• Title/Summary/Keyword: shared space

Search Result 339, Processing Time 0.031 seconds

Implementation of Temporal Relationship Macros for History Management in SDE (SDE에서 이력 관리를 위한 시간관계 매크로의 구현)

  • Lee, Jong-Yeon;Ryu, Geun-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.553-563
    • /
    • 1999
  • The Spatial Database Engine(SDETM) developed by Environmental Systems Research Institute, Inc. is a spatial database that employs a client-server architecture incorporated with a set of software services to perform efficient spatial operations and to manage large, shared and geographic data sets. It currently supports a wide variety of spatial search methods and spatial relationships determined dynamically. Spatial objects in the space world can be changed by either non-spatial operations or spatial operations. Conventional geographical information systems(GISs) did not manage their historical information, however, because they handle the snapshot images of spatial objects in the world. In this paper we propose a spatio-temporal data model and an algorithm for temporal relationship macro which is able to manage and retrieve the historical information of spatial objects. The proposed spatio-temporal data model and its operations can be used as a software tool for history management of time-varying objects in database without any change.

An Efficient Recovery Technique using Global Buffer on SAN Environments (SAN 환경에서의 전역 버퍼를 이용한 효율적인 회복 기법)

  • Park, Chun-Seo;Kim, Gyeong-Bae;Lee, Yong-Ju;Park, Seon-Yeong;Sin, Beom-Ju
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.375-384
    • /
    • 2001
  • The shared disk file systems use a technique known as file system journaling to support recovery of metadata on the SAN(Storage Area Network). In the existing journaling technique, the metadata that is dirtied by one host must be updated to disk space before some hosts access it. The system performance is decreased because the disk access number is increased. In this paper, we describe a new recovery technique using a global buffer to decrease disk I/O. It transmits the dirtied metadata into the other hosts through Fibre Channel network on the SAN instead of disk I/O and supports recovery of a critical data by journaling a data as well as metadata.

  • PDF

A Dynamic Event Filtering Technique using Multi-Level Path Sampling in a Shared Virtual Environment (공유가상공간에서 다중경로샘플링을 이용한 동적 이벤트 필터링 기법)

  • Yu, Seok-Jong;Choe, Yun-Cheol;Go, Gyeon
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.11
    • /
    • pp.1306-1313
    • /
    • 1999
  • 본 연구는 인터넷 기반 공유가상공간에서 시스템의 확장성을 유지하기 위하여 이동객체를 대상으로 하는 이벤트 필터링 기법을 제안하고자 한다. 제안된 다중격자 모델 기법은 이동객체의 경로 상에서 대표적인 이벤트를 샘플링하는 방식을 사용한다. 이 방식은 메시지 트래픽의 양을 동적으로 조절하기 위하여 이동객체 간의 관심정도 정보를 수치적으로 변환하여 이벤트 갱신빈도에 반영한다. 대량의 이동객체를 생성하여 제안된 기법을 적용한 성능평가 실험에서 기존의 방식에 비하여 평균 메시지 전송량이 50%이상 감소하는 것으로 확인할 수 있었다. 다중격자 모델은 참여자의 수와 메시지 트래픽 상황에 따라 가상환경의 공유 QoS를 동적으로 조절할 수 있으며, 인터넷 상에서 다수 사용자를 위한 3차원 가상사회 구축 및 온라인 네트워크 게임 개발 등에 활용될 수 있을 것이다.Abstract This paper proposes an event filtering technique that can dynamically control a large amount of event messages produced by moving objects like avatars or autonomous objects in a distributed virtual environment. The proposed multi-level grid model technique uses the method that extracts the representative events from the paths of moving objects. For dynamic control of message traffics, this technique digitizes the DOIs of the avatars and reflects the interest information controlling the frequency of message transmission. For the performance evaluation, a large number of moving objects were created and the model was applied to these avatar groups. In the experiments, more than 50% of messages have been reduced in comparison with the existing AOI-based filtering techniques. The proposed technique can dynamically control the QoS in proportion to the number of users and the amount of messages where a large number of users share a virtual space. This model can be applied to the development of 3D collaborative virtual societies and multi-user online games in the Internet.

A study on the Residential Satisfaction of Environmental Condition for Housing Complexes located in Coastal Areas (연안역에 입지하는 주거단지 생활자의 거주환경 만족도에 관한 연구)

  • Lee, Myung-Kwon
    • Journal of Navigation and Port Research
    • /
    • v.32 no.6
    • /
    • pp.505-513
    • /
    • 2008
  • Regarding the developmental plans for the coastal areas and marine architectures, this study deal with the overall planning of apartment complexes in waterfront areas, focusing upon the analysis of their comfort and convenience factors from the perspective of the potential residence. It also analysis the intra-complex comfort and satisfaction conditions in terms of their floor-by-floor, directional. and location factors. The results of the study are as follows: 1) The order of respondents' preference on directional factor has been found to be: South > Southeast > Southwest > East > others. 2) 67% of the people surveyed on scenery responded that outward view is considered more significant than the directional factor. 3) A comprehensive analysis of floor zone-specific view preference shared that there were only minor differences among quay wall, arc, and river-seashore types. The impact of the characteristics of the marine environments turned out to be a greater point of consideration; showing that the other of floor-preference is: high-level > ultra-high level > middle level > low level.

