• Title/Summary/Keyword: Software system

Search Result 12,098, Processing Time 0.044 seconds

An Experimental Study on Blasting Collapse Behavior of Asymmetry Structure with High Aspect Ratio (고종횡비 비대칭 구조물의 발파붕괴 거동에 관한 연구)

  • Song, Young-Suk;Jung, Min-Su;Jung, Dong-Wol;Hur, Won-Ho
    • Explosives and Blasting
    • /
    • v.31 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • In blasting demolition, a method would be chosen among many depends on shape and system of a structure and its surround. To demolish using explosives a structure, which is asymmetric and with high aspect ratio, pre-weakening, explosive locations, detonating delay, and surround conditions are needed to be considered in front to design blasting demolition plan. In this study, to over turn asymmetric and high aspect ratio structure in safe, a simulation using a software named Extreme Loadings for Structures, ELS, had performed. In results, it is achieved optimized pre-weakening shapes and locations, which prevent kick back motion of the structure when it collapse, by analyzing moment distribution caused by pre-weakening. And of structural collapse and by minimizing asymmetric structure's torsional moment. Also, after the demolition, simulation results are also compared with actual collapse behavior. In results, it is confirmed the accuracy of collapse behaviour simulation results, and in blasting demolition, kick back motion can be controled by adjusting pre-weakening shape and location, and the torsional moment of an asymmetric structure also can be solved by optimizing detonation locations and its time intervals.

An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering (Word2Vec과 가속화 계층적 밀집도 기반 클러스터링을 활용한 효율적 봇넷 탐지 기법)

  • Lee, Taeil;Kim, Kwanhyun;Lee, Jihyun;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.11-20
    • /
    • 2019
  • Numerous enterprises, organizations and individual users are exposed to large DDoS (Distributed Denial of Service) attacks. DDoS attacks are performed through a BotNet, which is composed of a number of computers infected with a malware, e.g., zombie PCs and a special computer that controls the zombie PCs within a hierarchical chain of a command system. In order to detect a malware, a malware detection software or a vaccine program must identify the malware signature through an in-depth analysis, and these signatures need to be updated in priori. This is time consuming and costly. In this paper, we propose a botnet detection scheme that does not require a periodic signature update using an artificial neural network model. The proposed scheme exploits Word2Vec and accelerated hierarchical density-based clustering. Botnet detection performance of the proposed method was evaluated using the CTU-13 dataset. The experimental result shows that the detection rate is 99.9%, which outperforms the conventional method.

Web Search Behavior Analysis Based on the Self-bundling Query Method (웹검색 행태 연구 - 사용자가 스스로 쿼리를 뭉치는 방법으로 -)

  • Lee, Joong-Seek
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.2
    • /
    • pp.209-228
    • /
    • 2011
  • Web search behavior has evolved. People now search using many diverse information devices in various situations. To monitor these scattered and shifting search patterns, an improved way of learning and analysis are needed. Traditional web search studies relied on the server transaction logs and single query instance analysis. Since people use multiple smart devices and their searching occurs intermittently through a day, a bundled query research could look at the whole context as well as penetrating search needs. To observe and analyze bundled queries, we developed a proprietary research software set including a log catcher, query bundling tool, and bundle monitoring tool. In this system, users' daily search logs are sent to our analytic server, every night the users need to log on our bundling tool to package his/her queries, a built in web survey collects additional data, and our researcher performs deep interviews on a weekly basis. Out of 90 participants in the study, it was found that a normal user generates on average 4.75 query bundles a day, and each bundle contains 2.75 queries. Query bundles were categorized by; Query refinement vs. Topic refinement and 9 different sub-categories.

Analysis of Disaster Safety Situation Classification Algorithm Based on Natural Language Processing Using 119 Calls Data (119 신고 데이터를 이용한 자연어처리 기반 재난안전 상황 분류 알고리즘 분석)

  • Kwon, Su-Jeong;Kang, Yun-Hee;Lee, Yong-Hak;Lee, Min-Ho;Park, Seung-Ho;Kang, Myung-Ju
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.10
    • /
    • pp.317-322
    • /
    • 2020
  • Due to the development of artificial intelligence, it is used as a disaster response support system in the field of disaster. Disasters can occur anywhere, anytime. In the event of a disaster, there are four types of reports: fire, rescue, emergency, and other call. Disaster response according to the 119 call also responds differently depending on the type and situation. In this paper, 1280 data set of 119 calls were tested with 3 classes of SVM, NB, k-NN, DT, SGD, and RF situation classification algorithms using a training data set. Classification performance showed the highest performance of 92% and minimum of 77%. In the future, it is necessary to secure an effective data set by disaster in various fields to study disaster response.

