• Title/Summary/Keyword: hybrid access

Search Result 343, Processing Time 0.028 seconds

Enterprise Human Resource Management using Hybrid Recognition Technique (하이브리드 인식 기술을 이용한 전사적 인적자원관리)

  • Han, Jung-Soo;Lee, Jeong-Heon;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.333-338
    • /
    • 2012
  • Human resource management is bringing the various changes with the IT technology. In particular, if HRM is non-scientific method such as group management, physical plant, working hours constraints, personal contacts, etc, the current enterprise human resources management(e-HRM) appeared in the individual dimension management, virtual workspace (for example: smart work center, home work, etc.), working time flexibility and elasticity, computer-based statistical data and the scientific method of analysis and management has been a big difference in the sense. Therefore, depending on changes in the environment, companies have introduced a variety of techniques as RFID card, fingerprint time & attendance systems in order to build more efficient and strategic human resource management system. In this paper, time and attendance, access control management system was developed using multi camera for 2D and 3D face recognition technology-based for efficient enterprise human resource management. We had an issue with existing 2D-style face-recognition technology for lighting and the attitude, and got more than 90% recognition rate against the poor readability. In addition, 3D face recognition has computational complexities, so we could improve hybrid video recognition and the speed using 3D and 2D in parallel.

Performance Analysis of Hybrid DS/SFH-CDMA MFSK Signal with CCI Canceller and Convolution Code Techniques in Mobile Communication Multipath Interference Channels (이동통신 다중 경로 간섭 채널에서 CCI Canceller와 컨벌루션 부호화 기법에 의한 하이브리드 DS / SFH-CDMA MFSK 신호의 성능 해석)

  • 임태길;강희조;이권현
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.3
    • /
    • pp.221-231
    • /
    • 1997
  • This paper presents an analysis of a hybrid direct-sequence/slow frequency hopped code division multiple access(DS/SFH-CDMA) system employing noncoherent M-ary frequency shift keying(MFSK) modulation in a multiple m-distribution fading environment. Multipath interfer- ence(MPI) and multiuser interference(MUI) is taken into accout and the spectral efficiency is calculated for uncoded as well as simple channel coding systems. The predetection multipath CCI canceller in conjunction with convolution coding is employed for improving the bit error rate(BER) performance. The BER of noncoherent hybrid system is obtained using a Gaussian interference approximation. From the results, we know that the error performance more deteriorates as the depth of fading becomes deeper. The DS part of the modulation combats the multipath interference, whereas the FH part is a predetection against large multiuser interference. It is shown that, for the con- sidered types of a channel coding, the use of a predetection coding is still essential for obtained a satisfactory bit error performance. The results show that the capacity of the DS/SFG-CDMA MFSK communication system increases in proportion to the length of PN code sequence in the presence of AWGN and MUI. In m-distribution fading environment the capacity increases in proportion to the fading index. The capacity is increased and error performance is improved when the CCI Canceller and Convolution code technique are adopted, respectively. From the results, it is known that the error performance of $4\times10^{-2}$ by adopting Canceller technique. Also convolutional coding technique is the improvement of error performance attains about $10^{-5}$ in code rate 1/2.

  • PDF

A Case Study on Implementation of the Shipping Market Information Service System (해운시황정보서비스시스템 구현 사례연구)

