• Title/Summary/Keyword: 매개코드

Search Result 84, Processing Time 0.032 seconds

On-line Handwritten Numeral Recognition based on Table Top Display (테이블 탑 디스플레이 기반의 온라인 필기 숫자 인식)

  • Kim, Eui-Chul;Kim, Ji-Woong;Kim, Soo-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.9-12
    • /
    • 2007
  • 테이블 탑 디스플레이는 사람에게 친숙한 상호작용의 매개체인 손을 입력장치로 이용하는 일종의 탁자형 멀티 터치스크린이라고 할 수 있다. 본 논문에서는 이러한 환경에서 손가락 제스쳐를 활용하여 필기 숫자를 인식하는 연구를 수행함으로써 테이블 탑 디스플레이에 적합한 필기 숫자 인식 기술을 개발하였고, 이로 인해 추후 진행될 연속 숫자 혹은 특수기호의 성공적인 인식 가능성을 확인하였다. 실험 과정은 테이블 탑 디스플레이의 표면을 통해 입력된 손가락 궤적을 잡음제거, 대표점 추출등의 전처리 과정을 거쳐 16-방향 체인코드로 변환하고, 변환된 체인코드의 학습 및 필기 숫자 인식에 확률 통계적 모델인 은닉 마르코프 모델을 이용하였다. 학습에는 총 300개 필기 숫자 데이터를 이용하였고, 인식 실험에 사용한 별도의 100개의 필기 숫자 데이터에 대해 97%의 정인식율을 보였다.

  • PDF

Raptor Codes-based Screen Mirroring for Energy Efficiency (에너지 효율성을 고려한 랩터 코드 기반의 스크린 미러링)

  • Go, Yunmin;Song, Hwangjun
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.134-139
    • /
    • 2017
  • The existing screen mirroring systems are vulnerable to packet loss and inefficient for mobile devices with limited energy capacity. To overcome these problems, we propose a packet loss robust and energy efficient screen mirroring system for mobile device. The proposed system employs systematic Raptor codes for a forward error correction method to mitigate the video quality degradation that is caused by packet loss over wireless networks. For the mobile device energy saving, the proposed system shapes the screen mirroring traffic and adjusts the Raptor encoding parameters. In this paper, the proposed system is fully implemented on single board computers and is examined in a real Wi-Fi Direct network.

A Research of Anomaly Detection Method in MS Office Document (MS 오피스 문서 파일 내 비정상 요소 탐지 기법 연구)

  • Cho, Sung Hye;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.87-94
    • /
    • 2017
  • Microsoft Office is an office suite of applications developed by Microsoft. Recently users with malicious intent customize Office files as a container of the Malware because MS Office is most commonly used word processing program. To attack target system, many of malicious office files using a variety of skills and techniques like macro function, hiding shell code inside unused area, etc. And, people usually use two techniques to detect these kinds of malware. These are Signature-based detection and Sandbox. However, there is some limits to what it can afford because of the increasing complexity of malwares. Therefore, this paper propose methods to detect malicious MS office files in Computer forensics' way. We checked Macros and potential problem area with structural analysis of the MS Office file for this purpose.

Determination and Performance Evaluation of Codevectors Utilizing Phase Difference Distribution Characteristics of Circular Antenna Arrays (원형 안테나 배열의 위상 차이 분포 특성을 활용한 코드벡터 결정 방식 및 성능 평가)

  • Kim, Huiwon;Suh, Junyeub;Sung, Wonjin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.10
    • /
    • pp.3-9
    • /
    • 2016
  • Current mobile communication systems utilize the multiple-input multiple-output (MIMO) transmission technique as an important means to enhance the bandwidth efficiency. Accurate beamforming via channel estimation contributes to the signal-to-interference-plus-noise ratio (SINR) increase and the system performance improvement when MIMO transmission techniques are employed. Therefore, determination of beamforming vectors as well as the design of appropriate codebooks defining these codevectors play an important role in system operation. In this paper, we statistically analyze the phase difference between the channels corresponding to adjacent antenna elements in order to design an efficient codebook for uniform circular arrays (UCAs). We introduce new parameters which compensate for the additional phase difference observed in its probability density functions (PDFs). The performance of the proposed codebook is tested using the spatial channel model (SCM) to demonstrate its gain over the standard codebooks adopted in the long term evolution (LTE) Releases 8 and 10.

A Very Low Complexity Loop Filter to Simultaneously Reduce Blocking and Ringing Artifacts of H.26L Video Coder (H.26L의 블록화 및 링 현상을 동시에 제거하기 위한 저 계산량의 Loop 필터 방식)

  • 이민구;차형태;한헌수;홍민철
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.645-648
    • /
    • 2001
  • 본 논문에서는 H.26L 동영상 압축 표준화 방식에서 블록화 및 링 현상을 동시에 제거하는 계산량이 감소된 일차원 loop filter를 제안한다. 새로운 일차원 정규화 완화 함수가 정의되고 두 개의 인접 방향에서 완화의 정도를 조절하는 정규화 매개변수는 부호화와 복호화 부에서 이용 가능한 코드화 블록 패턴과 양자화 스텝크기로 정의된다. 그러므로, 정규화 매개변수를 정의하고 압축된 동영상으로부터 복원된 영상을 얻기 위한 기타 정보는 필요하지 않다. 실험결과로부터 제안된 알고리즘의 성능은 확인할 수 있었다.

