• Title/Summary/Keyword: File modification

Search Result 75, Processing Time 0.02 seconds

A Sutdy of VTS Simulator Development using port specified scenario technology (항만별 맞춤 시나리오 생성기술을 적용한 VTS시뮬레이터 개발에 관한 연구)

  • Nam, Gyeungtae;Lee, Sangil;Lee, Younggeun;Park, Gwangbok
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.10a
    • /
    • pp.32-33
    • /
    • 2013
  • In the past, the scenario of VTS simulator was made by instructor's manual operation using waypoint definition of target ship. but in this study, we use automatic scenario creation technology with AIS data and Port-MIS data. The created VTS simaulator scenario also can be modified, added, and saved by instructor's manual operation. VTS simulator display target ship on the Electronic Navigation Chart based on S-57 format. A instructor can easily open this scenario and start, pause, stop operation wirth VTS simulator. A new modification also can be applied immediately to current scenario and can be saved new scenario file. VTS simulator using this technology can create many scenarios for a specific purpose and can be easily used for various application fields.

  • PDF

Design and Applications of Graphics Interface on Personal Computer (개인용 컴퓨터상의 그래픽스 인터페이스 설계와 응용)

  • Kim, Jin-Han;Kyung, Chong-Min
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.1
    • /
    • pp.113-121
    • /
    • 1989
  • A software interface called CGI-K including device driver routines and graphics primitives for the grphic board "K" was designed, implemented in the Design Automation Laboratory of KAIST and installed on IBM PC/AT, using assembly and C language supported by TMS 34010 grphics processor. Several algorithms generating the graphics primitives such as box, circle, pie chord are proposed. The drawing speed of CGI-K on the graphic board K was found out to be three to ten times faster than that of the EGA for several examples. A 2-D graphics editor called GRIM (graphics input and modification) and a 3-dimensional graphics renderer called IPCHE which can draw 3-D objects were developed as two major application programs running on CGI-K. The graphics primitives supported in GRIM include polygon, box, circle, and ace. The IPCHE receives a 3-D objects data file and displays the 3-D object on the screen with hidden surface removal, shading, and perspective scaling.

  • PDF

History Database Construction for Digital Map Updating System using As-Built Drawings (준공도면을 이용한 수치지형도 갱신시스템의 이력 DB 설계)

  • Yang, Sung-Chul;Kim, Ki-Rack;Yu, Ki-Yun
    • Spatial Information Research
    • /
    • v.17 no.2
    • /
    • pp.183-189
    • /
    • 2009
  • The modification of digital maps because of creation, extinction, and change of topology can be expressed by change of information. But according to complication of society, topology of digital maps and relation with another objects is more complicated. We carry out partial update using as-built drawings to reflect in digital maps efficiently with maintaining accuracy and update. This supplement a weak point of partial update without field surveying. But unlike creation and extinction of file with information or of entire database, when each object is changed, added problem will come like change of raw data and of updating date. So it is necessary that history data about creation, change and extinction of spatial data and attribute data have to be chosen and managed. In this study, we analyze operations of updating system of digital map using as-built drawings, and suggest the history database system.

  • PDF

Flash-Conscious Storage Management Method for DBMS using Dynamic Log Page Allocation (동적 로그 페이지 할당을 이용한 플래시-고려 DBMS의 스토리지 관리 기법)

  • Song, Seok-Il;Khil, Ki-Jeong;Choi, Kil-Seong
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.767-774
    • /
    • 2010
  • Due to advantages of NAND flash memory such as non-volatility, low access latency, low energy consumption, light weight, small size and shock resistance, it has become a better alternative over traditional magnetic disk drives, and has been widely used. Traditional DBMSs including mobile DBMSs may run on flash memory without any modification by using Flash Translation Layer (FTL), which emulates a random access block device to hide the characteristics of flash memory such as "erase-before-update". However, most existing FTLs are optimized for file systems, not for DBMSs, and traditional DBMSs are not aware of them. Also, traditional DBMSs do not consider the characteristics of flash memory. In this paper, we propose a flash-conscious storage system for DBMSs that utilizes flash memory as a main storage medium, and carefully put the characteristics of flash memory into considerations. The proposed flash-conscious storage system exploits log records to avoid costly update operations. It is shown that the proposed storage system outperforms the state.

An Implementation of QR Code based On-line Mobile Augmented Reality System (QR코드 기반의 온라인 모바일 증강현실 시스템의 구현)

  • Park, Min-Woo;Park, Jung-Pil;Jung, Soon-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1004-1016
    • /
    • 2012
  • This paper proposes a mobile augmented reality system to provide detail information of the products using QR code included in them. In the proposed system, we perform the estimation of the camera pose using both of marker-based and markerless-based methods. If the camera can see the QR code, we perform the estimation of the camera pose using the set of rectangles in the QR code. However, if the QR code is out of sight, we perform the estimation of the camera pose based homography between consecutive frames. Moreover, the content of the augmented reality in the proposed system is made by using meta-data. Therefore, the user can make contents of various scenario using only meta-data file without modification of our system. Especially, our system maintains the contents as newly updated state by the on-line server. Thus, it can reduce the unnecessary update of the program.

