• 제목/요약/키워드: Common Information

검색결과 6,141건 처리시간 0.033초

DTMNs를 위한 방향성 정보와 최대 공동 이웃 노드에 기반한 효율적인 라우팅 프로토콜 (An Efficient Routing Algorithm Based on the Largest Common Neighbor and Direction Information for DTMNs)

  • 서두옥;이동호
    • 디지털산업정보학회논문지
    • /
    • 제6권1호
    • /
    • pp.83-90
    • /
    • 2010
  • DTNs (Delay Tolerant Networks) refer to the networks that can support data transmission in the extreme networking situations such as continuous delay and no connectivity between ends. DTMNs (Delay Tolerant Networks) are a specific range of DTNs, and its chief considerations in the process of message delivery in the routing protocol are the transmission delay, improvement of reliability, and reduction of network loading. This article proposes a new LCN (Largest Common Neighbor) routing algorism to improve Spray and Wait routing protocol that prevents the generation of unnecessary packets in a network by letting mobile nodes limit the number of copies of their messages to all nodes to L. Since higher L is distributed to nodes with directivity to the destination node and the maximum number of common neighbor nodes among the mobile nodes based on the directivity information of each node and the maximum number of common neighbor nodes, more efficient node transmission can be realized. In order to verify this proposed algorism, DTN simulator was designed by using ONE simulator. According to the result of this simulation, the suggested algorism can reduce average delay and unnecessary message generation.

Protein Ontology: Semantic Data Integration in Proteomics

  • Sidhu, Amandeep S.;Dillon, Tharam S.;Chang, Elizabeth;Sidhu, Baldev S.
    • 한국생물정보학회:학술대회논문집
    • /
    • 한국생물정보시스템생물학회 2005년도 BIOINFO 2005
    • /
    • pp.388-391
    • /
    • 2005
  • The Protein Structural and Functional Conservation need a common language for data definition. With the help of common language provided by Protein Ontology the high level of sequence and functional conservation can be extended to all organisms with the likelihood that proteins that carry out core biological processes will again be probable orthologues. The structural and functional conservation in these proteins presents both opportunities and challenges. The main opportunity lies in the possibility of automated transfer of protein data annotations from experimentally traceable model organisms to a less traceable organism based on protein sequence similarity. Such information can be used to improve human health or agriculture. The challenge lies in using a common language to transfer protein data annotations among different species of organisms. First step in achieving this huge challenge is producing a structured, precisely defined common vocabulary using Protein Ontology. The Protein Ontology described in this paper covers the sequence, structure and biological roles of Protein Complexes in any organism.

  • PDF

Common sub-expression sharing을 이용한 고속/저전력 DCT 구조 (Low-power/high-speed DCT structure using common sub-expression sharing)

  • 장영범;양세정
    • 한국통신학회논문지
    • /
    • 제29권1C호
    • /
    • pp.119-128
    • /
    • 2004
  • 이 논문에서는 곱셈기를 사용하지 않고 덧셈기 만을 사용하여 DCT를 효과적으로 수행하는 저전력 구조를 제안하였다. 고속처리가 가능하면서도 구현 하드웨어의 크기를 최소화하기 위하여 8-point DCT를 4 cycle에 수행하는 구조를 사용하였다. 즉, 첫 번째 cycle에서 사용한 계수용 하드웨어를 두 번째부터 네 번째까지의 계산에서도 공통으로 사용할 수 있는 구조를 채택하였다. 덧셈기 만을 사용하는 기존의 구조들은 CSD(Canonic signed digit)형의 계수를 사용하여 덧셈의 수를 줄이고 있다. 본 논문에서는 Common subexpression sharing 방식을 채용함으로서 하드웨어를 더욱 감소시킬 수 있는 구조를 제안하였다. 그 결과 8-point DCT의 경우에 CSD 만을 사용한 구조와 비교하여 19.5%의 덧셈 수 감소 효과를 달성하였다.

WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구 (A Study on the Security System of the Web Based Defense Information Service Network)

  • 신유찬;남길현
    • 한국국방경영분석학회지
    • /
    • 제28권1호
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

메타데이터 연계성을 위한 RDF 응용스키마설계에 관한 연구 (A Study on Designing Schemata with RDF for Interoperability of Metadata Formats)

  • 김이겸;김태수
    • 정보관리학회지
    • /
    • 제17권1호
    • /
    • pp.21-47
    • /
    • 2000
  • 상이한 메타데이터형식 상호간 어의적인 연계성을 확보하는 일은 메타데이터의 재사용성을 가능하게 할 뿐 아니라 메타데이타 처리에 일관성을 제공할 수 있다는 점에서 대단히 중요한 요인이라 할 수 있다. 이를 위해 RDF에 대한 제반 특성을 검토하고, 어의적 연계성을 위한 공통요소를 추출하였다. 이들 공통요소를 RDF스키마명세와 구문명세에 기반하여 공통스키마로 설계함으로써 어의적 연계성을 확보한 메타데이터스키마 설계에 기반으로 삼았으며, 공통스키마의 활용을 제시하기 위해 KORMARC를 표본으로 스키마를 설계하였다.

