• Title/Summary/Keyword: Call-Command

Search Result 25, Processing Time 0.025 seconds

LOGO와 함께 곡선 만들기 - 다각형 패턴의 관점에서

  • Kim, Hwa-Kyung;Song, Min-Ho
    • East Asian mathematical journal
    • /
    • v.26 no.4
    • /
    • pp.447-461
    • /
    • 2010
  • Papert [17] introduced the LOGO environment in which we make a curve using LOGO commands (FORWARD, ROTATE). We call this geometry as turtle geometry. This environment has influenced many researchers and designers of computers and mathematics education. But the curve that we can make using LOGO command is elementary or too difficult. Polygon and circle is elementary and making other curves is difficult. In this paper, we introduce the method of drawing some other curves mediating new command. First, we study epicycloid and hypocycloid in the historical and the physical context. And we introduce the method of making epicycloid and hypocycloid using vector addition. Next we study the polygon patterns of this curve. Finally, we extend the method for making more general curve and we improve the computer environment using this metaphor.

A Plan of Existing System Interface within Station (역사내 기존 시스템 인터페이스 방안)

  • Lee, Won-Jae;An, Tae-Ki;Shin, Jeong-Ryol
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1550-1555
    • /
    • 2011
  • This paper presents the system interface standard that are associated with additional devices like sensor nodes as well as fire monitoring panel, panic button and emergency call in city railroad environment. Existing fire monitoring panel, panic button and emergency call system is responsible for fire detection and alarm, emergency alarm and communication with the manager. Recently, researches that are associated with NVR-based intelligent integrated surveillance systems and existing alarm system are activated but most of the system is dedicated to it existing. In order to expand devices that is supported other monitoring function, separate device configuration or modification of integrated surveillance system are inevitable. In this study, interface standard between standard controller, integrated command center and each device that facilitate additional expansion of integrated surveillance system and avoid the extra cost is presented.

  • PDF

119 Reported the Ubiquitous System of Condition Evaluation Analysis and Measures to Improvement - Focused on the Perceptions of Fire Officials - (유비쿼터스 119시스템 실태분석과 개선방안 - 소방공무원의 인식을 중심으로 -)

  • Chae, Jin;Woo, Seong-Cheon
    • Fire Science and Engineering
    • /
    • v.24 no.2
    • /
    • pp.58-66
    • /
    • 2010
  • As the number of disaster-related damage has been continuously increased despite various effort of the government, it is essential that ubiquitous IT which is rapidly advancing in recent years be utilized to enhance the efficient, scientific and systematic disaster management system. Though the command control GPS system and the 119 report system were adopted in 2008 and have been in operation, the effectiveness of the systems are imperceptible. This study is aimed at suggesting an effective disaster management plan throughout precedent studies and empirical analysis of the ubiquitous 119 report system. According to the study, it is considered to apply UIT to expansive field for disaster management since it showed that applicability, suitability, readiness of information acquisition and interests in utilizing are highly recognized. The command control GPS system can be vastly effective if we secure swiftness of information delivery.

Android Storage Access Control for Personal Information Security (개인정보를 위한 안드로이드 저장장치 접근제어)

  • You, Jae-Man;Park, In-Kyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.123-129
    • /
    • 2013
  • Android file system is vulnerable to the external access of system resources via its arbitrary access mode and need user's control for SD and UMS medias due to its open architecture. In response to the device control, there is a drawback that its controlability is valid only in the case of embedded linux kernel with VDC function. Hence the solution is to directly implement VDC through system call, with another security module for device storage than system module being added to android system. In this paper the new method of android storage access control for personal information is proposed via VDC for mount system of storage. The access method for SD and UMS were implemented using VDC and mount mechanism. This access control system has been designed to control the granted users in kernel level if files are flowed out by copying. As a result, it was proved through testing that the access control system has exactly detected the write access operation.

