• Title/Summary/Keyword: Search Key

Search Result 892, Processing Time 0.032 seconds

IP Prefix Update of Routing Protocol in the Multi-way Search Tree (멀티웨이 트리에서의 IP Prefix 업데이트 방안)

  • 이상연;이강복;이형섭
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.269-272
    • /
    • 2001
  • Since Multi-way Search Tree reduces the number of the memory access by increasing the branch factor, it is considered a method to archive the high-speed IP address lookup. Using the combination of initial 16 bit may and Multi-way Search Tree, it also reduces the search time of If address lookup. Multi-way Search Tree consists of K keys and K+1 key pointers. This paper shows how the E update of Multi-way Search Tree which consists of the one pointer within a node can be performed. Using the one pointer within a node, it increases the number of keys within a node and reduces the search time of IP lookup. We also describes IP updating methods such as modification, Insertion and Deletion of address entries. Our update scheme performs better than the method which rebuilds the entire IP routing table when IP update processes.

  • PDF

Sturdy on the Optimal Search Algorithm for the Automatic Alignment of Fiber Optic Components (광부품 정렬 자동화를 위한 최적 탐색 알고리즘 연구)

  • 지상우;임경화;강희석;조영준
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.451-454
    • /
    • 2002
  • The fiber optic communication technology is considered as a key solution for the future communication. However the assembly of the fiber optic components highly depends on manual or semi-automated alignment process. And the light search algorithm is recognized an important factor to reduce the manufacturing process time. Therefore this paper investigates optimal search algorithm for the automatic alignment of fiber optic components. The experiments show the effectiveness of Hill Climbing Search, Adaptive Hill Climbing Search and Steepest Search algorithms, in a view of process time.

  • PDF

Study on the improvement of Search Engine Optimization

  • Sunhee Yoon
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.2
    • /
    • pp.358-365
    • /
    • 2023
  • As the Internet is used as a major channel for marketing and sales, the top ranking of search engine results is becoming a key competitor among websites. Various methods exist to maintain the top ranking of websites in search engines, typically investing heavily in organic coding or search engine optimization. The purpose of this paper, we present the ranking by recognizing factors that should be removed as negative factors when designing a web page in consideration of website visibility (SEO) because if website visibility is not met, the ranking may fall behind or be completely removed from the search engine index. The experiments that recognized and ranked the negative factors of website visibility proposed in this paper were provided through theory and experiments based on the existing website visibility analysis model. The models analyzed in this paper, we expressed or quantified as scores based on the methodology of each model, and 10 items were selected as negative factors through experiments and ranked as high scores. Therefore, when designing a website, it should be considered that the website is not removed from the search engine index as it is designed by excluding high-ranking items, which are negative factors.

Active Distribution System Planning for Low-carbon Objective using Cuckoo Search Algorithm

  • Zeng, Bo;Zhang, Jianhua;Zhang, Yuying;Yang, Xu;Dong, Jun;Liu, Wenxia
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.433-440
    • /
    • 2014
  • In this study, a method for the low-carbon active distribution system (ADS) planning is proposed. It takes into account the impacts of both network capacity and demand correlation to the renewable energy accommodation, and incorporates demand response (DR) as an available resource in the ADS planning. The problem is formulated as a mixed integer nonlinear programming model, whereby the optimal allocation of renewable energy sources and the design of DR contract (i.e. payment incentives and default penalties) are determined simultaneously, in order to achieve the minimization of total cost and $CO_2$ emissions subjected to the system constraints. The uncertainties that involved are also considered by using the scenario synthesis method with the improved Taguchi's orthogonal array testing for reducing information redundancy. A novel cuckoo search (CS) is applied for the planning optimization. The case study results confirm the effectiveness and superiority of the proposed method.