  • Lee, Seokyong;Jeong, Myounghwan
    • Journal of Korea Port Economic Association
    • /
    • v.29 no.3
    • /
    • pp.73-94
    • /
    • 2013
  • The necessity of shipping market information services has been on the rise which emphasizes the relevance of transaction information and market information to parties both in and outside the shipping industry. However, previous related researches have been restricted to explorations limited by the offerings of existing shipping market information providers. Users today require effective information, an efficient contents management system, interfacing to help the information provider, graphing and spread sheets to facilitate and present the analyzed information through diverse formats, and reliable web and mobile services to provide information effectively with limited human resources. As a first step, service information has to be defined, so that it takes into account user utility, information retrieval and data development. Second, benchmark information and services must be provided from leading shipbrokers and research institutes. Third, a review of the latest technical trends is required to identify the most suitable technologies for servicing shipping market information. Finally, analysis is required on the implementation of a system with selected technologies, as well as the development of channels to post information which have been analyzed by users. Such a process would enable the continual redefinition of the shipping market information users actively need. The application of an X-Internet based WCMS, with a single-window dashboard providing user-customized information, and used to obtain and manage processes, add spread sheets to sustain calculations using the latest information, graph results, and to input additional information following predefined rules. Access to data and use of the system would require agreement that the system will incorporate user data and user-analyzed information into the market report, web portal, and hybrid app to provide current shipping market information appropriately and accurately to service users.

An Admission Control Mechanism to guarantee QoS of Streaming Service in WLAN (WLAN에서 스트리밍 서비스의 QoS를 보장하기 위한 승인 제어 기술)

  • Kang, Seok-Won;Lee, Hyun-Jin;Lee, Kyu-Hwan;Kim, Jae-Hyun;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6B
    • /
    • pp.595-604
    • /
    • 2009
  • The HCCA reserves the channel resources based on the mean data rate in IEEE 802.11e. It may cause either the waste of channel resource or the increase of transmission delay at MAC layer if the frame size is rapidly varied when a compressed mode video codec such as MPEG video is used. To solve these problems, it is developed that the packet scheduler allocates the wireless resource adaptation by according to the packet size. However, it is difficult to perform the admission control because of the difficulty with calculating the available resources. In this paper, we propose a CAC mechanism to solve the problem that may not satisfy the QoS by increasing traffic load in case of using EDCA. Especially, the proposed CAC mechanism calculates the EB of TSs using the traffic information transmitted by the application layer and the number of average transmission according to the wireless channel environment, and then determines the admission of the TS based on the EB. According to the simulation results of the proposed CAC mechanism, it admitted the TSs under the loads which are satisfied within the delay bound. Therefore, the proposed mechanism guarantees QoS of streaming services effectively.

Development of GPS based Self Triage App for Disaster Vulnerable Populations (재난 취약계층을 위한 GPS 기반 Self Triage 앱 개발)

  • Park, Ju Young
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.24 no.3
    • /
    • pp.230-242
    • /
    • 2017
  • Purpose: The purpose of this study was to develop a self triage application for rescue requests by disaster vulnerable populations. Literature was reviewed in order to define application trends and needs. Methods: Development of the self triage application was conducted in six stages as a hybrid model (analysis, design, development, implementation, evaluation, modification) of the ADDIE (Analysis, Design, Development, Implementation, Evaluation) model and Driscoll & Alexander model. Application system function and contents were tried with 6 experts and 4 people with hearing impairments. Results: Expert assessment of the application for self triage showed that reliability at 5 points was the highest, followed by utility at 4.8 points. Scores for quickness and expressiveness were low at 4.6 and 4.2 points respectively. User acceptability assessment of the application was measured at 66.73 points. Conclusion: The results show that the application for self triage is helpful to disaster vulnerable populations by providing relief in disaster situations. It is expected that use of this application as a self rescue ability can be made available for disaster situations. However, it will be necessary to establish policies for communication strategies with rescuers and public relations to improve the access rate of disaster app service.

A Implementation of Messenger using Hybrid Cryptosystem (하이브리드 암호 시스템을 이용한 메신저 구현)

  • Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3942-3949
    • /
    • 2010
  • Since existing Nate-on Messenger application stores users' personal information in the database of its server, it is extremely venerable to internal threats, not to mention the communication data being transmitted without any safety measures. To solve such problematic areas of the existing application, we have developed a safer messenger application. The messenger application proposed in this paper discloses only the least required personal information of its users and the rest of the personal information is safely encrypted in the database using private passwords. This protective measure prevents the administrator or a third party from misusing the information since he/she will not be able access the information. In addition, users will be able to freely and safely communicate using this new messenger since transmitted data will also be encrypted.

