• Title/Summary/Keyword: Class File

Search Result 112, Processing Time 0.036 seconds

The Preliminary Operator Risk Assessment of High Toxicological Pesticides in Korea (고독성 농약의 국내 농작업자 위해성 평가)

  • Hong, Soon-Sung;Jeong, Mi-Hye;Park, Kyung-Hun;You, Are-Sun;Park, Yeon-Ki;Lee, Je-Bong;Kim, Chan-Sub;Shin, Jin-Sup;Park, Jae-Eup
    • The Korean Journal of Pesticide Science
    • /
    • v.14 no.2
    • /
    • pp.116-122
    • /
    • 2010
  • This study was carried out to estimate the risk of pesticide operators who use high toxicological pesticides. The class II (highly hazardous) pesticides registered in korea were 15 products, and 11 products were spray type pesticides at orchard file in 2009. The using information based on the pesticide label and the data searched through survey of actual condition on pesticides were used for calculate the pesticide operator exposure dose. The risk quotients of these pesticides against the pesticides operator were calculated as devide pesticide exposure dose by reference dose which were presented by EFSA (European Food Safety Authority), JMPR (Joint FAO Meeting on Pesticide Residues), and US/EPA (United States Environmental Protection Agency). Omethoate showed the highest risk quotient and the values were 338 and 75 when the operator spray using speed sprayer and motor sprayer respectively. Risk quotients of all class II pesticide were above 1. This result means that the risk potential of these pesticides are very high.

Translating Java Bytecode to SPARC Code using Retargetable Code Generating Techniques (재목적 코드 생성 기법을 이용한 자바 Bytecode에서 SPARC 코드로의 번역)

  • Oh, Se-Man;Jung, Chan-Sung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.3
    • /
    • pp.356-363
    • /
    • 2000
  • Java programming language is designed to run effectively on internet and distributed network environments. However, because it has a deficit to be executed by the interpreter method on each platform, to execute Java programs efficiently the code generation system which transforms Bytecode into SPARC code as target machine code must be developed. In this paper, we implement a code generation system which translates Bytecode into SPARC code using the retargetable code generating techniques. For the sake of code expander, we wrote a Bytecode table describing a rule of SPARC code generation from Bytecode, and implemented the information extractor transforming Bytecode to suitable form during expanding of source code from class file. The information extractor determines constant pool entry of each Bytecode instruction operand and then the code expander translates the Bytecode into SPARC code accoring to the Bytecode table. Also, the retargetable code generation system can be systematically reconfigured to generate code for a variety of distinct target computers.

  • PDF

DEVELOPMENT OF A VALLEY MANAGEMENT SYSTEM FOR GIS AND REMOTE SENSING EDUCATION

  • Wu, Mu-Lin;Wong, Deng-Ching;Wang, Yu-Ming
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.570-573
    • /
    • 2006
  • College GIS and remote sensing education usually consists of commercial software packages implementations in the classroom. Computer programming is quite important when college graduates work in private or public sectors relevant with GIS and remote sensing implementations. The objective of this paper was to develop a valley management system which implements GIS and remote sensing as the key components for education. The Valley Authority is entitled with water resource protection for sustainable drinking water supply of the second largest city in Taiwan. The test area consists of three different government agencies, Forest Service, EPA, and Water Resource Agency. Materials were provided by the Valley Authority in ArcGIS file format. MapObjects have made the GIS development process much easier. Remote sensing with image manipulation functions were provided by computer programming with Visual Baisc.NET and Visual C#.NET. Attributes inquiry are performed by these two computer languages as well. ArcGIS and ArcPad are also used for simple GIS manipulations of the test area. Comparison between DIY and commercial GIS can be made by college students. Functions provided by the developed valley management system depending on how many map layers have been used and what types of MapObjects components have been used. Computer programming experience is not essential but can be helpful for a college student. The whole process is a step-by-step sequence which college students can modify to depict their capability in GIS and remote sensing. The development process has gone through one semester, three hours every week in 18 weeks. College students enrolled in this class entitled with GIS showed remarkable progresses both in GIS and remote sensing.

  • PDF

A study of improve vectorising technique on the internet (인터넷에서의 개선된 벡터라이징 기법에 관한 연구)

  • 김용호;이윤배
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.271-281
    • /
    • 2002
  • Currently, most web designers guarante high quality using bitmap graphics as fixed font size, but that has defects about file size and flexibility. Especially, to provide high quality of banner and advertise characters, after you should use a bitmap edit program, and then we should follow the method we add that program to HTML documents as bitmap data. In this study, as I show a couple of new tags in front of HTML documents, I show methods which can be presented diverse effects. When text information are stored, because we print out a screen with simple control points and outside information, it can be possible for us to express the same quality of Hangul characters like printed documents in a web browser. Regardless of the second class of platform, we can make it possible the character expression with exact character expressions and diverse effects.

Software Component Retrieval System for Version Control (버전제어를 위한 소프트웨어 구성요소의 검색 시스템)

  • O, Sang-Yeop;Kim, Heung-Jin;Jang, Deok-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1093-1102
    • /
    • 1996
  • For the reuse, configuration management, and version control of softwares, the composition of retrieval systems and library are most important matters, which makes it possible to retrieve the concerned software components. Retrieval systems, which is able to store many components, must make it possible to retrieve the concerned components with deadwoods in the fastest way. Based either on keyboards or the concept of inverted file on the part of content is usually used in the current retrieval systems. However, in this paper, new retrieval systems are suggested with using set and bag class with Smalltalk language, one of object- oriented programming language, based either on the keywords or on the part of content to find out the concerned components. This method is improved the function of user interface and its management, In this paper, library is also suggested along with the new retrieval systems, and user interface is designed and implemented for its management and control. The new retrial systems of this paper can be employed by interface in another language, and this system is to provide the concerned user with the appropriate retrieval systems and library for the version control.