Analysis on the Information Flows and Representations of User-OPACs Interfaces. (이용자-OPACs접속의 정보 흐름과 표현의 분석)

  • Kim Sun-Ho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.29
    • /
    • pp.141-172
    • /
    • 1995
  • The main objective of this study is to analyse the information flows and representations which is shown at the displays of the user-OPACs interfaces in the 5 academic library automation systems. The findings made in the study are summarized as follows: 1) The interactive styles of that displays are based on the menu selection style. 2) The structures of information flow on that displays are the compound structure which is basically made of the network, the binary, and the pop-up structures. 3) The elements of the displays are consisted with the fields concerning the database name, the current working area, the indicator, the menu, the exit, the prompt and the system message. 4) The essential entries of the main menus are Book, Periodical. and Thesis. 5) The important languages of the command language styles are Search, Display, Print, Help, and End. 6) The elements of the display structures for the retrieval are the retrieving key, the Boolean operators, and the exit. 7) The major retrieving keys are Title, Author, Subject name, Call Number, and Publisher. 8) The marks of Boolean operators on the retrieval displays is different among the systems each other.

  • PDF

Implementation of Data Storage Media Control and Command(DSM-CC) Core User-to-User Interface for MPEG-2 Bit Stream Transport

  • Park, Seong-Jong;Kim, Yong-Han;Kim, Jae-Woo;Lee, Ho-Jang;Shim, Jae-Kyu;Kim, Jae-D.;Koh, Jong-Seong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06b
    • /
    • pp.79-84
    • /
    • 1998
  • This paper describes implementation of the core DSM-CC UU interface. It briefly describes the reference model for the DSM-CC and related standards that should be reviewed for the implementation. The Common Object Request Broker Architechture, Revision 2.0 (CORBA 2.0) is sued as a remote procedure call (RPC) scheme for the UU Interface. Entire system was implemented with C++ on Windows NT platforms. The implementation procedure has been decomposed ito two tasks. The first task is to implement the Naming Service for service navigation. The Naming Service is one of the CORBA Services that extend the core CORBA specification. A client GUI is implemented for easy navigation among various services. The second task is to construct multimedia server and client for a Video-on-Demand (VoD) system. MPEG-2 Transport Stream is transported via ATM AAL5 using the Windows Socket 2.2 ATM extension API. A GUI enables the user to navigate the service domain and select a program. After the selection the user can control the MPEG-2 stream with VCR-like buttons.

  • PDF

HAS-Analyzer: Detecting HTTP-based C&C based on the Analysis of HTTP Activity Sets

  • Kim, Sung-Jin;Lee, Sungryoul;Bae, Byungchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1801-1816
    • /
    • 2014
  • Because HTTP-related ports are allowed through firewalls, they are an obvious point for launching cyber attacks. In particular, malware uses HTTP protocols to communicate with their master servers. We call this an HTTP-based command and control (C&C) server. Most previous studies concentrated on the behavioral pattern of C&Cs. However, these approaches need a well-defined white list to reduce the false positive rate because there are many benign applications, such as automatic update checks and web refreshes, that have a periodic access pattern. In this paper, we focus on finding new discriminative features of HTTP-based C&Cs by analyzing HTTP activity sets. First, a C&C shows a few connections at a time (low density). Second, the content of a request or a response is changed frequently among consecutive C&Cs (high content variability). Based on these two features, we propose a novel C&C analysis mechanism that detects the HTTP-based C&C. The HAS-Analyzer can classify the HTTP-based C&C with an accuracy of more than 96% and a false positive rate of 1.3% without using any white list.

