• Title/Summary/Keyword: attention allocation

Search Result 133, Processing Time 0.027 seconds

Exploration of Life-cycle Management for Government R&D Program: the Case of Preliminary Feasibility Study on R&D Program (국가연구개발사업의 전주기 관리방안 탐색: 연구개발 부문 예비타당성조사 제도를 중심으로)

  • Ahn, Sang-Jin;Park, Eun-Ji;Lee, Yoon Been
    • Journal of Korea Technology Innovation Society
    • /
    • v.17 no.1
    • /
    • pp.124-145
    • /
    • 2014
  • Market failure occurs when Pareto efficiency is not achieved through market mechanism. In order to solve this problem, government intervene market; paying great attention to the optimum state of resource allocation. However, as the size of government investment in R&D goes up, many professionals emphasize the importance in efficient management system. This work is the result of exploratory study to look into life-cycle management of governmental R&D program. Literature reviews and empirical research on governmental R&D programs elicit improvements for effective life-cycle management of governmental R&D program as follows: consistent discrimination between capital expenditure and recurring expenditure, dual management system by spending properties, implementing total cost management system in capital expenditure, and discrimination between preliminary feasibility study with confirming total program cost in recurring expenditure.

A Study on a Visible Light Communication using LED in Under-water Environment (LED조명을 이용한 수중환경에서의 VLC 연구)

  • Jung, Hui-Sok;Yang, Yeon-Mo;Huh, Kyung-Moo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.5
    • /
    • pp.1-6
    • /
    • 2011
  • LED(Light Emitting Diode) components have advantages of longer lifetime, lower power consumption and easy-to-control, compare to normal lamp and fluorescent light, according to the development of recent technologies. Thus, lots of illuminations which utilize LED components could be used. Recently, Visible Light Communication(VLC) which is a part of communication technologies, utilizing high speed response characteristic of LED components, started receiving public attention. In case of VLC, there is no need of frequency allocation due to no use of radio, but also no interference exists during data transmission, much different in ISM((Industrial Scientific Medical band). This is the reason why a lot of research results about VLC are becoming issued. In this paper, a survey of feasibility for using VLC utilizing an original LED illumination for underwater applications has been done and a primitive possibility of its application has been examined.

Factors Affecting Health of the Rural Residents (일부 농촌지역 주민들의 건강결정 관련요인)

  • Son, Dong-Koog;Lee, Kyu-Sik;Park, Jong-Ku;Koh, Sang-Baek;Jin, Ki-Nam;Nam, Eun-Woo;Lee, Hae-Jong
    • Health Policy and Management
    • /
    • v.19 no.4
    • /
    • pp.1-17
    • /
    • 2009
  • The purpose of this study was to find factors affecting health of the rural residents. The data were collected from a sample of 2,587 people aged from 40 to 70 in the year 2005-2006, Wonju City and Pyeongchang County, Gangwon-do, Korea. The theoretical model adopted in this study was the Lalonde's health field(human biology, environment, lifestyle, and health care organization). SF-12 was used to measure subjective health status. In the category of human biology, men were healthier than women. Age and BMI showed negative relation to health status. Income, education and social support showed positive relation to health status in the environment category. In the category of life style, stress showed negative relation to health status. Medical expenses showed negative relation to health status in the category of health care organization. After converting SF-12 score to percentage score, the health determinants portions were 47% lifestyle, 26% environment, 18% human biology and 9% health care organization. These findings suggest that life style, environment and biology are main factors in determinants of health. Especially stress in the life style category is more focused for the community health promotion. We also may be able to improve income, education and social support in the environment category with self empowerment efforts, community supports and government helps. Finally greater attention must be payed to life style in the future health planning and budget allocation priority in the healthcare area.

