• Title/Summary/Keyword: the pattern of information system use

Search Result 456, Processing Time 0.032 seconds

A Study on the Rotating Displacement Measurement of Rigid Body by ESPI Method (ESPI법에 의한 강체 회전 변위 측정에 관한 연구)

  • 김경석;홍명석
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.1 no.2
    • /
    • pp.125-133
    • /
    • 1993
  • Electronic Speckle Pattern Interferometry(ESPI) using a CW laser, a video system and image processor was applied to the rotating displacement of rigid body. ESPI require no special surface preparation or attachments and displacements between any two arbitrary points on the surface can be measured. The characteristic speckle pattern formed when imaging a scattering surface illuminated by laser light retains phase information, which can be used for interferometric measurement of surface displacement. The application of this principle to measuring in-plane displacement resolved in one direction is described, together with the novel use of television equipment to detect and process the information contained in the speckle pattern. This is faster, and more convenient and versatile than customary photographic methods.

  • PDF

The Integrated Cyber SRM(Security Risk Monitoring) System Based on the Patterns of Cyber Security Charts

  • Lee, Gang-Soo;Jung, Hyun Mi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.99-107
    • /
    • 2019
  • The "Risk management" and "Security monitoring" activities for cyber security are deeply correlated in that they prepare for future security threats and minimize security incidents. In addition, it is effective to apply a pattern model that visually demonstrates to an administrator the threat to that information asset in both the risk management and the security system areas. Validated pattern models have long-standing "control chart" models in the traditional quality control sector, but lack the use of information systems in cyber risk management and security systems. In this paper, a cyber Security Risk Monitoring (SRM) system that integrates risk management and a security system was designed. The SRM presents a strategy for applying 'security control' using the pattern of 'control charts'. The security measures were integrated with the existing set of standardized security measures, ISMS, NIST SP 800-53 and CC. Using this information, we analyzed the warning trends of the cyber crisis in Korea for four years from 2014 to 2018 and this enables us to establish more flexible security measures in the future.

An Implementation of Presentation System using Image Processing (영상처리를 이용한 프리젠테이션 시스템의 구현)

  • 이후성;양훈기
    • Proceedings of the IEEK Conference
    • /
    • 2000.06d
    • /
    • pp.155-158
    • /
    • 2000
  • In this paper, we propose a Windows-based presentation system using laser pointer mouse. Major-characteristics of this system is to synchronize the laser pointing position with the PC cursor such that the laser can function as not only pointer, but also a PC mouse. It is shown that we use a special pattern to coincide the coordinate of the camera capture image with that of the pc window. We finally show its feasibility by some experiments with the implemented system.

  • PDF

AHP Usage Pattern As a GDSS Toward the Various Task Types: IS Theory Testing (다양한 문제형태에 대한 AHP의 GDSS사용특성: IS이론을 중심으로)

  • 손달호
    • Korean Management Science Review
    • /
    • v.13 no.3
    • /
    • pp.115-128
    • /
    • 1996
  • System usage, the utilization of information technology(IT) by individuals, groups or organizations, is a core variable in IS research. Indeed, there is widespread agreement among researchers that system usage is the primary variable through which IT affects white collar performance because it is a requisite, albeit insufficient, for deriving the benefits of IT. Furthermore, system usage has a notable practical value for managers interested in evaluating the impact of IT. Despite the number of studies of targeted at explaining system usage, there are more areas which required for the verification of system usage. The purpose of this paper is to address, using the Technological Acceptance Model (TAM), the usage pattern of AHP toward the various task in group decision (GD). The result showed that, for the all of the task types, perceived usage (PU) has more effect than perceived ease-of-use(PEU) on the AHP usage. However, more researches are required to generalize the result of this study.

  • PDF

Clock Recovery Method for DWMT VDSL (DWMT VDSL을 위한 클럭 복원방식)

  • 문인수;정항근
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.81-85
    • /
    • 1999
  • DWMT VDSL system needs A/D converter clock, bit clock, symbol clock, frame clock, etc. DMT ADSL system utilizes a correlation method which makes use of cyclic prefix or preamble pattern for clock recovery. But the correlation method is difficult to apply to the DWMT system because modulated symbols are overlapped in the time domain. This paper proposes a novel clock recovery method which can be used for the DWMT system due to its inherent independence of the modulation method. This new method is verified by SPICE simulations.

  • PDF

A Study on the Dielectric Degradation Using Partial Discharge System (부분방전 시스템을 이용한 절연 열화에 관한 연구)

  • 김성홍;이우상;정재용
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.1
    • /
    • pp.1-6
    • /
    • 1998
  • Our studies diagnose insulation degradation using the method of PD system. In analysis method of degradation, we make use of degradation information that analyzed the phase angle - PD pulse amplitude - degradation time( $\Phi$- PDA - t) pattern and phase angle- PD pulse number - degradation time( $\Phi$- PDN - t) pattern using statistical operators such as skewness(S), kurtosis(K). Secondly using statically operator such as the center of gravity (G), the gradient of the discharge distribution(C), we have analyzed for the prediction of life which we can be obtained the time, occurred of many pulse of small discharge amplitude.

