• Title/Summary/Keyword: User Need

Search Result 2,132, Processing Time 0.028 seconds

Development of an Editor and Howling Engine for Realtime Software Programmable Logic Controller based on Intelligent Agents (지능적 에이전트에 의한 실시간 소프트웨어 PLC 편집기 및 실행엔진 개발)

  • Cho, Young-In
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1271-1282
    • /
    • 2005
  • Recently, PC-based control is incredibly developed in the industrial control field, but it is difficult for PLC programming in PC. Therefore, I need to develop the softeware PLC, which support the international PLC programming standard(IECl131-3) and can be applied to diverse control system by using C language. In this paper, I have developed the ISPLC(Intelligent Agent System based Software Programmable Logic Controller). In ISPLC system, LD programmed by a user which is used over $90\%$ among the 5 PLC languages, is converted to IL, which is one of intermediate codes, and IL is converted to the standard C rode which can be used in a commercial editor such as Visual C++. In ISPLC, the detection of logical error in high level programming(C) is more eaier than PLC programming itself The study of code conversion of LD->IL->C is firstly tried in the world as well as KOREA. I developed an execution engine with a good practical application. To show the effectiveness of the developed system, 1 applied it to a practical case, a real time traffic control(RT-TC) system. ISPLC is minimized the error debugging and programming time owing to be supported by windows application program.

A Study on the Design of a Fake News Management Platform Based on Citizen Science (시민과학 기반 가짜뉴스 관리 플랫폼 연구)

  • KIM, Ji Yeon;SHIM, Jae Chul;KIM, Gyu Tae;KIM, Yoo Hyang
    • Journal of Science and Technology Studies
    • /
    • v.20 no.1
    • /
    • pp.39-85
    • /
    • 2020
  • With the development of information technology, fake news is becoming a serious social problem. Individual measures to manage the problem, such as fact-checking by the media, legal regulation, or technical solutions, have not been successful. The flood of fake news has undermined not only trust in the media but also the general credibility of social institutions, and is even threatening the foundations of democracy. This is why one cannot leave fake news unchecked, though it is certainly a difficult task to accomplish. The problem of fake news is not about simply judging its veracity, as no news is completely fake or unquestionably real and there is much uncertainty. Therefore, managing fake news does not mean removing them completely. Nor can the problem be left to individuals' capacity for rational judgment. Recurring fake news can easily disrupt individual decision making, which raises the need for socio-technical measures and multidisciplinary collaboration. In this study, we introduce a new public online platform for fake news management, which incorporates a multidimensional and multidisciplinary approach based on citizen science. Our proposed platform will fundamentally redesign the existing process for collecting and analyzing fake news and engaging with user reactions. People in various fields would be able to participate in and contribute to this platform by mobilizing their own expertise and capability.

Data processing techniques applying data mining based on enterprise cloud computing (데이터 마이닝을 적용한 기업형 클라우드 컴퓨팅 기반 데이터 처리 기법)

  • Kang, In-Seong;Kim, Tae-Ho;Lee, Hong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.1-10
    • /
    • 2011
  • Recently, cloud computing which has provided enabling convenience that users can connect from anywhere and user friendly environment that offers on-demand network access to a shared pool of configurable computing resources such as smart-phones, net-books and PDA etc, is to be watched as a service that leads the digital revolution. Now, when business practices between departments being integrated through a cooperating system such as cloud computing, data streaming between departments is getting enormous and then it is inevitably necessary to find the solution that person in charge and find data they need. In previous studies the clustering simplifies the search process, but in this paper, it applies Hash Function to remove the de-duplicates in large amount of data in business firms. Also, it applies Bayesian Network of data mining for classifying the respect data and presents handling cloud computing based data. This system features improved search performance as well as the results Compared with conventional methods and CPU, Network Bandwidth Usage in such an efficient system performance is achieved.

