• 제목/요약/키워드: first to file system

검색결과 190건 처리시간 0.02초

StereoLithography로 3차원 형상가공을 위한 레이저 조사경로 생성에 관한 연구 (A study on laser scan path generation for manufacturing 3-dimensional body using StereoLithography)

  • 안대건;김준안;이석희;백인환
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1993년도 추계학술대회 논문집
    • /
    • pp.687-692
    • /
    • 1993
  • This paper deals with the generation of laser scan path for manufacturing 3-dimensional body using StereoLithography. The purpose of this study is to develop one module of the StersoLithography system(SLA) for Rapid Protyping and Manufacturing. AutoCAD system is used to supply CAD information from model. The X-Y controller which was made for a special purpose is used to test this system. The system software developed is composed of 3 main modules, the first module is calculating the boundary point os laser scan path. The scound module is generating final output file which is used to down load on the controller. The result of this study shows a good algorithm to generate laser scan path on the basis of simple mathematical background.

  • PDF

Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption

  • Youn, Taek-Young;Jho, Nam-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1249-1262
    • /
    • 2020
  • Along with the increase of the importance of information used in practice, adversaries tried to take valuable information in diverse ways. The simple and fundamental solution is to encrypt the whole data. Since the cost of encryption is increasing along with the size of data, the cost for securing the data is a burden to a system where the size of the data is not small. For the reason, in some applications where huge data are used for service, service providers do not use any encryption scheme for higher security, which could be a source of trouble. In this work, we introduce a new type of data securing technique named Trapdoor Digital Shredder(TDS) which disintegrates a data to multiple pieces to make it hard to re-construct the original data except the owner of the file who holds some secret keys. The main contribution of the technique is to increase the difficulty in obtaining private information even if an adversary obtains some shredded pieces. To prove the security of our scheme, we first introduce a new security model so called IND-CDA to examine the indistinguishability of shredded pieces. Then, we show that our scheme is secure under IND-CDA model, which implies that an adversary cannot distinguish a subset of shreds of a file from a set of random shreds.

SysML모델과 플랜트정보 간 상호연동을 위한 플러그인 개발 (A Plug-in Development for Interworking between SysML Model and Plant Information)

  • 김준영;이태경;차재민
    • 시스템엔지니어링학술지
    • /
    • 제15권2호
    • /
    • pp.17-30
    • /
    • 2019
  • Due to difficulties in tracking design information of existing document-based configuration management, the research on the development of plant SysML model was started to apply the model-based system engineering methodology to comprehensively manage various design information. However, until now, in order to create the SysML model, the engineers are checking the design information and inputting it to the SysML model. This process requires a lot of time and manpower, it is required to minimize it. Therefore, this study has recognized the problem, a plug-in that extracts the plant design information in the design document and automatically converts the SysML plant model from it. Specifically, the development was performed in the following order. First, the extraction file was selected as the most commonly used Excel file as the plant design document. Next, the design information in the document was analyzed, and extracted information including tag number, name, and the capacity were selected. Finally, the plant SysML model conversion module was implemented. The developed plug-in is confirmed that the task load of the engineers by the SysML model conversion can be minimized and the model can be generated more quickly and accurately.

원천 시스템 환경을 고려한 데이터 추출 방식의 비교 및 Index DB를 이용한 추출 방식의 구현 -ㅅ 은행 사례를 중심으로- (A Comparison of Data Extraction Techniques and an Implementation of Data Extraction Technique using Index DB -S Bank Case-)

