• Title/Summary/Keyword: extendability

Search Result 51, Processing Time 0.027 seconds

A Study on Distributed & Intelligent Platform for Digital Contents (디지털 콘텐츠 저장 및 유통을 위한 분산 지능형 플랫폼에 관한 연구)

  • 장연세;임승린;나오키엔도
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.53-60
    • /
    • 2003
  • In these day, Digital Contents is authorized in forms of HTML and various kind of multi-media by an enterprise and/or organization. At this circumstances, it is very hard or impossible to search a contents between them. Futhermore, you may have to change your contents service systems to extend to cover more user services needs. On this paper, we propose a new architecture to get extendability and empowered interoperability without any maintenance, update or changes. And we introduce the OMG's CORBA to make fault resilient system and to provide a load balancing using a distributed process mechanism. Even more, we adopted the SyncML specification. It can help us to make it real to synchronize between DBMS at real-time. So all these are support easy content synchronization and user-friendness.

  • PDF

Implementation of Testing Tool Verification of ATM Switching Software (ATM교환기 S/W검증을 위한 테스팅 도구 설계 및 구현)

  • Chung, Chang-Sin;Hwang, Sun-Myung;Lee, Kyung-Whan;Kim, Haeng-Kon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.1987-1994
    • /
    • 1997
  • ATM switching software should be required high reliability, functionality, extendability and maintainability. After development of the software, it is verified and tested by analyzer whether the software is accomplished the characteristics of it or not. There are so many CASE tools in other area, but the CHILL testing tools that can verify ATM softwares have not various functions are not many. In this paper we develop the testing tool which can evaluate and test CHILL programmed ATM software. This Tool supports testing reports, debugging informations and maintenance informations including parallel process about CHILL original programs.

  • PDF

Development of Web-based User Script Linking System for Three-dimensional Robot Simulation (3차원 로봇 시뮬레이션 환경을 위한 웹 기반의 사용자 스크립트 연동 시스템 개발)

  • Yang, Jeong-Yean
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.2
    • /
    • pp.469-476
    • /
    • 2019
  • Robotic motion is designed by the rotation and the translation of multiple joint coordinates in a three-dimensional space. Joint coordinates are generally modeled by homogeneous transform matrix. However, the complexity of three dimensional motions prefers the visualization methods based on simulation environments in which models and generated motions work properly. Many simulation environments have the limitations of usability and functional extension from platform dependency and interpretation of predefined commands. This paper proposes the web-based three dimensional simulation environment toward high user accessibility. Also, it covers the small size web server that is linked with Python script. The non linearities of robot control apply to verify the computing efficiency, the process management, and the extendability of user scripts.

Implementation of a unified live streaming based on HTML5 for an IP camera (IP 카메라를 위한 HTML5 기반 통합형 Live Streaming 구현)

  • Ryu, Hong-Nam;Yang, Gil-Jin;Kim, Jong-Hun;Choi, Byoung-Wook
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.9
    • /
    • pp.99-104
    • /
    • 2014
  • This paper presents a unified live-streaming method based on Hypertext Mark-up Language 5(HTML5) for an IP camera which is independent of browsers of clients and is implemented with open-source libraries. Currently, conventional security systems based on analog CCTV cameras are being modified to newer surveillance systems utilizing IP cameras. These cameras offer remote surveillance and monitoring regardless of the device being used at any time, from any location. However, this approach needs live-streaming protocols to be implemented in order to verify real-time video streams and surveillance is possible after installation of separate plug-ins or special software. Recently, live streaming is being conducted through HTML5 using two different standard protocols: HLS and DASH, that works with Apple and Android products respectively. This paper proposes a live-streaming approach that is linked on either of the two protocols which makes the system independent with the browser or OS. The client is possible to monitor real-time video streams without the need of any additional plug-ins. Moreover, by implementing open source libraries, development costs and time were economized. We verified usefulness of the proposed approach through mobile devices and extendability to other various applications of the system.

