• Title/Summary/Keyword: Information Use Environments

Search Result 1,185, Processing Time 0.03 seconds

Web-Based Collaborative Design System for Concurrent Ship Design (동시공학적 선박설계를 위한 웹 기반의 협업설계 시스템)

  • LEE KYUNG-HO
    • Journal of Ocean Engineering and Technology
    • /
    • v.18 no.6 s.61
    • /
    • pp.37-43
    • /
    • 2004
  • Under the concept of the global economy, the enterprises are assigning design and production environments around the world in various areas. In shipbuilding companies, a serious problem of information exchange has emerged as companies use traditional hardware and very distinct softwares that is tailored to their field of expertise. To overcome the decreased productivity resulting from the interruption of information, the concepts of simultaneous engineering and concurrent design become very significant. In this article, the concept of collaborative design based on Internet environments is described. Specifically, the core technologies necessary to achieve collaborative design environments among shipbuilding companies, ship owners, ship classification societies, model basin, and consulting companies are adopted.

A Contingent Study of Information System Planning (정보시스템 계획의 상황적인 연구)

  • Cho Hyun-Dal
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.137-159
    • /
    • 2000
  • Recently, the importance of ISP(Information System Planning) has been increased because of rapid change and severe competition in business environments. Furthermore, the role of IS in the organization has included not only the supportive activities but also the strategic activities. Organizations can get the competitive advantages through the strategic use of IT by establishing effective and systematic ISP implementation. The main focus of this study is investigate the relationship among three subunits(organizational factors, the role of IS and effective ISP) based on the contingent settings which the process of ISP is implemented. The reasons that conceptual framework of this study is based on the contingent theory are as follow: First, ISP process itself has a series of complicated work which various elements in a company are involved. ISP externally must have the process to evaluate information technology (technology related with IS). Internally ISP process has a serious of works including determining information requirements to develop successful IS for other functional departments and identifying strategic opportunity of IS aligned with business strategy. Secondly, the activity of ISP is occurring on the continual basis. Business environments in which ISP process has implemented are changing continuously. Specific ISP methodology which was appropriate in a certain period of time does not work any more because of the rapid changes in business environments. For this reason managers can hardly expect successful ISP without considering external environments or internal environments such as organizational or management side. For this study, 240 survey questionnaires were mailed and 71 questionnaires were returned. 57 samples were used for the final analysis and 14 samples were excluded from analysis in that they didn't exercise official and systematic ISP. As the result of analysis, among the internal factors(organizational size, time frame of decision making, budget, management style, organizational culture) organizational culture, management style and time frame of decision making are identified as contingent factors on the effective ISP. The result of this study may have meaning in suggesting the way to develop effective ISP through the formalization of business process, more favorable users attitude toward IS and selection of an appropriate ISP methodology.

  • PDF

A Virtual Manufacturing System the Integration of Process Planning and Scheduling (공정계획 및 일정계획 통합을 위한 가상 생산 시스템)

  • Park, Ji-Hyung;Yum, Ki-Won
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.1 s.94
    • /
    • pp.161-166
    • /
    • 1999
  • Virtual Manufacturing System(VMS) is a computer model that represents the precise and whole structure of manufacturing systems and simulates their physical and logical behavior in operation. In this paper, a real time simulation for the virtual factory is proposed to integrate a process planning with scheduling under distributed environments. In order to communicate the information under distributed environments, we use a server/client concept using socket program and internet.

  • PDF

Labeling Q-learning with SOM

  • Lee, Haeyeon;Kenichi Abe;Hiroyuki Kamaya
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.35.3-35
    • /
    • 2002
  • Reinforcement Learning (RL) is one of machine learning methods and an RL agent autonomously learns the action selection policy by interactions with its environment. At the beginning of RL research, it was limited to problems in environments assumed to be Markovian Decision Process (MDP). However in practical problems, the agent suffers from the incomplete perception, i.e., the agent observes the state of the environments, but these observations include incomplete information of the state. This problem is formally modeled by Partially Observable MDP (POMDP). One of the possible approaches to POMDPS is to use historical nformation to estimate states. The problem of these approaches is how t..

  • PDF

A Study on Mobile IPv4 Authentication Mechanisms

  • Lim, Jung-Muk;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.277-280
    • /
    • 2005
  • With the proliferation of mobile terminals, use of the Internet in mobile environments is becoming more common. To support mobility in these terminals, Mobile IPv4 is proposed and represents the standard in IPv4 environments. Authentication should be mandatory, because mobile terminals can utilize Internet services in any foreign domain. Mobile IPv4 provides symmetric key based authentication using the default HMAC-MD5. However, symmetric key based authentication creates a key distribution problem. To solve this problem, public key based authentication mechanisms have been proposed. In this paper, the performance of each of these mechanisms is evaluated. The results present that, among these mechanisms, partial certificate based authentication has superior performance, and certificate based authentication has the worst performance. Although current public key based authentication mechanisms have lower performance than symmetric key based authentication, this paper presents the possibility that public key based authentication mechanisms may be used for future mobile terminal authentication.

