• Title/Summary/Keyword: 소프트웨어 연구개발

Search Result 4,424, Processing Time 0.037 seconds

A STUDY ON THE OPTIMAL ILLUMINATION POWER OF DIFOTI (DIFOTI 영상 최적화를 위한 광량에 대한 연구)

  • Kim, Jong-Bin;Kim, Jong-Soo;Yoo, Seung-Hoon;Kim, Yong-Kee
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.37 no.1
    • /
    • pp.13-23
    • /
    • 2010
  • This study was performed to compare the quality of image processing between the newly developed prototype using light emitting diode(LED) and the conventional $DIFOTI^{TM}$ system(EOS Inc., USA). To estimate the optimal light emitting power for the improved images, primary enamel surfaces treated under Carbopol 907 de-mineralizing solution were taken daily during 20 days of experimental periods by both DIFOTI systems. The results of comparative analyses on the images obtained from both systems with polarized image as gold standard can be summarized as follows: 1. Trans-illumination indices of images taken from primary enamel surfaces were decreased with time in both systems. 2. The differences of intensity of luminance between sound and de-mineralized enamel surface in prototype DIFOTI system was shown to be relatively smaller than conventional $DIFOTI^{TM}$ system. 3. From the comparative analysis of images from both DIFOTI system with polarized images as gold standard, the difference between sound and de-mineralized enamel surface of intensity of luminance of $DIFOTI^{TM}$ system was more correlated to polarized images than prototype of DIFOTI system. With the optimal LED emitting power, the control of aperture of digital camera is considered as the another key factor to improve the DIFOTI images. For the best image quality and analysis, the development of the improved image processing software is required.

Quantitative Evaluation of the Remaining Hepatic Function after Surgery in Patients with Hepatic Cancer using Deconvolution Technique of Tc-99m DISIDA SCAN (Tc-99m DISIDA SCAN에서 deconvolution 방법을 이용한 간암 환자의 수술 후 잔여 간 기능의 정량적 평가)

  • Kim, Deok-Won;Kim, Su-Chan;Yun, Seok-Jin;Lee, Jong-Du;Kim, Byeong-Ro
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.3
    • /
    • pp.301-306
    • /
    • 1997
  • Surgical removal of hepatic cancerous tissues have been widely performed due to its early detection. However, a patient can not survive if excessive hepatic tissues were removed. Therefore, quantitative evaluation of remaining hepatic function after surgery is a really important factor for surgeon. the currently used ICG Rmax and Lidocaine clearance tests have disadvantages such as tedium, complexity, and inability to estimate remaining hepatic function after surgery. While HEF has advantages such as simplicity, quickness, nonivasiveness, and quantification, its reliability has been doubtful. Thus, the program for calculation of HEF has been developed from serial gamma camera image data. And we compared the reliability of HEF with ICG Rmax and Lidocaine clearance test using 6normal and 18 abnormal rabbits with damaged livers. The correlation coefficient of HEF to ICG Rmax and MEGX was 0.91, 0.94, respectively. I was also found that the HEFs of normal and abnormal hepatic tissues was higher than 100% and lower than 80%, respectively. Thus we confirmed that HEF can be a good indicator distinguishing between abnormal tissues and normal ones. Finally, we could conclude that patients would survive if both the pre-and the post-operative HEF were greater than 60%.

  • PDF

Localization of Unmanned Ground Vehicle based on Matching of Ortho-edge Images of 3D Range Data and DSM (3차원 거리정보와 DSM의 정사윤곽선 영상 정합을 이용한 무인이동로봇의 위치인식)

  • Park, Soon-Yong;Choi, Sung-In
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.1
    • /
    • pp.43-54
    • /
    • 2012
  • This paper presents a new localization technique of an UGV(Unmanned Ground Vehicle) by matching ortho-edge images generated from a DSM (Digital Surface Map) which represents the 3D geometric information of an outdoor navigation environment and 3D range data which is obtained from a LIDAR (Light Detection and Ranging) sensor mounted at the UGV. Recent UGV localization techniques mostly try to combine positioning sensors such as GPS (Global Positioning System), IMU (Inertial Measurement Unit), and LIDAR. Especially, ICP (Iterative Closest Point)-based geometric registration techniques have been developed for UGV localization. However, the ICP-based geometric registration techniques are subject to fail to register 3D range data between LIDAR and DSM because the sensing directions of the two data are too different. In this paper, we introduce and match ortho-edge images between two different sensor data, 3D LIDAR and DSM, for the localization of the UGV. Details of new techniques to generating and matching ortho-edge images between LIDAR and DSM are presented which are followed by experimental results from four different navigation paths. The performance of the proposed technique is compared to a conventional ICP-based technique.

