• Title/Summary/Keyword: next generation information system

Search Result 900, Processing Time 0.036 seconds

A Study on Method of Framework Data Update and Computing Land Change Ratio using UFID (UFID를 이용한 기본지리정보 갱신 및 지형변화율 산출 방안 연구)

  • Kim, Ju Han;Kim, Byung Guk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1D
    • /
    • pp.157-167
    • /
    • 2006
  • During the first and second NGIS projects by the Korean government, The first one (1995~2000) was limited on constructing geographic information and the second (2001~2005) was focused on circulation and practical use of geoinformation from the result of the first project. In the latter half of 2nd NGIS project, However, the geographic information from the NGIS projects have not been renewed even though there were significant geographical changes. The accurate renewal of geoinformation is a matter of great importance to the next generation industry (e.g. LBS, Ubiquitous, Telematics). In this respect, it is time to update the geographic information in the latter half of the second NGIS project. Therefore, It is not only important to build an accurate geoinformation but also rapid and correct renewal of the geoinformation. NGII (National Geographic Information Institute) has been studying for improvement of digital map that was constructed by the result of the 1st NGIS project. Through the construction of clean digital map, NGII constructed Framework Data to three kinds of formats (NGI, NDA, NRL). Framework Data was contained to other database, and provided the reference system of location or contents for combining geoinformation. Framework Data is consist of Data Set, Data Model and UFID (Unique Feature Identifier). It will be achieved as national infrastructure data. This paper attempts to explore a method of the update to practical framework data with realtime geoinformation on feature's creation, modification and destruction managed by 'Feature management agency' using UFID's process. Furthermore, it suggests a method which can provide important data in order to plan the Framework update with the land change ratio.

A Study of the Establishment of BIM Design Environment based on Virtual Desktop Infrastructure(VDI) of Cloud Computing Technology (클라우드 컴퓨팅 기술을 활용한 데스크탑 가상화 기반의 BIM 설계 환경 구축에 관한 연구)

  • Shin, Joonghwan;Lee, Kyuhyup;Kwon, Soonwook;Choi, Gyuseong;Ko, Hyunglyu
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.4
    • /
    • pp.118-128
    • /
    • 2015
  • Recently BIM technology has been expanded for using in construction project. Due to the high-cost of BIM infrastructure development, lack of regulations, lack of process and so forth, usage of BIM has been delayed than initial expectations. In design phase, especially, collaboration based on BIM system has been a key factor for successful next generation building project. Through the analysis of current research trends about IT technologies, virtualization and BIM service, data exchange such as drawings, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. The purpose of this study is to enable the cloud computing BIM server to provide several main functions such as editing models, 3D model viewing and checking, mark-up and snapshot in high-performance quality by proper design of VDI system. Concurrent client connection performance is a main technical index of VDI. Through testing of test-bed server client, developed VDI system's multi-connect control is evaluated. Performance-test result of BIM server VDI effect to development direction of cloud computing BIM service for commercialization.

Optimal Design of Network-on-Chip Communication Sturcture (Network-on-Chip에서의 최적 통신구조 설계)

  • Yoon, Joo-Hyeong;Hwang, Young-Si;Chung, Ki-Seok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.8
    • /
    • pp.80-88
    • /
    • 2007
  • High adaptability and scalability are two critical issues in implementing a very complex system in a single chip. To obtain high adaptability and scalability, novel system design methodology known as communication-based system design has gained large attention from SoC designers. NoC (Network-on-Chip) is such an on-chip communication-based design approach for the next generation SoC design. To provide high adaptability and scalability, NoCs employ network interfaces and routers as their main communication structures and transmit and receive packetized data over such structures. However, data packetization, and routing overhead in terms of run time and area may cost too much compared with conventional SoC communication structure. Therefore, in this research, we propose a novel methodology which automatically generates a hybrid communication structure. In this work, we map traditional pin-to-pin wiring structure for frequent and timing critical communication, and map flexible and scalable structure for infrequent, or highly variable communication patterns. Even though, we simplify the communication structure significantly through our algorithm the connectivity or the scalability of the communication modules are almost maintained as the original NoC design. Using this method, we could improve the timing performance by 49.19%, and the area taken by the communication structure has been reduced by 24.03%.