Bandwidth Allocation and Performance Analysis of MAC Protocol for Ethernet PON (Ethernet PON의 MAC프로토콜의 대역폭 할당 및 성능 분석)

  • 엄종훈;장용석;김성호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.7
    • /
    • pp.261-272
    • /
    • 2003
  • An Ethernet PON(Passive Optical Network) is an economical and efficient access network that has received significant research attention in recent years. A MAC(Media Access Control) protocol of PON , the next generation access network, is based on TDMA(Time Division Multiple Access) basically and can classify this protocol into a fixed length slot assignment method suitable for leased line supporting QoS(Quality of Service) and a variable length slot assignment method suitable for LAN/MAN with the best effort. For analyzing the performance of these protocols, we design an Ethernet PON model using OPNET tool. To establish the maximum efficiency of a network, we verify a MAC protocol and determine the optimal number of ONUs(Optical Network Unit) that can be accepted by one OLT(Optical Line Terminal) and propose the suitable buffer size of ONU based on analyzing the end-to-end Ethernet delay, queuing delay, throughput, and utilization.

An Implementation of Network Intrusion Detection Engines on Network Processors (네트워크 프로세서 기반 고성능 네트워크 침입 탐지 엔진에 관한 연구)

  • Cho, Hye-Young;Kim, Dae-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.113-130
    • /
    • 2006
  • Recently with the explosive growth of Internet applications, the attacks of hackers on network are increasing rapidly and becoming more seriously. Thus information security is emerging as a critical factor in designing a network system and much attention is paid to Network Intrusion Detection System (NIDS), which detects hackers' attacks on network and handles them properly However, the performance of current intrusion detection system cannot catch the increasing rate of the Internet speed because most of the NIDSs are implemented by software. In this paper, we propose a new high performance network intrusion using Network Processor. To achieve fast packet processing and dynamic adaptation of intrusion patterns that are continuously added, a new high performance network intrusion detection system using Intel's network processor, IXP1200, is proposed. Unlike traditional intrusion detection engines, which have been implemented by either software or hardware so far, we design an optimized architecture and algorithms, exploiting the features of network processor. In addition, for more efficient detection engine scheduling, we proposed task allocation methods on multi-processing processors. Through implementation and performance evaluation, we show the proprieties of the proposed approach.

Cycle Property in the (n,k)-star Graph ((n,k)-스타 그래프의 사이클 특성)

  • Chang, Jung-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5
    • /
    • pp.1464-1473
    • /
    • 2000
  • In this paper, we analyze the cycle property of the (n,k)-star graph that has an attention as an alternative interconnection network topology in recent years. Based on the graph-theoretic properties in (n,k)-star graphs, we show the pancyclic property of the graph and also present the corresponding algorithm. Based on the recursive structure of the graph, we present such top-down approach that the resulting cycle can be constructed by applying series of "dimension expansion" operations to a kind of cycles consisting of sub-graphs. This processing naturally leads to such property that the resulting cycles tend to be integrated compactly within some minimal subset of sub-graphs, and also means its applicability of another classes of the disjoint-style cycle problems. This result means not only the graph-theoretic contribution of analyzing the pancyclic property in the underlying graph model but also the parallel processing applications such a as message routing or resource allocation and scheduling in the multi-computer system with the corresponding interconnection network.

  • PDF

Interference Aware Cost Effective Coverage Extension in Multihop Relay Networks (다중홉 릴레이 시스템에서 간섭의 영향과 비용의 효과를 고려한 셀 커버리지 확장 방법에 관한 연구)

  • Kim, Yongchul;Lim, Won-Taek;Cho, Sung-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1138-1147
    • /
    • 2012
  • IEEE standard 802.16, often referred to as WiMAX, is considered a "last mile" broadband wireless access alternative to conventional DSL and Cable Internet. One extension that is recently receiving great attention is the IEEE 802.16j Mobile Multihop Relay (MMR) amendment. The focus of this amendment is the development of simple and lower cost relay stations (RSs) that can enhance network coverage and capacity. We use our proposed simple scheduling scheme for serving the SSs in a fair manner and evaluate the performance of WiMAX networks with relays, especially we analyze the impact of interference between RSs on cell throughput Through simulations and numerical analysis, we make several fundamental observations about interference aware cost effective coverage extension in such networks.

