• Title/Summary/Keyword: Software Tracing

Search Result 111, Processing Time 0.021 seconds

Interactive analysis tools for the wide-angle seismic data for crustal structure study (Technical Report) (지각 구조 연구에서 광각 탄성파 자료를 위한 대화식 분석 방법들)

  • Fujie, Gou;Kasahara, Junzo;Murase, Kei;Mochizuki, Kimihiro;Kaneda, Yoshiyuki
    • Geophysics and Geophysical Exploration
    • /
    • v.11 no.1
    • /
    • pp.26-33
    • /
    • 2008
  • The analysis of wide-angle seismic reflection and refraction data plays an important role in lithospheric-scale crustal structure study. However, it is extremely difficult to develop an appropriate velocity structure model directly from the observed data, and we have to improve the structure model step by step, because the crustal structure analysis is an intrinsically non-linear problem. There are several subjective processes in wide-angle crustal structure modelling, such as phase identification and trial-and-error forward modelling. Because these subjective processes in wide-angle data analysis reduce the uniqueness and credibility of the resultant models, it is important to reduce subjectivity in the analysis procedure. From this point of view, we describe two software tools, PASTEUP and MODELING, to be used for developing crustal structure models. PASTEUP is an interactive application that facilitates the plotting of record sections, analysis of wide-angle seismic data, and picking of phases. PASTEUP is equipped with various filters and analysis functions to enhance signal-to-noise ratio and to help phase identification. MODELING is an interactive application for editing velocity models, and ray-tracing. Synthetic traveltimes computed by the MODELING application can be directly compared with the observed waveforms in the PASTEUP application. This reduces subjectivity in crustal structure modelling because traveltime picking, which is one of the most subjective process in the crustal structure analysis, is not required. MODELING can convert an editable layered structure model into two-way traveltimes which can be compared with time-sections of Multi Channel Seismic (MCS) reflection data. Direct comparison between the structure model of wide-angle data with the reflection data will give the model more credibility. In addition, both PASTEUP and MODELING are efficient tools for handling a large dataset. These software tools help us develop more plausible lithospheric-scale structure models using wide-angle seismic data.

Tracing the Development and Spread Patterns of OSS using the Method of Netnography - The Case of JavaScript Frameworks - (네트노그라피를 이용한 공개 소프트웨어의 개발 및 확산 패턴 분석에 관한 연구 - 자바스크립트 프레임워크 사례를 중심으로 -)

  • Kang, Heesuk;Yoon, Inhwan;Lee, Heesan
    • Management & Information Systems Review
    • /
    • v.36 no.3
    • /
    • pp.131-150
    • /
    • 2017
  • The purpose of this study is to observe the spread pattern of open source software (OSS) while establishing relations with surrounding actors during its operation period. In order to investigate the change pattern of participants in the OSS, we use a netnography on the basis of online data, which can trace the change patterns of the OSS depending on the passage of time. For this, the cases of three OSSs (e.g. jQuery, MooTools, and YUI), which are JavaScript frameworks, were compared, and the corresponding data were collected from the open application programming interface (API) of GitHub as well as blog and web searches. This research utilizes the translation process of the actor-network theory to categorize the stages of the change patterns on the OSS translation process. In the project commencement stage, we identified the type of three different OSS-related actors and defined associated relationships among them. The period, when a master commences a project at first, is refined through the course for the maintenance of source codes with persons concerned (i.e. project growth stage). Thereafter, the period when the users have gone through the observation and learning period by being exposed to promotion activities and codes usage respectively, and becoming to active participants, is regarded as the 'leap of participants' stage. Our results emphasize the importance of promotion processes in participants' selection of the OSS for participation and confirm the crowding-out effect that the rapid speed of OSS development retarded the emergence of participants.

  • PDF

A Robustness Test Method and Test Framework for the Services Composition in the Service Oriented Architecture (SOA에서 서비스 조합의 강건성 테스트 방법 및 테스트 프레임워크)

  • Kuk, Seung-Hak;Kim, Hyeon-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.10
    • /
    • pp.800-815
    • /
    • 2009
  • Recently, Web services based service-oriented architecture is widely used to integrate effectively various applications distributed on the networks. In the service-oriented architecture BPEL as a standard modeling language for the business processes provides the way to integrate various services provided by applications. Over the past few years, some types of studies have been made on testing compatibility of services and on discriminating and tracing of the business processes in the services composition. Now a lot of studies about the services composition with BPEL are going on. However there were few efforts to solve the problems caused by the services composition. Especially, there is no effort to evaluate whether a composite service is reliable and whether it is robust against to exceptional situations. In this paper, we suggest a test framework and a testing method for robustness of the composite service written in WS-BPEL. For this, firstly we extract some information from the BPEL process and the participant services. Next, with the extracted information we construct the virtual testing environment that generates various faults and exceptional cases which may be raised within the real services. Finally the testing work for robustness of a composite service is performed on the test framework.

