• Title/Summary/Keyword: 핵심요소기술

Search Result 1,594, Processing Time 0.031 seconds

The Design of a Complex Event Model for Effective Service Monitoring in Enterprise Systems (엔터프라이즈 시스템에서 효과적인 서비스 모니터링을 위한 복합 이벤트 모델의 설계)

  • Kum, Deuk-Kyu;Lee, Nam-Yong
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.261-274
    • /
    • 2011
  • In recent competitive business environment each enterprise has to be agile and flexible. For these purposes run-time monitoring ofservices provided by an enterprise and early decision making through this becomes core competition of the enterprise. In addition, in order to process various innumerable events which are generated on enterprise systems techniques which make filtering of meaningful data are needed. However, the existing study related with this is nothing but discovering of service faults by monitoring depending upon API of BPEL engine or middleware, or is nothing but processing of simple events based on low-level events. Accordingly, there would be limitations to provide useful business information. In this paper, through situation detection an extended complex event model is presented, which is possible to provide more valuable and useful business information. Concretely, first of all an event processing architecture in an enterprise system is proposed, and event meta-model which is suitable to the proposed architecture is going to be defined. Based on the defined meta-model, It is presented that syntax and semantics of constructs in our event processing language including various and progressive event operators, complex event pattern, key, etc. In addition, an event context mechanism is proposed to analyze more delicate events. Finally, through application studies application possibility of this study would be shown and merits of this event model would be present through comparison with other event model.

Development of Quantitative Risk Assessment Methodology for the Maritime Transportation Accident of Merchant Ship (상선 운항 사고의 양적 위기평가기법 개발)

  • Yim, Jeong-Bin
    • Journal of Navigation and Port Research
    • /
    • v.33 no.1
    • /
    • pp.9-19
    • /
    • 2009
  • This paper describes empirical approach methodology for the quantitative risk assessment of maritime transportation accident (MTA) of a merchant ship. The principal aim of this project is to estimate the risk of MTA that could degrade the ship safety by analyzing the underlying factors contributing to MTA based on the IMO's Formal Safety Assessment techniques and, by assessing the probabilistic risk level of MTA based on the quantitative risk assessment methodology. The probabilistic risk level of MTA to Risk Index (RI) composed with Probability Index (PI) and Severity Index (SI) can be estimated from proposed Maritime Transportation Accident Model (MTAM) based on Bayesian Network with Bayesian theorem Then the applicability of the proposed MTAM can be evaluated using the scenario group with 355 core damaged accident history. As evaluation results, the correction rate of estimated PI, $r_{Acc}$ is shown as 82.8%, the over ranged rate of PI variable sensitivity with $S_p{\gg}1.0$ and $S_p{\ll}1.0$ is shown within 10%, the averaged error of estimated SI, $\bar{d_{SI}}$ is shown as 0.0195 and, the correction rate of estimated RI, $r_{Acc}$(%), is shown as 91.8%. These results clearly shown that the proposed accident model and methodology can be use in the practical maritime transportation field.

Metamorphosis Hierarchical Motion Vector Estimation Algorithm for Multidimensional Image System (다차원 영상 시스템을 위한 변형계층 모션벡터 추정알고리즘)

  • Kim Jeong-Woong;Yang Hae-Sool
    • The KIPS Transactions:PartB
    • /
    • v.13B no.2 s.105
    • /
    • pp.105-114
    • /
    • 2006
  • In ubiquitous environment where various kinds of computers are embedded in persons, objects and environment and they are interconnected and can be used in my place as necessary, different types of data need to be exchanged between heterogeneous machines through home network. In the environment, the efficient processing, transmission and monitoring of image data are essential technologies. We need to make research not only on traditional image processing such as spatial and visual resolution, color expression and methods of measuring image quality but also on transmission rate on home network that has a limited bandwidth. The present study proposes a new motion vector estimation algorithm for transmitting, processing and controlling image data, which is the core part of contents in home network situation and, using algorithm, implements a real time monitoring system of multi dimensional images transmitted from multiple cameras. Image data of stereo cameras to be transmitted in different environment in angle, distance, etc. are preprocessed through reduction, magnification, shift or correction, and compressed and sent using the proposed metamorphosis hierarchical motion vector estimation algorithm for the correction of motion. The proposed algorithm adopts advantages and complements disadvantages of existing motion vector estimation algorithms such as whole range search, three stage search and hierarchical search, and estimates efficiently the motion of images with high variation of brightness using an atypical small size macro block. The proposed metamorphosis hierarchical motion vector estimation algorithm and implemented image systems can be utilized in various ways in ubiquitous environment.

