• Title/Summary/Keyword: Library Application

Search Result 863, Processing Time 0.029 seconds

A Design nd Implementation of an IEEE 802.11a Modem for a Home Network of high speed (고속 홈네트워크를 위한 IEEE 802.11a 모뎀 설계와 구현)

  • Seo Jung-Hyun;Lee Je-Hoon;Cho Kyoung-Rok;Park Kwang-Roh
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.2
    • /
    • pp.4-18
    • /
    • 2002
  • In this paper, we propose the new design method for the OFDM based modem that is considerd a standard of wireless communication in indoor environments. We designed a improved FFT/IFFT in order to satisfy a data rate $6{\sim}54$Mbps required homenetworking of high speed and a improved channel equalization circuit using pilot signals for modile environments. And we designed a carrier offset estimator that uses the $tan^{-1}$ circuit to organize a memory structure. All steps are verifed performance through a FPGA and are implemented ASIC to use a standard library cell.

  • PDF

Genuine discrimination application using image matching (칼러정보 및 망점 정보를 활용한 코드인증시스템 개발)

  • Choi, Do-young;Kim, Jin-su;Kim, Ji-su;Han, Ga-young;Han, Ha-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.170-172
    • /
    • 2017
  • Due to the technological advances in modern society, the distinction between mask and authenticity is becoming very difficult. to solve these problems, this paper describes a high-level improvement of the image processing technique of the code authentication system which discriminates the good and the bad by using the color information and the dot information. Labels were given to each genuine article and the article, which can not be distinguished from each other. In the proposed method, image matching of labels is performed using the opencv library, and genuine and good products are discriminated by using the halftone dots and w dot dots of each label. In this paper, the proposed method stores genuine and good labels on the server and compares them with the user's labels to determine genuine products.

  • PDF

OpenGL ES 2.0 Emulation on Desktop PCs (데스크탑 상에서의 OpenGL ES 2.0 에뮬레이션)

  • Baek, Nakhoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.4
    • /
    • pp.125-128
    • /
    • 2014
  • OpenGL ES(OpenGL for Embedded System) 2.0 is one of the most widely used 3D graphics API(application progrma interface) standard for smart phones and tablet PCs at this time. During programming with this API, they prefer desktop environment rather than the target mobile environment, which has relatively low computing power. Thus, we need to emulate the OpenGL ES 2.0 API on the desktop PCs, where only OpenGL API libraries are available. In this paper, we present technical difficulties and their solutions to emulate OpenGL ES 2.0 on desktop PCs. Our final implementation of OpenGL ES 2.0 emulation library works on desktop PCs and passed over more than 96% of the official CTS(conformance test suites) to prove the correctness of our implementation. Additionally, for the commercially available benchmark programs, our implementation shows equivalent execution speeds to the previous commercial OpenGL ES 2.0 implementations.

An Implementation of Internet Protocol Version 6 o Windows NT Kernel Environment (윈도우 NT 커널 환경에서 IPv6 프로토콜 구현 연구)

  • Kang, Shin-Gak;Kim, Dae-Young
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2521-2532
    • /
    • 1997
  • The next generation internet protocol, IPv6, have been developed by the IETF according to the requirements of enhancement of classic IP protocols to satisfy the lack of Internet address space as well as the support of multimedia applications. This paper presents an implementation of IPv6 protocols on the Windows NT kernel environment. In this work, we developed and also tested the basic functions, required for operating as an IPv6 host, such as IPv6 header processing, IPv6 address handling, control message processing, group membership processing and neighbor discovery functions. The implemented IPv6 protocol driver module is connected to the lower network interface card through NDIS, a standard network interface. And this driver module that operates within kernel, is implemented as it is connected to upper user applications and lower NDIS using dispatch and lower-edge functions. The developed IPv6 protocol driver can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library.

