• Title/Summary/Keyword: shared object

Search Result 149, Processing Time 0.021 seconds

Efficient Processing of k-Farthest Neighbor Queries for Road Networks

  • Kim, Taelee;Cho, Hyung-Ju;Hong, Hee Ju;Nam, Hyogeun;Cho, Hyejun;Do, Gyung Yoon;Jeon, Pilkyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.79-89
    • /
    • 2019
  • While most research focuses on the k-nearest neighbors (kNN) queries in the database community, an important type of proximity queries called k-farthest neighbors (kFN) queries has not received much attention. This paper addresses the problem of finding the k-farthest neighbors in road networks. Given a positive integer k, a query object q, and a set of data points P, a kFN query returns k data objects farthest from the query object q. Little attention has been paid to processing kFN queries in road networks. The challenge of processing kFN queries in road networks is reducing the number of network distance computations, which is the most prominent difference between a road network and a Euclidean space. In this study, we propose an efficient algorithm called FANS for k-FArthest Neighbor Search in road networks. We present a shared computation strategy to avoid redundant computation of the distances between a query object and data objects. We also present effective pruning techniques based on the maximum distance from a query object to data segments. Finally, we demonstrate the efficiency and scalability of our proposed solution with extensive experiments using real-world roadmaps.

An Efficient On-the-fly Repairing System of Order Violation Errors for Health Management of Airborne Software (항공기 소프트웨어의 건전성 관리를 위해서 순서 위배 오류를 자율 수리하는 효율적인 시스템)

  • Kim, Tae-Hyung;Choi, Eu-Teum;Jun, Yong-Kee
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.10
    • /
    • pp.821-829
    • /
    • 2020
  • Health management system of airborne software repairs runtime errors to provide safety and to reduce cost of maintenance. It is critical to on-the-fly repair order violation errors, because it is difficult to identify them at the development phase. Previous work, called Repairing Atomicity Violations (Repairing-AV) diagnoses order violations for each access event by comparing execution order of accesses. As a result, Repairing-AV has time overhead that is proportional to the number of access events to shared variable. This paper presents a tool called On-the-fly Repairing System (ORS) that can repair order violations of object methods containing access events. The ORS diagnoses order violations by using correct order of object methods, and treats them by stalling its thread where the error is about to occur. Experimentation with five synthetic programs shows that ORS is more efficient than Repairing-AV when the number of access events is greater than sixty.

Information Acquisition of Simulation Objects by Resolution in Multi-resolution Model based War Game (다중 해상도 모델 기반 워게임 체계에서 해상도별 모의 객체의 정보 획득)

  • Bae, Hyun Shik;Rhee, Eun joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.147-154
    • /
    • 2018
  • In this paper, we propose methods to acquire enemy object information, which is frequently required in multi-resolution model based war game and affects the simulation performance. In the information request method, a multi-resolution model selects information of a specific resolution and provides them to external objects. In the information announcement method, a multi-resolution model announces all information, and external objects select information of a specific resolution. In the information sharing method, external objects obtains information of a specific resolution by inquiring all information of a multi-resolution model which are stored in a shared space. Simulation results show that the information sharing method is more efficient than the information request method and the information announcement method because the information acquisition is fast. In addition, the proposed methods will increase the efficiency of war game operation by shortening the time for acquiring enemy forces' information.

Henry James's The Turn of the Screw: The Subject and the Ontological Status of the Real Gaze

  • Kim, Kyung-Soon
    • Journal of English Language & Literature
    • /
    • v.57 no.6
    • /
    • pp.999-1016
    • /
    • 2011
  • In The Turn of the Screw, the go'erness encounters with the apparitions that harrow her throughout the story: she sees a frightening male ghost that Mrs. Grose identifies as Peter Quint, deceased former 'alet of the children's uncle, who had pre'iously shared the charge of the children with the pre'ious go'erness, Miss Jessel. The appearance of the ghosts hails the go'erness and thereby forces her to be jarred out of the comfortable habits of indi'iduality and plunged into a negati'ity de'oid of the socio-normati'e directi'es and guarantees. Such an encounter shows the idea that consciousness is a plenum of existence e'ocati'e of human mind as a decentered pandemonium. For the go'erness in The Turn of the Screw, the foundation to force her to experience the uncanny, as an inconsistency in the symbolic order, is particular. Its particularity is absolute in the same way e'ery one of us dreams his or her world. It resists mediation and cannot be made part of a symbolic medium. Just as Lacan's conceptions of desire, feminine sexuality, 'Object a,' not-whole, sla'ery, mastery, self-deception, authenticity, and act of psychoanalysis help us understand our contradictory social reality, so does The Turn of the Screw help us make sense of the way the go'erness, as the being who is capable of raising the question of being, questions the idea of being. In conclusion, the particular way the go'erness dreams her world is e'ocati'e of an excessi'e being, an anatomical complement, and a particular experience, such as the go'erness's encounter with the ghosts testifies to a knowledge that escapes the knowledge of the speaking being.

An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID (해쉬된 태그ID와 대칭키 기반의 RFID 인증프로토콜)

  • Park, Yong-Soo;Shin, Ju-Seok;Choi, Myung-Sil;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.669-680
    • /
    • 2009
  • By identifying the unique information of the objects using the RF, the RFID technique which will be able to manage the object is spot-lighted as the main technology in Ubiquitous era. On RFID systems, since the information of RFID may easily be unveiled in air, the secure and privacy problems always exist. In this paper, we propose mutual authentication protocol based on symmetric key. Proposed protocol has been able to minimize the tag's H/W resource by using symmetric key. And we use tag ID which is encrypted with hash function and a shared symmetric key by Challenge-Response pair of PUF(Physically Unclonable Function), thus there is no key disclosure problem in our protocol.