Key Distribution Protocol and Call Control for Secure ISDN (안전한 종합정보통신망을 위한 키 분배 프로토콜과 호 제어)

  • Jeong, Hyeon-Cheol;Sin, Gi-Su;Lee, Seon-U;Kim, Bong-Han;Kim, Jeom-Gu;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.195-208
    • /
    • 1997
  • ISDN is network which has been developed to integrate and transfer some information(data, video, voice). In the ISDN, security problem that threat and intrusion about important information resource increase because every information is transferred in the form of digital and access of network has patiency. In this paper, for protect important information resource, studied that apply application method and encryption system to ISDN, and system structure, ITU-T Q.931 protocol were analyzed, and proposable encryption key distribution protocol, call control with hybrid encryption system for user information privacy to provide security service.

  • PDF

Librarian's Role and Diversification of Librarian's Works for Creating Blue Ocean Strategy of Special Libraries (전문도서관의 블루오션 창출을 위한 사서의 역할 및 업무영역 다변화)

  • Yi, Ji-Ho;Park, Ok-Wha
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.42 no.3
    • /
    • pp.189-205
    • /
    • 2008
  • The roles of librarians have been changing with the paradigm shift of libraries. The paradigm of libraries has shifted from a traditional information management-centered way to a hybrid approach emphasizing a balance between collection and access. This study analyzed the internal and external changes of libraries to create Blue Ocean of special libraries by using the SWOT analysis. and adopted ERCR analysis for the reasonable management of libraries. The findings of this study indicate that the scope of role played by librarians belonging to special libraries shall be diversified from their traditional library activities in order to adapt themselves to changes in time. The Blue Ocean Strategy can be successfully developed only if the activities of libraries have been changed so that they are closely related to those activities for which such affiliate organizations are expected to carry out.

Computing and Reducing Transient Error Propagation in Registers

  • Yan, Jun;Zhang, Wei
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.2
    • /
    • pp.121-130
    • /
    • 2011
  • Recent research indicates that transient errors will increasingly become a critical concern in microprocessor design. As embedded processors are widely used in reliability-critical or noisy environments, it is necessary to develop cost-effective fault-tolerant techniques to protect processors against transient errors. The register file is one of the critical components that can significantly affect microprocessor system reliability, since registers are typically accessed very frequently, and transient errors in registers can be easily propagated to functional units or the memory system, leading to silent data error (SDC) or system crash. This paper focuses on investigating the impact of register file soft errors on system reliability and developing cost-effective techniques to improve the register file immunity to soft errors. This paper proposes the register vulnerability factor (RVF) concept to characterize the probability that register transient errors can escape the register file and thus potentially affect system reliability. We propose an approach to compute the RVF based on register access patterns. In this paper, we also propose two compiler-directed techniques and a hybrid approach to improve register file reliability cost-effectively by lowering the RVF value. Our experiments indicate that on average, RVF can be reduced to 9.1% and 9.5% by the hyperblock-based instruction re-scheduling and the reliability-oriented register assignment respectively, which can potentially lower the reliability cost significantly, without sacrificing the register value integrity.

A Study on the Development of Comprehensive Evaluation Model for Korean University Libraries (국내 대학도서관의 평가모형 개발에 관한 연구)

  • 윤희윤
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.4
    • /
    • pp.45-75
    • /
    • 2001
  • University library is more than just a collection. In other words, it is an access point and gateway to a world-wide information. Therefore, the evaluation of hybrid library and information services should be recognized an essential management activity. The goal of this study is to develope a new evaluation model for Korean university libraries, based on the analysis of existing models and perception level of the shakeholder groups. As result of statistical analysis, the study suggested six evaluation domains, thirty-seven indicators, and the relative importance (weight) and measure criterion.

  • PDF