• Title/Summary/Keyword: Object-Oriented Technology

Search Result 368, Processing Time 0.024 seconds

Integration of Extended IFC-BIM and Ontology for Information Management of Bridge Inspection (확장 IFC-BIM 기반 정보모델과 온톨로지를 활용한 교량 점검데이터 관리방법)

  • Erdene, Khuvilai;Kwon, Tae Ho;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.6
    • /
    • pp.411-417
    • /
    • 2020
  • To utilize building information modeling (BIM) technology at the bridge maintenance stage, it is necessary to integrate large quantities of bridge inspection and model data for object-oriented information management. This research aims to establish the benefits of utilizing the extended industry foundation class (IFC)-BIM and ontology for bridge inspection information management. The IFC entities were extended to represent the bridge objects, and a method of generating the extended IFC-based information model was proposed. The bridge inspection ontology was also developed by extraction and classification of inspection concepts from the AASHTO standard. The classified concepts and their relationships were mapped to the ontology based on the semantic triples approach. Finally, the extended IFC-based BIM model was integrated with the ontology for bridge inspection data management. The effectiveness of the proposed framework for bridge inspection information management by integration of the extended IFC-BIM and ontology was tested and verified by extracting bridge inspection data via the SPARQL query.

Design and Development of XR Contents Authoring Framework for IT Convergence Education (융합영상콘텐츠 교육을 위한 XR 콘텐츠저작 프레임워크 설계 및 제작)

  • Leem, Eek-Su
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.633-639
    • /
    • 2020
  • Despite the growing educational demand for the extended reality (XR) convergence content creation for non-IT students, fewer studies have attempted to education material development. In this paper, non-IT students' requirement to create XR convergence contents was analyzed and designed framework system specification. The object-oriented application framework (OOAF) was developed for non-IT students to create XR convergence contents through simple interaction methods such as drag and drop in-game engines. To evaluate the developed framework XR contents development course was operated with 26 industrial design majors sophomore in university. More than 90% of students succeeded in working on prototype XR contents in Oculus Rift. This result will be expected to improve the quality of XR contents creation education for non-IT students and contribute to the growth of the future convergence contents industry.

Joint Reasoning of Real-time Visual Risk Zone Identification and Numeric Checking for Construction Safety Management

  • Ali, Ahmed Khairadeen;Khan, Numan;Lee, Do Yeop;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.313-322
    • /
    • 2020
  • The recognition of the risk hazards is a vital step to effectively prevent accidents on a construction site. The advanced development in computer vision systems and the availability of the large visual database related to construction site made it possible to take quick action in the event of human error and disaster situations that may occur during management supervision. Therefore, it is necessary to analyze the risk factors that need to be managed at the construction site and review appropriate and effective technical methods for each risk factor. This research focuses on analyzing Occupational Safety and Health Agency (OSHA) related to risk zone identification rules that can be adopted by the image recognition technology and classify their risk factors depending on the effective technical method. Therefore, this research developed a pattern-oriented classification of OSHA rules that can employ a large scale of safety hazard recognition. This research uses joint reasoning of risk zone Identification and numeric input by utilizing a stereo camera integrated with an image detection algorithm such as (YOLOv3) and Pyramid Stereo Matching Network (PSMNet). The research result identifies risk zones and raises alarm if a target object enters this zone. It also determines numerical information of a target, which recognizes the length, spacing, and angle of the target. Applying image detection joint logic algorithms might leverage the speed and accuracy of hazard detection due to merging more than one factor to prevent accidents in the job site.

  • PDF

Design and Implementation of Database Broker system for Integrated Data Environment of Virtual Enterprises (가상 기업의 통합 데이터 환경을 위한 데이터베이스 브로커 시스템의 설계 및 구현)

  • Yun, Seon-Hui;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.425-438
    • /
    • 1999
  • In recent days network computing technologies have bee developed rapidly and the extended use of Internet applications for enterprises such as internet/extarnet in and between enterprises has been increased enormously. Therefore the business in the future will be executed by virtual enterprise. Virtual enterprises which is based on information sharing between enterprises are composed of work processes related to information exchange between virtual enterprises, the team members who are representatives of the organizations that are participated in the actual business of virtual enterprises, and members who are representatives of the organizations that are participated in the actual business of virtual enterprises, and environment that are provided by supporting CALS(continuous Acquisition and Life cycle Support or commerce At light Speed). Supporting system of IDE(Integrated Data Environment)for CALS implementation that is provided as an environment of virtual enterprises has to ensure the autonomies of local data and to provide the accessibility of heterogeneous database of enterprises on network transparently for giving user a single global view of data. This paper introduce the design and implementation of the database broker system that can be accessed data transparently by the suers of participated enterprises in the integrated data environment supporting virtual enterprises. The system uses java/CORBA technology in Web environment and Object Query language (OQL) to process the queries of relational database system, object-oriented database system, and file information.

