• Title/Summary/Keyword: 상호접속

Search Result 510, Processing Time 0.026 seconds

Performance Testing of Satellite Image Processing based on OGC WPS 2.0 in the OpenStack Cloud Environment (오픈스택 클라우드 환경 OGC WPS 2.0 기반 위성영상처리 성능측정 시험)

  • Yoon, Gooseon;Kim, Kwangseob;Lee, Kiwon
    • Korean Journal of Remote Sensing
    • /
    • v.32 no.6
    • /
    • pp.617-627
    • /
    • 2016
  • Many kinds of OGC-based web standards have been utilized in the lots of geo-spatial application fields for sharing and interoperable processing of large volume of data sets containing satellite images. As well, the number of cloud-based application services by on-demand processing of virtual machines is increasing. However, remote sensing applications using these two huge trends are globally on the initial stage. This study presents a practical linkage case with both aspects of OGC-based standard and cloud computing. Performance test is performed with the implementation result for cloud detection processing. Test objects are WPS 2.0 and two types of geo-based service environment such as web server in a single core and multiple virtual servers implemented on OpenStack cloud computing environment. Performance test unit by JMeter is five requests of GetCapabilities, DescribeProcess, Execute, GetStatus, GetResult in WPS 2.0. As the results, the performance measurement time in a cloud-based environment is faster than that of single server. It is expected that expansion of processing algorithms by WPS 2.0 and virtual processing is possible to target-oriented applications in the practical level.

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF

The Effect of Product Scarcity and Purchase Behavior in Location-Based Application Services (위치기반 어플리케이션 서비스에서 제품의 희소성과 구매행동과의 영향)

  • Wang Ming;Hyeokjun Kwon;Jaewon Choi
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.209-226
    • /
    • 2018
  • Location-based services have distinctive service characteristics compared to the past online commerce used on the desktop. In any place, mobile communication devices can be used to access online and utilize online shopping, and it is more convenient for users. In addition, by providing shopping and service information specific to each location, it is possible to provide convenience to the consumers according to their locations. In addition, it provides scarcity of information as well as location, thereby increasing consumers' desire to purchase. In this study, we investigated the effect of scarcity on the Purchase intention of consumers in location-based services. The steps of scarcity are: first, a step without scarcity, Second, providing time limit information, Third, providing quantity limitation information, Fourth, the experiment was designed to provide time and quantity limitation, and 4 groups were analyzed through experimental stimuli The purpose of this study is to verify the moderating effect of the dependent variable on the degree of scarcity by adding 'ubiquity', 'interactivity' and 'privacy' which are characteristics of location-based service. As a result of the analysis, scarcity of time and scarcity of quantity limitation scarcity stimuli showed a moderating effect on ubiquity, interactivity and consumer's purchase intention, and these variables also directly or indirectly affected positively. Consumer confidence was found to have a negative effect on consumers' purchase intentions.

An Interactive Approach to Categorize Questions on the Internet BBSs (인터넷 게시판 질문 분류를 위한 인터랙티브 접근방법에 관한 연구)

  • Jae-Kwang Lee;Seong-Ho Noh;Ok-Hyun Ryou
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.177-195
    • /
    • 2003
  • In a traditional customer support environment, mainly call centers or service centers are responsible for receiving inquiries from their customers via telephone calls. Due to the rapid growth of Internet with its widespread acceptance and accessibility, means of communication with customers in the traditional customer support center, such as telephones, letters, and direct-visiting, have been replaced by e-mails and bulletin board systems (BBSs) using the Internet constantly. BBSs are basically question and answer systems, they require some lead time to get answer from administrator. To reduce lead time, BBSs enable remote customers or users to log on and tap into a knowledge database that is generally formatted in the form of Frequently Asked Questions (FAQs) that provide answers and solutions to the common problems. And, many different types of the questions are mixed on the BBS. It is a burden to administrator. To build FAQs and to support BBS adminstrator, a supporting tool which is to categorize questions is helpful. In this research, we suggest an interactive question categorizing methodology which consists of steps to present question using keywords, identifying keywords' affinity, computing similarity among questions, and clustering questions. This methodology allows users to interact iteratively for clear manifestation of ambiguous questions. We also developed a prototype system, IQC (interactive question categorizer) and evaluated its performance using the comparison experiments with other systems. IQC is not a general purposed system, but it produces a good result in a given specific domain.

