• Title/Summary/Keyword: Memory management

Search Result 1,059, Processing Time 0.03 seconds

Development of the Efficient DAML+OIL Document Management System to support the DAML-S Services in the Embedded Systems (내장형 시스템에서 DAML-S서비스 지원을 위한 효율적인 DAML+OIL문서 관리 시스템)

  • Kim Hag Soo;Jung Moon-young;Cha Hyun Seok;Son Jin Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.36-49
    • /
    • 2005
  • Recently, many researchers have given high attention to the semantic web services based on the semantic web technology While existing web services use the XML-based web service description language, WSDL, semantic web services are utilizing web service description languages such as DAML-S in ontology languages. The researchers of semantic web services are generally focused on web service discovery, web service invocation, web service selection and composition, and web service execution monitoring. Especially, the semantic web service discovery as the basis to accomplish the ultimate semantic web service environment has some different properties from previous information discovery areas. Hence, it is necessary to develop the storage system and discovery mechanism appropriate to the semantic well description languages. Even though some related systems have been developed, they are not appropriate for the embedded system environment, such as intelligent robotics, in which there are some limitations on memory disk space, and computing power In this regard, we in the embedded system environment have developed the document management system which efficiently manages the web service documents described by DAML-S for the purpose of the semantic web service discovery, In addition, we address the distinguishing characteristics of the system developed in this paper, compared with the related researches.

Context-awareness User parameter Analysis based on Clustering Algorithm (상황인식정보 추출을 위한 클러스터링 알고리즘 기반 사용자 구분 알고리즘)

  • Kim, Min-seop;Ho, Shin-in;Jung, Byoung-hoon;Son, Ji-won;Jo, Ah-hyeon;do, yun-hyung;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.519-522
    • /
    • 2017
  • In this paper, we propose an algorithm for an alternative method using the clustering algorithm in a system that needs classification to extract individual user context information. In the conventional user classification system, the user has to input his own information. In this paper, we will research and develop a system applying a clustering algorithm which can extract user 's perceived information applying the improved algorithm for user management base. Generally, the algorithm that distinguishes users with the same data makes sure that recorded information matches the newly entered information, and then responds accordingly. However, it is troublesome to manually input information of the new user. Therefore, in this paper, we propose a method to distinguish users by using the clustering algorithm based on the analyzed data from the working memory in the accumulated system without directly inputting the user information. The study shows that the management method applied to the applied algorithm is more adaptive in environments where the number of people is different from that of the existing system (as a subjective observer test method).

  • PDF

Dynamic Management of Equi-Join Results for Multi-Keyword Searches (다중 키워드 검색에 적합한 동등조인 연산 결과의 동적 관리 기법)

  • Lim, Sung-Chae
    • The KIPS Transactions:PartA
    • /
    • v.17A no.5
    • /
    • pp.229-236
    • /
    • 2010
  • With an increasing number of documents in the Internet or enterprises, it becomes crucial to efficiently support users' queries on those documents. In that situation, the full-text search technique is accepted in general, because it can answer uncontrolled ad-hoc queries by automatically indexing all the keywords found in the documents. The size of index files made for full-text searches grows with the increasing number of indexed documents, and thus the disk cost may be too large to process multi-keyword queries against those enlarged index files. To solve the problem, we propose both of the index file structure and its management scheme suitable to the processing of multi-keyword queries against a large volume of index files. For this, we adopt the structure of inverted-files, which are widely used in the multi-keyword searches, as a basic index structure and modify it to a hierarchical structure for join operations and ranking operations performed during the query processing. In order to save disk costs based on that index structure, we dynamically store in the main memory the results of join operations between two keywords, if they are highly expected to be entered in users' queries. We also do performance comparisons using a cost model of the disk to show the performance advantage of the proposed scheme.

