• Title/Summary/Keyword: 설계행위

Search Result 684, Processing Time 0.03 seconds

Design and Implementation of a Two-Phase Activity Recognition System Using Smartphone's Accelerometers (스마트폰 내장 가속도 센서를 이용한 2단계 행위 인식 시스템의 설계 및 구현)

  • Kim, Jong-Hwan;Kim, In-Cheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.2
    • /
    • pp.87-92
    • /
    • 2014
  • In this paper, we present a two-phase activity recognition system using smartphone's accelerometers. To consider the unique temporal pattern of accelerometer data for each activity, our system executes the decision-tree(DT) learning in the first phase, and then, in the second phase, executes the hidden Markov model(HMM) learning based on the sequences of classification results of the first phase classifier. Moreover, to build a robust recognizer for each activity, we trained our system using a large amount of data collected from different users, different positions and orientations of smartphone. Through experiments using 6720 examples collected for 6 different indoor activities, our system showed high performance based on its novel design.

A Behavior Conformance Checker for Component Interfaces using UML State Machine Diagram (UML 상태기계 다이어그램을 이용한 컴포넌트 인터페이스의 행위 호환성 검증 도구)

  • Kim, Ho-Jun;Lee, Woo-Jin
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.65-72
    • /
    • 2009
  • Component based development has increasingly become important in the software industry. However, in the current component based development approach with UML, the absence of behavioral description of components brings about a cost problem which causes semantic errors on the testing phase. Accordingly we cannot grasp the usage pattern of component by its provided interfaces which refer to an abstraction of software component. And we cannot guarantee the behavioral conformance of the provided and required interfaces of components. In order to solve these problems, we describe the behaviors of component interfaces by state machine diagram and guarantee their behavior conformance at the modeling phase. We also propose a method to guarantee the behavior conformance of component interfaces with concept of observation equivalence and invocation consistency. And we provide an analyzing tool which checks interface behavior conformance.

The Influence of Internal And External Virtuous Behaviors on Job Performance: Focusing on the creating research model for the virtuous behaviors through qualitative research (내적·외적 미덕적 행위가 업무성과에 미치는 영향 - 질적 연구를 통한 연구모형 개발을 중심으로 -)

  • Ko, Sung-Hoon;Moon, Tae-Won
    • Management & Information Systems Review
    • /
    • v.34 no.4
    • /
    • pp.31-66
    • /
    • 2015
  • The purpose of this research is to examine that internal virtue (i.e. virtue between organizational members) and external virtue (i.e. virtue between organizational members and external members) positively associate with job performance when considering organizational identification, positive work-related identity, affective commitment, emotional exhaustion, and collective self-esteem as mediators. Virtue in organization has received attention as critical attribute of positive organizational scholarship. Cameron(2003) defined the study of virtue as a study of the capacity, attributes, and reserve in organization that facilitates the expression of positive deviance among organization member. In addition, this study contributes to the qualitative investigation on how internal giving virtue (i.e. the employees' virtue for their organization), internal receiving virtue (i.e. virtue employees receive from their organization), external giving virtue (i.e. the organization's virtue for society), and external receiving virtue (i.e. virtue the organization receives from society), used as independent variables, influence job performance after creating research model for the four virtuous behaviors through qualitative research. Therefore, this research contributes to the creation of research model for virtuous behaviors within organizations and virtuous behaviors with external members through qualitative study and sheds light on how these variables influence job performance by virtue of qualitative research.

  • PDF

Pattern generation for coding error detection in VHDL behavioral-level designs (VHDL 행위-레벨 설계의 코딩 오류 검출을 위한 패턴 생성)

