• Title/Summary/Keyword: distributed object

Search Result 747, Processing Time 0.023 seconds

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

Design of Mobile Agent Model Supporting the Intelligent Path Search (지능형 경로 탐색을 지원하는 이동 에이전트 모델 설계)

  • Ko, Hyun;Kim, Kwang-Myoung;Lee, Yon-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.550-554
    • /
    • 2002
  • In this paper, we design the CORBA-based Mobile-Agent Model (CMAM) which has the capability of the efficient work processing in distributed environment through sensing network traffic and searching the optimal path for migration nodes of mobile agent. In case existing mobile agent model is given various works from user, the network overhead and traffic are increased by increasing of execution module size. Also, if it happens a large quantity of traffics due to migration of nodes according to appointment of the passive host(node) muting schedule by user, it needs much cost for node search time by traffic. Therefore, in this paper, we design a new mobile agent model that assures the reliability of agent's migration through dynamic act on the specific situation according to appointment of the active routing schedule and can minimize agent's work processing time through optimal path search. The proposed model assigns routing schedule of the migration nodes actively using an extended MAFFinder. Also, for decreasing overhead of network by agent's size, it separated by mobile agent including oかy agent calling module and push agent with work executing module based on distributed object type of CORBA. Also, it can reduce the required time for round works of mobile agent through the optimal path search of migration nodes.

  • PDF

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

ICU Real-Time Sign Information Transmission System using TMO in Distributed Network Systems (분산 네트워크 시스템에서 TMO를 이용한 ICU 실시간 생체정보 전송 시스템)

  • Oh, Seung-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.230-235
    • /
    • 2009
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. We have to design to obtain useful vital sign information, which is generated at parsing data receiver modulor of HIS with TMO structure, that is offered by the central monitor of ICU. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems.

  • PDF

Design of Multi-Sensor-Based Open Architecture Integrated Navigation System for Localization of UGV

  • Choi, Ji-Hoon;Oh, Sang Heon;Kim, Hyo Seok;Lee, Yong Woo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.1 no.1
    • /
    • pp.35-43
    • /
    • 2012
  • The UGV is one of the special field robot developed for mine detection, surveillance and transportation. To achieve successfully the missions of the UGV, the accurate and reliable navigation data should be provided. This paper presents design and implementation of multi-sensor-based open architecture integrated navigation for localization of UGV. The presented architecture hierarchically classifies the integrated system into four layers and data communications between layers are based on the distributed object oriented middleware. The navigation manager determines the navigation mode with the QoS information of each navigation sensor and the integrated filter performs the navigation mode-based data fusion in the filtering process. Also, all navigation variables including the filter parameters and QoS of navigation data can be modified in GUI and consequently, the user can operate the integrated navigation system more usefully. The conventional GPS/INS integrated system does not guarantee the long-term reliability of localization when GPS solution is not available by signal blockage and intentional jamming in outdoor environment. The presented integration algorithm, however, based on the adaptive federated filter structure with FDI algorithm can integrate effectively the output of multi-sensor such as 3D LADAR, vision, odometer, magnetic compass and zero velocity to enhance the accuracy of localization result in the case that GPS is unavailable. The field test was carried out with the UGV and the test results show that the presented integrated navigation system can provide more robust and accurate localization performance than the conventional GPS/INS integrated system in outdoor environments.

Efficiency analysis on advertising media for animal welfare egg - Focused on ranked logit model - (동물복지형 달걀에 대한 광고매체의 효율성 분석: Ranked Logit Model을 중심으로)

  • Ohh, Sang Jip;Jung, Yun-Pil;Oh, Kyung-Tae;Hong, Seung-Jee;Lee, Jong-In
    • Korean Journal of Agricultural Science
    • /
    • v.39 no.3
    • /
    • pp.441-450
    • /
    • 2012
  • The object of this study is to establish proper consumer-oriented advertisement strategies of animal welfare egg. Data were collected by consumer survey on November 4th, 2011 at Hanaromart in Chunchon area. SAS 9.1 and Excel 2007 were used as statistical package and ranked logit model was used to analyze the data. From the results of the study the following advertisement strategies were suggested for animal welfare egg considering the effects of advertisement media. First, internet based media were most preferred. For effectively using the internet based media the message should be succinctly and clearly transferred to consumers. Therefore if phrases and pictures emphasizing the difference between animal welfare egg and general egg were used, then positive effects could be attained from consumers in a short period. Second, advertisement media should be used differently based upon the consumers' income level. In the case of consumers under three million won income level the advertisement in the purchasing site was most effective regarding the advertisement effects. Therefore if the advertisement showing the breeding surroundings between animal welfare egg and general egg was used, positive effects could be attained. For consumers over three million won income level the homepage of egg producers was most effective in advertisement. So if more accurate information were distributed to consumers visiting the homepage and high quality egg were sold via the homepage, positive effects could be attained.

