태소분석을 이용한 표절검사시스템의 개발에 관한 연구)

  • Hwang, In-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.1
    • /
    • pp.21-36
    • /
    • 2009
  • As the World Wide Web (WWW) has become a major channel for information delivery, the data accumulated in the Internet increases at an incredible speed, and it derives the advances of information search technologies. It is the search engine that solves the problem of information overloading and helps people to identify relevant information. However, as search engines become a powerful tool for finding information, the opportunities of plagiarizing have increased significantly in e-Learning. In this paper, we developed an online plagiarism detection system for detecting plagiarized documents that incorporates the functions of search engines and acts in exactly the same way of plagiarizing. The plagiarism detection system uses morpheme analysis to improve the performance and sentence-based comparison to investigate document comes from multiple sources. As a result of applying this system in e-Learning, the performance of plagiarism detection was improved.

  • PDF

Major Criteria for Channel Selection in Banking Transaction

  • Cho, Nam-Jae;Park, Ki-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.1
    • /
    • pp.169-183
    • /
    • 2009
  • The purpose of this research, based on the Media Selection Theory, the Technology Acceptance Model, and the Social Influence Theory, is to investigate the influential factors that affect media selection in banking transactions. Analyses showed that for location sensitive bank windows and ATMs(automatic teller machines), defined as offline-based transaction channels, convenience was the variable affecting media selection. However, in the case of online media not related to location, (phone banking, internet banking, and mobile banking) reliability was the significant variable influencing use. The findings show that banking organizations may benefit from identifying traits of media affecting use, and should differentiate customer services for competitive advantage.

  • PDF

Incentivizing User Contributions in Idea Crowdsourcing through Quantitative and Qualitative Feedback : A Field Experiment

  • Cho, Sook-Hyun;Lee, Sang-Min;Moon, Jae Yun
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.3
    • /
    • pp.19-33
    • /
    • 2014
  • Crowdsourcing is a popular tool for firms to harness external knowledge and resources. One variation of crowdsourcing entails the use of corporate channels in social network services (SNS) such as Twitter to hold public idea competitions. This study examined the role of feedback interaction between participants of idea competitions. More specifically, the study examined the impact of incentives to provide feedback on other participants' ideas. We found that idea competitions where explicit incentives were introduced to elicit crowdsourced feedback in the form of qualitative comments resulted in improved idea generation performance-with more ideas generated overall, and more ideas generated through participant collaborations, through increased comment-posting activities. Based on the findings, implications for theory and practice are discussed.

Two-Channel Authentication Using a Mobile Application in VPN (VPN 환경에서 스마트폰을 이용한 이중 인증)

  • Kim, Do-yeon;Kim, Yoon-young;Park, Ji-eun;Choi, Go-eun;Hyun, Jeong-hoon
    • Annual Conference of KIPS
    • /
    • 2016.04a
    • /
    • pp.237-238
    • /
    • 2016
  • 본 논문은 안전한 통신 환경인 VPN 상에서의 통신을 전제로 하여 보안성에 있어서 취약한 FTP 시스템의 로그인 과정에 일회용 비밀번호(OTP)를 적용한 방법에 관한 논문이다. OTP는 모바일 Application을 통해 사용자의 간단한 개인정보와 시간 값을 조합하여 암호문으로 생성되도록 설계하였다. 사용자가 해당 값으로 FTP 서버에 접근 시 서버는 일치 여부를 판단 승인하여 데이터 공유를 가능하게 한다.

Counter-Current Flow Limit in Narrow Gap (간극에서의 역방향 유동 제한 현상 연구)

  • Kim, Yong-Hoon;Suh, Kune-Y.
    • Proceedings of the KIEE Conference
    • /
    • 1998.11b
    • /
    • pp.706-712
    • /
    • 1998
  • Previous counter-current flow limitation (CCFL) and critical heat flux (CHF) studies included investigations on the inlet entrance, inclined channel and gap effects for the most part. In this study, the local CHF correlation was presented to be used in the numerical analysis for the 3 dimensional hemispherical geometry. Also, first-principle analyses were performed to determine the maximum heat removal capability from the debris through the gap that may be formed during a core melt accident. The maximum heat removal capability by gap cooling can be applied in quantitatively assessing the severe accident management measures.

  • PDF