A Study of a Fast Booting Technique for a New memory+DRAM Hybrid Memory System (뉴메모리+DRAM 하이브리드 메모리 시스템에서의 고속부팅 기법 연구)

  • Song, Hyeon Ho;Moon, Young Je;Park, Jae Hyeong;Noh, Sam H.
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.434-441
    • /
    • 2015
  • Next generation memory technologies, which we denote as 'new memory', have both non-volatile and byte addressable properties. These characteristics are expected to bring changes to the conventional computer system structure. In this paper, we propose a fast boot technique for hybrid main memory architectures that have both new memory and DRAM. The key technique used for fast booting is write-tracking. Write-tracking is used to detect and manage modified data detection and involves setting the kernel region to read-only. This setting is used to trigger intentional faults upon modification requests. As the fault handler can detect the faulting address, write-tracking makes use of the address to manage the modified data. In particular, in our case, we make use of the MMU (Memory Management Unit) translation table. When a write occurs to the boot completed state, write-tracking preserves the original state of the modified address of the kernel region to a particular location, and execution continues. Upon booting, the fast booting process restores the preserved data to the original kernel region allowing rapid system boot-up. We develop the fast booting technique in an actual embedded board equipped with new memory. The boot time is reduced to less than half a second compared to around 15 seconds that is required for the original system.

Comparison of the Priority of Required Capabilities of the Warrior Platform by the Types of Military Unit through AHP Analysis (AHP 분석을 통한 부대 임무유형별 워리어플랫폼 요구능력 우선순위 비교)

  • Kim, Wukki;Shin, Kyuyong;Jo, Seongsik;Baek, Seungho;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.262-269
    • /
    • 2021
  • The Ministry of National Defense is re-establishing the role of the Army in accordance with the defense reform and is promoting the Warrior Platform, a next-generation individual combat system. The Warrior Platform project is divided into three stages and is being promoted. In the first stage, the quality and performance of individual items are improved, in the second stage, items between system development are integrated, and in the third stage, the combat capability is maximized by developing an integrated unit weapon system. In this paper, detailed sub-items for the five essential required competencies (survival, lethality, mobility, sustainability, Communication) that are considered for building an effective warrior platform are presented. We also present a plan that can be used to prepare a specific master plan for the Army's Warrior Platform project by using Analytic Hierarchy Process(AHP) and selecting the priority of the five required capabilities and detailed sub-items for different unit types. As a result of analyzing the priorities of the four types of units with different mission types, we find that there are differences for each unit. These results are expected to be used as useful reference materials for setting the future direction for the development of warrior platform.

A Study for Factors Influencing the Usage Increase and Decrease of Mobile Data Service: Based on The Two Factor Theory (모바일 데이터 서비스 사용량 증감에 영향을 미치는 요인들에 관한 연구: 이요인 이론(Two Factor Theory)을 바탕으로)

