• Title/Summary/Keyword: Platform Use

Search Result 1,899, Processing Time 0.039 seconds

A Study on the Geometric Correction Accuracy Evaluation of Satellite Images Using Daum Map API (Daum Map API를 이용한 위성영상의 기하보정 정확도 평가)

  • Lee, Seong-Geun;Lee, Ho-Jin;Kim, Tae-Geun;Cho, Gi-Sung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.183-196
    • /
    • 2016
  • Ground control points are needed for precision geometric correction of satellite images, and the coordinates of a high-quality ground control point can be obtained from the GPS measurement. However, considering the GPS measurement requires an excessive amount o f t ime a nd e fforts, there is a need for coming up with an alternative solution to replace it. Therefore, we examined the possibility of replacing the existing GPS measurement with coordinates available at online maps to acquire the coordinates of ground control points. To this end, we examined error amounts between the coordinates of ground control points obtained through Daum Map API, and them compared the accuracies between three types of coordinate transformation equations which were used for geometric correction of satellite images. In addition, we used the coordinate transformation equation with the highest accuracy, the coordinates of ground control point obtained through the GPS measurement and those acquired through D aum M ap A PI, and conducted geometric correction on them to compare their accuracy and evaluate their effectiveness. According to the results, the 3rd order polynomial transformation equation showed the highest accuracy among three types of coordinates transformation equations. In the case of using mid-resolution satellite images such as those taken by Landsat-8, it seems that it is possible to use geometrically corrected images that have been obtained after acquiring the coordinates of ground control points through Daum Map API.

User Innovation Empowerment in Open Market Systems: A Case Study on Participatory Game Communities (오픈마켓 시스템에서의 사용자 혁신 위임: 참여적 게임 커뮤니티에 대한 사례연구)

  • Kwon, Hee-Jung;Kim, Jin-Woo
    • Information Systems Review
    • /
    • v.12 no.3
    • /
    • pp.75-88
    • /
    • 2010
  • Business models in open market systems targeting smart phone users are determined by several important factors. First, by providing developers efficient technical platforms, it contains a setting for developers to learn, apply and improve the skills relating to the product category easily while they stay beyond a corporate boundary. Second, by the first condition, a huge population of talented developers becomes to join a specific open market where will invite more customers to use their applications. Hence it will attract more and more developer participants who will finally give a rise to a persistent market growth. Third, the evaluation system between platform providers and application producers, and one between application producers and application users may underlie the trust relationships between them. The research conducted a multiple embedded case study to test the success factors of open market based business models. It focused on smart phone game communities that have installed user evaluation, and feedback systems. The user innovation empowerment model within the social game networks has highlighted the theories on the roles and characteristics of lead users, and lead user network behaviors for future NPD participations.

Development of Forward chaining inference engine SMART-F using Rete Algorithm in the Semantic Web (차세대 웹 환경에서의 Rete Algorithm을 이용한 정방향 추론엔진 SMART - F 개발)

  • Jeong, Kyun-Beom;Hong, June-Seok;Kim, Woo-Ju;Lee, Myung-Jin;Park, Ji-Hyoung;Song, Yong-Uk
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.3
    • /
    • pp.17-29
    • /
    • 2007
  • Inference engine that performs the brain of software agent in next generation's web with various standards based on standard language of the web, XML has to understand SWRL (Semantic Web Rule Language) that is a language to express the rule in the Semantic Web. In this research, we want to develop a forward inference engine, SMART-F (SeMantic web Agent Reasoning Tools-Forward chaining inference engine) that uses SWRL as a rule express method, and OWL as a fact express method. In the traditional inference field, the Rete algorithm that improves effectiveness of forward rule inference by converting if-then rules to network structure is often used for forward inference. To apply this to the Semantic Web, we analyze the required functions for the SWRL-based forward inference, and design the forward inference algorithm that reflects required functions of next generation's Semantic Web deducted by Rete algorithm. And then, to secure each platform's independence and portability in the ubiquitous environment and overcome the gap of performance, we developed management tool of fact and rule base and forward inference engine. This is compatible with fact and rule base of SMART-B that was developed. So, this maximizes a practical use of knowledge in the next generation's Web environment.

