• Title/Summary/Keyword: Component framework

Search Result 512, Processing Time 0.032 seconds

A Design of Vehicle Management System Apply Most Network And Sensor (MOST 네트워크와 센서를 활용한 차량 관리 시스템 설계)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.08a
    • /
    • pp.95-98
    • /
    • 2008
  • The vehicle has many technique change from The requirement of the safety the energy environment and convenience dimension is an enlargement toe. This is keeping changing the paradigm of the vehicle industry rapidly. The change to be technical such brought the intelligence of the former control device. And this organizes a sensor network among each systems and makes new traffic system. This paper a standard framework based on Sensor. We call it Vehicle Management System. The VMS used MOST network and It is able to make the stability of the component swap time or vehicle order the greatest.

  • PDF

A Modernization for a Web based System with J2EE Component Framework Technologies Of Military System (J2EE 컴포넌트 프레임워크 기술을 이용한 군 정보체계의 웹 환경으로 현대화)

  • Kim, Ki-Hoon;Jang, Chang-Bok;Kim, Dong-Hyuk;Goh, Byung-Oh;Choi, Eui-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1637-1640
    • /
    • 2003
  • 기존 정보체계는 사용자 요구와 새로운 기술의 도입으로 급속하게 발전하고 있으며, 정보시스템의 재사용성과 확장성, 유지 보수를 위하여 EJB, COM+, CCM 모델 같은 컴포넌트 기술과 컴포넌트 기반 개발 방법론인 CBD 방법론이 연구되고 있다. 또한 이러한 컴포넌트 기술을 이용한 기존 정보시스템의 변환 연구도 같이 이루어지고 있으며, 대표적인 연구로는 미 국방성의 FACELIFT 프로젝트와 카네기멜론 대학 프로젝트 등이 있다. 반면에 현재의 국내 군 정보시스템은 다양한 플랫폼 및 언어 그리고 업무 지향적인 개발로 인해 자원이 낭비되고, 유지보수가 어려운 문제점이 있다. 따라서 본 논문에서는 이미 개발되어 운용중인 군 정보시스템을 분석하여 컴포넌트 기술에 의한 웹 환경으로 변환하는 절차를 제시하고, 클라이언트/서버 구조로 운용중인 군인연금서비스시스템의 일부분을 컴포넌트 기술을 이용하여 웹 환경으로 변환하였다.

  • PDF

Development of Real-Time COF Film Complex Inspection System using Color Image (컬러영상을 이용한 실시간 COF 필름 복합 검사시스템 개발)

  • Kim, Yong-Kwan;Lee, In Hwan
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.20 no.10
    • /
    • pp.112-118
    • /
    • 2021
  • In this study, an inspection method using a color image is proposed to conduct a real-time inspection of covalent organic framework (COF) films to detect defects, if any. The COF film consists of an upper pattern SR and a lower PI. The proposed system detects the defects of more than 20 ㎛ on the SR surface owing to the characteristics of the pattern, whereas on the PI surface, it detects defects of more than 4 ㎛ by utilizing a micro-optical system. In the existing system, it is difficult for the operator to conduct a full inspection through a high-performance microscope. The proposed inspection algorithm performs the inspection by separating each color component using the color contrast of the pattern on the SR side, and on the PI surface it inspects the bonding state of the mounted chip. As a result, it is possible to confirm the exact location of the defects through the SR and PI surface inspections in the implemented inspection.

A Coherent Algorithm for Noise Revocation of Multispectral Images by Fast HD-NLM and its Method Noise Abatement

  • Hegde, Vijayalaxmi;Jagadale, Basavaraj N.;Naragund, Mukund N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.556-564
    • /
    • 2021
  • Numerous spatial and transform-domain-based conventional denoising algorithms struggle to keep critical and minute structural features of the image, especially at high noise levels. Although neural network approaches are effective, they are not always reliable since they demand a large quantity of training data, are computationally complicated, and take a long time to construct the model. A new framework of enhanced hybrid filtering is developed for denoising color images tainted by additive white Gaussian Noise with the goal of reducing algorithmic complexity and improving performance. In the first stage of the proposed approach, the noisy image is refined using a high-dimensional non-local means filter based on Principal Component Analysis, followed by the extraction of the method noise. The wavelet transform and SURE Shrink techniques are used to further culture this method noise. The final denoised image is created by combining the results of these two steps. Experiments were carried out on a set of standard color images corrupted by Gaussian noise with multiple standard deviations. Comparative analysis of empirical outcome indicates that the proposed method outperforms leading-edge denoising strategies in terms of consistency and performance while maintaining the visual quality. This algorithm ensures homogeneous noise reduction, which is almost independent of noise variations. The power of both the spatial and transform domains is harnessed in this multi realm consolidation technique. Rather than processing individual colors, it works directly on the multispectral image. Uses minimal resources and produces superior quality output in the optimal execution time.

Design MetaModel for MCF (Mobile Cross Framework) Based MDA (MDA기반 모바일 크로스 프레임워크를 위한 메타모델 설계)

  • Song, Yujin;Han, Deoksoo;Lee, Eunjoo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.292-298
    • /
    • 2019
  • Mobile-based software development methodology has been vigorously researched from using object-oriented development methodology and component-based development methodology previous structural developing methodology. There are two types of OS in mobile platform which are android and iOS. There is a problem that the application to be developed is developed depending on the device type. To resolve this problem, first, the system structure and design method should be managed effectively. Second, a basic design guide that can be commonly adapted to the each project is required. In this paper, we define a mobile cross platform meta model based on MDA-development methodology, focusing on reusability, portability and interoperability about non - dependent part of the mobile platform. If the proposed meta-model is applied to manage the related information and all the types of Mobile-Apps become available through independent mobile app development process, henceforward, it will be much of help establishing formulaic mobile-app developmental methodology.

