• Title/Summary/Keyword: EA Implementation

Search Result 31, Processing Time 0.025 seconds

A Model of implementation Data Architecture for Enterprise Architecture (EA를 위한 데이터 아키텍처 구축 모델)

  • Kim, Seok-Soo;Lee, Hwa-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.175-183
    • /
    • 2011
  • Data is the kernel of IT. We can apply to other architectures are refer to technology and advanced method. Data architecture is our's native that must be implement ourself. It will suggest to the best method to implement for a sound information system that likes to framework of building because data is not sensitive field of evolution and change of technology. Well implemented data architecture can be effectively management and operation. Also this is easily to implement of enterprise architecture. This paper propose a model of implementation data architecture for enterprise architecture.

Design and Implementation of a RFID Reader Antenna Optimal Arrangement System (RFID 리더기 안테나 최적 배치 시스템의 설계 및 구현)

  • Soon, Nam-Soon;Yeo, Myung-Ho;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.67-74
    • /
    • 2009
  • Incorrect deployment of RFID readers occurs reader-to-reader interferences in many applications using RFID technologies. Reader-to-reader interference occurs when a reader transmits a signal that interferes with the operation of another reader, thus preventing the second reader from communicating with tags in its interrogation zone. Interference detected by one reader and caused by another reader is referred to as a reader collision. In RFID systems, the reader collision problem is considered to be the bottleneck for the system throughput and reading efficiency. In this paper, we propose a novel RFID reader anti-collision algorithm based on evolutionary algorithm(EA). First, we analyze characteristics of RFID antennas and build database. Also, we propose EA encoding algorithm, fitness algorithm and genetic operators to deploy antennas efficiently. To show superiority of our proposed algorithm, we simulated our proposed algorithm. In the result, our proposed algorithm obtains 95.45% coverage rate and 10.29% interference rate after about 100 generations.

A Study on the Improvement Model of Administrative Information Dataset Records Management Environment: Focused on the Dataset of Picture Archiving and Communication System (행정정보 데이터세트 기록관리 환경개선 모델 연구: 의료영상저장전송시스템(PACS)의 데이터세트를 중심으로)

  • Lee, Sun-kyung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.2
    • /
    • pp.51-73
    • /
    • 2022
  • Currently, an implementation plan of administrative information dataset record management has been prepared; however, analyzing the specificity of various administrative information systems and preparing a reasonable level of management reference table by applying about 1.3% (EA portal registration system: 16,199, consulting system: 214) has its limitations. This study started by recognizing the importance of the records management environment in administrative information datasets. Based on the described information, the current records management environment was analyzed by dividing the six areas of the management reference table of the picture archiving and communication system (PACS) into three groups. Thus, a systematic environmental improvement model was proposed, enhancing the effectiveness of dataset records management in the field. Although there is a limitation in analyzing one of the dataset records management environments of various institutions, it is intended to help broaden the horizons of records management research.

A Study of IT Governance Model for Enterprise Information Management : Focused on Case Company (EIM(Enterprise Information Management)을 위한 IT 거버넌스 모델 연구 : 사례 기업을 중심으로)

  • Ahn, Jong-Chang;Kang, Youn-Chol;Lee, Ook
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.95-117
    • /
    • 2011
  • Today, IT governance has also become a subject of attention along with recent technologies such as ITSM (IT Service Management), PPM (Project Portfolio Management) and Compliance. At the national level, the market is fairly recent. and therefore, lacks detailed research in the field. Models specifically related to EIM has not yet been presented to this day, hence, firms that are considering EIM as a potential part of their information management system may fall into a state of disorder in the process of its implementation. To this end, this research attempts to construct an IT governance model for EIM based on existing models, surveys and interviews. In particular, E-discovery has been applied as means of protecting information assets and its use as evidence. In addition, by applying the research model to a particular global firm and then assessing its documentation management system, the overall feasibility of the research model has been tested.

Hardware Implementation of EBCOT TIER-1 for JPEG2000 Encoder (JPEG2000 Encoder를 위한 EBCOT Tier-1의 하드웨어 구현)

  • Lee, Sung-Mok;Jang, Won-Woo;Cho, Sung-Dae;Kang, Bong-Soon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.2
    • /
    • pp.125-131
    • /
    • 2010
  • This paper presents the implementation of a EBCOT TIER-1 for JPEG2000 Encoder. JPEG2000 is new standard for the compression of still image for overcome the artifact of JPEG. JPEG2000 standard is based on DWT(Discrete Wavelet Transform) and EBCOT Entropy coding technology. EBCOT(Embedded block coding with optimized truncation) is the most important technology that is compressed the image data in the JPEG2000. However, EBCOT has the artifact because the operations are bit-level processing and occupy the harf of the computation time of JPEG2000 Compression. Therefore, in this paper, we present modified context extraction method for enhance EBCOT computational efficiency and implemented MQ- Coder as arithmetic coder. The proposed system is implemented by Verilog-HDL, under the condition of TSMC 0.25um ASIC library, gate counts are 30,511EA and satisfied the 50MHz operating condition.

