• Title/Summary/Keyword: New Address Information

Search Result 690, Processing Time 0.029 seconds

A Study to Propose Closed-form Approximations of Seismic Hazard (지진 재해도의 닫힌 근사식 제안에 관한 연구)

  • Kwag, Shinyoung;Hahm, Daegi
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.22 no.4
    • /
    • pp.245-251
    • /
    • 2018
  • In this paper, we address some issues in existing seismic hazard closed-form equations and present a novel seismic hazard equation form to overcome these issues. The presented equation form is based on higher-order polynomials, which can well describe the seismic hazard information with relatively high non-linearity. The accuracy of the proposed form is illustrated not only in the seismic hazard data itself but also in estimating the annual probability of failure (APF) of the structural systems. For this purpose, the information on seismic hazard is used in representative areas of the United States (West : Los Angeles, Central : Memphis and Kansas, East : Charleston). Examples regarding the APF estimation are the analyses of existing platform structure and nuclear power plant problems. As a result of the numerical example analyses, it is confirmed that the higher-order-polynomial-based hazard form presented in this paper could predict the APF values of the two example structure systems as well as the given seismic hazard data relatively accurately compared with the existing closed-form hazard equations. Therefore, in the future, it is expected that we can derive a new improved APF function by combining the proposed hazard formula with the existing fragility equation.

Performance of Transaction Processing Schemes in Mobile Database Systems (이동 데이터베이스체계에서 거래처리 기법의 성능)

  • 최용구
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.2
    • /
    • pp.70-79
    • /
    • 1999
  • In mobile database system, transactions processing schemes address in ones using a static coordinator and coordinator migration. This apply coordinator migration mechanism which perform the transaction in new database server when posed to be the transaction service handoff. That apply static coordinator mechanism which perform the transaction in database server to begin the transaction when posed to be the transaction service handoff. In this paper, a scheme-independent simulation model has been developed in order to support comparative performance studies of mobile transaction processing schemes. And this paper describes the model in detail and presents simulation results which were obtained for what it believe to be the performance evaluation of the mobile transaction processing schemes. Finally, the mobile transaction processing schemes will improve system performance by minimizing the transmission of message for processing the transactions in mobile database system.

  • PDF

Suboptimal Adaptive Handover Method Considering Uplink and Downlink Signals (상.하향 링크 신호를 고려한 준 최적의 적응적 하드 핸드오버 기법)

  • Cho, Young-Bo;Han, Seung-Youp;Bang, Keuk-Joon;Hong, Dae-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1273-1279
    • /
    • 2006
  • In this paper, we address the design of adaptive handover schemes based on the signal strength measurement for cellular communications systems. Conventional handover algorithms, which are based only on the downlink measurement, cannot guarantee the required uplink quality because uplink channel can differ greatly from downlink channel quality. Therefore, we proposes a new suboptimal adaptive handover algorithm that considers both the uplink and downlink channel quality in order to achieve the best cell selection gains when there is a wide difference between the uplink and downlink signal quality. Simulation results show that the proposed scheme achieves better performance compared to conventional handover schemes.

Object Contour Tracking Using Optimization of the Number of Snake Points in Stereoscopic Images (스테레오 동영상에서 스네이크 포인트 수의 최적화를 이용한 객체 윤곽 추적 알고리즘)

  • Kim Shin-Hyoung;Jang Jong-Whan
    • The KIPS Transactions:PartB
    • /
    • v.13B no.3 s.106
    • /
    • pp.239-244
    • /
    • 2006
  • In this paper, we present a snake-based scheme for contour tracking of objects in stereo image sequences. We address the problem by managing the insertion of new points and deletion of unnecessary points to better describe and track the object's boundary. In particular, our method uses more points in highly curved parts of the contour, and fewer points in less curved parts. The proposed algorithm can successfully define the contour of the object, and can track the contour in complex images. Furthermore, we tested our algorithm in the presence of partial object occlusion. Performance of the proposed algorithm has been verified by simulation.

Design of Pipeline Bus and the Performance Evaluation in Multiprocessor System (다중프로세서 시스템에서 파이프라인 전송 버스의 설계 및 성능 평가)

  • 윤용호;임인칠
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.2
    • /
    • pp.288-299
    • /
    • 1993
  • This paper proposes the new bus protocol in the tightly coupled multiprocessor system. The bus protocol uses the pipelined data transfer and block transfer scheme to increase the bus bandwidth, The bus also has the independent transfer lines for the address and data respectively, and it can transfer the data up to maximum 264 Mbytes /sec. This paper also models the multiprocessor system where each processor boards have the private cache. Simulation evaluates the bus and system performance according to hit ratio of the reference data in cache memory, In the case of using this bus, the bus is evaluated not to be saturated when up to 10 processor boards are connected to the bus. As for up to 4 memory interleavng, the performance increases linearly.

