• Title/Summary/Keyword: portability

Search Result 578, Processing Time 0.035 seconds

Development of an SWRL-based Backward Chaining Inference Engine SMART-B for the Next Generation Web (차세대 웹을 위한 SWRL 기반 역방향 추론엔진 SMART-B의 개발)

  • Song Yong-Uk;Hong June-Seok;Kim Woo-Ju;Lee Sung-Kyu;Youn Suk-Hee
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.2
    • /
    • pp.67-81
    • /
    • 2006
  • While the existing Web focuses on the interface with human users based on HTML, the next generation Web will focus on the interaction among software agents by using XML and XML-based standards and technologies. The inference engine, which will serve as brains of software agents in the next generation Web, should thoroughly understand the Semantic Web, the standard language of the next generation Web. As abasis for the service, the W3C (World Wide Web Consortium) has recommended SWRL (Semantic Web Rule Language) which had been made by compounding OWL (Web Ontology Language) and RuleML (Rule Markup Language). In this research, we develop a backward chaining inference engine SMART-B (SeMantic web Agent Reasoning Tools -Backward chaining inference engine), which uses SWRL and OWL to represent rules and facts respectively. We analyze the requirements for the SWRL-based backward chaining inference and design analgorithm for the backward chaining inference which reflects the traditional backward chaining inference algorithm and the requirements of the next generation Semantic Web. We also implement the backward chaining inference engine and the administrative tools for fact and rule bases into Java components to insure the independence and portability among different platforms under the environment of Ubiquitous Computing.

  • PDF

Study of Mechanical Characteristics of Electric Cupping Apparatus in Korea for Suggestion of its Assessment Guideline (국내 평가 가이드 라인 제시를 위한 전동식 부항기의 특성 조사에 관한 연구)

  • Yi, Seung-Ho;Kim, Eun-Jung;Shin, Kyung-Hoon;Nam, Dong-Woo;Kang, Jung-Won;Lee, Seung-Deok;Lee, Hye-Jung;Lee, Jae-Dong;Kim, Kap-Sung
    • Journal of Acupuncture Research
    • /
    • v.27 no.1
    • /
    • pp.1-10
    • /
    • 2010
  • Objectives : The mechanical properties of Korean electric cupping systems are studied via experimental measurements. The study aimed at establishing the fundamentals of industrialization and systemization of oriental medicine device industry, as well as improving the quality of life for many Koreans. Methods : We reviewed the studies on traditional cupping as well as modern one to fine necessary factors for electric cupping systems. To characterize the mechanical properties of Korean electric cupping systems, we measured the pressure characteristics of commercially available electric cupping system by using an automatic pressure acquisition system and a standard cup. The pumping capability was checked at 40 seconds, and the stability of the suction cup was checked at 600 seconds. We also acquired the noise level of each system in clinical setting. To check the portability of each system, we also measured its physical dimensions. We scrutinized system manuals provided by the system manufacturers. Results : It took less than 5 second to reach the pressure if the connection between the air hose and the vacuum valve of the cupping system was secure. Pressure diminished to no more than 10% for 600s for all systems. Noise levels were 55~70 dB. Increase in pressure was too fast to control for a designated vacuum level except for one product. Conclusions : The Pumping ability of the systems is impressive and reliable. Pressure retention ability of each cup is quite reliable and reproducible. Therefore, their mechanical performances were worthy of recommendation. Some of them had noise level higher than 60 dB and they were bothersome. It was also suggested that the control for low to middle pressure needed to be accomplished by the cupping system.

Bio-sensing Data Synchronization for Peer-to-Peer Smart Watch Systems (피어-투-피어 스마트워치 시스템을 위한 바이오 센싱 데이터 동기화)

  • LEE, Tae-Gyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.813-818
    • /
    • 2020
  • Recently, with the rapid increase in technology and users of smart devices, the smart watch market has grown, and its utility and usability are continuously expanding. The strengths of smartwatches are wearable portability, application immediacy, data diversity and real-time capability. Despite these strengths, smartwatches have limitations such as battery limitations, display and user interface size limitations, and memory limitations. In addition, there is a need to supplement developers and standard devices, operating system standard models, and killer application modules. In particular, monitoring and application of user's biometric information is becoming a major service for smart watches. The biometric information of such a smart watch generates a large amount of data in real time. In order to advance the biometric information service, stable peer-to-peer transmission of sensing data to a remote smartphone or local server storage must be performed. We propose a synchronization method to ensure wireless remote peer-to-peer transmission stability in a smart watch system. We design a wireless peer-to-peer transmission process based on this synchronization method, analyze asynchronous transmission process and proposed synchronous transmission process, and propose a transmission efficiency method according to an increase in transmission amount.

