• Title/Summary/Keyword: a user form

Search Result 1,248, Processing Time 0.026 seconds

A Study on the Improvement Plan of Publishing in Library Linked Open Data (국내 도서관 링크드 오픈 데이터 구축과 발행의 개선방안 연구)

  • Lee, Sung-Sook
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.2
    • /
    • pp.145-169
    • /
    • 2020
  • The purpose of this study is to find the cause and solution of the situation where library LOD does not spread after the introduction of library LOD. Research methods include literature research, case studies, and expert interviews. The improvement plan presented in this study is that first, the library needs to avoid the redundancy of the LOD construction target and build the only and specialized data. Second, libraries need to develop LOD services that reflect user needs and implement convenient LOD interfaces. Third, libraries need to establish identification system of data and build a authority file. Fourth, libraries need to recognize the necessity of data opening and linking to librarians and users, and provide opportunities for education and publicity. Fifth, it is necessary to use LOD for integrated search and to establish an integrated platform for search of library LOD. Sixth, libraries need to strengthen cooperation for LOD issuance and utilization, and form a working-level consultative body. Seventh, the government should pursue strong policies with a continuous commitment to LOD promotion and need to continue to provide budget support.

Concurrency Control Based on Triggering Relationship for Real-Time Active Database (실시간 능동 데이터베이스에서 triggering 관계를 고려한 동시성 제어 기법)

  • 홍석희
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.10-23
    • /
    • 2001
  • Transactions in real-time active databases have the notion of activeness where transactions are generated by external effects and another transaction. In this paper, we propose the multi version concurrency control algorithm for real-time active transactions. A real-time active transaction has a timing constraint in the form of a deadline until which the user wants to complete the transaction, and is characterized by triggering relationships which mean that association between a transaction that triggers the execution of another transaction and the triggered transaction. The triggering relationship is an important factor to resolve data conflicts among real-time active transactions. The proposed concurrency control mechanism resolves data conflicts by considering triggering relationships between conflicting transactions as well as priorities and precedence relationships. The conflict resolution mechanism considers association types of the triggering relationship such as abort and commit dependency, and then resolves data conflicts in favor of higher priority transactions. We also present the experimental results of our algorithm comparing other real-time active concurrency control algorithms.

  • PDF

Link-E-Param : A URL Parameter Encryption Technique for Improving Web Application Security (Link-E-Param : 웹 애플리케이션 보안 강화를 위한 URL 파라미터 암호화 기법)

  • Lim, Deok-Byung;Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1073-1081
    • /
    • 2011
  • An URL parameter can hold some information that is confidential or vulnerable to illegitimate tampering. We propose Link-E-Param(Link with Encrypted Parameters) to protect the whole URL parameter names as well as their values. Unlike other techniques concealing only some of the URL parameters, it will successfully discourage attacks based on URL analysis to steal secret information on the Web sites. We implement Link-E-Param in the form of a servlet filter to be deployed on any Java Web server by simply copying a jar file and setting a few configuration values. Thus it can be used for any existing Web application without modifying the application. It also supports numerous encryption algorithms to choose from. Experiments show that our implementation induces only 2~3% increase in user response time due to encryption and decryption, which is deemed acceptable.

Analysis on the Kinematics and Dynamics of Human Arm Movement Toward Upper Limb Exoskeleton Robot Control - Part 2: Combination of Kinematic and Dynamic Constraints (상지 외골격 로봇 제어를 위한 인체 팔 동작의 기구학 및 동역학적 분석 - 파트 2: 제한조건의 선형 결합)

  • Kim, Hyunchul;Lee, Choon-Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.8
    • /
    • pp.875-881
    • /
    • 2014
  • The redundancy resolution of the seven DOF (Degree of Freedom) upper limb exoskeleton is key to the synchronous motion between a robot and a human user. According to the seven DOF human arm model, positioning and orientating the wrist can be completed by multiple arm configurations that results in the non-unique solution to the inverse kinematics. This paper presents analysis on the kinematic and dynamic aspect of the human arm movement and its effect on the redundancy resolution of the seven DOF human arm model. The redundancy of the arm is expressed mathematically by defining the swivel angle. The final form of swivel angle can be represented as a linear combination of two different swivel angles achieved by optimizing two cost functions based on kinematic and dynamic criteria. The kinematic criterion is to maximize the projection of the longest principal axis of the manipulability ellipsoid of the human arm on the vector connecting the wrist and the virtual target on the head region. The dynamic criterion is to minimize the mechanical work done in the joint space for each of two consecutive points along the task space trajectory. The contribution of each criterion on the redundancy was verified by the post processing of experimental data collected with a motion capture system. Results indicate that the bimodal redundancy resolution approach improved the accuracy of the predicted swivel angle. Statistical testing of the dynamic constraint contribution shows that under moderate speeds and no load, the dynamic component of the human arm is not dominant, and it is enough to resolve the redundancy without dynamic constraint for the realtime application.

