• Title/Summary/Keyword: Implementation technique

Search Result 2,093, Processing Time 0.027 seconds

Grid-based Semantic Cloaking Method for Continuous Moving Object Anonymization (이동 객체 정보 보호를 위한 그리드 기반 시멘틱 클로킹 기법)

  • Zhang, Xu;Shin, Soong-Sun;Kim, Gyoung-Bae;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.3
    • /
    • pp.47-57
    • /
    • 2013
  • Location privacy has been a serious concern for mobile users who use location-based services to acquire geographical location continuously. Spatial cloaking technique is a well-known privacy preserving method, which blurs an exact user location into a cloaked area to meet privacy requirements. However, cloaking for continuous moving object suffers from cloaked area size problem as it is unlikely for all objects travel in the same direction. In this paper, we propose a grid-based privacy preservation method with an improved Earth Mover's Distance(EMD) metric weight update scheme for semantic cloaking. We also define a representative cloaking area which protects continuous location privacy for moving users. Experimental implementation and evaluation exhibit that our proposed method renders good efficiency and scalability in cloaking processing time and area size control. We also show that our proposed method outperforms the existing method by successfully protects location privacy of continuous moving objects against various adversaries.

A Study on A Dynamic Reliability Analysis Model (동적신뢰도 평가모델의 연구)

  • 제무성
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2000.04a
    • /
    • pp.239-246
    • /
    • 2000
  • This paper presents a new dynamic approach for assessing feasibility associated with the implementation of accident management strategies by the operators. This approach includes the combined use of both the concept of reliability physics and a dynamic event tree generation scheme. The reliability physics is based on the concept of a comparison between two competing variables, i.e., the requirement and the achievement parameter, while the dynamic event tree generation scheme on the continuous generation of the possible event sequences at every branch point up to the desired solution. This approach is applied to a cavity flooding strategy in a reference plant, which is to supply water into the reactor cavity using emergency fire systems in the station blackout sequence. The MAAP code and Latin Hypercube sampling technique are used to determine the uncertainty of the requirement parameter. It has been demonstrated that this combined methodology may contribute to assessing the success likelihood of the operator actions required during accidents and therefore to developing the accident management procedures.

  • PDF

Development of an Storytelling Instructional Model for promoting problem-solving ability in a Blended Learning Environment (Blended Learning 환경에서 문제해결력 강화를 위한 스토리텔링 교수학습 모형 개발)

  • Kang, Mun-Suk;Kim, Suk-Woo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.1
    • /
    • pp.12-28
    • /
    • 2013
  • The purpose of this study was to develop storytelling Instructional model for promote problem-solving in a Blended learning Environment. To achieve the purpose, the study was performed by dividing into two stages. First, the draft of storytelling Instructional model was proposed by performing a literature survey and a case study. Second, the draft model was applied to the actual work. And the draft was modified and developed to the final model on the basis of the draft model's strength and implemented to 28 students who were the sophomore of child care education department and enrolled the profession class of at S University for 6 weeks. From the implementation result of the model, it was obtained that there was the positive reaction on applying storytelling technique to the beginning stage of learning. Instructional model storytelling consists phases Preparing to perform Storytelling, Building the team and role sharing team, Problem providing, Planning for problem solving, Brend Story structuralization, Cooperative Learning and Problem solving, announcement of the results and evaluating and reflection of general. And then learning supporting components for a facilitator and a learner were prepared for each process. Established in a Blended learning Environment was created based on all-line, how to teach and learning supporting organization. Final Model was suggested as a blueprint for stages actual learning which was consisted of a introductory storytelling part, an main storytelling part and a post storytelling part.