Satisfaction Factors and Determinants of Visitors in Taeanhaean National Park, Korea (태안해안국립공원 탐방객 만족요인 및 예측모형)

  • Baek, Jae-Bong;Kim, Dong-Pil
    • Korean Journal of Environment and Ecology
    • /
    • v.24 no.2
    • /
    • pp.101-107
    • /
    • 2010
  • This study was carried out to provide basic data for efficient park management by analysing visitors' satisfaction factors and estimated regression model through questionnaire survey method at Taeanhaean National Park in Korea. Performance(satisfaction) variables as 'touting', 'illegal merchant', 'noise', 'indiscreet use' and 'collection of natural plants or animals', and Importance variables as 'littering problem', 'water pollution act', 'careless cooking' and 'exorbitant pay' were relatively high score. It was clarified that the 'souvenir & special product', 'lack of use program' 'lack of public facility', 'lack of information facility', and 'lack of commercial facility' were 'concentrate here' ones by the Importance-Performance analysis. 'Facility management', 'Use management' and 'Resource management' factors were found out by Factor Analysis and the 'Facility management' was the biggest factor accounting for 32.6% of all. In the estimated model by Multiple Regression Analysis, 'lack of employee's guidance or kindness', 'lack of convenience facility', 'noise', 'lack of facilities to stay' and 'charge of user fee, parking fee' were the variables to impact visitors' satisfaction and to need concentrated management. These results were unique characteristics of marine national park and then the different management strategy and policy from mountain national park were necessary.

Cache Table Management for Effective Label Switching (효율적인 레이블 스위칭을 위한 캐쉬 테이블 관리)

  • Kim, Nam-Gi;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.2
    • /
    • pp.251-261
    • /
    • 2001
  • The traffic on the Internet has been growing exponentially for some time. This growth is beginning to stress the current-day routers. However, switching technology offers much higher performance. So the label switching network which combines IP routing with switching technology, is emerged. EspeciaJJy in the data driven label switching, flow classification and cache table management are needed. Flow classification is to classify packets into switching and non-switching packets, and cache table management is to maintain the cache table which contains information for flow classification and label switching. However, the cache table management affects the performance of label switching network considerably as well as flowclassification because the bigger cache table makes more packet switched and maintains setup cost lower, but cache is restricted by local router resources. For that reason, there is need to study the cache replacement scheme for the efficient cache table management with the Internet traffic characterized by user. So in this paper, we propose several cache replacement schemes for label switching network. First, without the limitation at switching capacity in the router. we introduce FIFO(First In First Out). LFC(Least Flow Count), LRU(Least Recently Used! scheme and propose priority LRU, weighted priority LRU scheme. Second, with the limitation at switching capacity in the router, we introduce LFC-LFC, LFC-LRU, LRU-LFC, LRU-LRU scheme and propose LRU-weighted LRU scheme. Without limitation, weighted priority LRU scheme and with limitation, LRU-weighted LRU scheme showed best performance in this paper.

  • PDF

A Study on the Expected Effect of Mobile Prepaid Payment for the Activation of Food Waste Volume-Rate System (음식물 종량제 활성화를 위한 모바일 선불결제 적용에 따른 기대효과 연구)

  • Kim, YongIl;Kim, SeungCheon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.47-54
    • /
    • 2020
  • This study proposes an NFC-based payment system that considers user convenience while expanding the existing payment method for RFID-based individual food and logistics waste equipment. In line with this trend, I proposed to apply NFC to the existing RFID-based food meter to release the food in the meantime and to address the problem of re-carrying due to card loss, card not possessed, and non-filling, and the question that could not be identified by various cumbersome procedures. NFC's function alone has been certified for its convenience, which led to its introduction and research in the period of time. Of course, we need to negotiate fees with the transportation card company, but if we see a market share related to transportation card soon, we think smooth negotiations will take place. NFC method will be expanded to all phones with iPhone NFC opening. Therefore, in the next study, we intend to apply the payment system in NFC by linking with local currency, mobile vouchers, and card companies, which are being paid as respective payment means according to the recent emergency support system for COVID-19.

Authentication Mechanism Using Three-Dimensional Optical Memory (3차원 광메모리를 이용한 인증 기법)

  • Park, CheolYong;Ryou, JaeCheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1361-1373
    • /
    • 2016
  • Recently the need for user authentication with increasing, there are a variety of mechanisms, such as password, graphic authentication, token, biometrics and multiple authentication. in particular, the data of the 2-dimensional(2D) factors such as password, graphic authentication, biometrics is used because of the convenience. The stored information is problematic in that additional data recording needs to be performed whenever authentication data is updated. Furthermore, this storage method is problematic in that the time it takes to perform authentication increases because the time it takes to compare storage data with authentication data increases in proportion to an increase in the amount of the storage data. Accordingly, authentication through the rapid comparison of storage data with authentication data is a very important factor in data recording and authentication technology using memory. Using the three-dimensional(3D) optical memory by variously changing the recoding elements during recoding of data constitutes the way that multiple recoding different data storage. This enables high-density recoding in this way, and by applying the possible parallel processing at the time of recording and restoring method, provided that it is possible to quickly record and restore the data. In addition, each time to solve problems that require additional data recorded by a combination of the stored data record in the old data using a combination of the authentication. The proposed mechanism is proposed an authentication method using scheme after the recoding data in 3D optical memory to apply the conditions corresponding to the recoding condition when restoring the recorded data and through the experiment it was confirmed possible application as an authentication mechanism.