Improved Simple Boundary Following Algorithm (개선된 간단한 경계선 추적자 알고리즘)

  • Cheong, Cheol-Ho;Han, Tack-Don
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.4
    • /
    • pp.427-439
    • /
    • 2006
  • The SBF (Simple Boundary Follower) is a boundary-following algorithm, and is used mainly for image recognition and presentation. The SBF is very popular because of its simplicity and efficiency in tracing the boundary of an object from an acquired binary image; however, it does have two drawbacks. First, the SBF cannot consistently process inner or inner-outer corners according to the follower's position and direction. Second, the SBF requires movement operations for the non-boundary pixels that are connected to boundary pixels. The MSBF (Modified Simple Boundary Follower) has a diagonal detour step for preventing inner-outer corner inconsistency, but is still inconsistent with inner-corners and still requires extra movement operations on non-boundary pixels. In this paper, we propose the ISBF (Improved Simple Boundary Follower), which solves the inconsistencies and reduces the extra operations. In addition, we have classified the tour maps by paths from a current boundary pixel to the next boundary pixel and have analyzed SBF, MSBF, and ISBF. We have determined that the ISBF has no inconsistency issues and reduces the overall number of operations.

Stray Light Analysis of a Compact Imaging Spectrometer for a Microsatellite STSAT-3 (과학기술위성3호 부탑재체 소형영상분광기 미광 해석)

  • Lee, Jin Ah;Lee, Jun Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.23 no.4
    • /
    • pp.167-171
    • /
    • 2012
  • This paper reports on the stray light analysis results of a compact imaging spectrometer (COMIS) for a microsatellite STSAT-3. COMIS images Earth's surface and atmosphere with ground sampling distances of 27 m at the 18~62 spectral bands (0.4 ~ 1.05 ${\mu}m$) for the nadir looking at an altitude of 700 km. COMIS has an imaging telescope and an imaging spectrometer box into which three electronics PCBs are embedded. The telescope images a $27m{\times}28km$ area of Earth surface onto a slit of dimensions $11.8{\mu}m{\times}12.1mm$. This corresponds to a ground sampling distance of 27 m and a swath width of 28 km for nadir looking posture at an altitude of 700 km. Then the optics relays and disperses the slit image onto the detector thereby producing a monochrome image of the entrance slit formed on each row of detector elements. The spectrum of each point in the row is imaged along a detector column. The optical mounts and housing structures are designed in order to prevent stray light from arriving onto the image and so deteriorating the signal to noise ratio (SNR). The stray light analysis, performed by a non-sequential ray tracing software (LightTools) with three dimensional housing and lens modeling, confirms that the ghost and stray light arriving at the detector plane has the relative intensity of ${\sim}10^{-5}$ and furthermore it locates outside the concerned image size i.e. the field of view of the optics.

Semantic Representation and Translation of Electronic Product Code(EPC) data in EPC Network (EPC 네트워크의 전자물품코드(EPC) 데이터 의미표현과 해석)

  • Park, Dae-Won;Kwon, Hyuk-Chul
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.1
    • /
    • pp.70-81
    • /
    • 2009
  • Ontology is an explicit specification of concepts and relationships between concepts in an interest domain. As considered as one of typical knowledge representation methods, ontology is applied to various studies such as information extraction, information integration, information sharing, or knowledge management. In IT based industries, ontology is applied to research on information integration and sharing in order to enhance interoperability between enterprises. In supply chains or logistics, several enterprises participate as business partners to plan movements of goods, and control goods and logistics flows. A number of researches on information integration and sharing for the effective and efficient management of logistics or supply chains have been addressed. In this paper, we address an ontology as a knowledge-base for semantic-based integration of logistics information distributed in the logistics flow. Especially, we focus on developing an ontology that enables to represent and translate semantic meaning of EPC data in the EPC Network applied logistics. We present a scenario for tracing products in logistics in order to show the value of our ontology.

