• Title/Summary/Keyword: 안전정보시스템

Search Result 5,325, Processing Time 0.038 seconds

A 200-MHz@2.5V 0.25-$\mu\textrm{m}$ CMOS Pipelined Adaptive Decision-Feedback Equalizer (200-MHz@2.5-V 0.25-$\mu\textrm{m}$ CMOS 파이프라인 적응 결정귀환 등화기)

  • 안병규;이종남;신경욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.465-469
    • /
    • 2000
  • This paper describes a single-chip full-custom implementation of pipelined adaptive decision-feedback equalizer (PADFE) using a 0.25-${\mu}{\textrm}{m}$ CMOS technology for wide-band wireless digital communication systems. To enhance the throughput rate of ADFE, two pipeline stage are inserted into the critical path of the ADFE by using delayed least-mean-square (DLMS) algorithm Redundant binary (RB) arithmetic is applied to all the data processing of the PADFE including filter taps and coefficient update blocks. When compared with conventional methods based on two's complement arithmetic, the proposed approach reduces arithmetic complexity, as well as results in a very simple complex-valued filter structure, thus suitable for VLSI implementation. The design parameters including pipeline stage, filter tap, coefficient and internal bit-width and equalization performance such as bit error rate (BER) and convergence speed are analyzed by algorithm-level simulation using COSSAP. The singl-chip PADFE contains about 205,000 transistors on an area of about 1.96$\times$1.35-$\textrm{mm}^2$. Simulation results show that it can safely operate with 200-MHz clock frequency at 2.5-V supply, and its estimated power dissipation is about 890-mW.

  • PDF

Traffic Lights Detection Based on Visual Attention and Spot-Lights Regions Detection (시각적 주의 및 Spot-Lights 영역 검출 기반의 교통신호등 검출 방안)

  • Kim, JongBae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.6
    • /
    • pp.132-142
    • /
    • 2014
  • In this paper, we propose a traffic lights detection method using visual attention and spot-lights detection. To detect traffic lights in city streets at day and night time, the proposed method is used the structural form of a traffic lights such as colors, intensity, shape, textures. In general, traffic lights are installed at a position to increase the visibility of the drivers. The proposed method detects the candidate traffic lights regions using the top-down visual saliency model and spot-lights detect models. The visual saliency and spot-lights regions are positions of its difference from the neighboring locations in multiple features and multiple scales. For detecting traffic lights, by not using a color thresholding method, the proposed method can be applied to urban environments of variety changes in illumination and night times.

Dynamic Characteristics of Actuator for High Density Optical Recording Pick-up (고밀도 기록용 광픽업의 ACTUATOR 동특성)

  • 임경화;이용훈;김석중;이재원
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1995.04a
    • /
    • pp.258-263
    • /
    • 1995
  • 미래 정보와 시대에서 중추적인 역할을 할 광관련 멀티미디어 장비들은 최근 관련 산업계에서 주목을 받기 시작하고 있고 특히 기존 VTR(Video Tape Recorder) 시장을 대체할 차세대 DVDR(Digital Video Disk Recorder)는 기술전쟁이라고 할 정도로 선진 기업의 연구가 치열해지고 있다. DVDR 시스템에서는 필요한 정보들을 레이저빔을 이용한 광학신호로 바꾸어 광디스크에 기록, 재생하는 광픽업이 절대적으로 필요하게 된다. 그런데 광픽업의 위치추종기구인 Actuator는 정확한 위치추종(.+-.1.$\mu$m 오차이내)을 할 수 있는 성능이 요구되며 서보의 특성상 20KHz 이하에서 불필요한 모우드가 가진되지 않는 정밀부품이어야 하므로 Actuator 각 부품의 동적인 특성을 명확히 규명할 필요가 있다. 따라서 본 연구에서는 우선 Actuator 각 부품과 가동부 전체의 중량 및 진동해석을 통해 동특성을 조사하였다. 그리고 Actuator의 중요한 기본성능중 하나인 구동감도 확보여부를 검토할 필요가 있기 때문에 유한요소법 프로그램인 ANSYS를 이용하여 자기회로 부분에 대한 해석을 구하였다. 또한 가동부와 자기회로 등 하위부품을 조립하는 과정에서 발생하는 조립오차로 인해 불필요한 공진과 회전형상이 야기될 수 있으므로 동특성 및 문제점 파악을 위한 민감도 분석이 필요하다. 따라서 본 연구에서는 가동부의 관성 모멘트 값과 강체에 대한 일반식을 이용한 자체 프로그램을 작성하여 조립공차를 구하였다. 이와같은 과정을 통해 구해진 설계값을 바탕으로 실제 제작된 Actuator에 대해서는 비접촉식 측정방법을 통해 동특성값을 측정하였고 이를 해석값과 상호 비교하였다.동강성행렬법(dynamic stiffness matrix method)을 이용하여 해석하고자 한다. 수준임이 입증되었다. 본 연구의 결과를 토대로우리나라 젊고 건강한 남성에게 적합한 무게상수는 작업자군에 대하여 25.05kg, 학생군에 대하여 20.24kg 으로 나타나 이는 미국 NIOSH 안전기준과 대체로 일치함을 발견하였다.ive structures utilized in Client/server architecture for distribution and cooperative processing of application between server and client this study presents two different data management methods under the Client/server environment; one is "Remote Data Management Method" which uses file server or database server and. the other is "Distributed Data Management Method" using distributed database management system. The result of this study leads to the conclusion that in the client/server environment although distributed application is assumed, the data could become centralized (in the case of file server or database server) or decentralized (in the case of distributed

