• Title/Summary/Keyword: design document

Search Result 921, Processing Time 0.031 seconds

Design of Formalized message exchanging method using XMDR (XMDR을 이용한 정형화된 메시지 교환 기법 설계)

  • Hwang, Chi-Gon;Jung, Kye-Dong;Choi, Young-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1087-1094
    • /
    • 2008
  • Recently, XML has been widely used as a standard for a data exchange, and there has emerged the tendency that the size of XML document becomes larger. The data transfer can cause problems due to the increase in traffic, especially when a massive data such as Data Warehouse is being collected and analyzed. Therefore, an XMDR wrapper can solve this problem since it analyzes the tree structures of XML Schema, regenerates XML Schema using the analyzed tree structures, and sends it to each station with an XMDR Query. XML documents which are returned as an outcome encode XML tags according to XML Schema, and send standardized messages. As the formalized XML documents decrease network traffic and comprise XML class information, they are efficient for extraction, conversion, and alignment of data. In addition, they are efficient for the conversion process through XSLT, too, as they have standardized forms. In this paper we profuse a method in which XML Schema and XMDR_Query sent to each station are generated through XMDR(extended Meta-Data Registry) and the generation of products and XML conversion occur in each station wrapper.

A Design of Framework based on SyncML for Smart Synchronization of u-GIS (u-GIS 스마트 동기화를 위한 SyncML 기반 프레임워크 설계)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1039-1044
    • /
    • 2008
  • Owing to rapid advancements of the mobile computing technologies and the performance of mobile device recently, the data synchronization techniques between severs and mobile clients are getting more and more important. OMA also proposes and recommends standard synchronization methods to use SyncML. However, the feasible data in the method are limited to normal document data, scheduler data, etc. This paper a standard framework based on SyncML. We call it SCGFG. The SCGFG is able to synchronize not only the above data but also GIS data which is very useful in mobile applications. It applies GML, international GIS standard, to the synchronization. By means of using XML, it is also able to resolve the serious problem that is the increase of data volume occurred by SyncML and GML. efficiently. It is highly expected to be useful in the smart synchronization of GIS data among several servers and mobile clients.

Safeguarding Korean Export Trade through Social Media-Driven Risk Identification and Characterization

  • Sithipolvanichgul, Juthamon;Abrahams, Alan S.;Goldberg, David M.;Zaman, Nohel;Baghersad, Milad;Nasri, Leila;Ractham, Peter
    • Journal of Korea Trade
    • /
    • v.24 no.8
    • /
    • pp.39-62
    • /
    • 2020
  • Purpose - Korean exports account for a vast proportion of Korean GDP, and large volumes of Korean products are sold in the United States. Identifying and characterizing actual and potential product hazards related to Korean products is critical to safeguard Korean export trade, as severe quality issues can impair Korea's reputation and reduce global consumer confidence in Korean products. In this study, we develop country-of-origin-based product risk analysis methods for social media with a specific focus on Korean-labeled products, for the purpose of safeguarding Korean export trade. Design/methodology - We employed two social media datasets containing consumer-generated product reviews. Sentiment analysis is a popular text mining technique used to quantify the type and amount of emotion that is expressed in the text. It is a useful tool for gathering customer opinions regarding products. Findings - We document and discuss the specific potential risks found in Korean-labeled products and explain their implications for safeguarding Korean export trade. Finally, we analyze the false positive matches that arise from the established dictionaries that were used for risk discovery and utilize these classification errors to suggest opportunities for the future refinement of the associated automated text analytic methods. Originality/value - Various studies have used online feedback from social media to analyze product defects. However, none of them links their findings to trade promotion and the protection of a specific country's exports. Therefore, it is important to fill this research gap, which could help to safeguard export trade in Korea.