  • PDF

Pedestrian Navigation System in Mountainous non-GPS Environments

  • Lee, Sungnam
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.3
    • /
    • pp.188-197
    • /
    • 2021
  • In military operations, an accurate localization system is required to navigate soldiers to their destinations, even in non-GPS environments. The global positioning system is a commonly used localization method, but it is difficult to maintain the robustness of GPS-based localization against jamming of signals. In addition, GPS-based localization cannot provide important terrain information such as obstacles. With the widespread use of embedded sensors, sensor-based pedestrian tracking schemes have become an attractive option. However, because of noisy sensor readings, pedestrian tracking systems using motion sensors have a major drawback in that errors in the estimated displacement accumulate over time. We present a group-based standalone system that creates terrain maps automatically while also locating soldiers in mountainous terrain. The system estimates landmarks using inertial sensors and utilizes split group information to improve the robustness of map construction. The evaluation shows that our system successfully corrected and combined the drift error of the system localization without infrastructure.

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

The use and potential applications of point clouds in simulation of solar radiation for solar access in urban contexts

  • Alkadri, Miktha F.;Turrin, Michela;Sariyildiz, Sevil
    • Advances in Computational Design
    • /
    • v.3 no.4
    • /
    • pp.319-338
    • /
    • 2018
  • High-performing architecture should be designed by taking into account the mutual dependency between the new building and the local context. The performative architecture plays an important role to avert any unforeseen failures after the building has been built; particularly ones related to the microclimate impacts that affect the human comfort. The use of the concept of solar envelopes helps designers to construct the developable mass of the building design considering the solar access and the site obstruction. However, the current analysis method using solar envelopes lack in terms of integrating the detailed information of the existing context during the simulation process. In architectural design, often the current site modelling not only absent in preserving the complex geometry but also information on the surface characteristics. Currently, the emerging applications of point clouds offer a great possibility to overcome these limitations, since they include the attribute information such as XYZ as the position information and RGB as the color information. This study particularly presents a comparative analysis between the manually built 3D models and the models generated from the point cloud data. The modelling comparisons focus on the relevant factors of solar radiation and a set of simulation to calculate the performance indicators regarding selected portions of the models. The experimental results emphasize an introduction of the design approach and the dataset visibility of the 3D existing environments. This paper ultimately aims at improving the current architectural decision of support environment means, by increasing the correspondence between the digital models for performance analysis and the real environments (context of design) during the conceptual design phase.

Inter-Sector Beamforming with MMSE Receiver in the Downlink of TDD Cellular Systems

  • Yeom, Jae-Heung;Lee, Yong-Hwan
    • Journal of Communications and Networks
    • /
    • v.10 no.2
    • /
    • pp.118-126
    • /
    • 2008
  • The use of beamforming is effective for users in limited power environments. However, when it is applied to the downlink of a cellular system with universal frequency reuse, users near the sector boundary may experience significant interference from more than one sector. The use of a minimum mean square error (MMSE)-type receiver may not sufficiently cancel out the interference unless a sufficient number of receive antennas are used. In this paper, we consider the use of inter-sector beamforming that cooperates with a neighboring sector in the same cell to mitigate this interference problem in time-division duplex (TDD) environments. The proposed scheme can avoid interference from an adjacent sector in the same cell, while enhancing the transmit array gain by using the TDD reciprocity. The performance of the proposed scheme is analyzed in terms of the output signal-to-interference-plus-noise power ratio (SINR) and the output capacity when applied to an MMSE-type receiver. The beamforming mode can be analytically switched between the inter-sector and the single-sector mode based on the long-term channel information. Finally, the effectiveness of the proposed scheme is verified by computer simulation.

Lizeth: Agent Mediated E-Commerce in a Virtual Environment

  • Cairo, Osvaldo;Olarte, Juan G.;Rivera, Fernando E.
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.11-15
    • /
    • 2001
  • The explosion of the Internet, and most recently e-commerce, has caused great interest in agent technologies. The development of virtual environments has also increased in the last few years. A growing number of real-time applications use graphics with photorealistic quality, especially in the field of training, but also in the areas of design and ergonomic research. We describe an attempt to develop a framework that provides customers with multimedia information and interactive experiences with a virtual shopping environment. The application presented consists on a virtual visit to a music -store where the user is guided by an intelligent agent named Lizeth which responds in real-time to user's requests with precise information about music, artist's biographies, prices and related products to help the user to make decisions. The potential of UML and the Java programming language is discussed to show their application in the field of intelligent agents as mediators on shopping processes. We conclude that the proposed framework leads to the creation of application with a potentially significant impact in the development of e-commerce systems embedded in virtual environments.

  • PDF