• Title/Summary/Keyword: User Distribution

Search Result 1,120, Processing Time 0.03 seconds

A Study on the System Furniture Design for Home Office in Korea (한국적 홈 오피스를 위한 통합 시스템가구에 관한 연구 - 30-40평형 아파트를 대상으로 -)

  • 최경란
    • Korean Institute of Interior Design Journal
    • /
    • no.41
    • /
    • pp.190-197
    • /
    • 2003
  • This study is based on the Importance of home office in domestic environment in Korea. In recent years, the distribution of network environment at home has been changed rapidly Each family member uses home office for various purpose. The home office in domestic living environment become a part of common use for all family member. The purpose of this study is to set the framework of design direction in terms of system furniture for home office within the limitation of current standard space at home such as typical apartment - 30 pyeong, 40 pyeong. The first step of study is to understand user space and user needs through the user survey. The second step is to find the right location and plan of home office in domestic environment. The last is to suggest the integral system furniture and elements that fits to the various situations of location according to the space and user type.

Definition of Antenna Diversity Gain in User-Distributed 3D-Random Line-of-Sight

  • Kildal, Per-Simon;Carlberg, Ulf;Carlsson, Jan
    • Journal of electromagnetic engineering and science
    • /
    • v.13 no.2
    • /
    • pp.86-92
    • /
    • 2013
  • The present paper defines diversity gain for stationary users. This deals in particular with gathering the received signal statistics over possible user positions and orientations in space rather than over time, and to define a meaningful diversity gain related to the cumulative improvement of the performances of the 1% users with the worst receiving conditions. The definition is used to evaluate diversity gain for some typical small antennas in an extreme environment with only line-of-sight (LOS). The LOS environment is regarded as user-distributed 3D-random LOS caused by the statistics of an ensemble of stationary users with arbitrary orientations in the horizontal plane (2D), and with arbitrary orientations of their wireless devices in the vertical plane. Thus, an overall 3D-random distribution of user orientation is assumed.

Performance Evaluation of the WiMAX Network under a Complete Partitioned User Group with a Traffic Shaping Algorithm

  • Akhter, Jesmin;Islam, Md. Imdadul;Amin, M.R.
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.568-580
    • /
    • 2014
  • To enhance the utilization of the traffic channels of a network (instead of allocating radio channel to an individual user), a channel or a group of channels are allocated to a user group. The idea behind this is the statistical distribution of traffic arrival rates and the service time for an individual user or a group of users. In this paper, we derive the blocking probability and throughput of a subscriber station of Worldwide Interoperability for Microwave Access (WiMAX) by considering both the connection level and packet-level traffic under a complete partition scheme. The main contribution of the paper is to incorporate the traffic shaping scheme onto the incoming turbulent traffic. Hence, we have also analyzed the impact of the drain rate of the buffer on the blocking probability and throughput.

Identifying Topic-Specific Experts on Microblog

  • Yu, Yan;Mo, Lingfei;Wang, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2627-2647
    • /
    • 2016
  • With the rapid growth of microblog, expert identification on microblog has been playing a crucial role in many applications. While most previous expert identification studies only assess global authoritativeness of a user, there is no way to differentiate the authoritativeness in a particular aspect of topics. In this paper, we propose a novel model, which jointly models text and following relationship in the same generative process. Furthermore, we integrate a similarity-based weight scheme into the model to address the popular bias problem, and use followee topic distribution as prior information to make user's topic distribution more precisely. Our empirical study on two large real-world datasets shows that our proposed model produces significantly higher quality results than the prior arts.

A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems

  • El-Zoghdy, S.F.;Ghoneim, Ahmed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.117-135
    • /
    • 2016
  • Performance enhancement is one of the most important issues in high performance distributed computing systems. In such computing systems, online users submit their jobs anytime and anywhere to a set of dynamic resources. Jobs arrival and processes execution times are stochastic. The performance of a distributed computing system can be improved by using an effective load balancing strategy to redistribute the user tasks among computing resources for efficient utilization. This paper presents a multi-class load balancing strategy that balances different classes of user tasks on multiple heterogeneous computing nodes to minimize the per-class mean response time. For a wide range of system parameters, the performance of the proposed multi-class load balancing strategy is compared with that of the random distribution load balancing, and uniform distribution load balancing strategies using simulation. The results show that, the proposed strategy outperforms the other two studied strategies in terms of average task response time, and average computing nodes utilization.

