• Title/Summary/Keyword: 컴포넌트 활용

Search Result 377, Processing Time 0.024 seconds

A study of Web-Based GPS Data Processing System (웹 기반 GPS 자료처리 시스템 개발에 관한 연구)

  • 최우영;권재현;염재홍;이용욱
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2003.04a
    • /
    • pp.81-92
    • /
    • 2003
  • A protocol for the web-based GPS data processing system has been developed. The system is developed following the typical ASP system, in which the GPS data acquired by various users can be uploaded through the web and the data is processed with data processing components selected by the users. After the processing, the results are also transported to the users through the web. The developed system is designed for easy software upgrade and it is an asynchronous process mode so that the multiple accesses can be handled with high user flexibility. The database components for the efficient GPS data maintenance are developed so that the data from CORS can be used for the data processing. Currently, the absolute and relative positioning algorithms using code measurements are integrated and much more algorithms such as the data quality control, absolute and relative positioning using phases will be integrated in near future.

  • PDF

Extended Use Case Modeling for Service-Oriented Computing (서비스 지향 컴퓨팅을 위한 확장 유스케이스 모델링)

  • Cho, Jun-Soo;Chong, Ki-Won
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.153-163
    • /
    • 2009
  • It is necessary to identify the use cases of the supplier systems in order to define new service using their functions. Current use case modeling techniques, however, do not represent the external use cases clearly, because the external system is represented only by an actor. This ambiguity of the modeling technique declines the comprehensiveness of the model, and does not limit the scope of the target system explicitly. In this paper, we propose the extended use case modeling technique for service-oriented computing. This modeling technique enables the definition of external use cases and components. They are used to limit the boundary of the target system, and the relationship between them are modeled by the realization of external use cases. The proposed technique uses UML stereotype extension mechanism. so the compatibility with current use case modeling technique is preserved.

  • PDF

Design and Implementation of Enterprise Beans Generator/ Depolyer supporting EJB for Server-Side Application Development (서버측 애플리케이션 개발을 위한 EJB 지원 엔터프라이즈 빈즈 생성기/전개기의 설계 및 구현)

  • Noh, Hye-Min;Lee, Sang-Young;Kim, Song-Ju;Yoo, Cheol-Jung;Chang, Ok-Bae;Lee, Woo-Jin;Shin, Gue-Sang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.5
    • /
    • pp.429-439
    • /
    • 2001
  • EJB(Enterprise JavaBeans), the cornerstone for J2EE(Java$^{TM}$ 2 Platform, Enterprise Edition), is a server-side component standard model. Recently, development of supporting tool for this component model becomes important and there are many tools for developing EJB. In this paper, we purpose to design Enterprise Beans by component model, and perform design and implementation of code generator which generates skeleton code for Enterprise Beans automatically. We also implement EJB deployer for deploying these on application server. The code generator can make a JAR file automatically. This JAR file is deployed on application server by EJB specification as well. Using this tool, developer can create and deploy of Enterprise Beans more fast and exactly.y.

  • PDF

Effects of Adopting the Open Document Format in Public Records Management (공문서 컴포넌트 오픈포맷 채택이 기록관리에 미치는 영향 분석)

  • Jung, Mi Ri;Oh, Seh-La;Yim, Jin Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.16 no.2
    • /
    • pp.29-55
    • /
    • 2016
  • Korean public organizations create electronic documents through electronic document management systems under the e-Government scheme. A majority of these public documents are saved in vendor-dependent file formats, mainly HWP. Vendor-dependent formats can be opened only with specific software, which requires purchase. As the license does not guarantee compatibility between past and future versions, interoperability problems occur in long-term preservation, which need to be solved. Any error from the elimination of styles or no matching elements in document definition during conversion from vendor-dependent formats to the XML-based standard exchange format leads to file open failure or the modification of original documents. This study introduces the Open Document Format (ODF) and investigates the effects of adopting ODF in the creation, exchange, management, and preservation of public records.

On an Approach to Measuring the System Performance by Utilizing the Combined System Readiness Level and Achieved Technical Performance in Weapon Systems Development (무기체계개발에서 시스템 성숙도와 기술적 성능 달성도를 연계한 시스템 성능 측정 방법)

  • Kwon, Il-Ho;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.9
    • /
    • pp.4163-4170
    • /
    • 2013
  • The recent studies indicated that the major sources of the failure in carrying out the programs of weapon systems development would be the unsatisfaction of the required key performance and also the use of premature technology. As such, to manage the risk during the weapon systems development, the use of the technical performance measurement (TPM) and the technology maturity assessment (TMA) turned out to be necessary. However, the TPM studied so far seems to cover the assessment of performance at the component level only, and thus is insufficient in considering the system integration effect. On the other hand, the system readiness level (SRL) method has been presented by reflecting the effect on system integration, but the system performance and maturity has not been considered. To overcome this, a measurement method is proposed in the paper by utilizing the combined system readiness level and achieved technical performance at the system level. This system performance measure can be useful in managing the risk in the weapon systems development.

A Development of Query-Answer Learning Tool based on LTSA (LTSA 기반의 질의 응답 학습 도구 개발)

  • Kim, Haeng-Kon;Kim, Jung-Soo
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.269-278
    • /
    • 2003
  • The popularity of the web based education has come the need for variety learning methods and for business to exploit the web not only for interoperability but also standardization. This way of standardization has come to researched for environments, contents and practical uses in ISO. The IEEE has special]y established five technical classes for LTSA which provide advanced e-learning environments. Feedback functions would not be supported and specified in standardization for Query Answer on LTSA. In this paper, we describe the query and answer model which we have developed on layer three of LTSA. We develop the redefined model for transforming data flow oriented into object or component based model. We have developed the Query Answer Metadata (QAM) based on Learning Object Metadata (LOM). We design and showed thing a prototyping implementation the Query Answer Learning Tool (QALT). We have used the QALT to address the problem of efficiency of web based education. We also used it to develop the related tools with quality and productivity.

