• Title/Summary/Keyword: application development scheme

Search Result 286, Processing Time 0.023 seconds

An Analysis of Korean Children's Libraries and Their Classification Scheme (국내 어린이도서관의 현황 및 분류표 적용 분석)

  • Moon, Ji-Hyun;Kim, Jeong-Hyen
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.2
    • /
    • pp.493-514
    • /
    • 2008
  • The paper analyzes local children's libraries' status of application of classification scheme and problems and difficulties in its application in order to be used as basic material for development of classification scheme for exclusive use of children's libraries. Through survey, the paper researched 96 local children's libraries, and the results showed that KDC-applied libraries numbered 53 and were the highest, libraries which developed their own classification scheme numbered 22, and libraries which applied classification scheme for children's library numbered 13. Further, many asserted that there needs to be a development of standard classification scheme to be used in children's library. On problems and difficulties in applying classification scheme, notes such as difficulty of accommodating various forms of children's books(such as comic books and picture books), placing too much emphasis on collection of books on certain topic, and lack of topic categories appropriate for characteristics of collected books were voiced, and by holding additional discussion on these, the paper raised the usefulness of the dissertation to be used as basic materials for developing classification scheme for exclusive use of children's library in the future.

  • PDF

Service Profile Replication Scheme with Local Anchor for Next Generation Personal Communication Networks

  • Jinkyung Hwang;Bae, Eun-Shil;Park, Myong-Soon
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.215-221
    • /
    • 2003
  • It is expected that per-user customized services are widely used in next generation Personal Communication Network. To provide personalized services for each call, per-user service profiles are frequently referenced and signaling traffic is considerably large. Since the service calls are requested from the places where user stays, we can expect that the traffic is localized. In this paper, we propose a new service profile replication scheme, named Follow-Me Replication with local Anchor (FMRA). By replicating user's service profile in a user-specific location area, local anchor of each region, the signaling traffic for call and mobility can be distributed to local network. We compared the performance of the FMRA with two typical schemes: Intelligent Network-based !Central scheme and IMT-2000 based full replication scheme, as we refer it to Follow-Me Replication Unconditional (FMRU). Performance results indicate that FMRA lies between Central and FMRU schemes according to call to mobility ratio, and we identified the efficient ranges of CMR for FMRA depending on the various network parameters.

Development of the Unmanned Automatic Test System for a Portable Detector using TRIZ TESE

  • Chang, YuShin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.63-71
    • /
    • 2021
  • This paper propose an development of the unmanned automatic test system for a portable detector using TRIZ Methodology. A new development scheme among of the unmanned automatic test system configurations was obtained after application of the TESE(Trends of Engineering System Evolution) one of the TRIZ methods. Using Pugh matrix drives some improving ideas. The key idea of this unmanned automatic test system scheme is to minimize whole test procedure time of each portable detector and to maximize the amount of portable detectors at once. Between the before and the after configurations of the 3D mechanical model find out improvements. This paper shows that the proposed development scheme improves the test performance efficiency compared to previous scheme.

Integration of 3-Dim SPH Scheme into the ExLO Code (극대변형 해석을 위한 SPH 수치기법 개발 및 ExLO 코드 연계)

  • Lee, Min-Hyung;Cho, Young-Jun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.532-537
    • /
    • 2011
  • This paper describes the development of SPH(Smooth Particle Hydrodynamics) scheme and integration into the multi-material shock physics code(ExLO) for the purpose of the application to the extreme large deformation problems. SPH numerical scheme has been extended into the fluid dynamics and the high-speed impact events, such as space structure protection against space debris and meteorite catering. Like other hydrocodes, SPH scheme also solves the conservation equations with the constitutive equation including equation of state. The benchmark problem, Taylor-Impact test, was simulated and the predictions show good agreements with both the published numerical data and experimental data. Currently, the contact treatment between materials is under development.

Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting

  • Zhou, Yihua;Dong, Songshou;Yang, Yuguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.287-304
    • /
    • 2022
  • With the development of quantum computers, ring signature schemes based on large integer prime factorization, discrete logarithm problem, and bilinear pairing are under threat. For this reason, we design a ring signature scheme based on lattice with a fixed verification key. Compared with the previous ring signature scheme based on lattice, our design has a fixed verification key and does not disclose the signer's identity. Meanwhile, we propose an anonymous electronic voting scheme by using our ring signature scheme based on lattice and (t, n) threshold scheme, which makes up for the lack of current anonymous electronic voting that cannot resist attacks of the quantum computer. Finally, under standard model (SM), we prove that our ring signature scheme based on lattice is anonymous against the full-key exposure, and existentially non-forgeable against insider corruption. Furthermore, we also briefly analyze the security of our anonymous electronic voting scheme.

