• Title/Summary/Keyword: software process

Search Result 4,760, Processing Time 0.035 seconds

A Software Method for Improving the Performance of Real-time Rendering of 3D Games (3D 게임의 실시간 렌더링 속도 향상을 위한 소프트웨어적 기법)

  • Whang, Suk-Min;Sung, Mee-Young;You, Yong-Hee;Kim, Nam-Joong
    • Journal of Korea Game Society
    • /
    • v.6 no.4
    • /
    • pp.55-61
    • /
    • 2006
  • Graphics rendering pipeline (application, geometry, and rasterizer) is the core of real-time graphics which is the most important functionality for computer games. Usually this rendering process is completed by both the CPU and the GPU, and a bottleneck can be located either in the CPU or the GPU. This paper focuses on reducing the bottleneck between the CPU and the GPU. We are proposing a method for improving the performance of parallel processing for real-time graphics rendering by separating the CPU operations (usually performed using a thread) into two parts: pure CPU operations and operations related to the GPU, and let them operate in parallel. This allows for maximizing the parallelism in processing the communication between the CPU and the GPU. Some experiments lead us to confirm that our method proposed in this paper can allow for faster graphics rendering. In addition to our method of using a dedicated thread for GPU related operations, we are also proposing an algorithm for balancing the graphics pipeline using the idle time due to the bottleneck. We have implemented the two methods proposed in this paper in our networked 3D game engine and verified that our methods are effective in real systems.

  • PDF

A Study on the Architecture Modeling of Information System using Simulation (시뮬레이션을 이용한 정보시스템 아키텍쳐 모델링에 관한 연구)

  • Park, Sang-Kook;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.455-458
    • /
    • 2013
  • The conventional design of the information system architecture based on the personal experience of information systems has been acted as a limit in progress utilizing appropriate resource allocation and performance improvements. Architecture design depending on personal experience makes differences in variance of a designer's experience, intellectual level in related tasks and surroundings, and architecture quality according to individual's propensity. After all these problems cause a waste of expensive hardware resources. At working place, post-monitoring tools are diversely developed and are running to find the bottleneck and the process problems in the information operation. However, there are no simulation tools or models that are used for expecting and counteracting the problems at early period of designing architecture. To solve these problems we will first develop a simulation model for designing information system architecture in a pilot form, and will verify validity. If an error rate is found in the permissible range, then it can be said that the simulation reflects the characteristic of information system architecture. After the model is developed in a level that can be used in various ways, more accurate performance computation will be able to do, getting out of the old way relying on calculations, and prevent the existence of idle resources and expense waste that comes from the wrong design of architecture.

  • PDF

Derivation of Data Quality Attributes and their Priorities Based on Customer Requirements (고객의 요구사항에 기반한 데이터품질 평가속성 및 우선순위 도출)

  • Jang, Kyoung-Ae;Kim, Ja-Hee;Kim, Woo Je
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.12
    • /
    • pp.549-560
    • /
    • 2015
  • There is a wide variety of data quality attributes such as the ones proposed by the ISO/IEC organization and also by many other domestic and international institutions. However, it takes considerable time and costs to apply those criteria and guidelines to real environment. Therefore, it needs to define data quality evaluation attributes which are easily applicable and are not influenced by organizational environment limitations. The purpose of this paper is to derive data quality attributes and order of their priorities based on customer requirements for managing the process systematically and evaluating the data quantitatively. This study identifies the customer cognitive constructs of data quality attributes using the RGT(Repertory Grid Technique) based on a Korean quality standard model (DQC-M). Also the correlation analysis on the identified constructs is conducted, and the evaluation attributes is prioritized and ranked using the AHP. As the results of this paper, the consistent system, the accurate data, the efficient environment, the flexible management, and the continuous improvement are derived at the first level of the data quality evaluation attributes. Also, Control Compliance(13%), Regulatory Compliance(10%), Requirement Completeness(9.6%), Accuracy(8.4%), and Traceability(6.8%) are ranked on the top 5 of the 19 attributes in the second level.