CAD/CAM system for Cam (Cam의 CAD/CAM)

  • Kim, Ki Dae
    • Journal of Biosystems Engineering
    • /
    • v.16 no.3
    • /
    • pp.228-238
    • /
    • 1991
  • Cam plays very important roles due to continuous requirement for the high-speed and automation of the machinery. A large number of studies of cam curve were carried out by many researchers, and CNC milling and machining center for manufacturing cam have been widely used recently. The purpose of this study was to develop a CAD/CAM system for cam using QuickBasic language in 16-bit PC for application of cam design and manufacturing. Results obtained were as follows : 1. It was possible to input data by entering cam angle and its corresponding R, from 0 to 360 deg. of cam angle. The tediousness at entering data was minimized because of the same data format for both cylindrical cam and disc cam, and free format used for data file. 2. It was possible to design cam by choosing only the number of cam curve because of developing the CAD/CAM program with dimensionless method of cam curves including widely used 19 kinds. After selecting the number of the cam curve, the CAD/CAM system automatically shows the characteristics of cam motion enough to help a designer to decide : displacement, velocity, acceleration and jerk. 3. It was possible to execute, in an efficient way, both the cam profile synthesis and the generation of NC program for CNC machining center by using the input data. 4. This NC program generated by the CAD/CAM system developed here, was evaluated as positive in relation with actual manufacturing experiments and thought to be useful in its application without any modification. It can be said that this CAD/CAM system could be used by the beginners to design and manufacture the cam automatically as the system consists of very simple dialogue methods. In addition, self-developed QuickBasic would be would used as a basic tool for further stuides in this area of research, together with application.

  • PDF

A Retrospective Study on the Status of Obesity and Eating and Weight Control Behaviors of Elementary School Children in Inchon (인천지역 초등학생의 후향적 연구방법에 의한 비만이행추이 및 식생활습관과 체중조절행태)

  • Park, Su-Jin;Kim, Ae-Jeong
    • Journal of the Korean Dietetic Association
    • /
    • v.6 no.1
    • /
    • pp.44-52
    • /
    • 2000
  • Two hundred sixty six children were retrospectively surveyed from first to fifth grade to find out the status of obesity during four years. The obesity index was gained by height and weight data from student's health file and the data about eating behaviors and weight control behaviors, etc. were collected by questionnaires. Children assigned to one of the following groups : underweight, normal, overweight and obese. The results were as follows ; 1. Obese children were 18.6%(n=27) of boys and 10.8%(n=13) of girls at fifth grade. 2. Twenty eight children among forty obese children at fifth grade were also overweight or obese at first grade, and the other twelve was normal. 3. Breakfast skipping rate was significantly high among underweight and obese group of boys(p<0.01).The most children(87.6%) had prejudice for special foods. 4. The rate of agreement between obesity index and self recognition of body image was 60.7% in boys and 63.6% in girls. 5. Forty two point five percent of children have ever tried weight control as exercise(35.7%), reducing sugars and snacks(27%), fasting(23.8%), avoiding fatty foods(12.7%), taking diet food or drug(0.8%). In conclusion, the prevalence of children obesity is gradually increasing and children tried weight control without right guidances. In order to prevent progress into adulthood obesity, nutrition education should be followed with school foodservice including the right perception for obesity, proper weight control and eating behavior modification.

  • PDF

Implementation and Performance Analysis of Single I/O Space Service for Cluster Computers (클러스터 컴퓨터를 위한 단일 I/O 공간 서비스의 구현 및 성능분석)

  • Kim, Tae-Kyu;Kim, Bang-Hyun;Kim, Jong-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.13A no.6 s.103
    • /
    • pp.517-524
    • /
    • 2006
  • In cluster computers, it is essential to Implement the single I/O space(SIOS) supporting integrated I/O substructure to efficiently process I/O intensive applications. SIOS service provides with global I/O address space to directly access peripherals and hard disks in its own or remote nodes from any node in the cluster computer In this thesis, we propose the implementation method of SIOS in Linux clusters by using only freewares. This method is implemented at device driver level that uses Enhanced Network Block Device(ENBD) and file system level that uses S/W RAID and NFS. The major strengths of this method are easiness of implementation and almost no cost due to using freewares. In addition, since freewares used are open sources, it is possible to apply this method to other platforms with only slight modification. Moreover, experiments show that I/O throughputs are up to 5.5 times higher in write operations and approximately 2.3 times higher in read operations than those of CDD method that uses the device driver developed at kernel level.

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.

DRM Enabled P2P Model for Contents Protection (콘텐츠 보호를 위한 DRM이 적용된 P2P 모델)

  • Sung Jae-Youn;Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.389-396
    • /
    • 2006
  • P2P(Peer To Peer) system, a most attractive file sharing system, is the largest channel of contents distribution and it takes 50% of network traffic. But P2P systems are infamous for used to illegal contents distribution channel not only in music industry, but also in movie industry. But, DRM(Digital Right Management) enabled P2P models are not suggested until now that interrupting illegal contents distribution and keeping advantage of P2P. So in this paper, we suggest a DRM enabled P2P model that can support distributed processing ability and high scalability with no modification in exist P2P model or architecture.