首页 > 最新文献

The Kips Transactions:partd最新文献

英文 中文
Association Rule Discovery Considering Strategic Importance: WARM 考虑战略重要性的关联规则发现:WARM
Pub Date : 2010-08-31 DOI: 10.3745/KIPSTD.2010.17D.4.311
D. Choi
This paper presents a weight adjusted association rule mining algorithm (WARM). Assigning weights to each strategic factor and normalizing raw scores within each strategic factor are the key ideas of the presented algorithm. It is an extension of the earlier algorithm TSAA (transitive support association Apriori) and strategic importance is reflected by considering factors such as profit, marketing value, and customer satisfaction of each item. Performance analysis based on a real world database has been made and comparison of the mining outcomes obtained from three association rule mining algorithms (Apriori, TSAA, and WARM) is provided. The result indicates that each algorithm gives distinct and characteristic behavior in association rule mining.
提出了一种权重调整关联规则挖掘算法(WARM)。该算法的关键思想是为每个策略因子分配权重并对每个策略因子内的原始分数进行归一化。它是早期算法TSAA(传递支持关联Apriori)的扩展,通过考虑每个项目的利润、营销价值和客户满意度等因素来反映战略重要性。基于真实数据库进行了性能分析,并对三种关联规则挖掘算法(Apriori、TSAA和WARM)的挖掘结果进行了比较。结果表明,在关联规则挖掘中,每种算法都具有不同的特征。
{"title":"Association Rule Discovery Considering Strategic Importance: WARM","authors":"D. Choi","doi":"10.3745/KIPSTD.2010.17D.4.311","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.4.311","url":null,"abstract":"This paper presents a weight adjusted association rule mining algorithm (WARM). Assigning weights to each strategic factor and normalizing raw scores within each strategic factor are the key ideas of the presented algorithm. It is an extension of the earlier algorithm TSAA (transitive support association Apriori) and strategic importance is reflected by considering factors such as profit, marketing value, and customer satisfaction of each item. Performance analysis based on a real world database has been made and comparison of the mining outcomes obtained from three association rule mining algorithms (Apriori, TSAA, and WARM) is provided. The result indicates that each algorithm gives distinct and characteristic behavior in association rule mining.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130441833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Test Data Generation for Testing Programs with Multi-level Stack-directed Pointers 自动测试数据生成测试程序与多层次堆栈定向指针
Pub Date : 2010-08-31 DOI: 10.3745/KIPSTD.2010.17D.4.297
I. Chung
Recently, a new testing technique called concolic testing receives lots of attention. Concolic testing generates test data by combining concrete program execution and symbolic execution to achieve high test coverage. CREST is a representative open-source test tool implementing concolic testing. Currently, however, CREST only deals with integer type as input. This paper presents a new rule for automated test data generation in presence of inputs of pointer type. The rules effectively handles multi-level stack-directed pointers that are mainly used in C programs. In addition, we describe a tool named vCREST implementing the proposed rules together with the results of applying the tool to some C programs.