Webcam-Based 2D Eye Gaze Estimation System By Means of Binary Deformable Eyeball Templates

  • Kim, Jin-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.575-580
    • /
    • 2010
  • Eye gaze as a form of input was primarily developed for users who are unable to use usual interaction devices such as keyboard and the mouse; however, with the increasing accuracy in eye gaze detection with decreasing cost of development, it tends to be a practical interaction method for able-bodied users in soon future as well. This paper explores a low-cost, robust, rotation and illumination independent eye gaze system for gaze enhanced user interfaces. We introduce two brand-new algorithms for fast and sub-pixel precise pupil center detection and 2D Eye Gaze estimation by means of deformable template matching methodology. In this paper, we propose a new algorithm based on the deformable angular integral search algorithm based on minimum intensity value to localize eyeball (iris outer boundary) in gray scale eye region images. Basically, it finds the center of the pupil in order to use it in our second proposed algorithm which is about 2D eye gaze tracking. First, we detect the eye regions by means of Intel OpenCV AdaBoost Haar cascade classifiers and assign the approximate size of eyeball depending on the eye region size. Secondly, using DAISMI (Deformable Angular Integral Search by Minimum Intensity) algorithm, pupil center is detected. Then, by using the percentage of black pixels over eyeball circle area, we convert the image into binary (Black and white color) for being used in the next part: DTBGE (Deformable Template based 2D Gaze Estimation) algorithm. Finally, using DTBGE algorithm, initial pupil center coordinates are assigned and DTBGE creates new pupil center coordinates and estimates the final gaze directions and eyeball size. We have performed extensive experiments and achieved very encouraging results. Finally, we discuss the effectiveness of the proposed method through several experimental results.

An Implementation for EIP Adopting XUL and SVG (XUL과 SVG를 이용한 EIP 구축에 관한 연구)

  • Cho, Chang-Hee;Kim, Hang-Bae;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.79-88
    • /
    • 2004
  • Practical use of Information Technology in present enterprise simply enterprise support do pass over known dimension and is utilizing by means for enterprise competitive power strengthening. Because of these point, a lot of kind of information systems appeared. It can be said that EIP system that many enterprises are introducing recently is concept that appear to also use information in enterprise more efficiently. If present EIP system sees construct example, segment is detected to improve some. First, should do duplicate development despite it is same function to use EIP system in wireless and web browser environment. Second, can hear management's difficulty by immense contents that happen in System Integration. We wish to solve problem that happen in development of existing EIP system using XUL and a SVG technology in this paper that aim to these. XUL is open source In language to manufacture UI that do not receive court of platform and existence and nonexistence captain rain, support wireless and web browser equipment at the same time to source that is produced once if is browser that can manufacture usable interface in web and supports XUL as user wants. SVG method is a skill that can offer convenience that is epoch-making in contents management by software that describe contents representation in source code unlike form that show because calls contents forming already in the existent bit map room and establishes to browser handles this and expresses contents. In paper, produced use of XUL and SVG by prototype to presented whether can apply XUL and a SVG technology to actuality EIP system and verifies whether this is possible and that do actuality through existent method and comparison and excellency were seen.

