• Title/Summary/Keyword: 급속 OUR

Search Result 303, Processing Time 0.036 seconds

A Study on International Market Share Expansion Based on Derived Problems from Performance Record Analysis on Overseas Construction (해외건설 실적분석을 통한 문제점 도출 및 시장 확대방안에 관한 연구)

  • Choi, Jun-Youl;Jeon, Rak-Keun;Kim, Jae-Jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.7 no.4 s.32
    • /
    • pp.109-117
    • /
    • 2006
  • The domestic construction market is recovered after a foreign exchange crises but recently it's daunted again because of the sustainable real estate regulation policy by the government. The other aspect, after the WTO(World Trade Organization) system opened overseas construction is growing continuously with growth of international economy and opening of market through world. Moreover, for ballooning oil prices an orders increase by oil-producing countries, the Middle East, gives good chances to domestic construction enterprises. But, the domestic firms decrease on our domain by chases of developing country and high-technology or advanced country. This research will indicate processes of our construction business to analyze performance record about our overseas construction from the 1970s to present. Based on the results it intends to search for problems of our construction enterprises and provide useful analytic data for expansion of overseas construction market.

Development of Vulnerability Scanner using Search Engine (검색엔진을 이용한 취약점 분석 시스템 개발)

  • Joo, Bok-Gyu;Min, Beung-Woo;Chang, Moon-Suk;Ahn, Chang-Kyum;Yang, Dong-Hyuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.19-24
    • /
    • 2009
  • In these days, security threat is ever increasing as computer systems and networking is everywhere. This paper is on the development of security scanner using search engine, with which site managers can easily check security vulnerability on their systems. Our security server automatically collects security-related information on the Internet, and indexes them in the database. To check the vulnerability of a customer server, the client system collects various system-specific information, and sends necessary queries to our security server for vulnerability checking. Up-to-date and site-specific vulnerability information is retrieved through the viewer, which allows the customer effectively to check and respond to security threat on client systems.

  • PDF

A Synchronized Scheme Applying on Hybrid in On-Line Game (온라인 게임에서의 하이브리드기법을 적용한 동기화 기법)

  • Kime, Hye-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.7-12
    • /
    • 2011
  • Because development of high speed network, spread of internet, and high quality of computer performance, request and internet about massive multiplayer playing the game, is increasing. In order to experience realistic game play which is one of the most importance factor in massive multiplayer on-line, synchronization is importance matter. We propose synchronized and optimized scheme that combined FSM (Finite State Machine) and event holding method for efficient state synchronization for massive multiplayer on-line, and we show the effectiveness and reliability of our proposed scheme through the implementing and testing of the game server applying on our proposed scheme.

Memory Performance of Electronic Dictionary-Based Commercial Workload

  • Lee, Changsik;Kim, Hiecheol;Lee, Yongdoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.39-48
    • /
    • 2002
  • long with the rapid spread of the Internet, a new class of commercial applications which process transactions with respect to electronic dictionaries become popular Typical examples are Internet search engines. In this paper, we present a new approach to achieving high performance electronic dictionaries. Different from the conventional approach which use Trie data structures for the implementation of electronic dictionaries, our approach used multi-dimensional binary trees. In this paper, we present the implementation of our electronic dictionary ED-MBT(Electronic Dictionary based on Multidimensional Binary Tree). Exhaustive performance study is also presented to assess the performance impact of ED-MBT on the real world applications.

  • PDF

Exploiting Programmable Shaders in Hardware-Assisted Volume Rendering (PC용 그래픽스 가속기의 쉐이더 기능을 이용한 볼륨 렌더링)

  • Im, In-Seong;Gang, Byeong-Gwon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.8 no.2
    • /
    • pp.23-29
    • /
    • 2002
  • In this paper, we describe an implementation technique that extends the classification and shading capabilities offered by previously reported hardware-assisted volume rendering algorithms. In designing our rendering scheme, we exploited the programmable shader technology supported by the latest consumer PC graphics hardware. Our direct volume rendering technique enables to simultaneously display up to four materials, and to dynamically control gradient magnitude to emphasize or de-emphasize surface boundaries. It can easily create lighting effects such as light source attenuation, depth cueing, and multiple light sources that were often difficult to realize in previous hardware-assisted volume rendering.