  • Kim, Jong Hyeon;Kim, Dong Uk
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.3
    • /
    • pp.31-31
    • /
    • 2001
  • 최근 VHDL 코딩 및 합성방법에 의한 설계가 널리 사용되고 있다. 집적도가 증가함에 따라 VHDL에 의한 설계 또한 그 분량이 증가하여 많은 코딩오류가 발생하고 있으며, 이를 검색하는데 많은 시간과 노력이 소요되고 있다. 본 논문에서는 VHDL 행위-레벨 설계를 대상으로 코딩오류를 검색하는 방법을 제안하였다. 그 방법에 있어서는 검색패턴을 생성하여 오류가 없는 응답과 설계의 응답을 비교함으로써 설계오류를 찾는 방법을 택하였다. 따라서 본 논문에서는 코딩오류를 검색하기 위한 검색패턴을 생성하는 알고리듬을 제안하였다. 검색패턴 생성은 각 코드에 대해 수행하며, 할당오류와 조건오류를 구분하여 수행하였다. 패턴생성을 위해 VHDL 코드를 CDFG로 변환하여 사용하며, CDFG상의 경로를 탐색하여 패턴생성에 필요한 정보를 추출한다. 경로탐색은 오류가 발생하였다고 가정한 지점으로부터 역방향 탐색과 정방향 탐색을 수행하여 패턴을 생성한다. 제안한 알고리듬은 C-언어로 구현하였다. 펜티엄-Ⅱ 400MHz의 환경에서 여러 가지 VHDL 행위-레벨 설계를 대상으로 제안한 알고리듬을 적용하였다. 그 결과, 고려한 모든 설계의 모든 코드에 대한 검색패턴을 생성할 수 있었으며, 가정한 모든 오류를 검색할 수 있었다. 검색패턴 생성에 소요되는 시간은 고려한 모든 대상 설계에서 1초 미만의 CPU 시간을 보여 속도면에서도 매우 우수함을 나타내었다. 따라서 본 논문에서 제안한 검색방법은 VHDL에 의한 설계에서 설계검증에 필요한 시간과 노력을 상당히 감소시킬 것으로 기대된다.

An Exploratory Study for Clustering of Technology Leakage Activitie (기술유출행위 군집화를 위한 탐색적 연구)

  • Kim, Jaesoo;Kim, Jawon;Kim, Jeongwook;Choi, Yurim;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.3-9
    • /
    • 2019
  • Most of security countermeasures have been implemented to cope with continuous increase leakage of technology, but almost security countermeasures are focused on securing the boundary between inside and outside. This is effective for detecting and responding to attacks from the outside, but it is vulnerable to internal security incidents. In order to prevent internal leakage effectively, this study identifies activities corresponding to technology leakage activities and designes technology leakage activity detection items. As a design method, we analyzed the existing technology leakage detection methods based on the previous research and analyzed the technology leakage cases from the viewpoint of technology leakage activities. Through the statistical analysis, the items of detection of the technology leakage outcomes were verified to be appropriate, valid and reliable. Based on the results of this study, it is expected that it will be a basis for designing the technology leaking scenarios based on future research and leaking experiences.

Design on a Fuzzy Petri Net for Representation and Verification for Nervous System Behaviors (신경계 행위 표현 및 검증을 위한 FPN 설계)

  • 김성렬;김용승;이상호;이철희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.677-687
    • /
    • 1992
  • This paper presents a Fuzzy Pertri Net(FPN)model, which can be used to verify the validity and effectiveness of nervous system bebaviors. The similarities and differences between communication network and neural network are analyzed with respect to the representation and verification of the system behaviors. For the effective representation for the ambiguities of nervous system we combein fuzzy set theory to the PetriNet, and then design a new model, FPN, Also show that FPN is superior to the multiplayer perceptron model using computer simulation.

  • PDF

Design of Fraudulent Process Notification for Management Information Systems (정보시스템 부정행위 신고시스템 설계)

  • Lee, Joong Hee;Lee, Sangwon;Ahn, Hyunsup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.629-631
    • /
    • 2013
  • In many enterprises, fraudulent activities and processes are widely prevalent. But, their employees would not report the illegal activities since they would be attacked by defensive and reactive retaliations in their enterprises. Against this backdrop, we design notification systems for whistle blowing. The design would certainly be useful for fraudulent process notification while using management information systems in the field of business. The fraudulent process notification is related to whistle blowing systems, methods, storage media, and so on. Also, we establish the whole architecture of fraudulent process notification with functional structure from the viewpoint of systems and whistle blower. The flow diagram of notification method is added.

