• Title/Summary/Keyword: Service chain

Search Result 914, Processing Time 0.028 seconds

Korean National Income Based on a Chain Index: 1953~2010 (연쇄가중법에 의한 한국의 국민소득: 1953~2010)

  • Park, Chang-gui
    • KDI Journal of Economic Policy
    • /
    • v.34 no.3
    • /
    • pp.187-214
    • /
    • 2012
  • Korea's national income statistics have been compiled by the Bank of Korea since 1953. However, there is a break in the time series. The current time series (1970 onward) is based on the '1993 SNA (System of National Accounts)' suggested by the UN, and the previous time series (1953~1970) was based on the '1953 SNA'. The difference between the previous and current time series is 4.8% in 1970 when the two series overlap. The difference is even greater in terms of comparisons across industries. In addition, it has now become even more difficult to connect the current and the previous time series because, in 2009, the Bank of Korea introduced a chain weighted method for calculating the current time series (1970 onward). Under the chain weighted method, the time series underwent substantial modification; for instance, the economic growth rate during 1970~2005 is 0.9%p higher than the rate under the general method. This paper applies chain weighted values and the '1993 SNA' to the previous time series (1953~1970) by utilizing various national account manuals published by the UN and previous Korean input-output tables in order to calculate a long term time series from 1953 to 2010 based on the same criteria as the current time series (1970 onward). In the revised time series, it appears that 1953 GDP at current basic prices is 3.5% higher and the growth rate for the period of 1953~1970 is 1.5%p higher each year than under the previous time series. Under the revised time series the size of the Korean economy as of 2010 is 50-fold bigger than that of 1953. In terms of industries, manufacturing and SOC show significant expansion whereas the extent of that of the service industry is relatively small.

  • PDF

Generative AI service implementation using LLM application architecture: based on RAG model and LangChain framework (LLM 애플리케이션 아키텍처를 활용한 생성형 AI 서비스 구현: RAG모델과 LangChain 프레임워크 기반)

  • Cheonsu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.129-164
    • /
    • 2023
  • In a situation where the use and introduction of Large Language Models (LLMs) is expanding due to recent developments in generative AI technology, it is difficult to find actual application cases or implementation methods for the use of internal company data in existing studies. Accordingly, this study presents a method of implementing generative AI services using the LLM application architecture using the most widely used LangChain framework. To this end, we reviewed various ways to overcome the problem of lack of information, focusing on the use of LLM, and presented specific solutions. To this end, we analyze methods of fine-tuning or direct use of document information and look in detail at the main steps of information storage and retrieval methods using the retrieval augmented generation (RAG) model to solve these problems. In particular, similar context recommendation and Question-Answering (QA) systems were utilized as a method to store and search information in a vector store using the RAG model. In addition, the specific operation method, major implementation steps and cases, including implementation source and user interface were presented to enhance understanding of generative AI technology. This has meaning and value in enabling LLM to be actively utilized in implementing services within companies.

Analysis of an M/G/1/K Queueing System with Queue-Length Dependent Service and Arrival Rates (시스템 내 고객 수에 따라 서비스율과 도착율을 조절하는 M/G/1/K 대기행렬의 분석)

  • Choi, Doo-Il;Lim, Dae-Eun
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.27-35
    • /
    • 2015
  • We analyze an M/G/1/K queueing system with queue-length dependent service and arrival rates. There are a single server and a buffer with finite capacity K including a customer in service. The customers are served by a first-come-first-service basis. We put two thresholds $L_1$ and $L_2$($${\geq_-}L_1$$ ) on the buffer. If the queue length at the service initiation epoch is less than the threshold $L_1$, the service time of customers follows $S_1$ with a mean of ${\mu}_1$ and the arrival of customers follows a Poisson process with a rate of ${\lambda}_1$. When the queue length at the service initiation epoch is equal to or greater than $L_1$ and less than $L_2$, the service time is changed to $S_2$ with a mean of $${\mu}_2{\geq_-}{\mu}_1$$. The arrival rate is still ${\lambda}_1$. Finally, if the queue length at the service initiation epoch is greater than $L_2$, the arrival rate of customers are also changed to a value of $${\lambda}_2({\leq_-}{\lambda}_1)$$ and the mean of the service times is ${\mu}_2$. By using the embedded Markov chain method, we derive queue length distribution at departure epochs. We also obtain the queue length distribution at an arbitrary time by the supplementary variable method. Finally, performance measures such as loss probability and mean waiting time are presented.

A Tracking Service of Animal Situation using RFID, GPS, and Sensor (RFID, GPS 및 센서를 이용한 동물 상태 추적 서비스)

  • Kim, So-Hyeun;Kim, Do-Hyeun;Park, Hee-Dong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.79-84
    • /
    • 2009
  • Recently, many researches are being carried out on monitoring animal behaviour and interactions with the environment using sensor networks and for tracing animal chain management and identifying animals using RFID techniques. And we are studying about the management and burglarproof of a pet using GPS technique. But there is a lack of study for providing users intelligence services in zoo using GPS, RFID, and sensor networks. Accordingly, in this paper, we propose a intelligence tracking service of animal situation based on GPS, RFID, and sensor in zoo. Firstly, we present a tracking service scenario of animal situation and system configuration according to this scenario. The proposed service provides users realtime animal situation information of animal like the present location, temperature, image, etc. In addition, we can chase the animals to know a location and situation of animal when the animals escapes from their cages. Next, we implement and test prototype operations of animal tracking system based on this scenario to verify the proposed service.