An Efficient Top-k Query Processing Algorithm over Encrypted Outsourced-Data in the Cloud (아웃소싱 암호화 데이터에 대한 효율적인 Top-k 질의 처리 알고리즘)

  • Kim, Jong Wook;Suh, Young-Kyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.12
    • /
    • pp.543-548
    • /
    • 2015
  • Recently top-k query processing has been extremely important along with the explosion of data produced by a variety of applications. Top-k queries return the best k results ordered by a user-provided monotone scoring function. As cloud computing service has been getting more popular than ever, a hot attention has been paid to cloud-based data outsourcing in which clients' data are stored and managed by the cloud. The cloud-based data outsourcing, though, exposes a critical secuity concern of sensitive data, resulting in the misuse of unauthorized users. Hence it is essential to encrypt sensitive data before outsourcing the data to the cloud. However, there has been little attention to efficient top-k processing on the encrypted cloud data. In this paper we propose a novel top-k processing algorithm that can efficiently process a large amount of encrypted data in the cloud. The main idea of the algorithm is to prune unpromising intermediate results at the early phase without decrypting the encrypted data by leveraging an order-preserving encrypted technique. Experiment results show that the proposed top-k processing algorithm significantly reduces the overhead of client systems from 10X to 10000X.

An RDB to RDF Mapping System Considering Semantic Relations of RDB Components (관계형 데이터베이스 구성 요소의 의미 관계를 고려한 RDB to RDF 매핑 시스템)

  • Sung, Hajung;Gim, Jangwon;Lee, Sukhoon;Baik, Doo-Kwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.1
    • /
    • pp.19-30
    • /
    • 2014
  • For the expansion of the Semantic Web, studies in converting the data stored in the relational database into the ontology are actively in process. Such studies mainly use an RDB to RDF mapping model, the model to map relational database components to RDF components. However, pre-proposed mapping models have got different expression modes and these damage the accessibility and reusability of the users. As a consequence, the necessity of the standardized mapping language was raised and the W3C suggested the R2RML as the standard mapping language for the RDB to RDF model. The R2RML has a characteristic that converts only the relational database schema data to RDF. For the same reasons above, the ontology about the relation data between table name and column name of the relational database cannot be added. In this paper, we propose an RDB to RDF mapping system considering semantic relations of RDB components in order to solve the above issue. The proposed system generates the mapping data by adding the RDFS attribute data into the schema data defined by the R2RML in the relational database. This mapping data converts the data stored in the relational database into RDF which includes the RDFS attribute data. In this paper, we implement the proposed system as a Java-based prototype, perform the experiment which converts the data stored in the relational database into RDF for the comparison evaluation purpose and compare the results against D2RQ, RDBToOnto and Morph. The proposed system expresses semantic relations which has richer converted ontology than any other studies and shows the best performance in data conversion time.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

The Effect of Job Stress and Self-Efficacy on the Turnover Intention of Disability Assistance Workers:Focusing on the Mediating Effect of Job Engagement (장애인활동지원사의 직무스트레스와 자기효능감이 이직의도에 미치는 영향 연구: 직무몰입 매개효과)

  • Shin, Jun-Ok
    • Journal of Industrial Convergence
    • /
    • v.18 no.2
    • /
    • pp.59-67
    • /
    • 2020
  • This study aims to contribute to overcoming difficulties that disability assistance workers experience by verifying the effect of job stress and self-efficacy on their turnover intentions, and whether job engagement has a mediating effect in the process. For this purpose, a survey was performed on 290 disability assistance workers associated with disability support organizations in the Seoul and Gyeonggi area during the period of 2019.5.1.-2019.6.30. The collected survey data was analyzed with the SPSS 24.0 statistical software, the results of which are as follows. First, job stress and self-efficacy appears to affect job engagement. High levels of conflict and maladjustment in the workplace had adverse effects on job engagement, while high levels of emotional, evaluative, and informational support had positive effects. Second, job stress and self-efficacy also had an effect on turnover intentions. High levels of conflict, instability, and maladjustment in the workplace led to a higher level of turnover intentions. Third, job engagement had a mediating effect between job stress and turnover intentions. Fourth, job engagement had no mediating effect between self-efficacy and turnover intentions. These results serve to propose practical measures to reduce the job stress and improve the job engagement of disability assistance workers.