  • 김기운
    • 경영과학
    • /
    • 제20권2호
    • /
    • pp.1-16
    • /
    • 2003
  • Previous research on data extraction and integration for data warehousing has concentrated mainly on the relational DBMS or partly on the object-oriented DBMS. Mostly, it describes issues related with the change data (deltas) capture and the incremental update by using the triggering technique of active database systems. But, little attention has been paid to data extraction approaches from other types of source systems like hierarchical DBMS, etc. and from source systems without triggering capability. This paper argues, from the practical point of view, that we need to consider not only the types of information sources and capabilities of ETT tools but also other factors of source systems such as operational characteristics (i.e., whether they support DBMS log, user log or no log, timestamp), and DBMS characteristics (i.e., whether they have the triggering capability or not, etc), in order to find out appropriate data extraction techniques that could be applied to different source systems. Having applied several different data extraction techniques (e.g., DBMS log, user log, triggering, timestamp-based extraction, file comparison) to S bank's source systems (e.g., IMS, DB2, ORACLE, and SAM file), we discovered that data extraction techniques available in a commercial ETT tool do not completely support data extraction from the DBMS log of IMS system. For such IMS systems, a new date extraction technique is proposed which first creates Index database and then updates the data warehouse using the Index database. We illustrates this technique using an example application.

Snapshot 알고리즘을 이용한 On-line 백업시스템 설계 (Designing of On-line Backup System using Snapshot Algorithm and SCSI-Protocol)

  • 김정기;이춘구;박순철
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2002년도 춘계학술대회 논문집
    • /
    • pp.177-184
    • /
    • 2002
  • 디스크의 용량이 커지고 정보화 시대와 더불어서 데이터가 폭발적으로 증가하게 되었다. 또한 현재 이 데이터들에 대한 정보 교환이나 접근은 시간과 공간에 관계없이 항상 이루어져야 하는 상황에 있다. 본 논문에서는 365일 지속적으로 운용을 해야만 하는 서버에서 데이터를 효율적으로 백업하기 위한 시스템 사항 및 설계를 소개한다. 백업은 크게 논리적인 백업과 물리적인 백업으로 구분할 수 있는데 일반적으로 물리적(블록단위) 백업을 성능 면에서 우수하지만 구현상의 어려움이 있다. 우선 지금까지의 백업의 방식이나 방법에 대해서 간략히 언급을 하고 온라인(on-line) 백업을 수행하기 위한 기술적인 사항에 대해서 알아본 다음, 백업을 하기 위한 시스템 설계에 대해서 소개하고자 한다. 본 백업 시스템은 데이터 전송의 효율을 놀이기 위해서 SCSI-Protocol을 지원한다.

  • PDF

Design of Trajectory Generator for Performance Evaluation of Navigation Systems

  • Jae Hoon Son;Sang Heon Oh;Dong-Hwan Hwang
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권4호
    • /
    • pp.409-421
    • /
    • 2023
  • In order to develop navigation systems, simulators that provide navigation sensors data are required. A trajectory generator that simulates vehicle motion is needed to generate navigation sensors data in the simulator. In this paper, a trajectory generator for evaluating navigation system performance is proposed. The proposed trajectory generator consists of two parts. The first part obtains parameters from the motion scenario file whereas the second part generates position, velocity, and attitude from the parameters. In the proposed trajectory generator six degrees of freedom, halt, climb, turn, accel turn, spiral, combined, and waypoint motions are given as basic motions with parameters. These motions can be combined to generate complex trajectories of the vehicle. Maximum acceleration and jerk for linear motion and maximum angular acceleration and velocity for rotational motion are considered to generate trajectories. In order to show the usefulness of the proposed trajectory generator, trajectories were generated from motion scenario files and the results were observed. The results show that the proposed trajectory generator can accurately simulate complex vehicle motions that can be used to evaluate navigation system performance.

Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in MANET

  • Kim, Ji-Hoon;Lee, Kwang-Jo;Kim, Taek-Hun;Yang, Sung-Bong
    • Journal of Computing Science and Engineering
    • /
    • 제5권1호
    • /
    • pp.19-31
    • /
    • 2011
  • In this paper, we propose two new routing schemes for double-layered peer-to-peer systems; a shorter-lower mobility routing scheme and a reverse path routing scheme. The shorter-lower mobility routing scheme first chooses shortest routing paths among possible routing paths and selects the path associated with the relay peer who has lower mobility to improve the reliability of the system. The reverse path routing scheme carries out unicasting (instead of multicasting) based on the reverse path information that can be obtained during the initial file search to further reduce network traffic. The experimental results showed that a double-layered peer-topeer system with the proposed hybrid scheme improved the reliability of the system about 1.5% over the hop count scheme and reduced network traffic by about 0.5% compared to the hop count scheme.

