• Title/Summary/Keyword: Software service

Search Result 2,457, Processing Time 0.031 seconds

Soil Erosion Assessment Tool - Water Erosion Prediction Project (WEPP) (토양 침식 예측 모델 - Water Erosion Prediction Project (WEPP))

  • Kim, Min-Kyeong;Park, Seong-Jin;Choi, Chul-Man;Ko, Byong-Gu;Lee, Jong-Sik;Flanagan, D.C.
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.41 no.4
    • /
    • pp.235-238
    • /
    • 2008
  • The Water Erosion Prediction Project (WEPP) was initiated in August 1985 to develop new generation water erosion prediction technology for federal agencies involved in soil and water conservation and environmental planning and assessment. Developed by USDA-ARS as a replacement for empirical erosion prediction technologies, the WEPP model simulates many of the physical processes important in soil erosion, including infiltration, runoff, raindrop detachment, flow detachment, sediment transport, deposition, plant growth and residue decomposition. The WEPP included an extensive field experimental program conducted on cropland, rangeland, and disturbed forest sites to obtain data required to parameterize and test the model. A large team effort at numerous research locations, ARS laboratories, and cooperating land-grant universities was needed to develop this state-of-the-art simulation model. The WEPP model is used for hillslope applications or on small watersheds. Because it is physically based, the model has been successfully used in the evaluation of important natural resources issues throughout the United State and in several other countries. Recent model enhancements include a graphical Windows interface and integration of WEPP with GIS software. A combined wind and water erosion prediction system with easily accessible databases and a common interface is planned for the future.

Models of Database Assets Valuation and their Life-cycle Determination (데이터베이스 자산 가치평가 모형과 수명주기 결정)

  • Sung, Tae-Eung;Byun, Jeongeun;Park, Hyun-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.676-693
    • /
    • 2016
  • Although the methodology and models to assess the economic value of technology assets such as patents are being presented in various ways, there does not exist a structured assessment model which enables to objectively assess a database property's value, and thus there is a need to enhance the application feasibility of practical purposes such as licensing of DB assets, commercialization transfer, security, etc., through the establishment of the valuation model and the life-cycle decision logic. In this study, during the valuation process of DB assets, the size of customer demand group expected and the amount of demand, the size and importance of data sets, the approximate degree of database' contribution to the sales performance of a company, the life-cycle of database assets, etc. will be analyzed whether they are appropriate as input variables or not. As for most of DB assets, due to irregular updates there are hardly cases their life-cycle expires, and thus software package's persisting period, ie. 5 years, is often considered the standard. We herein propose the life-cycle estimation logic and valuation models of DB assets based on the concept of half life for DB usage frequency under the condition that DB assets' value decays and there occurs no data update over time.

A Feature -Based Word Spotting for Content-Based Retrieval of Machine-Printed English Document Images (내용기반의 인쇄체 영문 문서 영상 검색을 위한 특징 기반 단어 검색)

  • Jeong, Gyu-Sik;Gwon, Hui-Ung
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.10
    • /
    • pp.1204-1218
    • /
    • 1999
  • 문서영상 검색을 위한 디지털도서관의 대부분은 논문제목과/또는 논문요약으로부터 만들어진 색인에 근거한 제한적인 검색기능을 제공하고 있다. 본 논문에서는 영문 문서영상전체에 대한 검색을 위한 단어 영상 형태 특징기반의 단어검색시스템을 제안한다. 본 논문에서는 검색의 효율성과 정확도를 높이기 위해 1) 기존의 단어검색시스템에서 사용된 특징들을 조합하여 사용하며, 2) 특징의 개수 및 위치뿐만 아니라 특징들의 순서를 포함하여 매칭하는 방법을 사용하며, 3) 특징비교에 의해 검색결과를 얻은 후에 여과목적으로 문자인식을 부분적으로 적용하는 2단계의 검색방법을 사용한다. 제안된 시스템의 동작은 다음과 같다. 문서 영상이 주어지면, 문서 영상 구조가 분석되고 단어 영역들의 조합으로 분할된다. 단어 영상의 특징들이 추출되어 저장된다. 사용자의 텍스트 질의가 주어지면 이에 대응되는 단어 영상이 만들어지며 이로부터 영상특징이 추출된다. 이 참조 특징과 저장된 특징들과 비교하여 유사한 단어를 검색하게 된다. 제안된 시스템은 IBM-PC를 이용한 웹 환경에서 구축되었으며, 영문 문서영상을 이용하여 실험이 수행되었다. 실험결과는 본 논문에서 제안하는 방법들의 유효성을 보여주고 있다. Abstract Most existing digital libraries for document image retrieval provide a limited retrieval service due to their indexing from document titles and/or the content of document abstracts. This paper proposes a word spotting system for full English document image retrieval based on word image shape features. In order to improve not only the efficiency but also the precision of a retrieval system, we develop the system by 1) using a combination of the holistic features which have been used in the existing word spotting systems, 2) performing image matching by comparing the order of features in a word in addition to the number of features and their positions, and 3) adopting 2 stage retrieval strategies by obtaining retrieval results by image feature matching and applying OCR(Optical Charater Recognition) partly to the results for filtering purpose. The proposed system operates as follows: given a document image, its structure is analyzed and is segmented into a set of word regions. Then, word shape features are extracted and stored. Given a user's query with text, features are extracted after its corresponding word image is generated. This reference model is compared with the stored features to find out similar words. The proposed system is implemented with IBM-PC in a web environment and its experiments are performed with English document images. Experimental results show the effectiveness of the proposed methods.

