• Title/Summary/Keyword: 웹 서비스 적합성

Search Result 163, Processing Time 0.027 seconds

A Study of 3D Modeling of Compressed Urban LiDAR Data Using VRML (VRML을 이용한 도심지역 LiDAR 압축자료의 3차원 표현)

  • Jang, Young-Woon;Choi, Yun-Woong;Cho, Gi-Sung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.2
    • /
    • pp.3-8
    • /
    • 2011
  • Recently, the demand for enterprise for service map providing and portal site services of a 3D virtual city model for public users has been expanding. Also, accuracy of the data, transfer rate and the update for the update for the lapse of time emerge are considered as more impertant factors, by providing 3D information with the web or mobile devices. With the latest technology, we have seen various 3D data through the web. With the VRML progressing actively, because it can provide a virtual display of the world and all aspects of interaction with web. It offers installation of simple plug-in without extra cost on the web. LiDAR system can obtain spatial data easily and accurately, as supprted by numerous researches and applications. However, in general, LiDAR data is obtained in the form of an irregular point cloud. So, in case of using data without converting, high processor is needed for presenting 2D forms from point data composed of 3D data and the data increase. This study expresses urban LiDAR data in 3D, 2D raster data that was applied by compressing algorithm that was used for solving the problems of large storage space and processing. For expressing 3D, algorithm that converts compressed LiDAR data into code Suited to VRML was made. Finally, urban area was expressed in 3D with expressing ground and feature separately.

A Usage Pattern Analysis of the Academic Database Using Social Network Analysis in K University Library (사회 네트워크 분석에 기반한 도서관 학술DB 이용 패턴 연구: K대학도서관 학술DB 이용 사례)

  • Choi, Il-Young;Lee, Yong-Sung;Kim, Jae-Kyeong
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.1
    • /
    • pp.25-40
    • /
    • 2010
  • The purpose of this study is to analyze the usage pattern between each academic database through social network analysis, and to support the academic database for users's needs. For this purpose, we have extracted log data to construct the academic database networks in the proxy server of K university library and have analyzed the usage pattern among each research area and among each social position. Our results indicate that the specialized academic database for the research area has more cohesion than the generalized academic database in the full-time professors' network and the doctoral students' network, and the density, degree centrality and degree centralization of the full-time professors' network and the doctoral students' network are higher than those of the other social position networks.

The Recommendation System based on Staged Clustering for Leveled Programming Education (수준별 프로그래밍 교육을 위한 단계별 클러스터링 기반 추천시스템)

  • Kim, Kyung-Ah;Moon, Nam-Mee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.51-58
    • /
    • 2010
  • Programming education needs learning which is adjusted individual learners' level of their learning abilities. Recommendation system is one way of implementing personalized service. In this research, we propose recommendation method which learning items are recommended for individual learners' learning in web-based programming education environment by. Our proposed system for leveled programming education provides appropriate programming problems for a certain learner in his learning level and learning scope employing collaborative filtering method using learners' profile of their level and correlation profile between learning topics. As a result, it resolves a problem that providing appropriate programming problems in learner's level, and we get a result that improving leaner's programming ability. Furthermore, when we compared our proposed method and original collaborative filtering method, our proposed method provides the ways to solve the scalability which is one of the limitations in recommendation systems by improving recommendation performance and reducing analysis time.

Development of Smart Senior Classification Model based on Activity Profile Using Machine Learning Method (기계 학습 방법을 이용한 활동 프로파일 기반의 스마트 시니어 분류 모델 개발)

  • Yun, You-Dong;Yang, Yeong-Wook;Ji, Hye-Sung;Lim, Heui-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.1
    • /
    • pp.25-34
    • /
    • 2017
  • With the recent spread of smartphones and the introduction of web services, online users can access large-scale content regardless of time or place. However, users have had trouble finding the content they wanted among large-scale content. To solve this problem, user modeling and content recommendation system have been actively studied in various fields. However, in spite of active changes in senior groups according to the changes in information environment, research on user modeling and content recommendation system focused on senior groups are insufficient. In this paper, we propose a method of modeling smart senior based on their preference, and further develop a smart senior classification model using machine learning methods. As a result, we can not only grasp the preferences of smart seniors, but also develop a smart senior classification model, which is the foundation for the research of a recommendation system which will provide the activities and contents most suitable for senior groups.

An Analysis of the Overhead of Multiple Buffer Pool Scheme on InnoDB-based Database Management Systems (InnoDB 기반 DBMS에서 다중 버퍼 풀 오버헤드 분석)

  • Song, Yongju;Lee, Minho;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1216-1222
    • /
    • 2016
  • The advent of large-scale web services has resulted in gradual increase in the amount of data used in those services. These big data are managed efficiently by DBMS such as MySQL and MariaDB, which use InnoDB engine as their storage engine, since InnoDB guarantees ACID and is suitable for handling large-scale data. To improve I/O performance, InnoDB caches data and index of its database through a buffer pool. It also supports multiple buffer pools to mitigate lock contentions. However, the multiple buffer pool scheme leads to the additional data consistency overhead. In this paper, we analyze the overhead of the multiple buffer pool scheme. In our experimental results, although multiple buffer pool scheme mitigates the lock contention by up to 46.3%, throughput of DMBS is significantly degraded by up to 50.6% due to increased disk I/O and fsync calls.

