• 제목/요약/키워드: desktop system

검색결과 296건 처리시간 0.036초

A Study on the Effective Method to Producing Data for The ROKA Live Fire Training Range Safety (한국군 실 사격 훈련간 효율적인 안전지대 데이터 구축 방안 연구)

  • Lee, June-Sik;Choi, Bong-Wan;Oh, Hyun-Seung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • 제38권3호
    • /
    • pp.64-77
    • /
    • 2015
  • An effective method for produce munitions effectiveness data is to calculate weapon effectiveness indices in the US military's Joint Munitions Effectiveness Manuals (JMEM) and take advantage of the damage evaluation model (GFSM) and weapon Effectiveness Evaluation Model (Matrix Evaluator). However, a study about the Range Safety that can be applied in the live firing exercises is very insufficient in the case of ROK military. The Range Safety program is an element of the US Army Safety Program, and is the program responsible for developing policies and guidance to ensure the safe operation of live-fire ranges. The methodology of Weapon Danger Zone (WDZ) program is based on a combination of weapon modeling/simulation data and actual impact data. Also, each WDZ incorporates a probability distribution function which provides the information necessary to perform a quantitative risk assessment to evaluate the relative risk of an identified profile. A study of method to establish for K-Range Safety data is to develop manuals (pamphlet) will be a standard to ensure the effective and safe fire training at the ROK military education and training and environmental conditions. For example, WDZs are generated with the WDZ tool as part of the RMTK (Range Managers Tool Kit) package. The WDZ tool is a Geographic Information System-based application that is available to operational planners and range safety manager of Army and Marine Corps in both desktop and web-based versions. K-Range Safety Program based on US data is reflected in the Korean terrain by operating environments and training doctrine etc, and the range safety data are made. Thus, verification process on modified variables data is required. K-Range Safety rather than being produced by a single program, is an package safety activities and measures through weapon danger zone tool, SRP (The Sustainable Range Program), manuals, doctrine, terrain, climate, military defence M&S, weapon system development/operational test evaluation and analysis to continuously improving range safety zone. Distribution of this K-range safety pamphlet is available to Army users in electronic media only and is intended for the standing army and army reserve. Also publication and distribution to authorized users for marine corps commands are indicated in the table of allowances for publications. Therefore, this study proposes an efficient K-Range Safety Manual producing to calculate the danger zones that can be applied to the ROK military's live fire training by introducing of US Army weapons danger zone program and Range Safety Manual

Ad Planning Model by Comparison Challenge Approach in the e-Marketplace (e-Marketplace에서의 비교도전에 의한 광고계획 모델)

  • 이재규;이재원
    • Journal of Intelligence and Information Systems
    • /
    • 제9권3호
    • /
    • pp.137-153
    • /
    • 2003
  • Comparison shopping is the most popular functionality in the e-Marketplace. Most of their revenue has been generated kent the Internet advertisement, but the ad earning was declined as the ad costing per action method widespread. Seller less familiar to the customer shrinks from chances for advertising and exposing their products. So, we need an efficient methodology subject to the seller's ad budget and other constraints, and it also has to increase comparison broker's earning in the e-Marketplace. Our research proposed and developed an ad planning methodology using comparison challenge approach which can be applied by 3$^{rd}$ party comparison brokers. Comparison challenge planning is organized with challenge policy of competitor level, product level and specification level. With that policies and basic challenge propositions, we measure the quantified value of functional distance between the specifications of my product and competitor's product. My product challenges the comparison using the comparative ad format to the similar but inferior competitor's product based on quantified valuation. Comparison challenge planning system has two phases of comparative value generation and optimization. We developed a prototype system and applied it to the desktop PC market of five major manufacturers. Our performance was emphasized by comparing to other comparative ad methods such as random display method and minimum distance method..

  • PDF

Economic Impact of HEMOS-Cloud Services for M&S Support (M&S 지원을 위한 HEMOS-Cloud 서비스의 경제적 효과)

  • Jung, Dae Yong;Seo, Dong Woo;Hwang, Jae Soon;Park, Sung Uk;Kim, Myung Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제10권10호
    • /
    • pp.261-268
    • /
    • 2021
  • Cloud computing is a computing paradigm in which users can utilize computing resources in a pay-as-you-go manner. In a cloud system, resources can be dynamically scaled up and down to the user's on-demand so that the total cost of ownership can be reduced. The Modeling and Simulation (M&S) technology is a renowned simulation-based method to obtain engineering analysis and results through CAE software without actual experimental action. In general, M&S technology is utilized in Finite Element Analysis (FEA), Computational Fluid Dynamics (CFD), Multibody dynamics (MBD), and optimization fields. The work procedure through M&S is divided into pre-processing, analysis, and post-processing steps. The pre/post-processing are GPU-intensive job that consists of 3D modeling jobs via CAE software, whereas analysis is CPU or GPU intensive. Because a general-purpose desktop needs plenty of time to analyze complicated 3D models, CAE software requires a high-end CPU and GPU-based workstation that can work fluently. In other words, for executing M&S, it is absolutely required to utilize high-performance computing resources. To mitigate the cost issue from equipping such tremendous computing resources, we propose HEMOS-Cloud service, an integrated cloud and cluster computing environment. The HEMOS-Cloud service provides CAE software and computing resources to users who want to experience M&S in business sectors or academics. In this paper, the economic ripple effect of HEMOS-Cloud service was analyzed by using industry-related analysis. The estimated results of using the experts-guided coefficients are the production inducement effect of KRW 7.4 billion, the value-added effect of KRW 4.1 billion, and the employment-inducing effect of 50 persons per KRW 1 billion.

