• Title/Summary/Keyword: Software Implementation

Search Result 2,902, Processing Time 0.039 seconds

Implementation and Validation of EtherCAT Support in Integrated Development Environment for Synchronized Motion Control Application (동기 모션 제어 응용을 위한 통합개발환경의 EtherCAT 지원 기능 구현 및 검증)

  • Lee, Jongbo;Kim, Chaerin;Kim, Ikhwan;Kim, Youngdong;Kim, Taehyoun
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.2
    • /
    • pp.211-218
    • /
    • 2014
  • Recently, software-based programmable logic controller (PLC) systems, which are implemented in standard PLC languages on general hardware, are gaining popularity because they overcome the limitations of classical hardware PLC systems. Another noticeable trend is that the use of integrated development environment (IDE) is becoming important. IDEs can help developers to easily manage the growing complexity of modern control systems. Furthermore, industrial Ethernet, e.g. EtherCAT, is becoming widely accepted as a replacement for conventional fieldbuses in the distributed control domain because it offers favorable features such as short transmission delay, high bandwidth, and low cost. In this paper, we implemented the extension of open source IDE, called Beremiz, for developing EtherCAT-based real-time, synchronized motion control applications. We validated the EtherCAT system management features and the real-time responsiveness of the control function by using commercial EtherCAT drives and evaluation boards.

Development of Pre-Service and In-Service Information Management System (iSIMS) (원전 가동전/중 검사정보관리 시스템 개발)

  • Yoo, H.J.;Choi, S.N.;Kim, H.N.;Kim, Y.H.;Yang, S.H.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.4
    • /
    • pp.390-395
    • /
    • 2004
  • The iSTMS is a web-based integrated information system supporting Pre-Service and In-Service Inspection(PSI/ISI) processes for the nuclear power plants of KHNP(Korea Hydro & Nuclear Power Co. Ltd.). The system provides a full spectrum coverage of the inspection processes from the planning stage to the final report of examination in accordance with applicable codes, standards, and regulatory requirements. The major functions of the system includes the inspection planning, examination, reporting, project control and status reporting, resource management as well as objects search and navigation. The system also provides two dimensional or three dimensional visualization interface to identify the location and geometry of components and weld areas subject to examination in collaboration with database applications. The iSIMS is implemented with commercial software packages such as database management system, 2-D and 3-D visualization tool, etc., which provide open, updated and verified foundations. This paper describes the key functions and the technologies for the implementation of the iSIMS.

A Implementation of User Exercise Motion Recognition System Using Smart-Phone (스마트폰을 이용한 사용자 운동 모션 인식 시스템 구현)

  • Kwon, Seung-Hyun;Choi, Yue-Soon;Lim, Soon-Ja;Joung, Suck-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.396-402
    • /
    • 2016
  • Recently, as the performance of smart phones has advanced and their distribution has increased, various functions in existing devices are accumulated. In particular, functions in smart devices have matured through improvement of diverse sensors. Various applications with the development of smart phones get fleshed out. As a result, services from applications promoting physical activity in users have gotten attention from the public. However, these services are about diet alone, and because these have no exercise motion recognition capability to detect movement in the correct position, the user has difficulty obtaining the benefits of exercise. In this paper, we develop exercise motion-recognition software that can sense the user's motion using a sensor built into a smart phone. In addition, we implement a system to offer exercise with friends who are connected via web server. The exercise motion recognition utilizes a Kalman filter algorithm to correct the user's motion data, and compared to data that exist in sampling, determines whether the user moves in the correct position by using a DTW algorithm.

A Design of Mobile e-Book Viewer interface for the Reading Disabled People (독서장애인용 모바일 전자책뷰어 인터페이스 설계)

  • Lee, KyungHee;Kim, TaeEun;Lee, Jongwoo;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.1
    • /
    • pp.100-107
    • /
    • 2013
  • As the eBook market grows fast recently, various eBook viewer solutions such as hardware viewers and software readers came out to the market. We can, however, hardly find mobile eBook interfaces for the reading disabled people who have difficulties in reading for their visual impairment or learning disabilities, or dyslexia. An eBook viewer interfaces for the reading disabled people should be carefully and distinctively designed because the reading disabled people cannot use normal versions of eBook viewer. In this paper, we suggest a eBook viewer interface model to make the reading disabled people read eBooks easily. Depending on the type of the reading disabled people: the full blind, the almost blind, the just learning disabled, our model provides an adaptive interface to make them read eBooks effectively. In addition, unlike the existing simple audio books, we also support annotation systems to make the reading disabled people interact with eBook viewer. To show the effectiveness of our model, we implemented an eBook viewer prototype on an android-based mobile device. We are sure that our model and implementation can make the reading disabled people, who is 10% of all the domestic people, read eBooks effectively.