最近,一种新的测试技术被称为结肠测试受到了广泛的关注。Concolic测试通过结合具体的程序执行和符号执行来生成测试数据,从而达到较高的测试覆盖率。CREST是一个具有代表性的开源测试工具。然而,目前CREST只处理整数类型的输入。本文提出了一种在存在指针型输入时自动生成测试数据的新规则。这些规则有效地处理了主要在C程序中使用的多级堆栈指向指针。此外,我们还描述了一个名为vCREST的工具来实现所提出的规则,以及将该工具应用于一些C程序的结果。
{"title":"Automated Test Data Generation for Testing Programs with Multi-level Stack-directed Pointers","authors":"I. Chung","doi":"10.3745/KIPSTD.2010.17D.4.297","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.4.297","url":null,"abstract":"Recently, a new testing technique called concolic testing receives lots of attention. Concolic testing generates test data by combining concrete program execution and symbolic execution to achieve high test coverage. CREST is a representative open-source test tool implementing concolic testing. Currently, however, CREST only deals with integer type as input. This paper presents a new rule for automated test data generation in presence of inputs of pointer type. The rules effectively handles multi-level stack-directed pointers that are mainly used in C programs. In addition, we describe a tool named vCREST implementing the proposed rules together with the results of applying the tool to some C programs.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114930696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Effects of Government Promoting Policies for IPTV Adoption 政府促进IPTV普及的政策效果分析
Pub Date : 2010-06-30 DOI: 10.3745/KIPSTD.2010.17D.3.233
B. Lee, Hyunsik Seo, Sungjoon Lee, Jun Ho Kim
ABSTRACT This research aims to examine the efficiency and effectiveness of the governmental policies promoting IPTV by verifying their influences on the adoption empirically. The government unveiled several policies including creating demands in public sectors, developing diverse public contents, subsidizing the production of converged contents, easing the regulations to promote IPTV industry. While a lot of previous literature has already proved that a system quality, a content quality, and a perceived price have influences on the adoption of IPTV, the effects of governmental policies are not well understood despite of their contributions to the adoption. Rather, most of existing research on governmental policies in the context of technology adoption have focused on regulatory frameworks. The results of the study show that governmental policies have influences on consumers' perceived system quality and content quality. It is also found that perceived system quality, content quality and perceived price have influences on adoption intention. This study can contribute to the field in a way that it proves the important roles of governmental policies in the diffusion of new technologies including IPTV.Keywords:IPTV, Government Promoting Policies, TAM, SEM
本研究旨在通过实证验证政府政策对IPTV普及的影响,来检验政府政策促进IPTV发展的效率和有效性。政府为促进IPTV产业的发展,出台了创造公共领域需求、开发多样的公共内容、补贴融合内容制作、放宽限制等政策。虽然许多先前的文献已经证明了系统质量、内容质量和感知价格对IPTV的采用有影响,但政府政策的影响并没有得到很好的理解,尽管它们对采用做出了贡献。相反,大多数关于技术采用背景下政府政策的现有研究都集中在监管框架上。研究结果表明,政府政策对消费者感知的系统质量和内容质量都有影响。感知系统质量、内容质量和感知价格对采用意愿有影响。这项研究证明了政府政策在包括IPTV在内的新技术传播中的重要作用,从而对该领域有所贡献。关键词:IPTV,政府促进政策,TAM, SEM
{"title":"Analyzing Effects of Government Promoting Policies for IPTV Adoption","authors":"B. Lee, Hyunsik Seo, Sungjoon Lee, Jun Ho Kim","doi":"10.3745/KIPSTD.2010.17D.3.233","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.233","url":null,"abstract":"ABSTRACT This research aims to examine the efficiency and effectiveness of the governmental policies promoting IPTV by verifying their influences on the adoption empirically. The government unveiled several policies including creating demands in public sectors, developing diverse public contents, subsidizing the production of converged contents, easing the regulations to promote IPTV industry. While a lot of previous literature has already proved that a system quality, a content quality, and a perceived price have influences on the adoption of IPTV, the effects of governmental policies are not well understood despite of their contributions to the adoption. Rather, most of existing research on governmental policies in the context of technology adoption have focused on regulatory frameworks. The results of the study show that governmental policies have influences on consumers' perceived system quality and content quality. It is also found that perceived system quality, content quality and perceived price have influences on adoption intention. This study can contribute to the field in a way that it proves the important roles of governmental policies in the diffusion of new technologies including IPTV.Keywords:IPTV, Government Promoting Policies, TAM, SEM","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development Process Improvement of Open-market System by using Agile Methodology 用敏捷方法改进开放市场系统的开发过程
Pub Date : 2010-06-30 DOI: 10.3745/KIPSTD.2010.17D.3.203
Yong-hee Lee, Gun-ho Lee
This study improves the productivity of software development of open-market systems using agile methodology. The current processes of an open-market system are analyzed and inefficient processes are identified which are changed by applying the agile practice principles in Lean software. This study analyzes the process lead times and defects after the processes are changed to see the improvement effect.