Game Theoretic Approach for Joint Resource Allocation in Spectrum Sharing Femtocell Networks

  • Ahmad, Ishtiaq;Liu, Shang;Feng, Zhiyong;Zhang, Qixun;Zhang, Ping
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.627-638
    • /
    • 2014
  • In this paper, we study the joint price and power allocation in spectrum sharing macro-femtocell networks. The proposed game theoretic framework is based on bi-level Stackelberg game where macro base station (MBS) works as a leader and underlaid femto base stations (FBSs) work as followers. MBS has fixed data rate and imposes interference price on FBSs for maintaining its data rate and earns revenue while FBSs jointly adjust their power for maximizing their data rates and utility functions. Since the interference from FBSs to macro user equipment is kept under a given threshold and FBSs compete against each other for power allocation, there is a need to determine a power allocation strategy which converges to Stackelberg equilibrium. We consider two cases for MBS power allocation, i.e., fixed and dynamic power. MBS can adjust its power in case of dynamic power allocation according to its minimum data rate requirement and number of FBSs willing to share the spectrum. For both cases we consider uniform and non-uniform pricing where MBS charges same price to all FBSs for uniform pricing and different price to each FBS for non-uniform pricing according to its induced interference. We obtain unique closed form solution for each case if the co-interference at FBSs is assumed fixed. And an iterative algorithm which converges rapidly is also proposed to take into account the effect of co-tier interference on interference price and power allocation strategy. The results are explained with numerical simulation examples which validate the effectiveness of our proposed solutions.

Visual information processing of icons (아이콘의 표상 방식에 따른 시각정보처리)

  • Park, Jin-Han;Han, Gwang-Hui
    • Korean Journal of Cognitive Science
    • /
    • v.8 no.4
    • /
    • pp.19-33
    • /
    • 1997
  • Icon is a small graphic which represents a particular function in computer interface. Comprehension and learning of icons are needed for using them because they represent some meanings. This study was conducted to examine which were more important factors in using icons. First, representational characteristics of icons were examined. Second, using a eyetracker, the way of coding of redundant display was examined which removed obscurity of display and gave more meaning to a user. Icons using attribute of object and direct discription of action were more efficient than icons of other representational form in comprehension. Redundant display was proved to have some advantages, especially when the icons had low familarity. Visual information processing of icons were discussed according to familarity and learning.

  • PDF

Job Assignment Simulation of Ship Hull Production Design in Consideration of Mid-Term Schedule (중일정계획을 고려한 선체 생산설계 작업할당 시뮬레이션)

  • Son, Myeong-Jo;Kim, Tae-Wan
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.50 no.5
    • /
    • pp.334-342
    • /
    • 2013
  • In this paper, we analyze the procedure of the design manager for the enhancement of the hull production design process by use of the simulation method. Normally, design manager assigns design jobs according to various methods and estimates the corresponding results. When the construction drawing which is the output of the detail design where a design is dealt by zones, the design manager identifies blocks and analyzes their work difficulties, and assigns jobs to design engineers who are different in capabilities. These processes including the design engineer who can be modeled with man-hours evaluation model are represented in detail as a simulation model. As the high-level modeling for the discrete-event system, we use Event Graph model. And we implemented the simulation using Simkit which is open simulation engine for the discrete-event system. We made the simulation scenario to be written by a user in the scenario generator which is separated from the simulation model, and made the simulation result to be visualized in the form of Gantt chart in a Web. In the scenario of the irregular issuance for various construction drawings which contain different numbers of blocks, we performed the Monte-Carlo simulation according to various assignment methods to find the assignment result that satisfies the mid-term schedule.

Improving the Job Success Rate through Analysis of User Logs in HPC (HPC 환경에서 사용자 로그 분석을 통한 작업 성공률 개선)

  • Yoon, JunWeon;Hong, TaeYoung;Kong, Ki-Sik;Park, ChanYeol
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.691-697
    • /
    • 2015
  • Supercomputers are used for many different areas including new product design of industries as well as state-of-the-art science and technology for large amount of computational needs. Tachyon is a 4th supercomputer built at KISTI that is a high-performance parallel computing system with 3,200 computing nodes and infrastructures. This system is currently about 10,000 users and over 170 organizations are used, the number of jobs they are performing work in batch type form through a scheduler. Also, this system logs lots of job scripts, execution environment, library, job status from the job submit to end. In this paper, we analyzed batch jobs information from Sun Grid Engine, that use as a scheduler in Tachyon system, and job executed information in Tachyon System. In particular, we distinguished the fail jobs from the all tasks that users perform and we analyzed the cause of failure. Among them, we can extracted some of jobs that can be regarded as normal jobs through the improvement in those works logged as all of fail jobs.