• Title/Summary/Keyword: Computer Application

Search Result 7,943, Processing Time 0.034 seconds

A Multipurpose Design Framework for Hardware-Software Cosimulation of System-on-Chip (시스템-온-칩의 하드웨어-소프트웨어 통합 시뮬레이션을 위한 다목적 설계 프레임워크)

  • Joo, Young-Pyo;Yun, Duk-Young;Kim, Sung-Chan;Ha, Soon-Hoi
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.485-496
    • /
    • 2008
  • As the complexity of SoC (System-on-Chip) design increases dramatically. traditional system performance analysis and verification methods based on RTL (Register Transfer Level) are no more valid for increasing time-to-market pressure. Therefore a new design methodology is desperately required for system verification in early design stages. and hardware software (HW-SW) cosimulation at TLM (Transaction Level Modeling) level has been researched widely for solving this problem. However, most of HW-SW cosimulators support few restricted ion levels only, which makes it difficult to integrate HW-SW cosimulators with different ion levels. To overcome this difficulty, this paper proposes a multipurpose framework for HW SW cosimulation to provide systematic SoC design flow starting from software application design. It supports various design techniques flexibly for each design step, and various HW-SW cosimulators. Since a platform design is possible independently of ion levels and description languages, it allows us to generate simulation models with various ion levels. We verified the proposed framework to model a commercial SoC platform based on an ARM9 processor. It was also proved that this framework could be used for the performance optimization of an MJPEG example up to 44% successfully.

Design of a Binding for the performance Improvement of 3D Engine based on the Embedded Mobile Java Environment (자바 기반 휴대용 임베디드 기기의 삼차원 엔진 성능 향상을 위한 바인딩 구현)

  • Kim, Young-Ouk;Roh, Young-Sup
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.11
    • /
    • pp.1460-1471
    • /
    • 2007
  • A 3-Dimensional engine in a mobile embedded device is divided into a C-based OpenGL/ES and a Java-based JSR184 which interprets and executes a byte code in a real-time. In these two standards, the JSR184 supporting Java objects uses more processor resources than an OpenGL/ES and thus has a constraint when it is used in an embedded device with a limited computing power. On the other hand, 3-Dimensional contents employed in existing personal computer are created by utilizing advantages of Java and secured numerous users in European market, due to the good quality in contents and extensive service in a commercial network, GSM. Because of the reason, a mobile embedded device used in a GSM network needs a JSR184 which can provide an existing Java-based 3-Dimensional contents without extra conversion processes, but the current version of Java-based 3-Dimensional engine has drawbacks in application to commercial products because it requires more computing power than the mobile embedded device. This paper proposes a binding technique with the advantages of Java objects to improve a processing speed of 3-Dimensional contents in limited resources of a mobile embedded device. The technique supports a JSR184 standard interface in the upper layer to utilize 3-Dimensional contents using Java, employs a different code-conversion language, KNI(Kilo Native Interface), in the middle layer to interface between OpenGL/ES and JSR184, and embodies an OpenGL/ES standard in the lower layer. The validity of the binding technique is demonstrated through a simulator and a FPGA embedding an ARM.

  • PDF

Target Advertisement based on a TV Viewer's Profile Inference and TV Anytime Metadata (시청자 프로파일 추론과 TV Anytime 메타데이타를 이용한 표적 광고)

  • Kim, Mun-Jo;Lee, Bum-Sik;Lim, Jeong-Yon;Kim, Mun-Churl;Lee, Hee-Kyung;Lee, Han-Gyu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.10
    • /
    • pp.709-721
    • /
    • 2006
  • The traditional broadcasting services over terrestrial, satellite and cable media have been unidirectional mass media regardless of TV viewer's preferences. Recently ich media streaming has become possible via the broadb and networks. Furthermore, since bidirectional communication is possible, personalcasting such as personalized streaming services has been emerging by taking into account the user's preference on content genres, viewing times and actors/actresses etc. Accordingly, personal media becomes an important means for content provision service in addition to the traditional broadcasting service as mass media. In this paper, we introduce a user profile reasoning method for target advertisement which is considered an important application in personalcasting service. The proposed user profile reasoning method predicts an unknown TV viewer's gender and ages by analyzing TV Viewing history data. Based on the estimated user's gender and ages, a target advertisement is provided with TV Anytime metadata. A proposed target advertisement system is developed based on the user profile reasoning and the target advertisement selection method. To show the effectiveness of our proposed methods, we present a plenty of experimental results by using realistic TV viewing history data.

