• Title/Summary/Keyword: API system

Search Result 1,009, Processing Time 0.03 seconds

Study on Visual Communication Design of Wearable Computing Devices (웨어러블 컴퓨팅 디바이스를 이용한 시각 디자인 구현 및 연구)

  • Lee, Su Jin
    • Korea Science and Art Forum
    • /
    • v.34
    • /
    • pp.251-262
    • /
    • 2018
  • The purpose of this study is to understand how wearable computing devices are designed and how to design them in a technology based wearable device design research. Research is premised on the consideration of producers and consumers. There is wearable computer of eyeglasses, watches, clothes, and so on. The user can always wear these products comfort and use as part of the body without any sense of discomfort, and the goal is to supplement or double the ability of the human being. It should be easy to use them convenient, wear comfortable, safe and sociable at any time. For the satisfaction these conditions, the wearable computing devices have several factors. There are technical performances, visual aesthetics, Human body system and devices communication and safety. Furthermore, these factors have to match to operating system, real-time operating system and applied software. To comprehend wearable computing devices should be offered the design of the both software and hardware designed.

A system on using GIS data to support architectural design (건축설계 지원을 위한 GIS 데이터 활용 시스템)

  • Kim, Eon Yong
    • Design Convergence Study
    • /
    • v.15 no.2
    • /
    • pp.169-184
    • /
    • 2016
  • Using geospatial information in the early design phase is crucial because it requires considerable time, money, and effort. We use VWorld, part of the National Spatial Information Distribution system provided by the Korean Ministry of Land, Infrastructure and Transportation, for providing geospatial information to building designers. We provide methods to adopt VWorld geospatial information to building design and develop plugins for a BIM authoring tool to transform and construct necessary BIM data in a user-friendly format. BIM users are benefitted from extra design information supplied from sibling disciplines such as urban design. GIS users are benefited by feedback building information continuously supplied from building projects based upon standard GIS coordinates. It is clear that an architectural designer with BIM tool can save time and efforts to obtain the geospatial information related a project using the developed system as result of this research.

Semantic Search based on Event Ontology (이벤트 온톨로지 기반의 의미 정보 검색)

  • Han, Yong-Jin;Park, Se-Young;Lee, Young-Hwa;Kim, Kweon-Yang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.96-100
    • /
    • 2008
  • An ontology provides an explicit specification of concepts and relations on information extracted from database or on human knowledge. Using an ontology, The information can be reconstructed according to semantic relations. In this paper. IT-People Event Ontology is constructed using people information extracted from web portals. IT-People Event Ontology represents constant information and time-temporal information on people. A system using this ontology outputs the well-organized reconstructed information on a specific individual in interest, and then the reconstructed information is suitable for users' demand.

Implementation of anti-screen capture modules for privacy protection (개인 정보 보호를 위한 화면 캡쳐 방지 모듈 구현)

  • Lee, Jong-Hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.91-96
    • /
    • 2014
  • According to the spread of computers and the development of the information society, people are focused on privacy information. As the development of its associated policy and technology, it has been tried various attempts to protect their personal information. In this paper, we proposed anti-screen capture modules to protect personal information or a company's confidential information for agencies and departments that keeps top security. As a result, we can prevent an illegal use or a stealing of another person's information in a public agency or personal computer. Also modules can stop exposures of top security data and personal information during they communicate with others in their institution's sever system.

Determination of Source Contribution Based on Aerosol Number and Mass Concentration in the Seoul Subway Stations (분진의 개수농도 및 질량농도에 입각한 서울시 지하철 역사 내 오염원의 기여도 결정)

  • 최형욱;황인조;김신도;김동술
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.20 no.1
    • /
    • pp.17-31
    • /
    • 2004
  • The subway play an important part in serious traffic problems. However, because subway system is a closed environment, many serious air pollution problems occurred in subway stations and injured passenger's health. Therefor, it is a necessary to identify sources and to estimate pollutant sources in order to protect passenger's health and to keep clean subway environment. The purpose of this study was to analyze a air quality in the subway stations and to apply a new receptor methodology for quantitatively estimate of PM10 sources. In this study, the size distributions of particulate matters has been measured by using Aerosizer LD (U.S.A., API, Inc.). It's real time measurement capability of time-of-flight technique offers a significant advantage of user convenience and air pollution management. Also, the mass concentrations of PM 10 has been measured by using mini-vol portable sampler (U.S.A., Airmetrics Co.). The sampling performed in Seoul subway stations during the period of February 2000 and April 2000. The number distribution data used in this study consisted of 26 raw data sets in the Jongno-sam-ga station. Correlation Analysis can be used in subway stations for source separation and identification. Then, number contribution from each source is determined by the particle number balance (PNB). The mass concentration data used in this study consisted of 31 raw data in the 8 different stations. The mass contributions of PM10 sources in the concourse by using PMF/CMB model.

Institutional Applications of Eclipse Scripting Programming Interface to Clinical Workflows in Radiation Oncology

  • Kim, Hojin;Kwak, Jungwon;Jeong, Chiyoung;Cho, Byungchul
    • Progress in Medical Physics
    • /
    • v.28 no.3
    • /
    • pp.122-128
    • /
    • 2017
  • Eclipse Scripting Application Programming Interface (ESAPI) was devised to enhance the efficiency in such treatment related workflows as contouring, treatment planning, plan quality measure, and data-mining by communicating with the treatment planning system (TPS). It is provided in the form of C# programming based toolbox, which could be modified to fit into the clinical applications. The Scripting program, however, does not offer all potential functionalities that the users intend to develop. The shortcomings can be overcome by combining the Scripting programming with user-executable program on Windows or Linux. The executed program has greater freedom in implementation, which could strengthen the ability and availability of the Scripting on the clinical applications. This work shows the use of the Scripting programming throughout the simple modification of the given toolbox. Besides, it presents the implementation of combining both Scripting and user-executed programming based on MATLAB, applied to automated dynamic MLC wedge and FIF treatment planning procedure for promoting the planning efficiency.

