• Title/Summary/Keyword: Open source system

Search Result 866, Processing Time 0.028 seconds

Implementation of Policy based In-depth Searching for Identical Entities and Cleansing System in LOD Cloud (LOD 클라우드에서의 연결정책 기반 동일개체 심층검색 및 정제 시스템 구현)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.67-77
    • /
    • 2018
  • This paper suggests that LOD establishes its own link policy and publishes it to LOD cloud to provide identity among entities in different LODs. For specifying the link policy, we proposed vocabulary set founded on RDF model as well. We implemented Policy based In-depth Searching and Cleansing(PISC for short) system that proceeds in-depth searching across LODs by referencing the link policies. PISC has been published on Github. LODs have participated voluntarily to LOD cloud so that degree of the entity identity needs to be evaluated. PISC, therefore, evaluates the identities and cleanses the searched entities to confine them to that exceed user's criterion of entity identity level. As for searching results, PISC provides entity's detailed contents which have been collected from diverse LODs and ontology customized to the content. Simulation of PISC has been performed on DBpedia's 5 LODs. We found that similarity of 0.9 of source and target RDF triples' objects provided appropriate expansion ratio and inclusion ratio of searching result. For sufficient identity of searched entities, 3 or more target LODs are required to be specified in link policy.

An Analysis on BitTorrent Performance Based on the Number of Unchoked Peers (Unchoked Peer 개수에 따른 BitTorrent 성능 분석)

  • Chung, Tae-Joong;Han, Jin-Young;Kim, Hyun-Chul;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1197-1203
    • /
    • 2010
  • A strength of BitTorrent, which is widely used for file sharing today, is due to its peer selection mechanism which is designed to encourage peers to contribute data. In the peer selection phase in BitTorrent, peers to upload the file in a swarm are selected by determining which peers upload the most to themselves. However, the number of peers to upload (i.e., number of unchoked peers) is fixed to four in its peer selection mechanism of BitTorrent, which yields inefficiency because the situation of the swarm may vary frequently (e.g., number of peers in the swarm, download rates, and upload rates). In this paper, we analyze the swarming system performance when the number of unchoked in BitTorrents is not static, but dynamic. For empirical investigation, we established a testbed in Seoul National University by modifying an open-source BitTorrent client, which is popular. Through our experiments, we show that an adaptive mechanism to adjust the number of unchoked peers considering the situation of the swarm is needed to improve the performance of BitTorrent.

Bitmap Indexes and Query Processing Strategies for Relational XML Twig Queries (관계형 XML 가지 패턴 질의를 위한 비트맵 인덱스와 질의 처리 기법)

  • Lee, Kyong-Ha;Moon, Bong-Ki;Lee, Kyu-Chul
    • Journal of KIISE:Databases
    • /
    • v.37 no.3
    • /
    • pp.146-164
    • /
    • 2010
  • Due to an increasing volume of XML data, it is considered prudent to store XML data on an industry-strength database system instead of relying on a domain specific application or a file system. For shredded XML data stored in relational tables, however, it may not be straightforward to apply existing algorithms for twig query processing, since most of the algorithms require XML data to be accessed in a form of streams of elements grouped by their tags and sorted in a particular order. In order to support XML query processing within the common framework of relational database systems, we first propose several bitmap indexes and their strategies for supporting holistic twig joining on XML data stored in relational tables. Since bitmap indexes are well supported in most of the commercial and open-source database systems, the proposed bitmapped indexes and twig query processing strategies can be incorporated into relational query processing framework with more ease. The proposed query processing strategies are efficient in terms of both time and space, because the compressed bitmap indexes stay compressed during data access. In addition, we propose a hybrid index which computes twig query solutions with only bit-vectors, without accessing labeled XML elements stored in the relational tables.