Labor Market Governance and Regional Development in The Philippines: Uneven Trends and Outcomes

  • Sale, Jonathan P.
    • World Technopolis Review
    • /
    • v.1 no.3
    • /
    • pp.192-205
    • /
    • 2012
  • Globalization has fuelled the desire for simplicity and flexibility in rules and processes within nations. de Soto (2000) calls for the simplification of rules to enable people to join the formal economy. Friedman (2005) echoes the need for simpler rules, to attract business and capital. Market-based approaches to governing have been adopted in many nations due to globalization. Recent developments demonstrate that such approaches fail. Globalization may lead to impoverishment in the absence of proper forms of governance (Cooney 2000). That is why it has the tendency to become a "race to the bottom." Regulatory measures can be costly, and the costs of doing business are uneven across nations. This unevenness is being used as a comparative advantage. Others call this regulatory competition (Smith-Bozek 2007) or competitive governance (Schachtel and Sahmel 2000), which is similar to the model of Charles Tiebout. Collaborative governance is an approach that governments could use in lieu of the competitive method. Mechanisms that enable stakeholders to exchange information, harmonize activities, share resources, and enhance capacities (Himmelman 2002) are needed. Philippine public policy encourages a shift in modes of realizing labor market governance outcomes from command to collaboration (Sale and Bool 2010B; Sale 2011). Is labor market governance and regional development in the Philippines collaborative? Or is the opposite - competitive governance (Tiebout model) - more evident? What is the dominant approach? This preliminary research tackles these questions by looking at recent data on average and minimum wages, wage differentials, trade union density, collective bargaining coverage, small and bigger enterprises, employment, unemployment and underemployment, inflation, poverty incidence, labor productivity, family income, among others, across regions of the country. The issue is studied in the context of legal origins. Cultural explanations are broached.

The Current VIP Guard System and Its Development (요인의 안전을 위한 경호조직 분석 및 발전 방안)

  • 오세용;김창은
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.3
    • /
    • pp.81-98
    • /
    • 2003
  • In modern society, there are diverse sorts of VIPs including a king and individuals. Some like a king or president are in need of professional secret services, and others become VIPs by being guarded by a bodyguard company at their own request. The former is called a public guard, and the latter is a private one. In the field of the public guard, the nation should be furnished with a guard system in consideration of political circumstances to protect VIPs. That is, the parliamentary cabinet system and presidential system call for a different guard system, and the guard system's professional features vary to some degree with political situations and cultural climate. If the ultimate goal of guard is to protect the chief of the democratic and open state in a most efficient and safe manner, it's mandatorily necessary to set up a professional and specialized guard organization to provide democratic and efficient secret services. It's desired that the domestic presidential guard division should be staffed with not only expert guards but other personnels dispatched from the military and police. In the police, guard mission is splitted among various guard and security agencies, including the National Police Agency's public security bureau or the Seoul Metropolitan Police Agency's public security division, 101 security unit, mobile police and 22 special guard division. As a chain of command is separated and it's difficult to manage such organizations effectively, the National Police Agency should be exclusively in charge of VIP guard and security. In the area of private guard, the private police system has shared national security task as a middle organization between the private police and private guard. But now its intent has gradually weakened, and its mission should be redefined. In addition, the way people look at private guard should change, and they should be well informed that it could serve to prevent possible crimes, protect them against crimes and get rid of their inconveniences. To make a good impression on people, the guard associations and businesses should put their efforts into reinforcing publicity activities, and the government, academic circles and press should team up with them as well.

Design and Implementation of a Speech Synthesis Engine and a Plug-in for Internet Web Page (인터넷 웹페이지의 음성합성을 위한 엔진 및 플러그-인 설계 및 구현)

  • Lee, Hee-Man;Kim, Ji-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.461-469
    • /
    • 2000
  • In the paper, the design and the implementation of the netscape plug-in and the speech synthesis enginegenerating the speech sounds from the text information of the web pages are described. The steps of the generating speech sound from an web pages are the speech synthesis plug-in is activated when the netscape finds the audio/xesp MIME data type embedded in the browsed web page; the HTML file referenced in the EMBED MTML tag is down loaded from the referenced URL to send to the commander object located in the said plug-in; The speech synthesis engine control tags and the text characters are extracted from the down loaded HTML document by the commander object the synthesized speech sounds are generated by the speech synthesis engine. The speech synthesis engine interprets the command streams from the commander objects to call the member functions for the processing of the speech segment data in the data banks. The commander object and the speech synthesis engine are designed as an independent object to enhancethe flexitility and the portability.

  • PDF