Study on the Development and Application of Image Viewer System (Image Viewer System의 개발 및 적용에 관한 고찰)

  • Yang, Oh-Nam;Seo, In-Ki;Hong, Dong-Ki;Kwon, Kyeong-Tae
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.18 no.2
    • /
    • pp.67-73
    • /
    • 2006
  • Purpose: The number of patients receiving radiotherapy has increased every year and will keep increasing in the future. Therefore, the technique of radiotherapy is developing from day to day, as a result of it, the quantities of image and data used for radiotherapy are also considerably increasing. Therefore, there have been many difficulties in storing, keeping and managing them. Then, we developed and applied this system for improving complicated work process as well as solving these problems with the collaboration Medical Information Team. Materials and Methods: We exported its image at R & V (Record and Verify: Varis vision, Varian, USA) system and planning system after giving some code to be able to access from management system(RO) for department of radiation oncology to PACS. And, we programmed their information by using necessary information among many information included in DICOM head. Results: All images and data generated by our working environment (Simulation CT, L-gram image and internal body structure, DRR, does distribution )were realized at PACS and it became to be possible for clear image to be printed from any computer in department of radiation oncology. Conclusion: It was inevitable to use film during radiotherapy for patients in the past, however, due to the development of this system, film-less system became to be possible. Therefore, the darkroom space and its management cost in relation to the development process disappeared and it became to be unnecessary for spending tangible and intangible financial expense including human resources, time needed for finding film storing space and film and purchasing separate storing equipment for storing images. Finally, we think this system would be very helpful to handle ail complicated processes for radiotherapy and increasing efficiency of overall working conditions.

  • PDF

Analysis on the EMC evaluating method for applying wireless communications in NPP (원전 내 무선통신 적용에 대한 전자파 적합성 평가방법 분석)

  • Kang, SeungSeok;Lim, Tae Heung;Choo, Jaeyul;Kim, HyungTae;Kim, DaeHee;Byun, Gangil;Park, Jong Eon;Lee, Jun-Yong;Choo, Hosung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2221-2231
    • /
    • 2017
  • In this paper, we surveyed previous cases, network protocols (such as Wi-Fi, Zigbee, Z-wave, and WirelessHart) and propagation characteristics on the application of maintaining equipments for instrumentation and control (I&C) using wireless communication techniques inside the nuclear power plant (NPP). In addition, we compared and analyzed the difference of detailed regulations with respect to the electromagnetic interference (EMI) and radio frequency interference (RFI) in the Regulatory Guide 1.180 rev. 1 (RG. 1.180) for adopting the wireless communication techniques inside the NPP, and other regulations, such as MIL-STD 461E and IEC 61000-4, that are recognized in the KINS/RG-N03.09 (Rev. 2). Furthermore, we investigated evaluating factors about electromagnetic properties by considering indoor environments, wave scattering, shielding effectiveness, and the indoor wave attenuation model that were not included in the current electromagnetic compatibility regulation.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

Development and Verification of A Module for Positioning Buried Persons in Collapsed Area (붕괴지역의 매몰자 위치측위를 위한 모듈 개발 및 검증)

