• Title/Summary/Keyword: information overload

Search Result 522, Processing Time 0.036 seconds

Exact analysis for overload of a charge-pump phase-locked loop (Charge-pump 위상 동기 회로의 과부하에 대한 정확한 해석)

  • 최은창;이범철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.12
    • /
    • pp.3069-3085
    • /
    • 1996
  • This paper shows an accurate charge-pump PLL model which considers the wave-form distortion in high speed operation of charge-pump PLL, the leakage current in loop filter, and a physical limit in charge-pump. With proposed model of charge-pump PLL, overload and stability are derived theoretically and the results are compared to the conventional model. Unlike the ideal charge-pump PLL that simplifies calculations, it is possible to analyze the transient-state and the steady-state at the same time with proposed accurate model. Thus, charge-pump over load, in the transient-state and the stead-state of charge-pump, is accuragely analyzed and the results are confirmed with simulation.

  • PDF

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

Study on the Relationship between Adolescents' Self-esteem and their Sociality -Focusing on the Moderating Effect of Gender -

  • Kim, Kyung-Sook;Lee, Duk-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.147-153
    • /
    • 2016
  • In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.

Bayesian Regression Modeling for Patent Keyword Analysis

  • Choi, JunHyeog;Jun, SungHae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.125-129
    • /
    • 2016
  • In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.

Development of Web-based Bio-Image Retrieval System (웨이블릿 변환을 이용한 실시간 화재 감지 알고리즘)

  • Cheong, Kwang-Ho;Ko, Byoung-Chul;Nam, Jae-Yeal
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.227-230
    • /
    • 2006
  • A content-based image retrieval system using MPEG-7 is designed and implemented in this thesis. The implemented system uses existing MPEG-7 Visual Descriptors. In addition, a new descriptor for efficient retrieval of bio images is proposed and utilized in the developed content-based image retrieval system. Comparing proposed CBSD(Compact Binary Shape Descriptor) with Edge Histogram Descriptor(EHD) and Region Shape Descriptor(RSD), it shows good retrieval performance in NMRR. The proposed descriptor is robust to large modification of brightness and contrast and especially improved retrieval performance to search images with similar shapes. Also proposed system adopts distributed architecture to solve increased server overload and network delay. Updating module of client efficiently reduces downloading time for metadata. The developed system can efficiently retrieve images without causing server's overload.

  • PDF

Effects of Bring Your Own Device (BYOD) Attributes on Work-to-life Conflict

  • Cong Qi
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.831-862
    • /
    • 2023
  • The rapid adoption of smartphones and tablets among employees has recently forced organizations to proactively embrace bring your own device (BYOD). The situation of COVID-19 makes the concept of BYOD even paramount. Allowing employees to bring their own mobile devices to the workplace has helped companies realize productivity gains and cost benefits. However, BYOD has also blurred the boundaries between work and personal life, thereby creating a stressful environment for employees (Doargajudbur and Hosanoo, 2023). This study explores the relationships between several BYOD attributes and investigates the effects of these attributes on work-to-life conflict. It contributes by introducing workplace connectivity after hours as a new dimension of BYOD attribute to influence work-to-life conflict. Based on boundary theory, a theoretical model is developed and tested with an online survey. The results reveal that flexibility and workplace connectivity after hours positively influence productivity, and flexibility helps to relieve instead of increase work overload. Meanwhile, a higher level of flexibility and productivity can help reduce work-to-life conflict, and a higher level of work overload induces a higher level of work-to-life conflict.

A Methodology of Conjoint Segmentation for Internet Shopping Malls Using Customer's Surfing Data (인터넷 쇼핑몰 방문자의 행위 분석을 이용한 컨조인트 시장세분화 방법론에 대한 연구)

  • Lee, Dong-Hoon;Kim, Soung-Hie
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.04a
    • /
    • pp.187-196
    • /
    • 2000
  • A lot of Internet shopping malls strive for obtaining a competitive advantage over others in an increasingly tighter electronic marketplace. To this end, understanding customer preference toward products (or services) and administering appropriate marketing strategy is essential for their continuous survival. However, only a few marketing researchers and practicioners focused on this issue, compared with academic and industry efforts devoted to traditional market segmentation. In this paper, we suggest a methodology of conjoint segmentation for electronic shopping malls. Traditional market segmentation methodologies based on customer's profile sometimes fail to utilize abundant information given while navigating around cyber shopping malls. In this methodology, we do not impose information overload to the customer for preference elicitation, but this methodology, we do not impose information overload to the customer for preference elicitation, but capture automatically generated surfing or buying data and analyze them to get useful market segmentation information. The methodology consists of 4-stages: 1) analyzing legacy homepages, 2) data preparation, 3) estimating and interpreting the result, and 4) developing marketing mix. Our methodology was to give useful guidelines for market segmentation to companies working in the electronic marketplace.

