• Title/Summary/Keyword: System Design and Implementation

Search Result 7,376, Processing Time 0.045 seconds

Digital Transformation Based on Chatbot in Legacy Environment (챗봇을 이용한 Legacy 환경의 Digital Transformation)

  • Jang, Jeong-ho;Kim, Jin-soo;Lee, Kang-Yoon
    • The Journal of Bigdata
    • /
    • v.3 no.2
    • /
    • pp.79-85
    • /
    • 2018
  • As the utilization of chatbots grows and the AI market grows, many companies are interested. And everybody is spurring growth by offering chatbot build services so that they can create chatbots. This makes chatbots easier to service on the messenger platform, which is changing the existing application market. In this paper, we present a methodology for designing and implementing existing DB-based applications as instant messenger platform-based applications, and summarize what to consider in actual implementation to provide an optimal system structure. According to this methodology, we design and implement a chatbot that serves as an teaching advisor who provides information to the students in the curriculum. The implemented application objectively visualizes the user's desired information from the user's point of view and delivers it through the interactive interface quickly and intuitively. By implementing these services and real service, it is predicted that DB-based information providing applications will be implemented as chatbots and will be changed to bi-directional communication through an interactive interface. it is predicted that DB-based information providing applications will be implemented as chatbots and will be changed to bi-directional communication through an interactive interface. Enterprise legacy application will take chatbot technology as one of important digital transformation initiative.

Methods and strategies for cultural heritage education using local archaeological heritage (지역 고고유산 체험 교육의 활성화 방안과 전략)

  • KIM, Eunkyung
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.3
    • /
    • pp.106-125
    • /
    • 2021
  • This paper presents several reasons for the necessity of archaeological hands-on training and strategies for its implementation. First, it is necessary to produce a specialized manual for local cultural heritage education that can enhance the specialization and educational effectiveness of archaeological experience education. In addition, in order to secure professionalism in hands-on education and conduct it systematically, the ability of instructors to conduct education is important, so instructor competence reinforcement education needs to be conducted regularly. In addition, hands-on education needs a strategy of planning and content development of archaeological education programs, with consideration given to the subjects of learning, and the establishment of a cooperative network. It is time to cooperate with various experts to establish an education system necessary for cultural heritage education in the region and develop customized content for local archaeological heritage supplementary textbooks. Finally, due to Covid-19, we agonized over effective education plans for online archaeological heritage education, which requires active interaction class design and a strategy to promote interaction between professors and learners. In addition, such archaeological heritage education should be compatible with the goal of providing customized lifelong education.

Design and Implementation of Analysis Techniques for Fragmented Pages in the Flash Memory Image of Smartphones (스마트폰 플래시 메모리 이미지 내의 단편화된 페이지 분석 기법 및 구현)

  • Park, Jung-Heum;Chung, Hyun-Ji;Lee, Sang-Jin;Son, Young-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.827-839
    • /
    • 2012
  • A cell phone is very close to the user and therefore should be considered in digital forensic investigation. Recently, the proportion of smartphone owners is increasing dramatically. Unlike the feature phone, users can utilize various mobile application in smartphone because it has high-performance operating system (e.g., Android, iOS). As acquisition and analysis of user data in smartphone are more important in digital forensic purposes, smartphone forensics has been studied actively. There are two way to do smartphone forensics. The first way is to extract user's data using the backup and debugging function of smartphones. The second way is to get root permission, and acquire the image of flash memory. And then, it is possible to reconstruct the filesystem, such as YAFFS, EXT, RFS, HFS+ and analyze it. However, this methods are not suitable to recovery and analyze deleted data from smartphones. This paper introduces analysis techniques for fragmented flash memory pages in smartphones. Especially, this paper demonstrates analysis techniques on the image that reconstruction of filesystem is impossible because the spare area of flash memory pages does not exist and the pages in unallocated area of filesystem.