  • PDF

Implementation of Agricultural Multi-UAV System with Distributed Swarm Control Algorithm into a Simulator (분산군집제어 알고리즘 기반 농업용 멀티 UAV 시스템의 시뮬레이터 구현)

  • Ju, Chanyoung;Park, Sungjun;Son, Hyoung Il
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 2017.04a
    • /
    • pp.37-38
    • /
    • 2017
  • 최근 방제 및 예찰과 같은 농작업에 단일 UAV(Unmanned Aerial Vehicle)시스템이 적용되고 있지만, 가반하중과 체공시간 등 기존시스템의 문제가 점차 대두되면서 작업 시간을 보다 단축시키고 작업 효율을 극대화 할 수 있는 농업용 멀티 UAV시스템의 필요성이 증대되고 있다. 본 논문에서는 작업자가 다수의 농업용 UAV를 효과적으로 제어할 수 있는 분산군집제어 알고리즘을 제안하며 알고리즘 검증 및 평가를 위한 시뮬레이터를 소개한다. 분산군집제어는 UAV 제어 계층, VP(Virtual Point) 제어 계층, 원격제어 계층으로 이루어진 3계층 제어구조를 가진다. UAV 제어 계층에서 각 UAV는 point mass로 모델링 되는 VP의 이상적인 경로를 추종하도록 제어한다. VP 제어 계층에서 각 VP는 입력 $p_i(t)=u^c_i+u^o_i+u^{co}_i+u^h_i$-(1)을 받아 제어되는데 여기서, $u^c_i{\in}{\mathbb{R}}^3$는 VP 사이의 충돌방지제어, $u^o_i{\in}{\mathbb{R}}^3$는 장애물과의 충돌방지제어, $u^{co}_i{\in}{\mathbb{R}}^3$는 UAV 상호간의 협조제어, $u^h_i{\in}{\mathbb{R}}^3$는 작업자로부터의 원격제어명령이다. (1)의 제어입력에서 충돌방지제어는 각 $u^i_c:=-{\sum\limits_{j{\in}{\eta}_i}}{\frac {{\partial}{\phi}_{ij}^c({\parallel}p_i-p_j{\parallel})^T}{{\partial}p_i}}$-(2), $u^o_c:=-{\sum\limits_{r{\in}O_i}}{\frac {{\partial}{\phi}_{ir}^o({\parallel}p_i-p^o_r{\parallel})^T}{{\partial}p_i}}$-(3)로 정의되면 ${\phi}^c_{ij}$${\phi}^o_{ir}$는 포텐셜 함수를 나타낸다. 원격제어 계층에서 작업자는 햅틱 인터페이스를 통해 VP의 속도를 제어하게 된다. 이때 스케일변수 ${\lambda}$에 대하여 VP의 원격제어명령은 $u^t_i(t)={\lambda}q(t)$로 정의한다. UAV 시뮬레이터는 리눅스 환경에서 ROS(Robot Operating Systems)를 기반한 3차원 시뮬레이터인 Gazebo상에 구축하였으며, 마스터와 슬레이브 간의 제어 명령은 TCPROS를 통해 서로 주고받는다. UAV는 PX4 기반의 3DR Solo 모델을 사용하였으며 MAVROS를 통해 MAVLink 통신 프로토콜에 접속하여 UAV의 고도, 속도 및 가속도 등의 상태정보를 받을 수 있다. 현재 멀티 드론 시스템을 Gazebo 환경에 구축하였으며, 추후 시뮬레이터 상에 분산군집제어 알고리즘을 구현하여 검증 및 평가를 진행하고자 한다.