A Design and Implementation Red Tide Prediction Monitoring System using Case Based Reasoning (사례 기반 추론을 이용한 적조 예측 모니터링 시스템 구현 및 설계)

  • Song, Byoung-Ho;Jung, Min-A;Lee, Sung-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1219-1226
    • /
    • 2010
  • It is necessary to implementation of system contain intelligent decision making algorithm because discriminant and prediction system for Red Tide is insufficient development and the study of red tide are focused for the investigation of chemical and biological causing. In this paper, we designed inference system using case based reasoning method and implemented knowledge base that case for Red Tide. We used K-Nearest Neighbor algorithm for recommend best similar case and input 375 EA by case for Red Tide case base. As a result, conducted 10-fold cross verification for minimal impact from learning data and acquired confidence, we obtained about 84.2% average accuracy for Red Tide case and the best performance results in case by number of similarity classification k is 5. And, we implemented Red Tide monitoring system using inference result.

Implementation of VGPO/VGPI Velocity Deception Jamming Technique using Phase Sampled DRFM (위상 샘플방식 DRFM을 이용한 VGPO/VGPI 속도기만 재밍기법 구현)

  • Kim, Yo-Han;Moon, Byung-Jin;Hong, Sang-Guen;Sung, Ki-Min;Jeon, Young-Il;Na, In-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.955-961
    • /
    • 2021
  • In modern warfare, the importance of electronic warfare, which carries out a mission that using radio wave to find out enemy information or to protect ally information, has increased. Radar jamming technique is one of the most representative techniques of EA(Electronic Attack), it disturbs and deceives enemy radar system in order to secure ally location information. Velocity deception jamming technique, which is one of the radar jamming techniques, generally operate against pulse-doppler radar which use doppler effect in order to track target's velocity and location. Velocity Deception Jamming Technique can be implemented using DRFM(Digital Radio Frequency Memory) that performs Frequency Modulation. In this paper, I describe implementation method of VGPO/VGPI(Velocity Gate Pull-Off/Pull-In) velocity deception jamming technique using phase-sampled DRFM, and verify the operation of VGPO/VGPI velocity deception jamming technique with board test under signal injection condition.

A Design and Implement Vessel USN Risk Context Aware System using Case Based Reasoning (사례 기반 추론을 이용한 선박 USN 위험 상황 인식 시스템 구현 및 설계)

  • Song, Byoung-Ho;Lee, Seong-Ro
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.3
    • /
    • pp.42-50
    • /
    • 2010
  • It is necessary to implementation of system contain intelligent decision making algorithm considering marine feature because existing vessel USN system is simply monitoring obtained data from vessel USN. In this paper, we designed inference system using case based reasoning method and implemented knowledge base that case for fire and demage of digital marine vessel. We used K-Nearest Neighbor algorithm for recommend best similar case and input 3.000 EA by case for fire and demage context case base. As a result, we obtained about 82.5% average accuracy for fire case and about 80.1% average accuracy for demage case. We implemented digital marine vessel monitoring system using inference result.

Design and Implementation of Efficient Adaptive RED Router Suffer Management Algorithm (Efficient Adaptive RED라우터 버퍼 관리 알고리즘 디자인과 구현)

  • Lee, Jong-Hyun;Lim, Hye-Young;Huh, Eui-Nam;Hwang, Jun;Kim, Young-Chan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.208-210
    • /
    • 2003
  • RED(Random Early Detection) 라우터를 성공적으로 배치하기 위해서는 RED 알고리즘을 구성하는 각 파라미터를 적절히 조절할 수 있어야 한다. 특히 다수의 TCP 연결이 하나의 라우터를 공유하는 네트워크 병목구간에서는 그 중요성이 한층 강조된다. 그러나 RED가 TD 라우터와 같은 네트워크 퍼포먼스를 유지하면서 ICP 커넥션 간 페어니스(fairness)를 향상시키기 위해서는, 네트워크 상황에 따라 다수의 컨트롤 파라미터 값을 적절하게 설정해줘야만 한다. 문제는 다양한 네트워크 환경에서 효과적으로 RED 알고리즘이 동작하기 위해 파라미터를 설정하는 것이 매우 어렵다는 것이다. 본 논문에서는 네트워크 상황에 따라 동적으로 RED 파라미터를 조절하면서 빠르게 안정적인 상태로 적응하는 진보된 RED 알고리즘인 ea-RED(Efficient Adaptive RED)를 디자인하고 구현하여 알고리즘의 효율성을 확인한다.

  • PDF

A Study on the Implementation and Operation of an Architecture-Based M&S System for Ministry of National Defense (아키텍처 기반의 국방 Modeling & Simulation 체계 구축 및 운영에 관한 연구)

  • Kim, Hyoung Jin;Park, Chan Uk
    • Informatization Policy
    • /
    • v.18 no.1
    • /
    • pp.73-99
    • /
    • 2011
  • The Korean military has developed and operated computer, network, communication technologies as well as war game models to strengthen the national defense M&S continuously. In particular, lots of projects for developing models for drill/training, analyses, and acquired fields are being conducted in the military. However, it needs to look into the actual conditions and seek for strategies to develop the national defense M&S. First of all, in the field of war games, various national defense architectures have been built, including war and information environment architectures starting from the resource architecture in 2006. However, the function of drill and training is limited, so additional war game architectures are required to be built. To build joint war game architectures available as an effective verification tool to implement plans of the national defense and war architectures, this study examines the actual conditions of the current war game systems and suggested building joint war game architectures.

  • PDF