An Empirical Study on the Relationships among Safeguarding Mechanism, Relationship Learning, and Relationship Performance in Technology Cooperation Network by Applying Resource Based Theory (자원기반이론을 적용한 기술협력 네트워크에서 보호 메커니즘, 관계학습, 관계성과의 관계에 대한 실증연구)

  • Kang, Seok-Min
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.45-66
    • /
    • 2016
  • Firms can make scale of economy and scope of economy by internalizing and using new advanced technology and knowledge from technology cooperation network, decrease risk and cost with partner firm of technology cooperation network, and increase market advantage of product & strengthen firms' position in the market. Due to the advantages of technology cooperation network, the related studies have focused on the positive effect of technology cooperation network. However, the related studies investigating the relationship between technology cooperation network and firm performance have only examined the role of technology cooperation network. Safeguarding mechanism, relationship learning, and relationship performance are categorized into the process of technology cooperation network, and this categorization is applied as resources, capability, and performance by resource based view. The empirical results are reported as belows. First, relationship specific investment and relationship capital positively affect on relationship learning as capability. Second, information sharing, common information understanding, and relationship specific memory development positively affect on long-term orientation, but information sharing has no impact on efficiency and effectiveness. Third, relationship specific investment positively affects on relationship capital and efficiency and effectiveness have positive effects on long-term orientation. Applying technology cooperation network in asymmetric technology dependency with resource based theory, this study suggested the importance of both safeguarding and relationship learning by investigating the relationship among safeguarding, relationship learning, and relationship performance. And it is worthy that this study investigated how firms' behavior change affects relationship performance in the relationship of technology cooperation partner.

  • PDF

Identification of Japanese Black Cattle by the Faces for Precision Livestock Farming (흑소의 얼굴을 이용한 개체인식)

  • 김현태;지전선랑;서률귀구;이인복
    • Journal of Biosystems Engineering
    • /
    • v.29 no.4
    • /
    • pp.341-346
    • /
    • 2004
  • Recent livestock people concern not only increase of production, but also superior quality of animal-breeding environment. So far, the optimization of the breeding and air environment has been focused on the production increase. In the very near future, the optimization will be emphasized on the environment for the animal welfare and health. Especially, cattle farming demands the precision livestock farming and special attention has to be given to the management of feeding, animal health and fertility. The management of individual animal is the first step for precision livestock farming and animal welfare, and recognizing each individual is important for that. Though electronic identification of a cattle such as RFID(Radio Frequency Identification) has many advantages, RFID implementations practically involve several problems such as the reading speed and distance. In that sense, computer vision might be more effective than RFID for the identification of an individual animal. The researches on the identification of cattle via image processing were mostly performed with the cows having black-white patterns of the Holstein. But, the native Korean and Japanese cattle do not have any definite pattern on the body. The purpose of this research is to identify the Japanese black cattle that does not have a body pattern using computer vision technology and neural network algorithm. Twelve heads of Japanese black cattle have been tested to verify the proposed scheme. The values of input parameters were specified and then computed using the face images of cattle. The images of cattle faces were trained using associate neural network algorithm, and the algorithm was verified by the face images that were transformed using brightness, distortion, and noise factors. As a result, there was difference due to transform ratio of the brightness, distortion, and noise. And, the proposed algorithm could identify 100% in the range from -3 to +3 degrees of the brightness, from -2 to +4 degrees of the distortion, and from 0% to 60% of the noise transformed images. It is concluded that our system can not be applied in real time recognition of the moving cows, but can be used for the cattle being at a standstill.

A Study on the Records Management Strategy for a Discourse Analysis : Focusing on the Archives Distortion of the 5·18 Discourse (담론 분석을 통한 기록관리전략 연구 5·18 담론의 기록왜곡 사례를 중심으로)

  • Lee, Jin-Ryong;Yim, Jin Hee
    • The Korean Journal of Archival Studies
    • /
    • no.48
    • /
    • pp.141-179
    • /
    • 2016
  • In May 2011, the 1980 Archives for the May 18th Democratic Uprising or the "5 18 Gwangju Democratization Movement" were registered as a UNESCO Memory of the World. This historic moment told the world that the 5 18 movement is a valuable and historical asset. However, despite the international recognition, archives that deny of such facts are still rampant because of misdirected standings and prejudices. These sources even develop discourses by distorting the archives to justify their claims. Accordingly, the study aimed to identify how these sources form ideologies surrounding the 5 18 movement discourses, which are characteristic of extreme social standings. It explored the possibility of the distortion of archives presented for each discourse and reconsidered the archivists' positions and roles to cope with such possibility. In addition, the author aims to suggest a more systemic strategy to advance the existing responses against the distortions, as well as provide discourses that are based on true and accurate archives mainly to students who have not yet been introduced to such distorted discourses. In the future, archivists shall try to develop positive awareness about the 5 18 discourses rather than maintain passive positions that provide information from limited archives. Through this, it is expected that this study will advance future analyses that would be effective against the distortion of archives.

