• Title/Summary/Keyword: The ordered systems

Search Result 234, Processing Time 0.029 seconds

An Interval Valued Bidirectional Approximate Reasoning Method Based on Similarity Measure

  • Chun, Myung-Geun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.579-584
    • /
    • 1998
  • In this work, we present a method to deal with the interval valued decision making systems. First, we propose a new type of equality measure based on the Ordered Weighted Averaging (OWA) operator. The proposed equality measure has a structure to render the extreme values of the measure by choosing a suitable weighting vector of the OWA operator. From this property, we derive a bidirectional fuzzy inference network which can be applied for the decisionmaking systems requiring the inverval valued decisions.

  • PDF

An Efficient Protocol for Causal Message Delivery in Distributed Mobile Systems (분산 이동 시스템에서 인과적 메시지 전달을 위한 효율적인 프로토콜)

  • 노성주;정광식;이화민;유헌창;황종선
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.143-154
    • /
    • 2003
  • There is a growing trend in developing system for distributed mobile system that supports services - job flow management, video conference, replicated data management and resource allocation. Supporting these services, applications have to use causally ordered message delivery. Previous proposals that provide causally ordered message delivery have problems such as communication overhead, message delaying, scalability, computing overload of mobile host. In this paper, we proposed efficient protocol for causally ordered message delivery using the methods that MSS maintains dependency information matrix between MSS and MH, Piggybacking dependency information about each immediate predecessor message. Proposed algorithm, when compared with previous proposals, provides a low message overhead, and low probability of unnecessary inhibition in delivering messages. Also, it consider resource restriction of MH and low bandwidth of wireless communication by computing most of algorithm at MSS, and reduce processing delay by executing causally ordered message delivery a unit of MH.

Fixed Point Theorems for Mixed Monotone Vector Operators with Application to Systems of Nonlinear Boundary Value Problems

  • Sadrati, Abdellatif;Aouragh, My Driss
    • Kyungpook Mathematical Journal
    • /
    • v.61 no.3
    • /
    • pp.613-629
    • /
    • 2021
  • In this paper, we present and prove new existence and uniqueness fixed point theorems for vector operators having a mixed monotone property in partially ordered product Banach spaces. Our results extend and improve existing works on τ-φ-concave operators in the scalar case. As an application, we study the existence and uniqueness of positive solutions for systems of nonlinear Neumann boundary value problems.

Establishment of a Safety Inspection System for Public Institutions Ordered Construction Projects (건설공사 발주 공공기관의 안전점검 체계구축에 관한 연구)

  • Eung Ho Park;Sudong Lee;Kihyo Jung
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.3
    • /
    • pp.55-62
    • /
    • 2023
  • Public institutions have a responsibility to ensure the safety of their employees and the public. One way to do this is to implement a systematic safety inspection system based on risk assessments and continuous improvements. This study developed a systematic safety inspection system for public institutions that are ordered construction projects. The proposed system in this study consists of a three-step process: (1) developing safety grade evaluation tables, (2) preparing and conducting safety inspections, and (3) evaluating and improving safety management grades. The first step is to develop safety grade evaluation tables by analysis and diagnosis of the construction site's work type, disaster statistics, and related laws. The second step is to conduct safety inspections using the developed evaluation tables. The third step is to determine the safety management grade based on the results of the safety inspection, and to improve risk factors found during the safety evaluation. The proposed system was implemented in highway construction projects carried out by public institutions. The results showed that the proposed system has two major effects: (1) reducing accident-related deaths and injuries, (2) improving safety management levels by continuous evaluation and improvement. The proposed system can be utilized in construction projects ordered by public institutions to improve the level of occupational safety and health.

A Preprocessing Algorithm for Efficient Lossless Compression of Gray Scale Images

  • Kim, Sun-Ja;Hwang, Doh-Yeun;Yoo, Gi-Hyoung;You, Kang-Soo;Kwak, Hoon-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2485-2489
    • /
    • 2005
  • This paper introduces a new preprocessing scheme to replace original data of gray scale images with particular ordered data so that performance of lossless compression can be improved more efficiently. As a kind of preprocessing technique to maximize performance of entropy encoder, the proposed method converts the input image data into more compressible form. Before encoding a stream of the input image, the proposed preprocessor counts co-occurrence frequencies for neighboring pixel pairs. Then, it replaces each pair of adjacent gray values with particular ordered numbers based on the investigated co-occurrence frequencies. When compressing ordered image using entropy encoder, we can expect to raise compression rate more highly because of enhanced statistical feature of the input image. In this paper, we show that lossless compression rate increased by up to 37.85% when comparing results from compressing preprocessed and non-preprocessed image data using entropy encoder such as Huffman, Arithmetic encoder.

  • PDF

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Design and Implementation of Efficient Symbol Detector for MIMO Spatial Multiplexing Systems (MIMO 공간 다중화 시스템을 위한 효율적인 심볼 검출기의 설계 및 구현)

  • Jung, Yun-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.10
    • /
    • pp.75-82
    • /
    • 2008
  • In this paper, we propose an efficient symbol detection algorithm for multiple-input multiple-output spatial multiplexing (MIMO-SM) systems and present its design and implementation results. By enhancing the performance of the first detected symbol which causes error propagation, the proposed algorithm achieves a considerable performance gain as compared to the conventional sorted QR decomposition (SQRD) based detection and the ordered successive detection (OSD) algorithms. The bit error rate (BER) performance of the proposed detection algorithm is evaluated by the simulation. In case of 16QAM MIMO-SM system with 4 transmit and 4 receive ($4{\times}4$) antennas, at $BER=10^{-3}$ the proposed algorithm obtains the gai improvement of about 2.5-13.5 dB over the conventional algorithms. The proposed detection algorithm was designed in a hardware description language (HDL) and synthesized to gate-level circuits using 0.18um 1.8V CMOS standard cell library. The results show that the proposed algorithm can be implemented without increasing the hardware costs significantly.

Analyzing the Characteristics of Trip Chaining Activities of the Elderly in Seoul Metropolitan Area (수도권 고령자의 통행사슬 특성에 관한 연구)

  • Lee, Hyangsook;Choo, Sangho;Kim, Jiyoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.2
    • /
    • pp.68-79
    • /
    • 2014
  • This paper analyzes the characteristics of trip chaining activities of elderly and explores temporal and spatial distribution. The research also estimates ordered probit model and binary logistic model to investigate various factors affecting trip chaining and mode choice patterns. We utilized household survey data for elderly conducted in 2006 and 2010 in Seoul metropolitan area. Research results indicate that trip chaining showed an increasing trend and simple trip chaining counts for more than 85%. GIS mapping expressed spatial distribution of trip departure and arrival areas, particularly showing regional changes in job-related trips. We also found that more factors influence trip chaining in 2010, compared with 2006, and travel cost is more sensitive than travel time in determining travel mode. The research contributes to establish transportation policies based on travel behavior of elderly in a upcoming super-aged society.