Convergence CCTV camera embedded with Deep Learning SW technology (딥러닝 SW 기술을 이용한 임베디드형 융합 CCTV 카메라)

  • Son, Kyong-Sik;Kim, Jong-Won;Lim, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.103-113
    • /
    • 2019
  • License plate recognition camera is dedicated device designed for acquiring images of the target vehicle for recognizing letters and numbers in a license plate. Mostly, it is used as a part of the system combined with server and image analysis module rather than as a single use. However, building a system for vehicle license plate recognition is costly because it is required to construct a facility with a server providing the management and analysis of the captured images and an image analysis module providing the extraction of numbers and characters and recognition of the vehicle's plate. In this study, we would like to develop an embedded type convergent camera (Edge Base) which can expand the function of the camera to not only the license plate recognition but also the security CCTV function together and to perform two functions within the camera. This embedded type convergence camera equipped with a high resolution 4K IP camera for clear image acquisition and fast data transmission extracted license plate area by applying YOLO, a deep learning software for multi object recognition based on open source neural network algorithm and detected number and characters of the plate and verified the detection accuracy and recognition accuracy and confirmed that this camera can perform CCTV security function and vehicle number plate recognition function successfully.

Student-Centered Discrete Mathematics Class with Cyber Lab (학생중심의 대학 이산수학 강의 운영사례)

  • Lee, Sang-Gu;Lee, Jae Hwa
    • Communications of Mathematical Education
    • /
    • v.33 no.1
    • /
    • pp.1-19
    • /
    • 2019
  • This study deals with the case of student-centered discrete mathematics class with cyber lab. First, we provided lecture notes and cyber labs we developed. In particular, discrete mathematics is a course that covers the principles of algorithms. The purpose of this study is to provide students with basic mathematics, aiming to actively participate in the learning process, to improve their abilities and to reach the ultimate goal of student success with confidence. Second, based on interactions, students were able to prepare for the lectures, review, question, answer, and discussion through an usual learning management system of the school. Third, all the students generated materials through one semester, which were reported, submitted, presented and evaluated. It was possible to improve the learning effectiveness through the discussions and implementation of using some easy open source programming language and codes. Our discrete math laboratory could be practiced without any special knowledge of coding. These lecture models allow students to develop critical thinking skills while describing and presenting their learning and problem-solving processes. We share our experience and our materials including lecture note and cyber lab as well as a possible model of student-centered mathematics class that does not give too much of work load for instructors. This study shares a model that demonstrates that any professor will be able to have an individualized, customized, and creative discrete education without spending much of extra time and assistant, unlike previous research.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Speech Visualization of Korean Vowels Based on the Distances Among Acoustic Features (음성특징의 거리 개념에 기반한 한국어 모음 음성의 시각화)

  • Pok, Gouchol
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.512-520
    • /
    • 2019
  • It is quite useful to represent speeches visually for learners who study foreign languages as well as the hearing impaired who cannot directly hear speeches, and a number of researches have been presented in the literature. They remain, however, at the level of representing the characteristics of speeches using colors or showing the changing shape of lips and mouth using the animation-based representation. As a result of such approaches, those methods cannot tell the users how far their pronunciations are away from the standard ones, and moreover they make it technically difficult to develop such a system in which users can correct their pronunciation in an interactive manner. In order to address these kind of drawbacks, this paper proposes a speech visualization model based on the relative distance between the user's speech and the standard one, furthermore suggests actual implementation directions by applying the proposed model to the visualization of Korean vowels. The method extract three formants F1, F2, and F3 from speech signals and feed them into the Kohonen's SOM to map the results into 2-D screen and represent each speech as a pint on the screen. We have presented a real system implemented using the open source formant analysis software on the speech of a Korean instructor and several foreign students studying Korean language, in which the user interface was built using the Javascript for the screen display.

A Comparative Analysis of Domestic and Foreign Docker Container-Based Research Trends (국내·외 도커 컨테이너 기반 연구 동향 비교 분석)