A Implementation of the Feature-based Hierarchical Image Retrieval System (특징기반 계층적 영상 검색 시스템의 구현)

  • 김봉기;김홍준;김창근
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.2
    • /
    • pp.60-70
    • /
    • 2000
  • As a result of remarkable developments in computer technology, the image retrieval system that can efficiently retrieve image data becomes a core technology of information-oriented society. In this paper, we implemented the Hierarchical Image Retrieval System for content-based image data retrieval. At the first level, to get color information, with improving the indexing method using color distribution characteristic suggested by Striker et al., i.e. the indexing method considering local color distribution characteristics, the system roughly classifies images through the improved method. At the second level, the system finally retrieves the most similar image from the image queried by the user using the shape information about the image groups classified at the first level. To extract the shape information, we use the Improved Moment Invariants(IMI) that manipulates only the pixels on the edges of objects in order to overcome two main problems of the existing Moment Invariant methods large amount of processing and rotation sensitiveness which can frequently be seen in the Directive Histogram Intersection technique suggested by Jain et al. Experiments have been conducted on 300 automobile images And we could obtain the more improved results through the comparative test with other methods.

  • PDF

A Software Engineering Process for Safety-critical Software Application (Safety-critical 소프트웨어 적용을 위한 소프트웨어 개발 절차)

  • Kang, Byung-Heon;Kim, Hang-Bae;Chang, Hoon-Seon;Jeon, Jong-Sun;Park, Suk-Joon
    • Nuclear Engineering and Technology
    • /
    • v.27 no.1
    • /
    • pp.84-95
    • /
    • 1995
  • Application of computer software to safety-critical systems is on the increase. To be successful, the software must be designed and constructed to meet the functional and performance requirements of the system. For safety reason, the software must be demonstrated not only to meet these requirements, but also to operate safely as a component within the system. For longer-term cost consideration, the software must be designed and structured to ease future maintenance and modifications. This paper present a software engineering process for the production of safety-critical software for a nuclear power plant The presentation is expository in nature of a viable high quality safety-critical software development. It is based on the ideas of a rational design process and on the experience of the adaptation of such process in the production of the safety-critical software for the Shutdown System Number Two of Wolsong 2, 3 & 4 nuclear power generation plants. This process is significantly different from a conventional process in terms of rigorous software development phases and software design techniques. The process covers documentation, design, verification and testing using mathematically precise notations and highly reviewable tabular format to specify software requirements and software design. These specifications allow rigorous, stepwise verification of software design against software requirements, and code against software design using static analysis. The software engineering process described in this paper applies the principle of information-hiding decomposition in software design using a modular design technique so that when a change is' required or an error is detected, the affected scope can be readily and confidently located. It also facilitates a sense of high degree of confidence in the ‘correctness’ of the software production, and provides a relatively simple and straightforward code implementation effort.

  • PDF

Simulator for Management of Tracking Information of Digital Content (콘텐츠추적정보 관리 시뮬레이터)

  • Lee, Seung-Won;Choi, Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.48-55
    • /
    • 2012
  • The number of digital content used in mobile devices such as smartphones or tablet PCs has been rapidly increasing along with the development of IT industry. At the same time, studies on digital content management are actively conducted. One of the previous studies defined CTI(Content Tracking Information) for efficient management of the information on digital content usage between mobile devices in an area in which the internet is inaccessible, and suggested ways to deal with CTI management, reduction of the overhead and a technique of collecting as many CTIs as possible within a short time. This paper presents the design and implementation of a simulator capable of verifying the logic and the performance of the CTI management method. This tool simulates a mobile environment where devices move around in the internet inaccessible area and propagates digital contents each other. It shows several advantages including the efficient synchronization of CTI management and overhead reduction.

An Active Candidate Set Management Model on Association Rule Discovery using Database Trigger and Incremental Update Technique (트리거와 점진적 갱신기법을 이용한 연관규칙 탐사의 능동적 후보항목 관리 모델)

  • Hwang, Jeong-Hui;Sin, Ye-Ho;Ryu, Geun-Ho
    • Journal of KIISE:Databases
    • /
    • v.29 no.1
    • /
    • pp.1-14
    • /
    • 2002
  • Association rule discovery is a method of mining for the associated item set on large databases based on support and confidence threshold. The discovered association rules can be applied to the marketing pattern analysis in E-commerce, large shopping mall and so on. The association rule discovery makes multiple scan over the database storing large transaction data, thus, the algorithm requiring very high overhead might not be useful in real-time association rule discovery in dynamic environment. Therefore this paper proposes an active candidate set management model based on trigger and incremental update mechanism to overcome non-realtime limitation of association rule discovery. In order to implement the proposed model, we not only describe an implementation model for incremental updating operation, but also evaluate the performance characteristics of this model through the experiment.