  • PDF

Group Cohesiveness Context Aware Computing Methodology for Computer Mediated Communication (컴퓨터 매개 커뮤니케이션(CMC)에서의 집단 응집성 인식 방법론)

  • Kim, Jong-Ok;Kwon, Oh-Byung
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.2
    • /
    • pp.1-18
    • /
    • 2011
  • Context-aware computing aims to enable the on-line applications and services to be executed in a timely and automated manner. Many of such applications and services involve group-level interactions. For more smoothing communication within a community, specific group-level issues such as group dynamics must be considered. To do so, obtaining group-level contexts such as the role, conflict resolution and norms, are key ingredients to improve group performance. Since group context is not the same as a simple summation of individual context, as group is not just a simple set of individuals, awaring individual context is not sufficient for group-level communication support. However, context-aware computing research still has stressed more on individual context. This leads us to the motivation of searching for group context aware method. Hence, the of this paper is to propose a novel methodology which automatically recognizes group context. Especially, we focus on group conhesiveness in this paper just because group cohosiveness is one of the important variables to control the performance of group interaction. To verify the applicability of the proposed method, an empirical test has been conducted to compare the performance of the proposed methodology with that of conventional methods.

A Case Study on Credit Analysis System in P2P: 8Percent, Lendit, Honest Fund (P2P 플랫폼에서의 대출자 신용분석 사례연구: 8퍼센트, 렌딧, 어니스트 펀드)

  • Choi, Su Man;Jun, Dong Hwa;Oh, Kyong Joo
    • Knowledge Management Research
    • /
    • v.21 no.3
    • /
    • pp.229-247
    • /
    • 2020
  • In the remarkable growth of P2P financial platform in the field of knowledge management, only companies with big data and machine learning technologies are surviving in fierce competition. The ability to analyze borrowers' credit is most important, and platform companies are also recognizing this capability as the most important business asset, so they are building a credit evaluation system based on artificial intelligence. Nonetheless, online P2P platform providers that offer related services only act as intermediaries to apply for investors and borrowers, and all the risks associated with the investments are attributable to investors. For investors, the only way to verify the safety of investment products depends on the reputation of P2P companies from newspaper and online website. Time series information such as delinquency rate is not enough to evaluate the early stage of Korean P2P makers' credit analysis capability. This study examines the credit analysis procedure of P2P loan platform using artificial intelligence through the case analysis method for well known the top three companies that are focusing on the credit lending market and the kinds of information data to use. Through this, we will improve the understanding of credit analysis techniques through artificial intelligence, and try to examine limitations of credit analysis methods through artificial intelligence.