  • Bae, Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.742-753
    • /
    • 2022
  • Cloud computing, which is rapidly growing as one of the core technologies of the 4th industrial revolution, has become the center of global IT trend change, and Docker, a container-based open source platform, is the mainstream for virtualization technology for cloud computing. Therefore, in this paper, research trends based on Docker containers were compared and analyzed, focusing on studies published from March 2013 to July 2022. As a result of the study, first, the number of papers published by year, domestic and foreign research were steadily increasing. Second, the keywords of the study, in domestic research, Docker, Docker Containers, and Containers were in the order, and in foreign research, Cloud Computing, Containers, and Edge Computing were in the order. Third, in the frequency of publishing institutions to estimate research trends, the utilization was the highest in two papers of the Korean Next Generation Computer Society and the Korean Computer Accounting Society. In the overseas research, IEEE Communications Surveys & Tutorials, IEEE Access, and Computer were in the order. Fourth, in the research method, experiments 78(26.3%) and surveys 32(10.8%) were conducted in domestic research. In foreign research, experiments 128(43.1%) and surveys 59(19.9%) were conducted. In the experiment of implementation research, In domestic research, System 25(8.4%), Algorithm 24(8.1%), Performance Measurement and Improvement 16(5.4%) were in the order, In foreign research, Algorithm 37(12.5%), Performance Measurement and Improvement 17(9.1%), followed by Framework 26(8.8%). Through this, it is expected that it will be used as basic data that can lead the research direction of Docker container-based cloud computing such as research methods, research topics, research fields, and technology development.

Anaerobic Reductive Dechlorination of Tetrachloroethylene (PCE) in Two-in-series Semi-continuous Soil Columns (반연속 흐름 2단 토양 컬럼에서의 사염화 에틸렌(PCE)의 혐기성 환원탈염소화)

  • Ahn, Young-Ho;Choi, Jeong-Dong;Kim, Young;Kwon, Soo-Youl;Park, Hoo-Won
    • Journal of Soil and Groundwater Environment
    • /
    • v.11 no.2
    • /
    • pp.68-76
    • /
    • 2006
  • Anaerobic reductive dechlorination of tetrachloroethylene (PCE) to ethylene was investigated by performing laboratory experiments using semi-continuous flow two-in-series soil columns. The columns were packed with soils obtained from TCE-contaminated site in Korea. Site ground water containing lactate (as electron donor and/or carbon source) and PCE was pumped into the soil columns. During the first operation with a period of 50 days, injected mass ratio of lactate and PCE was 620:1 and incomplete reductive dechlorination of PCE to cis-DCE was observed in the columns. However, complete dechlorination of PCE to ethylene was observed when the mass ratio increased to 5,050:1 in the second operation, suggesting that the electron donor might be limited during the first operation period. Dechlorination rate of PCE to cis-DCE was $0.62{\sim}1.94\;{\mu}mol$ PCE/L pore volume/d and $2.76\;{\mu}mol$ cis-DCE/ L pore volume/d for that for cis-DCE to ethylene, resulting that net dechlorination rate in the system was 1.43 umol PCE/L pore volume/d. During the degradation of cis-DCE to ethylene, the concentration of hydrogen in column groundwater was $22{\sim}29\;mM$ and $10{\sim}64\;mM$ for the degradation of PCE to cis-DCE. These positive results indicate that the TCE-contaminated groundwater investigated in this study could be remediated through in-situ biological anaerobic reductive dechlorination processes.

Implementation of PersonalJave™ AWT using Light-weight Window Manager (경량 윈도우 관리기를 이용한 퍼스널자바 AWT 구현)

  • Kim, Tae-Hyoun;Kim, Kwang-Young;Kim, Hyung-Soo;Sung, Min-Young;Chang, Nae-Hyuck;Shin, Heon-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.3
    • /
    • pp.240-247
    • /
    • 2001
  • Java is a promising runtime environment for embedded systems because it has many advantages such as platform independence, high security and support for multi-threading. One of the most famous Java run-time environments, Sun's ($PersonalJave^{TM}$) is based on Truffle architecture, which enables programmers to design various GUIs easily. For this reason, it has been ported to various embedded systems such as set-top boxes and personal digital assistants(PDA's). Basically, Truffle uses heavy-weight window managers such as Microsoft vVin32 API and X-Window. However, those window managers are not adequate for embedded systems because they require a large amount of memory and disk space. To come up with the requirements of embedded systems, we adopt Microwindows as the platform graphic system for Personal] ava A WT onto Embedded Linux. Although Microwindows is a light-weight window manager, it provides as powerful API as traditional window managers. Because Microwindows does not require any support from other graphics systems, it can be easily ported to various platforms. In addition, it is an open source code software. Therefore, we can easily modify and extend it as needed. In this paper, we implement Personal]ava A WT using Microwindows on embedded Linux and prove the efficiency of our approach.

  • PDF