A Study on Resolution of Validity in XML Document (XML 문서의 유효성 문제 해결에 관한 연구)

  • Hong, Seong-Pyo;Song, Gi-Beom;Bang, Keug-In;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.564-567
    • /
    • 2003
  • XML has weakness problems on document modulation and elimination of data Because of the XML gives priority to present data format, XML electrical signature, XML cryptography, or XML access control is provided to overcome those weakness problems. However, structured XML efficiency contravention problem occurred from XML encryption and absence of protection from DTD attack are still remains unsolved. In this paper, we provide XML scheme that satisfies both efficiency and encryption. DTD is unnecessary because XML scheme supports formatting(Well-Formed XML) XML documents and it also include meta information. Because of the XML scheme has possibility to generate each XML document dynamically and self efficiency investigator rule, it has an advantage on extendability of DID based encryption of XML documents.

  • PDF

A Large-Scale Conference Service by Distributed Focus Control Method (분산 포커스 제어 방식에 의한 대규모 컨퍼런스 서비스)

  • Jang, Choonseo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.7
    • /
    • pp.10-17
    • /
    • 2014
  • The focus maintains and manages conference session in the conference service. Load of focus increases by the number of participants and it becomes the major reason that limits the extendability of the large-scale conference service. In this paper, a new distributed focus control method has been proposed to solve this problem. Load of focus has been distributed to several conference nodes to implement large-scale conference service in this architecture. Conference nodes which have focus function subscribe to conference server's conference information database, and focus hae been allocated dynamically to process participants needs according to total numbers of the conference participants. For this purpose a new conference control event package for focus load control has been suggested. Furthermore the exchange procedure of SIP messages between focuses and participants also been suggested. The performance of the proposed system has been evaluated by simulation.

GAM: A Criticality Prediction Model for Large Telecommunication Systems (GAM: 대형 통신 시스템을 위한 위험도 예측 모델)

  • Hong, Euy-Seok
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.2
    • /
    • pp.33-40
    • /
    • 2003
  • Criticality prediction models that determine whether a design entity is fault-prone or non fault-prone play an important role in reducing system development costs because the problems in early phases largely affect the quality of the late products. Real-time systems such as telecommunication systems are so large that criticality prediction is mere important in real-time system design. The current models are based on the technique such as discriminant analysis, neural net and classification trees. These models have some problems with analyzing causes of the prediction results and low extendability. This paper builds a new prediction model, GAM, based on Genetic Algorithm. GAM is different from other models because it produces a criticality function. So GAM can be used for comparison between entities by criticality. GAM is implemented and compared with a well-known prediction model, BackPropagation neural network Model(BPM), considering Internal characteristics and accuracy of prediction.

  • PDF

Alpha : Java Visualization Tool (Alpha : 자바 시각화 도구)

  • Kim, Cheol-Min
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.3
    • /
    • pp.45-56
    • /
    • 2004
  • Java provides support for Web, concurrent programming, safety, portability, and GUI, so there is a steady increase in the number of Java users. Java is based on the object-oriented concepts such as classes, instances, encapsulation, inheritance, and polymorphism. However the JVM(Java Virtual Machine) hides most of the phenomena related to the concepts. This is why most of Java users have much difficulty in learning and using Java. As a solution to the problem, I have developed a tool Alpha that visualizes the phenomena occurred in the JVM from the standpoint of the concepts and will describe the design and features of the tool in this paper. For practicality and extendability Alpha has an MVC(Model-View-Controller) architecture and visualizes the phenomena such as object instantiations, method invocations, field accesses, cross-references among objects, and execution flows of threads in the various ways according to the levels and purposes of the users.

  • PDF

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

A Study on the Establishment of a Methodology of GIS Audit (GIS 감리방법론의 정립에 관한 연구)

  • Kwak, Tae-Sik;Kim, Kye-Hyun;Choi, Joon-Whoon
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.2 s.14
    • /
    • pp.15-27
    • /
    • 2005
  • The purpose of this study is to present a methodology of GIS audit system which fully reflects standardization regarding GIS. With the recognition of the problems stemming from data exchange, building costs, and budget waste, this study utilized the standardization for evaluation factors of GIS audit. After analyzing the advantages and disadvantages of current audit methodology, this study pointed out the importance of audit, then presenting main audit factors followed by analyzing national standardization and extracting contents of audit to be added into the existing auditing items. Through the analysis of different types and characteristics, and both advantages and disadvantages of GASP, this study identifies and introduces a highly improved and practical methodology called Modified-GASP (M-GASP) that is basically set to be complementary and supplementary to GASP. Ultimately, the result of this study will support the higher degree of efficiency, stability, and extendability of GIS system, not to mention of strengthening the competitiveness of organizations involved.

  • PDF