Loading [MathJax]/jax/output/CommonHTML/jax.js
  • Title/Summary/Keyword: Computer System

Search Result 32,404, Processing Time 0.068 seconds

Development of a 2 Dimensional Numerical Landscape Evolution Model on a Geological Time Scale (2차원 지질시간 규모 수치지형발달모형의 개발)

  • Byun, Jong-Min;Kim, Jong-Wook
    • Journal of the Korean Geographical Society
    • /
    • v.46 no.6
    • /
    • pp.673-692
    • /
    • 2011
  • Advances in computer technology have enabled us to develop and use numerical landscape evolution models (NLEMs) for exploring the dynamics of geomorphic system from a variety of viewpoints which previously could have not been taken. However, as of yet there have been no trials using or developing NLEMs in Korea. The purpose of this research is to develop a 2 dimensional NLEM on a geological time scale and evaluate its usefulness. The newly developed NLEM (ND-NLEM) treats bedrock weathering as one of the major geomorphic processes and attempts to simulate the thickness of soil. As such it is possible to model the weathering-limited as well as the transport-limited environment on hillslopes. Moreover the ND-NLEM includes not only slow and continuous mass transport like soil creep, but also rapid and discrete mass transport like landslides. Bedrock incision is simulated in the ND-NLEM where fluvial transport capacity is large enough to move all channel bed loads, such that ND-NLEM can model the detachment-limited environment. Furthermore the ND-NLEM adopts the D-infinity algorithm when routing flows in the model domain, so it reduces distortion due to the use of the steepest descent slope flow direction algorithm. In the experiments to evaluate the usefulness of the ND-NLEM, characteristics of the channel network observed from the model results were similar to those of the case study area for comparison, and the hypsometry curve log during the experiment showed rational evidence of landscape evolution. Therefore, the ND-NLEM is shown to be useful for simulating landscape evolution on a geological time scale.

Scheduling Method of Real-Time Mobile Transaction Manager considering Value of Transactions and Validity of Real-Time Data (트랜잭션의 중요도와 데이터의 유효성을 고려한 실시간 이동 트랜잭션 관리자의 스케줄링 기법)

  • Jo, Suk-Gyeong;Kim, Gyeong-Bae;Lee, Sun-Jo;Bae, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.533-542
    • /
    • 2001
  • In this paper, we present a scheduling method for real-time mobile transaction manager in mobile computing environment. The proposed method checks whether a transaction is executable or not. It is able to by considering not only the deadline of real-time data in mobile hosts. And then, it schedules the real-time mobile transactions by making optimal execution window based on the priority queue, while considering transaction value and deadline. Disconnection with mobile hosts is monitored in selecting the transaction for execution. Using the proposed method reduces the number of restarting times after transaction aborts which is caused by the violation of the validity constraints of real-time data. And in has merits of maximizing the sum of values of real-time mobile transactions which meet the deadline. The performance evaluation demonstrates that the number of committed real-time transactions within the deadline is improved by 20%. This method can be used in real-time mobile transaction manager is such environments as cellular communications, emergency medicine information system and so on.

  • PDF

A Modular Architecture and Its Procedure of Signalling at the NNI for B-ISDN in korea (국내 B-ISDN 망노드접면에서의 신호방식 모듈러 구조 및 절차)

  • Park, Nam-Hun;Min, Byeong-Do;Lee, Seok-Gi;Cha, Yeong-Uk;Kim, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.531-542
    • /
    • 1997
  • In this paper,we propose applicable methodology using simple scenarios for the architecture and its procedure of sibnalling at the NNI for B-ISDN in Korea.By the recent technologies,the flexible and intergrated networks of the future are designed, and the infrastructure hardware and software of those networks are sdsigned based on the modular concepts.Also the ATM-based B-ISDN must be able to support the broadband transmission function for providing various services with diverse bandwidths such as multimedia serivce and the function for controlling services and bandwidth is necessaty.Currently,the trquirements at the NNI for B-ISDN in korea atr based on the network mode connection type which is connection setup strucuture.They must show the upper/lower layer conformance to have the flexibility in new services and guarantee the interoperability between the network functions.But,network functions and protocol specifications described in this paper are limity to the first stage target system in korea.Therefore,we present the modular architecture which is corresponding to the B-ISUP of HAN/B-ISDN with those characteristics.Currently applicable architecture and procedure for B-ISUP and the functions of expandable modular architecture are also proposed.

