• Title/Summary/Keyword: file format

Search Result 528, Processing Time 0.024 seconds

A Study on the Ship Cargo Hold Structure Data Model Based on STEP (STEP을 근거로 한 선체화물창부 구조 데이터 모델에 관한 연구)

  • 박광필;이규열;조두연
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.4
    • /
    • pp.381-390
    • /
    • 1999
  • In this study, a pseudo ship structure data model for the :.hip cargo hold structure based on STEP is proposed. The proposed data model is based on Application Reference Model of AP218 Ship Structure which is the model that specifies conceptual structures and constraints used to describe the information requirements of an application. And the proposeddata model refers the Ship Common Model framework for the model architecture which is the basis for ongoing ship AP development within the ISO ship-building group and the ship product definition information model of CSDP research project for analyzing the relationship between ship structure model entities. The proposed data model includes Space, Compartment. Ship Structural System, Structural Part and Structural Feature of cargo hold. To generate this data model schema in EXPRESS format, ‘GX-Converter’was used which enables user to edit a model in EXPRESS format and convert schema file in EXPRESS format. Using this model schema, STEP physical file containing design data for ship cargo hold data structure was generated through SDAI programming. The another STEP physical file was also generated containing geometry data of ship cargo hold which was extracted and calculated by SDAI and external surface/surface intersection program. The geometry information of ship cargo hold can be then transferred to commercial CAD system, for example, Pro/Engineer. Examples of the modification of the design information are also Presented.

  • PDF

Realtime 3D Human Full-Body Convergence Motion Capture using a Kinect Sensor (Kinect Sensor를 이용한 실시간 3D 인체 전신 융합 모션 캡처)

  • Kim, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.189-194
    • /
    • 2016
  • Recently, there is increasing demand for image processing technology while activated the use of equipments such as camera, camcorder and CCTV. In particular, research and development related to 3D image technology using the depth camera such as Kinect sensor has been more activated. Kinect sensor is a high-performance camera that can acquire a 3D human skeleton structure via a RGB, skeleton and depth image in real-time frame-by-frame. In this paper, we develop a system. This system captures the motion of a 3D human skeleton structure using the Kinect sensor. And this system can be stored by selecting the motion file format as trc and bvh that is used for general purposes. The system also has a function that converts TRC motion captured format file into BVH format. Finally, this paper confirms visually through the motion capture data viewer that motion data captured using the Kinect sensor is captured correctly.

The Design and Prototype Presentation of Web-based Geographic Information System for Irrigation Facilities (농업수리시설물의 웹 기반 지리정보시스템 설계 및 프로토타입 구현)

  • 고홍석;최진규;이정문;박순철;오동석;백영기
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.40 no.3
    • /
    • pp.54-62
    • /
    • 1998
  • This study is the part of development of information management system for irrigation facilities. It describes the design and prototype presentation of WISIF(Web-based geographic Information System for Irrigation Facilities). WISIF manages the IFDB(Irrigation Facilities DataBase) and offers geographic information of irrigation facilities from IFSDB(Irrigation Facilities Spatial DataBase) through World Wide Web. GeoMedia Web Map software of Intergraph is used to offer geographic information to users. GeoMedia Web Map generates vector format, so called ActivCGM. The file generated in ActiveCGM format can be downloaded fast since its size is so small and generated as an interactive map file since its format supports hyperlink.

  • PDF

Effective Optimization by Comparison with Game Loading Time for File Format of Textures - Based on Virtools Engine - (텍스처의 파일 저장형식에 따른 게임 로딩 시간 비교를 통한 효과적인 최적화 기법에 관한 연구 - Virtools 엔진을 기반으로 -)

  • Chae, Heon-Joo;Ryu, Seuc-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.72-77
    • /
    • 2007
  • A game starting, the process of running has some loading steps. In general, textures use corresponding images saved externally and the file format of images affects the loading time of game. We propose some ideas for the texture using method by comparison with loading time according to some file formats.