A Visual Programming Environment on Tablet PCs to Control Industrial Robots (산업용 로봇 제어를 위한 태블릿 PC 기반의 비주얼 프로그래밍 연구)

  • Park, Eun Ji;Seo, Kyeong Eun;Park, Tae Gon;Sun, Duk Han;Cho, Hyeonjoong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.2
    • /
    • pp.107-116
    • /
    • 2016
  • Industrial robots have been usually controlled using text-based programming languages provided by each manufacturer with its button-based TP(Teaching Pendent) terminal. Unfortunately, when we consider that people who manipulate TPs in manufacturing sites are mostly unskilled with no background knowledge about computer programming, these text-based programming languages using button-based interaction on manufacturing sites are too difficult for them to learn and use. In order to overcome the weaknesses of the text-based programming language, we propose a visual programming language that can be easily used on gesture-enabled devices. Especially, in our visual programming environment, each command is represented as a block and robots are controlled by stacking those blocks using drag-and-drop gestures, which is easily learnable even by beginners. In this paper, we utilize a widely-spread device, Tablet PC as the gesture-enabled TP. Considering that Tablet PC has limited display space in contrast to PC environments, we designed different kinds of sets of command blocks and conducted user tests. Based on the experiment results, we propose an effective set of command blocks for Tablet PC environment.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

GIS spatial D/B formation of geothermal data and Distribution of Heat Flow of Korea (한국의 지열자료 GIS 공간 D/B 구축과 지열류량 분포)

  • Kim, Hyoung-Chan;Lee, Young-Min;Park, Jeong-Min
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.459-460
    • /
    • 2006
  • 현재 남한의 지열류량 측정값으로는 총 363개 지점의 자료가 측정 및 수집되어 있다. 이것은 Mizutani et at. (1970), 장정진 외(1970), 그리고 서정희(1976) 등의 자료, 총 35개의 자료도 추가된 것이다. 1989년 이후부터 측정된 지열류량 자료는 217개 자료이며(임정웅 외, 1989; 임정웅 외, 1996; Lim and Kim, 1997; 염병우 외, 1997), 모두 직접 측정한 것이나, 1989년 이후 보고된 지열류량 자료에 약간의 오류가 있어 이번 연구에서 수정 보완하였다. 또한 과거의 자료 35개 자료는 이미 지열류량 측정치가 논문화 되어 있는 것으로 암석시료는 없다 1989년 이후 2004년까지 자료 217개 2005년도 추가 자료 111개의 지열류량 자료는 암석시료도 있으며, 측정기기가 서로 달라 오차가 있을 수 있어 서로 보정을 해야 할 필요가 있어 시추공 주변 암석을 새로 수집해서 신장비로 다시 측정 보정하였다. 지열류량 D/B 구축은 각 자료의 일련번호, 고유번호 (Sn.), 위경도 좌표 (longitude, lattitude), 암석의 열전도도(thermal conductivity), 지온경사 (thermal gradient), 지열류량 (heat flow)등으로 구성되어 있다. 지열류량 자료 공간 데이터베이스는 점 속성을 가지며 자료형태는 각종 소프트웨어와 호환성이 좋은 shape 파일 형태로 작성하였다. 또만 최근 천부 토양 및 암석 열물성을 이용한 냉난방시스템 즉, Heat Pump System 설계를 위하여 반드시 들어가야 하는 요소인 열확산율, 공극율, 밀도, 비열 등 열물성 특성을 추가하여 GIS 공간 D/B구축하였다. 대륙붕 자료 4개 자료를 제외하고 359개의 지열류량 자료를 이용하여 한반도 남부, 즉 남한의 지열류량 분포도를 작성 분석해 본 결과(그림 1), 우리나라의 지열류량 이상대는 아산만 주변, 보령, 유성, 진안, 울진, 포항, 부산 지역과 포천, 속초, 충주, 수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.

  • PDF

A Personalized Product Recommendation Agent on Mobile Internet (무선인터넷 환경에서의 개인화상품추천에이전트)

  • 이승화;이은석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.145-147
    • /
    • 2004
  • 본 논문에서는 무선인터넷 환경에 적합한 개인화된 상품추천에이전트를 제안한다. 기존에 유선인터넷상의 많은 개인화 추천시스템에서는 초기 사용자 모델링을 위해 사용자에게 수많은 질의를 하고 응답을 요구하였다. 그러나 이러한 방식은 무선인터넷 환경에서 정보 전송량에 따른 높은 사용요금을 고려할 때 적용하기 힘든 방식이다. 본 제안 시스템은 사용자의 Social data률 이용하여 사용자를 비슷한 연령과 성별 그룹으로 나누고, 해당 그룹에서 구매율이 높은 상품을 우선 제시한 후, 사용자 행동을 모니터링 하여 암시적(Implicit)피드백을 통해 프로파일을 생성함으로써, 번거로운 질의-응답 과정 없이도 초기 사용자 모델링을 수행할 수 있다. 프로파일 생성 이후에는 이를 기반으로 하여 사용자몰 유사한 취향을 가진 그룹으로 다시 군집화한 후 협력적 추천을 하게 되며, 프로파일에는 해당 상품의 최종 카테고리명과 키워드를 수집함으로써, 상품의 브랜드와 규격정보를 반영한 추천이 가능하다. 또한 추천 상품과 사용자의 구매데이터와의 비교를 수행하여 사용자가 해당상품을 구매하였을 경우, 상품에 대한 취향정보는 그대로 유지하고 관련 상품을 추천하되, 구매한 상품이 중복 추천되지 않도록 하였다. 시스템 평가를 위해 프로토타입을 구현하여, 다수의 사용자에게 시스템을 이용하며 관심품목을 체크하도록 하였고. 추천횟수가 반복되며 히트율이 증가하는 결과를 통해 시스템의 학습속도와 성능을 평가하였다. 그리고 쇼핌몰에서 구매경험이 있는 사용자의 기존 구매데이터와 Social data를 이용한 초기 제시상품을 역으로 비교하여 오랜 시간과 비용 발생 없이도 초기 프로파일 생성의 유효성을 증명하였다. 포함하는 XML 질의에 대해서도 웹에서 캐쉬를 이용한 처리가 효율적임을 확인하였다.키는데 목적이 있다.RED에 비해 향상된 성능을 보여주었다.웍스 네트워크상의 다양한 디바이스들간의 네트워크 다양화와 분산화 기능을 얻을 수 있었고, 기존의 고가의 해외 솔루션인 Echelon사의 LonMaker 소프트웨어를 사용하지 않고도 국내의 순수 솔루션인 리눅스 기반의 LonWare 3.0 다중 바인딩 기능을 통해 저 비용으로 홈 네트워크 구성 관리 서버 시스템 개발에 대한 비용을 줄일 수 있다. 기대된다.e 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重) $3.50{\sim}3.99kg$사이의 아

