• Title/Summary/Keyword: Multi-Process Service

Search Result 310, Processing Time 0.037 seconds

The Process of Formation of the Japanese Version Costume - Focused on the Karaginumo Shozoku - (일본풍의 성립 과정 - 당의(唐衣)를 중심으로 -)

  • Masuda, Yoshiko
    • Proceedings of the Korea Society of Costume Conference
    • /
    • 2004.08a
    • /
    • pp.225-235
    • /
    • 2004
  • As a conclusion, it is considered that the 'Karaginumo shozoku' is not such a reformed version of the Chofuku or Jinjyofuku of Nara period as said in the accepted theory, but a further development of the 'Uchiki' worn at home by the aristocrat ladies since the first half of $10^{th}$ century. It is further presumed that the ladies probably did not wear the homewear 'Hitoe no uchiki' together with one Uchiki of wadded clothes as an over coat, but they put on multi layers of 'Uchiki' with no wadded silk cotton from their viewpoint on the beauty of the combination of colors. This could have made their Hakama larger.In the section of Jinjyofuku of the above mentioned 'Seikyuki', Karaginu, Mo and Hire are specified as the essential wears for their daily service. It is consequently said that the aristocratic ladies at home wore only 'Uchiki', while the female service officers put such wears as Uchiki, Karaginu, Mo and Hire when they came to serve the aristocratic ladies at home.

  • PDF

An Analysis of a Multilayered Open Queueing Network with Population Constraint and Constraint and Constant Service Times (사용자수 제한을 갖는 개방형 다중계층구조의 대기행렬 네트워크 분석에 관한 연구)

  • Lee, Yeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.24 no.4
    • /
    • pp.111-122
    • /
    • 1999
  • In this paper, we consider a queueing network model. where the population constraint within each subnetwork is controlled by a semaphore queue. The total number of customers that may be present in the subnetwork can not exceed a given value. Each node has a constant service time and the arrival process to the queueing network is an arbitrary distribution. A major characteristics of this model is that the lower layer flow is halted by the state of higher layer. We present some properties that the inter-change of nodes does not make any difference to customer's waiting time in the queueing network under a certain condition. The queueing network can be transformed into a simplified queueing network. A dramatic simplification of the queueing network is shown. It is interesting to see how the simplification developed for sliding window flow control, can be applied to multi-layered queueing network.

  • PDF

STEREOSCOPIC SERVICE OF MULTIVIEW VIDEO FOR MOBILE ENVIRONMENTS

  • Kwon, Jun-Sup;Kim, Man-Bae;Choi, Chang-Yeol
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.13-16
    • /
    • 2009
  • Multi-view video broadcasting have been conducted with a variety of different system architectures. However, the previous systems have focused on wired broadcasting. On the contrary, our system is designed to be applied to mobile 3DTV broadcasting. We present a service framework adaptable to mobile clients where the load on the client is reduced as much as possible. MPEG-21 multiview DIA description schemes are presented for the efficient adaptation between the serer and client. Furthermore, we examine the feasibility of the proposed framework by analyzing the frame rate that a client device can process.

  • PDF

A Design and Implementation of Fault Tolerance Agent on Distributed Multimedia Environment (분산 멀티미디어 환경에서 결함 허용 에이전트의 설계 및 구현)

  • Go, Eung-Nam;Hwang, Dae-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2618-2629
    • /
    • 1999
  • In this paper, we describe the design and implementation of the FDRA(Fault Detection Recovery based on Agent) running on distributed multimedia environment. DOORAE is a good example for distributed multimedia and multimedia distance education system among students and teachers during lecture. It has primitive service agents. Service functions are implemented with objected oriented concept. FDRA is a multi-agent system. It has been environment, intelligent agents interact with each other, either collaboratively or non-collaboratively, to achieve their goals. The main idea is to detect an error by using polling method. This system detects an error by polling periodically the process with relation to session. And, it is to classify the type of error s automatically by using learning rules. The merit of this system is to use the same method to recovery it as it creates a session. FDRA is a system that is able to detect an error, to classify an error type, and to recover automatically a software error based on distributed multimedia environment.

  • PDF

A study of design the agent system for management and service of S&T information (학술정보 관리 및 유통을 위한 에이전트 시스템 설계에 관한 연구)

  • Lee, Seok-Hyoung;Yoon, Hee-Jun;Yoon, Hwa-Mook
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.503-506
    • /
    • 2006
  • In this paper, we suggest the Agent System for management and service of science and technology information that performs the collection, analyzing, processing and managing the information. Generally, any system can process the collection and service the information as usual method, but that mean can't be clear because of the data process method on different systems of hardware and software. So, it's very important point that the design and development of S&T information flow framework that can accept the various data, and we expect that the agent system adapted in framework guarantee the reduction of man power and process time and the enlarged system. Agent System consists of five multi agents, Resource Format Register Agent, Data Collector Agent, Data Analyzer Agent, Data Processor Agent and MetaDB Creator Agent. We describe the main roles and elements of agent systems.