Automatic Left Ventricle Segmentation by Edge Classification and Region Growing on Cardiac MRI (심장 자기공명영상의 에지 분류 및 영역 확장 기법을 통한 자동 좌심실 분할 알고리즘)

  • Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.6
    • /
    • pp.507-516
    • /
    • 2008
  • Cardiac disease is the leading cause of death in the world. Quantification of cardiac function is performed by manually calculating blood volume and ejection fraction in routine clinical practice, but it requires high computational costs. In this study, an automatic left ventricle (LV) segmentation algorithm using short-axis cine cardiac MRI is presented. We compensate coil sensitivity of magnitude images depending on coil location, classify edge information after extracting edges, and segment LV by applying region-growing segmentation. We design a weighting function for intensity signal and calculate a blood volume of LV considering partial voxel effects. Using cardiac cine SSFP of 38 subjects with Cornell University IRB approval, we compared our algorithm to manual contour tracing and MASS software. Without partial volume effects, we achieved segmentation accuracy of $3.3mL{\pm}5.8$ (standard deviation) and $3.2mL{\pm}4.3$ in diastolic and systolic phases, respectively. With partial volume effects, the accuracy was $19.1mL{\pm}8.8$ and $10.3mL{\pm}6.1$ in diastolic and systolic phases, respectively. Also in ejection fraction, the accuracy was $-1.3%{\pm}2.6$ and $-2.1%{\pm}2.4$ without and with partial volume effects, respectively. Results support that the proposed algorithm is exact and useful for clinical practice.

Optical Analysis for Designing a Planar Solar Concentrator Based on Light Guide System (광도파 원리의 평면형 태양광 집광기 설계를 위한 광학해석)

  • Han, Jong-Ho;Kim, Jong-Sun;Hwang, Chul-Jin;Yoon, Kyung-Hwan;Kang, Jeong-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.1
    • /
    • pp.9-16
    • /
    • 2012
  • Recently, an optics-based concentrator for solar concentration has been a key issue in development of photovoltaic systems. In the present study, a new, simple, easily producible planar concentrator based on a light guide system is proposed. In this device, solar light is concentrated by microprism optical patterns guiding the light, mainly through total reflection and refraction. The main design variables of the concentrator are the geometric concentration ratio ($R_c$) and the ${\Theta}_1$ and ${\Theta}_2$ of the microprism pattern. Ray tracing was simulated using commercial software, SPEOS, and the optical efficiencies of the light guide solar concentrator were predicted in each case. The predicted maximum optical efficiencies are 65.60%, 54.78%, and 46.78%, respectively, for $R_c$ values of 4, 5, and 6. The variation of the optical efficiencies according to ${\Theta}_1$, ${\Theta}_2$, and the incline angle of the incident light were predicted.

Rehabilitation of the edentulous patient with implant overdenture using CAD-CAM denture system: A case report (CAD-CAM으로 제작된 임플란트 피개의치를 이용한 무치악 환자의 보철 수복 증례)

  • Lee, Han-na;Shim, Ji-Suk;Lee, Jeong-Yol
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.4
    • /
    • pp.374-381
    • /
    • 2022
  • This case report introduces a 74-year-old male patient who visited retention deficiency of the mandibular implant overdenture, which was fabricated 20 years ago. When the existing dentures were used, the vertical dimension was reduced, the maxillary complete denture lacked lip support and retention, and the mandibular overdenture lacked clip retention due to damage to the bar attachment. After removing the damaged bar attachment, it was replaced with a ball attachment, and impressions were taken using the DENTCATM Tray and then the vertical dimension was measured. The gothic arch tracing was performed to record the centric relation. Obtained impressions were scanned and the shape of final dentures was designed using software and try-in dentures were fabricated using 3D printer. After evaluating the occlusal plane, occlusal relationship, facial shape, and pronunciation using the try-in dentures, the bite registration was recorded, and the final denture was manufactured based on this. The inner surface of the denture was adjusted and bilateral balanced occlusion was formed, and the housing was connected to the mandibular denture by a direct method. This case reports have shown satisfactory resultin recovering improved retention and esthetic outcome by increasing the vertical dimension and the lip support using CAD-CAM technique and the ball attachment.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.