• 제목/요약/키워드: Technique Information

검색결과 16,060건 처리시간 0.035초

2단계 창의 확률화응답기법 (Two stage Chang's randomized response technique)

  • 최경호
    • Journal of the Korean Data and Information Science Society
    • /
    • 제21권2호
    • /
    • pp.271-277
    • /
    • 2010
  • 확률화응답기법은 조사과정에서 응답자의 신분보호를 위하여 확률장치가 도입되는 간접질문방식이기 때문에 직접질문에 비하여 정보의 손실이 있게 된다. 그래서 확률장치에 기인한 이러한 손실을 줄여서 추정의 효율을 높이고 얻어진 정보를 좀 더 효율적으로 이용할 수 있는 새로운 기법의 개발에 관한 연구가 지속되어 온 바, 2단계 확률화응답기법은 이에 대한 일환으로 고려할 수 있는 방법이다. 한편 Chang 등 (2004) 또한 개선된 강요형기법을 제안하고 Warner (1965)에 비하여 효율적인 조건을 찾았다. 이에 본 연구에서는 Chang 등 (2004)의 기법을 2단계로 확장한 모형을 제안하고, Chang 등 (2004) 및 Mangat와 Singh (1990) 등의 2단계기법에 비하여 효율적인 조건을 찾아보았다.

의미적 관계를 이용한 OWL 데이터의 키워드 질의 처리 기법 (A Keyword Query Processing Technique of OWL Data using Semantic Relationships)

  • 김연희;김성완
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.59-72
    • /
    • 2013
  • In this paper, we propose a keyword query processing technique based on semantic relationships for OWL data. The proposed keyword query processing technique can improve user's search satisfaction by performing two types of associative search. The first associative search uses information inferred by the relationships between classes or properties during keyword query processing. And it supports to search all information resources that are either directly or indirectly related with query keywords by semantic relationships between information resources. The second associative search returns not only information resources related with query keywords but also values of properties of them. We design a storage schema and index structures to support the proposed technique. And we propose evaluation functions to rank retrieved information resources according to three criteria. Finally, we evaluate the validity and accuracy of the proposed technique through experiments. The proposed technique can be utilized in a variety of fields, such as paper retrieval and multimedia retrieval.

디지털 도서관을 위한 분산색인 기법에 대한 연구 (A Study on Distributed Indexing Technique for Digital Library)

  • 유춘식;이종득;김용성
    • 한국정보처리학회논문지
    • /
    • 제6권2호
    • /
    • pp.315-325
    • /
    • 1999
  • Indexing techniques for distributed resources have much effect on an information service system based on distributed environment like digital library. There is a centralized indexing technique, a distributed technique, and a mixed technique for distributed indexing techniques. In this paper, we propose new distributed indexing technique using EIF(extended Inverted File) structure that mix the centralized technique and t도 distributed technique. And we propose management techniques using EIF structure and retrieval technique using EIF structure. This distributed indexing technique proposed is able to fast process retrieval request and reduce network overload and select servers relevant to query terms. This paper investigated performance of a proposed distributed indexing technique.

  • PDF

A Regression Test Selection and Prioritization Technique

  • Malhotra, Ruchika;Kaur, Arvinder;Singh, Yogesh
    • Journal of Information Processing Systems
    • /
    • 제6권2호
    • /
    • pp.235-252
    • /
    • 2010
  • Regression testing is a very costly process performed primarily as a software maintenance activity. It is the process of retesting the modified parts of the software and ensuring that no new errors have been introduced into previously tested source code due to these modifications. A regression test selection technique selects an appropriate number of test cases from a test suite that might expose a fault in the modified program. In this paper, we propose both a regression test selection and prioritization technique. We implemented our regression test selection technique and demonstrated in two case studies that our technique is effective regarding selecting and prioritizing test cases. The results show that our technique may significantly reduce the number of test cases and thus the cost and resources for performing regression testing on modified software.

