• Title/Summary/Keyword: Generic Data Access

Search Result 20, Processing Time 0.025 seconds

A Preliminary Examination on the Multimedia Information Needs and Web Searches of College Students in Korea

  • Chung, Eun-Kyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.95-114
    • /
    • 2010
  • Multimedia searching is an important activity on the Web, especially among the younger generation. The purpose of this study aims to examine college students’ multimedia information needs and searching on the Internet. While there is a clear pattern among students with respect to their multimedia uses, searching sources, relevance criteria and searching barriers, some differences exist especially according to searching of different multimedia types such as image, audio and video. For multimedia uses, information/data-focused uses are frequently found in image and video, while the use of audio is mainly for object-focused searches. As multimedia searching sources, audio and video files present a similar pattern of being high in media specific searching sources and low in generic search engines. Browsing through related blogs and homepages is an important part of searching for media files accounting for approximately 20% of total search for each media. The relevance criteria used by study participants when search for image files was primarily concerned with topicality while the contextual and media quality in the audio and video types are also considered important. Searching barriers for audio and video files are categorized into three broad aspects, including access and search quality, preview limitations and collection limitations, while obstacles for image files searching include access difficulties and low qualities of various collection.

A Logic-compatible Embedded DRAM Utilizing Common-body Toggled Capacitive Cross-talk

  • Cheng, Weijie;Das, Hritom;Chung, Yeonbae
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.6
    • /
    • pp.781-792
    • /
    • 2016
  • This paper presents a new approach to enhance the data retention of logic-compatible embedded DRAMs. The memory bit-cell in this work consists of two logic transistors implemented in generic triple-well CMOS process. The key idea is to use the parasitic junction capacitance built between the common cell-body and the data storage node. For each write access, a voltage transition on the cell-body couples up the data storage levels. This technique enhances the data retention and the read performance without using additional cell devices. The technique also provides much strong immunity from the write disturbance in the nature. Measurement results from a 64-kbit eDRAM test chip implemented in a 130 nm logic CMOS technology demonstrate the effectiveness of the proposed circuit technique. The refresh period for 99.9% bit yield measures $600{\mu}s$ at 1.1 V and $85^{\circ}C$, enhancing by % over the conventional design approach.

Analysis of V2V Broadcast Performance Limit for WAVE Communication Systems Using Two-Ray Path Loss Model

  • Song, Yoo-Seung;Choi, Hyun-Kyun
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.213-221
    • /
    • 2017
  • The advent of wireless access in vehicular environments (WAVE) technology has improved the intelligence of transportation systems and enabled generic traffic problems to be solved automatically. Based on the IEEE 802.11p standard for vehicle-to-anything (V2X) communications, WAVE provides wireless links with latencies less than 100 ms to vehicles operating at speeds up to 200 km/h. To date, most research has been based on field test results. In contrast, this paper presents a numerical analysis of the V2X broadcast throughput limit using a path loss model. First, the maximum throughput and minimum delay limit were obtained from the MAC frame format of IEEE 802.11p. Second, the packet error probability was derived for additive white Gaussian noise and fading channel conditions. Finally, the maximum throughput limit of the system was derived from the packet error rate using a two-ray path loss model for a typical highway topology. The throughput was analyzed for each data rate, which allowed the performance at the different data rates to be compared. The analysis method can be easily applied to different topologies by substituting an appropriate target path loss model.

Design and Prototype Implementation of Museum Asset Management System Using Mobile RFID Devices (모바일 RFID 장치를 이용한 박물관 관리 시스템 설계 및 구현)

  • Kim, Young-Il;Cheong, Tae-Su
    • Proceedings of the CALSEC Conference
    • /
    • 2005.11a
    • /
    • pp.78-84
    • /
    • 2005
  • As the research activities related to 'Ubiquitous Computing' whose concept was introduced by Mark Weiser are growing, RFID(Radio Frequency Identification) technology has recently gained attention as a technology to advance the ubiquitous computing and a lot of related researches are also in progress. Research works done so far are mainly linked to the situation that the research outputs apply to meet the requirements for asset tracking and data sharing with partners over supply chain by using fixed RFID readers. However, it is essential that users have access to real-time information about the tagged objects and services whenever and wherever they want in the era of ubiquitous computing, so mobile devices-including PDA, smart phone, cellular phone, etc - which are equipped with an RFID reader can be regarded as an essential terminal for users living in ubiquitous computing environment. As far as the application with mobile devices are concerned, there are many considerations due to their limited capabilities of data processing, battery consumption and so on. In this paper, we review the generic RFID network model and introduce the revised RFID network model in consideration of incorporation with mobile devices equipped with an RFID reader. Also, we derive the requirements for software embedded within an RFID- enabled mobile terminal and then discuss essential components for implementation. Moreover, we develop the applications for asset management at museum by using mobile RFID network model.

