• Title/Summary/Keyword: 데이터 호환성

Search Result 490, Processing Time 0.027 seconds

Design and Implementation of an Electronic Document Management System in Intranet Environment (인트라넷 환경에서 전자문서관리시스템 설계 및 구현)

  • 박창서;고형화
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.10
    • /
    • pp.1-7
    • /
    • 1999
  • As our society turns into the information age we ate witnessing increased productivity by employing electronic document management replacing the traditional paper-based document management and by various application programs using the intranet technology This paper describes design and implementation of an electronic document management system in intranet environment. The user and general administration systems made use of Internet Explorer 4.0 and the related technology therefore it solved the problems of client systems, which were largely dependent on hardware platform. The server and the scan station systems, which require proprietary device driver, were implemented client/server system based on TCP/IP. The jukebox system managing storage of vast amount of data was built by API supporting standard SCSI-ll. The GUI of the jukebox module was employed Motif to enhance the compatibility and ease of use.

  • PDF

A Simulation & Audio/Video Input Control Device for Co-work Environment (공동작업환경을 위한 시물레이션과 오디오/비디오 입력 제어장치 구현)

  • 정재영;김석수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.2
    • /
    • pp.29-35
    • /
    • 1998
  • In this paper, the proposed audio/video control device for multiple user in the multimedia platform is changed for the better a disadvantage that must get one computer per participant to process a floor mode needed for interactive collaboration in the multimedia based distance education. It also proposed simulator of co-work environment that included multimedia data. This developed to proceed a multimedia distance education efficiently and sharing a computer among multiple users. Therefore, this is resulting in a reduction the cost needed to build a multimedia distance education system as well as totally simplified the organization of system. It also offers compatibility and generality, interfacing with the printer port of standard PC supporting the bi-direction mode.

  • PDF

A Formal Specification of Fuzzy Object Inference Model for Supporting Disjunctive Fuzzy Information (이접적 퍼지 정보를 지원하는 퍼지 객체 추론 모델의 정형화)

  • 양형정;양재동
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.184-197
    • /
    • 2001
  • In this paper, we provide the formal specification of a fuzzy object inference language and propose ICOT(Integrated C-Object Tool) as its implementation for knowledge-based programming with the disjunctive fuzzy information. The novelty of our model is that it seamlessly combines object inference and fuzzy reasoning into a unified framework without compromising a compatibility with extant databases, especially object-relational ones. In this model most of the object-oriented paradigm is successfully expressed in terms of relational constructs, tailoring fuzzy reasoning style to be well suited to the framework of the databases. It turns out to be useful in preserving its conceptual simplicity as well, since simple-to-use is one of important criteria in designing the databases. Additionally this model considerably enhanced the semantic expressiveness of data allowing disjunctive fuzzy information.

  • PDF

Improved Authentication and Data Protection Protocol of Passive RFID Security Tag and Reader (개선된 수동형 RFID 보안태그와 리더의 인증 및 데이터 보호 프로토콜)

  • Yang, Yeon-Hyun;Kim, Sun-Young;Lee, Pil-Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.85-94
    • /
    • 2010
  • As an automatic identification technology, in which electronic tags are attached to items and system auto-identifies informations of the items using wireless communication technology, use of RFID system is increasing in various fields. According to that, related security problems are becoming important issue. Up to now, many authentication protocols have been proposed to solve security problem of RFID system. In this paper, We show that the RFID authentication protocols in [9, 10], which are compatible with Type C RFID system in ISO 18000-6 Amd1[8], are vulnerable to a spoofing attack. In addition, we propose improved protocols having small additional cost over the original protocols.

A Study on the Identification of Open Source License Compatibility Violations (오픈 소스 라이선스 양립성 위반 식별 기법 연구)

  • Lee, Dong-Gun;Seo, Yeong-Seok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.12
    • /
    • pp.451-460
    • /
    • 2018
  • Open source software is used in various ways when developing new softwares all around the world. It requires rights and responsibilities as a form of an open source software license. Because the license is a contract between original software developers of the open source software and users, we must follow it and extremely cautious to avoid copyright infringement. In particular, we must verify license compatibility when we develop new software using the existing open source softwares. However, license violation issues always occur and lead to lawsuits so that they are having an adverse effect on the open source software ecosystem. Thus, in this paper, we propose a method, OSLC-Vid, to identify license violations whether compatibility issues exist between open source softwares. The proposed method is verified by the experiments to detect actual license violation cases.

A Study on Recordkeeping System in Australia (호주의 레코드키핑 시스템에 대한 연구)

  • Lee, Young-Sook
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.4 no.2
    • /
    • pp.76-90
    • /
    • 2004
  • There had been substantial demand for record management system with which to efficiently control the information circulation processes, involving accumulation of recorded materials, classification of information resources, and users access to them. It converged to a collaboration of Australian federation, and Sydney Records Centre and finally induced Australian Standard Records Management, commonly known as AS 4390. AS 4390 served later as a model for International Standard of Record Management. This paper introduces the current undertaking of Recordkeeping system development in Australia, which stems from the line of AS 4390 by analysing exhibited research approaches. The analysis includes the definition, regime of Recordkeeping system, design and implementing of guidelines of Recordkeeping System and information on metadata projects. It also highlights the necessity for standardization, as is the prime factor in promoting inter-linking of Tabularium on New Southwales State, CRS(Commonwealth Record Series), database system of Canberra National Archives and Australian Government Locator Service. From year 2005, as dictates, any record management system, serving public agency will be required to adapt Professional Archives Management System, which, by far, will enhance the inter-compatibility. In its application, the government need Thesaurus to eliminate possible redundancy in use of terminology and to promote correct usage of words.