APP-MAC-PHY Cross-Layer Video Streaming Technique over Wireless Channels

  • Park, Jaeyoung;Kim, Jaekwon
    • 한국통신학회논문지
    • /
    • 제39A권7호
    • /
    • pp.398-400
    • /
    • 2014
  • In this letter, we propose a cross-layer technique jointly considering modulation coding schemes (MCSs) of medium access control (MAC) layer, source significance information (SSI) and error concealment unit of application (APP) layer, and channel quality information (CQI) of physical (PHY) layer. We demonstrate the improved video quality by the proposed technique when H.264 videos are streamed over Rayleigh fading wireless channels.

W-CDMA 4${\times}$1 Downlink 적용을 위한 4-STTD 기법 (The Technique of 4-STTD for Application of W-CDMA 4${\times}$l Downlink)

  • 박현수;민병택;전준수;류중찬;김철성
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 하계종합학술대회 논문집(1)
    • /
    • pp.87-90
    • /
    • 2004
  • This paper proposes 4-STTD(4${\times}$l) technique for the shake of application of W-CDMA which expand Alamouti STTD(2${\times}$l) technique. As the result of analyzing 4-STTD(4${\times}$l) technique proposed in this paper, we can see improvement of quality by approximately 2.2 dB rather than Alamouti STTD(2${\times}$l) technique

  • PDF

MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구 (A Study for Detection Accuracy Improvement of Malicious Nodes on MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.95-101
    • /
    • 2013
  • MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.

Combined Procedure of Direct Question and Randomized Response Technique

  • Choi, Kyoung-Ho
    • Journal of the Korean Data and Information Science Society
    • /
    • 제14권2호
    • /
    • pp.275-278
    • /
    • 2003
  • In this paper, a simple and obvious procedure is presented that allows to estimate $\pi$, the population proportion of a sensitive group. Suggested procedure is combined procedure of direct question and randomized response technique. It is found that the proposed procedure is more efficient than Warner's(1965).

  • PDF

테두리 주위의 공간정보를 이용한 둥근 물체의 검색 및 분할 (Detection and segmentation of circular shaped objects using spatial information on boundary neighborhood)

  • 성효경;김성완;최흥문
    • 전자공학회논문지S
    • /
    • 제34S권6호
    • /
    • pp.30-37
    • /
    • 1997
  • We present an efficient technique, bidirectioanl inertial maximum cost search technique, for th edetection and segmentation of circular shaped objects using the spatial information around the neighborhood of the boundary candidates. This technique searches boundary candidates using local pixdl information such as pixel value and its direction. And then to exclude pseudo-boundary caused by shadows or noises, the local contrast is defined between the clique of the boundary candidates and the cliques of the background. In order to effectively segment circular shaped boundary, the technique also uses the curvature based on trigonometirc function which determines circular shaped boundary segments. Since the proposed technique is applied to the pixel cliques instead of a pixel itself, it is proposed method can easily find out circular boundaries form iamges of the PCB containing circular shaped parts and the trees with round fruits compared to boundary detection by using the pixel information and the laplacian curvature.

  • PDF

Mobile Ad Hoc Network에서 분산 모니터링을 이용한 향상된 침입탐지 기법 연구 (A Study on Improved Intrusion Detection Technique Using Distributed Monitoring in Mobile Ad Hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제14권1호
    • /
    • pp.35-43
    • /
    • 2018
  • MANET composed of only wireless nodes is increasingly utilized in various fields. However, it is exposed to many security vulnerabilities because it doesn't have any infrastructure and transmits data by using multi-hop method. Therefore, MANET should be applied the intrusion detection technique that can detect efficiently malicious nodes and decrease impacts of various attacks. In this paper, we propose a distributed intrusion detection technique that can detect the various attacks while improving the efficiency of attack detection and reducing the false positive rate. The proposed technique uses the cluster structure to manage the information in the center and monitor the traffic of their neighbor nodes directly in all nodes. We use three parameters for attack detection. We also applied an efficient authentication technique using only key exchange without the help of CA in order to provide integrity when exchanging information between cluster heads. This makes it possible to free the forgery of information about trust information of the nodes and attack nodes. The superiority of the proposed technique can be confirmed through comparative experiments with existing intrusion detection techniques.