In this paper, an efficient P2P personal broadcasting system, the node placement is proposed for the modeling system. P2P systems offer a personal broadcasting system, the placement of the nodes in the position analysis of how to effectively discern. Acceptable before the expected entry of new nodes and new nodes after viewership expected number of viewers can be accommodated through a comparison analysis of the effectiveness of deployed nodes, analyze the efficiency of the algorithm the nodes are placed. Thisanalysisusesthesystemtoan efficientnodeplacementalgorithmcan be usedas criteria toevaluate.
This paper presents the process that visual image translate to tactile image for blind people. People with visual disabilities through a computer or photo that has been implicated in a lot of information is difficult to acquire. In this study, for those who are visually impaired visual images into tactile images to model the process. Produced models photos, maps, mathematical formulas, such as the specific meaning of the visual image into a tactile image is a process and transmit information. If amount of information of visual image delivered to amouont of tactile user are confused. As a result, to convey the information that could be delivered to the wrong information. As the need for visual images to simplify the image by image processing due to a lot of information was chosen to reduce confusion. Models for different types of visual images as a result of the process through which it is appropriate to switch to the tactile image, the elements and the process can be predicted.
Generally, In a application program the core part for parallel processing is a loop. Because the loop exists data dependencies between the array index variable of a loop. Specially, the data dependence relations between statements which of variable or constant dependence distance are very complex. In this paper propose procedure transformation Algorithm which can be apply to non-uniform code. A performance test results show the proposal scheme is superior to conventional method.
As increasing the attacks for web site, the importance of security is highlighted. Also the need for collecting attack information and analysis method is increased. Therefore this paper that will be studied to storage and analysis methods of effective of enormous attack traffic. The kind of research is to methods of stored of attacks type of Raw Traffic and the classification according to the type to traffic of attacks. If you take advantage of this paper can be used as guidelines for collecting website attack information analysis in the future.
As the density of memory chips increases, the probability of having defective components is also increased. However, in case of a small number of defects, it is desirable to reuse a defective die after repair rather than to discard it, because reuse is an essential element for memory device manufactures to cut costs effectively. As for the conventional RA process, it was impossible to know whether a defect could be repaired before the result of the main cell type analysis was obtained. However, in the CRA simulation, a database of each fail type analysis is already in place. Therefore by correlating the data with the fail type we can reduce the whole process of the analysis. In EDS redundancy analysis, time spent in tests and in the RA process is directly connected to cost. Due to the technological developments in the semiconductor industry, memory volume is increasing and the unit price per volume is decreasing. As bigger volume means more various fail types, The CRA simulation will be an effective alternative to save time in the RA process.
Recently there has been a great interest in system configuration on and cloud computing using server virtualiztion techniques. Existing open source server virtualization techniques have been widely used due to their advantage of inexpensiveness. However, there has been almost no effort into analysis of the resource usage and performance for the virtualization. This paper presents a criterion of selecting an efficient sever virtualization technique through the comparison and analysis of the usage of CPU, memory and disk space when applying three most widely used open source server virtualization techniques, Xen, KVM and VirtualBox on an enterprise level Linux system.
CC(Common Criteria) requires to collect vulnerability information and vulnerability analysis by using penetration testing for evaluating IT security products. However, CC has been criticized from developers or QA managers due to its complexity of terms, abstract description of evaluation methods and non-existence of guidelines. In this paper, we propose a guideline of vulnerability assessment for developers and evaluators by analyzing and summarizing of its requirements and processes defined in CC. To do this, we classify the evaluation process of AVA assurance family into 4 parts and describe each evaluation working systematically unit under every steps.
Korea's IT industry have a high potential because they are already built comprehensive IT-related infrastructure through manufacturing, communications, etc. However, compared to the size of the global IT services market, global competitiveness of the Korea IT services are insufficient. In this paper, we aim to do strategy research to seek the direction of the IT industry for activating IT industry. We studied a scheme with mobile ecosystem elements such as smart phones and appstore for stakeholder in the mobile ecosystem can engage in a business. We proposed the various environment based on Service Science for the Content, Platform, Network, Terminal operators in the mobile ecosystem to promote coopetition and coevolution. The results of this research will provide meaningful knowledge about how the mobile ecosystem components play a role in the business ecosystem and what they should make preparation for business model.
he quality service with the fewer price is only one way to satisfy the citizen in e-government system. So far, the quality depends upon the money like “Better quality if better money”. Most of the services are compromised due to financial constraints. The unpredictable financial structures are always hurdles in providing quality service. E-government could not escape from such unpredictable financial structure especially in global economic crisis. In 2008-2009, entire world was under the shadow of economic crisis and till today many countries have not recovered yet. Like other project, e-government related projects are also deeply affected by the crisis. It has given a lesson to the policy makers and stakeholders to think seriously in this regards of sustainability in spite of economic crisis. We use Software-as-a-Service to provide quality service in a minimum affordable cost in this paper. At the end of this paper, we set up the cloud environment and perform the experiment on it.