  • PDF

The Growth of School Mathematics: Korean Secondary Gifted Students' Collaborative Problem Solving Using The Wiki (학교수학적 지식의 성장: 고등학교 영재 학생들의 위키(Wiki) 기반 협력 문제해결 활동을 중심으로)

  • Lee, Seoung Woo
    • Journal of Educational Research in Mathematics
    • /
    • v.25 no.4
    • /
    • pp.717-754
    • /
    • 2015
  • As a design research, this study aims to identify students' collaborative problems solving patterns using the Wiki and design factors triggering MKB(mathematical knowledge building) in virtual environment. For 70 days, 14 Korean secondary gifted students, who enrolled in calculus II courses in one of gifted institutions in Korea, solved 10 math problems together using the Wiki. In this study, I considered five design factors; motivation, practice of LaTeX, norms of participation, epistemic agency, and two types of educational settings. The primary pattern emergent in students' collaborative problem solving process is identified as 'solutions and refutations' along the double helix consisting of the constructive line and the critical line, which is very similar to the pattern of 'Conjectures and Refutations'(Lakatos, 1976). Despite that most participants had difficulty in using LaTeX for mathematical expressions, this study shows that Wikis are valuable tools for providing Korean secondary students opportunities to learn social virtue such as humility and courage (Lampert, 1990), which is considered to be have been neglected in Korean educational environment but is emphasized as precious for doing mathematics in the field of mathematics education.

인터넷 실시간 자료를 이용한 고등학교 지구과학 학습 프로그램 개발 및 지원 홈페이지 구축

  • Gu, Ja-Ok;An, Hui-Su
    • 한국지구과학회:학술대회논문집
    • /
    • 2005.09a
    • /
    • pp.199-206
    • /
    • 2005
  • 지구과학은 실생활과 직접적으로 관련되거나 학생들이 친숙하게 생각하는 많은 개념들을 포함하고 있으며 이런 특성은 과학캠프나 자연탐사 활동에서 지구과학과 관련한 탐구주제가 학생들의 큰 호응을 얻는 사실을 설명할 수 있다. 하지만 정규 수업에서 이루어지는 지구과학 실험 수업은 교과서에 제시된 자료해석 위주의 실험이 많아 학생들의 흥미를 반감시키는 경우가 많으며 자료 측정과정에서 과학자가 느낄 수 있는 중요하고 귀중한 경험을 놓칠수 있다. 그런데 인터넷에서는 해양과 대기, 천문, 지질 각 분야에서 지속적으로 갱신되는 실시간 관측 자료를 제공해 주는 곳이 많으며 이 실시간 자료들을 고등학교의 지구과학 실험에 이용할 수 있도록 학습 프로그램을 개발하면 기존의 자료해석 실험이 가지는 한계를 극복하고 학생들의 지구과학에 대한 호응도를 높일 수 있으며 보다 다양한 탐구 능력을 향상 시킬 수 있다. 이러한 학습 프로그램의 특징은 탐구 중심 혹은 문제 해결 학습을 강조하는 현재의 교육 목표를 잘 반영할 수 있다. 본 연구의 목적은 인터넷에서 제공되는 지구과학 관련 실시간 자료들을 활용할 수 있는 고등학교 지구과학 학습 프로그램을 개발하고 이를 지원할 수 있는 홈페이지를 구축한 후 실제로 수업에 적용하여 교육적 효과를 확인하는 것이다. 연구 결과 실시간 자료를 이용하는 고등학교 학생들을 위한 지구과학 학습 프로그램을 12개의 주제에 대해서 완성했다. 먼저 지구과학실험 시간에 적용할 수 있는 2차시 분량의 학습 프로그램 6주제를 개발했는데 개발 주제는 '지진이 일어나고 있는 곳은 어디인가?', '진앙으로 판의 경계를 결정하기', '진앙의 위치를 찾아라', '암영대를 찾아라', '태양의 자전 주기를 측정하기', '태양활동' 이다. 각 주제별로 수업소개, 학습목표, 과정, 학습자료(학생 활동지, 기타 자료, 수업 내용과 관련한 실시간 자료 제공 사이트 목록), 평가 자료를 만들었다. 학생들의 활동 내용은 <지진이 일어나고 있는 곳은 어디인가?>의 주제를 예로 들면 학생들이 실시간으로 전 세계의 지진활동을 모니터하는 사이트에 접속하여 최근에 지진이 어디에서 일어났는지 알아보고 지난 30일 동안에 일어났던 규모 4 이상의 지진 자료를 다운 받아 세계 지도에 점으로 표시한다. 이 때 학생들은 손으로 진앙의 위치를 지도에 그리는 대신 엑셀의 그래프 기능을 이용하여 지도에 진앙의 위치를 나타내게 한다. 또 개인 과제 연구에 적용할 수 있는 학습 프로그램을 5가지 개발하여 학생들이 특정한 주제에 대하여 탐구 과제를 수행할 수 있게 했는데 개발된 주제는 '태양 활동으로 오로라 예측하기', '국제 우주 정거장을 찾아내자', '한반도 부근의 해양 기상과 해수의 물리적 상호 관계', '일기도 분석을 통한 태풍의 진로 예측', '우리 나라 조석 예측' 이다. 마지막으로 사이버 학습을 통해서 수업 시간의 제약 없이 과제 형태로 처치 가능한 학습 프로그램 개발 했는데 그 주제는 '태풍이 저위도에서 북상하는 이유?'이다. 개발된 프로그램 중 2차시 학습 프로그램은 과학고 중학생 영재반에게, 개인 탐구 과제는 과학고 1학년 학생들에게, 사이버 수업 형태는 과학고 2학년 학생에게 적용시켰다. 실시간 자료 활용을 지원하는 홈페이지를 만들어 자료 제공 사이트에 대한 메타 자료를 데이터베이스화했으며 이를 통해 학생들이 원하는 실시간 자료를 검색하여 찾을 수 있고 홈페이지를 방분했을 때 이해하기 어려운 그래프나 각 홈페이지가 제공하는 자료들에 대한 처리 방법을 도움말로 제공받을 수 있게 했다. 실시간 자료들을 이용한 학습은 학생들의 학습 의욕과 탐구 능력을 향상시켰으며 컴퓨터 활용 능력과 외국어 자료 활용 능력을 향상 시키는데도 도움을 주었다.

