• Title/Summary/Keyword: 한국컴퓨터

Search Result 36,246, Processing Time 0.062 seconds

Trends of Semantic Web Services and Technologies : Focusing on the Business Support (비즈니스를 지원하는 시멘틱 웹서비스와 기술의 동향)

  • Kim, Jin-Sung;Kwon, Soon-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.113-130
    • /
    • 2010
  • During the decades, considerable human interventions to comprehend the web information were increased continually. The successful expansion of the web services made it more complex and required more contributions of the users. Many researchers have tried to improve the comprehension ability of computers in supporting an intelligent web service. One reasonable approach is enriching the information with machine understandable semantics. They applied ontology design, intelligent reasoning and other logical representation schemes to design an infrastructure of the semantic web. For the features, the semantic web is considered as an intelligent access to understanding, transforming, storing, retrieving, and processing the information gathered from heterogeneous, distributed web resources. The goal of this study is firstly to explore the problems that restrict the applications of web services and the basic concepts, languages, and tools of the semantic web. Then we highlight some of the researches, solutions, and projects that have attempted to combine the semantic web and business support, and find out the pros and cons of the approaches. Through the study, we were able to know that the semantic web technology is trying to offer a new and higher level of web service to the online users. The services are overcoming the limitations of traditional web technologies/services. In traditional web services, too much human interventions were needed to seek and interpret the information. The semantic web service, however, is based on machine-understandable semantics and knowledge representation. Therefore, most of information processing activities will be executed by computers. The main elements required to develop a semantic web-based business support are business logics, ontologies, ontology languages, intelligent agents, applications, and etc. In using/managing the infrastructure of the semantic web services, software developers, service consumers, and service providers are the main representatives. Some researchers integrated those technologies, languages, tools, mechanisms, and applications into a semantic web services framework. Therefore, future directions of the semantic web-based business support should be start over from the infrastructure.

Practical Architectural Patterns and Guidelines for Designing Complex Mobile Applications (복잡도가 높은 모바일 어플리케이션 설계를 위한 아키텍처 패턴과 적용지침)

  • Jang, Jeong-Ran;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.63-80
    • /
    • 2012
  • Mobile devices with Android OS and iOS have been emerged as mobile computing devices where various software applications are deployed. Furthermore, they are anticipated to be used not only for traditional personal computing but also for enterprise computing. However, such mobile devices have their intrinsic characteristics such as limited resources and flexible network capabilities, which are not revealed in traditional computers. Hence, there is high demand for methods to develop mobile applications with reflecting their intrinsic characteristics. Since those characteristics belong to non-functional requirements, they should be reflected in architecture design while designing mobile applications. To design architecture, the architecture drivers that are architecture non-functional requirements are decided from mobile application characteristics. Conventional architecture design methods do not consider those characteristics so that the methods cannot be straightforwardly applied to mobile applications. In this paper, to efficiently develop mobile applications reflecting those characteristics, we propose a set of architecture patterns and define a guideline to apply those patterns. First, we define the characteristics of mobile applications distinguished and derive architectural drivers from them. Then, we propose architecture patterns in terms of static and dynamic views and define an architectural guideline to apply the patterns to designing architecture for mobile application. And, we perform case studies to verify the applicability of proposed patterns. Finally, we assess the proposed architecture patterns by proving how the patterns can fulfill identified architecture drivers and by comparing our approach with previous works.

Performance Improvement of an Energy Efficient Cluster Management Based on Autonomous Learning (자율학습기반의 에너지 효율적인 클러스터 관리에서의 성능 개선)

  • Cho, Sungchul;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.11
    • /
    • pp.369-382
    • /
    • 2015
  • Energy aware server clusters aim to reduce power consumption at maximum while keeping QoS(quality of service) compared to energy non-aware server clusters. They adjust the power mode of each server in a fixed or variable time interval to activate only the minimum number of servers needed to handle current user requests. Previous studies on energy aware server cluster put efforts to reduce power consumption or heat dissipation, but they do not consider energy efficiency well. In this paper, we propose an energy efficient cluster management method to improve not only performance per watt but also QoS of the existing server power mode control method based on autonomous learning. Our proposed method is to adjust server power mode based on a hybrid approach of autonomous learning method with multi level thresholds and power consumption prediction method. Autonomous learning method with multi level thresholds is applied under normal load situation whereas power consumption prediction method is applied under abnormal load situation. The decision on whether current load is normal or abnormal depends on the ratio of the number of current user requests over the average number of user requests during recent past few minutes. Also, a dynamic shutdown method is additionally applied to shorten the time delay to make servers off. We performed experiments with a cluster of 16 servers using three different kinds of load patterns. The multi-threshold based learning method with prediction and dynamic shutdown shows the best result in terms of normalized QoS and performance per watt (valid responses). For banking load pattern, real load pattern, and virtual load pattern, the numbers of good response per watt in the proposed method increase by 1.66%, 2.9% and 3.84%, respectively, whereas QoS in the proposed method increase by 0.45%, 1.33% and 8.82%, respectively, compared to those in the existing autonomous learning method with single level threshold.

