• Title/Summary/Keyword: extendability

Search Result 51, Processing Time 0.021 seconds

SOME RESULTS ON BINDING NUMBER AND FRACTIONAL PERFECT MATCHING

  • Zhu, Yan;Liu, Guizhen
    • Journal of applied mathematics & informatics
    • /
    • v.25 no.1_2
    • /
    • pp.339-344
    • /
    • 2007
  • The relationships between binding number and fractional edge (vertex)-deletability or fractional k-extendability of graphs are studied. Furthermore, we show that the result about fractional vertex-deletability are best possible.

A Study on the Color Extendability in Mark Rothko's Color-Field Abstract (마크 로드코의 색면추상에 표현된 색의 확장성 연구)

  • Kim, Sun-Young
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.1
    • /
    • pp.239-246
    • /
    • 2013
  • This study is aimed at understanding the color extendibility of color-field abstract through Mark Rothko's paintings. Color extendibility is a structure applied by Mark Rothko. He simplifies it and by pursuing autonomy and immediacy of the color itself, including surface color and the front of color-field, Rothko creates value through motions in his square paintings of non-fixed shapes. Chapter 2 revisits the meaning of color in abstract expressionism and explains the principle of color-field by applying the concept of ergon and parergon. In chapter 3, the principle, processes, methods, techniques of expression were studied as a basis to understand color extendibility and color-field abstract. In chapter 4, the works of Mark Rothko were analyzed based on his multiform paintings(1946-1948), number and untitled(1949-1957), and black paintings(1958-1970) in order to identify, in the final chapter, the features of color extendibility in Rothko's works. According to the above research, the thesis successfully concludes that the artist's reconstruction of reality and readjustment of transcendent reality are reproduced via color extendibility, the movement of color-field.

A Study of Security Authentication for Cloud Computing Based on Smart Phone (스마트폰 기반의 클라우드 컴퓨팅 보안 인증 연구)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1027-1035
    • /
    • 2012
  • Recently, the smart phone including web and mobile service based on the reliability and extendability of cloud computing is receiving huge attention. However, most of current cloud services provide just an application service for synchronizing data between mobile entity and server. Business model developed by communication companies have problems with interoperability. This paper proposes a new service security authentication model to efficiently manage smart phone users using different business models between smartphones and to keep the reliability and extendability of cloud computing. Proposed model authenticates for smart phone users to stay with in the unified communication with smart phone user's identity and access control to effectively use the current cloud computing system.

An Analysis on Role of Stakeholders for Security System in Smart Healthcare Environment (스마트 의료환경에서 보안체계 구축을 위한 이해관계자 역할 분석)

  • Kim, Yanghoon;Jeong, Wonwho
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.17-27
    • /
    • 2019
  • With the occurrence of the 4th Industrial Revolution, environmental change is happening in the healthcare industry as overall flow of Industry heads to ICT-based business environment. Healthcare Industry, which has the characteristic of public goods, is requiring a reliability and continuity of healthcare industry, however, the introduction of security is being delayed due to the problem of compatibility and extendability of existing system. Accordingly, in this research, we have built a section and role for stakeholders to be concerned in order to induce, analyze and introduce a needed security technology for rapidly building a security system in a smart healthcare environment. We have suggested a possibility of extendability regarding a multi-dimensional effort of stakeholders for establishing a healthcare security system.

Standard inverter platform SEMIKUBE with optimal extendability (최적의 확장성을 갖는 표준 인버터 Stack 세미큐브)

  • Kwon, Soon-Ho;Bae, Ki-Hoon;Bae, Ki-Ju;Won, Jong-Hoon
    • Proceedings of the KIPE Conference
    • /
    • 2012.07a
    • /
    • pp.321-322
    • /
    • 2012
  • This paper presents the study of standard family of power inverters, SEMIKUBE. One of key points of SEMIKUBE is that it's a combination of cubes, each of which achieves a given function, as specified. To drive this inverters, SEMIKRON's advanced technologies was applied. We proved the performance by various experiments.

