• Title/Summary/Keyword: first to file system

Search Result 190, Processing Time 0.023 seconds

A study on laser scan path generation for manufacturing 3-dimensional body using StereoLithography (StereoLithography로 3차원 형상가공을 위한 레이저 조사경로 생성에 관한 연구)

  • 안대건;김준안;이석희;백인환
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1993.10a
    • /
    • pp.687-692
    • /
    • 1993
  • This paper deals with the generation of laser scan path for manufacturing 3-dimensional body using StereoLithography. The purpose of this study is to develop one module of the StersoLithography system(SLA) for Rapid Protyping and Manufacturing. AutoCAD system is used to supply CAD information from model. The X-Y controller which was made for a special purpose is used to test this system. The system software developed is composed of 3 main modules, the first module is calculating the boundary point os laser scan path. The scound module is generating final output file which is used to down load on the controller. The result of this study shows a good algorithm to generate laser scan path on the basis of simple mathematical background.

  • PDF

Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption

  • Youn, Taek-Young;Jho, Nam-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1249-1262
    • /
    • 2020
  • Along with the increase of the importance of information used in practice, adversaries tried to take valuable information in diverse ways. The simple and fundamental solution is to encrypt the whole data. Since the cost of encryption is increasing along with the size of data, the cost for securing the data is a burden to a system where the size of the data is not small. For the reason, in some applications where huge data are used for service, service providers do not use any encryption scheme for higher security, which could be a source of trouble. In this work, we introduce a new type of data securing technique named Trapdoor Digital Shredder(TDS) which disintegrates a data to multiple pieces to make it hard to re-construct the original data except the owner of the file who holds some secret keys. The main contribution of the technique is to increase the difficulty in obtaining private information even if an adversary obtains some shredded pieces. To prove the security of our scheme, we first introduce a new security model so called IND-CDA to examine the indistinguishability of shredded pieces. Then, we show that our scheme is secure under IND-CDA model, which implies that an adversary cannot distinguish a subset of shreds of a file from a set of random shreds.

A Plug-in Development for Interworking between SysML Model and Plant Information (SysML모델과 플랜트정보 간 상호연동을 위한 플러그인 개발)

  • Kim, Joon Young;Lee, Tae Kyong;Cha, Jae Min
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.2
    • /
    • pp.17-30
    • /
    • 2019
  • Due to difficulties in tracking design information of existing document-based configuration management, the research on the development of plant SysML model was started to apply the model-based system engineering methodology to comprehensively manage various design information. However, until now, in order to create the SysML model, the engineers are checking the design information and inputting it to the SysML model. This process requires a lot of time and manpower, it is required to minimize it. Therefore, this study has recognized the problem, a plug-in that extracts the plant design information in the design document and automatically converts the SysML plant model from it. Specifically, the development was performed in the following order. First, the extraction file was selected as the most commonly used Excel file as the plant design document. Next, the design information in the document was analyzed, and extracted information including tag number, name, and the capacity were selected. Finally, the plant SysML model conversion module was implemented. The developed plug-in is confirmed that the task load of the engineers by the SysML model conversion can be minimized and the model can be generated more quickly and accurately.

A Comparison of Data Extraction Techniques and an Implementation of Data Extraction Technique using Index DB -S Bank Case- (원천 시스템 환경을 고려한 데이터 추출 방식의 비교 및 Index DB를 이용한 추출 방식의 구현 -ㅅ 은행 사례를 중심으로-)

  • 김기운
    • Korean Management Science Review
    • /
    • v.20 no.2
    • /
    • pp.1-16
    • /
    • 2003
  • Previous research on data extraction and integration for data warehousing has concentrated mainly on the relational DBMS or partly on the object-oriented DBMS. Mostly, it describes issues related with the change data (deltas) capture and the incremental update by using the triggering technique of active database systems. But, little attention has been paid to data extraction approaches from other types of source systems like hierarchical DBMS, etc. and from source systems without triggering capability. This paper argues, from the practical point of view, that we need to consider not only the types of information sources and capabilities of ETT tools but also other factors of source systems such as operational characteristics (i.e., whether they support DBMS log, user log or no log, timestamp), and DBMS characteristics (i.e., whether they have the triggering capability or not, etc), in order to find out appropriate data extraction techniques that could be applied to different source systems. Having applied several different data extraction techniques (e.g., DBMS log, user log, triggering, timestamp-based extraction, file comparison) to S bank's source systems (e.g., IMS, DB2, ORACLE, and SAM file), we discovered that data extraction techniques available in a commercial ETT tool do not completely support data extraction from the DBMS log of IMS system. For such IMS systems, a new date extraction technique is proposed which first creates Index database and then updates the data warehouse using the Index database. We illustrates this technique using an example application.