Understanding computer and information technology is very important in today's society. In this context, many non-computer science major undergraduates take computer programming language course in their school. However, elementary programming language classes generally concentrate on introducing syntax, and even writing a simple program is very difficult to many undergraduates who have completed such classes. Non-computer science majors and novice learners often have trouble in understanding and applying the flow of control such as iteration, which is a major barriers to learning programming. This paper identifies the basic principles hidden in the example source codes related with basic flow of control and proposes a strategy for programming language instruction and learning contents design. This strategy is expected to help the learners to develop problem-solving and logical thinking capabilities.
The current trend in farming in Korea is to develop the U-farming environmental control system in order to help farmers who are short handed due to the acceleration of aging local population and de-industrialization. However, it is difficult to provide high-priced equipments to farmers. The existing systems with a temperature control system are limited to handle the controllers installed inside the greenhouses for the monitoring and control of the systems. In this study, the systems are designed to collect various information related to the U-farming environmental control system, such as temperature, moisture, CO2 and so on. Furthermore, they are designed to be monitored and controlled by not only the controllers in the greenhouses but also the smart phones. These systems are designed to be used by any farmers with low-priced servers and sensors and to be controlled using the wireless sensor network.
This paper proposes a user friendly text editing interface that can be used in a cloud computing systems. The problem with the current text editor is that its functions are complicated and additional expenses are needed due its slow processing and lack of system resources. Often times, the additional expenses along with functions that are not used cause the entire system to become slower. The objective of this thesis is to cultivate the strengths and eliminate unnecessary features of the current text editor, thus embodying a text editor that can be used without difficulty in systems with low specifications and cloud computing systems by using object-oriented programming language and API.
The structure of separated shielding coil(SSC) is analyze and it goes, the magnetic field of the center cause is calculated and the result is confirmed through the simple experiment. In case of considering the materials for shielding of the separated shielding coil as the iron sheet it compares with the case which is not shielded and it measures actually and the shielding factor is found and we define to the numerical formula. It is the object that it is seen like the brush less direct current (BLDC) pulse there is no sensor using SSC and without the brush that acceleration control of the ferromagnetic ball is possible.
We analyze the trend of an e-paper according to the reported papers mainly by researching group of university not by industrial area. For the paper analysis we classify the driving method, a color image presentation method, and the electrode structure, and used Scopus database of Elsevier as a research tool. After 1999, the number of paperson e-paper are abruptly increased and the major area of paper is related to the electrophoretics, but the colorization research have been proceeded. We ascertain the researching method is mainly by the color particle not by the color filter based on LCD. This result is opposite to the trend of LCD on a general industry and regarded to a suggestion of colorization method of e-paper.
We developed the remote bridge monitoring system for safety surveillance based on web. BMSWare(Bridge Management System Middleware) was implemented as a middle ware to process the sensor data in real time. The developed system operates on web, so the system can be used as a general safety surveillance system for bridges. In various environments according to geographical locations, it can obtain reliable data from various loggers and sensors without re-programming. The main functions of the system include the data acquisition, processing, backup and wireless transmission of the collected data. It was proved reliability and effectiveness of the monitoring system by application of real bridge(Mooyeong bridge).
In the E-commerce environment, performance improvement is one of the main issues in the field of product recommendation systems. Collaborative filtering is a successful and popular method for recommender systems. It has some fundamental problems for new customer or new product recommendation. Recently, some studies using social network analysis has been presented to solve the problems. There are various analysis methods in the field of the social networks. Degree centrality and structural holes of them has been used mainly for recommender systems. This study suggested a methodology for performance improvement of the collaborative filtering process using degree centrality and structural holes methods. In experimental results for MovieLens datasets, this study showed the proposed methodology using structural holes can improve the performance of the recommendation system.
The purpose of this study is to examine the factors influencing technical performance of software companies. This model tests various theoretical research hypotheses related to entrepreneur's characteristics, technology strategy characteristics and environmental characteristics. After removing the unsuitable questionnaires, a total of 100 survey data were considered to be analyzed. The result of hypothesis testing is as follows. First, innovation, risk-taking, SW product development strategy positively influence patent degree. Second, innovation, risk-taking, SW product strategy, market uncertainty positively influence R&D degree.
The advent of "Smartphone" – thought as a handheld computer integrated with a mobile telephone and innate to access Internet –leads to raise an infinite potential of mobile software markets, and thus huge smartphone markets naturally formed, which later become a competitive area. In this paper, we design an UX-oriented Android-based virtual mobile school application which allows users to have virtual experiences of using school facilities by providing corresponding information, in advance. That is, the application purposes to provide an overview and detail information to use school facilities. In addition, the method to disseminate such information is based on social networks and designed to facilitate communication in social groups.