• Title/Summary/Keyword: 운영 프로파일

Search Result 208, Processing Time 0.024 seconds

A Development and Design of Embedded Linux System (Embedded Linux 시스템 설계 및 구현에 관한 연구)

  • 유임종;고성찬
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.129-132
    • /
    • 2003
  • In this paper, which sees the Strong-ARM SA1110 it used the main CPU and RTP in VoIP system. It will be able to apply the information communication field it embodied. It used the Tynux_box2 with the hardware side and it composed a VOIP system. And it used the RTP which is a real-time protocol in software control portion. The development environment of the paper that used the Target board and a Linux PC for connection used the RS-232C, USB connection, Ethernet LAN. The VoIP the environment for a communication used the wave file in the substitution which changes analog signal with the digital signal. And For the communication of the both sides it used the socket. This paper explained the fact that against a general technique from the operation of VoIP system. Using the Embedded linux development board which explained an operational process of the RTP protocol.

  • PDF

Subject poosition Systems Design of picture reflex (사진영상의 피사체 위치확인 시스템 설계)

  • Jo, Dong-Kwan;Chung, Jung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.551-554
    • /
    • 2008
  • Do subject addition of existent picture reflex inside in this treatise as system that confirmation is available, do subject addition of picture reflex inside through GPS's photography position and Come on! direction angle of deviation campus to do confirmation possibility system design. Constructed each environment of Windows Operating System and embedded system environment for verification of system that is subject position of designed picture reflex also. To development environment of embedded system S3C2440A & used PXA270 processor, Camera and GPS in development baud, Come on! include deviation campus, and development language embodied in C language, and debugging environment did debugging using GCC compiler of Linux environment. PC software for verification designed system to confirm for subject position confirmation of picture reflex through Almap, Google Eartch developed verification software using visual C++. Also, groped way to utilize picture file by various field including position information within picture. Confirmed that decreased by error extent 1m within of radius 10m that is existent GPS's error extent as verification result.

  • PDF

Implementation of a Display and Analysis Program to improve the Utilization of Radar Rainfall (레이더강우 자료 활용 증진을 위한 표출 및 분석 프로그램 구현)

  • Noh, Hui-Seong
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1333-1339
    • /
    • 2018
  • Recently, as disasters caused by weather such as heavy rains have increased, interests in forecasting weather and disasters using radars have been increasing, and related studies have also been actively performed. As the Ministry of Environment(ME) has established and operated a radar network on a national scale, utilization of radars has been emphasized. However, persons in charge and researchers, who want to use the data from radars need to understand characteristics of the radar data and are also experiencing a lot of trials and errors when converting and calibrating the radar data from Universal Format(UF) files. Hence, this study developed a Radar Display and Analysis Program(RaDAP) based on Graphic User Interface(GUI) using the Java Programming Language in order for UF-type radar data to be generated in an ASCII-formatted image file and text file. The developed program can derive desired radar rainfall data and minimize the time required to perform its analysis. Therefore, it is expected that this program will contribute to enhancing the utilization of radar data in various fields.

P2P-based Collaboration Framework: Openwar (P2P기반 협업 프레임워크: 오픈웨어)