  • PDF

Examining Success Factors of Online P2P Lending Service Using Kano Model and Fuzzy-AHP (Kano 모형과 Fuzzy-AHP를 이용한 온라인 P2P 금융 서비스 성공요인 도출)

  • An, Kyung Min;Lee, Young-Chan
    • Knowledge Management Research
    • /
    • v.19 no.2
    • /
    • pp.109-132
    • /
    • 2018
  • Recently, new financial services related to FinTech has gained attention more and more. Online P2P financial services transactions such as FinTech require careful examination of the constituents of information systems as an investment is made based on the information presented on the online platform without direct face-to-face contact. The purpose of this study is to find out the success factors of online P2P Lending service among FinTech. To serve the purpose, we build IS (information system) success model, and then use Kano model and fuzzy analytic hierarchy process (Fuzzy-AHP) to find out factors for the success of online P2P Lending service. In particular, this study uses Kano model to classify information system satisfaction factors and to calculate the satisfaction coefficient. The Kano model, however, has a drawback of evaluating single criterion. Therefore, we use multi-criteria decision-making technique such as Fuzzy-AHP to derive the relative importance of the factors. The analysis results show different results depending on the analysis technique. In the Kano model, most of the information system factors are a one-dimensional quality attribute. The satisfaction coefficient is highest for personalized service, followed by the responsiveness of service, ease of using a system, understanding of information, usefulness of information' reliability. The service reliability is the highest in dissatisfaction coefficient, followed by system security, service responsiveness, system stability, and personalized service. The results of the Fuzzy-AHP analysis shows that the usefulness of information quality, the personalization of service quality, and the security of system quality are the significant factors and the stability of system quality was a secondary factor.

The Design and Implementation of a Vehicle Location Tracing System using RM Multi-Session Processing (RM 다중세션 처리를 이용한 차량 추적 시스템의 설계 및 구현)

  • Lee, Yong Kwon;Jang, Chung Ryong;Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.61-73
    • /
    • 2014
  • An automatic vehicle location tracing system is to build GIS server and on transmission for providing service in various ways by collecting a GPS location information from each vehicle. It is to save GPS data from OBU built-in on the vehicle and transmit the GPS data using the RSU on the roadside and WAVE communication technology. The collected data from the RSU is transmitted to the GIS server and stored in DB(database) and based on the GPS data that was collected from the each vehicle the system is to provide user service to suit the applications so it is to provide various services between RSU and OBU. In this paper, by implementing a multi-session process between the RM and the RMA a variety of services between RSU and OBU are provided. In addition, the system is designed and implemented using GPS to provide a variety of services, for the services provided from each RMA by configuring them as an independent session so it enables a variety of services implemented from one of RSU. With the result of the comparative analysis on the multi-session processing and single-session processing it shows that the differenes of them are minor in repect of the data loss rate and the data transfer rate but various services can be provided.

Cell Selection Method using Multi-Criteria Decision Making in Heterogeneous Networks (이종 망에서 퍼지 다기준 의사 결정을 이용한 셀 선정 방법)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • It is essential to maintain constant QoS despite of cell overload or erroneous wireless link during transmission because QoS of a multimedia service may be severely degraded by small delay or packet loss. This paper deals with a cell selection method for supporting the QoS of multimedia services over heterogeneous networks. The proposed scheme is based on Fuzzy Multi-Criteria Decision Making (FMCDM), in which uncertain parameters such as user system preference, the communication cost and cell load, and the transmission delay are used in the decision process using the aggregation function in fuzzy set theory. In this scheme, errors in the evaluation parameters impose milder changes on the total evaluation value than in binary logics. Simulation is focused on the average delay and packet loss rate, and the simulation results show that our proposed method provides mobile terminals the optimal performance.

  • PDF

A Multi-Attribute Intuitionistic Fuzzy Group Decision Method For Network Selection In Heterogeneous Wireless Networks Using TOPSIS

  • Prakash, Sanjeev;Patel, R.B.;Jain, V.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5229-5252
    • /
    • 2016
  • With proliferation of diverse network access technologies, users demands are also increasing and service providers are offering a Quality of Service (QoS) to satisfy their customers. In roaming, a mobile node (MN) traverses number of available networks in the heterogeneous wireless networks environment and a single operator is not capable to fulfill the demands of user. It is crucial task for MN for selecting a best network from the list of networks at any time anywhere. A MN undergoes a network selection situation frequently when it is becoming away from the home network. Multiple Attribute Group Decision (MAGD) method will be one of the best ways for selecting target network in heterogeneous wireless networks (4G). MAGD network selection process is predominantly dependent on two steps, i.e., attribute weight, decision maker's (DM's) weight and aggregation of opinion of DMs. This paper proposes Multi-Attribute Intuitionistic Fuzzy Group Decision Method (MAIFGDM) using TOPSIS for the selection of the suitable candidate network. It is scalable and is able to handle any number of networks with large set of attributes. This is a method of lower complexity and is useful for real time applications. It gives more accurate result because it uses Intuitionistic Fuzzy Sets (IFS) with an additional parameter intuitionistic fuzzy index or hesitant degree. MAIFGDM is simulated in MATLAB for its evaluation. A comparative study of MAIFDGM is also made with TOPSIS and Fuzzy-TOPSIS in respect to decision delay. It is observed that MAIFDGM have low values of decision time in comparison to TOPSIS and Fuzzy-TOPSIS methods.

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.