• Title/Summary/Keyword: Distributed objects

Search Result 425, Processing Time 0.025 seconds

Provision of Effective Spatial Interaction for Users in Advanced Collaborative Environment (지능형 협업 환경에서 사용자를 위한 효과적인 공간 인터랙션 제공)

  • Ko, Su-Jin;Kim, Jong-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.677-684
    • /
    • 2009
  • With various sensor network and ubiquitous technologies, we can extend interaction area from a virtual domain to physical space domain. This spatial interaction is differ in that traditional interaction is mainly processed by direct interaction with the computer machine which is a target machine or provides interaction tools and the spatial interaction is performed indirectly between users with smart interaction tools and many distributed components of space. So, this interaction gives methods to users to control whole manageable space components by registering and recognizing objects. Finally, this paper provides an effective spatial interaction method with template-based task mapping algorithm which is sorted by historical interaction data for support of users' intended task. And then, we analyze how much the system performance would be improved with the task mapping algorithm and conclude with an introduction of a GUI method to visualize results of spatial interaction.

  • PDF

The study on the construction of IWSDB for National Defense CALS (국방 CALS를 위한 IWSDB 구축에 관한 연구)

  • 신선우;손해용;김철환
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.93-116
    • /
    • 1996
  • This study aims to develop an approach to construct IWSDB for National Defense CALS. Along with the introduction of Korean version of CALS conception, it is essential to analyze the national defense system with a new information technology for the construction of IWSDB. A long-tenn goal of CALS is to construct fully Integrated Data Environment (IDE) and establish IWSDB for the application of CALS conception to the life cycle management of weapon system. IWSDB is a set of databases that contain digital data. It supports common interface of data objects and databases throughout the life cycle management of weapon system, including design, engineering, analysis, manufacturing, operation, and logistics. etc. The goal of this study is threefold. First, we propose a right direction for the establishment of Integrated Data Environment. For the integrated database technology, we use the five schema architecture and the distributed object oriented technology that will lead to the "share of data." Second, we present the most effective IWSDB architecture for defense CALS, which will provide the efficient data sharing by business process modeling. Third, we suggest that IWSDB should be constructed based on the process which is related to the acquisition and logistics of weapon system for the national defense, and at the same time it should be implemented with GITIS for government agencies and CITIS for the industries in order to obtain the efficient data sharing.

  • PDF

Development of Multi User Games using 3D Graphics and Multicasting (원격 다중 참여자 3차원 그래픽스 게임 개발)

  • Kim, JongSeong;Park, JiHun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.4 no.1
    • /
    • pp.67-77
    • /
    • 1998
  • In this paper we describe a development of a multi user game using 3D graphics and multicasting. First, we represent a virtual reality world by 3D graphics technology. Next, we use computer communication technology for the purpose of interaction among multi users. As a result, multi users share 3D graphics objects and play games. The goal of this paper is a development of a system that enables multi users to play games sharing a virtual world represented by 3D graphics. We use the OpenInventor library and C++ language for 3D graphics scene representation, and IP multicasting protocols for computer communication. The system allows to use Polhemus Fastrak 3D input device that recognizes the 3D position and 3D orientation. As an example we present a game that demonstrates the effect of piano concert by multi piano players who are distributed in a computer network.

  • PDF

Analysis of development methods for a Multidisciplinary Design Optimization framework (다분야 통합 최적설계 프레임워크 구축방법 분석)

  • Lee, Ho-Jun;Lee, Jae-Woo;Moon, Chang-Joo;Kim, Sang-Ho;Lee, Jeong-Oog
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.36 no.10
    • /
    • pp.947-953
    • /
    • 2008
  • MDO(Multidisciplinary Design and Optimization) framework can be an integrated environment or a system, which is for synthetic and simultaneous analysis and design optimization in various design fields of aerospace systems. MDO framework has to efficiently use and integrate distributed resources such as various analysis codes, optimization codes, CAD tools, DBMS and etc. in heterogeneous environment, and to provide graphical and easy-to-use user interfaces. Also, its development method can be changed by design objects and development environment. In this paper, we classify MDO frameworks into three types according to the development environments: Single PC-based, PLinda-based and Web Services-based MDO framework. And, we compare and analyze these frameworks.

Visual Servoing for Humanoid Robot in a Distributed Environment (분산 환경에서 휴머노이드 로봇의 비주얼 서보잉)

  • Jie, Min-Seok;Hong, Seung-Beom;Lee, Joong-Jae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.705-713
    • /
    • 2009
  • This paper proposes CORBA-based visual servoing system of humanoid robot. To effectively control the humanoid robot which is connected to network, it needs to define necessary services for visual servoing as distribution object, and realize them in the middleware. For realizing it following services should be addressed. Naming service for searching a necessary service with unique name assigned to each object, image service for supplying image obtained from stereo camera. In the experiment, we show the result of balloon tracking and bursting that the robot tracks balloons as target objects in the real time, and if a balloon stop for a certain time, then the robot bursts the balloon.