  • PDF

GripLaunch: a Novel Sensor-Based Mobile User Interface with Touch Sensing Housing

  • Chang, Wook;Park, Joon-Ah;Lee, Hyun-Jeong;Cho, Joon-Kee;Soh, Byung-Seok;Shim, Jung-Hyun;Yang, Gyung-Hye;Cho, Sung-Jung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.4
    • /
    • pp.304-313
    • /
    • 2006
  • This paper describes a novel way of applying capacitive sensing technology to a mobile user interface. The key idea is to use grip-pattern, which is naturally produced when a user tries to use the mobile device, as a clue to determine an application to be launched. To this end, a capacitive touch sensing system is carefully designed and installed underneath the housing of the mobile device to capture the information of the user's grip-pattern. The captured data is then recognized by dedicated recognition algorithms. The feasibility of the proposed user interface system is thoroughly evaluated with various recognition tests.

An Improved Signature Hashing-based Pattern Matching for High Performance IPS (고성능 침입방지 시스템을 위해 개선한 시그니처 해싱 기반 패턴 매칭 기법)

  • Lee, Young-Sil;Kim, Nack-Hyun;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.434-437
    • /
    • 2010
  • NIPS(Network Intrusion Prevention System) is in line at the end of the external and internal networks which performed two kinds of action: Signature-based filtering and anomaly detection and prevention-based on self-learning. Among them, a signature-based filtering is well known to defend against attacks. By using signature-based filtering, intrusion prevention system passing a payload of packets is compared with attack patterns which are signature. If match, the packet is discard. However, when there is packet delay, it will increase the required pattern matching time as the number of signature is increasing whenever there is delay occur. Therefore, to ensure the performance of IPS, we needed more efficient pattern matching algorithm for high-performance ISP. To improve the performance of pattern matching the most important part is to reduce the number of comparisons signature rules and the packet whenever the packets arrive. In this paper, we propose an improve signature hashing-based pattern matching method. We use tuple pruning algorithm with Bloom filters, which effectively remove unnecessary tuples. Unlike other existing signature hashing-based IPS, our proposed method to improve the performance of IPS.

  • PDF

A Model-Based Method for Information Alignment: A Case Study on Educational Standards

  • Choi, Namyoun;Song, Il-Yeol;Zhu, Yongjun
    • Journal of Computing Science and Engineering
    • /
    • v.10 no.3
    • /
    • pp.85-94
    • /
    • 2016
  • We propose a model-based method for information alignment using educational standards as a case study. Discrepancies and inconsistencies in educational standards across different states/cities hinder the retrieval and sharing of educational resources. Unlike existing educational standards alignment systems that only give binary judgments (either "aligned" or "not-aligned"), our proposed system classifies each pair of educational standard statements in one of seven levels of alignments: Strongly Fully-aligned, Weakly Fully-aligned, Partially-$aligned^{***}$, Partially-$aligned^{**}$, Partially-$aligned^*$, Poorly-aligned, and Not-aligned. Such a 7-level categorization extends the notion of binary alignment and provides a finer-grained system for comparing educational standards that can broaden categories of resource discovery and retrieval. This study continues our previous use of mathematics education as a domain, because of its generally unambiguous concepts. We adopt a materialization pattern (MP) model developed in our earlier work to represent each standard statement as a verb-phrase graph and a noun-phrase graph; we align a pair of statements using graph matching based on Bloom's Taxonomy, WordNet, and taxonomy of mathematics concepts. Our experiments on data sets of mathematics educational standards show that our proposed system can provide alignment results with a high degree of agreement with domain expert's judgments.

An Architectural Pattern Recommendation Method Based on a Quality-Attributes Trade-off Analysis (품질속성의 트레이드오프 분석을 통한 아키텍처 패턴 추천 방법)

  • Park, Hyeon-ju;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.148-162
    • /
    • 2017
  • Recently, the accomplishment of a system's quality attributes requires the negotiation of increasingly complex requirements, and this is because the contextual and developmental environments in which software is used has undergone broad changes. Nevertheless, with regard to most architectural designs, many of the proportions depend on the architect's intuition. Moreover, even if reusable architectural patterns are adapted to an architectural design, common schemas for the description of their use are nonexistent, and it is difficult to make a comparison for the selection of an appropriate systemic pattern because the focus of the schemas is not the user's perspective. To achieve a fast initial-design decision, this paper suggests new schemas that reduce the distance between the quality attribute requirements and the design by reinterpreting architectural patterns from the user's perspective. Also, based on the reconstructed pattern model that is derived from the use of the new schemas, an architectural-pattern recommendation method (APOQATo) for which the trade-off and the constraints that are due to the design decision are considered is provided as well as the advantages of the architectural pattern for which the quality attributes are satisfied.