A Study on the Systematic Integration of WASP5 Water Quality Model with a GIS (GIS와 WASP5 수질모델의 유기적 통합에 관한 연구)

  • 최성규;김계현
    • Spatial Information Research
    • /
    • v.9 no.2
    • /
    • pp.291-307
    • /
    • 2001
  • In today's environmental engineering practice, many technologies such as GIS have been adopted to analyze chemical and biological process in water bodies and pollutants movements on the land surface. However, the linkage between spatially represented land surface pollutants and the in-stream processes has been relatively weak. This lack of continuity needs to develop a method in order to link the spatially-based pollutant source characterization with the water quality modeling. The objective of this thesis was to develop a two-way(forward and backward) link between ArcView GIS software and the USEPA water quality model, WASP5. This thesis includes a literature review, the determination of the point source and non-point source loadings from WASP5 modeling, and the linkage of a GIS with WASP5 model. The GIS and model linkage includes pre-processing of the input data within a GIS to provide necessary information for running a model in the forms of external input files. The model results has been post-processed and stored in the GIS database to be reviewed in a user defined form such as a chart, or a table. The interface developed from this study would provide efficient environment to support the easier decision making form water quality management.

  • PDF

Integrated Authentication and Key Management Method among Heterogeneous Wireless Mobile Networks (이기종 무선 이동망간 통합 인증 및 키관리 기법)

  • Park Hyung-Soo;Lee Hyung-Woo;Lee Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.50-59
    • /
    • 2006
  • The new communication paradigm is rapidly shifted from wireless mobile networks to an All-IP(Internet Protocol) network, led by service industry leaders and communication manufacturers. In this paradigm, providing authentication and session keys of a subscriber becomes one of the critical tasks because of IP open accessibility among heterogeneous networks. In this paper, we introduce authentication process procedure of heterogeneous wireless mobile networks and develop so-called IMAS(Integrated Mobile Authentication Server) which can securely inter-work among all mobile networks and support the legacy networks with backward compatibility. Especially, in designing IMAS, mobile authentication inter-working mechanism, key management technique, and other issues to be overcome are presented. We analyze and evaluate the performance of authentication algorithm which creates session key. A simulation environment of IMAS is established, and a performance(TPS; Transaction Per Second) result is analyzed and evaluated. It turned out that IMAS works among heterogeneous wireless mobile networks without compensating efficiency and functionalities of the legacy networks and decrease the entropy of data redundancy and data inconsistency among networks because of the integrity of the distributed Data Base(DB).

Comparative esthetic evaluation of anterior zone with immediate, early, and delay implantation (전치부 영역 임플란트의 식립 시기에 따른 심미적 평가)

  • Kim, Jung-Hwa;Seo, Seong-Yong;Kim, Na-Hong;Yu, Jung-Hyun;Lee, Dong -Woon
    • Journal of the Korean Academy of Esthetic Dentistry
    • /
    • v.26 no.1
    • /
    • pp.17-23
    • /
    • 2017
  • Purpose: This retrospective study is to evaluate whether the timing of implant placement and the result of esthetic outcomes are related. Materials and Methods: Among the patients who had undergone single implant surgery on anterior area from 2010 to 2013 in Veterans Health Service Medical Center, 34 implants in 27 patients (24 male and 3 female) were selected and categorized into 3 groups according to the timing of placement, which are group D (Delay), group E (Early) and group I (Immediate). Aesthetic indices used included the Pink Esthetic Score (PES). It has 7 variables scores, such as mesial papilla, distal papilla, a level of soft-tissue margin, soft-tissue contour, alveolar process, soft-tissue color, and soft-tissue texture. Each variable ranges from 0 to 2, therefore total 14 points are highest. All patients were received by regular follow-up at least 1-year. One examiner measured PES on the intraoral photos. Each patient was considered as a statistical unit for statistical analysis. Statistical analyses were performed using a commercially available statistical software (SPSS Statistics 21.0, IBM Corp., Armonk, NY, USA). Kruskal-Wallis test was used for inter-group comparisons. Statistical significance was set at P<0.05. Result: Mean score in Group D, Group I, and Group E were $11.5{\pm}1.5$, $11.4{\pm}1.8$, and $11.3{\pm}1.8$ respectively. In Kruskal-Wallis test, there are no differences (P=0.989). Conclusion: In this limited study suggests that clinical aesthetic results can be achieved with all treatment protocols. Finally, various factors can be considered to produce the esthetic results.