Design and Implementation of a Protocol for Interworking Open Web Application Store (개방형 웹 애플리케이션 스토어 연동을 위한 프로토콜의 설계 및 구현)

  • Baek, Jihun;Kim, Jihun;Nam, Yongwoo;Lee, HyungUk;Park, Sangwon;Jeon, Jonghong;Lee, Seungyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.10
    • /
    • pp.669-678
    • /
    • 2013
  • Recently, because the portable devices became popular, it is easily to see that each person carries more than just one portable device and the use of the smartphone stretches as time goes by. After the smartphone has propagated rapidly, the total usage of the smartphone applications has also increased. But still, each application store has a different platform to develop and to apply an application. The application store is divided into two big markets, the Android and the Apple. So the developers have to develop their application by using these two different platforms. Developing into two different platforms almost makes a double development cost. And for the other platforms, the weakness is, which still have a small market breadth like Bada is not about the cost, but about drawing the proper developers for the given platform application development. The web application is rising up as the solution to solve these problems, reducing the cost and time in developing applications for every platform. For web applications don't need to make a vassal relationship with application markets platform. Which makes it possible for an application to operate properly in every portable devices and reduces the time and cost in developing. Therefore, all of the application markets could be united into one big market through a protocol which will connect each web applications market. But, still there is no standard for the web application store and no current web application store is possible to interlock with other web application stores. In this paper, we are trying to suggest a protocol by developing a prototype and prove that this protocol can supplement the current weakness.

Implementation of GLCM/GLDV-based Texture Algorithm and Its Application to High Resolution Imagery Analysis (GLCM/GLDV 기반 Texture 알고리즘 구현과 고 해상도 영상분석 적용)

  • Lee Kiwon;Jeon So-Hee;Kwon Byung-Doo
    • Korean Journal of Remote Sensing
    • /
    • v.21 no.2
    • /
    • pp.121-133
    • /
    • 2005
  • Texture imaging, which means texture image creation by co-occurrence relation, has been known as one of the useful image analysis methodologies. For this purpose, most commercial remote sensing software provides texture analysis function named GLCM (Grey Level Co-occurrence Matrix). In this study, texture-imaging program based on GLCM algorithm is newly implemented. As well, texture imaging modules for GLDV (Grey Level Difference Vector) are contained in this program. As for GLCM/GLDV Texture imaging parameters, it composed of six types of second order texture functions such as Homogeneity, Dissimilarity, Energy, Entropy, Angular Second Moment, and Contrast. As for co-occurrence directionality in GLCM/GLDV, two direction modes such as Omni-mode and Circular mode newly implemented in this program are provided with basic eight-direction mode. Omni-mode is to compute all direction to avoid directionality complexity in the practical level, and circular direction is to compute texture parameters by circular direction surrounding a target pixel in a kernel. At the second phase of this study, some case studies with artificial image and actual satellite imagery are carried out to analyze texture images in different parameters and modes by correlation matrix analysis. It is concluded that selection of texture parameters and modes is the critical issues in an application based on texture image fusion.

Implementation of Efficient Container Number Recognition System at Automatic Transfer Crane in Container Terminal Yard (항만 야드 자동화크레인(ATC)에서 효율적인 컨테이너번호 인식시스템 개발)

  • Hong, Dong-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.57-65
    • /
    • 2010
  • This paper describes the method of efficient container number recognition in colored container image with number plate at ATC(Automatic Transfer Crane) in container terminal yard. At the Sinseondae terminal gate in Busan, the container number recognition system is installed by "intelligent port-logistics system technology development", that is government research and development project. It is the method that it sets up the tunnel structure inside camera on the gate and it recognizes the container number in order to recognize the export container cargo automatically. However, as the automation equipment is introduced to the container terminal and the unmanned of a task is gradually accomplished, the container number recognition system for the confirmation of the object of work is required at ATC in container terminal yard. Therefore, the container number recognition system fitted for it is necessary for ATC in container terminal yard in which there are many intrusive of the character recognition through image including a sunlight, rain, snow, shadow, and etc. unlike the gate. In this paper, hardware components of the camera, illumination, and sensor lamp were altered and software elements of an algorithm were changed. that is, the difference of the brightness of the surrounding environment, and etc. were regulated for recognize a container number. Through this, a shadow problem, and etc. that it is thickly below hung with the sunlight or the cargo equipment were solved and the recognition time was shortened and the recognition rate was raised.