A Study on the Implementation of RFID-Based Autonomous Navigation System for Robotic Cellular Phone (RCP) (RFID를 이용한 RCP 자율 네비게이션 시스템 구현을 위한 연구)

  • Choe Jae-Il;Choi Jung-Wook;Oh Dong-Ik;Kim Seung-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.5
    • /
    • pp.480-488
    • /
    • 2006
  • Industrial and economical importance of CP(Cellular Phone) is growing rapidly. Combined with IT technology, CP is one of the most attractive technologies of today. However, unless we find a new breakthrough in the technology, its growth may slow down soon. RT(Robot Technology) is considered one of the most promising next generation technologies. Unlike the industrial robot of the past, today's robots require advanced features, such as soft computing, human-friendly interface, interaction technique, speech recognition object recognition, among many others. In this paper, we present a new technological concept named RCP (Robotic Cellular Phone) which integrates RT and CP in the vision of opening a combined advancement of CP, IT, and RT, RCP consists of 3 sub-modules. They are $RCP^{Mobility}$(RCP Mobility System), $RCP^{Interaction}$, and $RCP^{Integration}$. The main focus of this paper is on $RCP^{Mobility}$ which combines an autonomous navigation system of the RT mobility with CP. Through $RCP^{Mobility}$, we are able to provide CP with robotic functions such as auto-charging and real-world robotic entertainment. Ultimately, CP may become a robotic pet to the human beings. $RCP^{Mobility}$ consists of various controllers. Two of the main controllers are trajectory controller and self-localization controller. While the former is responsible for the wheel-based navigation of RCP, the latter provides localization information of the moving RCP With the coordinates acquired from RFID-based self-localization controller, trajectory controller refines RCP's movement to achieve better navigation. In this paper, a prototype of $RCP^{Mobility}$ is presented. We describe overall structure of the system and provide experimental results on the RCP navigation.

Video Player for Online SVC Stream in Android Platform (안드로이드 플랫폼에서 온라인 SVC 스트림을 재생하는 비디오 재생기의 설계 및 구현)

  • Hwang, Ki-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.157-164
    • /
    • 2012
  • This paper introduces an implementation of SVC player which runs on Android platform and can play SVC video stream on line from SVC video server. SVC(Scalable Video Coding) is a scalable video encoding technique which supports three scalability such as temporal scalability, spatial scalability, and quality scalability. To implement the SVC player on Android, we implemented a SVC decoder using JSVM open source written in C/C++ as a native part on Android and developed Android UI in Java. Also we built an SVC encoding system off line and an SVC streaming server to conduct on-line SVC streaming experiments. Finally, after we installed the SVC player developed in this paper on Motoroi mobile phone, we evaluated and analyzed on-line streaming performance of the SVC player. The result showed that the player worked well and it had no jitter in streaming with the size of QCIF and 10fps from a fully encoded SVC video source.

Implementation of Secured Smart-Learning System using Encryption Function (암호기능을 이용한 안전한 스마트-러닝 시스템 구현)

  • Yang, J.S.;Hong, Y.S.;Yoon, E.J.;Choi, Y.J.;Chun, S.K.
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.195-201
    • /
    • 2013
  • The government has invested much budget for 5years to do the Smart-education and operate digital textbook services since 2011. The private enterprises also decided to focus on constructing Smart learning system by investing much budget. If these systems are constructed nationwide and therefore can access to cyber university by using smart devices, we can reduce the information gap and study online lectures to get a grade whenever, whoever and wherever we want to. However, these convenient systems can cause serious problems like falsifying grades by hacking if security systems are weak. In this paper, we formulated cyber university which is secured in terms of security. For this, we simulated the smart-learning system which strengthened the security, considering code algorithm and encryption technique.