  • PDF

Understanding of the Linguistic Features of Earth Science Treatises: Register Analysis Approach (지구과학 논문의 언어 특성 이해: 레지스터 분석)

  • Maeng, Seung-Ho;Shin, Myung-Hwan;Cha, Hyun-Jung;Ham, Seok-Jin;Shin, Hyeon-Jeong;Kim, Chan-Jong
    • Journal of the Korean earth science society
    • /
    • v.31 no.7
    • /
    • pp.785-797
    • /
    • 2010
  • This study identified the linguistic features of Earth science treatises through the analysis of the register. Data included three Korean treatises that were in geology, atmospheric science, and oceanography. The register of Earth science treatise was as follows: First, there were semantic, referential connections between Themes and Rhemes, that the messages and main points of the texts were expressed coherently and cohesively. Second, some predicates were used which were related to deductive inference, abductive inferences, or causal relation according to the genre elements of each text. The logical relations were not represented by the conjunctions but by the types of predicates. Third, most texts in the treatises showed interpersonally weak relationship using mental predicates related to possibilities, which meant scientists expressed indirectly their interpretation, explanation, or arguments. From these results, we argued that some activities of unpacking the language of science be included in science curriculum in order to improve students' literacy of science texts and understanding scientists' knowledge construction.

XML Web Services for Learning ContentsBased on a Pedagogical Design Model (교수법적 설계 모델링에 기반한 학습 컨텐츠의 XML 웹 서비스 구축)

  • Shin, Haeng-Ja;Park, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1131-1144
    • /
    • 2004
  • In this paper, we investigate a problem with an e-learning system for e-business environments and introduce the solving method of the problem. To be more accurate, existing Web-hosted and ASP (Application Service Provider)-oriented service model is difficult to cooperate and integrate among the different kinds of systems. So we have produced sharable and reusable learning object, they have extracted a principle from pedagogical designs for units of reuse. We call LIO (Learning Item Object). This modeling makes use of a constructing for XML Web Services. So to speak, units of reuse from pedagogical designs are test tutorial, resource, case example, simulation, problem, test, discovery and discussion and then map introduction, fact, try, quiz, test, link-more, tell-more LIO learning object. These typed LIOs are stored in metadata along with the information for a content location. Each one of LIOs is designed with components and exposed in an interface for XML Web services. These services are module applications, which are used a standard SOAP (Simple Object Access Protocol) and locate any computer over Internet and publish, find and bind to services. This guarantees the interoperation and integration of the different kinds of systems. As a result, the problem of e-learning systems for e-business environments was resolved and then the power of understanding about learning objects based on pedagogical design was increased for learner and instruction designers. And organizations of education hope for particular decreased costs in constructing e-learning systems.

  • PDF

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.