• Title/Summary/Keyword: Interoperability test

Search Result 190, Processing Time 0.022 seconds

Device Adapter Model based on Dynamic Management Module for u-Health gateway (u-헬스 게이트웨이를 위한 동적 관리 모듈 기반의 디바이스 어댑터 모델)

  • Kim, Jong-Tak;Song, Si-Yun;Hwang, Hee-Jeong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.41-48
    • /
    • 2010
  • It is essential to guarantee a smooth communication and data exchange in a PHD(Personal Healthcare Device) network for applications providing U-health services. In spite of that, most of PHDs are heterogeneous, so the heterogeneity of their protocols makes it difficult to develop an integrated gateway sending sensed healthcare data to U-health service providers. To solve this problem, we suggest the design and implementation of a device adapter model based on dynamic managed module in this paper. Our model were implemented to work on the OSGi-based gateway middleware and to have interoperability in connection with the HL7 system that is the standard of the Healthcare Information systems. In addition, our model has an architecture supporting a communication based on the object serialization in order to provide extensibility in the functional aspect of applications. Through the experiment on a test-bed which is an implementation of the device adapter module for electrocardiogram and blood-pressure/blood-sugar device having one channel, we have confirmed the accuracy of sensing and sending data.

Floating Memristor Emulator Circuit (비접지형 멤리스터 에뮬레이터 회로)

  • Kim, Yongjin;Yang, Changju;Kim, Hyongsuk
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.8
    • /
    • pp.49-58
    • /
    • 2015
  • A floating type of memristor emulator which acts like the behavior of $TiO_2$ memristor has been developed. Most of existing memristor emulators are grounded type which is built disregarding the connectivity with other memristor or other devices. The developed memristor emulator is a floating type whose output does not need to be grounded. Therefore, the emulator is able to be connected with other devices and be utilized for the interoperability test with various other circuits. To prove the floating function of the proposed memristor emulator, a Wheatstone bridge is built by connecting 4 memristor emulators in series and parallel. Also this bridge circuit suggest that it is possible to weight calculation of the neural network synapse.

XML Digital signature System based on Mobile Environment (모바일 환경에서의 XML 문서 디지털 서명 시스템)

  • Hao, Ri-Ming;Hong, Xian-Yu;Lee, Seong-Hyun;Lee, Jae-Seung;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.701-704
    • /
    • 2007
  • Recently, More and more consumer enjoy the finance service such as settling, account transferring, stocks investment, and so via mobile device. In the mobile environment, data transferring between the devices is formatted as XML. However, the common XML file is exposed to the attack such as hacking and malignity code, to satisfy security of mobile environment is very difficult. The problem is more seriously at the open platform such as WIPI that is developed by our country. So there is enough reason to propose one system to protect the import data. In this paper, we development the system to digital signature and signature the XML document in order to protect data, and the system is observing the recommendation of the XML Signature Syntax and Processing by W3C. When designing and composition the system, we use the digital signature algorithm RSA, DSA, KCDSA, and HMAC, etc. we test the system at the open WIPI platform.

  • PDF

Extracting Evaluation Criteria for Evaluating Ontology Quality (온톨로지 품질평가를 위한 평가항목 추출에 관한 연구)

  • Kim, Seonghun;Oh, Sam Gyun
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.2
    • /
    • pp.193-219
    • /
    • 2015
  • The focus of traditional evaluations of ontologies is largely performance-based. A comparison of a new ontology with well-established ones, testing of ontologies in different applications, as well as any judgment of an ontology's appropriateness and relatedness to source data heavily rely on what results that ontology seems to manifest. This study, on the other hand, is an attempt to evaluate the quality of a particular ontology as manifested by its structure, representation, and interoperability. To that end, major categories of quality evaluations were first identified through an extensive survey of literature. Evaluation questions were formulated from these categories using the Delphi method and were validated by ontology experts. The entire process produced a set of 53 evaluation questions, which was then employed to test the quality of a newly-developed smartphone ontology.

Automatic Construction of SHACL Schemas for RDF Knowledge Graphs Generated by R2RML Mappings

  • Choi, Ji-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.9-21
    • /
    • 2020
  • With the proliferation of RDF knowledge graphs(KGs), there arose a need of a standardized schema representation of the graph model for effective data interchangeability and interoperability. The need resulted in the development of SHACL specification to describe and validate RDF graph's structure by W3C. Relational databases(RDBs) are one of major sources for acquiring structured knowledge. The standard for automatic generation of RDF KGs from RDBs is R2RML, which is also developed by W3C. Since R2RML is designed to generate only RDF data graphs from RDBs, additional manual tasks are required to create the schemas for the graphs. In this paper we propose an approach to automatically generate SHACL schemas for RDF KGs populated by R2RML mappings. The key of our approach is that the SHACL shemas are built only from R2RML documents. We describe an implementation of our appraoch. Then, we show the validity of our approach with R2RML test cases designed by W3C.