  • PDF

An Automated Approach to Determining System's Problem based on Self-healing (자가치유 기법을 기반한 시스템 문제결정 자동화 방법론)

  • Park, Jeong-Min;Jung, Jin-Soo;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.271-284
    • /
    • 2008
  • Self-healing is an approach to evaluating constraints defined in target system and to applying an appropriate strategy when violating he constrains. Today, the computing environment is very complex, so researches that endow a system with the self-healing's ability that recognizes problem arising in a target system are being an important issues. However, most of the existing researches are that self-healing developers need much effort and time to analyze and model constraints. Thus, this paper proposes an automated approach to determine problem arising in external and internal system environment. The approach proposes: 1) Specifying the target system through the models created in design phase of target system. 2) Automatically creating constraints for external and internal system environment, by using the specified contents. 3) Deriving a dependency model of a component based on the created internal state rule. 4) Translating the constraints and dependency model into code evaluating behaviors of the target system, and determinating problem level. 5) Monitoring an internal and external status of system based on the level of problem determination, and applying self-healing strategy when detecting abnormal state caused in the target system. Through these, we can reduce the efforts of self-healing developers to analyze target system, and heal rapidly not only abnormal behavior of target system regarding external and internal problem, but also failure such as system break down into normal state. To evaluate the proposed approach, through video conference system, we verify an effectiveness of our approach by comparing proposed approach's self-healing activities with those of the existing approach.

Investigation of Contaminated Waste Disposal Site Using Electrical Resistivity Imaging Technique (폐기물 처분장 오염지반조사를 위한 전기비저항 영상화 기법의 적용)

  • Jung Yunmoon;Woo Ik;Kim Jungho;Cho Seongjun
    • Geophysics and Geophysical Exploration
    • /
    • v.1 no.1
    • /
    • pp.57-63
    • /
    • 1998
  • The electrical resistivity method, one of old and widely used geophysical prospecting methods, has extended its scope to civil & environmental engineering areas. The electrical resistivity imaging technique was performed at the waste disposal site located in Junju to verify the applicability to the environmental engineering area. The dipole-dipole array, with the dipole spacing of 10 m, was applied along eight survey lines. The field data were obtained under the control of automatic acquisition softwares and topographic effects were corrected during processing stage. The processed resistivity images show that very low resistivity develops inside the disposal site and the distribution of low resistivity is exactly in accord with the boundary of the site except the river side. The depth of low resistivity zones is deeper toward the river side, which is interpreted that there is a high possibility for contaminants to be scattered to the river. From resistivity images, it was feasible to deduce the depth of waste disposal as well as the horizontal/vertical distribution of the contaminated zone, which proved the applicability of the electrical resistivity imaging technique to the environmental engineering area.

  • PDF

A Study on Security Requirements for 5G Base Station (5G 기지국에 대한 보안성평가기준 연구)

  • Hong, Paul;Kim, Yejun;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.919-939
    • /
    • 2021
  • As a next-generation communication technology, 5G networks are capable of handling large amounts of traffic based on higher speeds, shorter communication delays, and higher connectivity compared to 4G networks. In this 5G network environment, base stations are installed all over the city at high density due to their characteristics, and are connected to user terminals to provide services. Therefore, if the base station is damaged by a malicious attacker, it is expected to cause great damage to users and society as a whole. So the need for secure communication equipment such as 5G base stations has emerged. Therefore, in this paper, we propose the security functional requirements derived using threat modeling, a systematic methodology for 5G base stations, and the security assurance requirements at the level that can cope with the backdoor issues. The security requirements proposed in this paper can be used for base station design and development to construct a secure network environment as a security evaluation standard for 5G base stations.