  • PDF

Electronic Banking and the Changes of Economy Activity (전자금융의 성장과 경제활동의 변화)

  • 김세인
    • The Journal of Information Technology
    • /
    • v.2 no.2
    • /
    • pp.107-125
    • /
    • 1999
  • The growing popularity of Internet and the technology revolution of information communication has affected our financial system, and electronic banking has increased its scale and range since '90. Now this changes, deeply and fast, invade the our economical-social environments. Without having to go to a bank, customer and merchants will be able to perform freely complicated financial transactions by accessing online banking network and CD/ATM etc. Customer can use the various payment method - cash, credit card, smart cards, electronic money in real world and cyberspace, and manager the assets more efficiently. They increased their money liquidity yet. Banks need to expand the various baskets of transaction services and methods to satisfy their customer needs and create new participator, Government had to evaluate and forecast the trend of electronic banking, and establish a new rules and standards in the new electronic payment system.

  • PDF

A Methodology for Security Vulnerability Assessment Process on Binary Code (실행코드 취약점 분석 프로세스 방법론)

  • Hwang, Seong-Oun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.237-242
    • /
    • 2012
  • Cyber attacks have rapidly increased by exploiting the underlying vulnerabilities in the target software. However, identifying and correcting these vulnerabilities are extremely difficult and time consuming tasks. To address these problems efficiently, we propose a systematic methodology for security vulnerability assessment process on binary code in the paper. Specifically, we first classified the existing vulnerabilities based on whether the target software run in a Web environment and features of the software. Based on the classification, we determined the list and scope of the vulnerabilities. As our future research direction, we need to further refine and validate our methodology.

Design of User Interface for Optiomal Web Access of the Visually Impaired (시각장애인의 최적화된 웹 접근성을 위한 사용자 인터페이스 설계)

  • Lee, Jun-Suk;Lee, Kwang-Ok;Kim, Kyoung-Soo;Bae, Sang-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.58-64
    • /
    • 2010
  • These days, the Internet networks have rapidly expanded and used in various fields and been recognized as essential in our daily life. However, there are users who have difficulties in access to web sites like those with physical disabilities. Therefore, our country as well as developed countries have paid more attention to web access, and organized investigation and research are needed. This study presents how to reduce the number of access for efficient web access by the visually disabled and designs user interface.

A Method for Efficient Structure Management and Evaluation of Website (웹사이트의 효율적인 구조 관리와 평가 방법)

  • 유대승;엄정섭;이명재
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.306-315
    • /
    • 2002
  • With the rapid growth of WWW, the existing systems are integrated into web and various web-based systems are developed. Unlike the general applications, web aplications are developed by combining the various technologies and have their own complexities. So, we have much difficulties in the development and maintenance of web applications. To accommodate to the rapidly changing business environments and user requirements, the continuos evolution is required. In this paper, we present a method for supporting the effective development and maintenance of web applications. Our method involves the extraction of web application's structure information and analyzes web log ales containing the useful information about web site. We also describe a web testing method using the attracted information and our system developed for extracting hyperlink information and analyzing web log.

  • PDF

Design of Grid Workflow System Scheduler for Task Pipelining (작업 파이프라이닝을 위한 그리드 워크플로우 스케줄러 설계)

  • Lee, In-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.1-10
    • /
    • 2010
  • The power of computational Grid resources can be utilized on users desktop by employing workflow managers. It also helps scientists to conveniently put together and run their own scientific workflows. Generally, stage-in, process and stage-out are serially executed and workflow systems help automate this process. However, as the data size is exponentially increasing and more and more scientific workflows require multiple processing steps to obtain the desired output, we argue that the data movement will possess high portion of overall running time. In this paper, we improved staging time and design a new scheduler where the system can execute concurrently as many jobs as possible. Our simulation study shows that 10% to 40% improvement in running time can be achieved through our approach.