• Title/Summary/Keyword: Information architecture

Search Result 9,306, Processing Time 0.039 seconds

Approaching Content Reuse for Efficient Technical Documentation (효율적인 기술문서화를 위한 콘텐트 재사용성 접근방법)

  • Koo, Heung-Seo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.113-118
    • /
    • 2010
  • The single-sourcing of content is extremely beneficial because when we are managing several projects with hundreds or thousands of documentation, we don't want to be changing the same content, or substantially similar content in multiple locations. The Darwin Information Typing Architecture (DITA) is an XML-based architecture for authoring, producing, and delivering technical documents. It consists of a set of design principles for creating Information -typed topic modules and for using that content in various ways. In this paper, we examine the approach of using The Darwin Information Typing Architecture for technical documents development to enhance the reuse of existing content components for difference information products.

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

Customized Safety Information Delivery System for Unskilled Construction Worker Training

  • Jo, Junhyeon;Baik, Sangeun;Pedro, Akeem;Lee, Doyeop;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.525-532
    • /
    • 2022
  • Accidents at construction sites in Korea account for more than half of all industrial accidents. To solve this problem, a policy to strengthen safety education was implemented to ensure the safety of workers. However, it was analyzed that there is a high possibility of accidents because workers did not receive proper safety information for each risk factor due to general lecture-style education. In addition, statistics show that the accident status of workers with fewer years of period is high, indicating that a customized information delivery method needs to be proposed for unskilled workers with fewer years of period. Research on the importance of education has been conducted, but no information delivery method has been identified. For unskilled workers to effectively receive safety information, appropriate delivery formats (text, photos, illustrations, 4D-BIM, 360-based panorama, video, animation) were analyzed, and a new method of education was proposed. If customized safety information is provided according to this proposal, effective information delivery to unskilled workers will be possible, and it is expected to be verified in various ways.

  • PDF

A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment (웹 기반 의료정보시스템 다중 접근제어를 위한 소프트웨어아키텍쳐 설계방법)

  • Noh, Si-Choon;Hwang, Jeong-Hee
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.43-49
    • /
    • 2011
  • Web-based health information provides a lot of conveniences, however the security vulnerabilities that appear in the network environment without the risk of exposure in the use of information are growing. Web-based medical information security issues when accessing only the technology advances, without attempting to seek a safe methodology are to increase the threat element. So it is required. to take advantage of web-based information security measures as a web-based access control security mechanism-based design. This paper is based on software architecture, design, ideas and health information systems were designed based on access control security mechanism. The methodologies are to derive a new design procedure, to design architecture and algorithms that make the mechanism functio n. To accomplish this goal, web-based access control for multiple patient information architecture infrastructures is needed. For this software framework to derive features that make the mechanism was derived based on the structure. The proposed system utilizes medical information, medical information when designing an application user retrieves data in real time, while ensuring integration of encrypted information under the access control algorithms, ensuring the safety management system design.

Multi-rate Non-recursive Architecture for Cascaded Integrator-Comb Decimation Filters with an Arbitrary Factor (임의의 인수를 갖는 cascaded Integrator-Comb 데시메이션 필터의 Multi-rte Non-recursive 아키텍처)

  • 장영범
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10B
    • /
    • pp.1785-1792
    • /
    • 2000
  • In this paper multi-rate non-recursive architecture for CIC(Cascaded Integrator-Comb) decimation filters with an arbitrary factor is proposed. The CIC filters are widely used in high speed wireless communication systems since they have multiplier-less and multi-rate low-power structure. Even conventional non-recursive CIC structure is multi-rate this architecture can be structured only in case of M-th power-of-two decimation factor. This paper proposes that muli-rate non-recursive CIC architecture can be structured with an any decimation factor of product form. Power consumption of the proposed architecture is compared with that of the conventional non-recursion architecture.

  • PDF

XML based Software Architecture Specification Language for Reuse (재사용을 위한 XML 기반 소프트웨어 아키텍쳐 명세 언어)

  • Lee, Yun-Su;Yun, Gyeong-Seop;Wang, Chang-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.808-817
    • /
    • 2000
  • Component specification languages in consideration of reuse are essential factor in classification, verification and retrieval of components. A number of legacy specification languages have already been used, however, they are complex and include many necessary elements in the specification for implementation. In this paper, we present XML-based component specification and software architecture specification language to solve these problems of legacy specification languages. The presented specification languages consist of component specification, which is composed of signature specification, interface specification and message specification, and software architecture specification providing graphical notations and textural notations. Component specification supports component retrieval with behavioral match and black-box reuse of component. In addition to this, it improves the efficiency of retrieval and document management with XML-based component specification. Software architecture specification supports the structural reuse of architecture, which is white-box reuse, through mesage-based architecture specification.

  • PDF

A Study on the Architecture Modeling of Information System using Simulation (시뮬레이션을 이용한 정보시스템 아키텍쳐 모델링에 관한 연구)

  • Park, Sang-Kook;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.455-458
    • /
    • 2013
  • The conventional design of the information system architecture based on the personal experience of information systems has been acted as a limit in progress utilizing appropriate resource allocation and performance improvements. Architecture design depending on personal experience makes differences in variance of a designer's experience, intellectual level in related tasks and surroundings, and architecture quality according to individual's propensity. After all these problems cause a waste of expensive hardware resources. At working place, post-monitoring tools are diversely developed and are running to find the bottleneck and the process problems in the information operation. However, there are no simulation tools or models that are used for expecting and counteracting the problems at early period of designing architecture. To solve these problems we will first develop a simulation model for designing information system architecture in a pilot form, and will verify validity. If an error rate is found in the permissible range, then it can be said that the simulation reflects the characteristic of information system architecture. After the model is developed in a level that can be used in various ways, more accurate performance computation will be able to do, getting out of the old way relying on calculations, and prevent the existence of idle resources and expense waste that comes from the wrong design of architecture.

  • PDF

Parallel Inverse Transform and Small-sized Inverse Quantization Architectures Design of H.264/AVC Decoder (H.264/AVC 복호기의 병렬 역변환 구조 및 저면적 역양자화 구조 설계)

  • Jung, Hong-Kyun;Cha, Ki-Jong;Park, Seung-Yong;Kim, Jin-Young;Ryoo, Kwang-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.444-447
    • /
    • 2011
  • In this paper, parallel IT(inverse transform) architecture and IQ(inverse quantization) architecture with common operation unit for the H.264/AVC decoder are proposed. By using common operation unit, the area cost and computational complexity of IQ are reduced. In order to take four execution cycles to perform IT, the proposed IT architecture has parallel architecture with one horizontal DCT unit and four vertical DCT units. Furthermore, the execution cycles of the proposed architecture is reduced to five cycles by applying two state pipeline architecture. The proposed architecture is implemented to a single chip by using Magnachip 0.18um CMOS technology. The gate count of the proposed architecture is 14.3k at clock frequency of 13MHz and the area of proposed IQ is reduced 39.6% compared with the previous one. The experimental result shows that execution cycle the proposed architecture is about 49.09% higher than that of the previous one.

  • PDF