本研究利用敏捷方法提高了开放市场系统的软件开发效率。分析了开放市场系统的当前流程,并通过在精益软件中应用敏捷实践原则来识别低效流程。本研究分析了工艺变更后的工艺交货期和缺陷,以观察改进效果。
{"title":"Development Process Improvement of Open-market System by using Agile Methodology","authors":"Yong-hee Lee, Gun-ho Lee","doi":"10.3745/KIPSTD.2010.17D.3.203","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.203","url":null,"abstract":"This study improves the productivity of software development of open-market systems using agile methodology. The current processes of an open-market system are analyzed and inefficient processes are identified which are changed by applying the agile practice principles in Lean software. This study analyzes the process lead times and defects after the processes are changed to see the improvement effect.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance 信息安全体系结构的构成和安全活动对信息资产保护和组织绩效的影响
Pub Date : 2010-06-30 DOI: 10.3745/KIPSTD.2010.17D.3.223
Guhyeon Jeong, Donggyu Yi, S. Jeong
ABSTRACT This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance. Keywords:Architecture Configuration, Security Activities, Information Asset Protection, Organizational Performance
摘要本研究旨在从一般信息安全的角度探讨信息安全架构的构成和安全活动对信息资产保护和组织绩效的影响。本研究对300名政府、公共机构和私营企业的工作人员进行了调查,结果表明,风险识别和风险分析的管理因素总体上对信息安全架构的组成和安全活动有帮助,以防止内部信息泄露。拒绝了对IT体系结构及其组件的理解和培训因素,要求信息安全体系结构的组成和安全活动受到限制。换句话说,从大多数机构和组织引入和操作信息安全体系结构,并在其中限制性地开展培训的现实来看,对体系结构及其组成部分作为一个自变量的新认识的培训是如此重要,或者它没有像广义过程那样对信息安全的控制或管理活动有很大的贡献。但是严格的安全活动通过风险识别和风险分析管理的泛化对组织绩效有很大的影响。关键词:架构配置、安全活动、信息资产保护、组织绩效
{"title":"The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance","authors":"Guhyeon Jeong, Donggyu Yi, S. Jeong","doi":"10.3745/KIPSTD.2010.17D.3.223","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.223","url":null,"abstract":"ABSTRACT This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance. Keywords:Architecture Configuration, Security Activities, Information Asset Protection, Organizational Performance","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134303891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying Particle Swarm Optimization for Enhanced Clustering of DNA Chip Data 应用粒子群算法增强DNA芯片数据聚类
Pub Date : 2010-06-30 DOI: 10.3745/KIPSTD.2010.17D.3.175
Minsoo Lee
Experiments and research on genes have become very convenient by using DNA chips, which provide large amounts of data from various experiments. The data provided by the DNA chips could be represented as a two dimensional matrix, in which one axis represents genes and the other represents samples. By performing an efficient and good quality clustering on such data, the classification work which follows could be more efficient and accurate. In this paper, we use a bio-inspired algorithm called the Particle Swarm Optimization algorithm to propose an efficient clustering mechanism for large amounts of DNA chip data, and show through experimental results that the clustering technique using the PSO algorithm provides a faster yet good quality result compared with other existing clustering solutions.
