• Title/Summary/Keyword: Computer Language

Search Result 3,802, Processing Time 0.029 seconds

Design and Implementation of Realtime 3D Sight Simulation System on Internet (인터넷상에서 실시간 3차원 경관시뮬레이션 시스템의 설계 및 구현)

  • Kim, Byeong-Su;Lee, Ji-Hyeong;Im, Chang-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1738-1748
    • /
    • 1999
  • Recent simulation tools combine the 3-dimensional graphic technique to implement the 3D visualization of the objects in the 2-Dimensional computer display. In this paper, a sight simulation tool is implemented using the recent 3D techniques. The proposed sight simulator can be applied to improve the human environment with the harmony of the nature. The system is consisted of modules for topography, object, and navigation. A sight database for the sight elements(objects) is implemented using Java. Combined with Java, VRML, which is considered as the standard for 3D virtual reality in the Internet is used to implement EAI(External Authoring Interface). EAI allows the users to communicate with a VRML scene.

  • PDF

Optical Characteristics of LGP with Periodic 200 nm Nano-sized Patterned Array (200 nm급 원기둥 어레이 패턴이 형성된 도광판의 광 특성 해석)

  • Jong, Jae-Hoon;Hong, Chin-Soo;Lim, Myung-Hoon;Kim, Tae-Kyung;Lee, B.W.;Lee, J.H.;Lee, K.W.;Lee, T.S.;Kim, C.K.
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2007.11a
    • /
    • pp.448-449
    • /
    • 2007
  • The PMMA plates with periodic ~200 nm nanosized patterned array were fabricated through the nanoimprint technique with their proper Ni stamper. The computer coding was also made with the Mathematica language software via RCWA (Rigorous Continuous Wave Analysis) and it is confirmed that simulation results are in good agreement with the experimental ones.

  • PDF

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

  • Elakrat, Mohamed Abdallah;Jung, Jae Cheon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.780-787
    • /
    • 2018
  • This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.

A Cadence SMV Based Formal Verification Method for Combinational Logics Written in Verilog HDL (Verilog HDL로 기술된 조합 논리회로의 Cadence SMV 기반 정형 검증 방법)

  • Jo, Seong-Deuk;Kim, Young-Kyu;Moon, Byungin;Choi, Yunja
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1027-1030
    • /
    • 2015
  • 하드웨어 디자인 설계에서 초기 단계의 설계 오류 발견은 개발 비용 감소 및 설계 시간 단축 측면에서 그 효과가 매우 크다. 이러한 초기 설계 오류 발견을 위한 대표적인 방법으로는 정형 검증(formal verification)이 있으며, Cadence SMV(Symbolic Model Verifier)는 정형 검증을 위해 Verilog HDL(Hardware Description Language)을 SMV로 자동 변환 해주는 장점이 있지만, 사건 기반 구조(event based structures)의 sensitivity list에 대한 지원을 하지 않는 한계가 있다. 이에 본 논문에서는 Cadence SMV에서 디지털회로(digital circuit) 중 하나인 조합 논리회로(combinational logic circuit)를 sensitivity list가 고려된 검증이 가능하도록 하는 방법을 제안한다. 신뢰성 있는 실험을 위해 본 논문에서는 제안하는 방법의 일반적인 규칙을 도출하였고, 도출된 규칙이 적용된 SMV 파일을 생성하는 자동화 프로그램을 구현하여 실험하였다. 실험결과 제안한 방법을 적용한 경우 기존 Cadence SMV가 발견하지 못한 설계상의 오류를 발견할 수 있었다.

Efficient Data Publishing Method for Protecting Sensitive Information by Data Inference (데이터 추론에 의한 민감한 정보를 보호하기 위한 효율적인 데이터 출판 방법)

  • Ko, Hye-Kyeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.217-222
    • /
    • 2016
  • Recent research on integrated and peer-to-peer databases has produced new methods for handling various types of shared-group and process data. This paper with data publishing, where the publisher needs to specify certain sensitive information that should be protected. The proposed method cannot infer the user's sensitive information is leaked by XML constraints. In addition, the proposed secure framework uses encrypt to prevent the leakage of sensitive information from authorized users. In this framework, each node of sensitive data in an eXtensible Markup Language (XML) document is encrypted separately. All of the encrypted data are moved from their original document, and are bundled with an encrypted structure index. Our experiments show that the proposed framework prevents information being leaked via data inference.

Development of a Dynamic Simulation Program for Railway Vehicles (철도차량을 위한 동역학 해석 프로그램 개발)

  • Cho, Jae-Ik;Park, Tae-Won;Yoon, Ji-Won;Kim, Young-Guk
    • Proceedings of the KSR Conference
    • /
    • 2009.05b
    • /
    • pp.473-479
    • /
    • 2009
  • Dynamic analysis is necessary for the High-Speed Railway vehicle which aims to run on max 400km/h. Especially, dynamic simulation using CAE(Computer Aided Engineering) can help to reduce the time of development of the High-Speed Railway vehicles. Also, it helps to reduce prices and improve the quality such as safety, stability and ride. There are many dynamic software for a railway vehicle, such as Vampire and ADAMS-Rail. There are limitations for each software and difficulties to analyze overall dynamics for entire railway system. To overcome these limitations, in this study, a program which can simulate entire railway vehicles was developed. This program is easy to use because it was developed using C++, which is object-oriented programming language. In addition, the basic platform for the development of dynamic solver is prepared using the nodal, modal coordinate system with a wheel-rail contact module. Rigid, flexible and large deformable body systems can be modeled by a user according to the characteristic of a desired system. Its reliability is verified by comparison with a commercial analysis program.

