• Title/Summary/Keyword: 확장식별자

Search Result 82, Processing Time 0.025 seconds

Design and Implementation of Media Manager in Multimedia Streaming Framework (스트리밍 프레임워크에서 미디어 관리자의 설계 및 구현)

  • Lee, Jae-Wook;Lee, Sung-Young;Hong, Een-Kee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.4
    • /
    • pp.273-287
    • /
    • 2001
  • In this paper, we introduce our experience for designing and implementing a media manager in the Integrated Streaming Service Architecture (ISSA) developed by the authors. The media manager is regarded as a necessary module in the ISSA framework for the following reasons. It realizes that from which locations of the media source devices, the media streams are coming. Once it knows where the origin is, the media manager should recognizes what types of stream are. After that, it performs how to chose an appropriate CODEC to handle the recognized input streams efficiently, and what type of media playback device should be selected. In order to do such a job efficiently, the proposed media manager consists of two modules source module and sink module. The major role of a media source module is to make an abstraction for the media streams that are coming from various types of media device. This, in consequence, enables a media manager to consistently handle tlle media streams without considering wherever they come from. On the other hand, the media sink module distributes the input streams to an appropriate media device to playback. One of the remarkable virtues of the proposed media manager is an ability to supporting high value-added database services since it provides an interface between the ISSA and real-time multimedia database. Also, it provides the RTP!RTSP source filter and Winamp gateway modules which allow the flexibility to the system. Moreover, the media manager can adopt any types of new media which in fact will provide scalability to the ISSA.

  • PDF

LRM's Characterics and Applications Plan Through Comparing with FRBR (FRBR과 비교를 통한 LRM의 특징 및 적용방안)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.2
    • /
    • pp.355-375
    • /
    • 2022
  • This study is to grasp LRM's feature and applications plan to reflect LRM to cataloging related standards and individual system through comparing and analyzing LRM with the FR model in terms of entities, attributes, and relationships. The application plan is suggested as follows. First, the entity can be extended by defining sub-entities of each entity in the standards and the individual system in order to reflect LRM, even though entities such as families, groups, identifiers, authorized access points, concepts, objects, events, agency and rules have been deleted in LRM. Second, the attribute should be subdivided in the standards and the individual system in order to apply LRM, though many attributes have been changed to relationships for linked data and decreased in LRM. In particular, more specific and detailed property names in the standards and the individual system should be clearly presented, and the vocabulary encoding scheme corresponding to each property should be also developed, since properties with similar functions or repetition in various entities, and material specific properties are generalized and integrated into comprehensive property names. Third, the relationship should be extended through newly declaring the refinement or subtype of the relationship and considering a multi-level relationship, since the relationship itself is general and abstract under increasing the number of relationships in comparing to the property. This study will be practically utilized in cataloging related standards and individual system for applying LRM.

Interpreting Mixtures Using Allele Peak Areas (Mixture에서 봉우리 면적을 활용한 유전자 증거의 해석)

  • Hong, Yu-Lim;Lee, Hyo-Jung;Lee, Jae-Won
    • The Korean Journal of Applied Statistics
    • /
    • v.23 no.1
    • /
    • pp.113-121
    • /
    • 2010
  • Mixture is that DNA profiles of samples contain material from more than one contributor, especially common in rape cases. In this situation, first, the method based on enumerating a complete set of possible genotype that may have generated the mixed DNA profile have been studied for interpreting DNA mixtures. More recently, the methods utilizing peak area information to calculate likelihood ratios have been suggested. This study is concerned with the analysis and interpretation of mixed forensic stains using quantitative peak area information and the method of forensic inference for extension of material from more than or equal to three contributors. Finally, the numerical example will be outlined.

Software Architecture Design based on Interface and View Analysis (인터페이스와 뷰 분석을 이용한 소프트웨어 아키텍처 설계방법)

  • Kung, Sang-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.5072-5082
    • /
    • 2010
  • The Paper describes the methodology for Software Architecture Design. The key idea is to find the interfaces between the actors, modules, and communicating entities, and use them to identify the software design elements. The identified interfaces and modules are further used to find new modules and interfaces until the every design elements are found and located in the software architecture. This method starts the architecture design with finding the interfaces and enables the natural design procedure by relating the cause and results of the design. It also makes use of not only 5 architectural views for analysis and design of the software, but also concept of architecture patterns in design procedure. Especially, this method is also useful for the novice of the software architecture design.

Efficient Hierarchical Mobility Management Scheme for Mobile Content Centric Networking (이동 컨텐츠 중심 네트워크에서의 효율적인 계층적 이동성 관리 방안)

  • Lee, Jihoon;Lee, Juyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.37-41
    • /
    • 2018
  • As individuals generate and share various content anytime and anywhere, new networking architectures, such as content-centric networking (CCN) using the content name as a packet identifier, have been in the spotlight recently. However, the current CCN hardly takes into account node mobility problems, especially the mobility of content sources. The movement of content sources causes long delivery latency and long service disruptions. To solve that, the tunneling-based redirection scheme was proposed. However, the tunneling-based scheme requires a location-update procedure whenever the network changes, which creates many control messages and causes long latency. So, this paper presents hierarchical mobility management of mobile CCN to reduce the number of control messages and handoff latency. Performance evaluation shows that the proposed scheme can provide low control overhead, which results in network scalability.