Comparison Study of Performance Analysis Methods of Uplink NOMA Systems (상향링크 NOMA 시스템의 성능 해석 방법 비교 연구)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.25-30
    • /
    • 2020
  • Recently, non-orthogonal multiple access (NOMA) have been received considerable attention to be involved in the next generation mobile system. However, there are inherent inter-user interferences caused by the multiplexing multiple users in the same communication resource in NOMA systems. Two representative methods, the approximate white noise and random variable methods, have been adapted for the analysis of interferences in NOMA systems. In this paper, we derive the outage probabilities of an uplink NOMA system with the two analysis methods and compare the results. The numerical results of the outage probabilities versus transmitted power, distances, and power allocation are compared. We noticed that the derived functions are different each other, but the numerical results are coincident. It is shown that the two interference analysis methods can be applied to the analysis of NOMA systems.

Work Allocation Methods and Performance Comparisons on the Virtual Parallel Computing System based on the IBM Aglets (IBM Aglets를 기반으로 하는 가상 병렬 컴퓨팅 시스템에서 작업 할당 기법과 성능 비교)

  • Kim, Kyong-Ha;Kim, Young-Hak;Oh, Gil-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.411-422
    • /
    • 2002
  • Recently, there have been active researches about the VPCS (Virtual Parallel Computing System) based on multiple agents. The PVCS uses personal computers or workstations that are dispersed all over the internet, rather than a high-cost supercomputer, to solve complex problems that require a huge number of calculations. It can be made up with either homogeneous or heterogeneous computers, depending on resources available on the internet. In this paper, we propose a new method in order to distribute worker agents and work packages efficiently on the VPCS based on the IBM Aglets. The previous methods use mainly the master-slave pattern for distributing worker agents and work packages. However, in these methods the workload increases dramatically at the central master as the number of agents increases. As a solution to this problem, our method appoints worker agents to distribute worker agents and workload packages. The proposed method is evaluated in several ways on the VPCS, and its results are improved to be worthy of close attention as compared with the previous ones.

Topic Modeling Analysis Comparison for Research Topic in Korean Society of Industrial and Systems Engineering: Concentrated on Research Papers from 1978~1999 (한국산업경영시스템학회지 연구 주제의 토픽모델링 분석 비교: 1978년~99년 논문을 중심으로)

  • Park, Dong Joon;Oh, Hyung Sool;Kim, Ho Gyun;Yoon, Min
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.113-127
    • /
    • 2021
  • Topic modeling has been receiving much attention in academic disciplines in recent years. Topic modeling is one of the applications in machine learning and natural language processing. It is a statistical modeling procedure to discover topics in the collection of documents. Recently, there have been many attempts to find out topics in diverse fields of academic research. Although the first Department of Industrial Engineering (I.E.) was established in Hanyang university in 1958, Korean Institute of Industrial Engineers (KIIE) which is truly the most academic society was first founded to contribute to research for I.E. and promote industrial techniques in 1974. Korean Society of Industrial and Systems Engineering (KSIE) was established four years later. However, the research topics for KSIE journal have not been deeply examined up until now. Using topic modeling algorithms, we cautiously aim to detect the research topics of KSIE journal for the first half of the society history, from 1978 to 1999. We made use of titles and abstracts in research papers to find out topics in KSIE journal by conducting four algorithms, LSA, HDP, LDA, and LDA Mallet. Topic analysis results obtained by the algorithms were compared. We tried to show the whole procedure of topic analysis in detail for further practical use in future. We employed visualization techniques by using analysis result obtained from LDA. As a result of thorough analysis of topic modeling, eight major research topics were discovered including Production/Logistics/Inventory, Reliability, Quality, Probability/Statistics, Management Engineering/Industry, Engineering Economy, Human Factor/Safety/Computer/Information Technology, and Heuristics/Optimization.