• Title/Summary/Keyword: windows NT

Search Result 113, Processing Time 0.026 seconds

An Implementation of VoiceXML Test Environment Using IIS (IIS를 이용한 VoiceXML 실험 환경 구현)

  • Kwon, Hyung-Joon;Kim, Jung-Hyun;Hong, Kwang-Seok
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2006.06a
    • /
    • pp.73-76
    • /
    • 2006
  • 유비쿼터스 컴퓨팅에서 중요한 기술 중 하나로 평가되는 음성인식 및 합성기술은 인간과 컴퓨터의 상호 작용에 있어 가장 편리하고 보편적인 방법이다. 음성인식 및 합성기술을 이용한 인간과 컴퓨터 상호작용 기반의 애플리케이션의 개발을 위해 음성 확장성 생성 언어(VoiceXML)을 이용하면 음성 인식 및 합성에 관한 전문 지식이 없어도 애플리케이션 제작을 쉽게 할 수 있다는 장점이 있어서 음성인식 및 합성기술의 인프라 구축과 저변 확대를 목적으로 일부 국내 업체들은 VoiceXML을 이용한 음성 애플리케이션을 제작하고 실험할 수 있도록 VoiceXML 실험 환경을 제공한다. 본 논문에서는 기존에 공개된 실험 환경을 소개하고, 다양한 실험 환경 제공을 위해 기존에 있던 Linux기반의 실험 환경과는 다른 Windows NT기반의 IIS(Internet Information Service)를 이용한 VoiceXML실험 환경을 제안하고 구현하였다. 그 결과 ASP(Active Server Page)와 ADO(ActiveX Data Object)를 이용한 VoiceXML음성 애플리케이션 실험이 가능한 환경을 구축하였고, 사용자 평가 결과 제안한 방법이 유효하다는 것을 확인하였다.

  • PDF

A Model Management Framework for Supporting Departmental Collaborative Work (부서간 협동적 작업을 지원하는 모형관리 체계의 개발)

  • Huh, Soon-Young;Kim, Hyung-Min
    • Asia pacific journal of information systems
    • /
    • v.10 no.2
    • /
    • pp.51-69
    • /
    • 2000
  • Recently, as business problems become more complicated and require more precise quantitative results, large-scale model management systems are increasingly in demand for supporting the decision-making activities. In addition, as distributed computing over networks gains popularity, departmental computing systems are gradually adopted in an organization to facilitate collaboration of geographically dispersed multiple departments. In departmental collaborative model management systems, multiple departments share common models but approach them with different user-views depending on their departmental needs. Moreover, the shared models become evolved as their structures and the corresponding data sets change due to the dynamic nature of the operating environment and the inherent uncertainty associated with the problems. In such capacity, providing the multiple departmental users with synchronized and consistent views of the models is important to improve the overall productivity. In this paper, we propose a collaborative model management framework for coordinating model change and automatic user-view update in a departmental computing environment. To do so, we describes changes in the model and their effects occurred in departmental model management environments and identifies the constructs and processes for maintaining the consistency between a shared model and its departmental user-views. Especially, in this framework, generic model concept was adopted for accommodating diverse mathematical models in a uniform way in a modelbase and object-oriented database management systems(ODBMS) for combining the model management constructs and automatic user-view update mechanisms in a single formalism. A prototype object-oriented modeling environment was developed using an ODBMS called ObjectStore and $C^{++}$ programming language on Windows NT.

  • PDF

Trust Measurement Using Fuzzy Theory and Trade Protocol Recommendation Based on Trust Level in Trusted Auction System (신뢰 기반 경매 시스템에서의 퍼지를 이용한 신뢰도 측정과 신뢰도에 따른 거래 방식 추천)

  • 양근우;허순영
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.2
    • /
    • pp.17-33
    • /
    • 2003
  • The explosive growth of the internet-based transactions requires not only a secure payment system but also an appropriate trust measuring methodology and secure transaction protocols to guarantee the minimal risk for the transacting entities involved in specific transactions. Especially, in internet auction systems where either buyers or sellers or both can be more than one in one transaction, providing those systems that make sure no one transacting entity takes a major risk becomes critical. In this paper, an improved trust measuring method using a relationship-based internet community for an auction system is proposed. The proposed system incorporates fuzzy set and calculation concepts to help build trust matrices and models, which is used to measure the level of risk involved in a specific auction trade concerned. Also, to optimize the auction trade process in terms of cost and time, the proposed system recommends a differentiated trade protocol according to the risk level involved in each auction trade. To test the appropriateness of the proposed trusted auction system, a prototype system has been developed under a Windows-NT environment.