  • PDF

Automatic Target Recognition Study using Knowledge Graph and Deep Learning Models for Text and Image data (지식 그래프와 딥러닝 모델 기반 텍스트와 이미지 데이터를 활용한 자동 표적 인식 방법 연구)

  • Kim, Jongmo;Lee, Jeongbin;Jeon, Hocheol;Sohn, Mye
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.145-154
    • /
    • 2022
  • Automatic Target Recognition (ATR) technology is emerging as a core technology of Future Combat Systems (FCS). Conventional ATR is performed based on IMINT (image information) collected from the SAR sensor, and various image-based deep learning models are used. However, with the development of IT and sensing technology, even though data/information related to ATR is expanding to HUMINT (human information) and SIGINT (signal information), ATR still contains image oriented IMINT data only is being used. In complex and diversified battlefield situations, it is difficult to guarantee high-level ATR accuracy and generalization performance with image data alone. Therefore, we propose a knowledge graph-based ATR method that can utilize image and text data simultaneously in this paper. The main idea of the knowledge graph and deep model-based ATR method is to convert the ATR image and text into graphs according to the characteristics of each data, align it to the knowledge graph, and connect the heterogeneous ATR data through the knowledge graph. In order to convert the ATR image into a graph, an object-tag graph consisting of object tags as nodes is generated from the image by using the pre-trained image object recognition model and the vocabulary of the knowledge graph. On the other hand, the ATR text uses the pre-trained language model, TF-IDF, co-occurrence word graph, and the vocabulary of knowledge graph to generate a word graph composed of nodes with key vocabulary for the ATR. The generated two types of graphs are connected to the knowledge graph using the entity alignment model for improvement of the ATR performance from images and texts. To prove the superiority of the proposed method, 227 documents from web documents and 61,714 RDF triples from dbpedia were collected, and comparison experiments were performed on precision, recall, and f1-score in a perspective of the entity alignment..

A Study on the Development of Standard Profiles Management System which supports the Technical Reference Model for Information Technology Architecture (정보기술 아키텍처를 위한 기술참조모델을 지원하는 표준프로파일 관리시스템 개발에 관한 연구)

  • Yang, Jin-Hyeok;Kim, Yeong-Do;Jeong, Hui-Jun;Yang, Jin-Yeong;Yu, Myeong-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.665-672
    • /
    • 2001
  • ITA (Information Technology Architecture) satisfies the requirements of information system, supports the information used in the institution's business to guarantee the interoperability and security, and analyzes the components of information system. ITA consists of EA (Enterprise Architecture), TRM (Technical Reference Manual) and SP (Standard Profile). The SP, one of the major components of ITA, is a set of information technology standards. In this paper, to construct and utilize the ITA, we mention the applications of information technology about the SP system implementation based on the TRM. The SP management system implemented in this paper is the first trial in Korea, and designs the software with object oriented programming languages such as JSP and Java. Moreover the basic and detailed specification based on the UML notation, system design using the component and system design pattern consisting of software architectures enhance the software reusability. And the constructed system in this paper shows less maintenance cost by using the public softwares such as Linux system, Korean DBMS, Apache and Tomcat, etc. Finally, the system includes the SP reference system which is used in the other institutions and cannot be found in other institutions. Also it includes the additional diverse service modules which support the subsequent processing for the establishment and revision of standards via internet.

  • PDF

A Study on the Instrument Panel Design Trend for Automobile Interior (자동차 인테리어의 인스트루먼트 패널 디자인 경향 연구)

  • Cho, Kyung-Sil;Lee, Myung-Ki
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.129-138
    • /
    • 2005
  • Until the early part of the 1990s, interior design has never been thought important by car makers. Repeated attempts have been made to systemize a technical structure, such as layout, driving method, and size, and the car's interior design has been developed by in simple comparison with the exterior design. In the 1990s, however, this trend began to change because consumers began spending more time in their cars, so the motive of the technology development became that of giving comfort and functional satisfaction to the customers. Observing how a person spends inside his or her car and considering the latest trends in car interiors have made a consumer-oriented sense of value i.e., intensifying the personality of the car's interior design and considering the emotional makeup of the consumer factor in the acquisition of a strategic brand identity. These days, car interiors assume a new concept every year due to the constant change in various factors, and the application of a high-tech design, with a sensing function and a navigation system, to achieve driverless running, is being raised as a key trend element technology for the future. Now, at the present when multilateral concept applications of design are attempted under the direct influences from other fields such as product design, fashion and furniture, I would like to lay stress on investigating and analysing the changes in car interior design varying with the background of the times and formative characteristics from the object point of view. On this study, I would like to compare the background of the times and flow of car interior design with priority given to crash pad and would like to attempt to present the direction of the future car interior design together with diversifying major technical factors.