PREDICTION OF MICROSTRUCTURE EVOLUTION AND HARDNESS DISTRIBUTION IN THE WELD REPAIR OF CARBON STEEL PIPELINE

  • Li, Victor;Kim, Dong
    • Proceedings of the KWS Conference
    • /
    • 2002.10a
    • /
    • pp.205-210
    • /
    • 2002
  • This article presents an integrated modeling approach for coupled analysis of heat transfer and microstructure evolution in welding carbon steel. The modeling procedure utilizes commercial [mite element code ABAQUS/Standard as the platform for solving the equation of heat conduction. User subroutines that implement computational thermodynamics and kinetics models are integrated with the FEA code to compute the transient microstructure evolution. In this study, the integrated models are applied to simulate the hot-tap repair welding of carbon steel pipeline. Microstructural components are treated as user output variables. Based on the predicted microstructure and cooling rates, hardness distributions in the welds were also predicted. The predicted microstructure and hardness distribution were found in good agreement with metallographic examinations and hardness measurements. This study demonstrates the applicability of computational models for the development of welding procedure for in-service pipeline repair.

  • PDF

The Design of Multicase Key distribution Protocol based CBT(Core Based Tree) (CBT(Core Based Tree)를 기반으로 한 멀티캐스트 키 분배 프로토콜 설계)

  • Kim, Bong-Han;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1184-1192
    • /
    • 2000
  • Multicast has communication mechanism that is able to transfer voice, video for only the specific user group. As compared to unicast, multicast is more susceptive to attack such as masquerading, malicious replay, denial of service, repudiation and traffic observation, because of the multicast has much more communication links than unicast communication. Multicast-specific security threats can affect not only a group's receivers, but a potentially large proportion of the internet. In this paper, we proposed the multicast security model that is able to secure multi-group communication in CBT(Core Based Tree), which is multicast routing. And designed the multicast key distribution protocol that can offer authentication, user privacy using core (be does as Authentication Server) in the proposed model.

  • PDF

A Simulation Model of Object Movement for Evaluating the Communication Load in Networked Virtual Environments

  • Lim, Mingyu;Lee, Yunjin
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.489-498
    • /
    • 2013
  • In this paper, we propose a common simulation model that can be reused for different performance evaluations of networked virtual environments. To this end, we analyzed the common features of NVEs, in which multiple regions compose a shared space, and where a user has his/her own interest area. Communication architecture can be client-server or peer-server models. In usual simulations, users move around the world while the number of users varies with the system. Our model provides various simulation parameters to customize the region configuration and user movement pattern. Furthermore, our model introduces a way to mimic a lot of users in a minimal experiment environment. The proposed model is integrated with our network framework, which supports various scalability approaches. We specifically applied our model to the interest management and load distribution schemes to evaluate communication overhead. With the proposed simulation model, a new simulation can be easily designed in a large-scale environment.

Copyright Protection Protocol providing Privacy (프라이버시를 제공하는 저작권 보호 프로토콜)

  • Yoo, Hye-Joung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.

A Design and Development of Demand Forecasting Engine by applying Distribution Algorithms based on Parts Services (부품서비스 관점에서 분배 알고리즘을 적용한 수요예측 엔진의 설계 및 개발에 관한 연구)

  • Rhee, Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.169-178
    • /
    • 2011
  • In this study, a forecasting engine from the user perspective is studied and developed. Characteristics of forecasting engine can be divided into a few categories, an algorithms for predicting variety of situations and the depth of algorithms based on the number and the types of data. Then applying a variety of algorithms that most closely match the predicted values for the actual value that deduce criteria for selecting an appropriate forecasting algorithm is to organize. Through the forecast quality assessment, the suggested distribution algorithm compared to the existing demand forecast algorithms is good indicators for its accuracy.