• Title/Summary/Keyword: 컴포넌트기반 시스템

Search Result 897, Processing Time 0.027 seconds

Modeling and Simulation for Analyzing Efficient Operations on Public Bike System: A Case Study of Sejong City (공공 자전거 시스템의 효율적 운용을 위한 모델링 및 시뮬레이션: 세종시 사례 중심)

  • Bae, Jang Won;Choi, Seon Han;Lee, Chun-Hee;Paik, Euihyun
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.1
    • /
    • pp.103-112
    • /
    • 2021
  • In recent years, public bicycle systems are widely spread over the world according to the development of ICT technology. Since the public bicycle systems in large cities need to secure both publicity and convenience for citizens, analysis of various their issues from introduction to operation is required. In addition, it is also necessary to prepare for various scenarios for coexistence with the PM business, which is recently in the spotlight as a last mile means and normally managed privately. This paper introduces modeling and simulation for efficient operations of public bicycle systems. In particular, the proposed method was developed in a form that can be easily used in other cities by modeling the general structure and behavior of the public bicycle system, and it was developed to facilitate modification and expansion of the future model with a component-based model configuration. This paper provides a case study of the propose method, which is the public bicycle simulation in Sejong City. The simulation results were derived by applying the data from the public bicycle system of Sejong City, and they were verified with the associated real data of Sejong City. Using the verified model, it is expected that it can be used as a tool to design and analyze various services on the public bicycle systems, which were especially suitable for Sejong City.

A study on combination of loss functions for effective mask-based speech enhancement in noisy environments (잡음 환경에 효과적인 마스크 기반 음성 향상을 위한 손실함수 조합에 관한 연구)

  • Jung, Jaehee;Kim, Wooil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.3
    • /
    • pp.234-240
    • /
    • 2021
  • In this paper, the mask-based speech enhancement is improved for effective speech recognition in noise environments. In the mask-based speech enhancement, enhanced spectrum is obtained by multiplying the noisy speech spectrum by the mask. The VoiceFilter (VF) model is used as the mask estimation, and the Spectrogram Inpainting (SI) technique is used to remove residual noise of enhanced spectrum. In this paper, we propose a combined loss to further improve speech enhancement. In order to effectively remove the residual noise in the speech, the positive part of the Triplet loss is used with the component loss. For the experiment TIMIT database is re-constructed using NOISEX92 noise and background music samples with various Signal to Noise Ratio (SNR) conditions. Source to Distortion Ratio (SDR), Perceptual Evaluation of Speech Quality (PESQ), and Short-Time Objective Intelligibility (STOI) are used as the metrics of performance evaluation. When the VF was trained with the mean squared error and the SI model was trained with the combined loss, SDR, PESQ, and STOI were improved by 0.5, 0.06, and 0.002 respectively compared to the system trained only with the mean squared error.

A Study on Open Source Transition Strategy of Record System (기록시스템의 오픈소스화 전략 연구)

  • An, Dae-jin;Yim, Jin-hee
    • The Korean Journal of Archival Studies
    • /
    • no.52
    • /
    • pp.119-170
    • /
    • 2017
  • This study aims to analyze the environment for the open-source records system and to identify the risk and requirements for the success of the strategy in Korea. For this, Chapter 2 presented a review of the strategic benefits of open source to public organizations, developers, and users. It also discussed the process of cooperatively developing and releasing the source code and the technology infrastructure supporting open source. In Chapter 3, six representative open-source projects in the field of records management were selected, and case studies were conducted. To derive comprehensive implications, we have divided the main development body of open-source projects into international organizations, international cooperation systems, national archives, and software development companies. We also analyzed the background and purpose of each project, the agents of development and funding, the governance model, the development period and cost, the business model and software architecture, the community composition, and the licensing strategy. Through this, we have derived four critical success factors. In terms of technology, a component-based design was required; therefore, we proposed a microservice architecture and a model-view-controller design pattern. Next, it was necessary to reestablish system requirements of records center and archives. Moreover, we also proposed a dual licensing strategy to allow developers to easily participate in open-source projects. Lastly, we emphasized a strong governance structure and an effective cooperation framework to create a sustainable community. For a record system to be open-source successfully in an organization-centered market, the roles of software developers and end users should be exercised more in the community. To achieve this, it is important to build various collaborative tools and development infrastructure from a planning stage to a centralized one.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

Framework for Developing RFID Applications Based on Product Line Architecture (프로덕트라인 아키텍처 기반 RFID 애플리케이션 개발을 위한 프레임워크)

  • Moon, Mi-Kyeong;Kim, Han-Jun;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.773-782
    • /
    • 2007
  • Software produce line engineering is a method that prepares for future reuse and supports seamless reuse in the application development process. Analyzing the commonality and variability between products in a product line is one of the essential concerns that must be considered when building a product line. In this paper, we suggest to combine a product line engineering approach with RFID applications technology. More concretely, common activities are identified among the RFID-enable applications and the variability in the common activities is analyzed in detail. Then, we suggest reusable product line architecture as a product line asset. In addition, as a tool for supporting this research, a framework which provides both reusable product line architecture for REID applications and the components that implement concrete realization of the architecture is developed. Sharing a common architecture and reusing assets to deploy recurrent services may be considered an advantage in terms of economic significance and overall quality.