  • PDF

A Study of Constructing Knowledge Management for Taiwan's Small and Medium-sized Enterprises by Successful Factors

  • Tien, Shiaw-Wen;Wang, Ming-Lang;Chung, Yi-Chan;Tsai, Chih-Hung;Lee, Si-Yi
    • International Journal of Quality Innovation
    • /
    • v.7 no.1
    • /
    • pp.60-89
    • /
    • 2006
  • In the Knowledge-based Economic Era, all of the enterprises are facing global competitive pressure. The activities of knowledge accessing, codifying, and application will obviously become the main inner function on enterprise operation. Knowledge will be the primary competitive advantage; therefore, he who wants to hold the competitive advantage should do the knowledge management (KM) very well. In this study, we construct the research dimensions and variances by the successful factors of KM, which had been practiced very well by big enterprises inside and outside our country, and which was recommended by the related scholars. In order to approach the differences between big enterprises and small and medium-sized enterprises (SMEs) towards implementing KM, this study takes the way of questionnaire investigation to do empirical analysis and to construct the model of KM by path analysis. The study found out when implementing KM, SMEs should highlight 'leadership,' 'library-architecture,' and 'corporate culture' these three aspects, while 'information technology' and 'performance evaluation' these two aspects show no remarkable influence. It shows that he who wants to construct KM might not too overweight on information technology to build the KM system. Therefore, we suggest when implementing KM, enterprises should reinforce the corporate culture by sharing, organized KM process, learning environment for all employees, and highly authorization by top managers in order to reach the expectant success of KM. The result of this study offers practical thinking directions to reach the expectant success for the policy makers in SMEs, who are accessing to or evaluating to implement KM.

3차 저장 장치의 장착을 위한 MIDAS-II의 확장

  • Kim, Yeong-Seong;Gang, Hyeon-Cheol;Kim, Jun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.1
    • /
    • pp.21-35
    • /
    • 2000
  • MIDAS-II is the storage system for BADA DBMS developed at ETRI. This paper describes the extension of MIDAS-II for incorporating the tertiary storage device such as an optical disk jukebox or a tape library, enabling MIDAS-II to function as a storage system of the data server that stores a massive amount of multimedia data. The MIDAS-II disk volume structure is extended to efficiently function as a volume for the tertiary storage device with multiple platters, which canstore huge amount of data of the order of tera bytes. The storage structure of the LOB is changed to efficiently manage the LOB data in the tertiary storage device. The data structures of the shared memory, the process structure, and the utilities in MIDAS-II are also extended to efficiently incorporating the tertiary storage device. The functionalities of each MIDAS-II API function are expanded to handle the tertiary storage device, while the prototypes of those functions are intact in order not to affect the existing application programs. The performance evaluation shows that the extended MIDAS-II works effectively with the tertiary storage device. All these extensions and the performance evaluation are conducted in the SunOS 5.4 environment.

  • PDF

Method and Application of Searching Hot Spot For Reengineering Software Using AOP (AOP를 이용한 재공학에서의 핫 스팟 탐색과 응용)

  • Lee, Ei-Sung;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.83-92
    • /
    • 2009
  • Complicated business logic makes program complexity more complicated. It's inevitable that the program must undergo reengineering processes all the way of in its lifetime. Hot spot analysis that has diverse purposes is getting an important question more and more. As a rule, reengineering process is done by UML model-based approach to analyze the legacy system. The smallest fragment of targets to be analysed is unit, that is function or class. Today's software development is to deal with huge change of software product and huge class including heavy quantity of LOC(Lines Of Code). However, analysis of unit is not precise approach process for reliable reengineering consequence. In this paper, we propose very precise hot spot analysis approach using Aspect-Oriented Programming languages, such as AspectJ. Typically the consistency between UML and source is needed code to redefine the modified library or framework boundaries. But reengineering approach using AOP doesn't need to analyze UML and source code. This approach makes dynamic event log data that contains detailed program interaction information. This dynamic event log data makes it possible to analyze hot spot.