  • PDF

Development of Construction Material Naming Ontology for Automated Building Energy Analysis (건축물 에너지 분석 자동화를 위한 건축 자재명 온톨로지 구축)

  • Kim, Ka-Ram;Kim, Gun-Woo;Yoo, Dong-Hee;Yu, Jung-Ho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.5
    • /
    • pp.137-145
    • /
    • 2011
  • BIM Data exchange using standard format can provide a user friendly and practical way of integrating the BIM tools in the life cycle of a building on the currently construction industry which is participated various stakeholder. It used IFC format to exchange the BIM data from Design software to energy analysis software. However, since we can not use the material name data in the library of an energy analysis directly, it is necessary to input the material property data for building energy analysis. In this paper, to matching the material named of name of DOE-2 default library, rhe extracted material names from BIM file are inferred by the ontology With this we can make the reliable input data of the engine by development a standard data and also increase the efficient of building energy analysis process. The methodology can enable to provide a direction of BIM-based information management system as a conceptual study of using ontology in the construction industry.

2D-THI: Two-Dimensional Type Hierarchy Index for XML Databases (2D-THI: XML 데이테베이스를 위한 이차원 타입상속 계층색인)

  • Lee Jong-Hak
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.3
    • /
    • pp.265-278
    • /
    • 2006
  • This paper presents a two-dimensional type inheritance hierarchy index(2D-THI) for XML databases. XML Schema is one of schema models for the XML documents supporting. The type inheritance. The conventional indexing techniques for XML databases can not support XML queries on type inheritance hierarchies. We construct a two-dimensional index structure using multidimensional file organizations for supporting type inheritance hierarchy in XML queries. This indexing technique deals with the problem of clustering index entries in the two-dimensional domain space that consists of a key element domain and a type identifier domain based on the user query pattern. This index enhances query performance by adjusting the degree of clustering between the two domains. For performance evaluation, we have compared our proposed 2D-THI with the conventional class hierarchy indexing techniques in object-oriented databases such as CH-index and CG-tree through the cost model. As the result of the performance evaluations, we have verified that our proposed two-dimensional type inheritance indexing technique can efficiently support the query Processing in XML databases according to the query types.

  • PDF

A Plagiarism Detection Technique for Java Program Using Bytecode Analysis (바이트코드 분석을 이용한 자바 프로그램 표절검사기법)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.442-451
    • /
    • 2008
  • Most plagiarism detection systems evaluate the similarity of source codes and detect plagiarized program pairs. If we use the source codes in plagiarism detection, the source code security can be a significant problem. Plagiarism detection based on target code can be used for protecting the security of source codes. In this paper, we propose a new plagiarism detection technique for Java programs using bytecodes without referring their source codes. The plagiarism detection procedure using bytecode consists of two major steps. First, we generate the token sequences from the Java class file by analyzing the code area of methods. Then, we evaluate the similarity between token sequences using the adaptive local alignment. According to the experimental results, we can find the distributions of similarities of the source codes and that of bytecodes are very similar. Also, the correlation between the similarities of source code pairs and those of bytecode pairs is high enough for typical test data. The plagiarism detection system using bytecode can be used as a preliminary verifying tool before detecting the plagiarism by source code comparison.

Implementation of Dead Code Elimination in CTOC (CTOC에서 죽은 코드 제거 구현)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Won-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.1-8
    • /
    • 2007
  • Although the Java bytecode has numerous advantages, there are also shortcomings such as slow execution speed and difficulty in analysis. Therefore, in order for the Java class file to be effectively executed under the execution environment such as the network, it is necessary to convert it into optimized code. We implements CTOC. In order to statically determine the value and type, CTOC uses the SSA Form which separates the variable according to assignment. Also, it uses a Tree Form for statements. But, due to insertion of the $\phi$-function in the process of conversion into the SSA Form, the number of nodes increased. This paper shows the dead code elimination to obtain a more optimized code in SSA Form. We add new live field in each node and achieve dead code elimination in tree structures. We can confirm after dead code elimination though test results that nodes decreases.

  • PDF

Real-time Classification of Internet Application Traffic using a Hierarchical Multi-class SVM

  • Yu, Jae-Hak;Lee, Han-Sung;Im, Young-Hee;Kim, Myung-Sup;Park, Dai-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.859-876
    • /
    • 2010
  • In this paper, we propose a hierarchical application traffic classification system as an alternative means to overcome the limitations of the port number and payload based methodologies, which are traditionally considered traffic classification methods. The proposed system is a new classification model that hierarchically combines a binary classifier SVM and Support Vector Data Descriptions (SVDDs). The proposed system selects an optimal attribute subset from the bi-directional traffic flows generated by our traffic analysis system (KU-MON) that enables real-time collection and analysis of campus traffic. The system is composed of three layers: The first layer is a binary classifier SVM that performs rapid classification between P2P and non-P2P traffic. The second layer classifies P2P traffic into file-sharing, messenger and TV, based on three SVDDs. The third layer performs specialized classification of all individual application traffic types. Since the proposed system enables both coarse- and fine-grained classification, it can guarantee efficient resource management, such as a stable network environment, seamless bandwidth guarantee and appropriate QoS. Moreover, even when a new application emerges, it can be easily adapted for incremental updating and scaling. Only additional training for the new part of the application traffic is needed instead of retraining the entire system. The performance of the proposed system is validated via experiments which confirm that its recall and precision measures are satisfactory.