  • PDF

Vertical Handover between LTE and Wireless LAN Systems based on Common Radio Resource Management (CRRM) and Generic Link Layer (GLL) (LTE/WLAN 이종망 환경에서 범용링크계층과 통합무선자 원관리 기법이 적용된 VHO 방안 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Yoon, Suk-Ho;Ryu, Seung-Wan;Cho, Choong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.35-48
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL and CRRM. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate and the system service cost.

A Study About Distribution Automation System Based on CIM (CIM 기반의 Distribution Automation System에 관한 연구)

  • Lee, Hee-Joo;Seo, Jeong-Il;Han, Ju-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.5
    • /
    • pp.913-920
    • /
    • 2011
  • Distribution systems for operating the various systems should be operated organically. Distribution systems for organic operations extend the functionality of the system and system integration for the extension is doing. However, in systems integration for each unique non-standard definition of linkage and exchange systems are used. Non-standard definition of a unique linkage and exchange systems in the maintenance and expansion will result in many negative results. To solve these problems, the system and the exchange of information about the links between systems should define standards. IEC (International Electrotechnical Commission) power to solve these problems in the field of the Common Information Model (Common Information Model, CIM) standard (IEC61970, IEC61968) is defined as the transmission and distribution system integration and standardization for the exchange of information. In this paper, standardized system for building CIM-based distribution automation system should describe the process of building. In addition, the process of establishing a common information model needed (CIM) defined and associated services for a defined set of models is proposed in the standardization process.

A Framework and Patterns for Efficient Service Monitoring (효율적인 서비스 모니터링 프레임워크 및 전송패턴)

  • Lee, Hyun-Min;Cheun, Du-Wan;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.11
    • /
    • pp.812-825
    • /
    • 2010
  • Service-Oriented Computing (SOC) is a reuse paradigm for developing business processes by dynamic service composition. Service consumers subscribe services deployed by service providers only through service interfaces. Therefore, services on server-side are perceived as black box to service consumers. Due to this nature of services, service consumers have limited knowledge on the quality of services. This limits utilizing of services in critical domains hard. Therefore, there is an increasing demand for effective methods for monitoring services. Current monitoring techniques generally depend on specific vendor's middleware without direct access to services due to the technical hardship of monitoring. However, these approaches have limitations including low data comprehensibility and data accuracy. And, this results in a demand for effective service monitoring framework. In this paper, we propose a framework for efficiently monitoring services. We first define requirements for designing monitoring framework. Based on the requirements, we propose architecture for monitoring framework and define generic patterns for efficiently acquiring monitored data from services. We present the detailed design of monitoring framework and its implementation. We finally implement a prototype of the monitor, and present the functionality of the framework as well as the results of experiments to verify efficiency of patterns for transmitting monitoring data.

A study of Vertical Handover between LTE and Wireless LAN Systems using Adaptive Fuzzy Logic Control and Policy based Multiple Criteria Decision Making Method (LTE/WLAN 이종망 환경에서 퍼지제어와 정책적 다기준 의사결정법을 이용한 적응적 VHO 방안 연구)

  • Lee, In-Hwan;Kim, Tae-Sub;Cho, Sung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.271-280
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate, the system service cost and handover attempt number.

Design of Serendipity Service Based on Near Field Communication Technology (NFC 기반 세렌디피티 시스템 설계)

  • Lee, Kyoung-Jun;Hong, Sung-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.293-304
    • /
    • 2011
  • The world of ubiquitous computing is one in which we will be surrounded by an ever-richer set of networked devices and services. Especially, mobile phone now becomes one of the key issues in ubiquitous computing environments. Mobile phones have been infecting our normal lives more thoroughly, and are the fastest technology in human history that has been adapted to people. In Korea, the number of mobile phones registered to the telecom company, is more than the population of the country. Last year, the numbers of mobile phone sold are many times more than the number of personal computer sold. The new advanced technology of mobile phone is now becoming the most concern on every field of technologies. The mix of wireless communication technology (wifi) and mobile phone (smart phone) has made a new world of ubiquitous computing and people can always access to the network anywhere, in high speed, and easily. In such a world, people cannot expect to have available to us specific applications that allow them to accomplish every conceivable combination of information that they might wish. They are willing to have information they want at easy way, and fast way, compared to the world we had before, where we had to have a desktop, cable connection, limited application, and limited speed to achieve what they want. Instead, now people can believe that many of their interactions will be through highly generic tools that allow end-user discovery, configuration, interconnection, and control of the devices around them. Serendipity is an application of the architecture that will help people to solve a concern of achieving their information. The word 'serendipity', introduced to scientific fields in eighteenth century, is the meaning of making new discoveries by accidents and sagacity. By combining to the field of ubiquitous computing and smart phone, it will change the way of achieving the information. Serendipity may enable professional practitioners to function more effectively in the unpredictable, dynamic environment that informs the reality of information seeking. This paper designs the Serendipity Service based on NFC (Near Field Communication) technology. When users of NFC smart phone get information and services by touching the NFC tags, serendipity service will be core services which will give an unexpected but valuable finding. This paper proposes the architecture, scenario and the interface of serendipity service using tag touch data, serendipity cases, serendipity rule base and user profile.