A dryout mechanism model for rectangular narrow channels at high pressure conditions

  • Song, Gongle;Liang, Yu;Sun, Rulei;Zhang, Dalin;Deng, Jian;Su, G.H.;Tian, Wenxi;Qiu, Suizheng
    • Nuclear Engineering and Technology
    • /
    • v.52 no.10
    • /
    • pp.2196-2203
    • /
    • 2020
  • A dryout mechanism model for rectangular narrow channels at high pressure conditions is developed by assuming that the Kelvin-Helmholtz instability triggered the occurrence of dryout. This model combines the advantages of theoretical analysis and empirical correlation. The unknown coefficients in the theoretical derivation are supported by the experimental data. Meanwhile, the decisive restriction of the experimental conditions on the applicability of the empirical correlation is avoided. The expression of vapor phase velocity at the time of dryout is derived, and the empirical correlation of liquid film thickness is introduced. Since the CHF value obtained from the liquid film thickness should be the same as the value obtained from the Kelvin-Helmholtz critical stability under the same condition, the convergent CHF value is obtained by iteratively calculating. Comparing with the experimental data under the pressure of 6.89-13.79 MPa, the average error of the model is -15.4% with the 95% confidence interval [-20.5%, -10.4%]. And the pressure has a decisive influence on the prediction accuracy of this model. Compared with the existing dryout code, the calculation speed of this model is faster, and the calculation accuracy is improved. This model, with great portability, could be applied to different objects and working conditions by changing the expression of the vapor phase velocity when the dryout phenomenon is triggered and the calculation formula of the liquid film.

The e-Business Component Construction based on Distributed Component Specification (분산 컴포넌트 명세를 통한 e-비즈니스 컴포넌트 구축)

  • Kim, Haeng-Gon;Choe, Ha-Jeong;Han, Eun-Ju
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.705-714
    • /
    • 2001
  • The computing systems of today expanded business trade and distributed business process Internet. More and more systems are developed from components with exactly reusability, independency, and portability. Component based development is focused on advanced concepts rater than passive manipulation or source code in class library. The primary component construction in CBD. However, lead to an additional cost for reconstructing the new component with CBD model. It also difficult to serve component information with rapidly and exactly, which normalization model are not established, frequency user logging in Web caused overload. A lot of difficult issues and aspects of Component Based Development have to be investigated to develop good component-based products. There is no established normalization model which will guarantee a proper treatment of components. This paper elaborates on some of those aspects of web application to adapt user requirement with exactly and rapidly. Distributed components in this paper are used in the most tiny size on network and suggest the network-addressable interface based on business domain. We also discuss the internal and external specifications for grasping component internal and external relations of user requirements to be analyzed. The specifications are stored on Servlets after dividing the information between session and entity as an EJB (Enterprise JavaBeans) that are reusable unit size in business domain. The reusable units are used in business component through query to get business component. As a major contribution, we propose a systems model for registration, auto-arrange, search, test, and download component, which covers component reusability and component customization.

  • PDF

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

A Technique to Specify and Generate .NET Components in MDA/PSM for Pervasive Service (MDA/PSM상에서 퍼베이시브 서비스를 지원하는 닷넷 컴포넌트의 명세 및 생성 기법)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.635-645
    • /
    • 2007
  • Component technology has been widely accepted as an effective way for building software systems with reusable components, and Microsoft (MS) .NET is one of the recent representative component technologies. Model Driven Architecture (MDA) is a new development paradigm which generates software by transforming design models automatically and incrementally. Transformation of structural models in MDA has been successfully applied. However, transformation of dynamic models and pervasive services, such as transaction service, security service, synchronization service and object pooling are largely remains as an area for further research. The recent enterprise system has multi tier distributed architecture, and the functionality of early mentioned pervasive services is essential for this architecture. .NET platform can implement Component Object Model+ (COM+) component for supporting pervasive services by specify Attribute code. In this paper, we specify the functionalities of the COM+ component offering pervasive services, and then those functionalities are defined by UML profile. By using the profile, the Platform Specific Model (PSM) for .NET/C# is specified, and .NET components are automatically generated through our tool. The development productivity, extensibility, portability, and maintenance of software can be dramatically improved by using of the proposed methods.