An Integrated Approach to the GIS Data Reengineering for the New Korea Geodetic Datum (세계측지계 도입에 따른 공간데이터 재정비를 위한 통합모델 연구)

  • Lee Yang-Won;Park Key-Ho
    • Journal of the Korean Geographical Society
    • /
    • 제40권2호
    • /
    • pp.153-171
    • /
    • 2005
  • The newly adopted Korea Geodetic Datum (a.k.a. KGD2002) calls for massive reengineering work on geospatial dataset. The main focus of our study is placed on the strategy and system implementations of the required data reengineering with a keen attention to integrated approaches to interoperability, standardization, and database utilization. Our reengineering strategy includes file-to-file, file-to-DB, DB-to-file, and DB-to-DB conversion for the coordinate transformation of KGD2002. In addition to the map formats of existing standards such as DXF and Shapefile, the newly recommended standards such as GML and SVG are also accommodated in our reengineering environment. These four types of standard format may be imported into and exported from spatial database via KGD2002 transformation component. The DB-to-DB conversion, in particular, includes not only intra-database conversion but also inter-database conversion between SDE/Oracle and Oracle Spatial. All these implementations were carried out in multiple computing environments: desktop and the Web. The feasibility test of our system shows that the coordinate differences between Bessel and GRS80 ellipsoid agree with the criteria presented in the existing researches.

Web Document Transcoding Technique for Small Display Devices (소형 화면 단말기를 위한 웹 문서 변환 기법)

  • Shin, Hee-Sook;Mah, Pyeong-Soo;Cho, Soo-Sun;Lee, Dong-Woo
    • The KIPS Transactions:PartD
    • /
    • 제9D권6호
    • /
    • pp.1145-1156
    • /
    • 2002
  • We propose a web document transcoding technique that translates existing web pages designed for desktop computers into an appropriate form for hand-held devices connected to the wireless internet. By defining a content block based on a visual separation and using it as a minimum unit for analyzing and converting processes, we can get web pages converted more exactly. We also apply the reallocation of the content block and the generation of new index in order to provide convenient interface without left-right scrolling in small screen devices. These methods, compared with existing ways such as text level summary or partial extraction method, can provide efficient navigation and a full recognition of web documents. To gain those transcoding benefits, we propose the Layout-Forming Tag Analysis Algorithm that analyzes structural tags, which motivate visual separation and the Component Grouping Algorithm that extracts the content block. We also classify and rearrange the content block and generate the new index to produce an appropriate form of web pages for small display devices. We have designed and implemented our transcoding system in a proxy server and evaluated the methods and the algorithms through an analysis of transcoded results. Our transcoding system showed a good result on most of popular web pages that have complicated structures.

A Study of a Virtual Reality Interface of Person Search in Multimedia Database for the US Defense Industry (미국 방위산업체 상황실의 인물검색 활동을 돕는 가상현실 공간 인터페이스 환경에 관한 연구)

  • Kim, Na-Young;Lee, Chong-Ho
    • Journal of Korea Game Society
    • /
    • 제11권5호
    • /
    • pp.67-78
    • /
    • 2011
  • This paper introduces an efficient and satisfactory search interface that enables users to browse and find the video data they want from a massively huge video database widely used in various multimedia environment. The target user group is information analysts at US defense industry or governmental intelligence agencies whose job is to identify a certain person from a lot of video footage taken from CCTV(Closed-circuit Television) cameras. For the first user test, we suggested the CAVE-like virtual reality interface to be the most optimal for the tasks we designed for, so we compared this interface with desktop interface. The softwares and database developed and optimized for each task were used in this user test. For the second user test, we researched on what input devices would be most optimal for enhancing efficiency of search task in the CAVE-like virtual reality system. Especially we focused our effort on measuring the effectiveness and user satisfaction of three different types of devices that embody gestural interface input system that encourages users' ergonomic control of the interface. We also measured the time consumed for performing each task to find out the most efficient input device among the ones tested.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • 제16권1호
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

Design of Serendipity Service Based on Near Field Communication Technology (NFC 기반 세렌디피티 시스템 설계)