  • Song, Jin-Su;Park, Chung-Sik;Kim, Yun-Sang;Gwon, Sun-Beom
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.453-460
    • /
    • 2005
  • P2P(Peer to Peer) 기술은 잠재적 능력에도 불구하고 컨텐츠의 저작권문제와 보안문제 등으로 인하여 많은 사람들이 충분히 활용하지 못하고 있다. 본 연구는 인터넷 사용자(개인)와 소규모 서버를 운영하는 조직들이 정보 제공, 분배, 공유의 정보시스템 구조를 자신들의 목적에 맞게 자유롭게 만들 수 있는 프레임워크인 오픈웨어 (Openware)의 개발에 관한 것이다. 오픈웨어는 P2P기반 시스템으로 다음과 같은 특징올 갖는다. 1) 다수의 서버와 클라이언트로 이루어지는 구조로, 사용자의 목적에 맞게 집중형 혹은 분산형 구조를 자유롭게 혼합하여 정보시스템을 구성 할 수 있다. 이러한 정보 구조의 유연성은 다양한 형태의 협업(개인과 개인, 개인과 그룹, 그룹과 그룹)이 요구되는 응용 시스템의 기반을 제공한다. 2) 데이터 관점에서 오픈웨어는 개인이 데이터베이스를 손쉽게 생성, 관리 할 수 있고, 자신의, 데이터 혹은 데이터베이스 구조를 다른 사람이나 그룹과 공유 하거나 통합 할 수 있다. 3) 데이터 통신면에서 오픈웨어는 HTTP(HyperText Transfer Protocol) 프로토콜만을 사용하는 웹 기반 시스템으로 인터넷에 연결 되어있는 누구와도 오픈웨어를 통해 협업이 가능하다. 4) 소프트웨어 이름에서 알 수 있듯이 오픈웨어는 Java, JSP, Apache, Resin등 공개소프트어로 만들어져 있고, 오픈웨어 자체도 공개소프트웨어이다. 오픈웨어는 개인과 그룹의 흠페이지 생성과 관리, 파일 공유 기능이 구현 되어있고, 데이터베이스 공유, 통합 기능을 이용하여 개인이나 그룹의 주소록관리, 일정관리 등이 가능하다. 오픈웨어는 사용자 흑은 개발자가 다양한 형태의 응용컴포넌트를 자유롭게 등록하여 기능을 추가 할 수 있는 확장성올 제공하고 있어서, 앞으로 e-메일, 매신저, 전자결재, 지식관리시스템, 인터넷 방송 시스템의 기반 구조 역할을 할 수 있다. 현재 오픈웨어에 적용하기 위한 P2P 기반의 지능형 BPM(Business Process Management)에 관한 연구와 X인터넷 기술을 이용한 RIA (Rich Internet Application) 기반 웹인터페이스 연구를 진행하고 있다.

  • PDF

A Study on Analysis of Security Functional Requirements for Virtualization Products through Comparison with Foreign Countries' Cases (해외 사례 비교를 통한 가상화 제품의 보안기능 요구사항 분석에 관한 연구)

  • Lee, Ji-Yeon
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.221-228
    • /
    • 2019
  • The importance of security for virtualization products has been increased with the activation policy of cloud computing and it is necessary to analyze cyber security threats and develop security requirements for virtualization products to provide with more secure cloud environments. This paper is a preliminary study with the purpose of developing security functional requirements through analyzing security features and cyber security threats as well as comparison of foreign countries' cases for virtualization products. To do this, the paper compares evaluation schemes for virtualization products in US and UK foreign countries, and analyzes the cyber security threats, security objectives and security requirements in both countries. Furthermore, it proposes the essential checking items and processes for developing security functional requirements about security features of virtualization products to contribute to its more secure development and the establishment of related security evaluation standards.

Data Processing Architecture for Cloud and Big Data Services in Terms of Cost Saving (비용절감 측면에서 클라우드, 빅데이터 서비스를 위한 대용량 데이터 처리 아키텍쳐)

  • Lee, Byoung-Yup;Park, Jae-Yeol;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.570-581
    • /
    • 2015
  • In recent years, many institutions predict that cloud services and big data will be popular IT trends in the near future. A number of leading IT vendors are focusing on practical solutions and services for cloud and big data. In addition, cloud has the advantage of unrestricted in selecting resources for business model based on a variety of internet-based technologies which is the reason that provisioning and virtualization technologies for active resource expansion has been attracting attention as a leading technology above all the other technologies. Big data took data prediction model to another level by providing the base for the analysis of unstructured data that could not have been analyzed in the past. Since what cloud services and big data have in common is the services and analysis based on mass amount of data, efficient operation and designing of mass data has become a critical issue from the early stage of development. Thus, in this paper, I would like to establish data processing architecture based on technological requirements of mass data for cloud and big data services. Particularly, I would like to introduce requirements that must be met in order for distributed file system to engage in cloud computing, and efficient compression technology requirements of mass data for big data and cloud computing in terms of cost-saving, as well as technological requirements of open-source-based system such as Hadoop eco system distributed file system and memory database that are available in cloud computing.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