An Enhanced DESYNC Scheme for Simple TDMA Systems in Single-Hop Wireless Ad-Hoc Networks (단일홉 무선 애드혹 네트워크에서 단순 TDMA 시스템을 위한 DESYNC 알고리즘 개선 방안)

  • Hyun, Sanghyun;Lee, Jeyul;Yang, Dongmin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.9
    • /
    • pp.293-300
    • /
    • 2014
  • TDMA(Time Division Multiple Access) is a channel access scheme for shared medium networks. The shared frequency is divided into multiple time slots, some of which are assigned to a user for communication. Techniques for TDMA can be categorized into two classes: synchronous and asynchronous. Synchronization is not suitable for small scale networks because it is complicated and requires additional equipments. In contrast, in DESYNC, a biologically-inspired algorithm, the synchronization can be easily achieved without a global clock or other infrastructure overhead. However, DESYNC spends a great deal of time to complete synchronization and does not guarantee the maximum time to synch completion. In this paper, we propose a lightweight synchronization scheme, C-DESYNC, which counts the number of participating nodes with GP (Global Packet) signal including the information about the starting time of a period. The proposed algorithm is mush simpler than the existing synchronization TDMA techniques in terms of cost-effective method and guarantees the maximum time to synch completion. Our simulation results show that C-DESYNC guarantees the completion of the synchronization process within only 3 periods regardless of the number of nodes.

A Flexible Multi-Threshold Based Control of Server Power Mode for Handling Rapidly Changing Loads in an Energy Aware Server Cluster (에너지 절감형 서버 클러스터에서 급변하는 부하 처리를 위한 유연한 다중 임계치 기반의 서버 전원 모드 제어)

  • Ahn, Taejune;Cho, Sungchoul;Kim, Seokkoo;Chun, Kyongho;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.9
    • /
    • pp.279-292
    • /
    • 2014
  • Energy aware server cluster aims to reduce power consumption at maximum while keeping QoS(quality of service) as much as energy non-aware server cluster. In the existing methods of energy aware server cluster, they calculate the minimum number of active servers needed to handle current user requests and control server power mode in a fixed time interval to make only the needed servers ON. When loads change rapidly, QoS of the existing methods become degraded because they cannot increase the number of active servers so quickly. To solve this QoS problem, we classify load change situations into five types of rapid growth, growth, normal, decline, and rapid decline, and apply five different thresholds respectively in calculating the number of active servers. Also, we use a flexible scheme to adjust the above classification criterion for multi threshold, considering not only load change but also the remaining capacity of servers to handle user requests. We performed experiments with a cluster of 15 servers. A special benchmarking tool called SPECweb was used to generate load patterns with rapid change. Experimental results showed that QoS of the proposed method is improved up to the level of energy non-aware server cluster and power consumption is reduced up to about 50 percent, depending on the load pattern.

A Moving Path Control of an Automatic Guided Vehicle Using Relative Distance Fingerprinting (상대거리 지문 정보를 이용한 무인이송차량의 주행 경로 제어)

  • Hong, Youn Sik;Kim, Da Jung;Hong, Sang Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.10
    • /
    • pp.427-436
    • /
    • 2013
  • In this paper, a method of moving path control of an automatic guided vehicle in an indoor environment through recognition of marker images using vision sensors is presented. The existing AGV moving control system using infrared-ray sensors and landmarks have faced at two critical problems. Since there are many windows in a crematorium, they are going to let in too much sunlight in the main hall which is the moving area of AGVs. Sunlight affects the correct recognition of landmarks due to refraction and/or reflection of sunlight. The second one is that a crematorium has a narrow indoor environment compared to typical industrial fields. Particularly when an AVG changes its direction to enter the designated furnace the information provided by guided sensors cannot be utilized to estimate its location because the rotating space is too narrow to get them. To resolve the occurrences of such circumstances that cannot access sensing data in a WSN environment, a relative distance from marker to an AGV will be used as fingerprinting used for location estimation. Compared to the existing fingerprinting method which uses RSS, our proposed method may result in a higher reliable estimation of location. Our experimental results show that the proposed method proves the correctness and applicability. In addition, our proposed approach will be applied to the AGV system in the crematorium so that it can transport a dead body safely from the loading place to its rightful destination.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Long-term Monitoring System for Ship's Engine Performance Analysis Based on the Web (선박엔진성능분석용 웹기반 장기모니터링시스템 구현)