  • PDF

LSTF 주증기배관 파단사고 평가

  • 이규복;손상배
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.05b
    • /
    • pp.260-267
    • /
    • 1996
  • LSTF의 주증기배관 파단사고 실험(RUN SB-SL-01)에 대한 RELAP5/MOD2 해석결과를 제시하고, LSTF의 RUN SB-SL-01 실험결과 중에서 일차측과 이차측 사이의 열전달률에 촛점을 맞추어 증기발생기 이차측 및 일차계통의 압력, 온도 등과 같은 주요변수를 조사하여 RELAP5/MOD2코드의 성능을 평가하였다. 10% 주증기배관파단사고에 관한 최적 평가에서 주요 매개변수의 전체적 추세가 비교적 잘 예측되었다. 원자로압력용기 상층부에서 기포가 발생하는 기간 동안에는 계통 압력에서 작은 차이가 발생함을 알 수 있었는데, 압력차 발생은 가압기가 비어 있거나 원자로압력용기 상층부에서 기포가 발생하기 때문으로 판단된다.

  • PDF

KSTAR 토카막 RF 안테나의 부하와 VSWR

  • 한장민;주명희;최현정;홍봉근
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1997.05b
    • /
    • pp.577-582
    • /
    • 1997
  • KSTAR 토카막$^1$플라즈마의 전류구동을 위한 RF 안테나 설계시 최적 조건을 2차원 파동 코드와 안테나 모듀울(module)을 이용하여 연구하였다 최적 조건을 얻기 위해 플라즈마와 안테나 매개변수 각각에 대한 부하와 전압정재파비(VSWR)의 관계를 살펴보았다. 계산결과로부터, 송전선의 특성저항 $R_{c}$=50$\Omega$, 안테나 폴로이달(poloidal) 길이 $A_{pl}$ =1.0m, 안테나 사이의 간격 $w_{d}$=4$^{0}$ 근처에서 최적의 안테나 조건을 갖음을 알 수 있었다.

  • PDF

Ransomware Analysis and Method for Minimize the Damage (랜섬웨어 분석과 피해 최소화 방안)

  • Moon, Jaeyeon;Chang, Younghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.1
    • /
    • pp.79-85
    • /
    • 2016
  • Ransomware was a malicious code that active around the US, but now it spreads rapidly all over the world and emerges in korea recently because of exponential computer supply and increase in users. Initially ransomware uses e-mail as an attack medium in such a way that induces to click a file through the spam mail Pam, but it is now circulated through the smart phone message. The current trend is an increase in the number of damage, including attacks such as the domestic large community site by ransomware hangul version. Ransomware outputs a warning message to the user to encrypt the file and leads to monetary damages and demands for payment via bitcoin as virtual currency is difficult to infer the tracking status. This paper presents an analysis and solutions to damage cases caused by ransomware.

Factors Influencing the Pre and Post Acceptance Behavior of QR code User (QR코드 사용자의 수용 전, 후 행동에 영향을 미치는 요인)

  • Lee, Sang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.136-144
    • /
    • 2011
  • The Purpose of this research was to identify the factors have influenced Word-of-mouth with a personal Innovativeness in using QR code and to get an advertising & marketing side implication. For this, researcher examined a SEM (structural equating model) methodology of the route from the study on the influencing factors the QR code user's pre and post acceptance behavior and applied the examined variables, existing Expanded TAM, TRAM, PAM which is a contribution points. As a result of this study, first, it was confirmed that the personal innovativeness affected user's perceived usefulness, joyfulness, use intention, and satisfaction. Second, it was confirmed that innovativeness affected perceived usefulness, use intention and this route connected to WOM, in other side, it was discussed that innovativeness affected joyfulness, satisfaction and this route connected to WOM. The above result means that 'joyfulness', 'satisfaction' are important elements, in terms of marketing aspect, for the companies to take an advantage of QR Code as a means of advertising. It should be understood that users don't spend their time on the service having no joy as quality of life improves. After all, it means that uninteresting QR Code isn't suitable for mediums of advertising.

An Analysis of U-233 Resonance Absorption

  • Yoo, Kun-Joong;Mann Cho;Kim, Chang H.;Chi, Chang-Yul
    • Nuclear Engineering and Technology
    • /
    • v.7 no.4
    • /
    • pp.267-275
    • /
    • 1975
  • The low-lying resolved resonance structure of U-233 is investigated in terms of the Adler-Adler multilevel formalism. The resonance capture and fission cross sections of U-233 below 60 eV are calculated using Adlers' effective resonance parameters. The infinite dilution resonance integrals of U-233 are computed with the use of the Alders' parameters adjusted to fit the cross section data. It is found that the agreement of calculations with experiments is generally good over most of the energy region covered. A transformation of the Adlers' multilevel parameters into an equivalent set of the single level pseudoparameters is made for the use of the existing computer codes which are useful in the reactor calculations but do not have capability to use the multilevel parameters. The results of this transformation are presented in the form of a table.

  • PDF