Xenomai-based Embedded Controller for High-Precision, Synchronized Motion Applications (고정밀 동기 모션 제어 응용을 위한 Xenomai 기반 임베디드 제어기)

  • Kim, Chaerin;Kim, Ikhwan;Kim, Taehyoun
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.173-182
    • /
    • 2015
  • Motion control systems are widely deployed in various industrial automation processes. The motion controller, which is a key element of motion control systems, has stringent real-time constraints. The controller must provide a short and deterministic control message transmission cycle, and minimize the actuation deviation among motor drives. To meet these requirements, hardware-based proprietary controllers have been prevalent. However, since it is becoming difficult for such an approach to meet increasing needs of system interoperability and scalability, nowadays, software-based universal motion controllers are regarded as their substitutes. Recently, embedded motion controller solutions are gaining attention due to low cost and relatively high performance. In this paper, we designed and implemented an embedded motion controller on an ARM-based evaluation board by using Xenomai real-time kernel and other open source software components. We also measured and analyzed the performance of our embedded controller under a realistic test-bed environment. The experimental results show that our embedded motion controller can provide relatively deterministic performance with synchronized control of three motor axis at 2 ms control cycle.

An Empirical Study on Factors Affecting an Individual User's Behavioral Intention to Use SaaS (개인 사용자의 SaaS 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Hong, Il-Yoo;Lee, Seung-Min;Cho, Hwi-Hyung
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.75-94
    • /
    • 2018
  • Today, Software as a Service(SaaS) is being recognized as a key means to enable the innovation of software distribution. Despite the increase in the interest in SaaS, individuals as well as businesses are not yet making an extensive use of it. This research is aimed at identifying and analyzing the antecedents of intentions to use SaaS. We proposed a research model to predict an individual's intention to use SaaS based on the Technology Acceptance Model(TAM). To this end, we conducted a questionnaire survey in which actual software users participated. An empirical analysis has been performed to test the reliability and validity and the hypotheses using SPSS and AMOS software packages. The results of the analysis revealed that functionality, interoperability and economic benefits have positive effects on the intention to use SaaS, while system quality has no significant effect on the behavioral intention. We discussed practical as well as academic implications, and provided research directions.

Design and Implementation of Middleware for Smartphone Environments (스마트폰 환경을 위한 미들웨어 설계 및 구현)

  • Kim, Kyoung-Ju;Moon, Sang-Ho;Yu, Young-Jung;Park, Seong-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.597-604
    • /
    • 2011
  • The various Smartphone platforms that are used currently make difficult to build efficient applications("apps") for Smartphone. Introduction of middleware in the Smartphone environment is being studied to solve this problem. By enhancing interoperability between server systems and Smartphone platforms as introducing this middleware supports efficiently for Smartphone apps to be developed and managed. Thus, the development of this middleware for Smartphone has become essential for the purpose of responding actively to the rapidly expanding Smartphone market. In this research, we designed and implemented Smartphone middleware which optimizes the cost and time for developing new application service and maintaining it. In order to test this implemented middleware's performance and its capabilities, we also developed university Smartphone apps and activated campus twitter.

The Study on the Delineation of the Busan Metropolitan Region, Korea (부산광역도시권 설정에 관한 연구)

  • Lee, Hee-Yul;Ju, Mee-Soon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.10 no.2
    • /
    • pp.167-181
    • /
    • 2007
  • The newly adopted Korea Geodetic Datum (a.k.a. KGD2002) calls for massive reengineering work on geospatial dataset. The main focus of our study is placed on the strategy and system implementations of the required data reengineering with a keen attention to integrated approaches to interoperability, standardization, and database utilization. Our reengineering strategy includes file-to-file, file-to-DB, DB-to-file, and DB-to-DB conversion for the coordinate transformation of KGD2002. In addition to the map formats of existing standards such as DXF and Shapefile, the newly recommended standards such as GML and SVG are also accommodated in our reengineering environment. These four types of standard format may be imported into and exported from spatial database via KGD2002 transformation component. The DB-to-DB conversion, in particular, includes not only intra-database conversion but also inter-database conversion between SDE/Oracle and Oracle Spatial. All these implementations were carried out in multiple computing environments: desktop and the Web. The feasibility test of our system shows that the coordinate differences between Bessel and GRS80 ellipsoid agree with the criteria presented in the existing researches.

  • PDF

Security Model and Application of Persistent Object using Type Information in Integrated Environment of Distributed System (통합 분산환경에서 타입 정보를 이용한 지속성 객체의 보안 모델 및 응용)

  • 김영수;최흥식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.661-669
    • /
    • 2004
  • As a large number of distributed systems becoming more popular, interoperability, portability and security are becoming major concerns of modern computing. CORBA and object-oriented database which provide transparency of network and database are increasingly being used as the basis for distributed system to solve these problems. The two methods can help accomplish assurance of security by using a method-based access control technique or an attribute-based access control technique. These methods also enhance the unavailability or inefficiency caused by the delay of access process and bottleneck of the network due to the complex instance-based access control. We propose a security model on the type information based access control system that can enhance both security and availability by separating the functions delivered from CORBA and object-oriented databases. We apply the access control model specifically to enhancement of security system and also perform a test to verify the security and availability of our model.