Structural Equation Model of Clinical Nurses' Willingness to Perform Basic Life Support (BLS) in South Korea (임상간호사의 기본소생술 수행의지에 관한 구조방정식 모형 분석)

  • Uhm, Dong-Choon;Hwang, Ji-Young;Jun, Myung-he;Kim, Dong-ok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.2
    • /
    • pp.290-298
    • /
    • 2016
  • This study was conducted to develop a model that explains the factors influencing the clinical nurses' willingness to perform Basic Life Support and to verify the appropriateness of the model. The participants were 550 clinical nurses working at a university hospital in Korea. The data were collected from self-reported questionnaires from October 2012 to February 2013. A total of 520 questionnaires were analyzed using the SPSS/WIN 20.0 and Amos version 18.0 software packages. The results indicated that the clinical nurses' knowledge of basic life support had a direct impact and their clinical experience had an indirect impact on their willingness to perform basic life support at the scene. These variables together explained 19.5% of the variance in the nurses' willingness to perform Basic Life Support. The clinical experience was correlated significantly with knowledge (r=.61, p<.001). To increase the clinical nurses' performance of Basic Life Support, knowledge and clinical experience should be reinforced by continuous in-service education on Basic Life Support, considering the disease status of hospitalized patients.

Fast Selection of Composite Web Services Based on Workflow Partition (워크플로우 분할에 기반한 복합 웹 서비스의 빠른 선택)

  • Jang, Jae-Ho;Shin, Dong-Hoon;Lee, Kyong-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.5
    • /
    • pp.431-446
    • /
    • 2007
  • Executable composite Web services are selected by binding a given abstract workflow with the specific Web services that satisfy given QoS requirements. Considering the rapidly increasing number of Web services and their highly dynamic QoS environment, the fast selection of composite services is important. This paper presents a method for quality driven comosite Web services selection based on a workflow partition strategy. The proposed method partitions an abstract workflow into two sub-workflows to decrease the number of candidate services that should be considered. The QoS requirement is also decomposed for each partitioned workflow. Since the decomposition of a QoS requirement is based on heuristics, the selection might fail to find composite Web services. To avoid such a failure, the tightness of a QoS requirement is defined and a workflow is determined to be partitioned according to the tightness. A mixed integer linear programming is utilized for the efficient service selection. Experimental results show that the success rate of partitioning is above 99%. Particularly, the proposed method performs faster and selects composite services whose qualities are not significantly different (less than 5%) from the optimal one.

Estimating Personal and Social Information for Mobile User (모바일 사용자의 개인 및 소셜 정보 추정)

  • Son, Jeong-Woo;Han, Yong-Jin;Song, Hyun-Je;Park, Seong-Bae;Lee, Sang-Jo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.9
    • /
    • pp.603-614
    • /
    • 2013
  • The popularity of mobile devices provides their users with a circumstance that services and information can be accessed wherever and whenever users need. Accordingly, various studies have been proposed personalized methods to improve accessibility of mobile users to information. However, since these personalized methods require users' private information, they gives rise to problems on security. An efficient way to resolve security problems is to estimate user information by using their online and offline behavior. In this paper, for this purpose, it is proposed a novel user information identification system that identifies users' personal and social information by using both his/her behavior on social network services and proximity patterns obtained from GPS data. In the proposed system, personal information of a user like age, gender, and so on is estimated by analyzing SNS texts and POI (Point of Interest) patterns, while social information between a pair of users like family and friend is predicted with proximity patterns between the users. Each identification module is efficiently designed to handle the characteristics of user data like much noise in SNS texts and missing signals in GPS data. In experiments to evaluate the proposed system, our system shows its superiority against ordinary identification methods. This result means that the proposed system can efficiently reflect the characteristics of user data.