  • Lee, Sang-Hoon;Kim, Il-Kyung;Lee, Ho-Geun;Park, Hyun-Jee
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.97-122
    • /
    • 2007
  • Conventional networking and telecommunications infrastructure characterized by wires, fixed location, and inflexibility is giving way to mobile technologies. Numerous research reports point to the ultimate domination of wireless communication. With the increasing prevalence of advanced cell-phones, various mobile data services (hereafter MDS) are gaining popularity. Although cellular networks were originally introduced for voice communications, statistics indicate that data services are replacing the matured voice service as the growth engine for telecom service providers. For example, SK Telecom, the Korea's largest mobile service provider, reported that 25.6% of revenue and 28.5% of profit came from MDS in 2006 and the share is growing. Statistics also indicate that, in 2006, the average revenue per user (ARPU) for voice didn't change but MDS grew seven percents from the previous year, further highlighting its growth potential. MDS is defined "as an assortment of digital data services that can be accessed using a mobile device over a wide geographic area." A variety of MDS have been deployed, with a few reaching the status of killer applications. Many of them need to access the Internet through the cellular-phone infrastructure. In the past, when the cellular network didn't have acceptable bandwidth for data services, SMS (short messaging service) dominated MDS. Now, Internet-ready, next-generation cell-phones are driving rich digital data services into the fabric of everyday life, These include news on various topics, Internet search, mapping and location-based information, mobile banking and gaming, downloading (i.e., screen savers), multimedia streaming, and various communication services (i.e., email, short messaging, messenger, and chaffing). The huge economic stake MDS has on its stakeholders warrants focused research to understand associated dynamics behind its adoption. Lyytinen and Yoo(2002) pointed out the limitation of traditional adoption models in explaining the rapid diffusion of innovations such as P2P or mobile services. Also, despite the increasing popularity of MDS, unexpected drop in its usage is observed among some people. Intrigued by these observations, an exploratory study was conducted to examine decision factors of MDS usage. Data analysis revealed that the increase and decrease of MDS use was influenced by different forces. The findings of the exploratory study triggered our confirmatory research effort to validate the uni-directionality of studied factors in affecting MDS usage. This differs from extant studies of IS/IT adoption that are largely grounded on the assumption of bi-directionality of explanatory variables in determining the level of dependent variables (i.e., user satisfaction, service usage). The research goal is, therefore, to examine if increase and decrease in the usage of MDS are explained by two separate groups of variables pertaining to information quality and system quality. For this, we investigate following research questions: (1) Does the information quality of MDS increase service usage?; (2) Does the system quality of MDS decrease service usage?; and (3) Does user motivation for subscribing MDS moderate the effect information and system quality have on service usage? The research questions and subsequent analysis are grounded on the two factor theory pioneered by Hertzberg et al(1959). To answer the research questions, in the first, an exploratory study based on 378 survey responses was conducted to learn about important decision factors of MDS usage. It revealed discrepancy between the influencing forces of usage increase and those of usage decrease. Based on the findings from the exploratory study and the two-factor theory, we postulated information quality as the motivator and system quality as the de-motivator (or hygiene) of MDS. Then, a confirmative study was undertaken on their respective role in encouraging and discouraging the usage of mobile data service.

A Literature Review and Classification of Recommender Systems on Academic Journals (추천시스템관련 학술논문 분석 및 분류)

