• Title/Summary/Keyword: 설계그래프

Search Result 575, Processing Time 0.023 seconds

Design of an Artificial Emotion for visualizing emotion (감정의 시각화를 위한 인공감정 설계)

  • Ham, Jun-Seok;Son, Chung-Yeon;Jeong, Chan-Sun;Park, Jun-Hyeong;Yeo, Ji-Hye;Go, Il-Ju
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2009.11a
    • /
    • pp.91-94
    • /
    • 2009
  • 인공감정에 관련된 기존의 연구는 대부분 감정의 인식과 물리적 표현에 중점 되어 연구되었다. 하지만 감정은 성격에 따라 달리 표출되고, 시간에 따라 변화 양상을 갖는다. 또한 새로운 감정자극을 받기 이 전의 감정상태에 따라서 표출 될 감정은 달라진다. 본 논문은 감정을 성격, 시간, 감정간의 관계에 따라 관리하여 현재 표출될 감정을 시각화 해주는 인공감정을 제안한다. 감정을 시각화하기 위해서 본 논문의 인공감정은 감정그래프와 감정장을 갖는다. 감정그래프는 특정 감정을 성격과 시간에 따라 표현하는 2차원 형태의 그래프 이다. 감정장은 감정그래프에서 표현된 서로 다른 종류의 감정들을 시간과 감정간의 관계에 따라 시각화 해주는 3차원 형태의 모델이다. 제안된 인공감정을 통해 감정을 시각화해 보기 위해, 감정의 인식과 물리적 표현을 텍스트 기반으로 간소화시킨 시뮬레이터에 적용했다.

  • PDF

A New Keyword Search Algorithm for RDF/S and OWL Documents (RDF/S 및 OWL 문서에 대한 키워드 검색 알고리즘)

  • Kim, Hak Soo;Son, Jin Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.321-324
    • /
    • 2009
  • XML 또는 RDBMS 에서의 키워드 검색은 기존의 정보 검색처럼 데이터의 구조 또는 질의 언어에 대한 사전 지식 없이 질의 처리를 수행하는 연구 분야 중의 하나이다. 오늘날 키워드 검색을 효율적으로 처리하기 위해 제안된 연구들은 그래프 기반의 질의 처리에 기반한 기법들에 초점을 두고 있다. 이러한 접근들은 XML 또는 RDBMS 안에 존재하는 데이터를 그래프 구조에 기반한 데이터로 변환한 다음에 그래프 탐색을 통해서 모든 질의 키워드를 포함하는 결과들을 찾는다. 그러나 기존의 기법들을 RDF/S 또는 OWL 문서와 같은 복잡한 그래프 구조에 적용하기에는 질의 성능 측면에서 많은 문제점을 가지고 있다. 또한, 온톨로지 언어의 의미적 단위로서의 RDF 트리플을 고려하지 않기 때문에 질의 결과에 대한 신뢰성을 보장할 수 없다. 이러한 관점에서 본 논문은 RDF/S 또는 OWL 저장소에서 효율적이고 의미적인 키워드 검색을 위한 인덱싱 기법 및 알고리즘을 설계한다.

Design of Sentence Semantic Model for Cause-Effect Graph Automatic Generation from Natural Language Oriented Informal Requirement Specifications (비정형 요구사항으로부터 원인-결과 그래프 자동 발생을 위한 문장 의미 모델(Sentence Semantic Model) 설계)

  • Jang, Woo Sung;Jung, Se Jun;Kim, R.Young Chul
    • Annual Conference on Human and Language Technology
    • /
    • 2020.10a
    • /
    • pp.215-219
    • /
    • 2020
  • 현재 한글 언어학 영역에서는 많은 언어 분석 연구가 수행되었다. 또한 소프트웨어공학의 요구공학 영역에서는 명료한 요구사항 정의와 분석이 필요하고, 비정형화된 요구사항 명세서로부터 테스트 케이스 추출이 매우 중요한 이슈이다. 즉, 자연어 기반의 요구사항 명세서로부터 원인-결과 그래프(Cause-Effect Graph)를 통한 의사 결정 테이블(Decision Table) 기반 테스트케이스(Test Case)를 자동 생성하는 방법이 거의 없다. 이런 문제를 해결하기 위해 '한글 언어 의미 분석 기법'을 '요구공학 영역'에 적용하는 방법이 필요하다. 본 논문은 비정형화된 요구사항으로부터 테스트케이스 생성하는 과정의 중간 단계인 요구사항에서 문장 의미 모델(Sentence Semantic Model)을 자동 생성하는 방법을 제안 한다. 이는 요구사항으로부터 생성된 원인-결과 그래프의 정확성을 검증할 수 있다.

  • PDF

Expander graphs based on 60/102 NBCA and its application (60/102 NBCA에 기반을 둔 확장그래프들과 그 응용)

  • Kim, Han-Doo;Cho, Sung-Jin;Choi, Un-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1939-1946
    • /
    • 2011
  • Expander graphs are useful in the design and analysis of communication networks. Mukhopadhyay et. al introduced a method to generate a family of expander graphs based on nongroup two predecessor single attractor CA(Cellular Automata). In this paper we propose a method to generate a family of expander graphs based on 60/102 Null boundary CA(NBCA) which is a group CA. The spectral gap generated by our method is larger than that of Mukhopadhyay et. al [12]. As an application we give an algorithm which generate one-way functions whose security lies on the combinatorial properties of our expander graphs. the one-way function using d-regular graph generated by the 60/102 NBCA is based on the Goldreich's construction [5].