A Development of a Automatic Detection Program for Traffic Conflicts (차량상충 자동판단프로그램 개발)

  • Min, Joon-Young;Oh, Ju-Taek;Kim, Myung-Seob;Kim, Tae-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.5
    • /
    • pp.64-76
    • /
    • 2008
  • To increase road safety at blackspots, it is needed to develop a new method that can process before accident occurrence. Accident situation could result from traffic conflict. Traffic conflict decision technique has an advantage that can acquire and analyze data in time and confined space that is less through investigation. Therefore, traffic conflict technique is highly expected to be used in many application of road safety. This study developed traffic conflict decision program that can analyze and process from signalized intersection image. Program consists of the following functional modules: an image input module that acquires images from the CCTV camera, a Save-to-Buffer module which stores the entered images by differentiating them into background images, current images, difference images, segmentation images, and a conflict detection module which displays the processed results. The program was developed using LabVIEW 8.5 (a graphic language) and the VISION module library.

  • PDF

Implementation of User Interface for Geo-spatail Information Processing Toolkit using Open Source-based PostGIS (공개소스 PostGIS 기반 공간정보 처리 툴 킷 사용자 인터페이스 구현)

  • Han, Sun-Mook;Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.2
    • /
    • pp.185-192
    • /
    • 2009
  • Recently, open sources for geo-spatial information processing and analysis are being developed, and they are widely adopted for the various application development projects. Open sources in the geo-spatial communities consist in several levels or types: viewer, API-level, engine sources of SDK-level, or toolkits. Among them, spatial database engine of PostgreSQL-PostGIS is used in this study for the portable multi-geospatial information processing toolkit. This work can be extended to target-based applications with domain-specific spatial queries and analyses. Design and implementation are based on C Language Interface (LIBPQ) to PostGIS and OGC library on PostgreSQL database. Conclusively, PostGIS according to this approach is an important alternative to develop most applications dealing with multi-geospatial information due to its availability, extensibility, scalability, and stability.

Development of water elevation prediction algorithm using unstructured data : Application to Cheongdam Bridge, Korea (비정형화 데이터를 활용한 수위예측 알고리즘 개발 : 청담대교 적용)

  • Lee, Seung Yeon;Yoo, Hyung Ju;Lee, Seung Oh
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.121-121
    • /
    • 2019
  • 특정 지역에 집중적으로 비가 내리는 현상인 국지성호우가 빈번히 발생함에 따라 하천 주변 사회기반시설의 침수 위험성이 증가하고 있다. 침수 위험성 판단 여부는 주로 수위정보를 이용하며 수위 예측은 대부분 수치모형을 이용한다. 본 연구에서는 빅데이터 기반의 RNN(Recurrent Neural Networks)기법 알고리즘을 활용하여 수위를 예측하였다. 연구대상지는 조위의 영향을 많이 받는 한강 전역을 대상으로 하였다. 2008년~2018년(10개년)의 실제 침수 피해 실적을 조사한 결과 잠수교, 한강대교, 청담대교 등에서 침수 피해 발생률이 높게 나타났고 SNS(Social Network Services)와 같은 비정형화 자료에서는 청담대교가 가장 많이 태그(Tag)되어 청담대교를 연구범위로 설정하였다. 본 연구에서는 Python에서 제공하는 Tensor flow Library를 이용하여 수위예측 알고리즘을 적용하였다. 데이터는 정형화 데이터와 비정형 데이터를 사용하였으며 정형화 데이터는 한강홍수 통제소나 기상청에서 제공하는 최근 10년간의 (2008~2018) 수위 및 강우량 자료를 수집하였다. 비정형화 데이터는 SNS를 이용하여 민간 정보를 수집하여 정형화된 자료와 함께 전체자료를 구축하였다. 민감도 분석을 통하여 모델의 은닉층(5), 학습률(0.02) 및 반복횟수(100)의 최적값을 설정하였고, 24시간 동안의 데이터를 이용하여 3시간 후의 수위를 예측하였다. 2008년~ 2017년 까지의 데이터는 학습 데이터로 사용하였으며 2018년의 수위를 예측 및 평가하였다. 2018년의 관측수위 자료와 비교한 결과 90% 이상의 데이터가 10% 이내의 오차를 나타내었으며, 첨두수위도 비교적 정확하게 예측되는 것을 확인하였다. 향후 수위와 강우량뿐만 아니라 다양한 인자들도 고려한다면 보다 신속하고 정확한 예측 정보를 얻을 수 있을 것으로 기대된다.

  • PDF