  • PDF

Analysis and Classification of In-Vehicle Activity Based on Literature Study for Interior Design of Fully Autonomous Vehicle (완전 자율주행 자동차의 실내공간 설계를 위한 문헌연구 기반의 실내행위 분석 및 유형화)

  • Kwon, Ju Yeong;Ju, Da Young
    • Journal of the HCI Society of Korea
    • /
    • v.13 no.2
    • /
    • pp.5-20
    • /
    • 2018
  • The fully autonomous vehicle, which has been actively studied in a worldwide before commercialization, is expected to become a living space by securing time and space compared to existing automobile. For this reason, interior design of fully autonomous vehicle has become very important. To enhance passenger's experience and satisfaction in fully autonomous vehicle, it is necessary to design an optimized space that can support in-vehicle activities. For this purpose, efforts to analyze the passenger's in-vehicle activities should be preceded. However, there were limited studies that define space and in-Vehicle activities of fully autonomous vehicle in Korea. The purpose of this study is to suggest the guideline of the interior design of fully autonomous vehicle by analyzing and classifying the scope of activities that the passenger can perform within the vehicle. As a method of the study, literature studies on future concept cars, human lifetime behavior and consumer needs had been conducted. As a result in-vehicle activities could be applied in a fully autonomous vehicle. Four in-vehicle activities 'work', 'home life and personal care', 'relaxation' and 'conversation and hobby' had been derived through the analysis of in-vehicle activities. Based on the results, the interior design of fully autonomous vehicle guideline has been suggested. The study is significant because the result of the study can act as a basic study which considers the activities in the fully autonomous vehicle environment.

  • PDF

Design of a Human Activity Recognition System using Hidden Conditional Random Fields (은닉 조건부 랜덤 필드를 이용한 인간 행위 인식 시스템의 설계)

  • Kim, Hye-Suk;Han, Yu-Mi;Kim, In-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1332-1335
    • /
    • 2013
  • 본 논문에서는 키넥트 센서 데이터에 은닉 조건부 랜덤 필드 모델을 적용하여 인간의 일상 행위를 인식하는 시스템을 제안한다. 많은 고수준의 일상 행위들은 다수의 부속 행위들이 순차적 혹은 반복적으로 수행되어 나타나는 하나의 계층구조로 볼 수 있다. 따라서 제안하는 시스템에서는 이러한 고수준의 일상 행위들을 순차성과 계층성을 잘 표현할 수 있는 확률 그래프 모델의 하나인 은닉 조건부 랜덤 필드 모델로 모델링함으로써, 행위 인식률을 높이려고 시도하였다. 또한 제안하는 시스템에서는 효과적인 행위 모델의 학습과 적용을 위해, 모션 특징, 구조 특징, 손 위치 특징과 같은 다양한 종류의 특징들을 키넥트 센서 데이터로부터 추출하여 이들을 이용하였다. 그리고 12 가지 일상 행위들에 관한 코넬 대학의 CAD-60 데이터 집합을 이용한 다양한 실험을 통해, 제안하는 시스템의 우수한 인식 성능을 확인할 수 있었다.

The design of Plan based dialogue system in Task execution domain (작업수행영역에서 계획에 기반한 대화 시스템의 설계)

  • 오종건;서정연
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04b
    • /
    • pp.450-452
    • /
    • 2000
  • 대화 시스템이란 자연어를 이용하여 인간과 정보를 교환하거나 업무를 수행하는 프로그램이다. 자연언어는 인간이 사용할 수 있는 쉽고 효율적인 인터페이스이기 때문에 이를 이용한 대화 시스템의 필요성이 증대되고 있다. 본 논문에서는 지금까지 주로 인식에 초점이 맞추어져 연구되어 왔던 계획 기반 대화 모델을 이용하여 발화하여 생성하는 시스템을 설계하고자 한다. 본 논문에서 설계하고자 하는 대화 시스템은 사용자의 질의에 응답할 뿐 아니라 자신의 행위를 능동적으로 수행할 수 있는 협조적 대화 시스템이다. 또한 대화의 효율성을 고려하여 사용자가 필요로 하는 정보를 능동적으로 제공하는 시스템이다. 대화의 효율성을 고려한 발화를 위해 본 논문에서는 새로운 시스템의 행위를 정의하여 실제 가능한 대화 예를 보이고자 한다.

  • PDF