An Experimental Delay Analysis Based on M/G/1-Vacation Queues for Local Audio/Video Streams

  • Kim, Doo-Hyun;Lee, Kyung-Hee;Kung, Sang-Hwan;Kim, Jin-Hyung
    • ETRI Journal
    • /
    • v.19 no.4
    • /
    • pp.344-362
    • /
    • 1997
  • The delay which is one of the quality of service parameters is considered to be a crucial factor for the effective usage of real-time audio and video streams in interactive multimedia collaborations. Among the various causes of the delay, we focus in this paper on the local delay concerned with the schemes which handle continuous inflow of encoded data from constant or variable bit-rate audio and video encoders. We introduce two kinds of implementation approaches, pull model and push model. While the pull model periodically pumps out the incoming data from the system buffer, the push model receives events from the device drivers. From our experiments based on Windows NT 3.51, it is shown that the push model outperforms the other for both constant and variable bit-rate streams in terms of the local delay, when the system suffers reasonable loads. We interpret this experimental data with M/G/1 multiple vacation queuing theories, and show that it is consistent with the queuing theoretic interpretations.

  • PDF

The Implement of 2-Step Motion Control Loop and Look Ahead Algorithm for a High Speed Machining (고속가공을 위한 2단계 모션 제어 루프와 선독 알고리즘의 구현)

  • 이철수;이제필
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.9 no.6
    • /
    • pp.71-81
    • /
    • 2000
  • This paper describers a look ahead algorithm of PC-NC(personal computer numerical control). The algorithm is based on acceleration/deceleration before interpolation which doesn\`t include a command error and determines a feedrate value at the end point of each block(or start point of each block). The algorithm is represented as following; 1) calculating two maximum arrival feedrates(F$_1$,F$_2$) by an acceleration value, a command feedrate, and the distance of a NC block, 2) getting a tangent feedrate (F$_3$) of the adjacent blocks, 3) choosing a minimum value among these three feedrates, and 4) setting the value to a feedrate of a start point of the next block(or a end point of the previous block). The proposed look ahead algorithm was implemented and tested by using a commercial TROS(real time operation system) on the MS-Windows NT 4.0 in a PC platform. For interfacing to a machine, a counter board, a DAC board and a DIO board were used. The result of the algorithm increased a machining precision and a machining speed in many short blocks.

  • PDF

Modeling and Simulation of Firewall System and Security Functions of Operating System for Network Security (네트워크 보안을 위한 침입차단 시스템과 운영체제 보안 기능 모델링 및 시뮬레이션)

  • 김태헌;이원영;김형종;김홍근;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.2
    • /
    • pp.1-16
    • /
    • 2002
  • The need for network security is being increasing due to the development of information communication and internet technology. In this paper, firewall models, operating system models and other network component models are constructed. Each model is defined by basic or compound model, referencing DEVS formalism. These models and the simulation environment are implemented with MODSIM III, a general purpose, modular, block-structured high-level programming language which provides direct support for object-oriented programming and discrete-event simulation. In this simulation environment with representative attacks, the following three attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service, Mail bomb attack as an attack type of e-mail. The simulation is performed with the models that exploited various security policies against these attacks. The results of this study show that the modeling method of packet filtering system, proxy system, unix and windows NT operating system. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF

Design of High-speed VPN System for Network Processor with Embedded Crypto-module (암호모듈을 내장한 네트워크프로세서를 이용한 고속 VPN 시스템 설계)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.926-932
    • /
    • 2007
  • Various research groups proposed various architecture of hardware VPN for the high performance VPN system. However, the VPN based on hardware researcher are focused only on the encryption acceleration. Soft based VPN is only useful when the network connection is slow. We have to consider the hardware performance (encryption/decryption processing capability, packet processing, architecture method) to implement hardware based VPN. In this paper, we have analysed architecture of hardware, consideration and problems for high-speed VPN system, From the result, we can choose the proper design guideline.