A Study on Effective Optimization by Comparison with Game Loading Time for File Format of Textures - Based on Virtools Engine - (텍스처의 파일 저장형식에 따른 게임 로딩 시간 비교를 통한 효과적인 최적화 기법에 관한 연구 - Virtools 엔진을 기반으로 -)

  • Chae, Heon-Joo;Ryu, Seuc-Ho;Kyung, Byung-Pyo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.172-176
    • /
    • 2006
  • A game starting, the process of running has some loading steps. In general, textures use corresponding images saved externally and the file format of images affects the loading time of game. We propose some ideas for the texture using method by comparison with loading time according to some file formats.

  • PDF

A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header (실행파일 헤더내 문서화되지 않은 정보의 비교를 통한 실행파일 분류 방법)

  • Kim, Jung-Sun;Kang, Jung-Min;Kim, Kang-San;Shin, Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.43-50
    • /
    • 2013
  • File identification and analysis is an important process of computer forensics, since the process determines which subjects are necessary to be collected and analyzed as digital evidence. An efficient file classification aids in the file identification, especially in case of copyright infringement where we often have huge amounts of files. A lot of file classification methods have been proposed by far, but they have mostly focused on classifying malicious behaviors based on known information. In copyright infringement cases, we need a different approach since our subject includes not only malicious codes, but also vast number of normal files. In this paper, we propose an efficient file classification method that relies on undocumented information in the header of the PE format files. Out method is useful in copyright infringement cases, being applied to any sort of PE format executable file whether the file is malicious, packed, mutated, transformed, virtualized, obfuscated, or not.

A Study on Multiple Sensorial Media Application Format (다중 감각 미디어 응용 포맷의 구성 방법 연구)

  • Jung, Yup Oh;Kim, Sang-Kyun
    • Journal of Broadcast Engineering
    • /
    • v.21 no.3
    • /
    • pp.330-340
    • /
    • 2016
  • This paper explains about the structure of multiple sensorial media application format (ISO/IEC 23000-17), which is newly standardized as a project of MPEG-A. This format facilitates effective storage, playing, and management of media with multiple sensorial effects. The ISO base media file format from MPEG-4 Part 12 and sensory effect metadata (SEM) from MPEG-V Part 3 are used to composed the multiple sensorial media application format. In this paper, a fragmentation method to break a SEM XML document into valid SEM samples is presented. Several binarization methods to compress the SEM samples are compared and evaluated as well. The compression ratio and processing time using the MPEG-V binary representation and the Binary MPEG format for XML (BiM) are superior to the gzip compression.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment (망분리 환경에서 파일형식 변환을 통한 안전한 파일 전송 및 포렌식 준비도 구축 연구)

  • Han, Jaehyeok;Yoon, Youngin;Hur, Gimin;Lee, Jaeyeon;Choi, Jeongin;Hong, SeokJun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.859-866
    • /
    • 2019
  • Cybersecurity attack targeting a specific user is rising in number, even enterprises are trying to strengthen their cybersecurity. Network segmentation environment where public network and private network are separated could block information coming from the outside, however, it is unable to control outside information for business efficiency and productivity. Even if enterprises try to enhance security policies and introduce the network segmentation system and a solution incorporating CDR technology to remove unnecessary data contained in files, it is still exposed to security threats. Therefore, we suggest a system that uses file format conversion to transmit a secure file in the network separation environment. The secure file is converted into an image file from a document, as it reflects attack patterns of inserting malicious code into the document file. Additionally, this paper proposes a system in the environment which functions that a document file can keep information for incident response, considering forensic readiness.

The Study on the Reduction of Laser Scanning Path Creation Time during Jewellery Pattern Manufacturing (쥬얼리 패턴제작시 주사경로생성시간 단축에 관한 연구)

  • Kim, T.H.;Kim, S.Y.;Park, J.D.;Kim, M.J.;Jeon, E.C.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.6
    • /
    • pp.440-446
    • /
    • 2006
  • This study relates to the effect of forming time of injection path on the total process. The whole process can be divided into build process of forming path of injection and after treatment process. The total time required for the whole process could be reduced by reducing the forming time of injection path using SLC file to correct the problems of STL file that is the basic file format for high speed molding devices. First of all, I verify the forming time of injection path according to the conditions of STL file during the formation of injection path. And I verify problems using STL file during formation of injection path. And then I tried to solve problems of STL file by comparing between the formation time of injection path and the existing method using SLC files.