SPA-Resistant Unsigned Left-to-Right Receding Method (SPA에 안전한 Unsigned Left-to-Right 리코딩 방법)

  • Kim, Sung-Kyoung;Kim, Ho-Won;Chung, Kyo-Il;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.21-32
    • /
    • 2007
  • Vuillaume-Okeya presented unsigned receding methods for protecting modular exponentiations against side channel attacks, which are suitable for tamper-resistant implementations of RSA or DSA which does not benefit from cheap inversions. The proposed method was using a signed representation with digits set ${1,2,{\cdots},2^{\omega}-1}$, where 0 is absent. This receding method was designed to be computed only from the right-to-left, i.e., it is necessary to finish the receding and to store the receded string before starting the left-to-right evaluation stage. This paper describes new receding methods for producing SPA-resistant unsigned representations which are scanned from left to right contrary to the previous ones. Our contributions are as follows; (1) SPA-resistant unsigned left-to-right receding with general width-${\omega}$, (2) special case when ${\omega}=1$, i.e., unsigned binary representation using the digit set {1,2}, (3) SPA-resistant unsigned left-to-right Comb receding, (4) extension to unsigned radix-${\gamma}$ left-to-right receding secure against SPA. Hence, these left-to-right methods are suitable for implementing on memory limited devices such as smartcards and sensor nodes

The Phenomenological Study on Self-actualization of Middle-aged Single Mothers - Application of Guided Imagery and Music (GIM) - (한 부모 중년 여성가장의 자기실현과정에 관한 현상학적 연구 -심상유도 음악치료(GIM) 적용-)

  • Lim, Jae-Young;Shin, Dong-yeol;Lee, Ju-Young
    • Industry Promotion Research
    • /
    • v.6 no.2
    • /
    • pp.55-62
    • /
    • 2021
  • The number of single-parent families in South Korea increased since 2000, related to a sharp rise in the divorce rate of 50s and an increase in male mortality rates among those aged 40s-50s. Middle-aged single mothers experience a critical period realizing self-actualization needs, while being in the middle adulthood from the lifespan developmental perspective. In this respect, it is significant to study self-actualization of middle-aged single mothers through guided imagery and music (GIM) in order to provide them with psychological support. This study was conducted from September 2018 to June 2020, and the GIM sessions were conducted at least 10 times. Four participants were selected among the middle-aged single mothers. The imagery experiences of participants in the GIM sessions were classified into four sub-elements: physicalness, emotion, memory, and sense. Within those sub-elements, eight semantic units were categorized into 46 elements. Finally, 152 semantic units were derived. Moreover, the self-actualization which participants experienced through GIM presented three archetypal images: shadow, persona, and the self. In the GIM sessions, experiences of putting their negative emotions associated with family into words and changing passive self-imagery into active one enabled participants to bring the shadow into their consciousness, there by recognizing their positive and bright internal self. Furthermore, participants could map that their current status as people marginalized by siblings and parents, enraged and holding double standards for others, was suppressed by their 'good daughter' and 'religious' personas. This realization lead them to realize and restore their persona. The use of GIM in the study allowed participants to elicit re-experiences of the negative events, while experiencing various imagery and music. This process helped participants achieve self-actualization.

A Study on the Imitation and Transformation of Gugok-Wonlim Culture through Management of the Myungam Jeong Sik's Muyi-Gugok in Sancheong (명암(明庵) 정식(鄭拭)의 산청 무이구곡(武夷九曲) 원림경영을 통해 본 구곡문화의 모방과 변용)