Development of Transmission Algorithm of VLBI Observation Data and Transmission Experiment Between Server and RVDB (VLBI 관측 데이터의 전송 알고리즘 개발과 서버와 RVDB 사이의 전송 시험)

  • Yeom, Jae-Hwan;Oh, Se-Jin;Roh, Duk-Gyoo;Jung, Dong-Kyu;Oh, Chung-Sik;Yun, Youngjoo;Kim, Hyo-Ryoung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.4
    • /
    • pp.183-191
    • /
    • 2014
  • This paper describes the development of the observational data transmission algorithm for high-speed network in radio astronomy. For the preprocessing of VLBI data observed by radio telescope, data transmission algorithm uses the VDIF specification, VDIFCP, and UDP protocol by transferring VLBI data stored in a massive storage server with one-to-one correspondence between the server and the RVDB of Daejeon correlator. A transmission method is proposed, which reads the recorded data in Mark5B VSI format and trnasmits 2048 Mbps VLBI data by software through UDP packet transmission, while RVDB system is waiting for the transmitting data from the server. In order to check the effectiveness of the proposed method, the data transmission between the massive storage server and RVDB is conducted and the transmitted data is correlated by Daejeon correlator for the accurate comparison concerning the data before and after. The transmitted data is shown to be completely the same as the original data without any data transmission loss. Henceforth, the developed data transmission algorithm in this research is expected to be applied effectively as e-VLBI for KaVA network.

High-Power Cartesian Feedback Transmitter Design for 860 MHz Band (860 MHz 대역 고출력 Cartesian 피드백 송신기 설계)

  • Kim, Min-Su;Cho, Han-Jin;Ahn, Gun-Hyun;Jung, Sung-Chan;Park, Hyun-Chul;Van, Ju-Ho;Jeong, Jong-Hyuk;Kwon, Sung-Wook;Lim, Kyung-Hoon;Song, Sung-Chan;Klm, Jae-Young;Yang, Youn-Goo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.2 s.117
    • /
    • pp.183-190
    • /
    • 2007
  • This paper presents the design of 860 MHz band transmitter for improving power amplifier's linearity using Cartesian feedback method. For eliminating the effects of gain, phase mis-match, and DC offset, we estimate the property variations using ADS software. The implemented Cartesian feedback transmitter exhibits IMD3 of -54 dBc at an output power of 43 dBm and this result shows that the linearity is improved for 22.4 dB, compared with the test of the power amplifier without Cartesian feedback system. Thus, we verify that the proposed Cartesian feedback transmitter can be applied to narrow-band transmitter systems.

An Error Analysis of the 3D Automatic Face Recognition Apparatus (3D-AFRA) Hardware (3차원 안면자동분석 사상체질진단기의 Hardware 오차분석)

  • Kwak, Chang-Kyu;Seok, Jae-Hwa;Song, Jung-Hoon;Kim, Hyun-Jin;Hwang, Min-Woo;Yoo, Jung-Hee;Kho, Byung-Hee;Kim, Jong-Won;Lee, Eui-Ju
    • Journal of Sasang Constitutional Medicine
    • /
    • v.19 no.2
    • /
    • pp.22-29
    • /
    • 2007
  • 1. Objectives Sasang Contitutional Medicine, a part of the traditional Korean medical lore, treats illness through a constitutional typing system that categorizespeople into four constitutional types. A few of the important criteria for differentiating the constitutional types are external appearances, inner state of mind, and pathological patterns. We had been developing a 3D Automatic Face Recognition Apparatus (3D-AFRA) in order to evaluate the external appearances with more objectivity. This apparatus provides a 3D image and numerical data on facial configuration, and this study aims to evaluate the mechanical accuracy of the 3D-AFRA hardware. 2. Methods Several objects of different shapes (cube, cylinder, cone, pyramid) were each scanned 10 times using the 3D Automatic Face Recognition Apparatus (3D-AFRA). The results were then compared and analyzed with data retrieved through a laser scanner known for its high accuracy. The error rates were analyzed for each grid point of facial contour scanned with Rapidform2006 (Rapidform2006 is a 3D scanning software that collects grid point data for contours of various products and products and product parts through 3D scanners and other 3D measuring devices; the grid point data thusly acquired is then used to reconstruct highly precise polygon and curvature models). 3. Results and Conclusions The average error rate was 0.22mm for the cube, 0.22mm for the cylinder, 0.125mm for the cone, and 0.172mm for the pyramid. The visual data comparing error rates for measurement figures retrieved with Rapidform2006 is shown in $Fig.3{\sim}Fig.6$. Blue tendency indicates smaller error rates, while red indicates greater error rates The protruding corners of the cube display red, indicating greater error rates. The cylinder shows greater error rates on the edges. The pyramid displays greater error rates on the base surface and around the vertex. The cone also shows greater error around the protruding edge.