Design and Implementation of a Distributed Audio/Video Stream Service Framework based on CORBA (CORBA 기반의 분산 오디오/비디오 스트림 서비스 프레임워크의 설계 및 구현)

  • Kim, Jong-Hyeon;No, Yeong-Uk;Jeong, Gi-Dong
    • The KIPS Transactions:PartA
    • /
    • v.9A no.2
    • /
    • pp.207-216
    • /
    • 2002
  • This paper present a design and implementation of a distributed audio, Video stream service framework based on CORBA for efficient processing and control of audio/video stream. We design software components which support processing, control and transmission of audio/video streams as distributed objects. For optimization of stream transmission performance, we separate the transmission path of control data and media data. Distributed objects are defined by IDL and implemented using JAVA. And device dependent facilities like media capturing, playing and communication channels are implemented using JMF (Java Media Framework) components. We show a connection establishment and control procedure of streams communication. And for evaluation, we implement a test system and experiment a system performance. Our experiments show that test system has somewhat longer connection latency time compared to TCP connection establishment, but has optimized media transmission time compared to CORBA IIOP. Also test system show acceptable service quality of media transmission.

A Comparative Study on the Structure and Implementation of Unity and Unreal Engine 4 (유니티와 언리얼 엔진 4의 구조와 구현 방식 비교 연구)

  • Lee, HanSeong;Ryoo, SeungTaek;Seo, SangHyun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.25 no.4
    • /
    • pp.17-24
    • /
    • 2019
  • In the game industry, traditional game development way was to develop a game engine in advance before developing game content. This has the disadvantage is the high cost of developing the game engine. Further, there is a problem that the game content are not developed unless the game engine is prepared in advance. In order to solve these problems, the game industry has recently selected a method of purchasing a license for a commercial engine, which is a method for improving the game content development productivity, rather than concentrating on game engine development. In this paper, we describe a game object and the structure in Unity and Unreal Engine 4. We compared the editor interface and the supported development languages in the two game engines. We also implemented a First-Person Shooter game to compare how the player's configuration and event handling differ from the two game engines.

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

XSNP: An Extended SaC Network Protocol for High Performance SoC Bus Architecture (XSNP: 고성능 SoC 버스를 위한 확장된 SoC 네트워크 프로토콜)

  • Lee Chan-Ho;Lee Sang-Hun;Kim Eung-Sup;Lee Hyuk-Jae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.554-561
    • /
    • 2006
  • In recent years, as SoC design research is actively conducted, a large number of IPs are included in a system. Various bus protocols and bus architectures are designed to increase IP reusability. Among them, the AMBA AHB became a de facto standard although it is somewhat inadequate for a large scale SoC. We proposed SNP and SNA, high performance on-chip-bus protocol and architecture, respectively, to solve the problem of the conventional shared buses. However, it seems to be imperative that the new on-chip-bus system support AMBA-compatible IPs for a while since there are a lot of IPs with AMBA interface. In this paper, we propose an extended SNP specification and a corresponding SNA component to support ABMA-compatible IPs used in SNA - based system. We extend the phase of the SNP by 1 bit to add new 8 phases to support communication based on AMBA protocol without penalty of elongated cycle latency. The ARB-to -XSNP converter translates the protocol between AHB and SNP to attach AMBA -compatible IPs to SNA based system. We show that AMBA IPs can communicate through SNP without any degradation of performance using the extended SNP and AHB - to- XSNP converter.

A Study on Data Adjustment and Quality Enhancement Method for Public Administrative Dataset Records in the Transfer Process-Based on the Experiences of Datawarehouses' ETT (행정정보 데이터세트 기록 이관 시 데이터 보정 및 품질 개선 방법 연구 - 데이터웨어하우스 ETT 경험을 기반으로)

  • Yim, Jin-Hee;Cho, Eun-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.91-129
    • /
    • 2010
  • As it grows more heavily reliant on information system, researchers seek for various ways to manage and utilize of dataset records which is accumulated in public information system. It might be needed to adjust date and enhance the quality of public administrative dataset records during transferring to archive system or sharing server. The purpose of this paper is presenting data adjustment and quality enhancement methods for public administrative dataset records, and it refers to ETT procedure and method of construction of datawarehouses. It suggests seven typical examples and processing method of data adjustment and quality enhancement, which are (1) verification of quantity and data domain (2) code conversion for a consistent code value (3) making component with combinded information (4) making a decision of precision of date data (5) standardization of data (6) comment information about code value (7) capturing of metadata. It should be reviewed during dataset record transfer. This paper made Data adjustment and quality enhancement requirements for dataset record transfer, and it could be used as data quality requirement of administrative information system which produces dataset.