  • Kwon, Hyuk-Joo;Yang, Hyun-Suk;Kim, Min-Kwon;Lee, Sung-Geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.4
    • /
    • pp.483-488
    • /
    • 2015
  • This paper implements a long-term monitoring system (LMS) for ship's engine performance analysis (SEPA) based on the web, for the purpose of the communication speed and engine maintenance. This system is composed of a simulator, monitoring module with a multi channel A/D converter, monitoring computer, network attached storage (NAS), RS485 serial and wireless internet communication system. The existing products monitor the information transmitted from pressure sensors installed in the upper parts of each of engines in the local or web computer, but have a delay in the communication speed and errors in long-term monitoring due to the large volume of sampling pressure data. To improve these problems, the monitoring computer saves the sampling pressure data received from the pressure sensors in NAS, monitors the long-term sampling data generated by the sectional down sampling method on a local computer, and transmits them to the web for long-term monitoring. Because this method has one tenth of the original sampling data, it will use memory with small capacity, save communication cost, monitor the long-term sampling data for 30 days, and as a result, make a great contribution to engine maintenance.

Numerical Modeling of Dehydration of Subducting Slab and Behavior of Expelled Water: A Preliminary Study (섭입해양판의 탈수 및 탈수된 물의 거동 수치모델링: 선행 연구)

  • Lee, Changyeol
    • Geophysics and Geophysical Exploration
    • /
    • v.21 no.3
    • /
    • pp.198-206
    • /
    • 2018
  • In this preliminary study, dehydration of the subducting slab and behavior of the expelled water are numerically modeled using 2-dimensional model scheme. The hydrated minerals in the oceanic crust of the subducting slab experience dehydration by increases in temperature and pressure and expel their water into the overlying mantle wedge. Behavior of the expelled water is governed by both the corner flow in the mantle wedge and porous flow of the expelled water through the pores of the mantle minerals. The effects of convergence rate and age of the subducting slab as well as grain size of the minerals on the dehydration of the subducting slab and behavior of the expelled water are evaluated. The water solubility of the oceanic crust measured from the laboratory experiments is considered for modeling dehydration of the oceanic crust. The model calculations show most of the hydrated minerals in the oceanic crust is dehydrated by a depth of 100 km and the effects of the convergence rate and age of the subducting slab on the dehydration of the subducting slab and behavior of the expelled water are not significant. The larger grain size allows faster porous flow of the expelled water through the oceanic crust, mantle wedge and overlying continental crust and reduces the volume fraction of the expelled water there. The developed technique will be used for future studies on arc volcanism and has a potential implication for the other fields such as seismic tomographic study.

Analysis on Trend of Study Related to Computational Thinking Using Topic Modeling (토픽 모델링을 이용한 컴퓨팅 사고력 관련 연구 동향 분석)

  • Moon, Seong-Yun;Song, Ki-Sang
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.6
    • /
    • pp.607-619
    • /
    • 2019
  • As software education was introduced through the 2015 revised curriculum, various research activities have been carried out to improve the computational thinking of learners beyond the existing ICT literacy and software utilization education. With this change, the purpose of this study is to examine the research trends of various research activities related to computational thinking which is emphasized in software education. To this end, we extracted the key words from 190 papers related to computational thinking subject published from January 2014 to September 2019, and conducted frequency analysis, word cloud, connection centrality, and topic modeling analysis on the words. As a result of the topical modeling analysis, we found that the main studies so far have included studies on 'computational thinking education program', 'computational thinking education for pre-service teacher education', 'robot utilization education for computational thinking', 'assessment of computational thinking', and 'computational thinking connected education'. Through this research method, it was possible to grasp the research trend related to computational thinking that has been conducted mainly up to now, and it is possible to know which part of computational thinking education is more important to researchers.