  • PDF

Early Criticality Prediction Model Using Fuzzy Classification (퍼지 분류를 이용한 초기 위험도 예측 모델)

  • Hong, Euy-Seok;Kwon, Yong-Kil
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5
    • /
    • pp.1401-1408
    • /
    • 2000
  • Critical prediction models that determine whether a design entity is fault-prone or non fault-prone play an important role in reducing system development cost because the problems in early phases largely affected the quality of the late products. Real-time systems such as telecommunication system are so large that criticality prediction is more important in real-time system design. The current models are based on the technique such as discriminant analysis, neural net and classification trees. These models have some problems with analyzing cause of the prediction results and low extendability. In this paper, we propose a criticality prediction model using fuzzy rulebase constructed by genetic algorithm. This model makes it easy to analyze the cause of the result and also provides high extendability, high applicability, and no limit on the number of rules to be found.

  • PDF

Error Intensity Function Models for ML Estimation of Signal Parameter, Part I : Model Derivation (신호 파라미터의 ML 추정기법에 대한 에러 밀도 함수 모델에 관한 연구 I : 모델 정립)

  • Joong Kyu Kim
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.12
    • /
    • pp.1-11
    • /
    • 1993
  • This paper concentrates on models useful for analyzing the error performance of ML(Maximum Likelihood) estimators of a single unknown signal parameter: that is the error intensity model. We first develop the point process representation for the estimation error and the conditional distribution of the estimator as well as the distribution of error candidate point process. Then the error intensity function is defined as the probability dessity of the estimate and the general form of the error intensity function is derived. We then develop several intensity models depending on the way we choose the candidate error locations. For each case, we compute the explicit form of the intensity function and discuss the trade-off among models as well as the extendability to the case of multiple parameter estimation.

  • PDF

An Embedded Linux Web Server for Remote Monitoring & Controlling the Internet Appliance (인터넷 가전의 원격 감시 및 제어를 위한 임베디드 리눅스 웹 서버)

  • Rim Seong-Rak
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.123-131
    • /
    • 2005
  • Since most of the conventional web servers have been designed to Provide the general purpose and user's convenience as the primary goal, there is an overhead to apply them to the embedded system for remote monitoring and controlling the operation status of the Internet appliance. To cope with this overhead, an embedded Linux web server Is suggested in this paper The basic concept is to provide miniaturization and extendability by simplifying the requirements of web server as the services to the requests of web document for the user's menu and the execution of CGI Program for monitoring and controling the Internet appliance, and satisfying only the indispensable requirements of HTTP which are necessary for the interface with the conventional web browsers. For the evaluation of its feasibility, each module has been implemented on Linux environment, and tested with the MS Explorer 6.0.

  • PDF

CORE STABILITY OF DOMINATING SET GAMES

  • Kong, Liang;Fang, Qizhi;Kim, Hye-Kyung
    • Journal of the Korean Mathematical Society
    • /
    • v.45 no.3
    • /
    • pp.871-881
    • /
    • 2008
  • In this paper, we study the core stability of the dominating set game which has arisen from the cost allocation problem related to domination problem on graphs. Let G be a graph whose neighborhood matrix is balanced. Applying duality theory of linear programming and graph theory, we prove that the dominating set game corresponding to G has the stable core if and only if every vertex belongs to a maximum 2-packing in G. We also show that for dominating set games corresponding to G, the core is stable if it is large, the game is extendable, or the game is exact. In fact, the core being large, the game being extendable and the game being exact are shown to be equivalent.

Implementation of Remote Management Service using Access Control on OSGi Computing Environment (OSGi 컴퓨팅 환경에서 접근 제어를 이용한 원격 관리 서비스 구현)

  • Choi, Kyu-Sang;Jung, Heoun-Mam;Lee, Se-Hoon;Beak, Yong-Tae
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.109-115
    • /
    • 2006
  • In this paper, we proposed service security model and remote management service on OSGi computing environment. The model is used to make access control decisions like permission-based security inside the java2 platform. In model, policies are defined using a flat text file and include bundles. It method granted flexibility and extendability of access control of bundles and services. Also, we proposed service architecture efficiently for remote management service.

  • PDF