온라인 목록 검색 행태에 관한 연구-LINNET 시스템의 Transaction log 분석을 중심으로-

  • 윤구호;심병규
    • Journal of Korean Library and Information Science Society
    • /
    • v.21
    • /
    • pp.253-289
    • /
    • 1994
  • The purpose of this study is about the search pattern of LINNET (Library Information Network System) OPAC users by transaction log, maintained by POSTECH(Pohang University of Science and Technology) Central Library, to provide feedback information of OPAC system design. The results of this study are as follows. First, for the period of this analysis, there were totally 11, 218 log-ins, 40, 627 transaction logs and 3.62 retrievals per a log-in. Title keyword was the most frequently used, but accession number, bibliographic control number or call number was very infrequently used. Second, 47.02% of OPAC, searches resulted in zero retrievals. Bibliographic control number was the least successful search. User displayed 2.01% full information and 64.27% local information per full information. Third, special or advanced retrieval features are very infrequently used. Only 22.67% of the searches used right truncation and 0.71% used the qualifier. Only 1 boolean operator was used in every 22 retrievals. The most frequently used operator is 'and (&)' with title keywords. But 'bibliographical control number (N) and accessionnumber (R) are not used at all with any operators. The causes of search failure are as follows. 1. The item was not used in the database. (15, 764 times : 79.42%). 2. The wrong search key was used. (3, 761 times : 18.95%) 3. The senseless string (garbage) was entered. (324 times : 1.63%) On the basis of these results, some recommendations are suggested to improve the search success rate as follows. First, a n.0, ppropriate user education and online help function let users retrieve LINNET OPAC more efficiently. Second, several corrections of retrieval software will decrease the search failure rate. Third, system offers right truncation by default to every search term. This methods will increase success rate but should considered carefully. By a n.0, pplying this method, the number of hit can be overnumbered, and system overhead can be occurred. Fourth, system offers special boolean operator by default to every keyword retrieval when user enters more than two words at a time. Fifth, system assists searchers to overcome the wrong typing of selecting key by automatic korean/english mode change.

  • PDF

Correlation Analysis between Key Word Search Frequencies Related to Food Safety Issue and Foodborne Illness Outbreaks (식중독 사고 발생과 식품 안전 관련 검색어 빈도와의 상관성 분석 연구)

  • Lee, Heeyoung;Jo, Heekoung;Kim, Kyungmi;Youn, Hyewon;Yoon, Yohan
    • Journal of Food Hygiene and Safety
    • /
    • v.32 no.2
    • /
    • pp.96-100
    • /
    • 2017
  • Through the increasing use of internet and smart device, consumers can search the information what they want to find. The information has been accumulated and become into a big data. Analyzing the big data regarding key words associated with foods and foodborne pathogens could be a method for predicting foodborne illness outbreaks, especially in school food services. Therefore, the objective of this study was to elucidate the correlations between key words associated with foods and food safety issues. Frequencies of the key words for foodborne pathogens and food safety issues were searched using an internet portal site from January 1, 2012 to December 31, 2014. In addition, foodborne outbreak data were collected from Ministry of Food and Drug Safety for the same period of time. There was correlation between the time having maximum key word frequencies of foods and foodborne pathogens, and the time for foodborne illness outbreak occurred. In addition, the search frequencies for foods and foodborne pathogens were generally increased right after foodborne outbreaks occurred. However, in some cases foodborne outbreaks occurred after the search frequencies for certain seasonal foods increased These results could be useful in food safety management for reducing foodborne illness and in food safety communication.

A Secure and Efficient E-Medical Record System via Searchable Encryption in Public Platform

  • Xu, Lei;Xu, Chungen;Zhang, Xing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4624-4640
    • /
    • 2017
  • This paper mainly presents a secure and efficient e-Medical Record System via searchable encryption scheme from asymmetric pairings, which could provide privacy data search and encrypt function for patients and doctors in public platform. The core technique of this system is an extension public key encryption system with keyword search, which the server could test whether or not the files stored in platform contain the keyword without leaking the information about the encrypted file. Compared with former e-medical record systems, the system proposed here has several superior features: (1)Users could search the data stored in cloud server contains some keywords without leaking anything about the origin data. (2) We apply asymmetric pairings to achieve shorter key size scheme in the standard model, and adopt the dual system encryption technique to reduce the scheme's secure problem to the hard Symmetric External Diffie-Hellman assumption, which could against the variety of attacks in the future complex network environment. (3) In the last of paper, we analyze the scheme's efficiency and point out that our scheme is more efficient and secure than some other classical searchable encryption models.

