• 제목/요약/키워드: Delete

검색결과 365건 처리시간 0.022초

통신망의 신뢰도 근사해석에 관한 연구 (A Study on the Approximating Reliability Analysis of communication Networks)

  • 유재영;오영환
    • 한국통신학회:학술대회논문집
    • /
    • 한국통신학회 1991년도 추계종합학술발표회논문집
    • /
    • pp.145-149
    • /
    • 1991
  • In this paper, an algorithm is proposed to analyze the approximating reliability of the capacity considered communication networks. In the case ofthe former methods to evaluate the source-to-termianl node reliability, it is very difficult to contract and delete the jointed terms in the simple path group. Therefore, the reliability bounds are used and compared to the exact reliability by TURBO PROLOG, the natural lanquage of artficial intelligence. In the reliability bounds, the upper bound used the valid cutset that isthe group of simple path and the lower bound used the minimal cutset by complement operation and the esact reiability is compared to this reliability bounds.

개선된 SARM을 이용한 객체지향 부품 재사용 시스템 (Object-Oriented Components Reuse System using Enhanced SARM)

  • 한정수;송영재
    • 한국정보처리학회논문지
    • /
    • 제7권4호
    • /
    • pp.1092-1102
    • /
    • 2000
  • In this paper, we made software components reusable through syntax-analysis method, designed a Viewer for understanding component information, and retrieved similar components by using Enhanced SARM. Because SARM requires a lot of computation time, it was enhanced by reducing unnecessary activation value. Also GUI was designed for component-query relationship and Viewer represents hierarchy diagram of a retrieved component. This system supports facilities which can insert and delete components on diagram. For a component modification, this system supports a editor to rebuild class inheritance relationship. In this paper, SCRS (software components reuse system) is consisted of syntax-analysis method, component-query relationship interface, retrieval (Enhanced SARM), diagram viewer, reuse on diagram, and a editor.

  • PDF

Simplified Predicate Locking Scheme for Concurrency Control on R-tree

  • Ying Xia;Rim, Kee-Wook;Lee, Jae-Dong;Bae, Hae-Young
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2001년도 봄 학술발표논문집 Vol.28 No.1 (B)
    • /
    • pp.16-18
    • /
    • 2001
  • Despite extensive research on R-trees, most of the proposed schemes have not been integrated into existing DBMS due to the lack of protocol to provide consistency in concurrent environment. R-link tree is an acceptable data structure to deal with this issue., but still not enough. In this paper, we focus on a simplified predicate locking mechanism based on R-link tree for concurrency control and phantom protection. An in-memory operation control list (OCList) used to suspend some conflicting operations is designed here. The main features of this approach are (1) it can be implemented easily and do not need any extra information. (2) Only-one-lock is held when descending R-tree even when node split happens, while lock-coupling scheme is performed when ascending. No deadlocks are possible. (3) Searches and insertions are not unnecessarily restricted. (4) Insert and Delete phantom in R-link tree are avoid through beforehand predication.

  • PDF

위치 인식 노드 클러스터 기반 무선 센서 네트워크의 결함 허용 기법 (Geography-aware Node Clustering in Wireless Sensor Network with Fault Tolerance Method)

  • 박수용;김성수
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.1725-1728
    • /
    • 2005
  • 무선 센서 네트워크는 컴퓨팅 용량 및 전력 자원이 매우 제약적인 특징을 가지고 있으며, 이로 인하여 동작시 실패하려는 경향(Error-prone)을 지닌다. 이를 해결하기 위하여 센서 네트워크에 적용 가능한 결함 허용 기법이 요구되며, 현재 노드의 참가(Join), 삭제(Delete), 사망(Death) 및 상태 오염(State Corruption)으로 인하여 발생하는 결함을 처리하기 위하여 노드의 물리적 위치를 기반으로 클러스터를 구성한 후 발생 결함을 지역화하여 처리하는 기법이 제안되었다[1]. 본 논문에서는 결함을 처리하기 위한 기존의 위치 인식 노드 클러스터 시스템에서 발생할 수 있는 헤드 노드의 결함을 효율적으로 처리하기 위한 개선된 기법을 제안하여 전체 센서 네트워크 시스템의 실질적인 가용도(Availability)를 높이고자 하며, 이를 위한 간단한 분석을 수행한 후 효용성을 검증한다.

  • PDF

Patterns of consonant deletion in the word-internal onset position: Evidence from spontaneous Seoul Korean speech

  • Kim, Jungsun;Yun, Weonhee;Kang, Ducksoo
    • 말소리와 음성과학
    • /
    • 제8권1호
    • /
    • pp.45-51
    • /
    • 2016
  • This study examined the deletion of onset consonant in the word-internal structure in spontaneous Seoul Korean speech. It used the dataset of speakers in their 20s extracted from the Korean Corpus of Spontaneous Speech (Yun et al., 2015). The proportion of deletion of word-internal onset consonants was analyzed using the linear mixed-effects regression model. The factors that promoted the deletion of onsets were primarily the types of consonants and their phonetic contexts. The results showed that onset deletion was more likely to occur for a lenis velar stop [k] than the other consonants, and in the phonetic contexts, when the preceding vowel was a low central vowel [a]. Moreover, some speakers tended to more frequently delete onset consonants (e.g., [k] and [n]) than other speakers, which reflected individual differences. This study implies that word-internal onsets undergo a process of gradient reduction within individuals' articulatory strategies.