Distance measurement System from detected objects within Kinect depth sensor's field of view and its applications (키넥트 깊이 측정 센서의 가시 범위 내 감지된 사물의 거리 측정 시스템과 그 응용분야)

  • Niyonsaba, Eric;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.279-282
    • /
    • 2017
  • Kinect depth sensor, a depth camera developed by Microsoft as a natural user interface for game appeared as a very useful tool in computer vision field. In this paper, due to kinect's depth sensor and its high frame rate, we developed a distance measurement system using Kinect camera to test it for unmanned vehicles which need vision systems to perceive the surrounding environment like human do in order to detect objects in their path. Therefore, kinect depth sensor is used to detect objects in its field of view and enhance the distance measurement system from objects to the vision sensor. Detected object is identified in accuracy way to determine if it is a real object or a pixel nose to reduce the processing time by ignoring pixels which are not a part of a real object. Using depth segmentation techniques along with Open CV library for image processing, we can identify present objects within Kinect camera's field of view and measure the distance from them to the sensor. Tests show promising results that this system can be used as well for autonomous vehicles equipped with low-cost range sensor, Kinect camera, for further processing depending on the application type when they reach a certain distance far from detected objects.

  • PDF

Study about Component Identification Method Based On RUP (RUP 기반의 컴포넌트 식별 방법에 관한 연구)

  • Choe, Mi-Suk;Yun, Yong-Ik;Park, Jae-Nyeon
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.91-102
    • /
    • 2002
  • We need a component-based system to reflect software changes in user's requirements, to implement a system at a rapid speed as well as to efficiently manage the system in a maintenance phase and to easily change software. Moreover, the component-based system has a merit in development cost. However, existing component development methodology for implement of component-based system is inefficient in object identification for component identification. Moreover, the existing component development methodology also fails to provide any method to identify system component. It merely provides procedures and methods to identify business component focused on a whole system domain. In addition, it has another problem that it considerably relies on developer's experiences and intuitions for component identification. Therefore, according to this paper, RUP (Rational Unified Process) is applied from a requirement analysis phase to an object identification phase in order to improve the inefficiency of object identification. In addition, this paper procedures and methods for system component identification, and identifies business components based on the identified system component, rather than on the whole system domain. This paper also provides and applies cohesion metric and coupling metric so as to overcome the problem that component identification depends on developer's intuitions and experiences. Accordingly, the component identification method proposed in this paper, may identify components more effectively based on facility of object identification, functional reusability of components, traceability, and independence of components.

A Study on Controlling IPTV Interface Based on Tracking of Face and Eye Positions (얼굴 및 눈 위치 추적을 통한 IPTV 화면 인터페이스 제어에 관한 연구)

  • Lee, Won-Oh;Lee, Eui-Chul;Park, Kang-Ryoung;Lee, Hee-Kyung;Park, Min-Sik;Lee, Han-Kyu;Hong, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.930-939
    • /
    • 2010
  • Recently, many researches for making more comfortable input device based on gaze detection have been vigorously performed in human computer interaction. However, these previous researches are difficult to be used in IPTV environment because these methods need additional wearing devices or do not work at a distance. To overcome these problems, we propose a new way of controlling IPTV interface by using a detected face and eye positions in single static camera. And although face or eyes are not detected successfully by using Adaboost algorithm, we can control IPTV interface by using motion vectors calculated by pyramidal KLT (Kanade-Lucas-Tomasi) feature tracker. These are two novelties of our research compared to previous works. This research has following advantages. Different from previous research, the proposed method can be used at a distance about 2m. Since the proposed method does not require a user to wear additional equipments, there is no limitation of face movement and it has high convenience. Experimental results showed that the proposed method could be operated at real-time speed of 15 frames per second. Wd confirmed that the previous input device could be sufficiently replaced by the proposed method.