Development of Traffic Accident Index Considering Driving Behavior of a Data Based (데이터 기반의 도로구간별 운전자의 통행행태를 고려한 교통사고지표 개발)

  • LEE, Soongbong;CHANG, Hyunho;CHEON, Seunghoon;BAEK, Seungkirl;LEE, Young-Ihn
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.4
    • /
    • pp.341-353
    • /
    • 2016
  • Highway is mainly in charge of middle-long distance of vehicular travel. Trip length has shown a growing trend due to increased commute distances by the relocation of public agencies. For this reason, the proportion of driver-driven accidents, caused by their fatigue or sleepiness, are very high on highways. However, existing studies related to accident prediction have mainly considered external factors, such as road conditions, environmental factors and vehicle factors, without driving behavior. In this study, we suggested an accident index (FDR, Fatigued Driving Rate) based on traffic behavior using large-scale Car Navigation path data, and exlpored the relationship between FDR and traffic accidents. As a result, FDR and traffic accidents showed a high correlation. This confirmed the need for a paradigm shift (from facilities to travel behavior) in traffic accident prediction studies. FDR proposed in this study will be utilized in a variety of fields. For example, in providing information to prevent traffic accidents (sleepiness, reckless driving, etc) in advance, utilization of core technologies in highway safety diagnostics, selection of priority location of rest areas and shelter, and selection of attraction methods (rumble strips, grooving) for attention for fatigued sections.

A Basic Study on the Development of Garlic Seeder (경운기 부착형 마늘 파종기 개발을 위한 기초연구)

  • Lim, Hack-Kyoo;Kim, Tae-Han
    • Current Research on Agriculture and Life Sciences
    • /
    • v.22
    • /
    • pp.19-27
    • /
    • 2004
  • Cultivation area of garlics is 9% of all cultivation area of vegetables. The amount of annual demand is increased in 1,000~1,500ton. Also, the amount of demand per person has a tendency to increase as above 10kg. So, garlics has become important crops in agriculture. The purpose of this study is to acquire the basic information to design the garlic seeder attached power tiller. We used Working Model 3D program to design an automatic aligning device which is the most important part of the garlic seeder. The results are as follows; 1. The optimum depth of garlics seeding was shown as 3cm. 2. The garlic seed has to he discharged from the garlic seeder at intervals of 0.75sec in order to seed at intervals of seeds of 15cm. 3. The optimum design factors of the automatic aligning device were shown as cylinder diameter of 4cm, cylinder gap of 1cm, revolution of 36rpm and inclined angle of cylinder of $8.4^{\circ}$.

  • PDF

Ubiquitous Campus Model for Students Oriented (학생 중심의 유비쿼터스 캠퍼스모델)

  • Kim, Chang-Su;Lee, Jae-Hyuk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1407-1413
    • /
    • 2007
  • University environment on campus has been changed faster than before in today. Especially, they have devised middle & long-term development plans such as improving the image of campus and increasing campus competitive power to overcome difficulties in campus management. Therefore, many of those have made every effort to provide convenient university services for campus students and to improve the image of campus through building a Ubiquitous-Campus. But existing systems of a Ubiquitous-Campus have not understood actual conditions of IT (Information Technology) for campus students or not provided basic environment to analyze actual conditions of efficient using the system, expectations of the following people about a Ubiquitous-Campus is getting higher md higher though. Must become technology base ubiquitous campus construction, and is real erudition that ubiquitous campus model who can utilize substantially through service construction that is required newly with student's IT infra practical use analysis hereupon such as is required to solve these problems, But there is a limitation on designing the model in rapidly changed university environment on campus. In this paper, we studied about a Students Centralized Ubiquitous Campus model through U-Learning, U-Recruit, U-Printer, and personal information history service which are based on data warehouse for students analysis which is a key point element of building a Ubiquitous Campus.