  • PDF

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Effect of Scatter Media on Small Gamma Camera Imaging Characteristics (방사선원과 감마카메라 사이에 위치한 산란매질이 소형 감마카메라 영상에 미치는 영향 연구)

  • Seo, Hyun-Kwan;Choi, Yong;Im, Ki-Chun; Woo, Sang-Geun;Lee, Jun-Soo;Song, Tae-Yong;Choi, Yeon-Sung;Lee, Kyung-Han;Kim, Byung-Tae;Choi, Young-Il
    • Progress in Medical Physics
    • /
    • v.13 no.1
    • /
    • pp.37-43
    • /
    • 2002
  • Effect of scatter media materials and thickness, located between radioactivity and small gamma camera, on imaging characteristics was evaluated. The small gamma camera developed for breast imaging was consisted of collimator, NaI(T1) crystal(60×60×6 ㎣), PSPMT(position sensitive photomultimplier tube), NIMs and personal computer. Monte Carlo simulation was performed to evaluate the system sensitivity with different scatter media thickness(0~8 cm) and materials(air and acrylic) with parallel hole collimator and diverging collimator. The sensitivity and spatial resolution was measured using the small gamma camera with the same condition applied to the simulation. Counts was decreased by 10%(air) and 54%(acryl) with the parallel hole collimator and by 35%(air) and 63%(acryl) with the diverging collimator. Spatial resolution was decreased as increasing the thickness of scatter media. This study substantiate the importance of a gamma camera positioning and the minimization of the distance between detector and target lesion in the clinical application of a gamma camera.

  • PDF

A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm (버퍼 오버플로우 웜 고속 필터링을 위한 네트워크 프로세서의 Bloom Filter 활용)

  • Kim Ik-Kyun;Oh Jin-Tae;Jang Jong-Soo;Sohn Sung-Won;Han Ki-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.93-103
    • /
    • 2006
  • Network solutions for protecting against worm attacks that complement partial end system patch deployment is a pressing problem. In the content-based worm filtering, the challenges focus on the detection accuracy and its performance enhancement problem. We present a worm filter architecture using the bloom filter for deployment at high-speed transit points on the Internet, including firewalls and gateways. Content-based packet filtering at multi-gigabit line rates, in general, is a challenging problem due to the signature explosion problem that curtails performance. We show that for worm malware, in particular, buffer overflow worms which comprise a large segment of recent outbreaks, scalable -- accurate, cut-through, and extensible -- filtering performance is feasible. We demonstrate the efficacy of the design by implementing it on an Intel IXP network processor platform with gigabit interfaces. We benchmark the worm filter network appliance on a suite of current/past worms, showing multi-gigabit line speed filtering prowess with minimal footprint on end-to-end network performance.

THE THREE DIMENSIONAL ANALYSIS OF VOLUMETRIC AIRWAY CHANGE IN ORTHOGNATHIC SURGERY OF MANDIBULAR PROGNATHISM (하악 전돌증 환자의 악교정 수술에서 기도 공간의 부피변화에 관한 3차원적 분석)

  • Lee, Jee-Ho;Paeng, Jun-Young;Myoung, Hoon;Hwang, Soon-Jung;Seo, Byoung-Moo;Choi, Jin-Young;Lee, Jong-Ho;Choung, Pill-Hoon;Kim, Myung-Jin
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.27 no.6
    • /
    • pp.552-558
    • /
    • 2005
  • Orthognathic surgery changes patient's mandibular position and environment of related anatomic structures. Many clinicians were interested in these changes and studied about this problem. However, most of them were based on two dimensional cephalogram. According to the development of image and computer system, it would be possible that the airway change is analyzed with three dimensional CT. So we tried to measure the volumetric change of airway and analyzed the relationship between the airway structure and volumetric change. Nineteen patients who experienced orthognathic surgery due to mandibular prognathism were analyzed with 3D CT data (preoperative and postoperative 6 months) and 2D lateral cephalometry. Volumetric change was measured and 3 dimensional change of related structure was assessed with simulation program (Vworks(R), 4.0 Cybermed, Korea). Ten patients showed the decrease of airway volume change and nine showed the increase of airway volume change. Volumetric change was determined by dimensional change of mandible and hyoid bone. The dimensional positions of mandible and hyoid bone were the key factor for determining the airway change after surgery. Airway change is also predictable with the dimensional change of mandible and hyoid bone.