Design and Implementation of RFID Based Computer Equipment Management System (RFID 기반 전산 장비 관리 시스템 설계 및 구현)

  • Lim, Hyunjeong;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.79-92
    • /
    • 2019
  • The existing computer equipment management system is designed to computerize and manage equipment information that was managed only by documents in the computer room. However, the existing system focuses on computerizing the equipment arranged in the document, so there is a limit to the equipment that can be registered and it is difficult to find the necessary equipment. In addition, it caused inconvenience to confirm whether the registered equipment is currently used. In this paper, we redesign and implement the computer equipment management system to solve the problem. For this purpose, the existing computer equipment management system was thoroughly analyzed throughout, and the system is designed and implemented to improve the system by reflecting the opinions of public officials and management companies using the system. In the performance evaluation, the efficiency of the improved system is proved by comparing the number of equipment registrations and equipment search accuracy of the existing system.

Symbol recognition using vectorial signature matching for building mechanical drawings

  • Cho, Chi Yon;Liu, Xuesong;Akinci, Burcu
    • Advances in Computational Design
    • /
    • v.4 no.2
    • /
    • pp.155-177
    • /
    • 2019
  • Operation and Maintenance (O&M) phase is the main contributor to the total lifecycle cost of a building. Previous studies have described that Building Information Models (BIM), if available with detailed asset information and their properties, can enable rapid troubleshooting and execution of O&M tasks by providing the required information of the facility. Despite the potential benefits, there is still rarely BIM with Mechanical, Electrical and Plumbing (MEP) assets and properties that are available for O&M. BIM is usually not in possession for existing buildings and generating BIM manually is a time-consuming process. Hence, there is a need for an automated approach that can reconstruct the MEP systems in BIM. Previous studies investigated automatic reconstruction of BIM using architectural drawings, structural drawings, or the combination with photos. But most of the previous studies are limited to reconstruct the architectural and structural components. Note that mechanical components in the building typically require more frequent maintenance than architectural or structural components. However, the building mechanical drawings are relatively more complex due to various type of symbols that are used to represent the mechanical systems. In order to address this challenge, this paper proposed a symbol recognition framework that can automatically recognize the different type of symbols in the building mechanical drawings. This study applied vector-based computer vision techniques to recognize the symbols and their properties (e.g., location, type, etc.) in two vector-based input documents: 2D drawings and the symbol description document. The framework not only enables recognizing and locating the mechanical component of interest for BIM reconstruction purpose but opens the possibility of merging the updated information into the current BIM in the future reducing the time of repeated manual creation of BIM after every renovation project.

A Study On The Application of RPA(Robotics Process Automation) For Productivity Of Business Documents (비즈니스 문서의 생산성 향상을 위한 RPA(Robotics Process Automation)적용방안에 대한 연구)

  • Hyun, Young Geun;Lee, Joo Yeoun
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.199-212
    • /
    • 2019
  • Digitalization is creating a variety of changes and innovations in our business environment. In manufacturing, robots have long been used for automation to innovate processing speed and quality. The RPA brings these innovations in manufacturing sites to the office space. The purpose of this study is to improve productivity for simple, repetitive tasks in these office space. For identify the potential of automation related to productivity improvement, I looked at the concept of business automation, and then simulated the five areas of business documentation works with agile methodology. In conclusion, I confirmed that productivity improvement of 97.3% in quality inspection and 31.7% in editorial design is possible, and examined the direction to apply to actual work. Based on these results, future study will explore the application of Intelligent Process Automation (IPA).

A Comparative Study on the Science Curriculum between Korea and Estonia: Focusing Chemistry Domain (한국과 에스토니아의 과학 교육과정 비교 연구: 화학 영역을 중심으로)

  • Kim, Hyunjung;Kim, Sungki
    • Journal of the Korean Chemical Society
    • /
    • v.65 no.5
    • /
    • pp.347-357
    • /
    • 2021
  • The purpose of this study is to compare and analyze the science curriculum of Korea and Estonia with a focus on the chemistry domain, and draw implications for reference when revising the next curriculum. To this end, the overall curriculum design centered on science subjects and the core concepts of chemistry covered in subjects corresponding to the common curriculum of the two countries were compared. As a result of the analysis, first, Estonia specifically suggested how the core competencies suggested in the general lecture were specifically connected to science subject. In addition, there was a characteristic that the inquiry function, attitude, and value were specifically presented in the curriculum document. Second, as a result of analyzing the core concepts of chemistry, most of the concepts dealt with in Korea were also dealt with in Estonia. However, Estonia has a tendency to deal more qualitatively with broader concepts. The concepts covered in the chemistry subject exceeded the level of the common curriculum in Korea, but this subject also had the characteristic of attempting a qualitative approach.