Design and Implementation of an Adaptive User Interface for Home Network Environments (홈 네트워크 환경을 위한 적응형 사용자 인터페이스 설계 및 구현)

  • Jung, Jae-Hwan;Jang, Hyun-Su;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartB
    • /
    • v.15B no.1
    • /
    • pp.37-44
    • /
    • 2008
  • With the growing proliferation of mobile computing devices, several industrial and academic research groups have a vigorous studying to remote control for various appliances with mobile devices such as Notebooks, PDAs, and Smartphones in home network environments. We can utilize the good points of mobile devices such as portability and usability so that we can remote control and manage the mobile devices connected on home networks anytime, anywhere. However, mobile devices use different languages. Therefore, they cause some problems because their interfaces and the methods of operation are different each other. To solve these problems, there are two consideration. First, we may be solved development of the user interface and difficulty of maintenance in order to control various heterogeneous devices. Second, we may provide the user interface which is dynamically adapting user's preferences and device characteristics. To satisfy these considerations, we describe the design of an adaptive user interface for home network environments using the UIML (User Interface Markup Language) based on XML (eXtensible Markup Language) and the profile information of the user and device. Therefore, we present several implementation examples that show how the framework can form the basis of prototypical applications.

Automatic Generator for Component-Based Web Database Applications (컴포넌트 기반 웹 데이터베이스 응용의 자동 생성기)

  • Eum, Doo-Hun;Ko, Min-Jeung;Kang, I-Zzy
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.371-380
    • /
    • 2004
  • E-commerce is in wide use with the rapid advance of internet technology. The main component of an e-commerce application is a Web-based database application. Currently, it takes a lot of time in developing Web applications since developers should write codes manually or semi-automatically for user interface forms and query processing of an application. Therefore, the productivity increase of Web-based database applications has been demanded. In this paper, we introduce a software tool, which we call the WebSiteGen2, that automatically generates the forms that we used as user interfaces and the EJB/JSP components that process the query made through the forms for an application that needs a new database or uses an existing database. The WebSiteGen2 thus increases the productivity, reusability, expandibility, and portability of an application by automatically generating a 3-tier application based on component technology. Moreover, one user interface form that are generated by the WebSiteGen2 provides information on an interested entity as well as information on all the directly or indirectly related entities with the interested one. In this paper, we explain the functionality and implementation of the WebSiteGen2 and then show the merits by comparing the WebSiteGen2 to the other commercial Web application generators.

A Ranking Cleaning Policy for Embedded Flash File Systems (임베디드 플래시 파일시스템을 위한 순위별 지움 정책)

  • Kim, Jeong-Ki;Park, Sung-Min;Kim, Chae-Kyu
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.399-404
    • /
    • 2002
  • Along the evolution of information and communication technologies, manufacturing embedded systems such as PDA (personal digital assistant), HPC (hand -held PC), settop box. and information appliance became realistic. And RTOS (real-time operating system) and filesystem have been played essential re]os within the embedded systems as well. For the filesystem of embedded systems, flash memory has been used extensively instead of traditional hard disk drives because of embedded system's requirements like portability, fast access time, and low power consumption. Other than these requirements, nonvolatile storage characteristic of flash memory is another reason for wide adoption in industry. However, there are some technical challenges to cope with to use the flash memory as an indispensable component of the embedded systems. These would be relatively slow cleaning time and the limited number of times to write-and-clean. In this paper, a new cleaning policy is proposed to overcome the problems mentioned above and relevant performance comparison results will be provided. Ranking cleaning policy(RCP) decides when and where to clean within the flash memory considering the cost of cleaning and the number of times of cleaning. This method will maximize not only the lifetime of flash memory but also the performance of access time and manageability. As a result of performance comparison, RCP has showed about 10 ~ 50% of performance evolution compared to traditional policies, Greedy and Cost-benefit methods, by write throughputs.