  • PDF

A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management

  • Sun, Bangyi;Chu, Jianfeng;Hu, Liang;Li, Hongtu;Shi, Guangkun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4609-4623
    • /
    • 2017
  • The commercialization of LTE/SAE technologies has begun a new era in which data can be transmitted at remarkably high rates. The security of the LTE/SAE network, however, remains problematic. The forward security in LTE/SAE X2 handover key management can be threatened by key compromise and de-synchronization attacks as base station in public spaces can be compromised. This study was conducted to address the lack of forward key security in X2 handover key management in scenarios in which an adversary controls a legal base station. We developed the proposed X2 handover key management by changing the parameter in the renewing step and adding a verification step. We compare the security and performance of our proposal with other similar schemes. Our enhancement scheme ensures forward separation security accompanied by favorable signal and computation load performance.

A Content-based TV Program Recommender (TV프로그램을 위한 내용기반 추천 시스템)

  • 유상원;이홍래;이형동;김형주
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.683-692
    • /
    • 2003
  • The rapid increase of the number of channels makes it hard to find wanted programs from TV. In recent years, the number of channels come up to hundreds with the digital TV arrival. So, it will drive us to the new way of watching TV. In this paper, we introduce a recommendation system for TV programs to overcome this difficulty. We model user profiles and design each module of the system, considering TV environment. Our system gathers basic information from people manually and then updates user profiles automatically by tracking viewing and usage history. As a result, our system recommends daily TV programs based on the changing interest of users. In this paper, we address the problems and solutions by describing our system and the experiment.

An amplify-and-forward relaying scheme based on network coding for Deep space communication

  • Guo, Wangmei;Zhang, Junhua;Feng, Guiguo;Zhu, Kaijian;Zhang, Jixiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.670-683
    • /
    • 2016
  • Network coding, as a new technique to improve the throughput, is studied combined with multi-relay model in this paper to address the challenges of long distance and power limit in deep space communication. First, an amplify-and-forward relaying approach based on analog network coding (AFNC) is proposed in multi-relay network to improve the capacity for deep space communication system, where multiple relays are introduced to overcome the long distance link loss. The design of amplification coefficients is mathematically formulated as the optimization problem of maximizing SNR under sum-power constraint over relays. Then for a dual-hop relay network with a single source, the optimal amplification coefficients are derived when the multiple relays introduce non-coherent noise. Through theoretic analysis and simulation, it is shown that our approach can achieve the maximum transmission rate and perform better over single link transmission for deep space communication.

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage

  • Xu, Chunxiang;Zhang, Yuan;Yu, Yong;Zhang, Xiaojun;Wen, Junwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4226-4241
    • /
    • 2014
  • Cloud storage provides an easy, cost-effective and reliable way of data management for users without the burden of local data storage and maintenance. Whereas, this new paradigm poses many challenges on integrity and privacy of users' data, since users losing grip on their data after outsourcing the data to the cloud server. In order to address these problems, recently, Worku et al. have proposed an efficient privacy-preserving public auditing scheme for cloud storage. However, in this paper, we point out the security flaw existing in the scheme. An adversary, who is on-line and active, is capable of modifying the outsourced data arbitrarily and avoiding the detection by exploiting the security flaw. To fix this security flaw, we further propose a secure and efficient privacy-preserving public auditing scheme, which makes up the security flaw of Worku et al.'s scheme while retaining all the features. Finally, we give a formal security proof and the performance analysis, they show the proposed scheme has much more advantages over the Worku et al.'s scheme.

Public Library Multicultural Programs and Improvement Methods Analyzed from Case Studies (공공도서관 다문화프로그램 사례 분석과 개선방안 연구)

  • Ahn, In-Ja;Park, Mi-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.3
    • /
    • pp.279-301
    • /
    • 2011
  • This study analyzed 138 multicultural programs from 40 libraries during the last two years. The study compares multicultural programs running in Korean libraries with those from American and Canadian libraries which have a long history of multicultural societies. The results are listed below. There is a need for long-running multicultural programs that address the needs of its users even from the planning stages. Programs should include out-reach based running methods, daily life based subjects and contents, and differentiated approaches for different levels and ages of users.