A Study on Intervention of the Tomb's System in Joseon Royal Tombs, the World Cultural Heritage of UNESCO (세계문화유산 조선 왕릉의 능제조정에 관한 연구)

  • Lee, Chang-Hwan;Kim, Kyu-Yeon;Kim, Du-Gyu;Choi, Jong-Hee
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.32 no.4
    • /
    • pp.94-104
    • /
    • 2014
  • This contribution studied knowledges, informations and main project issues for systematic conservation management utilize of Joseon Royal Tombs guaranteeing their Outstanding Universal Value, Authenticity and Integrity, and the outcomes are as follows. The first, regarding the tomb's system, it should be planned to enhance authenticity and integrity of Joseon Royal Tombs through historical facts, measurement, diagnosis and intervention according to international and national charters, statements and general standards. The second, regarding prevention against disasters, the anti-fire system including construction of GIS materials and the Risk Map following investigation the present condition, premising improvement of relevant laws and regulations, should be planned. The third, we should consider, regarding utilize, educational application by the each tomb's story and royal ancestral rite, tourism by the local area of each tomb and industrial application by science and IT technologies.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

An Overview of Operations and Applications of HF Ocean Radar Networks in the Korean Coast (한국연안 고주파 해양레이더망 운영과 활용 개관)

  • Kim, Ho-Kyun;Kim, Jung-Hoon;Son, Young-Tae;Lee, Sang-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.351-375
    • /
    • 2018
  • This paper aims to i) introduce the characteristics of HF ocean radar and the major results and information produced by the radar networks in the Korean coasts to the readers, ii) make an up-to-date inventory of the existing radar systems, and iii) share the information related to the radar operating skill and the ocean current data application. The number of ocean radars has been showing a significant growth over the past 20 years, currently deploying more than 44 radars in the Korean coasts. Most of radars are in operation at the present time for the purposes related to the marine safety, tidal current forecast and understanding of ocean current dynamics, mainly depending on the mission of each organization operating radar network. We hope this overview paper may help expand the applicability of the ocean radar to fisheries, leisure activity on the sea, ocean resource management, oil spill response, coastal environment restoration, search and rescue, and vessel detection etc., beyond the level of understanding of tidal and ocean current dynamics. Additionally we hope this paper contributes further to the surveillance activity on our ocean territory by founding a national ocean radar network frame and to the domestic development of ocean radar system including signal processing technology.

The Estimation of IDF Curve Considering Climate Change (기후변화를 고려한 IDF곡선 추정방안에 대한 연구)