A study on the classification systems of domestic security fields (국내 보안 분야의 분류 체계에 관한 연구)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.81-88
    • /
    • 2015
  • Recently the Security fields is emerged as a important issue in the world, While a variety of techniques such as a Cloud Computing or a Internet Of Things appeared. In these circumstances, The domestic security fields are divided into the Information Security, the Physical Security and the Convergence Security. and among these security fields, Convergence security is attracted much attention from various industries. the classification systems of a new field Convergence Security has become a very important criteria such about the Statistics calculation, the Analysis of status industry sector and the Road maps. However, In the domestic, The related institutions classified each other differently the Convergence Security Classification. so it is urgently needed a domestic security fields systematic classification due to the problems such as lack of reliability of the accuracy, compatibility of a data. Therefore, this paper will be analyzed to the characteristics of the domestic security classification systems by the cases. and will be proposed the newly improved classification system, to be possible to addition or deletion of an classification entries, and to be easy expanded according to the new technology trends. this proposed to classification system is expected to be utilized as a basis for the construct of a domestic security classification system in a future.

MPEG-2 TS Header Extension for Efficient HTTP Adaptive Stream of SVC/MVC (SVC/MVC의 효율적인 HTTP 적응 스트리밍을 위한 MPEG-2 TS 헤더의 확장)

  • Jang, Euy-Doc;Kim, Jae-Gon;Lee, Jin-Young;Kang, Jung-Won;Bae, Seong-Jun
    • Journal of Broadcast Engineering
    • /
    • v.16 no.3
    • /
    • pp.520-529
    • /
    • 2011
  • In this paper, we propose the extension of the MPEG-2 Transport Stream (TS) header for efficient adaptation of multi-layer coded video such as scalable video coding (SVC) and multiview video coding (MVC) in the HTTP streaming. First of all, the limit of the existing TS in terms of flexible adaptation of multi-layer video is investigated, and the signaling by extending TS header is proposed to provide efficient adaptation in a TS level. The proposed extension utilizes the private data field in the adaptation field of TS header to signal scalability and/or view information, which enable us to support diverse adaptation that suits underlying constraints of client capabilities, network conditions and user preferences. In short, the extension enables adaptation of scalable video with full scalability as well as view selection of multiview video in a TS level while keeping backward compatibility with the existing TS syntax/semantics. The performance of the proposed extension is compared with the existing adaptation using PID (packet ID) in terms of efficiency and complexity of adaptation. Furthermore, the increase of TS overhead caused by proposed extension is analyzed and an extension scheme to minimized the overhead is proposed.

Facilitating Web Service Taxonomy Generation : An Artificial Neural Network based Framework, A Prototype Systems, and Evaluation (인공신경망 기반 웹서비스 분류체계 생성 프레임워크의 실증적 평가)

  • Hwang, You-Sub
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.33-54
    • /
    • 2010
  • The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component based software development to promote application interaction both within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web service repositories not only be well-structured but also provide efficient tools for developers to find reusable Web service components that meet their needs. As the potential of Web services for service-oriented computing is being widely recognized, the demand for effective Web service discovery mechanisms is concomitantly growing. A number of public Web service repositories have been proposed, but the Web service taxonomy generation has not been satisfactorily addressed. Unfortunately, most existing Web service taxonomies are either too rudimentary to be useful or too hard to be maintained. In this paper, we propose a Web service taxonomy generation framework that combines an artificial neural network based clustering techniques with descriptive label generating and leverages the semantics of the XML-based service specification in WSDL documents. We believe that this is one of the first attempts at applying data mining techniques in the Web service discovery domain. We have developed a prototype system based on the proposed framework using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web service repositories. We report on some preliminary results demonstrating the efficacy of the proposed approach.

Design and Implementation of Smart Home Security Monitoring System based on Raspberry Pi2 (라즈베리 파이2 기반의 스마트 홈 시큐리티 모니터링 시스템 설계 및 구현)

  • Lee, Hyoung-Ro;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.131-136
    • /
    • 2016
  • In this paper, we propose an Raspberry Pi2-based smart home security monitoring system. Proposed home security monitoring system was configured using a relatively tractable main processor raspberry pi2, ultrasonic sensors, and PIR sensors. In addition, The picamera is compatible with raspberry pi2 was connected to the servo motor. And by driving the attacker's location the video was recording. The Web server stores data of the recorded image and the sensor, and provides a web page to enable the monitoring at all remote locations. When examining efficiency of proposed home security monitoring system it was found that proposed system is easier to be made than existing home security system and is able to minimize the blind spot of the camera by using servo motor and is efficient and convenient and stable as it enables a user to handle an error in person and it uses reliable data.