• Title/Summary/Keyword: 한국컴퓨터

Search Result 35,675, Processing Time 0.061 seconds

Improving application startup time by automatic profiling (Automatic Usage Profiling을 통한 초기 앱 실행 속도 개선 방법)

  • Chae, Hyangseok;Baik, Jongmoon
    • Journal of Software Engineering Society
    • /
    • v.28 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Google released an initial version of Android that runs Dex(Dalvik Executable) through the Dalvik Runtime. Since Dalvik Runtime is based on interpreter, JIT(Just-in-time) compilation has been applied to improve performance. After Lollipop(Android 5.0) Dalvik Runtime has replaced with ART Runtime which support AOT (Ahead-of-time) compilation of Dex into Native Code. The late st Android has a problem that the application execution speed is slow until the AOT compilation is completed according to the actual usage record after the installation of the app. To improve the problem we have investigate the characteristics of profile that can improve the execution speed of the application and generate the profile automatically. Finally we propose a method that can optimize the application at install time. With the proposed method we can optimize selectively at install time and can help improving the execution speed of the app from the initial execution.

The Effects of Information System Quality on Public Information Project Performance: With a Focus on the Mediating Effects by the Users (정보시스템 품질이 공공정보화사업 성과에 미치는 영향: 사용자의 매개효과를 중심으로)

  • Kim, Won-Ki;Park, So-Hyun;Kim, Seung-Chul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.8
    • /
    • pp.181-190
    • /
    • 2019
  • The purpose of this study is to verify the effects of information system quality on business performance (net benefit) in the Korean public informatization business and to verify whether the user has mediating role in the relationship between information system quality and net benefit. In order to prepare empirical tests, factor analyses was conducted and the validity and reliability of the variables were confirmed to be acceptable. The research hypotheses were tested by regression analyses. The mediating effects as well as the main effects were analyzed by SPSS statistical program. The results show that the higher the quality of the information system becomes, the higher the usability by the users of the system increases. Also, it was found that the users had more positive effect on the net benefit of the public informatization project. In addition, it was confirmed that there was a partial mediating effect by the users on the relationship between information system quality and the benefits. The results of the research suggests that we establish a management system to improve the business performance efficiently according to the priorities of detailed success factors from the viewpoint of the public information business, and the users who use the information system quality and system.

Time Synchronization Robust to Topology Change Through Reference Node Re-Election (기준노드의 재선정을 통한 토폴로지 변화에 강인한 시간 동기화)

  • Jeon, Young;Kim, Taehong;Kim, Taejoon;Lee, Jaeseang;Ham, Jae-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.8
    • /
    • pp.191-200
    • /
    • 2019
  • In an Ad-hoc network, a method of time synchronizing all the nodes in a network centering on one reference node can be used. A representative algorithm based on a reference node is Flooding Time Synchronization Protocol (FTSP). In the process of sending and receiving messages, predictable and unpredictable delays occur, which should be removed because it hinders accurate time synchronization. In multi-hop communications, hop delays occur when a packet traverses a number of hops. These hop delays significantly degrade the synchronization performance among nodes. Therefore, we need to find a method to reduce these hop delays and increase synchronization performance. In the FTSP scheme, hop delays can be greatly increased depending on the position of a reference node. In addition, in FTSP, a node with the smallest node ID is elected as a reference node, hence, the position of a reference node is actually arbitrarily determined. In this paper, we propose an optimal reference node election algorithm to reduce hop delays, and compare the performance of the proposed scheme with FTSP using the network simulator OPNET. In addition, we verify that the proposed scheme has an improved synchronization performance, which is robust to topology changes.

The Rated Self: Credit Rating and the Outsoursing of Human Judgment (평가된 자아: 신용평가와 도덕적, 경제적 가치 평가의 외주화)

  • Yi, Doogab
    • Journal of Science and Technology Studies
    • /
    • v.19 no.1
    • /
    • pp.91-135
    • /
    • 2019
  • As we live a life increasingly mediated by computers, we often outsource our critical judgments to artificial intelligence(AI)-based algorithms. Most of us have become quite dependent upon algorithms: computers are now recommending what we see, what we buy, and who we befriend with. What happens to our lives and identities when we use statistical models, algorithms, AI, to make a decision for us? This paper is a preliminary attempt to chronicle a historical trajectory of judging people's economic and moral worth, namely the history of credit-rating within the context of the history of capitalism. More importantly this paper will critically review the history of credit-rating from its earlier conception to the age of big data and algorithmic evaluation, in order to ask questions about what the political implications of outsourcing our judgments to computer models and artificial intelligence would be. Some of the questions I would like to ask in this paper are: by whom and for what purposes is the computer and artificial intelligence encroached into the area of judging people's economic and moral worth? In what ways does the evolution of capitalism constitute a new mode of judging people's financial and personal identity, namely the rated self? What happens in our self-conception and identity when we are increasingly classified, evaluated, and judged by computer models and artificial intelligence? This paper ends with a brief discussion on the political implications of the outsourcing of human judgment to artificial intelligence, and some of the analytic frameworks for further political actions.