Developing Graphic Interface for Efficient Online Searching and Analysis of Graph-Structured Bibliographic Big Data (그래프 구조를 갖는 서지 빅데이터의 효율적인 온라인 탐색 및 분석을 지원하는 그래픽 인터페이스 개발)

  • You, Youngseok;Park, Beomjun;Jo, Sunhwa;Lee, Suan;Kim, Jinho
    • The Journal of Bigdata
    • /
    • v.5 no.1
    • /
    • pp.77-88
    • /
    • 2020
  • Recently, many researches habe been done to organize and analyze various complex relationships in real world, represented in the form of graphs. In particular, the computer field literature data system, such as DBLP, is a representative graph data in which can be composed of papers, their authors, and citation among papers. Becasue graph data is very complex in storage structure and expression, it is very difficult task to search, analysis, and visualize a large size of bibliographic big data. In this paper, we develop a graphic user interface tool, called EEUM, which visualizes bibliographic big data in the form of graphs. EEUM provides the features to browse bibliographic big data according to the connected graph structure by visually displaying graph data, and implements search, management and analysis of the bibliographc big data. It also shows that EEUM can be conveniently used to search, explore, and analyze by applying EEUM to the bibliographic graph big data provided by DBLP. Through EEUM, you can easily find influential authors or papers in every research fields, and conveniently use it as a search and analysis tool for complex bibliographc big data, such as giving you a glimpse of all the relationships between several authors and papers.

Study about the relationship between Chief complaint of pure death patients using medical record information (의무기록 정보를 활용한 순사망환자 주호소 증상과 진단명과의 연관성에 관한연구)

  • Kim, Yong-Ha;Kim, Kwang-Hwan
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.407-414
    • /
    • 2015
  • This study was executed to be used as the basic data for the improvement of hospital therapy by analyzing the characteristic of principal diagnosis of pure death patients. 428 pure death patients were selected as study subjects out of 1992 dead patients at K university hospital in Daejeon city for three years in 2011, 2012, 2013, and chi-squared test and fisher's correct tests and canonical correlation analysis were used as analysis methods. In the analysis results about general characteristic and top 4 canonical correlation analysis, pneumonia(J18) of organism unspecified and toxic action(T60) of pesticide showed significant results among the principal diagnosis. In the pneumonia of organism unspecified(J18), significant results were identified with the order of car insurance, ages from 15 to 29, health insurance and medical benefits, and in the toxic action of pesticide(T60), significant results were identified with the order of health insurance, medical benefits, car insurance, ages from 45 to 59, Sejong Chungnam. In conclusion, in order to reduce the death of elderly population, quality improvement in medical service and establishment of emergency medical service delivery system are very important to reduce pure death patients.

A study of using quality for Radial Basis Function based score-level fusion in multimodal biometrics (RBF 기반 유사도 단계 융합 다중 생체 인식에서의 품질 활용 방안 연구)

  • Choi, Hyun-Soek;Shin, Mi-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.192-200
    • /
    • 2008
  • Multimodal biometrics is a method for personal authentication and verification using more than two types of biometrics data. RBF based score-level fusion uses pattern recognition algorithm for multimodal biometrics, seeking the optimal decision boundary to classify score feature vectors each of which consists of matching scores obtained from several unimodal biometrics system for each sample. In this case, all matching scores are assumed to have the same reliability. However, in recent research it is reported that the quality of input sample affects the result of biometrics. Currently the matching scores having low reliability caused by low quality of samples are not currently considered for pattern recognition modelling in multimodal biometrics. To solve this problem, in this paper, we proposed the RBF based score-level fusion approach which employs quality information of input biometrics data to adjust decision boundary. As a result the proposed method with Qualify information showed better recognition performance than both the unimodal biometrics and the usual RBF based score-level fusion without using quality information.