• Title/Summary/Keyword: 연구리소스

Search Result 329, Processing Time 0.025 seconds

An Automated Code Generation for Both Improving Performance and Detecting Error in Self-Adaptive Modules (자가 적응 모듈의 성능 개선과 오류 탐지를 위한 코드 자동 생성 기법)

  • Lee, Joon-Hoon;Park, Jeong-Min;Lee, Eun-Seok
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.9
    • /
    • pp.538-546
    • /
    • 2008
  • It has limits that system administrator deals with many problems occurred in systems because computing environments are increasingly complex. It is issued that systems have an ability to recognize system's situations and adapt them by itself in order to resolve these limits. But it requires much experiences and knowledge to build the Self-Adaptive System. The difficulty that builds the Self-Adaptive System has been problems. This paper proposes a technique that generates automatically the codes of the Self-Adaptive System in order to make the system to be built more easily. This Self-Adaptive System resolves partially the problems about ineffectiveness of the exceeded usage of the system resource that was previous research's problem and incorrect operation that is occurred by external factors such as virus. In this paper, we applied the proposed approach to the file transfer module that is in the video conferencing system in order to evaluate it. We compared the length of the codes, the number of Classes that are created by the developers, and development time. We have confirmed this approach to have the effectiveness.

Design and Implementation of Network Self-Configuration Based on Bluetooth (Bluetooth 기반 네트워크 자동형성 설계 및 구현)

  • Kang, Seong-Ho;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1376-1384
    • /
    • 2008
  • Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.

  • PDF

Development of Strategy Programming Model for the Culture-Centered Public Design : A Focus on Analyzing the Associated Indices of Place Strategy (문화중심형 공공디자인의 전략 기획을 위한 관련지표 분석 : 장소전략 수립단계를 중심으로)

  • Lee, Jeong-Min;Hong, Eui-Taek;Lee, Han-Na;Jung, Bo-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.137-153
    • /
    • 2011
  • Citizens of 21st century which is called to be the era of 'Culture' express their cultural desires in their public environments. Governments found that these needs can be satisfied through the culture-centered public designs which are based on the local resources and identities. This research suggests the strategy programming model to support these projects. It aims at not suggesting the conceptual process model, but developing the practical supporting model with options to choose. Thus the indices which are related to each prototype phases of programming process are analyzed through the case analyses with qualitative approach. This paper focused on analyzing the indices for Place Strategy which includes the phases for Resource, Mission, and Targeting. Altogether, 81 indices are analyzed.

Comparison on Recent Metastability and Ring-Oscillator TRNGs (최신 준안정성 및 발진기 기반 진 난수 발생기 비교)

  • Shin, Hwasoo;Yoo, Hoyoung
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.543-549
    • /
    • 2020
  • As the importance of security increases in various fields, research on a random number generator (RNG) used for generating an encryption key, has been actively conducted. A high-quality RNG is essential to generate a high-performance encryption key, but the initial pseudo-random number generator (PRNG) has the possibility of predicting the encryption key from the outside even though a large amount of hardware resources are required to generate a sufficiently high-performance random number. Therefore, the demand of high-quality true random number generator (TRNG) generating random number through various noises is increasing. This paper examines and compares the representative TRNG methods based on metastable-based and ring-oscillator-based TRNGs. We compare the methods how the random sources are generated in each TRNG and evaluate its performances using NIST SP 800-22 tests.

Author Entity Identification using Representative Properties in Linked Data (대표 속성을 이용한 저자 개체 식별)

  • Kim, Tae-Hong;Jung, Han-Min;Sung, Won-Kyung;Kim, Pyung
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.17-29
    • /
    • 2012
  • In recent years, Linked Data that is published under an open license shows increased growth rate and comes into the spotlight due to its interoperability and openness especially in government of developed countries. However there are relatively few out-links compared with its entire number of links and most of links refer a few hub dataset. These occur because of absence of technology that identifies entities in Linked data. In this paper, we present an improved author entity resolution method that using representative properties. To solve problems of previous methods that utilizes relation with other entities(owl:sameAs, owl:differentFrom and so on) or depends on Curation, we design and evaluate an automated realtime resolution process based on multi-ontologies that respects entity's type and its logical characteristics so as to verify entities consistency. The evaluation of author entity resolution shows positive results (The average of K measuring result is 0.8533.) with 29 author information that has obtained confirmation.