Implementation of YOLO based Missing Person Search Al Application System (YOLO 기반 실종자 수색 AI 응용 시스템 구현)

  • Ha Yeon Km;Jong Hoon Kim;Se Hoon Jung;Chun Bo Sim
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.159-170
    • /
    • 2023
  • It takes a lot of time and manpower to search for the missing. As part of the solution, a missing person search AI system was implemented using a YOLO-based model. In order to train object detection models, the model was learned by collecting recognition images (road fixation) of drone mobile objects from AI-Hub. Additional mountainous terrain datasets were also collected to evaluate performance in training datasets and other environments. In order to optimize the missing person search AI system, performance evaluation based on model size and hyperparameters and additional performance evaluation for concerns about overfitting were conducted. As a result of performance evaluation, it was confirmed that the YOLOv5-L model showed excellent performance, and the performance of the model was further improved by applying data augmentation techniques. Since then, the web service has been applied with the YOLOv5-L model that applies data augmentation techniques to increase the efficiency of searching for missing people.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

A Study on the Evaluating Standards On-Line Service for Archives (기록관의 온라인 서비스 향상을 위한 웹사이트 평가기준설계에 관한 연구)

  • Lee, Yoon-Ju
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.147-200
    • /
    • 2007
  • Archives provide users with easier and more convenient access to and use of archival data through their Internet websites. Now, archival websites function not only as a tool of information provision or marketing, or as a gateway of Internet-based materials, but also as cyber space for all services of archives, providing users with information and knowledge and direct accessibility to the services in the archives. At present, Korean archives are proceeding with establishing websites or upgrading existing websites, and the use rates and reliability of web services by users are becoming higher. However, although there have been various studies for the evaluation of general websites, few are found with regard to the evaluation of archival websites. It is necessary for archival websites that provide information service to users of every stripe to make more efforts and have more interest in user-centered convenience, right to know, and information provision-centered service. Accordingly, needless to say, it is necessary to study evaluation criteria of websites so that high quality archival websites can be established. With this background, this study establishes evaluation criteria for archival websites, which are appropriate to their objectives and functions and directly evaluates archives, presenting ways to establish and redevelop archival websites. More detailed purposes are as follows: First, analyzes existing theories of evaluation through reviews on previous literature and elicits evaluation criteria for websites, which are appropriate to archives; Second, based on the elicited evaluation criteria for archival websites, examines the current state of domestic archival websites through analytic evaluation; and Third, presents ways to improve archival websites that may be helpful in establishing or improving them in the future. The expectancy effects of this study are as follows: First, it will be helpful when one wishes to identify the current state of archival websites and to improve or redevelop existing websites, or to develop online service through website; Second, it will function as a checklist when a developer who is to establish an archival website wishes to develop evaluation criteria; and Third, it may be used as an inspection tool when an archives contracts out the establishment of its website.

Effective Design Pattern and Enterprise Architecture Design Techniques in EJB Environment (EJB기반의 효율적인 설계 패턴 및 엔터프라이즈 아키텍처 설계 기법)

  • 민현기;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1025-1036
    • /
    • 2003
  • In industry, it is a current trend that systems are developed by using Enterprise JavaBeans(EJB) technology for reducing the cost and the time. Thus, the architecture of EJB is getting more essential to enhance reusability, extensibility and portability of system. However little has been studied in the realm of the practical software architectures for EJB. The architecture has just bean studied in abstract level, but not in concrete level providing the method to substantiate it using the practical J2EE techniques. Just using the EJB technology doesn't guarantee the reusability of the artifacts because EJB specification provides the characteristics and architecture for only fine grained components as session and entity bean. In this paper, we propose the enterprise software architecture for the systems based on EJB and the concrete techniques for implementing that. Also, design patterns of modeling efficient enterprise architecture are represented. By analyzing both the strengths and the weaknesses of suggested design patterns, EJB design patterns which are suitable for each layer of enterprise architecture will be identified. Through the component which design patterns are applied, the architecture can support the optimized relationship between the components. Five techniques for designing components from fine grained to coarse grained based on EJB technology, and architecture design techniques including transaction and assembling techniques are proposed.

A Study of Relationship Derivation Technique using object extraction Technique (개체추출기법을 이용한 관계성 도출기법)

  • Kim, Jong-hee;Lee, Eun-seok;Kim, Jeong-su;Park, Jong-kook;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.309-311
    • /
    • 2014
  • Despite increasing demands for big data application based on the analysis of scattered unstructured data, few relevant studies have been reported. Accordingly, the present study suggests a technique enabling a sentence-based semantic analysis by extracting objects from collected web information and automatically analyzing the relationships between such objects with collective intelligence and language processing technology. To be specific, collected information is stored in DBMS in a structured form, and then morpheme and feature information is analyzed. Obtained morphemes are classified into objects of interest, marginal objects and objects of non-interest. Then, with an inter-object attribute recognition technique, the relationships between objects are analyzed in terms of the degree, scope and nature of such relationships. As a result, the analysis of relevance between the information was based on certain keywords and used an inter-object relationship extraction technique that can determine positivity and negativity. Also, the present study suggested a method to design a system fit for real-time large-capacity processing and applicable to high value-added services.

  • PDF