• Title/Summary/Keyword: Naming Convention

Search Result 12, Processing Time 0.022 seconds

The Proposed UMA Mode in DMB CAS Authentication Process (비인가 무선접속 모드를 이용한 디지털 멀티미디어 방송의 제한 수신시스템의 인증 제안)

  • Oh, Se-Kab;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.239-244
    • /
    • 2008
  • In this paper refer to the digital multimedia mobile phone with the combination of broadcasting and the communication the unity of wire and wireless solution that can provide the UMA(Unlicensed Mobile Access) function is added. In UNC(Universal Naming Convention) in the case of CAS(Conditional Access System) is supported, the device(mobile phone) is authenticated through AP and then following the method of broadcasting signal the user can view the wanted contents as long as they want and for this matter the service charge system are proposed.

  • PDF

Naming Scheme for Standardization of Detection Rule on Security Monitoring Threat Event (보안관제 위협 이벤트 탐지규칙 표준 명명법 연구)

  • Park, Wonhyung;Kim, Yanghoon;Lim, YoungWhan;Ahn, Sungjin
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.83-90
    • /
    • 2015
  • Recent, Cyber attacks such as hacking and malicious code techniques are evolving very rapidly changing cyber a ttacks are increasing, the number of malicious code techniques vary accordingly become intelligent. In the case of m alware because of the ambiguity in the number of malware have increased rapidly by name or classified as maliciou s code may have difficulty coping with. This paper investigated the naming convention of the vaccine manufacturer s in Korea to solve this problem, the analysis and offers a naming convention for security control event detection r ule analysis to compare the pattern of the detection rule out based on this current.

Shape Grammar-Driven BIM Model Database for a Modular Building Design Recommender System

  • Saddiq Ur REHMAN;Inhan KIM
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.70-76
    • /
    • 2024
  • The absence of standardized architectural design configurations poses significant challenges in stakeholder collaboration during the pre-design phase, particularly for modular buildings. Clients often lack comprehensive knowledge of potential design configurations for their proposed buildings, leading to dissatisfaction upon project completion. This issue is exacerbated in office buildings where floor plan layouts are uncertain due to diverse employee needs. To address these challenges, this research introduces a BIM-based dataset for modular office buildings using shape grammar principles. The research manipulates the location of core modules (including staircases, elevator shafts, and entrances) based on shape grammar principles, resulting in twenty unique configurations that provide standardized options for BIM model development. The initial phase involves developing a naming convention based on shape grammar principles to determine the core module locations. Using this convention, BIM models for modular office buildings are created, forming a database connected to the frontend and backend of a recommender system. This system recommends three different design options to clients based on their specific needs, fostering improved collaboration in the pre-design phase by involving clients directly. The user interface of the recommender system aids clients in understanding potential office building configurations, thereby enhancing collaboration and decision-making. Through the amalgamation of shape grammar principles and BIM technology, this proposed system offers a promising approach to advancing efficiency and precision in architectural design communication and representation.

A Suggestion of Korean Names for the Orders and Families Included in the APG III Classification System (APG III 분류체계의 목명 및 과명 국문화에 대한 제안)

  • Lee, Yoonkyung;Jung, Jongduk;Kim, Sangtae
    • Korean Journal of Plant Taxonomy
    • /
    • v.45 no.3
    • /
    • pp.278-297
    • /
    • 2015
  • With the development of the internet and international agreements such as the Convention on Biological Diversity (CBD) and the Convention on International Trade in Endangered Species (CITES), Korean researchers frequently encounter scientific names of foreign species, and these are named on a case-by-case basis in Korean without any standard naming method. Therefore, standard Korean names for entire orders and families in the world are required for better communications in Korea. However, there have been no comprehensive discussions of the standardization of Korean names for the orders and families found in the world. In this study, we 1) compare the Korean names of orders and families in the references, 2) discuss naming methods in Korean for foreign taxa, and 3) then suggest standard Korean names for the orders and families in the APG III, which is an up-to-date angiosperm classification system. This study will be a starting point for the national standardization of Korean names for orders and families found throughout the world.

A Study on the Type and Character of Apparel Brand Names for the Net-Generation (N세대 의류 브랜드명의 유형분류와 특성에 관한 연구)

  • 이민경;한명숙
    • The Research Journal of the Costume Culture
    • /
    • v.8 no.5
    • /
    • pp.707-716
    • /
    • 2000
  • The purpose of this study was to explane the Net generation's characters appearing in the apparel brand naming for them. For this study, first I was trying to explane the New generation characters, second 45 apparel brands were selected by market research and questionaire survey was conducted on 53 the Net generation collage women of age 20 thru 21. Third, the apparel brands were classified into four types according to the characters reflecting in the apparel brand naming : First, the apparel brand type using the figures such as STORM=292513, 1492Miles. Second, the apparel brand type that two or more words are abbreviated into one word. Third, the apparel brand type containing more than one meaning in a brand naming or spelling the words as it pronunciate. Fourth, the apparel brand type using of slang. In conclusion, These types of the apparel brands were related to characters of the New generation, i.e., they who have grown in the advance of digital civilization are skilled in the communication through computer, internet and mobile phone, so that they are familiar with the figures, combined words, or abbreviated words etc. Also, they have individual, sensitivity character and seek after individuality, current fashion. They have also a tendency to accept various the sense of value, while they have a refusing tendency a custom or convention which the older generation has conformited.