  • Kim, Byung-Sik;Kyoung, Min-Soo;Lee, Keon-Haeng;Kim, Hyung-Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.774-779
    • /
    • 2007
  • IDF 곡선은 전통적으로 지점에서의 과거 관측 강우량 시계열 자료를 수집하여 작성하여 왔으며, 이때 과거 강우량 자료는 정상성을 지니고 있고 미래를 대변한다는 가정을 전제로 한다. 그러나 이미 많은 연구자들에 의해 기후변화가 전구적으로 발생하고 있으며 우리나라에서도 더 이상 기후변화의 사실여부는 이제 더이상 논란 꺼리가 아니다. 특히, 기후변화의 영향을 직접적으로 받을 수밖에 없는 수자원 분야에서는 1990년대부터 잦은 홍수와 가뭄의 반복으로 곤란을 겪고 있다. 특히, 우리나라는 협소한 국토면적과 과다한 인구로 토지나 수자원 등 국토자원 이용의 강도가 다른 나라에 비하여 현저하게 높기 때문에 지구온난화에 따른 기후변화와 같은 약간의 기후변동으로도 심각한 문제가 발생할 가능성이 내포되어 있다. 특히, 기후변화는 유역 규모의 강우 발생 패턴과 강우량의 증가 및 감소에 영향을 미치게 되며 이로 인해 강우 시계열 자료는 비정상성과 경향성을 지니게 된다. 그러나 지금까지는 IDF 곡선의 작성시 강우의 경향성을 무시해 왔다. 본 연구에서는 기후변화가 IDF 곡선에 미치는 영향을 분석하기 위하여 GCM 기후변화 시나리오를 이용하여 IDF 곡선을 작성하였다. 이를 위하여 먼저, YONU CGCM의 제한실험과 점증실험을 실시하여 전구적 규모의 기후변화 시나리오를 작성하였으며, 통계학적 축소기법과 추계학적 일기발생기법을 이용하여 대상지점의 일 수문기상 시계열을 모의하였다. 그리고 BLRP(Bartlett Lewis Rectangular Pulse) 모형과 분해(koutsoyiannis, 2000) 기법을 이용하여 모의된 일 강우 자료를 시자료로 분해하였으며 이를 이용하여 IDF 곡선을 작성하였다. 그 결과, 기후변화 시 지속기간별 재현기간별 강우량이 현재에 크게 비해 증가됨을 확인할 수 있었다.으며 여러명이 동시에 서버에 접속을 하기 때문에 컴퓨터에 부하가 많이 걸리는 모델링이나 복잡한 분석은 실시하기 어려우며, 대용량 데이터를 전송할 수 있는 대역폭이 확보 되어야 한다. 또한, Internet 환경으로 개발을 해야되기 때문에 데스크탑용 GIS에 비해 개발속도가 느리며 개발 초기비용이 많이 들게 된다. 하지만, 네트워크 기술의 발달과 모바일과의 연계 등으로 이러한 약점을 극복할 수 있을 것으로 판단된다. 따라서 본 논문에서는 인터넷 GIS를 이용하여 홍수재해 정보를 검색, 처리, 분석, 예경보할 수 있는 홍수방재정보 시스템을 구축토록 하였다.비해 초음파 감시하 치골상부 방광천자가 정확하고 안전한 채뇨법으로 권장되어야 한다고 생각한다.應裝置) 및 운용(運用)에 별다른 어려움이 없고, 내열성(耐熱性)이 강(强)하므로 쉬운 조건하(條件下)에서 경제적(經濟的)으로 공업적(工業的) 이용(利用)에 유리(有利)하다고 판단(判斷)되어진다.reatinine은 함량이 적었다. 관능검사결과(官能檢査結果) 자가소화(自家消化)시킨 크릴간장은 효소(酵素)처리한 것이나 재래식 콩간장에 비하여 품질 면에서 손색이 없고 저장성(貯藏性)이 좋은 크릴간장을 제조(製造)할 수 있다는 결론을 얻었다.이 있음을 확인할 수 있었다.에 착안하여 침전시 슬러지층과 상등액의 온도차를 측정하여 대사열량의 발생량을 측정하고 슬러지의 활성을 측정할 수 있는 방법을 개발하였다.enin과 Rhaponticin의 작용(作用)에 의(依)한 것이며, 이는 한의학(韓醫學) 방제(方劑) 원리(原理)인 군신좌사(君臣佐使) 이론(理論)에서 군약(君藥)이 주증(主症)에 주(主)로 작용(作用)하는 약물(藥物)이라는 것을 밝혀주는 것이라고 사료(思料)된다.일전 $13.447\;{\mu}g/hr/g$, 섭취 7일중 $8.123

  • PDF

Hepatic Vessel Segmentation using Edge Detection (Edge Detection을 이용한 간 혈관 추출)

  • Seo, Jeong-Joo;Park, Jong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.51-57
    • /
    • 2012
  • Hepatic vessel tree is the key structure for hepatic disease diagnosis and liver surgery planning. Especially, it is used to evaluate the donors' and recipients' liver for the LDLT(Living Donors Liver Transplantation) and estimate the volumes of left and right hepatic lobes for securing their life in the LDLT. In this study, we propose a method to apply canny edge detection that is not affected by noise to the liver images for automatic segmentation of hepatic vessels tree in contrast abdominal MDCT image. Using histograms and average pixel values of the various liver CT images, optimized parameters of the Canny algorithm are determined. It is more time-efficient to use the common parameters than to change parameters manually according to CT images. Candidates of hepatic vessels are extracted by threshold filtering around the detected the vessel edge. Finally, using a system which detects the true-negatives and the false-positives in horizontal and vertical direction, the true-negatives are added in candidate of hepatic vessels and the false-positives are removed. As a result of the process, the various hepatic vessel trees of patients are accurately reconstructed in 3D.