  • PDF

A Study on Strategic Approach to Expand Korean e-Government Export (한국 전자정부 해외진출 확대를 위한 전략적 접근방향에 관한 연구)

  • Lee, Chae-Eon;Choi, Yong Lak;Shin, Yongtae
    • Journal of Service Research and Studies
    • /
    • v.6 no.1
    • /
    • pp.1-15
    • /
    • 2016
  • The purpose of this study is to suggest strategic approach to expand Korean e-government export. Korean e-government was evaluated as a top level by UN electronic government survey 2014. However its export is very limited. This study reviews the literature related to e-government, and analyze existing Korean e-government export. The results of this analysis are as follows: lack of a law related e-government export, decentralized organizations, insufficient export process, lack of e-government solution for sale, limited funds, deficiency of cooperation between large and small enterprises. This study suggests a strategic approach such as to clarify the purpose of e-government export, to decide government or civilian-oriented export, to establish driving strategy, to improve and develop e-government export related areas. There are many ways for improvement and development of e-government export as follows: to enact a basic law or to revise the e-government law, to integrate functions of separated organizations and establish control tower, to improve export process, to build information sharing system, to develop standardized solution module, and to expand fund to support. The author expects that this paper will contribute to enhance Korean e-government export.

A Study on Implications of the naval Strategy in West Germany and Future Direction of Korean Navy (냉전기 서독해군 전략의 시사점과 향후 대한민국 해군의 방향성에 관한 연구)

  • Shin, Hong-Jung
    • Strategy21
    • /
    • s.46
    • /
    • pp.159-204
    • /
    • 2020
  • This study is written to bring the proposal forward for the direction of south korean naval force. The political situation and the circumstance of the world, especially in the area of Pacific Ocean, are changing very rapidly. North Korea has been always the conventional existing intimidator for South Korea since the 6·25-War. Additionally, the strengthening movements of the national defense, which is easily noticed from China and Russia, is also an other part of intimidating countries against South Korea. Those three mentioned countries are continually developing the asymmetrical warfare systems, for example a strategic nuclear weapon. Since the Obama Administration, the Asia-Pacific Rebalancing-Strategy has been changed as an East Asian foreign policy. Nowadays, Trump Administration renamed the 'United States Pacific-Command' to 'United States Indo-Pacific Command'. The purpose of this is not only letting India to participate in american alliance, but also reducing an economic burden, which is often mentioned in USA. West Germany was located in the very similar geopolitical position during the Cold War just like South Korea these days. And that's why the strategy of West German Navy is worthy of notice for south korean naval force to decide its suitable strategy. Most of all, the two most important things to refer to this study are the plan to expand naval air force and the realistic political stand for us to take it. In conclusion, I laid an emphasis on maintenance of 'green-water-navy'. instead of selecting the strategy as a 'blue-water-navy'. The reason I would like to say, is that south korean navy is not available to hold the unnecessary war potential, just like Aircraft-Carrier. However, this is not meaning to let the expansion of naval force carelessly. We must search the best solution in order to maintain the firm peace within the situation. To fulfill this concept, it is mostly very important to maintain the stream of laying down a keel of destroyers, submarines and air-defense-missile, as well as the hight-tech software system, taking a survey of 4th industrial revolution. Research and development for the best solution of future aircraft by south korean navy is likewise necessary. Besides, we must also set the international diplomatic flexibly. As well as maintaining the relationship with US Forces, it is also very important to improve the relationship with other potential allied nation.

Dynamic Block Reassignment for Load Balancing of Block Centric Graph Processing Systems (블록 중심 그래프 처리 시스템의 부하 분산을 위한 동적 블록 재배치 기법)

  • Kim, Yewon;Bae, Minho;Oh, Sangyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.5
    • /
    • pp.177-188
    • /
    • 2018
  • The scale of graph data has been increased rapidly because of the growth of mobile Internet applications and the proliferation of social network services. This brings upon the imminent necessity of efficient distributed and parallel graph processing approach since the size of these large-scale graphs are easily over a capacity of a single machine. Currently, there are two popular parallel graph processing approaches, vertex-centric graph processing and block centric processing. While a vertex-centric graph processing approach can easily be applied to the parallel processing system, a block-centric graph processing approach is proposed to compensate the drawbacks of the vertex-centric approach. In these systems, the initial quality of graph partition affects to the overall performance significantly. However, it is a very difficult problem to divide the graph into optimal states at the initial phase. Thus, several dynamic load balancing techniques have been studied that suggest the progressive partitioning during the graph processing time. In this paper, we present a load balancing algorithms for the block-centric graph processing approach where most of dynamic load balancing techniques are focused on vertex-centric systems. Our proposed algorithm focus on an improvement of the graph partition quality by dynamically reassigning blocks in runtime, and suggests block split strategy for escaping local optimum solution.