  • PDF

Object Management Method for Air Traffic Control Simulation Based on HLA/RTI (HLA/RTI 기반 항공교통관제 시뮬레이션에 효율적 객체 관리법)

  • Kim, Myung-Kyu;Kim, Jung-Ho;Chae, Soo-Hoan
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.165-171
    • /
    • 2009
  • HLA is made for interoperability and reusability as distributed system framework under DMSO. RTI provides the necessary services for message transmission, object management as HLA 's understructure. But its performance can decrease as it becomes larger and more complex because of communication overhead. To solve this problem, RTI and TCP socket are partially used during data exchange and OMM is designed to efficiently manage objects. The efficiency of the proposed method is proved through simulation when it is applied to an air traffic control simulation based on HLA/RTI.

  • PDF

SYSTEM ANALYSIS OF PIPELINE SOFTWARE - A CASE STUDY OF THE IMAGING SURVEY AT ESO

  • Kim, Young-Soo
    • Journal of Astronomy and Space Sciences
    • /
    • v.20 no.4
    • /
    • pp.403-416
    • /
    • 2003
  • There are common features, in both imaging surveys and image processing, between astronomical observations and remote sensing. Handling large amounts of data, in an easy and fast way, has become a common issue. Implementing pipeline software can be a solution to the problem, one which allows the processing of various kinds of data automatically. As a case study, the development of pipeline software for the EIS (European Southern Observatory Imaging Survey) is introduced. The EIS team has been conducting a sky survey to provide candidate targets to the 250 VLTs (Very Large Telescopes) observations. The survey data have been processed in a sequence of five major data corrections and reductions, i.e. preprocessing, flat fielding, photometric and astrometric corrections, source extraction, and coaddition. The processed data are eventually distributed to the users. In order to provide automatic processing of the vast volume of observed data, pipeline software has been developed. Because of the complexity of objects and different characteristic of each process, it was necessary to analyze the whole works of the EIS survey program. The overall tasks of the EIS are identified, and the scheme of the EIS pipeline software is defined. The system structure and the processes are presented, and in-depth flow charts are analyzed. During the analyses, it was revealed that handling the data flow and managing the database are important for the data processing. These analyses may also be applied to many other fields which require image processing.

The Distributed Management System of Moving Objects for LBS (LBS를 위한 이동객체의 분산관리 시스템설계)

  • Jang, In-Sung;Cho, Dae-Soo;Park, Jong-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.1847-1850
    • /
    • 2002
  • 최근에 이동통신기술의 발전과 무선인터넷 사용자의 급증 및 휴대 단말기 장치의 성능 향상으로 인하여 사용자의 위치 정보를 활용하여 부가 정보 서비스를 받을 수 있는 위치기반서비스(LBS Location Based Service)에 대한 관심이 급증하고 있다. 위치기반 서비스를 제공하기 위해서는 사용자의 위치정보를 관리하는 이동체 데이터베이스가 필수적으로 요구된다. 친구 찾기 서비스와 같은 초기 단계의 LBS 서비스에서는 현재위치만을 가지고 서비스할 수 있지만, 데이터 마이닝이나 CRM등과 같이 연동된 고급 서비스를 제공하기 위해서는 시시각각 변화는 사용자의 현재 위치정보뿐 아니라 과거위치정보를 관리할 수 있어야 한다. 본 논문에서는 이동체 데이터 베이스의 구성요소 중 대용량의 위치정보를 저장 및 검색하기 위한 분산 관리 시스템을 설계하고자 한다. 분산 관리 시스템은 현재위치 관리 컴포넌트와 과거위치 관리 컴포넌트, 분산위치관리 컴포넌트로 구성된다. 현재 위치 관리 컴포넌트와 과거위치 관리 컴포넌트는 공간색인을 제공하므로 데이터 검색의 성능을 향상시키고, 분산위치 관리 컴포넌트는 대용량의 데이터를 다양한 데이터베이스에 분산 저장 및 검색하므로 과부하를 조절하고 대용량의 위치정보를 효율적으로 관리하고자 한다.

  • PDF

Potential Applications of Low Altitude Remote Sensing for Monitoring Jellyfish

  • Jo, Young-Heon;Bi, Hongsheng;Lee, Jongsuk
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.1
    • /
    • pp.15-24
    • /
    • 2017
  • Jellyfish (cnidarian) are conspicuous in many marine ecosystems when in bloom. Despite their importance for the ecosystem structure and function, very few sampling programs are dedicated to sample jellyfish because they are patchily distributed and easily clogged plankton net. Although satellite remote sensing is an excellent observing tool for many phenomena in the ocean, their uses for monitoring jellyfish are not possible due to the coarse spatial resolutions. Hence, we developed the low altitude remote sensing platform to detect jellyfish in high resolutions, which allow us to monitor not only horizontal, but also vertical migration of them. Using low altitude remote sensing platform,we measured the jellyfish from the pier at the Chesapeake Biological Laboratory in Chesapeake Bay. The patterns observed included discrete patches, in rows that were aligned with waves that propagated from deeper regions, and aggregation around physical objects. The corresponding areas of exposed jellyfish on the sea surface were $0.1{\times}10^4pixel^2$, $0.3{\times}10^4pixel^2$, and $2.75{\times}10^4pixel^2$, respectively. Thus, the research result suggested that the migration of the jellyfish was related to the physical forcing in the sea surface.

DDoS Attack Detection on the IPv6 Environment (IPv6환경에서 DDoS 침입탐지)

  • Koo, Min-Jeong;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.185-192
    • /
    • 2006
  • By mistaking normal packets for harmful traffic, it may not offer service according to the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DUoS(Distributed DoS) attack like the Internet worm. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWIB and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF