• Title/Summary/Keyword: 기능 모델링

Search Result 1,156, Processing Time 0.028 seconds

Analysis of User Reviews of Running Applications Using Text Mining: Focusing on Nike Run Club and Runkeeper (텍스트마이닝을 활용한 러닝 어플리케이션 사용자 리뷰 분석: Nike Run Club과 Runkeeper를 중심으로)

  • Gimun Ryu;Ilgwang Kim
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.11-19
    • /
    • 2024
  • The purpose of this study was to analyze user reviews of running applications using text mining. This study used user reviews of Nike Run Club and Runkeeper in the Google Play Store using the selenium package of python3 as the analysis data, and separated the morphemes by leaving only Korean nouns through the OKT analyzer. After morpheme separation, we created a rankNL dictionary to remove stopwords. To analyze the data, we used TF, TF-IDF and LDA topic modeling in text mining. The results of this study are as follows. First, the keywords 'record', 'app', and 'workout' were identified as the top keywords in the user reviews of Nike Run Club and Runkeeper applications, and there were differences in the rankings of TF and TF-IDF. Second, the LDA topic modeling of Nike Run Club identified the topics of 'basic items', 'additional features', 'errors', and 'location-based data', and the topics of Runkeeper identified the topics of 'errors', 'voice function', 'running data', 'benefits', and 'motivation'. Based on the results, it is recommended that errors and improvements should be made to contribute to the competitiveness of the application.

A Research about Open Source Distributed Computing System for Realtime CFD Modeling (SU2 with OpenCL and MPI) (실시간 CFD 모델링을 위한 오픈소스 분산 컴퓨팅 기술 연구)

  • Lee, Jun-Yeob;Oh, Jong-woo;Lee, DongHoon
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 2017.04a
    • /
    • pp.171-171
    • /
    • 2017
  • 전산유체역학(CFD: Computational Fluid Dynamics)를 이용한 스마트팜 환경 내부의 정밀 제어 연구가 진행 중이다. 시계열 데이터의 난해한 동적 해석을 극복하기위해, 비선형 모델링 기법의 일종인 인공신경망을 이용하는 방안을 고려하였다. 선행 연구를 통하여 환경 데이터의 비선형 모델링을 위한 Tensorflow활용 방법이 하드웨어 가속 기능을 바탕으로 월등한 성능을 보임을 확인하였다. 그럼에도 오프라인 일괄(Offline batch)처리 방식의 한계가 있는 인공신경망 모델링 기법과 현장 보급이 불가능한 고성능 하드웨어 연산 장치에 대한 대안 마련이 필요하다고 판단되었다. CFD 해석을 위한 Solver로 SU2(http://su2.stanford.edu)를 이용하였다. 운영 체제 및 컴파일러는 1) Mac OS X Sierra 10.12.2 Apple LLVM version 8.0.0 (clang-800.0.38), 2) Windows 10 x64: Intel C++ Compiler version 16.0, update 2, 3) Linux (Ubuntu 16.04 x64): g++ 5.4.0, 4) Clustered Linux (Ubuntu 16.04 x32): MPICC 3.3.a2를 선정하였다. 4번째 개발환경인 병렬 시스템의 경우 하드웨어 가속는 OpenCL(https://www.khronos.org/opencl/) 엔진을 이용하고 저전력 ARM 프로세서의 일종인 옥타코어 Samsung Exynos5422 칩을 장착한 ODROID-XU4(Hardkernel, AnYang, Korea) SBC(Single Board Computer)를 32식 병렬 구성하였다. 분산 컴퓨팅을 위한 환경은 Gbit 로컬 네트워크 기반 NFS(Network File System)과 MPICH(http://www.mpich.org/)로 구성하였다. 공간 분해능을 계측 주기보다 작게 분할할 경우 발생하는 미지의 바운더리 정보를 정의하기 위하여 3차원 Kriging Spatial Interpolation Method를 실험적으로 적용하였다. 한편 병렬 시스템 구성이 불가능한 1,2,3번 환경의 경우 내부적으로 이미 존재하는 멀티코어를 활용하고자 OpenMP(http://www.openmp.org/) 라이브러리를 활용하였다. 64비트 병렬 8코어로 동작하는 1,2,3번 운영환경의 경우 32비트 병렬 128코어로 동작하는 환경에 비하여 근소하게 2배 내외로 연산 속도가 빨랐다. 실시간 CFD 수행을 위한 분산 컴퓨팅 기술이 프로세서의 속도 및 운영체제의 정보 분배 능력에 따라 결정된다고 판단할 수 있었다. 이를 검증하기 위하여 4번 개발환경에서 운영체제를 64비트로 개선하여 5번째 환경을 구성하여 검증하였다. 상반되는 결과로 64비트 72코어로 동작하는 분산 컴퓨팅 환경에서 단일 프로세서 기반 멀티 코어(1,2,3번) 환경보다 보다 2.5배 내외 연산속도 향상이 있었다. ARM 프로세서용 64비트 운영체제의 완성도가 낮은 시점에서 추후 성공적인 실시간 CFD 모델링을 위한 지속적인 검토가 필요하다.

  • PDF

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Performance Evaluation of Workstation System within ATM Integrated Service Switching System using Mean Value Analysis Algorithm (MVA 알고리즘을 이용한 ATM 기반 통합 서비스 교환기 내 워크스테이션의 성능 평가)

  • Jang, Seung-Ju;Kim, Gil-Yong;Lee, Jae-Hum;Park, Ho-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.421-429
    • /
    • 2000
  • In present, ATM integrated switching system has been developed to a mixed modules that complexed switching system including maintenance, operation based on B-ISDN/LAN service and plug-in module, , which runs on workstation computer system. Meanwhile, workstation has HMI operation system feature including file system management, time management, graphic processing, TMN agent function. The workstation has communicated with between ATM switching module and clients. This computer system architecture has much burden messages communication among processes or processor. These messages communication consume system resources which are socket, message queue, IO device files, regular files, and so on. Therefore, in this paper we proposed new performance modeling with this system architecture. We will analyze the system bottleneck and improve system performance. In addition, in the future, the system has many additional features should be migrated to workstation system, we need previously to evaluate system bottleneck and redesign it. In performance model, we use queueing network model and the simulation package is used PDQ and C-program.

  • PDF

The Implementation of the Asymmertic Digital Subscriber Lines ( ADSL ) Interface Function in ATM Networks (ATM망에서 ADSL 정합장치 기능 구현)

  • So, Woon-Seob;Yang, Seong-Mo;Kim, Jin-Tae;Gang, Seok-Yeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.1014-1024
    • /
    • 1998
  • This paper describes the implementation of the asymmetric digital subscriber lines(ADSL) interface device function in ATM networks. The function of the ADSL interface devices has been achieved within a type of the ATM switch standard board. The board connected with the ADSL modem process the ATM physical layer function of data transfering asymmetrically. For the implementation of the board, we have modeled a worst case of the subscriber line conditions from the existing investigated results on the impairments such as crosstalk, impulse noise, and some important noises loaded to subscrber line. Also we have performed assessment tests in the full test environments. We have found that the board is met to the standard specification in condition with various test loops and the worst line conditions using an ADLS line simulator. And we confirmed that high-speed multimedia services are performed well with the ATM switch and the ADSL subscriber line. It is evaluted that this board can be used for high quality ADSL services through existed copper subscriber line.

  • PDF

Anti Air Warfare analysis & Design of the Patrol Killer Experiment Combat System by the Model-Based-Simulation (모델 기반의 시뮬레이션 기법을 이용한 차기 고속정(Patrol Killer Experiment)용 전투체계 대공전 기능의 분석 및 설계)

  • Hwang, Kun-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.4
    • /
    • pp.23-31
    • /
    • 2007
  • Anti-Air Warfare(AAW) functionality of the naval combat system is the key functionality to ensure the ship's survivability. We have applied a novel method using model-based-simulation to analyze and design AAW functionality of the Patrol Killer Experimemnt Combat System. In this approach, an AAW functional model is described with the FSM(Finite State Machine) and directly executed for the AAW simulation. After prototyping using model based simulation, Hardware In Loop Simulation(HILS) is conducted as the AAW functionality is interfaced with the other ones of the combat system for completing the integration of the system components. This incremental and iterative development approach based on the model based simulation can minimize the development risks and costs caused by the system complexity for military system, bringing out the merit of the rapid prototyping.

  • PDF

Numerical Analysis for the Characteristic Investigation of Homogenization Techniques Used for Equivalent Material Properties of Functionally Graded Material (기능경사 소재 등가 물성치 예측을 위한 균질화 기법의 특성분석을 위한 수치해석)

  • Cho, Jin-Rae;Choi, Joo-Hyoung;Shin, Dae-Sub
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.1
    • /
    • pp.13-20
    • /
    • 2008
  • Graded layers in which two different constituent particles are mixed are inserted into functionally graded material such that the volume fractions of constituent particles vary continuously and functionally over the entire material domain. The material properties of this dual-phase graded region, which is essential for the numerical analysis of the thermo-mechanical behavior of FGM, have been predicted by traditional homogenization methods. But, these methods are limited to predict the global equivalent material properties of FGMs because the detailed geometry information such as the particel shape and the dispersion structure is not considered. In this context, this study intends to investigate the characteristics of these homogenization methods through the finite element analysis utilizing the discrete micromechanics models of the graded layer, for various volume fractions and external loading conditions.

High-Speed, Large-Capacity ATM switching-chip Implemented by MCM Technology (고속 대용량 ATM Switching칩 구현을 위한 MCM기술 적응)

  • 김남우;허창우;임실묵
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.4
    • /
    • pp.791-797
    • /
    • 2001
  • In this paper, high-speed ,large-capacity ATM switching-chip is developed by MCM technology. MCM technology is suited for light-weight portable communications, mobile computing, high-frequency applications. For test of the developed MCM switching-chips, the simulating model is made by VHDL code of previously developed chip and input-output values of modeling pattern are obtained through the simulation. After the pattern values in chip-test machine are inserted , their results are compared with the simulation results. The design in this paper is simulated by synopsys design tool using SUN workstation and functions of chip is measured by TRILLIUM machine. Simulated and measured results have been compared, showing close agreement. Last, the MCM technique presented in this paper will provide useful insight into future designs.

  • PDF

Analysis of water withdrawal and quality of intake pipe with functional screen (기능성 스크린이 부착된 집수관의 취수량 및 수질 분석)

  • Yang, Jeong-Seok;Kim, Il-Hwan;Jeong, Jae-Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.50 no.8
    • /
    • pp.579-586
    • /
    • 2017
  • In order to analyze the quantitative water withdrawal amount of intake pipe with functional screen and to evaluate the improvement effect of the suspended solid and turbidity through the filter media, four-step research methods were suggested. In the first step, laboratory scale experiments were constructed to determine the constitution method of the sample device filter media. In the second step, sample device was constructed and the flow rate was observed through intake pipe with functional screen. In the third step, flow rate was observed at different turbidity conditions for each filter material, and the hydraulic conductivity was estimated using MODFLOW. Finally, numerical model was constructed with the MODFLOW for the sample device and the estimated hydraulic conductivities were applied to the third step and the amount of water withdrawal was analyzed. As a result of applying hydraulic conductivity at 0 NTU, 39.96% more withdrawal was calculated than the observed flow rate. On the other hand, when hydraulic conductivity was applied at 100~120 NTU, the difference in flow rates was 9.41%.

A Study on Security Evaluation for Secure Software Update Management System in Automotive (안전한 자동차용 SUMS 구축을 위한 보안성 평가기준 도출)

  • Seo, Jaewan;Kwak, Jiwon;Hong, Paul;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1151-1163
    • /
    • 2022
  • As wireless communication functions begin to be installed in vehicles, cyberattacks that exploit vulnerabilities in wireless communication functions are increasing. To respond to this, UNECE enacted the UN R156 regulation to safely distribute the software installed in the vehicle by using the wireless communication function. The regulations specify the requirements necessary to safely distribute the software for vehicles, but only the abstract requirements are presented without information on the components and detailed functions necessary to develop and implement the requirements. Therefore, in this paper, we propose a security evaluation standard that can evaluate whether a safe SUMS is built using threat modeling, a method for systematically analyzing security threats.