• Title/Summary/Keyword: User Costs

Search Result 449, Processing Time 0.029 seconds

Development of Software for Fidelity Test of Flight Dynamic Model on Fixed Wing Aircraft (고정익 항공기의 비행역학 모델 충실도 테스트를 위한 소프트웨어 개발)

  • Baek, Seung-Jae;Kang, Mun-Hye;Choi, Seong-Hwan;Kim, Byoung Soo;Moon, Yong Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.8
    • /
    • pp.631-640
    • /
    • 2020
  • Currently, aircraft simulator has drawn a great attention because it has significant advantages of economic, temporal, and spatial costs compared with pilot training with real aircraft. Among the components of the aircraft simulator, flight dynamic model plays a key role in simulating the flight of an actual aircraft. Hence, it is important to verify the fidelity of flight dynamic model with an automated tool. In this paper, we develop a software to automatically verify the fidelity of the flight mechanics model for the efficient development of the aircraft simulator. After designing the software structure and GUI based on the requirements derived from the fidelity verification process, the software is implemented with C # language in Window-based environment. Experimental results on CTSW models show that the developed software is effective in terms of function, performance and user convenience.

A Study on Modified Consensus Algorithm Considering Private Blockchain Environment-based User Environment (프라이빗 블록체인 기반의 사용자 환경을 고려한 수정된 PBFT 연구)

  • Min, Youn-A
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.9-15
    • /
    • 2020
  • Recently there have been increasing attempts to apply blockchains to businesses and public institutions. Blockchain is a distributed shared ledger with excellent transparency and security of data and through consensus algorithm, the same data can be shared to all nodes in order. In this paper, Modified PBFT which does not modify the PBFT consensus algorithm is proposed. MPBFT is able to tolerate Byzantine faults on a private blockchain on an asynchronous network. Even with the increase of participating nodes, the network communication cost can be effectively maintained. Modified PBFT takes into account the characteristics of an asynchronous network environment where node-to-node trust is guaranteed. In response to the client's request, PBFT performed the entire participation broadcast several times, but Modified PBFT enabled consensus and authentication through the 2 / N leader. By applying the Modified PBFT consensus algorithm, the broadcast process can be simplified to maintain the minimum number of nodes for consensus and to efficiently manage network communication costs.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF

Robust Matrix-based RFID Mutual Authentication Protocol (견고한 행렬기반 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Ha, Kyeoung-Ju;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11C
    • /
    • pp.883-891
    • /
    • 2008
  • In 2006, Lee and Ahn proposed a matrix-based RFID authentication protocol which eliminates the security problems in HB and $HB^+$ RFID authentication protocols. Their proposed protocol provides the following three merits: (1) it reduces the computational costs of the RFID tag. (2) it reduces the communication overhead between the reader and the tag. (3) it protects the user privacy. However, this paper points out that Lee and Ahn's proposed protocol is insecure to various attacks because it does not provide mutual authentication which the RFID tag does not authenticate the legality of the RFID reader unlike their claims. In addition, this paper proposes an improved matrix-based RFID mutual authentication protocol that can provide the mutual authentication. As a result, the proposed protocol not only can provide strong security and but also guarantee high efficiency because it reduces the communication rounds compare with Lee-Ahn's protocol.

Support of Third Party Logistics Operation based on Business Rules (비즈니스 규칙 기반의 3자 물류 운영 지원)

  • Park, Chulsoon;Bang, Yanghee;Sung, Hongsuk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.2
    • /
    • pp.137-144
    • /
    • 2017
  • The business process of global third party logistics company is defined as a network of logistics activities which involves the products that are manufactured in the developing countries, such as Vietnam, China and so on, and delivered to North or South American countries via intermediate stopover sites. The third party logistics company usually uses proprietary logistics information system to support the related logistics activities. However, each consignor sometimes may require different business process based on the customer type or characteristics of their products. Therefore, the third party logistics company need to modify their business process to reflect customer's requirements, resulting in the modification of logistic information systems and additional costs. Therefore, a flexible mechanism is required to efficiently support the various types of requirements by the owners of the products. In this paper, first, we figured out various business rules related to third party global logistics activities. Second, we grouped the identified business rules into business processes, objects, relations, dependency, policy, representations, execution, and resources and further into precondition, postcondition, and invariant based on checking point in time. Furthermore, the categorized rules are classified into inter-activity and intra-activity rules based on the execution range. Third, we proposed a rule syntax to describe the defined rules into scripts which are understood by user and information system together. When each activity is executed, the rule manager checks whether there are rules related with the activity execution. Finally, we developed a prototype rule management system to show the feasibility of our proposed methodology and to validate it with an example.