A Study of the Acculturation Meaning among Chinese-Chosun Residential Care Attendants in Long-Term Care Setting (조선족 간병인의 문화적응 경험에 관한 연구: 노인 간병서비스를 제공하는 조선족 여성을 중심으로)

  • Hong, Sae-Young;Kim, Gum-Ja
    • 한국노년학
    • /
    • v.30 no.4
    • /
    • pp.1263-1280
    • /
    • 2010
  • The present study describes the acculturation meaning of 12 Chinese-Chosun residential care attendants(RCAs) who are currently working in long-term care settings for Korean older adults. Using a qualitative research method, the findings show that the acculturation process of Chinese-Chosun RCAs consists of three stages: entrance, conflict, and adaptation. In the initial stage, the assets of the social and cultural networks among their friends and relatives, who already settled down or employed as RCAs, provided more opportunities for being employed as a RCA. However, most Chinese-Chosun RCAs experienced a number of conflicts while they adapted to mainstream society and perform caregiving tasks. They perceived discrimination, heavy workload, prejudice, and homesick. Nevertheless, they appeared to adapt effectively to Korean society and working environments because they were aware of the various benefits of working as a RCA such as higher wage and more job openings compared to other jobs, a rapport with the patients and patients' families, flexible work hours, and pride as a caregiver. This type of qualitative groundwork will be an important precursor to the design, implementation, and evaluation of acculturation research for minority immigrant workers in the Korean social welfare system.

A UTMI-Compatible USB2.0 Transceiver Chip Design (UTMI 표준에 부합하는 USB2.0 송수신기 칩 설계)

  • Nam Jang-Jin;Kim Bong-Jin;Park Hong-June
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.5 s.335
    • /
    • pp.31-38
    • /
    • 2005
  • The architecture and the implementation details of a UTMI(USB2.0 Transceiver Macrocell Interface) compatible USB2.0 transceiver chip were presented. To confirm the validation of the incoming data in noisy channel environment, a squelch state detector and a current mode Schmitt-trigger circuit were proposed. A current mode output driver to transmit 480Mbps data on the USB cable was designed and an on-die termination(ODT) which is controlled by a replica bias circuit was presented. In the USB system using plesiochronous clocking, to compensate for the frequency difference between a transmitter and a receiver, a synchronizer using clock data recovery circuit and FIFO was designed. The USB cable was modeled as the lossy transmission line model(W model) for circuit simulation by using a network analyzer measurements. The USB2.0 PHY chip was implemented by using 0.25um CMOS process and test results were presented. The core area excluding the IO pads was $0.91{\times}1.82mm^2$. The power consumptions at the supply voltage of 2.5V were 245mW and 150mW for high-speed and full-speed operations, respectively.

BPEL Engine Generator for adding New Functions to BPEL based on Attribute Grammar and Aspect-Oriented Programming (속성문법과 관점지향 프로그래밍 기법을 이용한 BPEL에 새로운 기능을 추가하는 BPEL 엔진 생성기)

  • Kwak, Dongkyu;Kim, Jongho;Choi, Jaeyoung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.5
    • /
    • pp.209-218
    • /
    • 2015
  • BPEL is used in various domains since it can describe the flow of works according to conditions and rules, and it can call web services in service-oriented computing environments. However, new functions that are not provided by BPEL grammar are required in specific domains. Generally, when new functions are required, the domain-specific language should be newly defined and developed, which requires high development cost. In this regard, a new function needs to be defined and added instead of developing domain-specific language with the new functions added. However, such methods only allow an addition of a single function, and it is difficult to design and add new functions according to the needs. This paper defines XAS4B document, which extends the BPEL grammar function through XML schema in order to add new functions, and proposes BPEL engine generator that generates BPEL engine with the new functions added by processing the document. The XAS4B document enables the creation of a new grammar added to BPEL using XML schema. It also shows the process of adding new functions to BPEL engine using AspectJ, JAVA implementation of aspect-oriented programming. The proposed system can add new functions using AspectJ without modifying BPEL engine. This allows the provision of new functions at low cost in various domains.

Implementation of High-Throughput SHA-1 Hash Algorithm using Multiple Unfolding Technique (다중 언폴딩 기법을 이용한 SHA-1 해쉬 알고리즘 고속 구현)

  • Lee, Eun-Hee;Lee, Je-Hoon;Jang, Young-Jo;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • This paper proposes a new high speed SHA-1 architecture using multiple unfolding and pre-computation techniques. We unfolds iterative hash operations to 2 continuos hash stage and reschedules computation timing. Then, the part of critical path is computed at the previous hash operation round and the rest is performed in the present round. These techniques reduce 3 additions to 2 additions on the critical path. It makes the maximum clock frequency of 118 MHz which provides throughput rate of 5.9 Gbps. The proposed architecture shows 26% higher throughput with a 32% smaller hardware size compared to other counterparts. This paper also introduces a analytical model of multiple SHA-1 architecture at the system level that maps a large input data on SHA-1 block in parallel. The model gives us the required number of SHA-1 blocks for a large multimedia data processing that it helps to make decision hardware configuration. The hs fospeed SHA-1 is useful to generate a condensed message and may strengthen the security of mobile communication and internet service.