  • PDF

A Study on the Methods of Fault Analysis to Improve Safety in U-Healthcare System for Managing Emergency Rescue for Seniors (시니어들의 응급구난 관리를 위한 U-Healthcare시스템에서 안전성 개선을 위한 결함 분석 방법에 관한 연구)

  • Kim, Gyu-A;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.170-179
    • /
    • 2014
  • Recently the U-Healthcare system has been rapidly advanced to manage emergence rescue for seniors. We can access emergency rescue systems with high quality services anytime, anywhere under ubiquitous healthcare systems. The more the various systems develop, the more software security systems become important. Therefore, the safety-critical system has been widely spread to the world by advancement of the information and communication technologies. There are a lot kind of fault analysis methods to evaluate software security systems. However due to characteristics of software that is not applied by human error, it can be prevented the enormous damages and losses from improving the safety of safety-critical system. So this paper proposes an integration method of FTA and Forward and Backward FMECA. This method has each strength of FTA and FMECA which is visual and numeric in normalization. First, by use of FTA, we can redraw FTA with Forward FMECA and Backward FMECA in consideration of occurrence, severity, detection, correctness, robustness, and security. Also according to value of NRVP at each event, we can modify FTA diagrams as shown critical paths given by severity and occurrence. Also, we propose the improved emergency rescue service platform of ubiquitous healthcare systems through identifying priorities of the criticality according to normalized risk priority values (NRPV).

A Scheme for Identifying Malicious Applications Based on API Characteristics (API 특성 정보기반 악성 애플리케이션 식별 기법)

  • Cho, Taejoo;Kim, Hyunki;Lee, Junghwan;Jung, Moongyu;Yi, Jeong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.187-196
    • /
    • 2016
  • Android applications are inherently vulnerable to a repackaging attack such that malicious codes are easily inserted into an application and then resigned by the attacker. These days, it occurs often that such private or individual information is leaked. In principle, all Android applications are composed of user defined methods and APIs. As well as accessing to resources on platform, APIs play a role as a practical functional feature, and user defined methods play a role as a feature by using APIs. In this paper we propose a scheme to analyze sensitive APIs mostly used in malicious applications in terms of how malicious applications operate and which API they use. Based on the characteristics of target APIs, we accumulate the knowledge on such APIs using a machine learning scheme based on Naive Bayes algorithm. Resulting from the learned results, we are able to provide fine-grained numeric score on the degree of vulnerabilities of mobile applications. In doing so, we expect the proposed scheme will help mobile application developers identify the security level of applications in advance.

An Efficient Kernel Introspection System using a Secure Timer on TrustZone (TrustZone의 시큐어 타이머를 이용한 효율적인 커널 검사 시스템)

  • Kim, Jinmok;Kim, Donguk;Park, Jinbum;Kim, Jihoon;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.863-872
    • /
    • 2015
  • Kernel rootkit is recognized as one of the most severe and widespread threats to corrupt the integrity of an operating system. Without an external monitor as a root of trust, it is not easy to detect kernel rootkits which can intercept and modify communications at the interfaces between operating system components. To provide such a monitor isolated from an operating system that can be compromised, most existing solutions are based on external hardware. Unlike those solutions, we develop a kernel introspection system based on the ARM TrustZone technology without incurring extra hardware cost, which can provide a secure memory space in isolation from the rest of the system. We particularly use a secure timer to implement an autonomous switch between secure and non-secure modes. To ensure integrity of reference, this system measured reference from vmlinux which is a kernel original image. In addition, the flexibility of monitoring block size can be configured for efficient kernel introspection system. The experimental results show that a secure kernel introspection system is provided without incurring any significant performance penalty (maximum 6% decrease in execution time compared with the normal operating system).

Web-based Practice Education Supporting System for Computational Chemistry (웹기반 계산화학 실습교육 지원시스템 개발)

  • Ahn, Bu-Young;Lee, Jong-Suk Ruth;Cho, Kum-Won
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.3 no.2
    • /
    • pp.18-26
    • /
    • 2011
  • Computational chemistry is one of the chemistry fields that deals with the theoretical chemistry problem using computer calculations and can be described as the chemistry lab moved on computer space. In line with recent enhancement of processing capability of computers, utilization of high performance computer cannot be overemphasized in the field of computational chemistry in performing complex calculation of huge molecular structure and simulation. While they have to use commands and consoles for high performance computer to execute complex calculation of huge molecular structure and simulation, most of students in natural science and engineering, who are not experts in computer technically, are likely to be unaware of UNIX. Under the circumstances, web-based educational support system for computational chemistry is needed to enable them to practice computational chemistry, even not knowing UNIX command. In this study, e-Chem, one of such educational support systems, is developed by using Liferay portal platform, which is a Java open source more oriented to standard and outstanding in its content management and collaboration function than other web portals. By using this system, even students who are not familiar with computer, are expected to take part in lab classes and save time learning Unix command and also enhance the learning efficiency by using familiar interface.