Research on the Use of Logistics Centers in Idle site on Highway Using Social Network Analysis (사회연결망 분석을 활용한 고속도로 유휴부지의 물류센터 활용 방안에 관한 연구)

  • Gong, InTaek;Shin, KwangSup
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • The rapid growth of mobile-based online shopping and the appearance of untact business initiated by COVID-19 has led to an explosive increase in demand for logistics services such as delivery services. In order to respond to the rapidly growing demand, most logistics and distribution companies are working to improve customer service levels through the establishment of a full-filament center in the city center. However, due to social factors such as high land prices and traffic congestion, it becomes more difficult to establish the logistics facilities in the city center. In this study, it has been proposed the way to choose the candidate locations for the shared distribution centers among the space nearby the tall-gate which can be idle after the smart tolling service is widely extended. In order to evaluate the candidate locations, it has been evaluated the centralities of all candidates using social network analysis (SNA). To understand the result considering the characteristics of centrality, the network structure was regenerated based on the distance and the traveling time, respectively. It is possible to refer the result of evaluation based on the cumulative relative importance to choose the best set of candidates.

KOMPSAT Imagery Applications (다목적실용위성 영상 활용)

  • Lee, Kwang-Jae;Oh, Kwan-Young;Lee, Won-Jin;Lee, Sun-Gu
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.6_3
    • /
    • pp.1923-1929
    • /
    • 2021
  • Earth observation satellites are being used in various field and are being developed in many countries due to their high utility and marketability. Korea is developing various Earth observation satellites according to National Space Development Plan. Among them, the Korea Multi-Purpose Satellite(KOMPSAT) series is the most representative low-orbit satellite. So far, a total of five KOMPSAT have been launched to meet the national image demand and have been used in various fields, including national institutions. This special issue introduces research related to data processing, analysis, and utilization using various image data from the KOMPSAT series. Meanwhile, for the uninterrupted utilization of the subsequent KOMPSAT image data, data processing and utilization research suitable for high-resolution images must be continued, and related research contents will be continuously shared through a special issue.

The Stakeholder Interview of Participatory Digital Archives for Social Memory (사회적 기억을 위한 참여형 디지털 아카이브 이해관계자 면담 연구)

  • Park, Jinkyung;Kim, You-seung
    • The Korean Journal of Archival Studies
    • /
    • no.54
    • /
    • pp.249-287
    • /
    • 2017
  • This study discusses the theoretical analysis of the concept of social memory and participatory digital archives, and argues the various problems of participatory digital archives based on the analysis of individual experiences and perceptions through interviews with stakeholders including users and operators. As a theoretical study, it analyzes related precedent studies and explores the complementary concepts of social memory and participatory digital archives. Based on the discussion, the study understands social memory as a defined and generated memory through the interaction of the social environment encompassing politics, socio-culture and the internal relations of the community. Furthermore, it understands the participatory digital archive as a digital space in which the community, the voluntary participation of users, and the support of professional groups intertwine. The memories and records of this interaction are then stored, preserved, shared, spread, and reproduced. Through stakeholder interviews, the study analyzes the perceptions of users and operators regarding participation, policy, and service, and identified the various problems with participatory digital archives.

Direction of Designer-makers Business Activation through Strategic Design Support Policy-Focusing on 'Young man's Creative Work & Startup Support Project' (전략적 디자인 지원정책을 통한 디자이너-메이커스 비즈니스 활성화 방향 -청년 창의인력 취·창업지원사업을 중심으로-)

  • Park, Jun-Hong;Jeon, Young-Ok
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.291-298
    • /
    • 2019
  • This study discusses the core contents and implications of the design support policy of government in the creation of the designer-makers' business ecosystem through the analysis of 'Young man's Creative Work & Startup Support Project'. This case, which aims to cultivate a design brand based on maker technology and to create jobs for young people, suggests the role of government as a creative culture creator so that designer-makers are able to create creative activities in a more free and creative atmosphere. Furthermore, this study emphasizes the importance of efficient integration and reorganization of similar maker support policies implemented by each government department, the necessity of a roadmap for realizing this, and the support for quality improvement. As a result, the design support policy of government for the designer-makers' business activation should evolve into the qualitative development of intellectual property based on a mature shared culture and the discovery of a new production paradigm model of the manufacturing industry based on the open manufacturers beyond the economic and numerical goals of creating new jobs.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Design of AES-Based Encryption Chip for IoT Security (IoT 보안을 위한 AES 기반의 암호화칩 설계)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • The paper proposes the design of AES-based encryption chip for IoT security. ROM based S-Box implementation occurs a number of memory space and some delay problems for its access. In this approach, S-Box is designed by pipeline structure on composite field GF((22)2) to get faster calculation results. In addition, in order to achieve both higher throughput and less delay, shared S-Box are used in each round transformation and the key scheduling process. The proposed AES crypto-processor is described in Veilog-HDL, and Xilinx ISE 14.7 tool is used for logic synthesis by using Xilinx XC6VLX75T FPGA. In order to perform the verification of the crypto-processor, the timing simulator(ModelSim 10.3) is also used.