DNA芯片的使用使得基因实验和研究变得非常方便,它提供了大量来自各种实验的数据。DNA芯片提供的数据可以表示为一个二维矩阵,其中一个轴代表基因,另一个轴代表样本。通过对这些数据进行高效、高质量的聚类,可以提高后续分类工作的效率和准确性。本文采用仿生算法粒子群优化算法(Particle Swarm Optimization algorithm)对大量DNA芯片数据提出了一种高效的聚类机制,并通过实验结果表明,与现有的其他聚类方案相比,采用粒子群算法的聚类技术提供了更快且质量更好的聚类结果。
{"title":"Applying Particle Swarm Optimization for Enhanced Clustering of DNA Chip Data","authors":"Minsoo Lee","doi":"10.3745/KIPSTD.2010.17D.3.175","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.175","url":null,"abstract":"Experiments and research on genes have become very convenient by using DNA chips, which provide large amounts of data from various experiments. The data provided by the DNA chips could be represented as a two dimensional matrix, in which one axis represents genes and the other represents samples. By performing an efficient and good quality clustering on such data, the classification work which follows could be more efficient and accurate. In this paper, we use a bio-inspired algorithm called the Particle Swarm Optimization algorithm to propose an efficient clustering mechanism for large amounts of DNA chip data, and show through experimental results that the clustering technique using the PSO algorithm provides a faster yet good quality result compared with other existing clustering solutions.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for Supporting Business Services based on the EPC Network 支持基于EPC网络的业务服务的框架
Pub Date : 2010-06-30 DOI: 10.3745/KIPSTD.2010.17D.3.193
Taewoo Nam, Keunhyuk Yeom
Recently, there have been several researches on automatic object identification and distributed computing technology to realize a ubiquitous computing environment. Radio Frequency IDentification (RFID) technology has been applied to many business areas to simplify complex processes and gain important benefits. To derive real benefits from RFID, the system must rapidly implement functions to process a large quantity of event data generated by the RFID operations and should be configured dynamically for changing businesses. Consequently, developers are forced to implement systems to derive meaningful high-level events from simple RFID events and bind them to various business processes. Although applications could directly consume and act on RFID events, extracting the business rules from the business logic leads to better decoupling of the system, which consequentially increases maintainability. In this paper, we describe an RFID business aware framework for business processes in the Electronic Product Code (EPC) Network. This framework is proposed for developing business applications using business services. The term "business services" refers to generated events that can be used in business applications without additional data collection and processing. The framework provides business rules related to data collection, processing, and management, and supports the rapid development and easy maintenance of business applications based on business services.
近年来,人们对自动目标识别和分布式计算技术进行了研究,以实现泛在计算环境。射频识别(RFID)技术已应用于许多业务领域,以简化复杂的流程并获得重要的好处。为了从RFID中获得真正的好处,系统必须快速实现处理由RFID操作产生的大量事件数据的功能,并且应该动态配置以适应不断变化的业务。因此,开发人员被迫实现从简单的RFID事件派生有意义的高级事件并将其绑定到各种业务流程的系统。尽管应用程序可以直接使用RFID事件并对其进行操作,但从业务逻辑中提取业务规则可以更好地解耦系统,从而提高可维护性。在本文中,我们描述了电子产品代码(EPC)网络中业务流程的RFID业务感知框架。这个框架是为使用业务服务开发业务应用程序而提出的。术语“业务服务”指的是可以在业务应用程序中使用的生成事件,而无需额外的数据收集和处理。该框架提供了与数据收集、处理和管理相关的业务规则,支持基于业务服务的业务应用程序的快速开发和易于维护。
{"title":"Framework for Supporting Business Services based on the EPC Network","authors":"Taewoo Nam, Keunhyuk Yeom","doi":"10.3745/KIPSTD.2010.17D.3.193","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.193","url":null,"abstract":"Recently, there have been several researches on automatic object identification and distributed computing technology to realize a ubiquitous computing environment. Radio Frequency IDentification (RFID) technology has been applied to many business areas to simplify complex processes and gain important benefits. To derive real benefits from RFID, the system must rapidly implement functions to process a large quantity of event data generated by the RFID operations and should be configured dynamically for