A Vehicular License Plate Recognition Framework For Skewed Images

  • Arafat, M.Y.;Khairuddin, A.S.M.;Paramesran, R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5522-5540
    • /
    • 2018
  • Vehicular license plate (LP) recognition system has risen as a significant field of research recently because various explorations are currently being conducted by the researchers to cope with the challenges of LPs which include different illumination and angular situations. This research focused on restricted conditions such as using image of only one vehicle, stationary background, no angular adjustment of the skewed images. A real time vehicular LP recognition scheme is proposed for the skewed images for detection, segmentation and recognition of LP. In this research, a polar co-ordinate transformation procedure is implemented to adjust the skewed vehicular images. Besides that, window scanning procedure is utilized for the candidate localization that is based on the texture characteristics of the image. Then, connected component analysis (CCA) is implemented to the binary image for character segmentation where the pixels get connected in an eight-point neighbourhood process. Finally, optical character recognition is implemented for the recognition of the characters. For measuring the performance of this experiment, 300 skewed images of different illumination conditions with various tilt angles have been tested. The results show that proposed method able to achieve accuracy of 96.3% in localizing, 95.4% in segmenting and 94.2% in recognizing the LPs with an average localization time of 0.52s.

Thinking multiculturality in the age of hybrid threats: Converging cyber and physical security in Akkuyu nuclear power plant

  • Bicakci, A. Salih;Evren, Ayhan Gucuyener
    • Nuclear Engineering and Technology
    • /
    • v.54 no.7
    • /
    • pp.2467-2474
    • /
    • 2022
  • Nuclear Power Plants (NPPs) are the most protected facilities among all critical infrastructures (CIs). In addition to physical security, cyber security becomes a significant concern for NPPs since swift digitalization and overreliance on computer-based systems in the facility operations transformed NPPs into targets for cyber/physical attacks. Despite technical competencies, humans are still the central component of a resilient NPP to develop an effective nuclear security culture. Turkey is one of the newcomers in the nuclear energy industry, and Turkish Akkuyu NPP has a unique model owned by an international consortium. Since Turkey has limited experience in nuclear energy industry, specific multinational and multicultural characteristics of Turkish Akkuyu NPP also requires further research in terms of the Facility's prospective nuclear security. Yet, the link between "national cultures" and "nuclear security" is underestimated in nuclear security studies. By relying on Hofstede's national culture framework, our research aims to address this gap and explore possible implications of cross-national cultural differences on nuclear security. To cope with security challenges in the age of hybrid threats, we propose a security management model which addresses the need for cyber-physical security integration to cultivate a robust nuclear security culture in a multicultural working environment.

Reciprocal Job and Role Assessments of Planners, Designers, and System Developers of IT Services (IT서비스에 있어서 기획자, 디자이너, 개발자의 업무 및 역할 상호 평가 비교 연구)

  • Lee, Donghee;Lee, Jungwoo
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.61-79
    • /
    • 2022
  • In the rapidly changing era of knowledge revolution, user-centered IT services are emerging as a very important component of modern business. However, in order to lead IT services into success, traditional capabilities and competences are not good enough. Development of IT services involve service planners and designers as well as traditional systems developers. This detailed segmentation of job and corresponding competences among involved in IT service development brings in new type of conflicts and contradictions that may require special attention for IT services to be properly development and implemented. This study aims to explore and define competences and roles of newly emerging job groups in IT services: planners, designers, and developers. In order to identify underlying competences of these emergeing groups, two stage interviews were conducted. At the first stage, general competence framework is developed across these groups with different skills for similar competence catogories. Using the categories developed at the first stage, members of each groups were asked to rate and assess the competences of other groups. Comparisons of these reciprocal assessment revealed the conceptual differences and biases across these groups. Detail differences are discussed and implications are discussed.

Cointegration based modeling and anomaly detection approaches using monitoring data of a suspension bridge

  • Ziyuan Fan;Qiao Huang;Yuan Ren;Qiaowei Ye;Weijie Chang;Yichao Wang
    • Smart Structures and Systems
    • /
    • v.31 no.2
    • /
    • pp.183-197
    • /
    • 2023
  • For long-span bridges with a structural health monitoring (SHM) system, environmental temperature-driven responses are proved to be a main component in measurements. However, anomalous structural behavior may be hidden incomplicated recorded data. In order to receive reliable assessment of structural performance, it is important to study therelationship between temperature and monitoring data. This paper presents an application of the cointegration based methodology to detect anomalies that may be masked by temperature effects and then forecast the temperature-induced deflection (TID) of long-span suspension bridges. Firstly, temperature effects on girder deflection are analyzed with fieldmeasured data of a suspension bridge. Subsequently, the cointegration testing procedure is conducted. A threshold-based anomaly detection framework that eliminates the influence of environmental temperature is also proposed. The cointegrated residual series is extracted as the index to monitor anomaly events in bridges. Then, wavelet separation method is used to obtain TIDs from recorded data. Combining cointegration theory with autoregressive moving average (ARMA) model, TIDs for longspan bridges are modeled and forecasted. Finally, in-situ measurements of Xihoumen Bridge are adopted as an example to demonstrate the effectiveness of the cointegration based approach. In conclusion, the proposed method is practical for actual structures which ensures the efficient management and maintenance based on monitoring data.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.