• Title/Summary/Keyword: Web Tools

Search Result 698, Processing Time 0.027 seconds

Development of hybrid controller combining JAVA and IEC61131-3 on reliable hardware

  • Kobayashi, Toshiko;Chun, Jae-Hong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1123-1126
    • /
    • 2005
  • This paper introduces the key features of NCS (Network based Control System), which is quite a new concept in the industrial automation market. Two control systems "DCS" and "PLC" have been recognized as control systems used for process and factory automation during the past decades. However, the market requires more complex functionality, such as monitoring and operation, alarm handling and notification from remote locations using the Web or e-mail. Besides enhancing functionality, interoperability between each device and system is highly required since network and engineering tools provided by many vendors do not cooperate with each others, so that lots of conversion, reconfiguration and reprogramming are required when expanding systems. NCS can meet this requirement, installing leading-edged IT technology using international standards for network and engineering environment. NCS, which is a harmony of web functionality, networkability and a reliable control function, enables information integration and responding to the market's requirements with agility and high reliability.

  • PDF

A Study on the Development of CITIS System Prototype - Using a Web Development Tool - (CITIS 시스템의 프로토타입 개발 방안 - 웹 개발 도구 사용을 중심으로 -)

  • 박정선;김성희
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.117-129
    • /
    • 1997
  • As the lifecycle of a product becomes shorter, the communication between a contractor and a supplier in product information has got more importance. The CITIS(Contractor Integrated Technical Information Service) is required to provide authorized users with access to both data and applications they need to complete a task for contract. With the growth of WWW, there has been much study for the use of WWW for the implementation of CALS. The WWW has been proved as an efficient tool for CALS implementation due to its of publicity, openness, and free accessibility. In this study, we suggest using WWW tools, here, an intranet tool, as a basis for the implementation of CITIS

  • PDF

Xperanto: A Web-Based Integrated System for DNA Microarray Data Management and Analysis

  • Park, Ji Yeon;Park, Yu Rang;Park, Chan Hee;Kim, Ji Hoon;Kim, Ju Ha
    • Genomics & Informatics
    • /
    • v.3 no.1
    • /
    • pp.39-42
    • /
    • 2005
  • DNA microarray is a high-throughput biomedical technology that monitors gene expression for thousands of genes in parallel. The abundance and complexity of the gene expression data have given rise to a requirement for their systematic management and analysis to support many laboratories performing microarray research. On these demands, we developed Xperanto for integrated data management and analysis using user-friendly web-based interface. Xperanto provides an integrated environment for management and analysis by linking the computational tools and rich sources of biological annotation. With the growing needs of data sharing, it is designed to be compliant to MGED (Microarray Gene Expression Data) standards for microarray data annotation and exchange. Xperanto enables a fast and efficient management of vast amounts of data, and serves as a communication channel among multiple researchers within an emerging interdisciplinary field.

An Approach for Error Detection in Ontologies Using Concept Lattices (개념격자를 이용한 온톨로지 오류검출기법)

  • Hwang, Suk-Hyung
    • Journal of Information Technology Services
    • /
    • v.7 no.3
    • /
    • pp.271-286
    • /
    • 2008
  • The core of the semantic web is ontology, which supports interoperability among semantic web applications and enables developer to reuse and share domain knowledge. It used a variety of fields such as Information Retrieval, E-commerce, Software Engineering, Artificial Intelligence and Bio-informatics. However, the reality is that various errors might be included in conceptual hierarchy when developing ontologies. Therefore, methodologies and supporting tools are essential to help the developer construct suitable ontologies for the given purposes and to detect and analyze errors in order to verify the inconsistency in the ontologies. In this paper we propose a new approach for ontology error detection based on the Concept Lattices of Formal Concept Analysis. By using the tool that we developed in this research, we can extract core elements from the source code of Ontology and then detect some structural errors based on the concept lattices. The results of this research can be helpful for ontology engineers to support error detection and construction of "well-defined" and "good" ontologies.

An Efficient Web Ontology Storage Considering Hierarchical Knowledge for Jena-based Applications

  • Jeong, Dong-Won;Shin, Hee-Young;Baik, Doo-Kwon;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.5 no.1
    • /
    • pp.11-18
    • /
    • 2009
  • As well as providing various APIs for the development of inference engines and storage models, Jena is widely used in the development of systems or tools related with Web ontology management. However, Jena still has several problems with regard to the development of real applications, one of the most important being that its query processing performance is unacceptable. This paper proposes a storage model to improve the query processing performance of the original Jena storage. The proposed storage model semantically classifies OWL elements, and stores an ontology in separately classified tables according to the classification. In particular, the hierarchical knowledge is managed, which can make the processing performance of inferable queries enhanced and stores information. It enhances the query processing performance by using hierarchical knowledge. For this paper an experimental evaluation was conducted, the results of which showed that the proposed storage model provides a improved performance compared with Jena.