changing businesses. Consequently, developers are forced to implement systems to derive meaningful high-level events from simple RFID events and bind them to various business processes. Although applications could directly consume and act on RFID events, extracting the business rules from the business logic leads to better decoupling of the system, which consequentially increases maintainability. In this paper, we describe an RFID business aware framework for business processes in the Electronic Product Code (EPC) Network. This framework is proposed for developing business applications using business services. The term \"business services\" refers to generated events that can be used in business applications without additional data collection and processing. The framework provides business rules related to data collection, processing, and management, and supports the rapid development and easy maintenance of business applications based on business services.","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128021844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Adaptive Sampling Technique based on the Kalman Filter for Sensor Monitoring 基于卡尔曼滤波的传感器监测自适应采样技术
Pub Date : 2010-06-30 DOI: 10.3745/KIPSTD.2010.17D.3.185
Minkee Kim, Jun-Ki Min
ABSTRACT In sensor network environments, each sensor measures the physical environments according to the sampling period, and transmits a sensor reading to the base station. Thus, the sample period influences against importance resources such as a network bandwidth, and a battery power. In this paper, we propose new adaptive sampling technique that adjusts the sampling period of a sensor with respect to the features of sensor readings. The proposed technique predicts a future readings based on KF (Kalman Fiter). By using the differences of actual readings and estimated reading, we identify the importance of sensor readings, and then, we adjust the sampling period according to the importance. In our experiments, we demonstrate the effectiveness of our technique. Keywords:WSN, Adaptive Sampling, Kalman Filter 1. 서 론 1) 무선 센서 네트워크 (Wireless Sensor Network: WSN) 는 제한된 전원을 지닌 수 백에서 수 천개의 센서들로 이루어져있다. 최근 마이크로 센서 기술과 무선 통신 기술의 발전으로 대량 저비용 센서들로 구성된 무선 센서 네트워크는 군사 보안, 환경 모니터링 등의 다양한 분야에 적용가능하게 되었다. WSN의 규모가 커지면서 기존의 대역폭, 배터리 등의 문제가 점점 더 대두되고 있는 시점이다. 제한된 대역
ABSTRACT In sensor network environments, each sensor measures the physical environments according to the sampling period, and transmits a sensor reading to the base station。Thus, the sample period influences against importance resources such as a network bandwidth, and a battery power。In this paper, we propose new adaptive sampling technique that adjusts the sampling period of a sensor with respect to the features of sensor readings。The proposed technique predicts a future readings based on KF (Kalman Fiter)。By using the differences of actual readings and estimated reading, we identify the importance of sensor readings, and then, we adjust the sampling period according to the importance。In our experiments, we demonstrate the effectiveness of our technique。Keywords:WSN, Adaptive Sampling, Kalman Filter 1。无线传感器网络(Wireless Sensor Network, WSN)由数百到数千个传感器组成,电源有限。最近随着微型传感器技术和无线通信技术的发展,由大量低成本传感器组成的无线传感器网络可以应用于军事保安、环境监测等多种领域。随着WSN的规模的扩大,现有的带宽、电池等问题正在逐渐抬头。有限的替身
{"title":"An Efficient Adaptive Sampling Technique based on the Kalman Filter for Sensor Monitoring","authors":"Minkee Kim, Jun-Ki Min","doi":"10.3745/KIPSTD.2010.17D.3.185","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.185","url":null,"abstract":"ABSTRACT In sensor network environments, each sensor measures the physical environments according to the sampling period, and transmits a sensor reading to the base station. Thus, the sample period influences against importance resources such as a network bandwidth, and a battery power. In this paper, we propose new adaptive sampling technique that adjusts the sampling period of a sensor with respect to the features of sensor readings. The proposed technique predicts a future readings based on KF (Kalman Fiter). By using the differences of actual readings and estimated reading, we identify the importance of sensor readings, and then, we adjust the sampling period according to the importance. In our experiments, we demonstrate the effectiveness of our technique. Keywords:WSN, Adaptive Sampling, Kalman Filter 1. 