An Application-Specific and Adaptive Power Management Technique for Portable Systems (휴대장치를 위한 응용프로그램 특성에 따른 적응형 전력관리 기법)

  • Egger, Bernhard;Lee, Jae-Jin;Shin, Heon-Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.8
    • /
    • pp.367-376
    • /
    • 2007
  • In this paper, we introduce an application-specific and adaptive power management technique for portable systems that support dynamic voltage scaling (DVS). We exploit both the idle time of multitasking systems running soft real-time tasks as well as memory- or CPU-bound code regions. Detailed power and execution time profiles guide an adaptive power manager (APM) that is linked to the operating system. A post-pass optimizer marks candidate regions for DVS by inserting calls to the APM. At runtime, the APM monitors the CPU's performance counters to dynamically determine the affinity of the each marked region. for each region, the APM computes the optimal voltage and frequency setting in terms of energy consumption and switches the CPU to that setting during the execution of the region. Idle time is exploited by monitoring system idle time and switching to the energy-wise most economical setting without prolonging execution. We show that our method is most effective for periodic workloads such as video or audio decoding. We have implemented our method in a multitasking operating system (Microsoft Windows CE) running on an Intel XScale-processor. We achieved up to 9% of total system power savings over the standard power management policy that puts the CPU in a low Power mode during idle periods.

Development of cardiopulmonary resuscitation nursing education program of web-based instruction (웹 기반의 심폐소생술 간호교육 프로그램 개발)

  • Sin, Hae-Won;Hong, Hae-Sook
    • Journal of Korean Biological Nursing Science
    • /
    • v.4 no.1
    • /
    • pp.25-39
    • /
    • 2002
  • The purpose of this study is to develop and evaluate a web-based instruction Program(WBI) to help nurses improving their knowledge and skill of cardiopulmonary resuscitation. Using the model of web-based instruction(WBI) program designed by Rhu(1999), this study was carried out during February-April 2002 in five different steps; analysis, design, data collection and reconstruction, programming and publishing, and evaluation. The results of the study were as follows; 1) The goal of this program was focused on improving accuracy of knowledge and skills of cardiopulmonary resuscitation. The program texts consists of the concepts and importances of cardiopulmonary resuscitation(CPR), basic life support(BLS), advanced cardiac life support(ACLS), treatment of CPR, nursing care after CPR treatment. And in the file making step, photographs, drawings and image files were collected and edited by web-editor(Namo), scanner and Adobe photoshop program. Then, the files were modified and posted on the web by file transfer protocol(FTP). Finally, the program was demonstrated and once again revised by the result, and then completed. 2) For the evaluation of the program, 36 nurses who in K university hospital located in D city, and related questionnaire were distributed to them as well. Higher scores were given by the nurses in its learning contents with $4.2{\pm}.67$, and in its structuring and interaction of the program with $4.0{\pm}.79$, and also in its satisfactory of the program with $4.2{\pm}.58$ respectively. In conclusion, if the contents of this WBI educational program upgrade further based upon analysis and applying of the results the program evaluation, it is considered as an effective tool to implement for continuing education as life-long educational system for nurse.

  • PDF

A Study on Light-weight Algorithm of Large scale BIM data for Visualization on Web based GIS Platform (웹기반 GIS 플랫폼 상 가시화 처리를 위한 대용량 BIM 데이터의 경량화 알고리즘 제시)

  • Kim, Ji Eun;Hong, Chang Hee
    • Spatial Information Research
    • /
    • v.23 no.1
    • /
    • pp.41-48
    • /
    • 2015
  • BIM Technology contains data from the life cycle of facility through 3D modeling. For these, one building products the huge file because of massive data. One of them is IFC which is the standard format, and there are issues that large scale data processing based on geometry and property information of object. It increases the rendering speed and constitutes the graphic card, so large scale data is inefficient for screen visualization to user. The light weighting of large scale BIM data has to solve for process and quality of program essentially. This paper has been searched and confirmed about light weight techniques from domestic and abroad researches. To control and visualize the large scale BIM data effectively, we proposed and verified the technique which is able to optimize the BIM character. For operating the large scale data of facility on web based GIS platform, the quality of screen switch from user phase and the effective memory operation were secured.