Design and Implementation of the CDMA2000 1x EV-DO Security Layer to which applies 3GPP2 C.S0024-A v.2.0 Standard (3GPP2 C.S0024-A v.2.0 표준을 적용한 CDMA2000 1x EV-DO 보안 계층 설계 및 구현)

  • Yang, Jong-Won;Cho, Jin-Man;Lee, Tae-Hoon;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.59-65
    • /
    • 2008
  • In security layer in the CDMA2000 1x EV-DO, a standard - C.S0024-a v2.0 is being accomplished under the project of 3GPP2(3rd Generation Partnership Project2). Therefore, a security device is needed to implement the security layer which is defined on the standard document for data transfer security between AT(Access Terminal) and AN(Access Network) on CDMA2000 1x EV-DO environment. This paper realizes the security layer system that can make safe and fast transfer of data between AT and AN. It could be applied to various platform environments by designing and implementing the Security Layer in the CDMA2000 1x EV-DO Security Layer to which applies C.S0024-A v2.0 of 3GPP2.

Implementation of Key Recovery Model based on XML for B2B (B2B를 위한 XML기반의 키 복구 구현)

  • 김주한;문기영;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.53-61
    • /
    • 2002
  • In this paper, we will introduce a design of key recovery based on XML can be used in B2B environment. XML Digital Signature and XML Encryption that are defied recently as standards by W3C(World Wide Web Consortium) are deployed to sign/verify or encrypt/decrypt documents for electronic commerce and keys to store/load at/from key recovery server. The result of signature or encryption is always an XML document and all messages used in this key recovery system are also XML documents. It enables to adapt transparently this key recovery system to legacy XML applications and electronic commerce platforms based on XML. And its method for key recovery is key escrow. One of the characteristics of this key recovery is that one enterprise can recover keys of some documents for electronic commerce from external key recovery system in other enterprises related with them and also recover keys from owns.

Analysis on the Trend of The Journal of Information Systems Using TLS Mining (TLS 마이닝을 이용한 '정보시스템연구' 동향 분석)

  • Yun, Ji Hye;Oh, Chang Gyu;Lee, Jong Hwa
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.289-304
    • /
    • 2022
  • Purpose The development of the network and mobile industries has induced companies to invest in information systems, leading a new industrial revolution. The Journal of Information Systems, which developed the information system field into a theoretical and practical study in the 1990s, retains a 30-year history of information systems. This study aims to identify academic values and research trends of JIS by analyzing the trends. Design/methodology/approach This study aims to analyze the trend of JIS by compounding various methods, named as TLS mining analysis. TLS mining analysis consists of a series of analysis including Term Frequency-Inverse Document Frequency (TF-IDF) weight model, Latent Dirichlet Allocation (LDA) topic modeling, and a text mining with Semantic Network Analysis. Firstly, keywords are extracted from the research data using the TF-IDF weight model, and after that, topic modeling is performed using the Latent Dirichlet Allocation (LDA) algorithm to identify issue keywords. Findings The current study used the summery service of the published research paper provided by Korea Citation Index to analyze JIS. 714 papers that were published from 2002 to 2012 were divided into two periods: 2002-2011 and 2012-2021. In the first period (2002-2011), the research trend in the information system field had focused on E-business strategies as most of the companies adopted online business models. In the second period (2012-2021), data-based information technology and new industrial revolution technologies such as artificial intelligence, SNS, and mobile had been the main research issues in the information system field. In addition, keywords for improving the JIS citation index were presented.