  • Moon, Hyoun-Seok;Lee, Woo-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.427-436
    • /
    • 2016
  • Due to disasters such as earthquakes and landslides in urban areas, persons have been buried inside collapsed buildings and structures. Rescuers have mainly utilized detection equipment by applying sound, video and electric waves, but these are expensive and due to the directional approaches onto the collapsed site, secondary collapse risk can arise. In addition, due to poor utilization of such equipment, new human detection technology with quick and high reliability has not been utilized. To address these issues, this study develops a wireless signal-based human detection module that can be loaded into an Unmanned Aerial Vehicle (UAV). The human detection module searches for the 3D location for buried persons by collecting Wi-Fi signal and barometer sensors data transmitted from the mobile phones. This module can gain diverse information from mobile phones for buried persons in real time. We present a development framework of the module that provides 3D location data with more reliable information by delivering the collected data into a local computer in the ground. This study verified the application feasibility of the developed module in a real collapsed area. Therefore, it is expected that these results can be used as a core technology for the quick detection of buried persons' location and for relieving them after disasters that induce building collapses.

Computerized Psychological Test System for Art Therapy (미술치료를 위한 컴퓨터 심리진단 장치)

  • Jeon, In-Ho;Kim, Song-I;Kim, Ki-Hyun;Lim, Eun-Ji;Kim, Young-Ok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.135-143
    • /
    • 2010
  • In this paper, we propose a computerized psychological test system for art therapy. The proposed system with the computerized devices can measure various information, such as colors, characters of lines, pen pressure, size of objects, position of objects, and so on, from the drawn pictures by the child. The measured information can be analyzed to extract more meaningful information about the child and to provide more effective remedial information for art therapy. Art therapy essentially has a potential drawback that the results of test can be influenced by therapist's subjectivity. The results can be different from the method of gathering information, the method of analysis, the interpretation of analyzed data, and even the therapist's academic backgrounds. Therefore, in this paper, we focus on what information needs to be measured and how to measure the data from drawn pictures and propose a computerized psychological test system for art therapy. The proposed system can measure and analyze various information from the drawn picture by the child. Since the proposed system can provide valuable psychological information of child in the form of quantitative data, it can be exploited as a new method for art therapy.

A Study on Image Acquisition and Usage Trace Analysis of Stick-PC (Stick-PC의 이미지 수집 및 사용흔적 분석에 대한 연구)

  • Lee, Han Hyoung;Bang, Seung Gyu;Baek, Hyun Woo;Jeong, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.307-314
    • /
    • 2017
  • Stick-PC is small and portable, So it can be used like a desktop if you connect it to a display device such as a monitor or TV anytime and anywhere. Accordingly, Stick-PC can related to various crimes, and various evidence may remain. Stick-PC uses the same Windows version of the operating system as the regular Desktop, the artifacts to be analyzed are the same. However, unlike the Desktop, it can be used as a meaningful information for forensic investigation if it is possible to identify the actual user and trace the usage by finding the traces of peripheral devices before analyzing the system due to the mobility. In this paper, We presents a method of collecting images using Bootable OS, which is one of the image collection methods of Stick-PC. In addition, we show how to analyze the trace of peripheral connection and network connection trace such as Display, Bluetooth through the registry and event log, and suggest the application method from the forensic point of view through experimental scenario.

A Nonunique Composite Foreign Key-Based Approach to Fact Table Modeling and MDX Query Composing (비유일 외래키 조합 복합키 기반의 사실테이블 모델링과 MDX 쿼리문 작성법)

  • Yu, Han-Ju;Lee, Duck-Sung;Choi, In-Soo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.185-197
    • /
    • 2006
  • A star schema consists of a central fact table, which is surrounded by one or more dimension tables. Each row int the fact table contains a multi-part primary key(or a composite foreign key) along with one or more columns containing various facts about the data stored in the row Each of the composit foreign key components is related to a dimensional table. The combination of keys in the fact table creates a composite foreign key that is unique to the fact table record. The composite foreign key, however, is rarely unique to the fact table record in real-world applications, particularly in financial applications. In order to make the composite foreign key be the determinant in real-world application, some precalculation might be performed in the SQL relational database, and cached in the OLAP database. However, there are many drawbacks to this approach. In some cases, this approach might give users the wrong results. In this paper, an approach to fact table modeling and related MDX query composing, which can be used in real-world applications without performing any precalculation and gives users the correct results, is proposed.

  • PDF