  • PDF

Performance Analysis of Multimedia CDMA Mobile Communication System Considering Diverse Qos Requirements (멀티미디어 CDMA 이동통신 시스템에서의 다양한 QoS 요구조건을 고려한 성능 분석)

  • Kim, Baek-Hyun;Shin, Seung-Hoon;Kwak Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.1-12
    • /
    • 2002
  • In the multimedia CDMA mobile communication service, it is required to support various applications, such as voice, video, file transfer, e-mail, and Internet access, with guaranteed QoS. In the mixed traffic environment ,which consists of voice, stream data, and packet data, we analyze the network where preemptive priority is granted to delay-intolerant voice service and a buffer is offered to delay-tolerant stream data service. And, for best-effort packet data service, the access control by transmission permission probability is applied to obtain prominent throughput. To analyze the multimedia CDMA mobile communication system, we build a 2-dimensional markov chain model about prioritized-voice and stream data services and accomplish numerical analysis in combination with packet data traffic based on residual capacity equation.

Strain differentiation of canine distemper virus by reverse transcriptase polymerase chain reaction and restriction fragment length polymorphism analysis

  • An, Dong-jun;Song, Jae-young;Lee, Joung-bok;Park, Jong-hyeon;Shin, Jin-ho;Kim, Yong-hwan;An, Soo-hwan
    • Korean Journal of Veterinary Research
    • /
    • v.39 no.4
    • /
    • pp.778-785
    • /
    • 1999
  • To detect CDV RNA in clinical samples and differentiate prevailing CDV virulent strains affecting susceptible animals from attenuated vaccine strains, we performed RT-PCR, RFLP, and sequencing. CDV specific primers were generated from the middle part of nucleocapsid gene. The expected size of PCR products, 519 bp, was observed in tissues of Jindo dog, poodle dog, badger, fourteen of nineteen blood samples as well as 5 vaccine strains including domestic and imported products. The PCR products obtained from tissues and PBMCs of infected animals were digested to 317- and 202-bp fragments by Bam HI, but the products obtained from four of five vaccine strains and Lederle strain were not digesed by Bam HI. Only one vaccine strain of which the PCR products were digested by Bam HI was confirmed as imported vaccine, modified Synider Hill strain. Based on seqencing data obtained from the 519-bp products, it was confirmed that Bam HI restriction site tends to be conserved in field isolates compared to the commercially available attenuated vaccine strains. Partial nucleotide sequences of CDV NP gene obtained from tissues of Jindo dog, poodle and badger shared 100% homology each other, whereas the nucleotide sequences showed 96.3, 96.5, 93.6 and 93.4% homology with Yanaka (virulent), Han95 (virulent), Lederle (attenuated) and Onderstepoort (attenuated) strain, respectively.

  • PDF

Isolation of akabane virus and its molecular diagnosis by reverse transcription polymerase chain reaction (아까바네 바이러스의 분리 및 RT-PCR 진단법에 관한 연구)

  • Cho, Jae-jin;Lee, Chung-gil;Park, Bong-kyun;Chang, Chung-ho;Chung, Chung-won;Cho, In-soo;An, Soo-hwan
    • Korean Journal of Veterinary Research
    • /
    • v.40 no.1
    • /
    • pp.42-48
    • /
    • 2000
  • Akabane disease is transmitted through mosquitoes in cattle, sheep and goats. It shows congenital abnormalities including encephalomyetitis, hydranencephaly, neurogenic arthrogryposis, and deformed neonatal calves. Akabane viruses, 93FMX and K-9 strain, were isolated from fetal matrix of aborted cow and blood of healthy cow, respectively. S gene sequences of 93FMX and K-9 showed 100% homology with that of OBE-1 strain isolated in Japan. Based upon our sequencing data, we synthesized specific primers for PCR diagnosis. Using these primers, we were able to amplify the S gene of Akabane virus not only from the culture fluid of Vero cells but also from the brain tissue of suckling mouse inoculated with, Akabane virus. These PCR products were confirmed by Southern blot hybridization. Not only the sensitivity of PCR test was high enough to detect the viruses of $10^{1.0}TCID_{50}/ml$, but also the time for diagnosis was significantly shorter than that of the virus isolation by tissue culture method. This method was also effective for the detection of Akabane virus in the cerebrum of fetus. RT-PCR method may be used for a useful diagnostic test of the clinical cases of Akabane disease.

  • PDF

APOLLO2 YEAR 2010

  • Sanchez, Richard;Zmijarevi, Igor;Coste-Delclaux, M.;Masiello, Emiliano;Santandrea, Simone;Martinolli, Emanuele;Villate, Laurence;Schwartz, Nadine;Guler, Nathalie
    • Nuclear Engineering and Technology
    • /
    • v.42 no.5
    • /
    • pp.474-499
    • /
    • 2010
  • This paper presents the mostortant developments implemented in the APOLLO2 spectral code since its last general presentation at the 1999 M&C conference in Madrid. APOLLO2 has been provided with new capabilities in the domain of cross section self-shielding, including mixture effects and transfer matrix self-shielding, new or improved flux solvers (CPM for RZ geometry, heterogeneous cells for short MOC and the linear-surface scheme for long MOC), improved acceleration techniques ($DP_1$), that are also applied to thermal and external iterations, and a number of sophisticated modules and tools to help user calculations. The method of characteristics, which took over the collision probability method as the main flux solver of the code, allows for whole core two-dimensional heterogeneous calculations. A flux reconstruction technique leads to fast albeit accurate solutions used for industrial applications. The APOLLO2 code has been integrated (APOLLO2-A) within the $ARCADIA^{(R)}$ reactor code system of AREVA as cross section generator for PWR and BWR fuel assemblies. APOLLO2 is also extensively used by Electricite de France within its reactor calculation chain. A number of numerical examples are presented to illustrate APOLLO2 accuracy by comparison to Monte Carlo reference calculations. Results of the validation program are compared to the measured values on power plants and critical experiments.

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.