  • PDF

SoMA: A System of Making Avatars based on a Commercial Game Engine (SoMA: 상용 게임엔진 기반의 아바타 생성 시스템)

  • Kim, Byung-Cheol;Roh, Chang Hyun
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.373-380
    • /
    • 2017
  • We propose the SoMA(System of Making Avatars) based on a commercial 3D game engine. It first decomposes a given character into assemblable pieces, then gives the user them as prefab components so that he or she can reassemble and/or customize them to be plenty of characters. To accomplish this, it implements the character assembly structure as an hierarchy, the upper levels of which are categorized for gross assembly, and the lower levels of which are parameterized for detailed customization. It also defines a hierarchical naming convention for ease of access to the structure. Finally, it provides body, clothes, and attachment systems to make relevant characters.

Utilization of a Mathematical Programming Data Structure for the Implementation of a Water Resources Planning System (수자원 운영계획 시스템의 구현을 위한 수리계획 모형 자료구조의 활용)

  • Kim, Jae-Hee;Kim, Sheung-Kown;Park, Young-Joon
    • IE interfaces
    • /
    • v.16 no.4
    • /
    • pp.485-495
    • /
    • 2003
  • This paper reports on the application of the integration of mathematical programming model and database in a decision support system (DSS) for the planning of the multi-reservoir operating system. The DSS is based on a multi-objective, mixed-integer goal programming (MIGP) model, which can generate efficient solutions via the weighted-sums method (WSM). The major concern of this study is seamless, efficient integration between the mathematical model and the database, because there are significant differences in structure and content between the data for a mathematical model and the data for a conventional database application. In order to load the external optimization results on the database, we developed a systematic way of naming variable/constraint so that a rapid identification of variables/constraints is possible. An efficient database structure for planning of the multi-reservoir operating system is presented by taking advantage of the naming convention of the variable/constraint.

A Study on the Advanced Classification and Naming Convention of Malicious Code (개선된 악성 코드 분류지침 및 명명법에 관한 연구)

  • Kwak, Hyo-Seung;Kim, Pan-Koo
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.1095-1098
    • /
    • 2002
  • 국내외 카 백신업체별로 악성 코드의 분류 체계가 마련되어 있지만 각각의 백신업체별로 분류 체계가 차이가 있고 또한 도스 운영체제 때부터 사용한 분류 체계를 그대로 사용하여 현재의 악성 코드 분류와는 많은 차이를 보이고 있다. 이러한 백신업체들의 악성 코드 분류를 정착하게 분류하는 방법으로 본 논문에서 새로운 악성 코드 분류지침과 분류지침에 의한 명명법을 제안한다. 본 논문에서 제안한 분류지침을 토대로 안티-바이러스 산업 및 악성 코드 연구를 활성화시키는 정책 수립의 기초 자료를 사용한 수 있으며, 악성 코드 정보의 체계화 통합화 표준화 등에 기여할 수 있다.

  • PDF

A Study on the Modification of the Standard Items and Codes for the Road and Related Facilities suggested by NGIS (NGIS 표준에서 제시된 도로·도로시설물 항목 및 표준코드의 보완 및 확장에 관한 연구)

  • Kim, Seong Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.9 no.1 s.17
    • /
    • pp.67-75
    • /
    • 2001
  • One of the biggest problems found from the results of the various GIS-related projects is this. In spite of the fact that there is a national standards on GIS data structures, in building and managing the information on a variety of facilities in an area, each of the concerned organizations has been building the information using their own standards on the selection and organizations of the target facilities, naming convention, and coding regulations of the selected facilities. This distinctively exposes the limits and problems of the national GIS data standards in adopting to the regional GIS projects, resulting in considerable problems in sharing the information already built. The national GIS data standards, therefore, should be expanded and revised. As an effort to solve the above-mentioned problems, this paper suggests an idea on the revision and expansion of the national GIS data standards in the field of road and related facilities. It is believed that same efforts should be made for the other areas of the national GIS data standards to increase the applicability to various GIS projects.

  • PDF

An Anti-Forensic Technique for Hiding Data in NTFS Index Record with a Unicode Transformation (유니코드 변환이 적용된 NTFS 인덱스 레코드에 데이터를 숨기기 위한 안티포렌식 기법)

  • Cho, Gyu-Sang
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.75-84
    • /
    • 2015
  • In an "NTFS Index Record Data Hiding" method messages are hidden by using file names. Windows NTFS file naming convention has some forbidden ASCII characters for a file name. When inputting Hangul with the Roman alphabet, if the forbidden characters for the file name and binary data are used, the codes are convert to a designated unicode point to avoid a file creation error due to unsuitable characters. In this paper, the problem of a file creation error due to non-admittable characters for the file name is fixed, which is used in the index record data hiding method. Using Hangul with Roman alphabet the characters cause a file creation error are converted to an arbitrary unicode point except Hangul and Roman alphabet area. When it comes to binary data, all 256 codes are converted to designated unicode area except an extended unicode(surrogate pairs) and ASCII code area. The results of the two cases, i.e. the Hangul with Roman alphabet case and the binary case, show the applicability of the proposed method.