서 론 1) 무선 센서 네트워크 (Wireless Sensor Network: WSN) 는 제한된 전원을 지닌 수 백에서 수 천개의 센서들로 이루어져있다. 최근 마이크로 센서 기술과 무선 통신 기술의 발전으로 대량 저비용 센서들로 구성된 무선 센서 네트워크는 군사 보안, 환경 모니터링 등의 다양한 분야에 적용가능하게 되었다. WSN의 규모가 커지면서 기존의 대역폭, 배터리 등의 문제가 점점 더 대두되고 있는 시점이다. 제한된 대역","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Motivation-Reward Fit on Commitment and Knowledge Sharing Activities in Communities of Practice 动机-报酬契合对实践社区承诺和知识分享活动的影响
Pub Date : 2010-06-01 DOI: 10.3745/KIPSTD.2010.17D.3.209
Inhak Kim, Ji-hyeon Lee, Joon Koh, Hee-Woong Kim
ABSTRACT As the business competition between firms is getting intense, one of the sources of competitive advantage is effectively and efficiently to create, share, and apply information/knowledge among employees. Most of the firms which conduct knowledge management are operating a Community of Practice(CoP) in order to create, share and utilize this kind of information/knowledge resource. Recently, the CoP is getting out of its informal and spontaneous manner and is beginning to be led by the top management, receiving official support, in order to achieve the organization’s strategic goals. However, the corporation’s strategic operation of the CoP is not only against its original characteristics but also hampers the spontaneity of its participants. Every participant has different motivation to participate and different preference for reward type. This study, with the survey of 114 respondents, found that intrinsic motivation as well as extrinsic motivation significantly affect the motivation-reward fitness. Also, the motivation-reward fit was found to influence CoP commitment which ultimately leads to knowledge sharing activity in the CoP context. This research will help knowledge management companies to figure out how the two things of participants’ motivation and their reward types can fit together, and how such fitness ultimately affects the participants’ commitment and their knowledge sharing activities.Keywords:Community of Practice, CoP, Motivation, Reward Type, Commitment, Knowledge Sharing
随着企业间竞争的日益激烈,有效地创造、共享和应用信息/知识是企业竞争优势的来源之一。大多数进行知识管理的企业都在运营一个实践社区(CoP),以创建、共享和利用这类信息/知识资源。最近,CoP正在摆脱其非正式和自发的方式,开始由最高管理层领导,接受官方支持,以实现组织的战略目标。然而,企业对缔约方会议的战略运作不仅违背了缔约方会议的原有特征,而且阻碍了缔约方会议参与者的自发性。每个参与者都有不同的参与动机和不同的奖励类型偏好。本研究通过对114名被调查者的调查发现,内在动机和外在动机对动机-奖励适应度有显著影响。研究还发现,激励-报酬匹配会影响缔约方会议承诺,最终导致缔约方会议背景下的知识共享活动。本研究将有助于知识管理公司了解参与者的动机和报酬类型这两件事如何相互契合,以及这种契合最终如何影响参与者的承诺和他们的知识共享活动。关键词:实践共同体,CoP,动机,奖励类型,承诺,知识共享
{"title":"The Effect of Motivation-Reward Fit on Commitment and Knowledge Sharing Activities in Communities of Practice","authors":"Inhak Kim, Ji-hyeon Lee, Joon Koh, Hee-Woong Kim","doi":"10.3745/KIPSTD.2010.17D.3.209","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.3.209","url":null,"abstract":"ABSTRACT As the business competition between firms is getting intense, one of the sources of competitive advantage is effectively and efficiently to create, share, and apply information/knowledge among employees. Most of the firms which conduct knowledge management are operating a Community of Practice(CoP) in order to create, share and utilize this kind of information/knowledge resource. Recently, the CoP is getting out of its informal and spontaneous manner and is beginning to be led by the top management, receiving official support, in order to achieve the organization’s strategic goals. However, the corporation’s strategic operation of the CoP is not only against its original characteristics but also hampers the spontaneity of its participants. Every participant has different motivation to participate and different preference for reward type. This study, with the survey of 114 respondents, found that intrinsic motivation as well as extrinsic motivation significantly affect the motivation-reward fitness. Also, the motivation-reward fit was found to influence CoP commitment which ultimately leads to knowledge