The Multi-door Courthouse: Origin, Extension, and Case Studies (멀티도어코트하우스제도: 기원, 확장과 사례분석)

  • Chung, Yongkyun
    • Journal of Arbitration Studies
    • /
    • v.28 no.2
    • /
    • pp.3-43
    • /
    • 2018
  • The emergence of a multi-door courthouse is related with a couple of reasons as follows: First, a multi-door courthouse was originally initiated by the United States government that increasingly became impatient with the pace and cost of protracted litigation clogging the courts. Second, dockets of courts are overcrowded with legal suits, making it difficult for judges to handle those legal suits in time and causing delays in responding to citizens' complaints. Third, litigation is not suitable for the disputant that has an ongoing relationship with the other party. In this case, even if winning is achieved in the short run, it may not be all that was hoped for in the long run. Fourth, international organizations such as the World Bank, UNDP, and Asia Development Bank urge to provide an increased access to women, residents, and the poor in local communities. The generic model of a multi-door courthouse consists of three stages: The first stage includes a center offering intake services, along with an array of dispute resolution services under one roof. At the second stage, the screening unit at the center would diagnose citizen disputes, then refer the disputants to the appropriate door for handling the case. At the third stage, the multi-door courthouse provides diverse kinds of dispute resolution programs such as mediation, arbitration, mediation-arbitration (med-arb), litigation, and early neutral evaluation. This study suggests the extended model of multi-door courthouse comprised of five layers: intake process, diagnosis and door-selection process, neutral-selection process, implementation process of dispute resolution, and process of training and education. One of the major characteristics of extended multi-door courthouse model is the detailed specification of individual department corresponding to each process within a multi-door courthouse. The intake department takes care of the intake process. The screening department plays the role of screening disputes, diagnosing the nature of disputes, and determining a suitable door to handle disputes. The human resources department manages experts through the construction and management of the data base of mediators, arbitrators, and judges. The administration bureau manages the implementation of each process of dispute resolution. The education and training department builds long-term planning to procure neutrals and experts dealing with various kinds of disputes within a multi-door courthouse. For this purpose, it is necessary to establish networks among courts, law schools, and associations of scholars in order to facilitate the supply of manpower in ADR neutrals, as well as judges in the long run. This study also provides six case studies of multi-door courthouses across continents in order to grasp the worldwide picture and wide spread phenomena of multi-door courthouse. For this purpose, the United States and Latin American countries including Argentina and Brazil, Middle Eastern countries, and Southeast Asian countries (such as Malaysia and Myanmar), Australia, and Nigeria were chosen. It was found that three kinds of patterns are discernible during the evolution of a multi-door courthouse model. First, the federal courts of the United States, land and environment court in Australia, and Lagos multi-door courthouse in Nigeria may maintain the prototype of a multi-door courthouse model. Second, the judicial systems in Latin American countries tend to show heterogenous patterns in terms of the adaptation of a multi-door courthouse model to their own environments. Some court systems of Latin American countries including those of Argentina and Brazil resemble the generic model of a multi-door courthouse, while other countries show their distinctive pattern of judicial system and ADR systems. Third, it was found that legal pluralism is prevalent in Middle Eastern countries and Southeast Asian countries. For example, Middle Eastern countries such as Saudi Arabia have developed various kinds of dispute resolution methods, such as sulh (mediation), tahkim (arbitration), and med-arb for many centuries, since they have been situated at the state of tribe or clan instead of nation. Accordingly, they have no unified code within the territory. In case of Southeast Asian countries such as Myanmar and Malaysia, they have preserved a strong tradition of customary laws such as Dhammthat in Burma, and Shriah and the Islamic law in Malaysia for a long time. On the other hand, they incorporated a common law system into a secular judicial system in Myanmar and Malaysia during the colonial period. Finally, this article proposes a couple of factors to strengthen or weaken a multi-door courthouse model. The first factor to strengthen a multi-door courthouse model is the maintenance of flexibility and core value of alternative dispute resolution. We also find that fund raising is important to build and maintain the multi-door courthouse model, reflecting the fact that there has been a competition surrounding the allocation of funds within the judicial system.