  • Park, Deuk-Hee;Kim, Hyea-Kyeong;Choi, Il-Young;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.139-152
    • /
    • 2011
  • Recommender systems have become an important research field since the emergence of the first paper on collaborative filtering in the mid-1990s. In general, recommender systems are defined as the supporting systems which help users to find information, products, or services (such as books, movies, music, digital products, web sites, and TV programs) by aggregating and analyzing suggestions from other users, which mean reviews from various authorities, and user attributes. However, as academic researches on recommender systems have increased significantly over the last ten years, more researches are required to be applicable in the real world situation. Because research field on recommender systems is still wide and less mature than other research fields. Accordingly, the existing articles on recommender systems need to be reviewed toward the next generation of recommender systems. However, it would be not easy to confine the recommender system researches to specific disciplines, considering the nature of the recommender system researches. So, we reviewed all articles on recommender systems from 37 journals which were published from 2001 to 2010. The 37 journals are selected from top 125 journals of the MIS Journal Rankings. Also, the literature search was based on the descriptors "Recommender system", "Recommendation system", "Personalization system", "Collaborative filtering" and "Contents filtering". The full text of each article was reviewed to eliminate the article that was not actually related to recommender systems. Many of articles were excluded because the articles such as Conference papers, master's and doctoral dissertations, textbook, unpublished working papers, non-English publication papers and news were unfit for our research. We classified articles by year of publication, journals, recommendation fields, and data mining techniques. The recommendation fields and data mining techniques of 187 articles are reviewed and classified into eight recommendation fields (book, document, image, movie, music, shopping, TV program, and others) and eight data mining techniques (association rule, clustering, decision tree, k-nearest neighbor, link analysis, neural network, regression, and other heuristic methods). The results represented in this paper have several significant implications. First, based on previous publication rates, the interest in the recommender system related research will grow significantly in the future. Second, 49 articles are related to movie recommendation whereas image and TV program recommendation are identified in only 6 articles. This result has been caused by the easy use of MovieLens data set. So, it is necessary to prepare data set of other fields. Third, recently social network analysis has been used in the various applications. However studies on recommender systems using social network analysis are deficient. Henceforth, we expect that new recommendation approaches using social network analysis will be developed in the recommender systems. So, it will be an interesting and further research area to evaluate the recommendation system researches using social method analysis. This result provides trend of recommender system researches by examining the published literature, and provides practitioners and researchers with insight and future direction on recommender systems. We hope that this research helps anyone who is interested in recommender systems research to gain insight for future research.

Study of Registry Designing for the Hydrographic Data Standard Technology Operation (수로정보 표준기술 운용을 위한 등록소 설계 연구)

  • Kim, Ho-Yoon;Oh, Se-Woong;Shim, Woo-Sung;Suh, Sang-Hyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.06a
    • /
    • pp.87-88
    • /
    • 2012
  • The IHO developed the S-100 standard for Digital Hydrographic Data in order to assist the proper and efficient use of hydrographic data and information for the safety of navigation and the protection of marine environment. The former model, S-57, was considered outdated to be utilized as the basis for the next-generation Electronic Chart(ENC) product specification. The key feature of the S-100 standard is the use of Registry and its components, Registers. This online-based Registry provides a universal standard that can be implemented in the actual performance of the navigation system with convenience. In the current situation, the only registry is owned by the IHO and it is available to domain experts. However, since S-100 is an international standard operated by an international organization, the process of the changes and updates of the data requires time before immediate implementation when demanded. Therefore, regarding the safety of navigation of the domestic users and mariners, a separate domestic registry is necessary to develop a domestic Information Registry. This study specifically aims to build a Registry based on IHO published S-99 through designing an adequate website dedicated for its purpose to provide collection of definitions and hydrographic data.

  • PDF

40Gb/s Foward Error Correction Architecture for Optical Communication System (광통신 시스템을 위한 40Gb/s Forward Error Correction 구조 설계)

  • Lee, Seung-Beom;Lee, Han-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.2
    • /
    • pp.101-111
    • /
    • 2008
  • This paper introduces a high-speed Reed-Solomon(RS) decoder, which reduces the hardware complexity, and presents an RS decoder based FEC architecture which is used for 40Gb/s optical communication systems. We introduce new pipelined degree computationless modified Euclidean(pDCME) algorithm architecture, which has high throughput and low hardware complexity. The proposed 16 channel RS FEC architecture has two 8 channel RS FEC architectures, which has 8 syndrome computation block and shared single KES block. It can reduce the hardware complexity about 30% compared to the conventional 16 channel 3-parallel FEC architecture, which is 4 syndrome computation block and shared single KES block. The proposed RS FEC architecture has been designed and implemented with the $0.18-{\mu}m$ CMOS technology in a supply voltage of 1.8 V. The result show that total number of gate is 250K and it has a data processing rate of 5.1Gb/s at a clock frequency of 400MHz. The proposed area-efficient architecture can be readily applied to the next generation FEC devices for high-speed optical communications as well as wireless communications.

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria (상관도와 임계치 방식을 이용한 다중검출 비대칭 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.726-734
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.