Designing of On-line Backup System using Snapshot Algorithm and SCSI-Protocol (Snapshot 알고리즘을 이용한 On-line 백업시스템 설계)

  • 김정기;이춘구;박순철
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.177-184
    • /
    • 2002
  • In these day, the storage capacity has been growing and the informations increase in geometrically progression in a modem information age. At present the situation is required that the exchanges and access of the informations is available without regard to time and space. In this paper we present a effective backup systems to backup the information of server that continuously has to be accessible in 365's days. There are two backup cases. one is a file-base backup and the other is a block-based backup. In general, a block-based backup has a good performance than a file-based backup but it is difficult to implement a block-based systems. First, we introduce the technique of backup and methods, on-line backup. Next, we present our backup systems based on client-server model and have a snapshot facility. Finally we introduce SCSI-Protocol in order to increase the data transfer rate.

  • PDF

Design of Trajectory Generator for Performance Evaluation of Navigation Systems

  • Jae Hoon Son;Sang Heon Oh;Dong-Hwan Hwang
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.409-421
    • /
    • 2023
  • In order to develop navigation systems, simulators that provide navigation sensors data are required. A trajectory generator that simulates vehicle motion is needed to generate navigation sensors data in the simulator. In this paper, a trajectory generator for evaluating navigation system performance is proposed. The proposed trajectory generator consists of two parts. The first part obtains parameters from the motion scenario file whereas the second part generates position, velocity, and attitude from the parameters. In the proposed trajectory generator six degrees of freedom, halt, climb, turn, accel turn, spiral, combined, and waypoint motions are given as basic motions with parameters. These motions can be combined to generate complex trajectories of the vehicle. Maximum acceleration and jerk for linear motion and maximum angular acceleration and velocity for rotational motion are considered to generate trajectories. In order to show the usefulness of the proposed trajectory generator, trajectories were generated from motion scenario files and the results were observed. The results show that the proposed trajectory generator can accurately simulate complex vehicle motions that can be used to evaluate navigation system performance.

Effective Routing Schemes for Double-Layered Peer-to-Peer Systems in MANET

  • Kim, Ji-Hoon;Lee, Kwang-Jo;Kim, Taek-Hun;Yang, Sung-Bong
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.19-31
    • /
    • 2011
  • In this paper, we propose two new routing schemes for double-layered peer-to-peer systems; a shorter-lower mobility routing scheme and a reverse path routing scheme. The shorter-lower mobility routing scheme first chooses shortest routing paths among possible routing paths and selects the path associated with the relay peer who has lower mobility to improve the reliability of the system. The reverse path routing scheme carries out unicasting (instead of multicasting) based on the reverse path information that can be obtained during the initial file search to further reduce network traffic. The experimental results showed that a double-layered peer-topeer system with the proposed hybrid scheme improved the reliability of the system about 1.5% over the hop count scheme and reduced network traffic by about 0.5% compared to the hop count scheme.

A Basic Study on the Conversion of Sound into Color Image using both Pitch and Energy

  • Kim, Sung-Ill
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.12 no.2
    • /
    • pp.101-107
    • /
    • 2012
  • This study describes a proposed method of converting an input sound signal into a color image by emulating human synesthetic skills which make it possible to associate an sound source with a specific color image. As a first step of sound-to-image conversion, features such as fundamental frequency(F0) and energy are extracted from an input sound source. Then, a musical scale and an octave can be calculated from F0 signals, so that scale, energy and octave can be converted into three elements of HSI model such hue, saturation and intensity, respectively. Finally, a color image with the BMP file format is created as an output of the process of the HSI-to-RGB conversion. We built a basic system on the basis of the proposed method using a standard C-programming. The simulation results revealed that output color images with the BMP file format created from input sound sources have diverse hues corresponding to the change of the F0 signals, where the hue elements have different intensities depending on octaves with the minimum frequency of 20Hz. Furthermore, output images also have various levels of chroma(or saturation) which is directly converted from the energy.

A Design Methodology and Software Development with Sensitivity Information (민감도 정보를 이용한 설계 방법 및 소프트웨어의 개발)

  • 김용일;이정욱;윤준용;박경진
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.12
    • /
    • pp.2092-2100
    • /
    • 2003
  • Sensitivity information has been used for linearization of nonlinear functions in optimization. Basically, sensitivity is a derivative of a function with respect to a design variable. Design sensitivity is repeatedly calculated in optimization. Since sensitivity calculation is extremely expensive, there are studies to directly use the sensitivity in the design process. When a small design change is required, an engineer makes design changes by considering the sensitivity information. Generally, the current process is performed one-by-one for design variables. Methods to exploit the sensitivity information are developed. When a designer wants to change multiple variables with some relationship, the directional derivative can be utilized. In this case, the first derivative can be calculated. Only small design changes can be made from the first derivatives. Orthogonal arrays can be used for moderate changes of multiple variables. Analysis of Variance is carried out to find out the regional influence of variables. A flow is developed for efficient use of the methods. A software system with the flow has been developed. The system can be easily interfaced with existing commercial systems through a file wrapping technique. The sensitivity information is calculated by finite difference method. Various examples are solved to evaluate the proposed algorithm and the software system.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.