  • PDF

Exploring the Possibility of Independent Film Development according to the Current Status of the Domestic OTT Market Centered on Netflix (넷플릭스를 중심으로한 국내 OTT 시장의 현황에 따른 독립영화 발전 가능성 모색)

  • Lee, Jeong-Hyeon;Jeong, Jae-Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.375-385
    • /
    • 2020
  • This paper attempts to understand the reality of Netflix on the Korean film distribution market environment, and to verify the possibility of developing domestic content centered on independent films in the OTT market, led by Netflix. The research significance of finding the way for Korean diverse films and independent films that cannot be provided with investment and distribution opportunities in various Korean Wave contents will be studied, and the characteristics of Netflix in the Korean film market will be explored. Netflix disseminates Korean contents such as Korean movies and Korean dramas, contributes to the spread of the Korean Wave, and is re-adjusting the paradigm of the distribution market, raising issues that cause a virtuous cycle of profits, controversy over net usage fees, and flooding of Hollywood movies. Considering the nature of intercultural exchange, the interaction between independent film content, Netflix platform, audience, and global market will expand interactive communication opportunities. In other words, just as Netflix uses the Korean media market to make profits, Korea should also use Netflix to try to expand the global market of Korean film contents (K-Film)and maintain a cultural and economic reciprocal attitude.

Identification of damage states and damge indices of single box tunnel from inelastic seismic analysis (비탄성 지진 해석을 통한 박스 터널의 손상 상태 및 손상 지수 규명)

  • Park, Duhee;Lee, Tae-Hyung;Kim, Hansup;Park, Jeong-Seon
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.18 no.2
    • /
    • pp.119-128
    • /
    • 2016
  • In a performance-based design, the structural safety is estimated from pre-defined damage states and corresponding damage indices. Both damage states and damage indices are well defined for above-ground structures, but very limited studies have been performed on underground structures. In this study, we define the damage states and damage indices of a cut-and-cover box tunnel which is one of typical structures used in metro systems, under a seismic excitation from a series of inelastic frame analyses. Three damage states are defined in terms of the number of plastic hinges that develop within the structure. The damage index is defined as the ratio of the elastic moment to the yield moment. Through use of the proposed index, the inelastic behavior and failure mechanism of box tunnels can be simulated and predicted through elastic analysis. In addition, the damage indices are linked to free-field shear strains. Because the free-field shear strain can be easily calculated from a 1D site response analysis, the proposed method can be readily used in practice. Further studies are needed to determine the range of shear strains and associated uncertainties for various types of tunnels and site profiles. However, the inter-linked platform of damage state - damage index - shear wave velocity - shear strain provides a novel approach for estimating the inelastic response of tunnels, and can be widely used in practice for seismic designs.

An Implementation of Large Scale JMS(Java Message System) for Transmission Time Minimization (JMS 메시지 송수신 시간의 최소화를 위한 대용량 메시지 송수신 플랫폼 구현)

  • Cho, Poong-Youn;Park, Jae-Won;Choi, Jae-Hyun;Lee, Nam-Yong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.1
    • /
    • pp.29-37
    • /
    • 2009
  • Recently, message based data transmission plays an important role in modem computing systems. Especially JMS(Java Message Service) is one of the most popular messaging platform. However, because of its characteristics for maintaining reliability, if we want to use it for transmission of large scale messages in a distributed Internet environment by using a WAN connection which may not be robust enough, we need to employ a different method to minimize total transmission time of messages. We found the fact that the total time of message transmission heavily depends on size of a message. In order to achieve the ideal size of a message, we develope a novel mechanism and a system which finds the ideal size of a message and automatical1y control JMS applications for minimizing transmission time. Finally, we test the proposed mechanism and system using real-data in order to prove advantages and compared with the naive mechanism. As a conclusion, we showed that our proposed mechanism and system provide an effective way to reduce transmission time of large scale messages in distributed environment.