Predictors of Mobile Advertising Avoidance: What Makes People Avoid Mobile Advertising?

  • Um, Nam-Hyun
    • International Journal of Contents
    • /
    • 제15권4호
    • /
    • pp.44-49
    • /
    • 2019
  • This study is designed to examine antecedents and consequences of mobile advertising avoidance. However, to date, research on mobile advertising avoidance has been scarce. Thus, this study makes significant contributions by addressing understudied areas in mobile advertising. Study results show that the perceived mobile advertising risk is positively related to mobile advertising avoidance. This study found that the perceived trust in mobile advertising is negatively linked to mobile advertising avoidance. The study results show that the perceived Internet users' data privacy concerns is positively linked to mobile advertising avoidance. Finally, study results suggest that mobile advertising avoidance is positively linked to intention to delete the ad.

Selection of Canonical Factors in Second Order Response Surface Models

  • Park, Sung H.;Seong K. Han
    • Journal of the Korean Statistical Society
    • /
    • 제30권4호
    • /
    • pp.585-595
    • /
    • 2001
  • A second-order response surface model is often used to approximate the relationship between a response factor and a set of explanatory factors. In this article, we deal with canonical analysis in response surface models. For the interpretation of the geometry of second-order response surface model, standard errors and confidence intervals for the eigenvalues of the second-order coefficient matrix play an important role. If the confidence interval for some eigenvalue includes 0 or the estimate of some eigenvalue is very small (near to 0) with respect to other eigenvalues, then we are able to delete the corresponding canonical factor. We propose a formulation of criterion which can be used to select canonical factors. This criterion is based on the IMSE(=Integrated Mean Squared Error). As a result of this method, we may approximately write the canonical factors as a set of some important explanatory factors.

  • PDF

Multidemia Communications System on the Ingernet

  • Kim, Hyun-Joon;Lee, Huen-Joo
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 1998년도 Proceedings of International Workshop on Advanced Image Technology
    • /
    • pp.85-91
    • /
    • 1998
  • Many of the newest network suers are gaining their fist network experience as users of the Internet. Because of the universal nature of this exciting new experience, millions of new users are driving the demand for increasingly multimedia oriented applications, especially in communication area. Since the communication via the Internet can use various media forms including audio, video and graphics, it can e very efficient communication system on the Internet, which allows Internet users to communicate, collaborate, and associate with others. Webber provides various communication services, like ACS(Audio Conference System), VCS(Video Conference System) and Virtual Space, in an integrated environment. Webber consists of Service-PUBs(Processing Unit Plug-in), which process each service, and Framework, which manages these PUPs. PUP is so highly independent of each other that it's easy to add, maintain, delete services and also optimally configure the system to user's terminal performance or network status.

  • PDF

무선 인터넷 컨텐츠의 재사용을 위한 시스템 연구 (A Study on System for Reusing of Wireless Internet Contents)

  • 김정훈
    • 인터넷정보학회논문지
    • /
    • 제4권1호
    • /
    • pp.1-8
    • /
    • 2003
  • 다양한 형태의 무선 인터넷 컨텐츠가 제작되어 서비스되고 있다. 그러나 무선 인터넷 컨텐츠의 사용 도구로 이용되는 휴대폰의 메모리 한계 때문에 이미 다운로드 받은 무선 인터넷 컨텐츠를 삭제해야 하는 불편이 있다. 또 휴대폰의 교체시에 기존의 데이터들을 새로운 휴대폰으로 이전하기가 상당히 불편하였다. 본 논문에서는 이러한 단점들을 해결하고 무선 컨텐츠의 재사용성을 높이기 위해 모바일폴더라는 무선 인터넷 시스템과 VM 환경에서 동작하는 간단한 클라이언트 애플리케이션을 제안한다.

  • PDF

NUMA 시스템에 최적화된 병렬 해시 테이블 (Concurrent Hash Table Optimized for NUMA System)

  • 최재용;정내훈
    • 한국게임학회 논문지
    • /
    • 제20권5호
    • /
    • pp.89-98
    • /
    • 2020
  • MMO 게임 서버에서는 성능을 높이기 위해 NUMA(Non-Uniform Memory Access) 구조를 사용해 하드웨어를 구성하는 경우가 많다. 또한 내부 자료구조로 삽입, 삭제와 탐색에 소요되는 시간이 짧은 해시 테이블과 같은 자료구조를 많이 사용한다. 본 논문은 NUMA 구조에 최적화된 해시 테이블을 제안하여, NUMA 시스템을 사용하는 게임 서버의 성능을 더 높일 수 있도록 한다. 제안된 해시 테이블을 4 소켓 NUMA 시스템에서 실험한 결과, 기존의 고성능 해시 테이블에 비해 최대 2배의 성능 향상을 확인할 수 있었다.