Design of an Efficient Keyword-based Retrieval System Using Concept lattice (개념 망을 이용한 키워드 기반의 효율적인 정보 검색 시스템 설계)

  • Ma, Jin;Jeon, In ho;Choi, Young keun
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.43-57
    • /
    • 2015
  • In this thesis was conducted to propose a method for efficient information retrieval using concept lattices. Since this thesis designed a new system based on ordinary concept lattices, it has the same approach method as ontology, but this thesis proposes new concept lattices to be used by establishing collaborative relations between objects and concepts that users are likely to search information more efficiently. The system suggested by this thesis can be summarized as below. Firstly, this system leads to a collaborative search by using Three kinds of concepts, such as keyword concept lattices, which focus on input key words, expert concept lattices recommended by experts and theme concept lattices, and based on these 3 concept lattices, it will help users search information they want more efficiently. Besides, as the expert concept and the keyword concept become combined, further providing users with the frequency of keyword and the frequency of category, this system can function to recommend key words related to search words entered by users. Another function of this system is to inform users of key words and categories used in users' interested themes by using the theme concept lattices. Secondly, when there is not keyword entered by a user, it is possible for users to achieve the goal of search through the secondary search when this system provides them with key words related to the input keyword. Thirdly, since most of the information is managed while being dispersed, such dispersed and managed information not only has different expression methods but changes as time goes. Accordingly, By using XMDR for efficient data access and integration of distributed information, this thesis proposes a new technique and retrieval system to integrate dispersed data.

Privacy Preserving Keyword Search with Access Control based on DTLS (프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법)

  • Noh, Geon-Tae;Chun, Ji-Young;Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.35-44
    • /
    • 2009
  • To protect sensitive personal information, data will be stored in encrypted form. However in order to retrieve these encrypted data without decryption, there need efficient search methods to enable the retrieval of the encrypted data. Until now, a number of searchable encryption schemes have been proposed but these schemes are not suitable when dynamic users who have the permission to access the data share the encrypted data. Since, in previous searchable encryption schemes, only specific user who is the data owner in symmetric key settings or has the secret key corresponding to the public key for the encrypted data in asymmetric key settings can access to the encrypted data. To solve this problem, Stephen S. Yau et al. firstly proposed the controlled privacy preserving keyword search scheme which can control the search capabilities of users according to access policies of the data provider. However, this scheme has the problem that the privacy of the data retrievers can be breached. In this paper, we firstly analyze the weakness of Stephen S. Yau et al.'s scheme and propose privacy preserving keyword search with access control. Our proposed scheme preserves the privacy of data retrievers.

The Job Seekers Model: Comparison of the General Search Model and the Unified Approach Model

  • LEE, Dong-Hae;LEE, Sang-Ki
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.1
    • /
    • pp.7-13
    • /
    • 2021
  • Purpose: Unemployment in its general form is a result stemming from the decisions of workers to search for a new and better paying job. In this study, the view that unemployed workers were not simply desiring any job, but one that would maximize their expected future outcome, was examined. Research design, data, and methodology: In order for collection of data and analysis, the panel dates of individual applications for job openings on job search websites were utilized to examine search effort and period for individuals. Results: It was found that the number of applications sent by a job seeker declined over their period of job searching, and that job seekers over a long duration of time tend to send relatively more applications per week throughout their entire search period. The latter finding contradicts the implications of the standard labor search effort models. Conclusions: It can be observed that these job search models fail to capture several key elements in search efforts, and that the search time for an offer is not entirely predetermined by the labor market conditions and socio-economic (individual) characteristics of the searcher. It can be shortened as he or she intensifies their job search efforts.