The Types and Features of Gestures in Science Discourse of Elementary Students (초등학생의 과학 담화에서 나타나는 몸짓의 유형과 특징)

  • Na, Jiyeon;Song, Jinwoong
    • Journal of Korean Elementary Science Education
    • /
    • v.31 no.4
    • /
    • pp.450-462
    • /
    • 2012
  • Gestures are a common phenomenon of human communication. There exists little research concerned with the gestures in science education, and most researches of gestures have focused on individual gestures. However, learning occurs through sociocultural interactions with friends, family, teachers, and others in society. Hence, the purpose of this study was to investigate and identify the types and features of gestures which were made by elementary students to communicate with peers in science discourse. A group of six fourth-graders was observed in eight science discourses where they talked about ideas related to thermal concepts. The data was collected through interviews and questionnaires. The analysis of the data showed that students' gestures in science discourses could be classified into seven types: signal iconic gesture, illustrative iconic gesture, personal deictic gesture, object deictic gesture, beat gesture, emotional metaphoric gesture, and content metaphoric gesture. It was also found that these gestures had functions of repeating, supplementing, and replacing utterance to communicate with others. Students frequently expressed scientific terms metaphorically as everyday terms through their gestures. Gestures were shared, imitated, and transferred in the communication process, and students' gestures also made influence on other students' ideas through these processes.

A Study on the XML/EDI (XML/EDI에 관한 고찰)

  • 전순환
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.109-124
    • /
    • 2001
  • Electronic Data Interchange (EDI) has been used for business-to-business communication for almost a quarter of a century. Initial efforts Involved inter-company agreements on how to exchange commercial data, initially as information stored on tape and later as messages sent over dedicated data lines. To avoid having to use different protocols to move data between different companies, various Industry groups identified sets of data that could form the basis of individual agreements. The industry groups also sought to agree the format in which fields in such data sets were interchange so that a company only needed to develop one methodology for decoding information received without resource to human intervention. The XML/EDI specific components are built on top of existing standards for transmitting and processing XML-encoded data. These standards define shared features such as: the standard Internet file storage/naming and data transport mechanisms, file and message transfer formats, the syntax of data coded in XML, the way in which XML files can be validated by an XML parser or document object model generator, the way in which XSL presentation and data evaluation scripts can be associated with parsed objects, the use of rules and data management robots to manage application and repository interfaces.

  • PDF

Users' Design Process in Immersive Environments (몰입형 환경에서의 사용자 디자인 과정에 관한 연구)

  • Cho, Myung Eun;Kim, MI Jeong
    • Korean Institute of Interior Design Journal
    • /
    • v.26 no.2
    • /
    • pp.64-71
    • /
    • 2017
  • The purpose of this study is to investigate the potential of immersive environments in the design domain by analyzing students' design process in immersive environments from cognitive and experiential aspects. To do this, we reviewed major concepts and theories such as users' immersion, participation, presence, and awareness and developed a comprehensive conceptual framework of immersive shared environments. In three different visualization systems of HIVE, teams consisting two students were assigned to design tasks and the design process was analyzed by a customized framework. The characteristics of the immersive environment related to the performance of the design task were different from those of the previous studies. The perception of the relationship between the spaces is very important, and the perception of the surrounding objects is interested in the shape or the material such as whether the object is flat or inclined. Also, it is found that the multi-technology of immersive environments is very useful for creative collaboration. In the future, a more comprehensive analysis of the effects on design decisions in a more diverse visual interface condition and the effects on more diverse design areas should be added.

Data Control Methods of Online Application based on Multi-Platform (멀티 플랫폼 기반 온라인 응용의 데이터 제어 기법)

  • Kim, Jin-Deog;Jin, Kyo-Hong
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.4
    • /
    • pp.79-89
    • /
    • 2002
  • Several multi-user online applications which are operated by the existing fixed terminals(PC) are being changed into online application based on multi-platform operated by the several PC, PDA and mobile phones to perform concurrent works recently. The contents of current online application based multi-platform are, however, very unsophisticated because the applications don't consider the simultaneous accesses of shared data by multi-user and also the asymmetry of computing power and network bandwidth among each client. This paper proposed the methods of consistency control based on multi-platform, update propagation protocols among diverse clients, object management techniques which take the characteristics of mobile clients into account. We also implemented a chatting application based on multi-platform and it showed the proposed methods perform well.

  • PDF

Connection of PDM System and Web-Based CAE Supporting System for Small and Medium Enterprises (중소기업을 위한 제품정보관리 시스템과 웹기반 CAE 지원 시스템의 연동)

  • Bang, Je-Sung;Lee, Jai-Kyung;Han, Seung-Ho;Park, Seong-Whan;Lee, Tae-Hee
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.6
    • /
    • pp.459-468
    • /
    • 2008
  • A web-based Computer-Aided Engineering (CAE) supporting system is connected with a Product Data Management (PDM) system for Small and Medium Enterprises (SMEs) suffering from the lack of building hardware, software and related experts. An analysis of current business models and worksite requirements provides an improved process model and data to be shared between the PDM system and the CAE supporting system. Since all engineering tasks such as geometric modeling, mesh generation, static stress and modal analysis, and fatigue durability analysis are automated in the CAE supporting system, the user in charge of the CAE have only to configure the concerned values of design variables and result data through the web page. The existing Change Management module of the PDM system is modified for seamless data exchange, i.e. sending the Engineering Change Order (ECO) data to the CAE supporting system and receiving the CAE result data bark. The hi-directional data transfers between the PDM system and the CAE supporting system is made possible by adaptors bused on the Simple Object Access Protocol (SOAP). The current approach will be very helpful for SMEs that only have the PDM system and have no adequate infrastructure for CAE.