Combating Identity Threat of Machine: The effect of group-affirmation on humans' intellectual performance loss (기계의 정체성 위협에 대항하기: 집단 가치 확인이 인간의 지적 수행 저하에 미치는 효과)

  • Cha, Young-Jae;Baek, Sojung;Lee, Hyung-Suk;Bae, Jonghoon;Lee, Jongho;Lee, Sang-Hun;Kim, Gunhee;Jang, Dayk
    • Korean Journal of Cognitive Science
    • /
    • v.30 no.3
    • /
    • pp.157-174
    • /
    • 2019
  • Motivation of human individuals to perform on intellectual tasks can be hampered by identity threat from intellectual machines. A laboratory experiment examined whether individuals' performance loss on intellectual tasks appears under human identity threat. Additionally, by affirming alternative attributes of human identity, researchers checked whether group-affirmation alleviate the performance loss on intellectual tasks. This research predicted that under high social identity threat, individuals' performance loss on the intellectual tasks would be moderated by valuing alternative attributes of human identity. Experiment shows that when social identity threat is increased, human individuals affirmed alternative human attributes show higher performance on intellectual tasks than individuals non-affirmed. This effect of human-group level affirmation on performance loss did not appear in the condition of low social identity threat. Theoretical and practical implications were discussed.

The Precise Three Dimensional Phenomenon Modeling of the Cultural Heritage based on UAS Imagery (UAS 영상기반 문화유산물의 정밀 3차원 현상 모델링)

  • Lee, Yong-Chang;Kang, Joon-Oh
    • Journal of Cadastre & Land InformatiX
    • /
    • v.49 no.1
    • /
    • pp.85-101
    • /
    • 2019
  • Recently, thank to the popularization of light-weight drone through the significant developments in computer technologies as well as the advanced automated procedures in photogrammetry, Unmanned Aircraft Systems have led to a growing interest in industry as a whole. Documentation, maintenance, and restoration projects of large scaled cultural property would required accurate 3D phenomenon modeling and efficient visual inspection methods. The object of this study verify on the accuracies achieved of 3D phenomenon reconstruction as well as on the validity of the preservation, maintenance and restoration of large scaled cultural property by UAS photogrammetry. The test object is cltural heritage(treasure 1324) that is the rock-carved standing Bodhisattva in Soraesan Mountain, Siheung, documented in Goryeo Period(918-1392). This standing Bodhisattva has of particular interests since it's size is largest stone Buddha carved in a rock wall and is wearing a lotus shaped crown that is decorated with arabesque patterns. The positioning accuracy of UAS photogrammetry were compared with non-target total station survey results on the check points after creating 3D phenomenal models in real world coordinates system from photos, and also the quantified informations documented by Culture Heritage Administration were compared with UAS on the bodhisattva image of thin lines. Especially, tests the validity of UAS photogrammetry as a alternative method of visual inspection methods. In particular, we examined the effectiveness of the two techniques as well as the relative fluctuation of rock surface for about 2 years through superposition analysis of 3D points cloud models produced by both UAS image analysis and ground laser scanning techniques. Comparison studies and experimental results prove the accuracy and efficient of UAS photogrammetry in 3D phenomenon modeling, maintenance and restoration for various large-sized Cultural Heritage.

Scanline Based Metric for Evaluating the Accuracy of Automatic Fracture Survey Methods (자동 균열 조사기법의 정확도 평가를 위한 조사선 기반의 지표 제안)

  • Kim, Jineon;Song, Jae-Joon
    • Tunnel and Underground Space
    • /
    • v.29 no.4
    • /
    • pp.230-242
    • /
    • 2019
  • While various automatic rock fracture survey methods have been researched, the evaluation of the accuracy of these methods raises issues due to the absence of a metric which fully expresses the similarity between automatic and manual fracture maps. Therefore, this paper proposes a geometry similarity metric which is especially designed to determine the overall similarity of fracture maps and to evaluate the accuracy of rock fracture survey methods by a single number. The proposed metric, Scanline Intersection Similarity (SIS), is derived by conducting a large number of scanline surveys upon two fracture maps using Python code. By comparing the frequency of intersections over a large number of scanlines, SIS is able to express the overall similarity between two fracture maps. The proposed metric was compared with Intersection Over Union (IoU) which is a widely used evaluation metric in computer vision. Results showed that IoU is inappropriate for evaluating the geometry similarity of fracture maps because it is overly sensitive to minor geometry differences of thin elongated objects. The proposed metric, on the other hand, reflected macro-geometry differences rather than micro-geometry differences, showing good agreement with human perception. The metric was further applied to evaluate the accuracy of a deep learning-based automatic fracture surveying method which resulted as 0.674 (SIS). However, the proposed metric is currently limited to 2D fracture maps and requires comparison with rock joint parameters such as RQD.