ANIDS(Advanced Network Based Intrusion Detection System) Design Using Association Rule Mining (연관법칙 마이닝(Association Rule Mining)을 이용한 ANIDS (Advanced Network Based IDS) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2287-2297
    • /
    • 2007
  • The proposed ANIDS(Advanced Network Intrusion Detection System) which is network-based IDS using Association Rule Mining, collects the packets on the network, analyze the associations of the packets, generates the pattern graph by using the highly associated packets using Association Rule Mining, and detects the intrusion by using the generated pattern graph. ANIDS consists of PMM(Packet Management Module) collecting and managing packets, PGGM(Pattern Graph Generate Module) generating pattern graphs, and IDM(Intrusion Detection Module) detecting intrusions. Specially, PGGM finds the candidate packets of Association Rule large than $Sup_{min}$ using Apriori algorithm, measures the Confidence of Association Rule, and generates pattern graph of association rules large than $Conf_{min}$. ANIDS reduces the false positive by using pattern graph even before finalizing the new pattern graph, the pattern graph which is being generated is compared with the existing one stored in DB. If they are the same, we can estimate it is an intrusion. Therefore, this paper can reduce the speed of intrusion detection and the false positive and increase the detection ratio of intrusion.

System Design and Implementation for Building a Place Information based on Crowdsourcing Utilizing the Graph Data Model (그래프 데이터 모델을 활용한 크라우드 소싱 기반의 장소 정보 구축을 위한 시스템 설계 및 구현)

  • Lee, Jae-Eun;Rho, Gon-Il;Jang, Han-Me;Yu, Kiy-Un
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.1
    • /
    • pp.117-131
    • /
    • 2016
  • The development of LBS(location-based services) due to the widespread mobile environment highlights the importance of POI(point of interest) information. The accurate and up-to-date POI has to be ensured to reflect the information of rapidly changing places. For the efficient construction of POI, here we propose the novel construction system for t he place information. This system is based on crowd-sourcing in which a great number of users participate. In addition, we utilize the graph data model to build the new concept of the place information covering the wide areas extending from the specific point. Moreover, the implementation of the new system applying the graph data model and crowd-sourcing is realized in this paper. That is, this study suggests the whole new concept of the place information and shows the clustering and the renewal of the place information through crowd-sourcing.

Specification and Synthesis of Speed-independent Circuit using VHDL (VHDL을 이용한 속도 독립 회로의 기술과 합성)

  • Jeong, Seong-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1919-1928
    • /
    • 1999
  • There are no standard language for the specification of speed-independent circuits because existing specification methods are designed appropriately to each synthesis methodology. This paper suggests a method of using VHDL, a standard hardware description language, for the specification and synthesis of speed-independent circuits. Because VHDL is a multi-purpose language, we define a subset of VHDL which can be used for the synthesis. We transform the VHDL description into a signal transition graph and then synthesize speed-independent circuits by using a previous synthesis algorithm which uses a signal transition graph as the specification method. We suggest a systematic transformation method which transforms each VHDL statement into a partial signal transition graph and then merges them into a signal transition graph. This work is a step towards to the development of an integrated framework in which we can utilizes the existing CAD tools based on VHDL. Also, this work will enable a easier migration of the current circuit designers into asynchronous circuit design.

  • PDF

A Study on Reliability Flow Diagram Development of Chemical Process Using Directed Graph Analysis Methodology (유향그래프 분석기법을 이용한 화학공정의 신뢰도흐름도 개발에 관한 연구)

  • Byun, Yoon Sup;Hwang, Kyu Suk
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.6
    • /
    • pp.41-47
    • /
    • 2012
  • There are PFD(Process Flow Diagram) and P&ID(Piping and Instrument Diagram) for designing and managing chemical process efficiently. They provide the operation condition and equipment specifications of chemical process, but they do not provide the reliability of chemical process. Therefore, in this study, Reliability Flow Diagram(RFD) which provide the cycle and time of preventive maintenance has been developed using Directed Graph Analysis methodology. Directed Graph Analysis methodology is capable of assessing the reliability of chemical process. It models chemical process into Directed Graph with nodes and arcs and assesses the reliability of normal operation of chemical process by assessing Directed Graph sequential. In this paper, the chemical process reliability transition according to operation time was assessed. And then, Reliability Flow Diagram has been developed by inserting the result into P&ID. Like PFD and P&ID, Reliability Flow Diagram provide valuable and useful information for the design and management of chemical process.

Computer Science Unplugged Activities of Graph Theory for Primary School Students (초등학생을 위한 그래프 학습 언플러그드활동 개발)

  • Yang, Changmo
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.1
    • /
    • pp.93-100
    • /
    • 2016
  • Computer Science Unplugged is a collection of free learning activities that teach Computer Science through engaging games and puzzles that use cards, string, crayons and lots of running around. In spite of the success of unplugged activities, the unplugged resources for experiencing the concepts of data structures is lacked. In this study, we design, implement and survey the 3 hour lessons of the core concepts of graph theory and the shortest path algorithm for the primary students using computer science unplugged activities. Our survey results showed that our lesson plan is adequate for primary school students and will have a positive effects for primary school students.

Graph Database Design and Implementation for Ransomware Detection (랜섬웨어 탐지를 위한 그래프 데이터베이스 설계 및 구현)

  • Choi, Do-Hyeon
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.24-32
    • /
    • 2021
  • Recently, ransomware attacks have been infected through various channels such as e-mail, phishing, and device hacking, and the extent of the damage is increasing rapidly. However, existing known malware (static/dynamic) analysis engines are very difficult to detect/block against novel ransomware that has evolved like Advanced Persistent Threat (APT) attacks. This work proposes a method for modeling ransomware malicious behavior based on graph databases and detecting novel multi-complex malicious behavior for ransomware. Studies confirm that pattern detection of ransomware is possible in novel graph database environments that differ from existing relational databases. Furthermore, we prove that the associative analysis technique of graph theory is significantly efficient for ransomware analysis performance.