Transmission of system information and additional service data for digital HDTV broadcasting

1998 ◽  
Vol 44 (1) ◽  
pp. 87-93 ◽  
Author(s):  
Hyun-Ho Jeon ◽  
Soo-In Lee ◽  
Jae-Han Kim ◽  
Deock-Gii Oh
Author(s):  
Yu Lei ◽  
Duan Yucong

Data, information, knowledge, and wisdom forms a progressive relationship. Information is formed by data collation. Knowledge is filtered, refined, and processed from relevant information. Wisdom is based on knowledge and is accumulated through experience. This paper uses the progressive relationship of service data, information, knowledge, and wisdom to explain the expression of service knowledge graph. It is an increasingly challenging demand to discover trusted Cloud service providers with service data, information, and knowledge. We propose an efficient method of trusted service provider discovery based on service knowledge graphs, called PDG (Provider Discovery based on Graphs), to ensure that each service instance of composite services in Cloud systems is trustworthy. PDG evaluates the outputs of service providers in service classes with the help of additional service information. According to the additional service information, service knowledge is generated and trusted service providers can be found easily. PDG improves the accuracy of processing results by automatically replacing data provided by untrusted service providers with results provided by trusted service providers.


2020 ◽  
Vol 4 (2) ◽  
pp. 34-40
Author(s):  
Ahmad Jamaludin ◽  
Donna Setiawati ◽  
Fariyono Fariyono

Research titled System Information Acceptance Services Aditama Android based.Aditama Computer is one of the company engaged in the service and sale of computers in Boyolali such as laptops, PCS, printers, CCTV, scanners, Fingerspots, LCD projectors.This business was established from 2003 and address at Jalan Kenanga No.14 Boyolali, Boyolali Sub-district, Boyolali district. The administration system of service acceptance on Aditama Computer is still simple, admin fill in the Entry service input form, and Rekap service data also still recab through the book.And that often happens admins are often late in giving information until the work of the computerThis makes it a frequent customer to ask admins directly through a short message.Itupun admin is also long in responding to customers. The purpose of this research is to design, implement, and test the service acceptance information system in Aditama Computer, producing information system of service acceptance to improve services in Aditama Computer.Methodelogi Research used is a waterfall, modeling objects using UML.For coding using PHP MySQL, and Android client. The result is an information system to facilitate the service to the customers.


2008 ◽  
Vol 40 (11) ◽  
pp. 46-56
Author(s):  
Ludmila I. Samoilenko ◽  
Sergey A. Baulin ◽  
Tatyana V. Ilyenko ◽  
Margarita A. Kirnosova ◽  
Ludmila N. Kolos ◽  
...  

2004 ◽  
Vol 62 (1-6) ◽  
pp. 81-91
Author(s):  
Ya. E. Lvovich ◽  
V. I. Sumin ◽  
I. I. Zastrozhnov ◽  
E. A. Rogozin ◽  
A. S. Dubrovin

2018 ◽  
Vol 3 (1) ◽  
pp. 001
Author(s):  
Zulhendra Zulhendra ◽  
Gunadi Widi Nurcahyo ◽  
Julius Santony

In this study using Data Mining, namely K-Means Clustering. Data Mining can be used in searching for a large enough data analysis that aims to enable Indocomputer to know and classify service data based on customer complaints using Weka Software. In this study using the algorithm K-Means Clustering to predict or classify complaints about hardware damage on Payakumbuh Indocomputer. And can find out the data of Laptop brands most do service on Indocomputer Payakumbuh as one of the recommendations to consumers for the selection of Laptops.


2018 ◽  
Vol 10 (1) ◽  
pp. 19-26 ◽  
Author(s):  
Muhammad Iqbal Perkasa ◽  
Eko Budi Setiawan

Data is one of the most important things in this information and information technology era that evolving now. Currently, the government still has not used the public data maximally for administrative purposes. Utilization of this big population data is the creation of a web service application system with REST API where this data will be open and accessible to those who have access. One of the institutions that use this service is the Manpower and Transmigration Service where this system can make the Dinas staff more efficient to create and register job search cards using available community data. This application is able to provide and facilitate many parties, such as data administrators to monitor data usage, registration employee in input data, and people able to register independently. Index Terms—Web service, API, Rest api, People data


2020 ◽  
Vol 24 (1) ◽  
pp. 175-188
Author(s):  
M. O. Tanygin

Purpose of research. Currently, various technologies and methods are used to control the integrity and authenticity of data transmitted through open communication channels. One of them is the technology for transmitting sequences of information packets connected to each other in chains using certain cryptographic algorithms. Similar approaches are used in the well-known blockchain technology and are focused on large volumes of transmitted and protected information and large sizes of additional service information fields. The purpose of this article is to study the characteristics of systems, transmission of small information packets in comparison with traditional size frames of TCP/IP stack, in which the broken packet sequence order is restored using the chain method, by analyzing hash sequences available in each of such packets.Methods. In this article, simulation modeling, system analysis method, method of systematization and ranking of the obtained results are used.Results. It is shown that increasing the size of the additional field with the hash of the previous message from 4 to 6 bits has a significant effect on reducing the probability of erroneous restore of the order of information packets. Further increasing the length of the hash field reduces the probability of error by only 2 to 5 % for each additional bit of the hash field for any length of the chain being restored. It is shown that the coefficient of the usage of the communication channel (the ratio of useful chain of packets to the volume of information transmitted through the communication channel) is maximum when the length of the hash field is 6 in the whole range of sizes of the field information part of the data packet.Conclusion. The paper shows that the chain method is applicable for restoring the original sequence of information packets transmitted from the source to the receiver in systems where the preservation of the sequence of packets is not guaranteed. The obtained values of the transmission system parameters allow us to ensure acceptable reliability of data transmission with a minimum amount of additional service information, and achieve information redundancy less than that in similar ones by 10-15.


Sign in / Sign up

Export Citation Format

Share Document