A Basic Study on the Conversion of Sound into Color Image using both Pitch and Energy

  • Kim, Sung-Ill
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제12권2호
    • /
    • pp.101-107
    • /
    • 2012
  • This study describes a proposed method of converting an input sound signal into a color image by emulating human synesthetic skills which make it possible to associate an sound source with a specific color image. As a first step of sound-to-image conversion, features such as fundamental frequency(F0) and energy are extracted from an input sound source. Then, a musical scale and an octave can be calculated from F0 signals, so that scale, energy and octave can be converted into three elements of HSI model such hue, saturation and intensity, respectively. Finally, a color image with the BMP file format is created as an output of the process of the HSI-to-RGB conversion. We built a basic system on the basis of the proposed method using a standard C-programming. The simulation results revealed that output color images with the BMP file format created from input sound sources have diverse hues corresponding to the change of the F0 signals, where the hue elements have different intensities depending on octaves with the minimum frequency of 20Hz. Furthermore, output images also have various levels of chroma(or saturation) which is directly converted from the energy.

민감도 정보를 이용한 설계 방법 및 소프트웨어의 개발 (A Design Methodology and Software Development with Sensitivity Information)

  • 김용일;이정욱;윤준용;박경진
    • 대한기계학회논문집A
    • /
    • 제27권12호
    • /
    • pp.2092-2100
    • /
    • 2003
  • Sensitivity information has been used for linearization of nonlinear functions in optimization. Basically, sensitivity is a derivative of a function with respect to a design variable. Design sensitivity is repeatedly calculated in optimization. Since sensitivity calculation is extremely expensive, there are studies to directly use the sensitivity in the design process. When a small design change is required, an engineer makes design changes by considering the sensitivity information. Generally, the current process is performed one-by-one for design variables. Methods to exploit the sensitivity information are developed. When a designer wants to change multiple variables with some relationship, the directional derivative can be utilized. In this case, the first derivative can be calculated. Only small design changes can be made from the first derivatives. Orthogonal arrays can be used for moderate changes of multiple variables. Analysis of Variance is carried out to find out the regional influence of variables. A flow is developed for efficient use of the methods. A software system with the flow has been developed. The system can be easily interfaced with existing commercial systems through a file wrapping technique. The sensitivity information is calculated by finite difference method. Various examples are solved to evaluate the proposed algorithm and the software system.

NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계 (A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS)

  • 송종화;이현섭
    • 사물인터넷융복합논문지
    • /
    • 제9권6호
    • /
    • pp.23-28
    • /
    • 2023
  • Windows 운영체제는 다양한 데이터를 타임스탬프와 함께 로깅한다. 타임스탬프 변조는 안티포렌식의 한 행위로 용의자가 범행과 관련된 데이터의 타임스탬프 조작을 통해 흔적을 숨겨 분석관이 사건의 상황 재현을 어렵게 하여 수사를 지연시키거나 중요한 디지털 증거 획득을 실패하게 만든다. 따라서 이를 대처하기 위해 타임스탬프 변조를 탐지하는 여러 기법이 개발되었다. 그러나 만일 용의자가 타임스탬프 패턴을 인지하고 정교하게 시간을 조작하거나 변조 탐지에 활용되는 시스템 아티팩트를 변경한다면 탐지가 어렵다는 한계점을 가지고 있다. 본 논문에서는 용의자가 파일의 타임스탬프를 조작하더라도 저장장치의 속도에 비례하여 1초 미만의 단위값까지를 고려한 정교한 변경이 어려움에 착안하여, 타임스탬프 변조를 탐지할 수 있는 기법을 설계하고자 한다. 설계한 탐지 기법에서는 우선 변조가 의심스러운 파일의 타임스탬프를 확인하여 해당 파일의 쓰기시간을 확인한다. 그다음 확인된 시간을 저장장치의 성능을 고려하여 시간 내에 기록된 파일 크기와 대조한다. 마지막으로 특정 시간에 파일이 쓰인 총용량을 구하고 저장장치의 최대 입출력 성능과 비교하여 파일의 변조 여부를 탐지한다.