• Title/Summary/Keyword: 저장 관리 시스템

Search Result 2,652, Processing Time 0.028 seconds

Recognition of Dangerous Driving Using Automobile Black Boxes (차량용 블랙박스를 활용한 위험 운전 인지)

  • Han, In-Hwan;Yang, Gyeong-Su
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.5
    • /
    • pp.149-160
    • /
    • 2007
  • Automobile black boxes store and provide accident and driving information. The accident and driving information can be utilized to build scientific traffic-event database and can be applied in various industries. The objective of this study is to develop a recognition system of dangerous driving through analyzing the driving characteristic patterns. In this paper, possible dangerous driving models are classified into four models on the basis of vehicle behaviors(acceleration, deceleration, rotation) and accident types from existing statistical data. Dangerous driving data have been acquired through vehicle tests using automobile black boxes. Characteristics of driving patterns have been analyzed in order to classify dangerous driving models. For the recognition of dangerous driving, this study selected critical value of each dangerous driving model and developed the recognition algorithm of dangerous driving. The study has been verified by the application of recognition algorithm of dangerous driving and vehicle tests using automobile black boxes. The presented recognition methods of dangerous driving can be used for on-line/off-line management of drivers and vehicles.

A Case Study of Software Development Quality Improvement by Agile Methodology and MDA/MDD Technology (Agile 방법론과 MDA/MDD 기법을 활용하여 전자정부 표준 프레임워크 프로젝트의 품질 향상 사례)

  • Lee, Seung-Han;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2744-2748
    • /
    • 2015
  • This paper analyzes the effect on productivity by measuring Function Point per MM(man-month) in a software development project and code inspection which performed in Agile methodology, and introduce the method of applying MDA/MDD technology in the e-government standard framework project. MDA/MDD which recently raising its head is technology that increase software development productivity through automatic transformation form abstract model into lower abstract model, or from model to code. but, many Lessons obtained through the case studies, the analysis suggests a limited effect measurements. In this study, efficient development methodology and utilizing a e-government framework to measure the effectiveness of the MDD to the new measures through a case study applied to real information system development process. In addition to, managing information modeling through integrated repository presents a traceability and visibility.

An Efficient Algorithm for Finding the Earliest Available Interval on Connection-Oriented Networks (연결 지향 네트워크에서 최초 가용 구간을 찾는 효율적인 알고리즘)

  • Chong, Kyun-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.73-80
    • /
    • 2010
  • The advancement of communication and networking technologies has enabled e-science and commercial application that often require the transport of large volume of data over wide-area network. Schedulable high-bandwidth low-latency connectivity is required to transport the large volume of data. But the public Internet does not provide predictable service performance. Especially, if data providers and users are far away, dedicated bandwidth channels are needed to support remote process efficiently. Currently several network research projects are in progress to develop dedicated connectionsy sA bandwidth scheduler computes an user requested path based on network topology information and link bandwidth allocationsy In this paper, we have proposed an efficient algorithm for finding the earliest time interval when minimum bandwidth and duration are giveny Our algorithm is experimentally compared with the known algorithm.

Testing Implementation of Remote Sensing Image Analysis Processing Service on OpenStack of Open Source Cloud Platform (오픈소스 클라우드 플랫폼 OpenStack 기반 위성영상분석처리 서비스 시험구현)

  • Kang, Sang-Goo;Lee, Ki-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.141-152
    • /
    • 2013
  • The applications and concerned technologies of cloud computing services, one of major trends in the information communication technology, are widely progressing and advancing. OpenStack, one of open source cloud computing platforms, is comprised of several service components; using these, it can be possible to build public or private cloud computing service for a given target application. In this study, a remote sensing image analysis processing service on cloud computing environment has designed and implemented as an operational test application in the private cloud computing environment based on OpenStack. The implemented service is divided into instance server, web service, and mobile app. A instance server provides remote sensing image processing and database functions, and the web service works for storage and management of remote sensing image from user sides. The mobile app provides functions for remote sensing images visualization and some requests.

A Study on the Introduction of Library Services Based on Cloud Computing (클라우드 컴퓨팅 기반의 도서관 서비스 도입방안에 관한 연구)

  • Kim, Yong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.3
    • /
    • pp.57-84
    • /
    • 2012
  • With the advent of Big data era unleashed by tremendous increase of structured and unstructured data, a library needs an effective method to store, manage and preserve various information resources. Also, needs of collaboration of libraries are continuously increased in digital environment. As an effective method to handle the changes and challenges in libraries, interest on cloud computing is growing more and more. This study aims to propose a method to introduce cloud computing in libraries. To achieve the goals, this study performed the literature review to analyze problems of existing library systems. Also, this study proposed considerations, expectations, service scenario, phased strategy to introduce cloud computing in libraries. Based on the results extracted from cases that libraries have introduced cloud computing-based systems, this study proposed introduction strategy and specific applying areas in library works as considered features of cloud computing models. The proposed phased strategy and service scenario may reduce time and effort in the process of introduction of cloud computing and maximize the effect of cloud computing.