Signal Analysis and Visualization Environment with Visual Programming Capability (시각 프로그래밍이 가능한 신호분석 환경)

  • 박승훈;우응제;이헌주;황진하;김형진;장재명
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.4
    • /
    • pp.397-407
    • /
    • 1997
  • In this paper, we present a signal analysis environment with visual programming capability, which is called Signal Analysis and Visualization Environment( SAVE). The system allows a user to perform visually programmed analysis of signals and visualize the results. The visualization facility enables the user to compare original signals with processed ones arid also to display signals overlaid synchronously with the events extracted from the signals. The SAVE system has an extensible architecture: each signal processing algorithm is implemented as a separate building block object module, which can be freely added or removed from the SAVE system without any code modification. We describe the overall structure of the SAVE system and the building block objects, which provide the extensibility in collaboration with together. We illustrate some test runs in order to five a taste of how to use and where to use the system.

  • PDF

Analyses of Hardware Architecture for High-speed VPN System (VPN 시스템 고속화를 위한 하드웨어 구조 분석)

  • 김정태;허창우;한종욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1471-1477
    • /
    • 2003
  • In order to realize the Gbps VPN system, however, newer and more advanced technologies are required to enable wire-rate processing across a wide range of functions and layers. While it is generally accepted that a software soluTion on general-purpose processors cannot scale to process these functionsa wire rate, the KEY POINT is that a software solution on general-purpose processors is the most practical way by which these security allocationscan be developed. Many of these security functions require application layer processing on the content of the packets, and the very nature of application layer software development is characterized by relatively large code size with a high need for portability an flexibility. We have analysed the consideration and specification for realizing Gbps VPN system. from this work. we can obtain a technology of originality.

리눅스 활성화 정책방향

  • 임종태
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.18 no.2
    • /
    • pp.4-7
    • /
    • 2000
  • 이상에서 소개된 정보통신부 리눅스 활성화 방안을 요약하면 다음과 같다.1991년 개발된 리눅스가 최근 저비용 고효율 안정성 등의 여러가지 이점 때문에 대표적인 PC서버용 운영체제로 부각되고 있다. IBM, Intel, Sun 등 세계적인 하드웨어 및 소프트웨어 업체들이 공식적으로 리눅스 지원을 시작하면서 Windows NT에 대적하는 새로운 서버 운영체제로 부각되었고, 이에 따라 다른 여러 업체들도 리눅스 시장을 선점하기 위해 활발한 개발활동을 전개하고 있다. 본 활성화 방안은 국내에서 리눅스 활성화를 통해 다음의 목표를 달성하기 위해 마련되었다. 추진목표는 첫째, 저가격 고성능의 리눅스를 이용한 PC 보급 확산으로 인터넷 이용환경 구축 예산을 절감하고 교육정보화 등 정보화사업에 리눅스 적용을 통해 국민의 보편적 이용환경을 조성하는 데 있고, 둘째, 리눅스 기반기술 개발을 통해 소프트웨어 기술을 국제수준으로 향상시키고, 셋째, 리눅스의 보급 활성화를 통한 국내 소프트웨어 산업을 육성하는 데 있다. 구체적 추진전략은 다음과 같다. 첫째, 리눅스 한글환경 표준화 및 리눅스 기반기술 개발 등과 같은 원활한 리눅스 보급을 위한 연구개발을 추진한다. 둘째, 리눅스 환경하의 다양한 응용 개발 촉진체계를 구축한다. 셋째, 공공분야에 대한 리눅스 보급을 추진한다. 셋째, 공공분야에 대한 리눅스 보급을 추진한다. 정보화사업 추진 시 리눅스 활용을 적극 추진하고 교육정보화 사업의 기본장비로 활용하는 시범사업을 추진한다. 또한 산 학 연의 리눅스 전문가들로 리눅스 협의회를 구성하여 리눅스 보급 확산을 위한 활동을 추진하게 될 것이다. 이 과정에서 기업들의 요구사항 및 이용활성화에 대해서 협의가 이루어질 것이다. 새 천년에는 시작부터 국가간에 치열한 정보화 경쟁이 있을 것이다. 정보화 환경이 얼마나 저비용 고효율으로 잘 구축되었느냐, 그리고 정보화 인력을 얼마나 갖고 있느냐가 그러한 국제사회에서의 경쟁력을 좌우하게 될 것이다. 이러한 관점에서 리눅스의 활성화는 매우 중요하다. 본 활성화 방안이 성공적으로 수행되어 우리나라가 아시아의 리눅스 메카로 떠올라 새천년에 우리나라가 정보화 선진국에 진입하도록 정부에서는 최대의 노력을 기울일 방침이다.

  • PDF