• Title/Summary/Keyword: UID (Unique ID)

Search Result 3, Processing Time 0.023 seconds

Implementation of Unique ID Considering the Evolutional BOMs in Ship Outfitting Design (선박 의장 BOM의 진화를 반영하기 위한 고유 식별자 구현)

  • Kim, Seung-Hyun;Lee, Jang-Hyun;Suh, Heung-Won;Jeon, Jung-Ik;Kim, Kwang-Sik
    • Korean Journal of Computational Design and Engineering
    • /
    • v.15 no.6
    • /
    • pp.449-459
    • /
    • 2010
  • Recently, not only marine PLM (Product Lifecycle Management) system but also an effective outfitting BOM (Bill of Material) management has been attracted by many shipyards. In particular, efficient outfitting design is being one of major issues in shipyards since most of currently designed marine vessels have more complex outfitting system than ever. Furthermore, each outfitting system has huge number of parts that should be arranged based upon the procurement and installation plan. Outfitting BOMs evolve into different forms according to the product development phases during basic design; detail design; and production design. Therefore, it is very difficult to maintain a consistent BOM data during the design phases. In order to express the evolution of product structures and the information of outfitting along the ship design, we suggested UID (Unique ID) code system. The UID (Unique ID) is used in order to create the relationship within evolutional BOMs of each design stage. It utilizes as the procedure of weight calculation for procurement BOM during each design stage. Thereafter, in order to demonstrate suggested outfitting BOM management technique, we suggested a prototype. In the prototype system, suggested features of outfitting BOM are implemented.

Fast Device Discovery for Remote Device Management in Lighting Control Networks

  • Choi, Sang-Il;Lee, Sanghun;Koh, Seok-Joo;Lim, Sang-Kyu;Kim, Insu;Kang, Tae-Gyu
    • Journal of Information Processing Systems
    • /
    • v.11 no.1
    • /
    • pp.125-133
    • /
    • 2015
  • The Remote Device Management (RDM) protocol is used to manage the devices in the lighting control networks. RDM provides bi-directional communications between a controller and many lighting devices over the DMX512-A network. In RDM, using a simple binary search scheme, which is based on the 48-bit unique ID (UID) of each device, discovers the lighting devices. However, the existing binary search scheme tends to require a large delay in the device discovery process. In this paper, we propose a novel partition-based discovery scheme for fast device discovery in RDM. In the proposed scheme, all devices are divided into several partitions as per the device UID, and the controller performs device discovery for each partition by configuring a response timer that each device will use. From numerical simulations, we can see that there is an optimal number of partitions to minimize the device discovery time for a given number of devices in the proposed scheme, and also that the proposed partition-based scheme can reduce the device discovery time, as compared to the existing binary search scheme.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.