Performance Analysis of Location-Aware System based on Active Tags (능동태그 기반 위치인식 시스템의 성능 분석)

  • So, Sun-Sup;Eun, Seong-Bae;Kim, Jin-Chun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.422-429
    • /
    • 2007
  • Location awareness is one of the key functionalities to build an U-city. Recently, many of works of the location-aware systems are emerging to commercially apply to on-going large-scale apartment complex based on U-city. As dwellers or cars being attached with active tags are moving in the U-city complex, the active tags periodically broadcast their own identifiers and receivers fixed along the street or in building use those information to calculate location of them. There are several issues to be considered for such an environment. The first is that the number of active tags operating in the same region are large as much as tens of thousands, and the second is that the active tags should be alive without change of batteries more than a year, hence low power consumption is very important. In this paper we propose i) a new architecture for location-aware system considering such issues, ii) technical issues to implement it using active tags, and iii) a mathematical analytic model to investigate overall performance and verify it by comparing with actual experimental results. Through the analysis we can show the theoretical boundary of the lowest packet loss rate and the maximum number of tags with acceptable performance for the systems based on active tags. The results can be applied to practical design of location-based systems of U-City projects.

A Study on the Application of BIPV for the Spread of Zero Energy Building (제로에너지 건축물 확산을 위한 건물 일체형 태양광 적용방안 연구)

  • Park, Seung-Joon;Jeon, Hyun-Woo;Lee, Seung-Joon;Oh, Choong-Hyun
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.189-199
    • /
    • 2021
  • In order to increase the self-reliance rate of new and renewable energy in order to respond to the mandatory domestic zero-energy buildings, the taller the building, the more limited the site area, and installing PV modules on the roof is not enough. Therefore, BIPV (Building integrated photovoltaic, hereinafter BIPV) is the industry receiving the most attention as a core energy source that can realize zero-energy buildings. Therefore, this study conducted a survey on the problems of the BIPV industry in a self-discussing method for experts with more than 10 years of experience of designers, builders, product manufacturers, and maintainers in order to suggest the right direction and revitalize the BIPV industry. Industrial problems of BIPV adjustment are drawn extention range of standard and certification for products, range improvement for current small condition of various kind productions, need to revise standards for capable of accomodating roof-type, color-module and louver-module, necessary of barrier in flow of foreign modules into korea through domestic certification mandatory, difficulty in obtaining BIPV information, request to prevent confusion among participants by exact guidelime about architectural application part of BIPV, and lack of the BIPV definition clearness, support policy, etc. Based on the improvements needed for the elements, giving change and competitiveness impacts aims to present and propose counter measures and direction.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

The composition and structure of Archival Information Packages(AIP) for a long-term preservation of electronic records (전자기록의 장기보존을 위한 보존정보패키지(AIP) 구성과 구조)

  • YIM, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.13
    • /
    • pp.41-90
    • /
    • 2006
  • It's needed for the archivists to design a flexible and stable ERMS(Electronic Records Management System) which can ingest and store records through a consistent way and let users search and use records easily what they want. The basis of the design for ERMS are the conceptual composition and the logical and physical structure of the records when they are stored and managed in the ERMS. This paper explains the process of defining components and designing structure of electronic records using 3-layered approaches which consist of conceptual, logical and physical layer and shows advantages of this approaches. After benchmarking the information models of OAIS which is a reference model for the long-term preservation of digital information objects, this paper applies the model of AIP to a record as a 'Record AIP' and discusses the composition and structure of it. It's a critical task to identify mandatory or optional metadata groups which consists of the 'Record AIP's in the conceptual layer. This paper emphases that the metadata group related to services for the record information to users is required as a result of benchmarking OAIS information models. Various issues about the structure of 'Record AIP's are discussed according to the kind of preservation strategy such as migration or emulation and whether the encapsulation of records is required or not in the logical layer.