The Development of Attendance Management System Using the RFID (RFID를 이용한 출석관리 시스템 개발)

  • Park, So-Hee;Moon, Byeong-Cheoul
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.139-146
    • /
    • 2007
  • Today, using RFID(Radio Frequency Identification) card is extended in diversity as medical treatment, circulation market, military affairs, manufacture, security, etc. The RFID technology is an automatic identification method, relying on storing and remotely retrieving data for the purpose of identification using radio waves. This advantage of the RFID will be as a replacement for traditional Barcoding. Besides, book-lending system and attendance management system become the center of educational institution in interest. This paper presents a attendance management system using the RFID card which provides directly information of attendance for professors with mobile and students with web. Also, the students only have ID card that embed RFID tag which is recognized attendance through DB that storages to is received a information of student from RFID card Reader. And it is possible management or report for attendance and time table not only for professors by management program but also for students by web program.

  • PDF

Research on the Use of Pseudonym Data - Focusing on Technical Processing Methods and Corporate Utilization Directions - (가명 데이터 활용연구 - 기술적 처리방법 및 기업의 활용방향을 중심으로 -)

  • Kim, Jung-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.253-261
    • /
    • 2020
  • This study examines the technologies and application processes related to the use of pseudonym data of companies after the passage of the Data 3 Act to activate the data economy in earnest, and what companies should prepare to use pseudonym data and what will happen in the process It was intended to contribute to the elimination of uncertainty. In the future, companies will need to extend the information security management system from the perspective of the existing IT system to manage and control data privacy protection and management from a third party provisioning perspective. In addition, proper pseudonym data use control should be implemented even in the data use environment utilized by internal users. The economic effect of market change and heterogeneous data combination due to the use of pseudonymized data will be very large, and standards for appropriate non-identification measures and risk assessment criteria for data utilization and transaction activation should be prepared in a short time.

Implementation of an Obfuscator for Visual C++ Source Code (비주얼 C++소스 코드를 위한 obfuscator 구현)

  • Chang, Hye-Young;Cho, Seong-Je
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.59-69
    • /
    • 2008
  • Automatic obfuscation is known to be the most viable method for preventing reverse engineering intentional1y making code more difficult to understand for security purposes. In this paper, we study and implement an obfuscation method for protecting MS Visual C++ programs against attack on the intellectual property in software like reverse engineering attack. That is, the paper describes the implementation of a code obfuscator, a tool which converts a Visual C++ source program into an equivalent one that is much harder to understand. We have used ANTLR parser generator for handling Visual C++ sources, and implemented some obfuscating transformations such as 'Remove comments', 'Scramble identifiers', 'Split variables', 'Fold array', 'Insert class', 'Extend loop condition', 'Add redundant operands', and 'Insert dead code'. We have also evaluated the performance and effectiveness of the obfuscator in terms of potency, resilience, and cost. When the obfuscated source code has been compared with the original source code, it has enough effectiveness for software protection though it incurs some run-time overheads.

Design of the Context Autogenesis Model and Service for Context-Aware in Ubiquitous Environments (유비쿼터스 환경에서의 컨텍스트-인식을 위한 자생적 컨텍스트 모델과 서비스의 설계)

  • Oh Dong yeol;Oh Hae seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.226-234
    • /
    • 2005
  • Context-Aware is the most important facts to reason a personalized and optimized service and to provide it to user. In the previous researches, user and surrounding environment were main facts of Context-Aware and middleware or center server has been proposed to support Context-Aware. In the daily space(for example, home, office, Car, etc), interactions between user and service can be a important facts of Context-Aware. In this paper, Context Autogenesis service model is introduced, simplified the Context-Aware process and designed the middleware which performs decentralize management for Context-Aware information of user's portable devices, so that problems occurred during the management and operation of existing Context-Aware system can be minimized and supporting user anonymity

Adaptive Inter-Agent Communication Protocol for Large-Scale Mobile Agent Systems (대규모 이동 에이전트 시스템을 위한 적응적 에이전트간 통신 프로토콜)

  • Ahn Jin-Ho
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.351-362
    • /
    • 2006
  • This paper proposes an adaptive inter-agent communication protocol to considerably reduce the amount of agent location information maintained by each service node and the message delivery time while avoiding the dependency of the home node of a mobile agent. To satisfy this goal, the protocol enables each mobile agent to autonomously leave its location information only on some few of its visiting nodes. Also, it may significantly reduce the agent cache updating frequency of each service node by keeping the identifier of the location manager of each agent in the smart agent location cache of the node. Simulation results show that the proposed protocol reduces about $76%{\sim}80%$ of message delivery overhead and about $76%{\sim}79%$ of the amount of agent location information each service node should maintain compared with the traditional one.