A Concept of Multi-Layered Database for the Maintenance and Management of Bridges (교량의 유지관리를 위한 멀티레이어 데이터베이스 개념)

  • Kim, Bong-Geun;Yi, Jin-Hoon;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.20 no.3
    • /
    • pp.393-404
    • /
    • 2007
  • A concept of multi-layered database is proposed for the integrated operation of bridge information in this study. The multi-layered database is a logically integrated database composed of standardized information layers. The standardized information layers represent the data sets that can be unified, and they are defined by standardized information models. Classification system of bridge component was used as a basis of the multi-layered database, and code system based on the classification system was employed as a key integrator to manipulate the distributed data located on the different information layers. In addition, data level indicating priorities of information layers was defined to support strategic planning of the multi-layered database construction. As a proof of concept, a prototype of multi-layered database for object-oriented 3-D shape information and structural calculation document was built. Data consistency check of the semantically same data in the two different information layer was demonstrated, It is expected that the proposed concept can assure the integrity and consistency of information in the bridge information management.

A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing (빅데이터 기반의 융합 보이스피싱을 이용한사회공학적 공격 기법과 대응방안)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.1
    • /
    • pp.85-91
    • /
    • 2015
  • Recently government has distributed precautionary measure and response procedures for smishing(SMS phishing), pharming, phishing, memory hacking and intensified Electronic Financial Transaction Act because of the sharp increase of electronic bank frauds. However, the methods of electronic bank frauds also developed and changed accordingly so much it becomes hard to cope with them. In contrast to earlier voice phishing targeted randomizing object, these new methods find out the personal information of targets and analyze them in detail making a big data base. And they are progressed into new kind of electronic bank frauds using those analyzed informations for voice phishing. This study analyze the attack method of voice phishing blended with the Big Data of personal informations and suggests response procedures for electronic bank frauds increasingly developed. Using the method to save meaningless data in a memory, attackers cannot deduct accurate information and try voice phishing properly even though they obtain personal information based on the Big Data. This study analyze newly developed social technologic attacks and suggests response procedures for them.

The Distribution and Scale of Book in the Reign of King Jeong-jo as "Kyujangjeonun" ([ "규장전운" ]을 통해서 본 정조조의 서적 반사와 그 규모)

  • Shin, Seung-Woon
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.4
    • /
    • pp.293-316
    • /
    • 2004
  • The best way of getting knowledge is reading in the Cho-sun dynasty, so getting books is the most interesting thing to the scholars. The most important way of getting books for scholars in Cho-sun dynasty is taking Bansabon published and given to scholars by government. but there is few data and few concrete studies of it. This study deals with the object and the scale of distribution of books on the basis of Bansagi ; king Jeong-jo published 『Kyujangjeonun』 distributed about 1,500 volumes to scholars and govermment agencies.

  • PDF

Implementation and Performance Evaluation of Socket and RMI based Java Message Passing Systems (소켓 및 RMI 기반 자바 메시지 전달 시스템의 구현 및 성능평가)

  • Bang, Seung-Jun;Ahn, Jin-Ho
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.11-20
    • /
    • 2007
  • This paper designs and implements a message passing library called JMPI (Java Message Passing Interface) which complies with MPJ (Message Passing in Java), the MPI standard Specification for Java language, This library provides some graphic user interface tools to enable parallel computing environments to be configured very simply by their administrators and JMPI applications to be executed very conveniently. Also in this paper, we implement two versions of systems using Socket and RPC which are both typical distributed system communication mechanisms and with three benchmark applications, compare performance of these systems with that of an existing system JPVM depending on the increasing number of the computers. Experimental results show that our systems outperform JPVM system in terms of various aspects and that the most efficient processing speedup can be obtained by increasing the number of the computers in consideration of network traffic through processing evaluation. Finally, we can see that, as the number of computers increases, using RMI to transmit a message is more effective than using object streams attached to sockets to transmit a message.

  • PDF