  • Lee, Kyoung-Jun;Hong, Sung-Woo
    • Journal of Intelligence and Information Systems
    • /
    • 제17권4호
    • /
    • pp.293-304
    • /
    • 2011
  • The world of ubiquitous computing is one in which we will be surrounded by an ever-richer set of networked devices and services. Especially, mobile phone now becomes one of the key issues in ubiquitous computing environments. Mobile phones have been infecting our normal lives more thoroughly, and are the fastest technology in human history that has been adapted to people. In Korea, the number of mobile phones registered to the telecom company, is more than the population of the country. Last year, the numbers of mobile phone sold are many times more than the number of personal computer sold. The new advanced technology of mobile phone is now becoming the most concern on every field of technologies. The mix of wireless communication technology (wifi) and mobile phone (smart phone) has made a new world of ubiquitous computing and people can always access to the network anywhere, in high speed, and easily. In such a world, people cannot expect to have available to us specific applications that allow them to accomplish every conceivable combination of information that they might wish. They are willing to have information they want at easy way, and fast way, compared to the world we had before, where we had to have a desktop, cable connection, limited application, and limited speed to achieve what they want. Instead, now people can believe that many of their interactions will be through highly generic tools that allow end-user discovery, configuration, interconnection, and control of the devices around them. Serendipity is an application of the architecture that will help people to solve a concern of achieving their information. The word 'serendipity', introduced to scientific fields in eighteenth century, is the meaning of making new discoveries by accidents and sagacity. By combining to the field of ubiquitous computing and smart phone, it will change the way of achieving the information. Serendipity may enable professional practitioners to function more effectively in the unpredictable, dynamic environment that informs the reality of information seeking. This paper designs the Serendipity Service based on NFC (Near Field Communication) technology. When users of NFC smart phone get information and services by touching the NFC tags, serendipity service will be core services which will give an unexpected but valuable finding. This paper proposes the architecture, scenario and the interface of serendipity service using tag touch data, serendipity cases, serendipity rule base and user profile.

A study on the effect of SME IT resource on performance (중소기업의 IT자원이 업무성과에 미치는 영향에 관한 연구)

  • Jin, Jeongsuk;Park, Jooseok;Park, Jaehong
    • The Journal of Bigdata
    • /
    • 제4권2호
    • /
    • pp.141-158
    • /
    • 2019
  • Based on RBV(Resource Based View), IT of SMEs classified into IT resource and capabilities. And We confirmed that capabilities and resources affected each performance. In other words, based on the questionnaire of SMEs and IT professionals, divides capability from the overall IT resource that are possessed by SMEs. Among the four attributes (value, rare, non-substitutability, imperfect imitability) presented by Barney (1991), this study targeted at value and imperfect imitability and investigated how SMEs recognize IT resource and capability. Furthermore, this study tests how IT resource and capability influence corporate performance. The result of this study finds that resources that are needed on "Knowledge-based" are classified into IT capability, otherwise classified into IT resource. Analysis shows that server, DB(database), system administrators, programmers, CIO, BA were capabilities, Desktop PC, PC software, software for salary and accounting management, e-commerce, Homepage, and network inside th enterprise were resources. Secondly, this study reveals that both IT resource and IT capability affected company performance (employee satisfaction, CEO satisfaction). IT is certainly having an impact on corporate performance. In conclusion, resource can be either IT resource or IT capability based on they way of utilization. And both IT resource and IT capability have an influence on corporate performance (employee job satisfaction, CEO satisfaction). Therefore, when considering IT investment, a company can purchase necessary IT resource and actively utilize it to be IT capability, which can have an influence on corporate performance in return.

  • PDF

A Property-Based Data Sealing using the Weakest Precondition Concept (최소 전제조건 개념을 이용한 성질 기반 데이터 실링)

  • Park, Tae-Jin;Park, Jun-Cheol
    • Journal of Internet Computing and Services
    • /
    • 제9권6호
    • /
    • pp.1-13
    • /
    • 2008
  • Trusted Computing is a hardware-based technology that aims to guarantee security for machines beyond their users' control by providing security on computing hardware and software. TPM(Trusted Platform Module), the trusted platform specified by the Trusted Computing Group, acts as the roots for the trusted data storage and the trusted reporting of platform configuration. Data sealing encrypts secret data with a key and the platform's configuration at the time of encryption. In contrast to the traditional data sealing based on binary hash values of the platform configuration, a new approach called property-based data sealing was recently suggested. In this paper, we propose and analyze a new property-based data sealing protocol using the weakest precondition concept by Dijkstra. The proposed protocol resolves the problem of system updates by allowing sealed data to be unsealed at any configuration providing the required property. It assumes practically implementable trusted third parties only and protects platform's privacy when communicating. We demonstrate the proposed protocol's operability with any TPM chip by implementing and running the protocol on a software TPM emulator by Strasser. The proposed scheme can be deployed in PDAs and smart phones over wireless mobile networks as well as desktop PCs.

  • PDF