Research on Applying Contracting Systems for repair parts (부속품의 계약제도 적용방안에 관한 연구)

  • Kim, Young Joo;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.373-379
    • /
    • 2015
  • Supply units in each command are multi-tiered and each supply unit keeps a supply level independently, which can cause excess stock, leading false reports to the Logistics Command and increasing difficulties in managing user needs. This causes excess assets and the excess then causes deformation in demand. therefore, the supply support systems of our armed forces have become high-cost/low-efficiency and are insufficient to meet the needs of users in combat units. Civilian corporations and the US Department of Defense are downsizing the aforementioned multi-tiered supply systems thus revolutionizing efficient and effective logistics by adopting Supply Chain Management(SCM), and Prime Vendor policies. Prime Vendor policy is a logistics support method that allows users to directly request and receive supply items from suppliers, based on supply contracts between suppliers and central maintenance organizations like KDA. In other words, it is a system that allows for users to make orders to suppliers directly and suppliers to deliver goods to the users directly, cutting out the middle stage, thus allowing an efficient supply. This is a way forward in finance that cuts costs in net supplies and allows an efficient utilization of civilian assets. which is also known to fasten the speed of logistical support and stripping down the logistical structure. therefore, this report will explore Prime Vendor policies adopted in certain number of units for medical supplies that were taken in consideration of improvements in stock management in civilian organizations and the US Army, and aims to apply such policies for repair parts.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

A Low-Cost Portable Precise Position Information Service System Using the DGPS Mechanism (DGPS 개념을 이용한 저가형 이동식 정밀위치 서비스 시스템)

  • Yeoun Hyo-Bum;Kang Yeong-Wook;Lee Ki-Dong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.95-102
    • /
    • 2006
  • Nowadays, GPS is used widely, especially in case which needs precise position information, such as car navigation systems and various kinds of position measuring instruments in an outdoor environment. According to their applications, there are many kinds of GPS receivers with different costs and error rates. The maximum error range of the general-purpose GPS receiver is within 30m, though the error rate depends on receiving rate of signal and weather condition. RTK(Real-Time Kinematic) and DGPS(Differential Global Positioning System) have more precise accuracy than the general-purpose GPS. However end users can't afford use them because of their high price and large size of equipments. In order for the end user to obtain precise position information, it is important that GPS receivers has portability and low price. In this study, we introduce a new system that offers precise position information using the DGPS mechanism satisfying low cost and portability.

A Novel Approach for Deriving Test Scenarios and Test Cases from Events

  • Singh, Sandeep K.;Sabharwal, Sangeeta;Gupta, J.P.
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.213-240
    • /
    • 2012
  • Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test ma Safety critic Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test manually. In order to cut down on costs, save time, and increase reliability, the model based testing approach is the best solution. Such an approach does not require applications or codes prior to generating test cases, so it leads to the early detection of faults, which helps in reducing the development time. Several model-based testing approaches have used different UML models but very few works have been reported to show the generation of test cases that use events. Test cases that use events are an apt choice for these types of systems. However, these works have considered events that happen at a user interface level in a system while other events that happen in a system are not considered. Such works have limited applications in testing the GUI of a system. In this paper, a novel model-based testing approach is presented using business events, state events, and control events that have been captured directly from requirement specifications. The proposed approach documents events in event templates and then builds an event-flow model and a fault model for a system. Test coverage criterion and an algorithm are designed using these models to generate event sequence based test scenarios and test cases. Unlike other event based approaches, our approach is able to detect the proposed faults in a system. A prototype tool is developed to automate and evaluate the applicability of the entire process. Results have shown that the proposed approach and supportive tool is able to successfully derive test scenarios and test cases from the requirement specifications of safety critical systems, real time systems, and event based systems.

A Study on the Development of Educational Software for Web-based Visual Effects Interactive Environment (Web 기반 VE(Visual Effects) 인터랙티브 환경 교육용 소프트웨어 개발에 관한 연구)

  • Na, Wonshik
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.89-93
    • /
    • 2017
  • As the cost of installing and maintaining software on large organizations such as recent companies and schools has increased, software installation and maintenance costs are low, system management is easy, demand for ease of use software solutions has increased. In the reality that special education for service center engineers is required along with the release of various products, training of the software and solution industry is regarded as important. Building Web-based user and system interactive environment, strengthened usability and educational ability effect suitable for engineer level. In the future, research that is familiar with specific software, not successfully combining multiple frameworks, rather than developers, will be increasingly important for research that can achieve optimal performance.