sharing activity in the CoP context. This research will help knowledge management companies to figure out how the two things of participants’ motivation and their reward types can fit together, and how such fitness ultimately affects the participants’ commitment and their knowledge sharing activities.Keywords:Community of Practice, CoP, Motivation, Reward Type, Commitment, Knowledge Sharing","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131827806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HAMM(Hybrid Address Mapping Method) for Increasing Logical Address Mapping Performance on Flash Translation Layer of SSD HAMM(Hybrid Address Mapping Method),用于提高SSD闪存转换层的逻辑地址映射性能
Pub Date : 2010-06-01 DOI: 10.3745/KIPSTD.2010.17D.6.383
Ji-Won Lee, Hongchan Roh, Sanghyun Park
ABSTRACT Flash memory based SSDs are currently being considered as a promising candidate for replacing hard disks due to several superior features such as shorter access time, lower power consumption and better shock resistance. However, SSDs have different characteristics from hard disk such as difference of unit and time for read, write and erase operation and impossibility for over-writing. Because of these reasons, SSDs have disadvantages on hard disk based systems, so FTL(Flash Translation Layer) is designed to increase SSDs’ efficiency. In this paper, we propose an advanced logical address mapping method for increasing SSDs’ performance, which is named HAMM(Hybrid Address Mapping Method). HAMM addresses drawbacks of previous block-mapping method and super-block-mapping method and takes advantages of them. We experimented our method on our own SSDs simulator. In the experiments, we confirmed that HAMM uses storage area more efficiently than super-block-mapping method, given the same buffer size. In addition, HAMM used smaller memory than block-mapping method to construct mapping table, demonstrating almost same performance.Keywords : Solid State Disks, Flash Translation Layer, Logical Address Mapping
基于闪存的固态硬盘由于具有访问时间更短、功耗更低和抗冲击性能更好等优点,目前被认为是替代硬盘的有希望的候选者。但是,固态硬盘具有不同于硬盘的特点,如读、写、擦除操作的单位和时间不同、不能覆盖等。由于这些原因,ssd在基于硬盘的系统中存在缺点,因此设计了FTL(Flash Translation Layer)来提高ssd的效率。本文提出了一种提高ssd性能的高级逻辑地址映射方法,称为HAMM(Hybrid address mapping method)。HAMM克服了以往的块映射方法和超级块映射方法的不足,充分利用了它们的优点。我们在自己的ssd模拟器上试验了我们的方法。在实验中,我们证实了在相同缓冲区大小的情况下,HAMM比超级块映射方法更有效地利用存储区域。此外,HAMM比块映射法使用更小的内存来构建映射表,性能几乎相同。关键词:固态磁盘,闪存转换层,逻辑地址映射
{"title":"HAMM(Hybrid Address Mapping Method) for Increasing Logical Address Mapping Performance on Flash Translation Layer of SSD","authors":"Ji-Won Lee, Hongchan Roh, Sanghyun Park","doi":"10.3745/KIPSTD.2010.17D.6.383","DOIUrl":"https://doi.org/10.3745/KIPSTD.2010.17D.6.383","url":null,"abstract":"ABSTRACT Flash memory based SSDs are currently being considered as a promising candidate for replacing hard disks due to several superior features such as shorter access time, lower power consumption and better shock resistance. However, SSDs have different characteristics from hard disk such as difference of unit and time for read, write and erase operation and impossibility for over-writing. Because of these reasons, SSDs have disadvantages on hard disk based systems, so FTL(Flash Translation Layer) is designed to increase SSDs’ efficiency. In this paper, we propose an advanced logical address mapping method for increasing SSDs’ performance, which is named HAMM(Hybrid Address Mapping Method). HAMM addresses drawbacks of previous block-mapping method and super-block-mapping method and takes advantages of them. We experimented our method on our own SSDs simulator. In the experiments, we confirmed that HAMM uses storage area more efficiently than super-block-mapping method, given the same buffer size. In addition, HAMM used smaller memory than block-mapping method to construct mapping table, demonstrating almost same performance.Keywords : Solid State Disks, Flash Translation Layer, Logical Address Mapping","PeriodicalId":348746,"journal":{"name":"The Kips Transactions:partd","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Kips Transactions:partd
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1