Design and Implementation of Geographical Handoff System Using GPS Information (GPS정보를 이용한 위치기반 핸드오프 시스템의 설계 및 구현)

  • Han, Seung-Ho;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.33-43
    • /
    • 2010
  • Recently, users want to use real-time multimedia services, such as internet, VoIP, etc., using their IEEE 802.11 wireless lan mobile stations. In order to provide such services, a handoff among access points is essential to support the mobility of a node, in such an wide area. However, the legacy handoff methods of IEEE 802.11 technology are easy to lose connections. Also, the recognition of a disconnection and channel re-searching time make the major delay of the next AP to connect. In addition, because IEEE 802.11 decides the selection of an AP depending only on received signal strength, regardless of a node direction, position, etc., it cannot guarantee a stable bandwidth for communication. Therefore, in order to provide a real-time multimedia service, a node must reduce the disconnection time and needs an appropriate algorithm to support a sufficient communication bandwidth. In this paper, we suggest an algorithm which predicts a handoff point of a moving node by using GPS location information, and guarantees a high transmission bandwidth according to the signal strength and the distance. We implemented the suggested algorithm, and confirmed the superiority of our algorithm by reducing around 3.7ms of the layer-2 disconnection time, and guaranteed 24.8% of the communication bandwidth.

A Study on AR Algorithm Modeling for Indoor Furniture Interior Arrangement Using CNN

  • Ko, Jeong-Beom;Kim, Joon-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.11-17
    • /
    • 2022
  • In this paper, a model that can increase the efficiency of work in arranging interior furniture by applying augmented reality technology was studied. In the existing system to which augmented reality is currently applied, there is a problem in that information is limitedly provided depending on the size and nature of the company's product when outputting the image of furniture. To solve this problem, this paper presents an AR labeling algorithm. The AR labeling algorithm extracts feature points from the captured images and builds a database including indoor location information. A method of detecting and learning the location data of furniture in an indoor space was adopted using the CNN technique. Through the learned result, it is confirmed that the error between the indoor location and the location shown by learning can be significantly reduced. In addition, a study was conducted to allow users to easily place desired furniture through augmented reality by receiving detailed information about furniture along with accurate image extraction of furniture. As a result of the study, the accuracy and loss rate of the model were found to be 99% and 0.026, indicating the significance of this study by securing reliability. The results of this study are expected to satisfy consumers' satisfaction and purchase desires by accurately arranging desired furniture indoors through the design and implementation of AR labels.

Implementation of PersonalJave™ AWT using Light-weight Window Manager (경량 윈도우 관리기를 이용한 퍼스널자바 AWT 구현)

  • Kim, Tae-Hyoun;Kim, Kwang-Young;Kim, Hyung-Soo;Sung, Min-Young;Chang, Nae-Hyuck;Shin, Heon-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.3
    • /
    • pp.240-247
    • /
    • 2001
  • Java is a promising runtime environment for embedded systems because it has many advantages such as platform independence, high security and support for multi-threading. One of the most famous Java run-time environments, Sun's ($PersonalJave^{TM}$) is based on Truffle architecture, which enables programmers to design various GUIs easily. For this reason, it has been ported to various embedded systems such as set-top boxes and personal digital assistants(PDA's). Basically, Truffle uses heavy-weight window managers such as Microsoft vVin32 API and X-Window. However, those window managers are not adequate for embedded systems because they require a large amount of memory and disk space. To come up with the requirements of embedded systems, we adopt Microwindows as the platform graphic system for Personal] ava A WT onto Embedded Linux. Although Microwindows is a light-weight window manager, it provides as powerful API as traditional window managers. Because Microwindows does not require any support from other graphics systems, it can be easily ported to various platforms. In addition, it is an open source code software. Therefore, we can easily modify and extend it as needed. In this paper, we implement Personal]ava A WT using Microwindows on embedded Linux and prove the efficiency of our approach.

  • PDF