A study on configuring deployment of digital repositories for the archives management systems (대량기록물 처리를 위한 영구기록물관리시스템의 디지털저장소 배치형상 연구)

  • Yim, Jin-Hee;Lee, Dae-Wook
    • The Korean Journal of Archival Studies
    • /
    • no.32
    • /
    • pp.177-217
    • /
    • 2012
  • The National Archives of Korea(NAK) has a mission to ingest large-scaled digital records and information from a number of different government agencies annually from 2015. There are important issues related to the digital records and information transfer between NAK and agencies, and one of them is how to configure deployment of digital repositories for the archives management systems. The purpose of this paper is to offer the way to design it by examining the checkpoints through the whole life cycle of digital records and information in the archives management systems and calculating the amount of ingested digital records and information to the systems in 2015 and deploying the digital repositories configured according to the amount the records and information. Firstly, this paper suggests that the archives management systems in NAK should be considered and examined into at least three different parts called Ingest tier, Preservation tier and Access tier in aspects to the characteristics of the flow and process of the digital records and information. Secondly, as a results of the calculation the amount of the digital records and information ingested to the archives management systems in 2015 is sum up to around 2.5 Tera bytes. This research draws several requirements related to the large-scaled data and bulk operations which should be satisfied by the database or database management system implemented on to the archives management systems. Thirdly, this paper configures digital repositories deployment according to the characteristics of the three tiers respectively. This research triggers discussion in depth and gives specific clues about how to design the digital repositories in the archives management systems for preparing the year of 2015.

Expanding User Types for Utilizing Certified e-Document Authorities (공인전자문서보관소의 이용 활성화를 위한 사용자 유형 확대방안)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.30
    • /
    • pp.175-204
    • /
    • 2011
  • Electronic records are generated not only in public sector but also in private sector. Records will be used across the public-private boundary. The Certified e-Document Authorities(CeDAs) may keep electronic documents in private sector for preservation and evidence, like the official Record Management Systems for Public sector. A CeDA is the Trusted Third Party (TTP) as a business to be entrusted and proof interchanging documents between parties. This CeDA system could be sustainable only if the CeDA earn the enough sales through enough uses. And yet, all the eight CeDA companies have not had enough users. How to utilize CeDAs is one of the hot issues in this area. In this paper, We analyze the threat to trustworthiness of CeDA due to payment of only one party among others, and describe the difficulty in use of CeDA for an individual user. These things make CeDAs cannot have enough users. To do address these, We expand the boundary of relevant parties for a document, present a delegate-establishing option under a joint name, show the needs of identifying and notifying minimum relevant parties, and suggest the proxy parties to help the individual users.

Directions for Developing Database Schema of Records in Archives Management Systems (영구기록물관리를 위한 기록물 데이터베이스 스키마 개발 방향)

  • Yim, Jin-Hee;Lee, Dae-Wook;Kim, Eun-Sil;Kim, Ik-Han
    • The Korean Journal of Archival Studies
    • /
    • no.34
    • /
    • pp.57-105
    • /
    • 2012
  • The CAMS(Central Archives Management System) of NAK(National Archives of Korea) is an important system which receives and manages large amount of electronic records annually from 2015. From the point of view in database design, this paper analyzes the database schema of CAMS and discusses the direction of overall improvement of the CAMS. Firstly this research analyzes the tables for records and folders in the CAMS database which are core tables for the electronic records management. As a result, researchers notice that it is difficult to trust the quality of the records in the CAMS, because two core tables are entirely not normalized and have many columns whose roles are unknown. Secondly, this study suggests directions of normalization for the tables for records and folders in the CAMS database like followings: First, redistributing the columns into proper tables to reduce the duplication. Second, separating the columns about the classification scheme into separate tables. Third, separating the columns about the records types and sorts into separate tables. Lastly, separating metadata information related to the acquisition, takeover and preservation into separate tables. Thirdly, this paper suggests considerations to design and manage the database schema in each phase of archival management. In the ingest phase, the system should be able to process large amount of records as batch jobs in time annually. In the preservation phase, the system should be able to keep the management histories in the CAMS as audit trails including the reclassification, revaluation, and preservation activities related to the records. In the access phase, the descriptive metadata sets for the access should be selected and confirmed in various ways. Lastly, this research also shows the prototype of conceptual database schema for the CAMS which fulfills the metadata standards for records.