Design and Implementation of HDFS Data Encryption Scheme Using ARIA Algorithms on Hadoop (하둡 상에서 ARIA 알고리즘을 이용한 HDFS 데이터 암호화 기법의 설계 및 구현)

  • Song, Youngho;Shin, YoungSung;Chang, Jae-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.2
    • /
    • pp.33-40
    • /
    • 2016
  • Due to the growth of social network systems (SNS), big data are realized and Hadoop was developed as a distributed platform for analyzing big data. Enterprises analyze data containing users' sensitive information by using Hadoop and utilize them for marketing. Therefore, researches on data encryption have been done to protect the leakage of sensitive data stored in Hadoop. However, the existing researches support only the AES encryption algorithm, the international standard of data encryption. Meanwhile, Korean government choose ARIA algorithm as a standard data encryption one. In this paper, we propose a HDFS data encryption scheme using ARIA algorithms on Hadoop. First, the proposed scheme provide a HDFS block splitting component which performs ARIA encryption and decryption under the distributed computing environment of Hadoop. Second, the proposed scheme also provide a variable-length data processing component which performs encryption and decryption by adding dummy data, in case when the last block of data does not contains 128 bit data. Finally, we show from performance analysis that our proposed scheme can be effectively used for both text string processing applications and science data analysis applications.

Evaluation of Streamflow using measured Slope and Slope length at Doam Dam Watershed (실측 경사도 및 경사장을 고려한 도암호 유역의 유출량 평가)

  • Park, Geonwoo;Lee, Seoro;Lee, Gwanjae;Choi, Yujin;Lim, Kyoung Jae
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.114-114
    • /
    • 2019
  • 최근 들어 집중호우 및 토지이용 변화로 인한 고탁수 문제가 빈번히 발생하고 있다. 이러한 탁수 및 수질오염 문제를 해결하기 위해 환경부는 비점오염원 관리지역을 선정하였으며, Best Management Pratices(BMPs), Low Impact Development(LID) 등 다양한 저감 대책을 시행하고 있다. 비점오염원의 발생원인과 발생위치를 정확하게 증명할 수 없으므로 유역 내 수문 및 수질을 모의할 수 있는 Soil and Water Assessment Tool(SWAT) 모델이 다양한 비점오염원 연구에 널리 활용되고 있다. 그러나 SWAT 모델은 Hydrologic Response Unit(HRU)의 경사도와 경사장을 산정할 때 소유역 내 평균 경사도를 이용하여 토양유실량 및 유출특성을 모의에 필요한 매개변수들을 산정한다는 한계점이 있다. 본 연구에서는 이러한 SWAT 모형의 단점을 보완하기 위하여 실제 경작지를 기준으로 HRU를 생성하고, 실측 경사도와 경사장을 적용하기 위한 기술을 개발하였다. 본 연구에서 개발한 기술을 고탁수로 인해 비점오염원 관리지역으로 지정된 도암호 유역에 적용하여 실측 경사도와 경사장을 적용하여 모의한 유출량과 기존의 SWAT 모델을 통해 모의한 유출량을 비교 분석하였다. 기존 모델의 결과와 본 연구에서 개발한 기술을 적용하여 모의한 결과를 비교하였을 때 수문 컴포넌트 중 중간유출과 기저유출에 있어서 차이가 발생한 것을 알 수 있었다. 또한 본 연구에서 개발된 기술을 적용함으로써 도암호 유역에서 비교적 정확한 토양유실과 Suspended Solids(SS) 모의 결과를 나타냈다. 하지만 본 연구는 도암호 유역만을 대상으로 수행되었기 때문에 다른 비점오염 관리지역에 확대 적용하여 본 연구의 결과를 재검토할 필요가 있다.

  • PDF

Design and Implementation of the Survival Game API Using Dependency Injection (의존성 주입을 활용한 서바이벌 게임 API 설계 및 구현)

  • InKyu Park;GyooSeok Choi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.183-188
    • /
    • 2023
  • Game object inheritance and multiple components allow for visualization of system architecture, good code reuse, and fast prototyping. On the other hand, objects are more likely to rely on high latency between game objects and components, static casts, and lots of references to things like null pointers. Therefore, It is important to design a game in such a way so that the dependency of objects on multiple classes could be reduced and existing codes could be reused. Therefore, we designed the game to make the classes more modular by applying Dependency Injection and the design patterns proposed by the Gang of Four. Since these dependencies are attributes of the game object and the injection occurs only in the initialization pass, there is little performance degradation or performance penalty in the game loop. Therefore, this paper proposed an efficient design method to effectively reuse APIs in the design and implementation of survival games.

The Development of Change Detection Software for Public Business (공공분야 활용을 위한 변화탐지 소프트웨어 개발)

  • Jeong, Soo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.14 no.4 s.38
    • /
    • pp.79-84
    • /
    • 2006
  • Change detection is a core functions of remote sensing. It can be widely used in public business such as land monitoring, demage assessment from disaster, growth analysis of cities, etc. However, it seems that the change detection using satellite imagery has not been fully used in public business. For the person who are in charge of public business, it would not be easy to implement the change detection because various functions are combined into it. So, to promote the use of the change detection in public business, the standard, the process and the method for the change detection in public business should be established. Also, the software which supports that would be very useful. This study aims to promote the use of satellite imagery in public business by building up the change detection process which are suitable for general public business and developing the change detection software to support the process. The software has been developed using ETRI Components for Satellite Image Processing to support the interoperability.

  • PDF