  • PDF

Extended Service Filtering Technique for Overload Control of Televoting Service Required for the Specialized Resources of Intelligent Peripheral (지능형 정보제공 시스템의 특수 지원을 이용하여 제공되는 전화투표 서비스의 과부하 제어를 위한 확장된 서비스 필터링 기법)

  • Jeong, Gwang-Je
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1727-1738
    • /
    • 1996
  • This paper proposes a extended service filtering technique to solve overload control problems inService Con-trol Poin(SCP) due to Televoting (VOT) services with heavy traffic characteristics. Also, this paper compares this new technique with existing IN overload control lechniques, and calculate steady state call blocking probabilities in In under overload conditions. The proposed technique considers SCP overload and IN CS-1services such as VOT service that need to use the specialized resources of IP. This technique uses first an activating step which SCP sends service filtering request to SSP and IP for the start of service filtering. Then, in the filtering step SSP sendas filtering results to SCP periodically or each N-calls.Also,when filtering time-out timer expired or call counter value exceeded maximum number of calls,SSP stops service filtering,and sends ser-vice filteing response to SCP in the deactivating step. The application of this techique to VOT service defined in IN CS-1 service is investigated and analyzed by using an analytical VOT service model.In order to apply this technique to VOT service, this paper also discusses VOT service and the corresponding N architecture including Service Switching Point(SSP),SCP and IP. Then this paper also constructs an analytical VOT service model,and calculates SCP and SSP/IP(circuit)call blocking probablities.With the application of this new technique,this paper shows good performance enhancements in SCP call blocking probability.

  • PDF

Performance Analysis of a Cell - Cluster - Based Call Control Procedure for Wireless ATM Networks (셀집단화 방식에 근거한 무선 ATM 호제어절차의 성능분석)

  • Cho, Young-Jong;Kim, Sung-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1804-1820
    • /
    • 1997
  • In this paper, an efficient call control procedure is presented for next generation wireless ATM networks and its performance is mathematically analyzed using the open queueing network. This procedure is based on a new scheme called as the cell clustering. When we use the cell clustering scheme, at the time that a mobile connection is admitted to the network, a virtual cell is constructed by choosing a group of neighboring base stations to which the call may probabilistically hand over and by assigning to the call a collection of virtual paths between the base stations. Within a microcell/picocell environment, it is seen that the cell clustering can support effectively a very high rate of handovers, provides very high system capacity, and guarantees a high degree of frequency reuse over the same geographical region without requiring the intervention of the network call control processor each time a handover occurs. But since mobiles, once admitted, are free to roam within the virtual cell, overload condition occurs in which the number of calls to be handled by one base station to exceed that cell site's capacity of radio channel. When an overload condition happens, the quality of service is abruptly degraded. We refer to this as the overload state and in order to quantify the degree of degradation we define two metrics, the probability of overload and the normalized average time spent in the overload state. By using the open network queueing model, we derive closed form expressions for the maximum number of calls that can be admitted into the virtual cell such that the two defined metrics are used as the acceptance criteria for call admission control.

  • PDF

Valuing the Water Quality Changes in Paldang Watershed: Using New Water Quality Classification Criteria and Indices (새로운 분류체계를 이용한 수질변화의 경제적 가치 추정)

  • Kim, Yong-Joo;Yoo, Young Seong
    • Environmental and Resource Economics Review
    • /
    • v.17 no.4
    • /
    • pp.875-901
    • /
    • 2008
  • This article estimates the economic values of changes in water quality of the Paldang Watershed by using the Choice Experiment (CE). The conditional logit model estimation results show that a small improvement in water quality from the 'status quo' level to the level of 'very good' increases average household's monthly utility by 3,157 Won, whereas a water quality degradation down to the 'normal' level gives rise to an increase in the monthly average utility by 9,649 Won. The corresponding social gain and loss of water quality changes to the Metropolitan Area were thus estimated about 285 billion Won and 872 billion Won, respectively. This article seems meaningful in that it resorts to the new water ecosystem classification criteria and indices that are respondent-friendly. They help a CE study like this to overcome one of its critical weakness that the number and contents of attributes of a CE study can quickly add to the information overload problem, especially where the environmental good under investigation is hard for ordinary respondents to understand.

  • PDF