A Comparison Study on Data Caching Policies of CCN (콘텐츠 중심 네트워킹의 데이터 캐시 정책 비교 연구)

  • Kim, Dae-Youb
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.327-334
    • /
    • 2017
  • For enhancing network efficiency, various applications/services like CDN and P2P try to utilize content which have previously been cached somewhere. Content-centric networking (CCN) also utilizes data caching functionality. However, dislike CDN/P2P, CCN implements such a function on network nodes. Then, any intermediated nodes can directly respond to request messages for cached data. Hence, it is essential which content is cached as well as which nodes cache transmitted content. Basically, CCN propose for every nodes on the path from the content publisher of transmitted object to a requester to cache the object. However, such an approach is inefficient considering the utilization of cached objects as well as the storage overhead of each node. Hence, various caching mechanisms are proposed to enhance the storage efficiency of a node. In this paper, we analyze the performance of such mechanisms and compare the characteristics of such mechanisms. Also, we analyze content utilization patterns and apply such pattern to caching mechanisms to analyze the practicalism of the caching mechanisms.

A Study on Security Container to Prevent Data Leaks (정보 유출 방지를 위한 보안 컨테이너의 효과성 연구)

  • Lee, Jong-Shik;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1225-1241
    • /
    • 2014
  • Recently, Financial companies implement DLP(Data Leaks Prevention) security products and enforce internal controls to prevent customer information leaks. Accidental data leaks in financial business increase more and more because internal controls are insufficient. Security officials and IT operation staffs struggle to plan countermeasures to respond to all kinds of accidental data leaks. It is difficult to prevent data leaks and to control information flow in business without research applications that handle business and privacy information. Therefore this paper describes business and privacy information flow on applications and how to plan and deploy security container based OS-level and Hypervisor virtualization technology to enforce internal controls for applications. After building security container, it was verified to implement internal controls and to prevent customer information leaks. With security policies additional security functions was implemented in security container and With recycling security container costs and time of response to security vulnerabilities was reduced.

Rule-Based Anchor Shot Detection Method in News Video: KBS and MBC 9 Hour News Cases (규칙기반 뉴스 비디오 앵커 TIT 검출방법: KBS와 MBC 9시 뉴스를 중심으로)

  • Yoo, Hun-Woo;Lee, Myung-Eui
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.50-59
    • /
    • 2007
  • In this paper, an anchor shot detection method, which is a basic technology for managing news videos for index and retrieval purposes is proposed. To do that, two most popular news program such as 'KBS 9 Hour News' and 'MBC 9 Hour News' are analyzed and 4-step rule based detection method is proposed First, in the preprocessing, video shot boundaries are detected and the 1st frame of each shot is extracted as a key frame. Then, the detected shot is declared as an anchor shot, if all the following 4 conditions are satisfied. 1) There is an anchor face in the key frame of a shot. 2) Spatial distribution of edges in the key frame is adequate. 3) Background color information of the key frame is similar to the color information of an anchor model. 4) Motion rate in the shot is low. In order to show the validity of the proposed method, three 'KBS 9 Hour News' and three 'MBC 9 Hour News', which have total running time of 108 in minute and are broadcasted at different days, are used for experiments. Average detection rates showed 0.97 in precision, 1.0 in recall, and 0.98 in F-measure.

  • PDF

Design and Implementation of Realtime Information Service based on Ubiquitous Sensor Network Using MySQL and Tiny-DB (Tiny-DB와 MySQL을 이용한 유비쿼터스 센서 네트워크 기반의 실시간 정보 서비스 설계 및 구현)

  • Kang, Kyoung-Ok;Kim, Yong-Woo;Kwon, Hoon;Kim, Bu-Rim;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.175-181
    • /
    • 2006
  • Wireless sensor network forms the self-organization network, and transfers the information among sensor nodes that have computing technology ability and wireless communication ability. The recent sensor network is study for low-power, micro, low cost of node is proceeded. Recently, the research of application services in wireless sensor networks is proceeded. Therefore, in this paper, we design the prototype of the real-time information service that support a user the information of temperature, illumination etc. And, we implement the alarm application service fer the disaster prevention on Internet base on IPv4/IPv6. We develop the module of the extract information using the query processing based on TinyOS, and the module of the server's database using MySQL data base management system and JDBC. Additionally, we develop the client module that receive the real-time sensing data using ODBC in Internet based on IPv4/IPv6.

  • PDF