Management Education by Utilizing the Cyber Education Learning System (웹기반 원격교육시스템을 활용한 경영학 교육)

  • Hong Yong-Gee
    • Management & Information Systems Review
    • /
    • v.5
    • /
    • pp.249-285
    • /
    • 2000
  • This paper discusses management education by utilizing the cyber education learning system in a web-based. New learning system tools offer great promise for a new contents of management learning. The cyber education learning system a shift from face-to-face lecturing to interactive learning. The situation changes profoundly when information technology becomes develope and education paradigm is shift. By exploiting the digital media. educations, and students, managers can shift to a new, more effect cyber education learning system. The following shift from classic educations to cyber educations learning system: from instruction to construction, from teacher-centered to learner-centered, from school to lifelong, from one-size-fits-all to customized, from teacher as transmitter to teacher as facilitator. Cyber education learning system has an important role to play in management education. Web-based technology is regarded as a general solution to cyber education learning. This study discussed many factors of implementation in cyber education systems and provide utilizing the learning system at main, detail functions. Lastly, management implications of these cyber education utilize are discussed in more detail.

  • PDF

A Study on the Metadata Modeling for Research Result Information Using RDF/RDFS (RDF/RDFS를 이용한 연구성과물정보 메타데이터 모델링에 관한 연구)

  • Park, Dong-Jin
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.383-389
    • /
    • 2005
  • The purpose of this paper is to develop the metadata on the information of research result in Science and technology and to design the domain knowledge structure using semantic web technology for further implementation. In this paper, we first analyze the existing theories and techniques related to the metadata in such fields as R&D research result, international standard, and semantic web. Then, we extract and group the relevant factors from Dublin Core, CERIF, and the research results for building the integrated metadata framework. Based on our proposed metadata, we design a domain knowledge structure which employs RDF/RDFS as knowledge representation tool. Therefore, we can implement the ontology which produce the 'intelligent' information service and improve the interoperability between the research institutions. Also, the metadata can be used as the basis for developing National R&D Performance Information, and in terms of research institutions, can be used as tools for managing the their own research results information systematically and consistently.

  • PDF

A Multi-password Management Scheme using Pseudopia Function (슈도피아 함수를 이용한 다중 패스워드 관리 방안)

  • Jang, Hwa-Sik;Shin, Weon;Rhee, Kyung-Hyune
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3438-3444
    • /
    • 2000
  • In this paper, we propose an efficient passwork management scheme using the Pseudopia function which performs a mukti-password management and change scheme in the cyberspace. For a givne user and a web-site, the Pseudopia automatically generates a user name and a password that can be used to establish an anonvous account at the web-site. In the proposed scheme, a user can protect his password using " the personal etropy" which relates to his own life experiences, that identified only by himself. The proposed scheme can be applied to the broad tools for the internet related applications such as electronic commerce and Internet banking system.

  • PDF

Publication trends of somatic mutation and recombination tests research: a bibliometric analysis (1984-2020)

  • Tagorti, Ghada;Kaya, Bulent
    • Genomics & Informatics
    • /
    • v.20 no.1
    • /
    • pp.10.1-10.15
    • /
    • 2022
  • Human exposure to pollutants has been on the rise. Thus, researchers have been focused on understanding the effect of these compounds on human health, especially on the genetic information by using various tests, among them the somatic mutation and recombination tests (SMARTs). It is a sensitive and accurate method applicable to genotoxicity analysis. Here, a comprehensive bibliometric analysis of SMART assays in genotoxicity studies was performed to assess publication trends of this field. Data were extracted from the Web of Science database and analyzed by the bibliometric tools HistCite, Biblioshiny (RStudio), VOSViewer, and CiteSpace. Results have shown an increase in the last 10 years in terms of publication. A total of 392 records were published in 96 sources mainly from Brazil, Spain, and Turkey. Research collaboration networks between countries and authors were performed. Based on document co-citation, five large research clusters were identified and analyzed. The youngest research frontier emphasized on nanoparticles. With this study, how research trends evolve over years was demonstrated. Thus, international collaboration could be enhanced, and a promising field could be developed.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.