End-mill Modeling and Manufacturing Methodology via Cutting Simulation (Cutting Simulation을 이용한 End-milling Cutter의 모델링 및 제작에 관한 연구)

  • Kim Jae-Hyun;Kim Jong-Han;Ko Tae-Jo;Park Jung-Whan
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.23 no.6 s.183
    • /
    • pp.151-159
    • /
    • 2006
  • This paper describes a design process of end-milling cutters: solid model of the designed cutter is constructed along with computation of cutter geometry, and the wheel geometry as well as wheel positioning data f3r fabricating end-mills with required cutter geometry is calculated. In the process, the main idea is to use the cutting simulation method by which the machined shape of an end-milling cutter is obtained via Boolean operation between a given grinding wheel and a cylindrical workpiece (raw stock). Major design parameters of a cutter such as rake angle, inner radius can be verified by interrogating the section profile of its solid model. We studied relations between various dimensional parameters and proposed an iterative approach to obtain the required geometry of a grinding wheel and the CL data for machining an end-milling cutter satisfying the design parameters. This research has been implemented on a commercial CAD system by use of the API function programming, and is currently used by a tool maker in Korea. It can eliminate producing a physical prototype during the design stage, and it can be used for virtual cutting test and analysis as well.

The Study on Improvement of the Program that Traces the Binary Codes in Execution (실행 중인 바이너리 코드 추출 프로그램의 기능 확장 연구)

  • Chang, Hang-Bae;Kwon, Hyuk-Jun;Kim, Yang-Hoon;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1309-1315
    • /
    • 2009
  • This research goal of developing and producing a tool that finds security weakness that may happen when a usual program is executed. The analyzing tool for security weakness has the major functions as follows. In case that a part of anticipated security weakness are in execution, it traces a machine language to a part in execution. And Monitoring System calls and DLL(API) calls when a program is in execution. The result of this study will enable to contribute to use as educational materials for security service in companies and related agencies and to prevent from hacking of external information invaders in the final analysis.

  • PDF

Behavior based Malware Profiling System Prototype (행위기반 악성코드 프로파일링 시스템 프로토타입)

  • Kang, Hong-Koo;Yoo, Dae-Hoon;Choi, Bo-Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.376-379
    • /
    • 2017
  • 전 세계적으로 악성코드는 하루 100만개 이상이 새롭게 발견되고 있으며, 악성코드 발생량은 해마다 증가하고 있는 추세이다. 공격자는 보안장비에서 악성코드가 탐지되는 것을 우회하기 위해 기존 악성코드를 변형한 변종 악성코드를 주로 이용한다. 변종 악성코드는 자동화된 제작도구나 기존 악성코드의 코드를 재사용하므로 비교적 손쉽게 생성될 수 있어 최근 악성코드 급증의 주요 원인으로 지목되고 있다. 본 논문에서는 대량으로 발생하는 악성코드의 효과적인 대응을 위한 행위기반 악성코드 프로파일링 시스템 프로토타입을 제안한다. 동일한 변종 악성코드들은 실제 행위가 유사한 특징을 고려하여 악성코드가 실행되는 과정에서 호출되는 API 시퀀스 정보를 이용하여 악성코드 간 유사도 분석을 수행하였다. 유사도 결과를 기반으로 대량의 악성코드를 자동으로 그룹분류 해주는 시스템 프로토타입을 구현하였다. 악성코드 그룹별로 멤버들 간의 유사도를 전수 비교하므로 그룹의 분류 정확도를 객관적으로 제시할 수 있다. 실제 유포된 악성코드를 대상으로 악성코드 그룹분류 기능과 정확도를 측정한 실험에서는 평균 92.76%의 분류 성능을 보였으며, 외부 전문가 의뢰에서도 84.13%로 비교적 높은 분류 정확도를 보였다.

A Study of Countermeasure against Security Risk of Fintech Services for Financial Innovation (금융혁신을 위한 핀테크 서비스의 보안 리스크 대응방안 연구)

  • Park, Jeong-Kuk;Kim, Injai
    • Knowledge Management Research
    • /
    • v.16 no.4
    • /
    • pp.35-45
    • /
    • 2015
  • Fintech, which means the convergence of finance and information technology, becomes a hot topic in the financial sector. Through innovative activities on financial services, ICT(Information and Communication Technology) is integrated into the overall financial industry, and a new form of financial services could be expected to improve the existing financial system. On the other hand, fintech services are relatively vulnerable to security issues. Due to the process simplication and the channel fusion, the leakage of personal and financial informations, authentication bypass, phishing, and pharming are getting more concerned. In this study we investigated the security risk of fintech services in the viewpoints of service provider, technology adoption, and security policy. The possible countermeasures to reduce those risks are suggested because security is an important criterion for selecting financial services. This study basically offers quantification of the potential security risks and step-by-step control measures about business processes in the fintech services. The suggested security model includes user authentication, terminal security, payment information protection, API(Application Programming Interface) security, and abnormal transaction monitoring. This study might contribute to an understanding of the security risks and some possible measures for mitigating those risks on the practical perspective.