Detecting Security Vulnerabilities in TypeScript Code with Static Taint Analysis (정적 오염 분석을 활용한 타입스크립트 코드의 보안 취약점 탐지)

  • Moon, Taegeun;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.2
    • /
    • pp.263-277
    • /
    • 2021
  • Taint analysis techniques are popularly used to detect web vulnerabilities originating from unverified user input data, such as Cross-Site Scripting (XSS) and SQL Injection, in web applications written in JavaScript. To detect such vulnerabilities, it would be necessary to trace variables affected by user-submitted inputs. However, because of the dynamic nature of JavaScript, it has been a challenging issue to identify those variables without running the web application code. Therefore, most existing taint analysis tools have been developed based on dynamic taint analysis, which requires the overhead of running the target application. In this paper, we propose a novel static taint analysis technique using symbol information obtained from the TypeScript (a superset of JavaScript) compiler to accurately track data flow and detect security vulnerabilities in TypeScript code. Our proposed technique allows developers to annotate variables that can contain unverified user input data, and uses the annotation information to trace variables and data affected by user input data. Since our proposed technique can seamlessly be incorporated into the TypeScript compiler, developers can find vulnerabilities during the development process, unlike existing analysis tools performed as a separate tool. To show the feasibility of the proposed method, we implemented a prototype and evaluated its performance with 8 web applications with known security vulnerabilities. We found that our prototype implementation could detect all known security vulnerabilities correctly.

An Empirical Study on the Characteristic Influences of the Rules of Origin on the Implementation of Preferential Tariffs and Trade Performance

  • Park, Se-Hyun;Pak, Myong-Sop
    • Journal of Korea Trade
    • /
    • v.25 no.8
    • /
    • pp.1-24
    • /
    • 2021
  • Purpose - This study categorizes factors that influence the utilization of preferential tariffs based on the characteristics of rules of origin (RoO) and identifies and analyzes the influence of these characteristics on the utilization of preferential tariffs and the trade performance of companies. Design/methodology - In this study, we categorized factors that have an influence on the utilization of preferential tariffs based on the characteristics of RoO and investigated and tested the influence of these characteristics on the utilization of preferential tariffs and the trade performance of companies. For empirical analysis, we categorized the characteristics of RoO into restrictiveness, complexity, and uncertainty. We then developed a research model and formulated hypotheses based on previous studies, and tested the hypotheses using statistical software-(SPSS 25.0 and AMOS 18.0.) Findings - Previous studies suggested that each characteristic of RoO is determined by unique features of a Regional Trade Agreement (RTA). This study conducted an empirical analysis on the influence of the characteristics of RoO on the utilization of preferential tariffs and trade performance. The results confirmed that, overall, the characteristics of preferential rules of origin (PRoO) are related to and influence Korean companies' utilization of preferential tariffs and trade performance. As for the degree of the influence, the characteristics were in the order of uncertainty> restrictiveness> complexity. Nevertheless, complexity turned out not to have an influence large enough to change a company's decision on the utilization of preferential tariffs. Based on these results, this study identified unique features of PRoO and related problems for Korean companies that want to utilize preferential tariffs and suggested countermeasures for their effective utilization of preferential tariffs in the future. Originality/value - Companies that want to use preferential tariffs in international trade have to satisfy PRoO. The issue of origin can be regarded as an essential part of an RTA and RoO, are a crucial criterion in using preferential tariffs. The rules are requirements to claim benefits of preferential trade agreements and are the primary reasons companies have trouble in utilizing preferential tariffs. In this sense, this study categorized the characteristics of RoO, which are a key part of an RTA, and surveyed working-level professionals in charge of international trade at Korean companies to investigate the relationship between these characteristics and the utilizations of preferential tariffs and trade performance of the companies.

Design and Implementation of Crime Prevention System Targeting Women by Using Public BigData (공공 빅데이터를 이용한 여성 대상 범죄 예방 시스템의 설계 및 구현)

  • Ko, Sung-Wook;Oh, Su-Bin;Baek, Se-In;Park, Hyeok-Ju;Park, Mee-Hwa;Lee, Kang-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.561-564
    • /
    • 2016
  • If using crime map which represents criminal section that violent crimes targeting women frequently happened, the police could prevent additional crimes by positioning themselves intensively in expected crime zones and each individual could avoid being damaged by referring information of criminal zones. In this paper, by analyzing crimes targeting women and offender information which is provided in public-opened datum portal, we suppose a system which prevents crimes that calculates locational danger and, by considering location and age group of users, provides user-customized information of danger. By crawling the criminals datum which is provided in public-opened datum portal, It collects them. About the areas which happened sexual crimes, calculating danger of crime based on statistical crime information including criminal information, residence of offenders, areas which happened sexual crimes, sentences and the number of crime, this system is able to visualize the areas which sexual crimes happened based on information of danger grade representing on user's location. The score of danger calculated in location unit can provide criminal information according to location and ages of users by interacting GIS.

  • PDF