• 제목/요약/키워드: Classification of Scheme

검색결과 839건 처리시간 0.031초

A Study on Time & Space Division in Literature Classification (문헌분류법의 시.공간 전개체계에 관한 연구)

  • Kim, Ja-Hoo
    • Journal of Korean Library and Information Science Society
    • /
    • 제42권3호
    • /
    • pp.5-24
    • /
    • 2011
  • The purpose of this study aims to provide possible suggestions for the improvement KDC 5th ed. as a system. After analyzing and evaluating time & space devices of KDC 5th ed.(including DDC 22th ed. and NDC 9th ed.). such as main schedules, common auxiliary tables, internal tables and notes, suggestions for the improvement were proposed. If above suggestions are adopted, effective literature classification scheme which is suited to domestic circumstances will be certainly prepared.

CLASSIFICATION OF ASSOCIATION SCHEMES WITH 18 AND 19 VERTICES

  • Hanaki, A.;Miyamoto, I.
    • Journal of applied mathematics & informatics
    • /
    • 제5권3호
    • /
    • pp.633-642
    • /
    • 1998
  • The isomorphism classes of association schemes with 18 and 19 vertices are classified. We obtain 95 isomorphism classes of association schemes with 18 vertices and denote the representatives of the isomorphism classes as subschemes of 7 association schemes. We obtain 7 isomorphism classes of association schemes with 19 vertices and six of them are cyclotomic schemes.

A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

  • Barakat, Tamer Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3231-3249
    • /
    • 2014
  • Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the real message. Sender - side deniable encryption scheme is considered to be one of the classification of deniable encryption technique which defined as resilient against coercing the sender. M. H. Ibrahim presented a sender - side deniable encryption scheme which based on public key and uncertainty of Jacobi Symbol [6]. This scheme has several problems; (1) it can't be able to derive the fake message $M_f$ that belongs to a valid message set, (2) it is not secure against Quadratic Residue Problem (QRP), and (3) the decryption process is very slow because it is based dramatically on square root computation until reach the message as a Quadratic Non Residue (QNR). The first problem is solved by J. Howlader and S. Basu's scheme [7]; they presented a sender side encryption scheme that allows the sender to present a fake message $M_f$ from a valid message set, but it still suffers from the last two mentioned problems. In this paper we present a new sender-side deniable public-key encryption scheme with fast decryption by which the sender is able to lie about the encrypted message to a coercer and hence escape coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which, when verified, gives the same ciphertext as the true message. Compared with both Ibrahim's scheme and J. Howlader and S. Basu's scheme, our scheme enjoys nice two features which solved the mentioned problems: (1) It is semantically secure against Quadratic Residue Problem; (2) It is as fast, in the decryption process, as other schemes. Finally, applying the proposed deniable encryption, we originally give a coercion resistant internet voting model without physical assumptions.

A Study on EC Strategic Classification Scheme (EC 전략유형분류체계에 관한 연구)

  • 조선구;이국철
    • Proceedings of the Korea Database Society Conference
    • /
    • 한국데이타베이스학회 1999년도 국제컨퍼런스 디지털컨텐츠 활용을 통한 지식경영의 확산
    • /
    • pp.69-91
    • /
    • 1999
  • EC의 도입이 국가 및 기업의 국제경쟁력향상을 확보하기 위한 필연적인 해결책이라는 인식하에서, EC의 경쟁력 향상을 위한 유형별 전략모형을 제시함으로서 EC 도입전략의 가이드라인 제공을 목적으로 한다. 구체적으로는 1) Developing strategically classified models and Modeling the structured service of EC to verify the models. (중략)

  • PDF

A comparative study of classification schedules for the international trade (국제통상분야 분류표의 비교 분석)

  • 정연경
    • Journal of the Korean Society for information Management
    • /
    • 제15권1호
    • /
    • pp.83-108
    • /
    • 1998
  • Recently, information on international trade goes on increasing in quantity because of the globalism and many related areas of the field. Most of libraries and informatin centers in Korea are using Dewey Decimal Classification(DDC), Library of congress Classification(LCC), and Korean Decimal Classification(KDC) to classify library materials on the subject. The application of three classification shcemes, DDC, LCC, and KDC were queried to determine the classification of materials on international trade. And analyses of the parts of international trade in three classification shemes were done in order to identify what major changes have made with the development of the field. There was subject scatter in DDC and LCC; there was an overlap among the classes of the three systems; and there was little change between present editions and the previous editions. The revision for international trade field of the KDC, the 4t edtition was suggested to help cover some deficiencies of the classification scheme. Inorder to develop a better KDC, the 5th edition, continuous revisions based upon the opinions of subject specialists and catalogers in the field are highly recommended.