  • Rho, Jae-Hyun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.33 no.3
    • /
    • pp.84-94
    • /
    • 2015
  • This study is to examine how the admiration for Chutzu(朱子)'s achievement while he was preaching his policies after renouncing the world in Wuyi-Gugok(武夷九曲), Mt. Wuyi and Joseon-style transformation culture were unfolded and developed through Gugok management cases such as position, name, poetic diction, Jungsa(精舍) architecture and engraving of Muyi-Gugok set in Mt. Gugok, Snacheong. The results were as follows: Myungam(明庵) Jeong Sik(鄭拭, 1683~1746)'s Muyi-Gugok, which consists of Suhongkyo(垂虹橋, gok 1) - Oknyeobong(玉女峰) - Nhongwhaldam(弄月潭) - Nacwhadam(落花潭) - Daeeunbyeong(大隱屛) - Gwangpyungryea(光風瀨) - Jaewhaldae(霽月臺) - Gorooam(鼓樓巖) - Wharyongpok(臥龍瀑, gok 9) is the representative case where Chutzu's Wuyi-Gugok was exactly copied and fulfilled to the Joseon Dynasty. In a large frame, Gugok Wonlim culture, Myungam's Muyi-Gugok management has a will of succession of Dotong(道統) through admiration for Chutzu in a rigid way. Another name of Mt. Gugok is Mt. Muyi and Gugok's name is Muyi-Gugok and the residence existed between gok 4 and gok 5. In addition, the name of Jeongsa for Gugok management is also 'Muyi Jeongsa(武夷精舍)' and Gugok name and contents of Poetry are also similar and all of these are clear evidence that Myungam tries to copy Chutzu's Wuyi-Gugok to Mt. Gugok. Also, Gugok set before Myungam were located in Mt. Gugok and among them, verified four Gugok names are corresponded to those of Chutzu's Wuyi-Gugok and it tells that conforming behavior as one of admiration ways for Chutzu already arrived at Mt. Gugok before Myungam and this was an oppotunty to widen Mt. Gugok Muyi-Gugok's tradition and horizon. Also, considering that Myungam's gok 6, Gwangpyungryea and gok 7, Jewoldae are names from 'Gwangpungjewol(光風霽月)' Based on Chutzu's poem and they are closely related to Joseon's classical scholar spirit, they are associated with Joseon-style transformation of Chutzu's Muyi-Gugok. Meanwhile, gok 5 'Daeeunbyeong' was transformed to 'Nangaam(爛柯巖)' in gok 5 - "Deoksan-Gugok(德山九曲) of Jooko(竹塢) Ha Beom-Woon(河範運, 1792~1858) and those characters's engravings are handed down. In "Pome of Deoksan Gugok" transformed from Myungam's Muyi-Gugok, respect and admiration for Chutzu is weaken while Ha Beom-Woon admires Nammyeong(南冥) Cho shik(曺植, 1501~1572), a symbolic character of himself's school and from this, a movement to promote partisan unity is identified. After Myungam died, Muyi-Gugok in Mt. Gugok was transformed from a space to succeed Chutzu's Dotonga to one to commemorate the memory of ancient sages, but, it is a typicality case that widen the spectrum of Joseon's Gugok-Wonlim culture through Muyi-Gugok's imitation and transformation.

Development of a Remote Multi-Task Debugger for Qplus-T RTOS (Qplus-T RTOS를 위한 원격 멀티 태스크 디버거의 개발)

  • 이광용;김흥남
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.393-409
    • /
    • 2003
  • In this paper, we present a multi-task debugging environment for Qplus-T embedded-system such as internet information appliances. We will propose the structure and functions of a remote multi-task debugging environment supporting environment effective ross-development. And, we are going enhance the communication architecture between the host and target system to provide more efficient cross-development environment. The remote development toolset called Q+Esto consists to several independent support tools: an interactive shell, a remote debugger, a resource monitor, a target manager and a debug agent. Excepting a debug agent, all these support tools reside on the host systems. Using the remote multi-task debugger on the host, the developer can spawn and debug tasks on the target run-time system. It can also be attached to already-running tasks spawned from the application or from interactive shell. Application code can be viewed as C/C++ source, or as assembly-level code. It incorporates a variety of display windows for source, registers, local/global variables, stack frame, memory, event traces and so on. The target manager implements common functions that are shared by Q+Esto tools, e.g., the host-target communication, object file loading, and management of target-resident host tool´s memory pool and target system´s symbol-table, and so on. These functions are called OPEn C APIs and they greatly improve the extensibility of the Q+Esto Toolset. The Q+Esto target manager is responsible for communicating between host and target system. Also, there exist a counterpart on the target system communicating with the host target manager, which is called debug agent. Debug agent is a daemon task on real-time operating systems in the target system. It gets debugging requests from the host tools including debugger via target manager, interprets the requests, executes them and sends the results to the host.