KEY TECHNIQUES IN DEVELOPMENT OF VEHICLE GLASS DROP DESIGN SYSTEM

  • Liu, B.;Jin, C.N;Hu, P.
    • International Journal of Automotive Technology
    • /
    • v.8 no.3
    • /
    • pp.327-335
    • /
    • 2007
  • A new optimization scheme and some key techniques are proposed in the development of a vehicle glass drop design software system. The key issues of the design system are how to regenerate the glass surface and make the vehicle glass drop down along the glass channels. To resolve these issues, a parameterized model was created at first, in which the optimizing method and Knowledge Fusion techniques were adopted the optimized process was then written into the glass drop design system by coding with C language and UGS/Open Application Programme Interface functions etc. Therefore, the designer or engineer can simulate the process of glass dropping along the channels to assess the potential interference between glass and door accessory by using this software system. All of the testing results demonstrate the validity of the optimizing scheme, and the parametric design software effectively solves the key issues on development of the door accessory package.

Modelling and implementation scheme of a multi directory for multiple applications (다중 응용을 위한 멀티 디렉토리 모델링 및 구현 방안)

  • 김영준;임재홍
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1356-1364
    • /
    • 1997
  • This paper presents a modelling and implementation scheme of a multi directory which provides location and supplementary information of multiple applications in distributed environments. An extrended directory schema and extended DIT(Directory Information Tree) model is proposed for the multi directory. For implementation scheme, an implementation example adapted for the DFR(Document Filing and Retrieval) is shown. In addition, a configuration model for interworking between the DFR and the multi directory, an association mechanisms between two application's operations are also described. In a distributed environment, the interworking between the DFR and a multi directory implemented by using QUIPU 8.0 of ISODE(ISO Development Environment) directory system is tested. Based on the result of this paper, an extended model ofthe directory system is proposed for providing search operation of various application' objects.

  • PDF

Maximizing Concurrency and Analyzable Timing Behavior in Component-Oriented Real-Time Distributed Computing Application Systems

  • Kim, Kwang-Hee Kane;Colmenares, Juan A.
    • Journal of Computing Science and Engineering
    • /
    • v.1 no.1
    • /
    • pp.56-73
    • /
    • 2007
  • Demands have been growing in safety-critical application fields for producing networked real-time embedded computing (NREC) systems together with acceptable assurances of tight service time bounds (STBs). Here a service time can be defined as the amount of time that the NREC system could take in accepting a request, executing an appropriate service method, and returning a valid result. Enabling systematic composition of large-scale NREC systems with STB certifications has been recognized as a highly desirable goal by the research community for many years. An appealing approach for pursuing such a goal is to establish a hard-real-time (HRT) component model that contains its own STB as an integral part. The TMO (Time-Triggered Message-Triggered Object) programming scheme is one HRT distributed computing (DC) component model established by the first co-author and his collaborators over the past 15 years. The TMO programming scheme has been intended to be an advanced high-level RT DC programming scheme that enables development of NREC systems and validation of tight STBs of such systems with efforts far smaller than those required when any existing lower-level RT DC programming scheme is used. An additional goal is to enable maximum exploitation of concurrency without damaging any major structuring and execution approaches adopted for meeting the first two goals. A number of previously untried program structuring approaches and execution rules were adopted from the early development stage of the TMO scheme. This paper presents new concrete justifications for those approaches and rules, and also discusses new extensions of the TMO scheme intended to enable further exploitation of concurrency in NREC system design and programming.

Load Balancing Scheme for Machine Learning Distributed Environment (기계학습 분산 환경을 위한 부하 분산 기법)

  • Kim, Younggwan;Lee, Jusuk;Kim, Ajung;Hong, Jiman
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.25-31
    • /
    • 2021
  • As the machine learning becomes more common, development of application using machine learning is actively increasing. In addition, research on machine learning platform to support development of application is also increasing. However, despite the increasing of research on machine learning platform, research on suitable load balancing for machine learning platform is insufficient. Therefore, in this paper, we propose a load balancing scheme that can be applied to machine learning distributed environment. The proposed scheme composes distributed servers in a level hash table structure and assigns machine learning task to the server in consideration of the performance of each server. We implemented distributed servers and experimented, and compared the performance with the existing hashing scheme. Compared with the existing hashing scheme, the proposed scheme showed an average 26% speed improvement, and more than 38% reduced the number of waiting tasks to assign to the server.

An Implementation Scheme for the Detection System of RFID Defective Tags Using LabVIEW OOP

  • Jung, Deok-Gil;Jung, Min-Po;Cho, Hyuk-Gyu;Lho, Young-Uhg
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.1
    • /
    • pp.21-26
    • /
    • 2011
  • In this paper, we suggest the object-oriented methodology for the design and implementation scheme for the program development in the application of control and instrumentation such as the detection system of RFID defective tags which needs the embedded programming. We apply the design methodology of UML in the system design phase, and suggest the implementation scheme of LabVIEW programs using LVOOP(LabVIEW Object Oriented Programming)in which make it possible to write the object-oriented programming. We design the class diagram and the sequence diagram using UML, and write the classes of LVOOP from the designed class diagram and the main VI from the sequence diagram, respectively. We show that it is possible to develop the embedded programs such as the RFID application through the implementation example of the detection system of RFID defective tags in this paper. And, we obtain the advantages based on the object-oriented design and implementation using the LVOOP approach such as the development of LabVIEW programs by adding the classes and the concept of object of the object-oriented language to LabVIEW.