• Title/Summary/Keyword: Code update

Search Result 90, Processing Time 0.023 seconds

Multilingual Product Retrieval Agent through Semantic Web and Semantic Networks (Semantic Web과 Semantic Network을 활용한 다국어 상품검색 에이전트)

  • Moon Yoo-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2004
  • This paper presents a method for the multilingual product retrieval agent through XML and the semantic networks in e-commerce. Retrieval for products is an important process, since it represents interfaces of the customer contact to the e-commerce. Keyword-based retrieval is efficient as long as the product information is structured and organized. But when the product information is expressed across many online shopping malls, especially when it is expressed in different languages with cultural backgrounds, buyers' product retrieval needs language translation with ambiguities resolved in a specific context. This paper presents a RDF modeling case that resolves semantic problems in the representation of product information and across the boundaries of language domains. With adoption of UNSPSC code system, this paper designs and implements an architecture for the multilingual product retrieval agents. The architecture is based on the central repository model of product catalog management with distributed updating processes. It also includes the perspectives of buyers and suppliers. And the consistency and version management of product information are controlled by UNSPSC code system. The multilingual product names are resolved by semantic networks, thesaurus and ontology dictionary for product names.

  • PDF

A Study on the Analysis of Vulnerabilities in the Program Source Code (프로그램 소스코드 취약성 분석에 관한 연구)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.3-8
    • /
    • 2004
  • The majority of recent intrusions reveal that the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

Phenological growth stages of Korean ginseng (Panax ginseng) according to the extended BBCH scale

  • Kim, Yun-Soo;Park, Chol-Soo;Lee, Dong-Yun;Lee, Joon-Soo;Lee, Seung-Hwan;In, Jun-Gyo;Hong, Tae-Kyun
    • Journal of Ginseng Research
    • /
    • v.45 no.4
    • /
    • pp.527-534
    • /
    • 2021
  • Background: Phenological studies are a prerequisite for accomplishing higher productivity and better crop quality in cultivated plants. However, there are no phenological studies on Panax ginseng that improve its production yield. This study aims to redefine the phenological growth stages of P. ginseng based on the existing Biologische Bundesanstalt, Bundessortenamt und Chemische Industrie (BBCH) scale and proposes a disease control reference. Methods: This study was conducted at the Korea Ginseng Corporation Experiment Station in Gyeonggi province, South Korea. Phenological observations were performed once weekly or twice monthly, based on the developmental stages. The existing BBCH scale with a three-digit code was used to redefine and update P. ginseng's phenological growth codes. Results: The phenological description is divided into eight principal growth stages: three for vegetative growth (perennating bud, aerial shoot, and root development), four for reproductive growth (reproductive organ development, flowering, fruit development, and fruit maturation), and one for senescence according to the extended BBCH scale. A total of 58 secondary growth stages were described within the eight principal growth stages. Under each secondary growth stage, four mesostages are also taken into account, which contains the distinct patterns of the phenological characteristics in ginseng varieties and the process of transplanting seedlings. A practical management program for disease control was also proposed by using the BBCH code and the phenological data proposed in this work. Conclusion: The study introduces an extended BBCH scale for the phenological research of P. ginseng.

Airborne GPS/INS Integration Processing Module Development

  • KANG, Joon-Mook;YUN, Hee-Cheon
    • Korean Journal of Geomatics
    • /
    • v.3 no.2
    • /
    • pp.99-106
    • /
    • 2004
  • In order to meet the users' demand, who needs faster and more accurate data in geographic information, it is necessary to obtain and process the data more effectively. Now more effective data obtainments about geographic information is possible through the development of integration technology, which is applied to the field of geographic information, as well as through the development of hardware and software engineering. With the fast and precise correction and update, the development of integrate technology can bring the reduction of the time and money. To obtain fast and precise geographic information using Aerial Photogrammetry method, it is necessary to develop Airborne GPS/INS integration system, which makes GCP to the minimum. For this reason, this study has tried to develop a system which could unite and process both GPS and INS data. For this matter, code-processing module for DGPS and OTF initializaion module, which can decide integer ambiguity even in motion, have been developed. And also, continuous kinematic carrier-processing module has been developed to calculate the location at the moment of filming. In addition, this study suggests a possibility of using a module, which can unite GPS and INS, using Kalman filtering, and also shows the INS navigation theory.

  • PDF

Seismic applicability of a long-span railway concrete upper-deck arch bridge with CFST rigid skeleton rib

  • Shao, Changjiang;Ju, Jiann-wen Woody;Han, Guoqing;Qian, Yongjiu
    • Structural Engineering and Mechanics
    • /
    • v.61 no.5
    • /
    • pp.645-655
    • /
    • 2017
  • To determine the seismic applicability of a long-span railway concrete upper-deck arch bridge with concrete-filled steel-tube (CFST) rigid skeleton ribs, some fundamental principles and seismic approaches for long-span bridges are investigated to update the design methods in the current Code for Seismic Design of Railway Engineering of China. Ductile and mixed isolation design are investigated respectively to compare the structural seismic performances. The flexural moment and plastic rotation demands and capacities are quantified to assess the seismic status of the ductile components. A kind of triple friction pendulum (TFP) system and lead-plug rubber bearing are applied simultaneously to regularize the structural seismic demands. The numerical analysis shows that the current ductile layout with continuous rigid frame approaching spans should be strengthened to satisfy the demands of rare earthquakes. However, the mixed isolation design embodies excellent seismic performances for the continuous girder approaching span of this railway arch bridge.