  • PDF

Composition and Analysis of Linear Component Counting based Multiple Indexing (직선성분 계수 기반 다중 인덱싱 구성 및 분석)

  • Park, Je-Ho;Lim, Sang-Min
    • Journal of the Semiconductor & Display Technology
    • /
    • v.9 no.3
    • /
    • pp.17-21
    • /
    • 2010
  • As the compact and easily accessible handheld devices, such as cellular phones and MP3 players equipped with image acquisition functionality, are becoming widely available among common users, various applications of images are rapidly increasing. Image related services and software such as web-based image presentation and image manipulation for personal or commercial purpose enable users to view contents of remote image archive and to manipulate enormous amount of images in local or network based storage as well. It is necessary for users to identify the images efficiently so that the same images are perceived as one physical entity instead of recognizing them as different images as the trends are getting stronger. In order to support this environment, we propose a method that generates image identifiers or indexing for images within a solid and efficient manner. The proposed image identifier utilizes multiple index values. The integration of component index values creates a unique composite value that can be used as a file name, file system identifier, or database index. Our experimental results on generation of constituent index values have shown favorable results.

The design and implementation of automatic translation system for hangul's romanization (국어 로마자 표기 자동 변환 시스템 설계 및 구현)

  • 김홍섭
    • KSCI Review
    • /
    • v.2 no.1
    • /
    • pp.45-54
    • /
    • 1995
  • This study is, by assigning ASCII codes hardly used to Bandaljum(ˇ) and making the fonts of Korean-English character mode, to design the way of converting automatically a word, a sentence or a document of korean into phonetic letters by applying the algorismized phonological principles inputted as a letter string, even though a user do not konw the basic principles of the usage of Korean-to-Romanization notation rule. This is designed so that it may be possible to turn into a mechanical code with reference to the corresponding character in the table of Korean-to-Romanization notation rule that is the currently used standard proposition of the government. Consequently this program makes it user more convenient in the manipulations of special case words, the assistance of colorful-screen or pull-down, pop-up menu and the adoptation of utilizable mouse works for a user convienency. This program could be installed in a single diskette of 5.25"(2HD) and be made in C programming language to mplement various font, expansion or condense of font, alternative printing.ting.

  • PDF

A Study on Open API of Securities and Investment Companies in Korea for Activating Big Data

  • Ryu, Gui Yeol
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.102-108
    • /
    • 2019
  • Big data was associated with three key concepts, volume, variety, and velocity. Securities and investment services produce and store a large data of text/numbers. They have also the most data per company on the average in the US. Gartner found that the demand for big data in finance was 25%, which was the highest. Therefore securities and investment companies produce the largest data such as text/numbers, and have the highest demand. And insurance companies and credit card companies are using big data more actively than banking companies in Korea. Researches on the use of big data in securities and investment companies have been found to be insignificant. We surveyed 22 major securities and investment companies in Korea for activating big data. We can see they actively use AI for investment recommend. As for big data of securities and investment companies, we studied open API. Of the major 22 securities and investment companies, only six securities and investment companies are offering open APIs. The user OS is 100% Windows, and the language used is mainly VB, C#, MFC, and Excel provided by Windows. There is a difficulty in real-time analysis and decision making since developers cannot receive data directly using Hadoop, the big data platform. Development manuals are mainly provided on the Web, and only three companies provide as files. The development documentation for the file format is more convenient than web type. In order to activate big data in the securities and investment fields, we found that they should support Linux, and Java, Python, easy-to-view development manuals, videos such as YouTube.

Rule Configuration in Self Adaptive System using SWRL (SWRL을 이용한 자가 적응 시스템 내에서의 룰 구성)

  • Park, Young B.;An, Jung Hyun
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.6-11
    • /
    • 2018
  • With the development of the Internet of Things technology, a system that ensures the self-adaptability of an environment that includes various IoT devices is attracting public attention. The rules for determining behavior rules in existing self-adaptation systems are based on the assumption of changes in system members and environment. However, in the IoT environment, flexibility is required to determine the behavior rules of various types of IoT devices that change in real time. In this paper, we propose a rule configuration in a self-adaptive system using SWRL based on OWL ontology. The self-adaptive system using the OWL - SWRL rule configuration has two advantages. The first is based on OWL ontology, so we can define the characteristics and behavior of various types of IoT devices as an integrated concept. The second is to define the concept of a rule as a specific language type, and to add, modify and delete a rule at any time as needed. Through the rule configuration in the adaptive system, we have shown that the rule defined in SWRL can provide flexibility and deeper concept expression function to adaptability to IoT environment.