  • PDF

A Study for BIM based Evaluation and Process for Architectural Design Competition -Case Study of Domestic and International BIM-based Competition (BIM기반의 건축설계경기 평가 및 절차에 관한 연구 -국내외 BIM기반 건축설계경기 사례를 기반으로-)

  • Park, Seung-Hwa;Hong, Chang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.23-30
    • /
    • 2017
  • In the AEC(Architecture, Engineering and Construction) industry, BIM(Building Information Modeling) technology not only helps design intent efficiently, but also realizes an object-oriented design including building's life cycle information. Thus it can manage all data created in each building stage and the roles of BIM are greatly expanded. Contractors and designers have been trying to adopt BIM to design competitions and validate it for the best result in various aspects. Via the computational simulation which differs from the existing process, effective evaluation can be done. For this process, a modeling guideline for each kind of BIM tool and a validation system for the confidential assessment are required. This paper explains a new process about design evaluation methods and process using BIM technologies which follow the new paradigm in construction industry through complement points by an example of a competition activity of the Korea Power Exchange(KPX) headquarter office. In conclusion, this paper provides a basic data input guideline based on open BIM for automatic assessment and interoperability between different BIM systems and suggests a practical usage of the rule-based Model Checker.

The Usage of Modern Information Technologies for Conducting Effective Monitoring of Quality in Higher Education

  • Oseredchuk, Olga;Nikolenko, Lyudmyla;Dolynnyi, Serhii;Ordatii, Nataliia;Sytnik, Tetiana;Stratan-Artyshkova, Tatiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Information technologies in higher education are the basis for solving the tasks set by monitoring the quality of higher education. The directions of aplying information technologies which are used the most nowadays have been listed. The issues that should be addressed by monitoring the quality of higher education with the use of information technology have been listed. The functional basis for building a monitoring system is the cyclical stages: Observation; Orientation; Decision; Action. The monitoring system's considered cyclicity ensures that the concept of independent functioning of the monitoring system's subsystems is implemented.. It also ensures real-time task execution and information availability for all levels of the system's hierarchy of vertical and horizontal links, with the ability to restrict access. The educational branch uses information and computer technologies to monitor research results, which are realized in: scientific, reference, and educational output; electronic resources; state standards of education; analytical materials; materials for state reports; expert inferences on current issues of education and science; normative legal documents; state and sectoral programs; conference recommendations; informational, bibliographic, abstract, review publications; digests. The quality of Ukrainian scientists' scientific work is measured using a variety of bibliographic markers. The most common is the citation index. In order to carry out high-quality systematization of information and computer monitoring technologies, the classification has been carried out on the basis of certain features: (processual support for implementation by publishing, distributing and using the results of research work). The advantages and disadvantages of using web-based resources and services as information technology tools have been discussed. A set of indicators disclosed in the article evaluates the effectiveness of any means or method of observation and control over the object of monitoring. The use of information technology for monitoring and evaluating higher education is feasible and widespread in Ukrainian education, and it encourages the adoption of e-learning. The functional elements that stand out in the information-analytical monitoring system have been disclosed.

A study on the policy of de-identifying unstructured data for the medical data industry (의료 데이터 산업을 위한 비정형 데이터 비식별화 정책에 관한 연구)

  • Sun-Jin Lee;Tae-Rim Park;So-Hui Kim;Young-Eun Oh;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.85-97
    • /
    • 2022
  • With the development of big data technology, data is rapidly entering a hyperconnected intelligent society that accelerates innovative growth in all industries. The convergence industry, which holds and utilizes various high-quality data, is becoming a new growth engine, and big data is fused to various traditional industries. In particular, in the medical field, structured data such as electronic medical record data and unstructured medical data such as CT and MRI are used together to increase the accuracy of disease prediction and diagnosis. Currently, the importance and size of unstructured data are increasing day by day in the medical industry, but conventional data security technologies and policies are structured data-oriented, and considerations for the security and utilization of unstructured data are insufficient. In order for medical treatment using big data to be activated in the future, data diversity and security must be internalized and organically linked at the stage of data construction, distribution, and utilization. In this paper, the current status of domestic and foreign data security systems and technologies is analyzed. After that, it is proposed to add unstructured data-centered de-identification technology to the guidelines for unstructured data and technology application cases in the industry so that unstructured data can be actively used in the medical field, and to establish standards for judging personal information for unstructured data. Furthermore, an object feature-based identification ID that can be used for unstructured data without infringing on personal information is proposed.