Error Control Protocol and Data Encryption Mechanism in the One-Way Network (일방향 전송 네트워크에서의 오류 제어 프로토콜 및 데이터 암호화 메커니즘)

  • Ha, Jaecheol;Kim, Kihyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.613-621
    • /
    • 2016
  • Since the error control problem is a critical and sensitive issue in the one-way network, we can adopt a forward error correction code method or data retransmission method based on the response of reception result. In this paper, we propose error control method and continuous data transmission protocol in the one-way network which has unidirectional data transmission channel and special channel to receive only the response of reception result. Furthermore we present data encryption and key update mechanism which is based on the pre-shared key distribution scheme and suggest some ASDU(Application Service Data Unit) formats to implement it in the one-way network.

The Reducting Technique of compulsory Misses for S/W managed TLB (S/W관리 TLB의 초기접근실패 감소 기법)

  • Park, Jang-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.620-632
    • /
    • 1998
  • This paper introduces a new teehniquc for reducing the compulsory misses of software-managed TLBs by prefetching necessary TLB entries before being used. This technique is not inherently limited to specific applications. The key of this scheme is to perform the prefetch operations to update the TLB entries before first accesses so that TLB misses can be avoided. For the identifications of the prefctch pages, the new classification is introduced, which is based 0n the view of an object code execution. Then, the algorithms and the implementation technique arc described. Using a quantitative analysis, the proposed scheme is evaluated to prove that it is a useful technique for the perronnall~~ ~nhan~"ment of the S/W managed TLBs. in addition, it is discussed that reducing the miss rate by the prefeteh scheme reduces the total miss penalty and bus traffics in S/W-managed TLBs.

  • PDF

A Study on the Development of Framework Using Component Based Methodology (컴포넌트기반 방법론을 사용한 프레임워크 개발에 관한 연구)

  • Kim, Haeng-Gon;Han, Eun-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.842-851
    • /
    • 2000
  • Developers can reuse not only class code but also wide range of knowledge on domain by reusing framework. Existing Object-Oriented Methodology and Catalysis Methodology were presented when redefining component in the course of redesigning framework. However, existing methodologies have weakness that entire process is waterfall mode or design of interface lays too much stress on implementation stage. So, this thesis will present Component-Oriented Methodology for the reuse of framework, and construct the environment for framework and domain development. That is, domain is analyzed by input of domain knowledge on real world to create software based on component, and hotspot is identified through analyzed information, and refactoring by putting additional information on users and developers. After that, I will create domain framework and application framework depending on domain. In this Component-Oriented Methodology, information is searched, understood and extracted or composite through component library storage internally. Then this information is classified into the information on component, and used as additional information in redesigning. With this, developer can obtain reusability, easiness and portability by constructing infrastructure environment that allows to register, update and delete component through Component Management System(CMS) under he development environment which can be easily applied to his own application using framework component, in this thesis, CoRBA(Common Object Request Broker Architecture) environment.

  • PDF

GPS/INS Unified System Development

  • Joon mook Kang;Young bin Nim;Yoon, Hee-Cheon;Cho, Sung-ho
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2004.02a
    • /
    • pp.47-54
    • /
    • 2004
  • In order to meet the users demand, who needs faster and more accurate data in geographic information it is necessary to obtain and process the data more effectively. Now more effective data obtainment about geographic information is possible through the development of unified technology, which is applied to the field of geographic information, as well as through the development of hardware and software engineering. With the fast and precise correction and update, the development of unified technology can bring the reduction of the time and money. For the obtainment of geographic information which can meet the demand of the users, the unified technology has been applied to various fields, and in Aerial Photogrammetry field, many are doing researches actively for the GPS/INS unified system. To obtain fast and precise geographic information using Aerial Photogrammetry method, it is necessary to develop Airborne GPS/INS unified system, which makes GCP to the minimum. For this reason, this study has tried to develop a system which could unite and process both GPS and INS data. For this matter, code-processing module for DGPS and OTF initialization module, which can decide integer ambiguity even in motion, have been developed. And also, continuous kinematic carrier-processing module has been developed to calculate the location at the moment of filming. In addition, this study suggests a possibility of using a module, which can unite GPS and INS, using Kalman filtering, and also shows the INS navigation theory.

  • PDF

Robust Generalized Labeled Multi-Bernoulli Filter and Smoother for Multiple Target Tracking using Variational Bayesian

  • Li, Peng;Wang, Wenhui;Qiu, Junda;You, Congzhe;Shu, Zhenqiu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.908-928
    • /
    • 2022
  • Multiple target tracking mainly focuses on tracking unknown number of targets in the complex environment of clutter and missed detection. The generalized labeled multi-Bernoulli (GLMB) filter has been shown to be an effective approach and attracted extensive attention. However, in the scenarios where the clutter rate is high or measurement-outliers often occur, the performance of the GLMB filter will significantly decline due to the Gaussian-based likelihood function is sensitive to clutter. To solve this problem, this paper presents a robust GLMB filter and smoother to improve the tracking performance in the scenarios with high clutter rate, low detection probability, and measurement-outliers. Firstly, a Student-T distribution variational Bayesian (TDVB) filtering technology is employed to update targets' states. Then, The likelihood weight in the tracking process is deduced again. Finally, a trajectory smoothing method is proposed to improve the integrative tracking performance. The proposed method are compared with recent multiple target tracking filters, and the simulation results show that the proposed method can effectively improve tracking accuracy in the scenarios with high clutter rate, low detection rate and measurement-outliers. Code is published on GitHub.