Implementation of Windows Based Underground Pipe Network Monitoring System Reproduced with Embedded Program (임베디드 프로그램으로 재구성한 윈도우 기반 지하관망 모니터링 시스템의 구현)

  • Park, Jun-Tae;Hong, In-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1041-1049
    • /
    • 2011
  • According to the development of society and infrastructure, effective underground facility management is growing more important them ever. In the process various monitoring systems are studied and developed for water works pipe-network. Especially, RTD-1000 system with the based on Pc. Reflector-monitoring device is constructed and steered by several local governments. But, this system have to be improved result from based on PC system structure at the point of resource management, heat, power consumption and size. In this paper, RTD-2000 is proposed are a substitution of improved RTD-1000 with many respect and portable one. This system is designed and implemented with ARM-9 development kit based on WinCE and LCD eliminate TDR(Time Domain Reflector-Meter). Various surveillance programs based on windows are mounted on RTD-1000 are replaced with dedicated embedded application softwares. Simulation and evaluation for performance comparison are performed for the prove of effectiveness of RTD-2000.

Dynamic Channel-Time Assignments based on the link status in IEEE 802.15.3 High-rate WPAN (IEEE 802.15.3 고속 무선 PAN(Personal Area Network)에서 링크상태에 따른 동적 채널할당)

  • 곽동원;이승형
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.844-851
    • /
    • 2004
  • Various types of error are caused due to many factors of various environment in air interface channel of wireless communications. In this case, the reliability of the channel is much lower than that of wired case. IEEE 802.15.3 high-rate WPAN, which operates in an ad hoc networking environment, is more susceptible to such errors. The problem has been investigated for wireless LANs, for example, as follows. If the queue size of a certain node is longer than that of other nodes, the node estimates that its channel state is bad and the resource of the node is decreased. However this method has a disadvantage that a central controller must always monitor the status. To avoid this disadvantage, in this paper, a new MAC protocol that the throughput of overall piconet is increased by LDS (Link-status Dependent Scheduling) is proposed.

A Markov Approximation-Based Approach for Network Service Chain Embedding (Markov Approximation 프레임워크 기반 네트워크 서비스 체인 임베딩 기법 연구)

  • Chuan, Pham;Nguyen, Minh N.H.;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.719-725
    • /
    • 2017
  • To reduce management costs and improve performance, the European Telecommunication Standards Institute (ETSI) introduced the concept of network function virtualization (NFV), which can implement network functions (NFs) on cloud/datacenters. Within the NFV architecture, NFs can share physical resources by hosting NFs on physical nodes (commodity servers). For network service providers who support NFV architectures, an efficient resource allocation method finds utility in being able to reduce operating expenses (OPEX) and capital expenses (CAPEX). Thus, in this paper, we analyzed the network service chain embedding problem via an optimization formulation and found a close-optimal solution based on the Markov approximation framework. Our simulation results show that our approach could increases on average CPU utilization by up to 73% and link utilization up to 53%.

Schemes for Managing Semantic Web Data in Ubiquitous Environment (유비쿼터스 환경을 고려한 시맨틱 웹 데이터 관리 기법 연구)

  • Kim, Youn-Hee;Kim, Jee-Hyun
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One important issue to generalize the ubiquitous paradigm is the development of user-centralized and intelligent ubiquitous computing systems. Sharing knowledge and correct communication between users and devices are needed to be aware of continuous changed context information and infer services for which users are suited. The goal of this paper is to describe and manage effectively the meaning of services or data which each device offers for interaction between users and devices based on semantic relationships and reasoning. In this paper, we represent semantic data using OWL and design a ubiquitous based intelligent system. We propose some index structures and strategies to process queries classified by each subsystem and adopt labeling schemes to identify classes and resources in the semantic data. We can find devices which satisfies various user's requests exactly and quickly using the proposed strategies.

  • PDF

Experimental Study of Keyword-Based Exploratory Testing (키워드 기반 탐색적 테스트의 실험적 연구)

  • Hwang, Jun Sun;Choi, Eun Man
    • Journal of Software Engineering Society
    • /
    • v.29 no.2
    • /
    • pp.13-20
    • /
    • 2020
  • The exploratory test was introduced as a desirable test method due to its fast development cycle, but it is not actively adopted because documentation and analysis of the test range are required for application. On the other hand, keyword-based testing has been introduced as a way to save resources and facilitate maintenance, but it is difficult to plan tests in advance due to the large number of variables such as data, settings, interactions, sequence and timing. However, in keyword-based testing, you can create a test case based on keywords by presenting clear criteria and methods for creating keywords and applying the exploration testing process. In this paper, we propose a model that automates exploratory tests based on keywords. To verify the effectiveness, we compared the general keyword-based test(KBT) and keyword-based exploratory test(KBET), and compared with the exploratory normal test case(ETC) and keyword-based exploratory test(KBET).