Software Architecture for Implementing the Grid Computing of the High Availability Solution through Load Balancing (고가용성 솔루션 구축을 위한 그리드 측면에서의 소프트웨어 아키텍처를 통한 로드밸랜싱 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.26-35
    • /
    • 2011
  • In these days, internet environment are very quickly development as well on-line service have been using a online for the mission critical business around the world. As the amount of information to be processed by computers has recently been increased there has been cluster computing systems developed by connecting workstations server using high speed networks for high availability. but cluster computing technology are limited for a lot of IT resources. So, grid computing is an expanded technology of distributed computing technology to use low-cost and high-performance computing power in various fields. Although the purpose of Grid computing focuses on large-scale resource sharing, innovative applications, and in some case, high-performance orientation, it has been used as conventional distributed computing environment like clustered computer until now because grid middleware does not have common sharable information system. In order to use grid computing environment efficiently which consists of various grid middleware, it is necessary to have application-independent information system which can share information description and services, and expand them easily. This paper proposed new database architecture and load balancing for high availability through Grid technology.

A Study on the Efficiency & Limitation of 3D Animation Production Management Using Production Management Tool - Focusing on Shotgun Software & Ftrack (3D 애니메이션 제작 관리를 위한 제작관리도구(Tool)의 효율성 및 한계 - 샷건(Shotgun)과 Ftrack(에프트랙)을 중심으로)

  • Lee, Esther Kkotsongyi
    • Cartoon and Animation Studies
    • /
    • s.49
    • /
    • pp.1-23
    • /
    • 2017
  • 3D animation production has had a pivotal position in current animation industry and the necessity of professional management tool for 3D animation production has claimed due to its sophisticated pipeline from advance of technology and global production partnership trend. Shotgun and Ftrack are providing the most appropriate management toolset for 3D animation management among the extant management tools and the efficiency of Shotgun & Ftrack is identified compared with the traditional document oriented management style. The biggest strength of production management using Shotgun is that all of the production staff can directly participate in the communication on the tools therefore they can share the information on Shotgun & Ftrack in real time without constraint of time and location. Moreover, all the process of the production and the history of the discussion on certain production issues are systematically accrue on the tool so that the production history can be easily tracked. Finally, the production management using tools contributes collecting and analysing the production information for the production management team in studios. However, Shotgun & Ftrack has metadata based retrieval method which cost huge amount of effort by human's manual annotation and it also has the limitation of accuracy. In addition, the fact that studios has to have technical professionals first in order to institute the tools into their studios is the actual difficulty of Korean studios when they want to use management tools for their project. Thus, this paper suggests adopting the content-based retrieval system on the tools and tools' expanded technical service for the studios as the solution of the identified issues.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Bio-Sensing Convergence Big Data Computing Architecture (바이오센싱 융합 빅데이터 컴퓨팅 아키텍처)

  • Ko, Myung-Sook;Lee, Tae-Gyu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.2
    • /
    • pp.43-50
    • /
    • 2018
  • Biometric information computing is greatly influencing both a computing system and Big-data system based on the bio-information system that combines bio-signal sensors and bio-information processing. Unlike conventional data formats such as text, images, and videos, biometric information is represented by text-based values that give meaning to a bio-signal, important event moments are stored in an image format, a complex data format such as a video format is constructed for data prediction and analysis through time series analysis. Such a complex data structure may be separately requested by text, image, video format depending on characteristics of data required by individual biometric information application services, or may request complex data formats simultaneously depending on the situation. Since previous bio-information processing computing systems depend on conventional computing component, computing structure, and data processing method, they have many inefficiencies in terms of data processing performance, transmission capability, storage efficiency, and system safety. In this study, we propose an improved biosensing converged big data computing architecture to build a platform that supports biometric information processing computing effectively. The proposed architecture effectively supports data storage and transmission efficiency, computing performance, and system stability. And, it can lay the foundation for system implementation and biometric information service optimization optimized for future biometric information computing.