  • PDF

A Study on the Development of Children's Library Classification (어린이도서 분류법의 개발에 관한 연구)

  • Moon, Ji-Hyun;Kim, Jeong-Hyen
    • Journal of Korean Library and Information Science Society
    • /
    • 제40권2호
    • /
    • pp.27-46
    • /
    • 2009
  • Currently, our country doesn't have standard children's library classification whose development reflects characteristics of children's library and children's books, and for this, not only the children's library working staffs but also users have to deal with a lot of discomforts and difficulties. This study was to take into account these facts of reality and attempted to develop Children's Library Classification (CLC) that is widely applicable to children's libraries. For this, the paper examined the category of children's books and analyzed classification conditions of children's library. Based on this examination and analysis, the paper developed CLC. This study finds its meaning in that the CLC developed by this study was based on KDC, was newly reformed for children's library, and was developed by reflecting the characteristics of children's library and children's books as much as possible in the formation of classification category and progression level per subject; the author expects that it could actually be applied to classification of children's books regardless of the size and type of children's libraries.

  • PDF

Efficient Channel Management to Maximize Spectrum Holes in Cognitive Radio Networks (CR 네트워크에서의 유휴자원 증대를 위한 효율적인 채널 관리 방법)

  • Jeong, Pil-Jung;Shin, Yo-An;Lee, Won-Cheol;Yoo, Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제32권10B호
    • /
    • pp.621-629
    • /
    • 2007
  • In cognitive radio (CR) network, the channels are generally classified into either the unavailable channels that are occupied by incumbent users or the available channels that are not occupied. The conventional channel classification scheme may result in poor utilization of spectrum holes since it does not take the spatial relationship between CR node and incumbent users into consideration. In this paper, we propose an efficient channel management scheme for the centralized CR network to maximize the spectrum holes by overcoming the shortcomings of conventional scheme. In addition, we mathematically analyze the effectiveness of proposed scheme. Based on the proposed channel management scheme, we also propose the rendezvous algorithm, which can establish the control channels between base station and CR node under the dynamically changing spectrum environment.

Conceptual Data Modeling on the KRR-1&2 Decommissioning Database

  • Park, Hee-Seoung;Park, Seung-Kook;Lee, Kune-Woo;Park, Jin-Ho
    • Nuclear Engineering and Technology
    • /
    • 제34권6호
    • /
    • pp.610-618
    • /
    • 2002
  • A study of the conceptual data modeling to realize the decommissioning database on the HRR-1&2 was carried out. In this study, the current state of the abroad decommissioning database was investigated to make a reference of the database. A scope of the construction of decommissioning database has been set up based on user requirements. Then, a theory of the database construction was established and a scheme on the decommissioning information was classified . The facility information, work information, radioactive waste information, and radiological information dealing with the decommissioning database were extracted through interviews with an expert group and also decided upon the system configuration of the decommissioning database. A code which is composed of 17 bit was produced considering the construction, scheme and information. The results of the conceptual data modeling and the classification scheme will be used as basic data to create a prototype design of the decommissioning database.

An Efficient Load Balancing Scheme for Gaming Server Using Proximal Policy Optimization Algorithm

  • Kim, Hye-Young
    • Journal of Information Processing Systems
    • /
    • 제17권2호
    • /
    • pp.297-305
    • /
    • 2021
  • Large amount of data is being generated in gaming servers due to the increase in the number of users and the variety of game services being provided. In particular, load balancing schemes for gaming servers are crucial consideration. The existing literature proposes algorithms that distribute loads in servers by mostly concentrating on load balancing and cooperative offloading. However, many proposed schemes impose heavy restrictions and assumptions, and such a limited service classification method is not enough to satisfy the wide range of service requirements. We propose a load balancing agent that combines the dynamic allocation programming method, a type of greedy algorithm, and proximal policy optimization, a reinforcement learning. Also, we compare performances of our proposed scheme and those of a scheme from previous literature, ProGreGA, by running a simulation.

Input AC Voltage Sensorless Control Scheme for a Three-Phase PWM Rectifier in Wind Power Generation System

  • Wu, YanJun
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • 제1권4호
    • /
    • pp.472-476
    • /
    • 2012
  • In this paper, a sensorless control scheme for a three-phase bi-directional voltage-type PWM rectifier in wind power generation system that operates without the input AC voltage sensors (generator side) is described. The basic principles and classification of the PWM rectifier are analyzed, and then the three-phase mathematical model of the input AC voltage sensorless PWM rectifier control system is established. The proposed scheme has been developed in order to lower the cost of the three-phase PWM rectifier but still achieve excellent output voltage regulation, limited current harmonic content, and unity input power factor.