• Title/Summary/Keyword: Real-world Examples

Search Result 126, Processing Time 0.029 seconds

Mobile Communications Data traffic using Self-Similarity Characteristic (Self-Similar 특성을 이용한 이동전화 데이터 트래픽 특성)

  • 이동철;양성현;김기문
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.915-920
    • /
    • 2002
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish yon that it makes out about the characteristics of actual data traffic more easily.

  • PDF

Self-Similarity Characteristic in Data traffic (Self-Similar특성을 이용한 데이터 트래픽 특성에 관한 연구)

  • 이동철;김기문;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.173-178
    • /
    • 2001
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish you that it makes out about the characteristics of actual data traffic more easily.

  • PDF

A Study on The Step-by-step Security Measures of Project through Cases (사례를 통한 프로젝트 단계별 보안 방안에 대한 연구)

  • Shin, Seong-Yoon;Jang, Dai-Hyun;Kim, Hyung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.44-46
    • /
    • 2012
  • Leading companies has led to the victimization being leaked to accept personal information by the cyber attack. Also planned hacking cases on purpose such as acquiring monetary gain or social distracting is constantly increasing. In this paper, we identify examples of the project step-by-step leading IT services companies to perform security activities. Real-world projects step-by-step through security measures that can be applied are presented.

  • PDF

Goal Setting in Multiple Criteria Decision Making

  • Lee, Jae-Kyu
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.11 no.2
    • /
    • pp.51-68
    • /
    • 1986
  • The effects of goal setting in the context of Multiple Criteria Making (MCDM) are classified into two types : internal and external. In the internal models, the impact of the changed goal is limited only to the other goals in MCDM model. By contrast, in the external models, the impact is limited to the factors not included in the MCDM model. In fact, most real world examples of goal setting have the nature of mixed models. To assist in the goal setting process, the framework named Goal Setting Support (GSS) is developed. The GSS helps decision-makers for mixed models to 1) make internal trade-offs in a way that guarantees non-dominancy after the trade-ofs, and 2) evaluate achieved goals systematically. The GSS can be used in creating Decision Support Systems that will allow interactive goal setting.

  • PDF

Sustainable Buildings - or Sustainable Cities?

  • Schwettmann, Mark
    • International Journal of High-Rise Buildings
    • /
    • v.4 no.2
    • /
    • pp.103-107
    • /
    • 2015
  • China's rapidly growing cities offer a unique opportunity to create highly sustainable communities. Architects and their clients, typically real estate developers, are highly focused on strategies that are effective at reducing energy and water usage at the scale of the individual building or within a master plan of multiple related buildings. However, a closer look at energy consumption reveals that transportation uses more energy worldwide than residential and commercial buildings combined. In light of this, it is appropriate that China is making massive investments in transportation infrastructure like heavy rail rapid transit and grade separated expressways, but the end result of these investments to date has been to enable people to live further from where they work and shop rather than closer - while simultaneously not creating walkable communities. Using positive and negative examples from Asia and the rest of the world, this article will investigate the specific urban design policies such as height limits, setbacks, land use restrictions, parking ratios, and parcel size which might change to enable the creation of truly sustainable communities for China's 21st century.

A Quantity Flexibility Contract Model for Optimal Purchase Decision (최적 구매량 결정을 위한 QF 계약 모형)

  • Kim Jong-Soo;Kim Tai-Young;Kang Woo-Seok
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.31 no.2
    • /
    • pp.129-140
    • /
    • 2006
  • Quantity Flexibility contract coordinates individually motivated supplier and buyer to the systemwide optimal outcome by effectively allocating the costs of market demand uncertainty. The main feature of the contract is to couple the buyer's commitment to purchase no less than a certain percentage below the forecast with the supplier's guarantee to deliver up to a certain percentage above. In this paper we refine the previous models by adding some realistic features including the upper and lower limits of the purchase. We also incorporate purchase and canceling costs in a cost function to reflect the real world contracting process more accurately. To obtain the solution of the model, we derive a condition for extreme points using the Leibniz's rule and construct an algorithm for finding the optimal solution of the model. Several examples illustrating the algorithm show that the approach is valid and efficient.

Self-Similarity Characteristic in Data traffic (Self-Similar특성을 이용한 데이터 트래픽 특성에 관한 연구)

  • 이동철;김기문;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.454-459
    • /
    • 2001
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish you that it makes out about the characteristics of actual data traffic more easily.

  • PDF

Self-Similarity Characteristic in Mobile Communications Data traffic (이동전화 데이터 트래픽에서의 Self-Similar 특성)

  • 이동철;정인명;김기문;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.468-471
    • /
    • 2001
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish you that it makes out about the characteristics of actual data traffic more easily.

  • PDF

Knowledge Acquisition on Scheduling Heuristics Selection Using Dempster-Shafer Theory(DST) (Dempster-Shafer Theory를 이용한 스케듈링 휴리스틱선정 지식습득)

  • Han, Jae-Min;Hwang, In-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.1 no.2
    • /
    • pp.123-137
    • /
    • 1995
  • Most of solution methods in scheduling attempt to generate good solutions by either developing algorithms or heuristic rules. However, scheduling problems in the real world require considering more factors such as multiple objectives, different combinations of heuristic rules due to problem characteristics. In this respect, the traditional mathematical a, pp.oach showed limited performance so that new a, pp.oaches need to be developed. Expert system is one of them. When an expert system is developed for scheduling one of the most difficult processes faced could be knowledge acquisition on scheduling heuristics. In this paper we propose a method for the acquisition of knowledge on the selection of scheduling heuristics using Dempster-Shafer Theory(DST). We also show the examples in the multi-objectives environment.

  • PDF

Data Mining using ID3 (ID3를 활용한 데이터 마이닝)

  • 석현태
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.38-41
    • /
    • 2003
  • There are many kinds of algorithms used for the purpose of data mining. But without the understanding the underlying principles in the algorithm, the result of the data mining cannot be interpreted correctly. In this paper, the principle of ID3 algorithm is explained for that purpose. In addition, the way how to generate good training examples from the relational database is treated, as well as how to convert continuous values into discrete values is considered to use the algorithm for the data mining of real world database.

  • PDF