  • PDF

다출력 회로 구현에 관한 연구 (A Study on the Multiple Output Circuit Implementation)

  • 박춘명
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.675-676
    • /
    • 2013
  • 본 논문에서는 TDBM과 CMTEDD를 사용하여 다중출력조합디지털논리시스템 설계방법의 한가지를 제안하였다. 또한, CBDD와 CMTEDD를 기반으로 최종 조합디지털논리시스템 구성을 멀티플렉서를 사용하여 구현하였다. 제안한 방법은 기존의 방법에 비해 모듈사이의 내부결선을 효과적으로 줄일 수 있으며 입력변수의 쌍과 출력함수의 쌍에 의해 게이트 수를 줄일 수 있는 장점이 있다.

  • PDF

최장 공통 부분 서열과 극대 공통 부분 서열의 길이 비교 및 분석 (Comparison and Analysis of Lengths of Longest Common Subsequence and Maximal Common Subsequence)

  • 이동엽;나중채
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2021년도 추계학술발표대회
    • /
    • pp.15-18
    • /
    • 2021
  • 최장 공통 부분 서열(Longest Common Subsequence, LCS)은 서열 유사도(Similarity)를 측정하기 위한 주요 지표 중 하나로 특별한 가정이 없는 한 두 문자열의 LCS 를 계산하기 위해서는 두 문자열의 길이의 곱에 비례하는 시간이 필요하다. 최근 최장(longest)이라는 조건을 극대(maximal)로 완화한 극대 공통 부분 서열(Maximal Common Subsequence, MCS)이 제시되었고, 두 문자열의 MCS 를 선형에 가까운 시간에 찾는 알고리즘이 개발되었다. 극대는 최장을 보장하지 않기 때문에 두 문자열의 MCS 길이는 LCS 길이와 달리 유일하지 않을 수 있고, LCS 길이가 매우 길어도 길이가 1인 MCS가 존재할 수도 있다. 본 논문에서는 기존 알고리즘에 의해 계산되는 MCS 의 효용성을 알아보기 위해, DNA 등 여러 종류의 실제 데이터와 랜덤 생성된 데이터에 대해 LCS 와 MCS 의 길이를 비교했다. MCS 길이는 LCS 길이 대비 실제 데이터에서 32.1 ~ 60.2%, 랜덤 데이터에서는 27.5 ~ 62.9%로 나타났다. 이 비율은 문자열을 이루고 있는 알파벳 수가 많을수록, 문자열의 길이가 길어질수록 감소했다.

보안 USB 플래시 드라이브의 취약점 분석과 CC v3.1 기반의 보호프로파일 개발 (Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1)

  • 정한재;최윤성;전웅렬;양비;원동호;김승주
    • 정보보호학회논문지
    • /
    • 제17권6호
    • /
    • pp.99-119
    • /
    • 2007
  • USB 플래시 드라이브는 대용량의 데이터 저장이 가능하고 데이터의 전송속도도 빠르며. 또한 휴대가 간편하여 휴대용 저장장치로서 널리 이용되고 있다. 그러나 보안 기능이 없는 USB 플래시 드라이브는 사용 중에 분실하면 저장되어 있는 모든 정보가 노출될 수 있는 문제점이 있다. 이를 보완하고자 접근제어 기능이 있는 USB 플래시 드라이브가 개발되었다. 본 논문에서는 6가지의 보안 USB 플래시 드라이브의 접근제어 프로그램을 분석하며, 접근제어용 비밀번호가 USB 통신 과정에서 노출되는 취약점과 초기화 기능의 악용에 관한 취약점을 보인다. 이를 바탕으로 공통평가기준 3.1기반의 보안 USB 플래시 드라이브 보호프로파일을 개발하고, 6 가지 보안 USB 플래시 메모리 제품에서 발생 가능한 위협과 보호프로 파일에서 도출한 보안목적의 제공 여부를 살펴본다.

Breast Cancer Prevention Information Seeking Behavior and Interest on Cell Phone and Text Use: a Cross-sectional Study in Malaysia

  • Akhtari-Zavare, Mehrnoosh;Ghanbari-Baghestan, Abbas;Latiff, Latiffah A.;Khaniki, Hadi
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제16권4호
    • /
    • pp.1337-1341
    • /
    • 2015
  • Background: Breast cancer is the most common cancer and the second principal cause of cancer deaths among women worldwide, including Malaysia. This study focused on media choice and attempted to determine the communication channels mostly used and preferred by women in seeking information and knowledge about breast cancer. Materials and Methods: A cross sectional study was carried out to examine the breast cancer prevention information seeking behavior among 450 students at one private university in Malaysia. Results: The mean age of respondents was $25{\pm}4.3years$. Common interpersonal information sources were doctors, friends, and nurses and common channel information sources were television, brochure, and internet. Overall, 89.9% used cell phones, 46.1% had an interest in receiving cell phone breast cancer prevention messages, 73.9% used text messaging, and 36.7% had an interest in receiving text breast cancer prevention messages. Bivariate analysis revealed significant differences among age, eduation, nationality and use of cell phones. Conclusions: Assessment of health information seeking behavior is important for community health educators to target populations for program development.

소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점 (Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective)

  • 정남호;한희정;구철모
    • Asia pacific journal of information systems
    • /
    • 제22권4호
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF