• Title/Summary/Keyword: 전이규칙

Search Result 92, Processing Time 0.025 seconds

Synthesis of Uniform CA and 90/150 Hybrid CA (Uniform CA와 90/150 Hybrid CA의 합성)

  • Kim, Han-Doo;Cho, Sung-Jin;Choi, Un-Sook;Kwon, Min-Jeong;Kong, Gil-Tak
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.293-302
    • /
    • 2016
  • In this paper we analyze the CA formed by combining the uniform 102 CA $\mathbb{C}_u$ and the m-cell 90/150 hybrid CA $\mathbb{C}_h$ whose characteristic polynomial is $(x+1)^m$. We analyze cycle structures of complemented group CA derived from $\mathbb{C}_u$ and propose a condition of complemented CA dividing the entire state space into smaller cycles of equal lengths. And we analyze the cycle structure of complemented group CA $\mathbb{C}^{\prime}$ derived from the CA $\mathbb{C}$ formed by combining $\mathbb{C}_u$ and $\mathbb{C}_h$ with complement vector F such that $(T+I)^{q-1}F{\neq}0$ where $(x+1)^q$ is the minimal polynomial of $\mathbb{C}$.

Context-Aware Workflow Language based on Web Services for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 웹 서비스 기반의 상황인지 워크플로우 언어)

  • Han Joohyun;Kim Eunhoe;Choi Jaeyoung;Cho Weduke
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.617-628
    • /
    • 2005
  • The services for ubiquitous computing environments have to provide automatically user-specific adaptive services in dynamically changed environments with many informations provided by both a user and his/her environment. Workflows used in business and distributed computing environments support service automation by connecting many tasks with rules or orderings of tasks. Therefore we must specify context information on transition condition to support context-aware services by adapting a workflow to ubiquitous computing environments. In this paper, we present a structural context model to specify context information on transition constraints of the workflow. And we propose an uWDL Ubiquitous Workflow Description Language) based on web services, which provides web service interfaces which are standardized and independent on heterogeneous and various platforms, protocols, and languages. The uWDL tan be interpreted and executed by a workflow engine, and provide users autonomic services based on context-awareness.

Meaning Analysis (의미 분석)

  • 이건원
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2000.06a
    • /
    • pp.419-423
    • /
    • 2000
  • 성공적인 의사소통의 경우에 성(性)이, 이(理)와 명(命)으로 나타난 것이 같다. 진리(aletheia)가, 언어(logos)와 운명(moira)으로 나타난 것들이 일치하는 것이 성공적인 언화행위가 된다. 측정대상(melos)과 본체(ousia)가 구분되는 것은 언어와 운명의 괴리가 있을 수 있기 때문이다. 체계적인 언어처리의 지식기반을 측정대상에 한정한다. (1) 철학의 시작은 더 옳은 언어표현의 정의(definition)로 이전의 잘못 사용된 언어처리를 대체시키는 것으로 소크라테스는 보았다. [R. Crossman] (2)잘못을 지적하는 등에(Tabanidae)의 역할과 옳은 지식의 상기를 돕는 산파법(maieutics)이 소크라테스의 의미분석의 방법이다. [R. Crossman] (3) 언어를 통하여 진리를 추구한다는 입장(via language)에서 한 언어표현이 그 진리의 운명으로 나타남과 어긋날 때, 운명을 택하는 것은 조화 보다 더 안정의 우위를 인정하는 논리적인 입장으로 합리성 보다 실용(pragma)의 우위를 인정하는 것이다. [W. Quine] (4) 공동체의 공통규범의 추구는 그 언어 속의 공통의 형식 또는 법칙의 추구에 기초하는 것이 자연스럽다. 여기에서 그 언어사용은 그 기저의 법칙(underlying rule)에 개입한다는 입장에 기초한다. [J. Searle] (5) 진리의 언어표현과 운명적인 사태들 사이의 괴리를 처리하기 위하여 체계적인 언어표현의 대상(The Young Tableaux)과 실제(The continuum)의 구분을 수용한다. [AMS(2000)]언어표현의 대상은 나타난 것(顯)이고 실제에는 나타나지 않은 것도 있다. [伊川, 明道] (6) 이 나타난 것과 나타나지 않은 것에 간격이 없다는 것(顯微無間)은 그 의사소통이 성공적인 것이라는 것을 말한다. 따라서 그 언어의 표현완전성(functional completeness)은 언화행위가 성공적이라는 것이다. [J. Searle] (7) 수로 쓰인 것(象數)과 시로 쓰인 것(義理)이 하나인 것은 그 나타난 것과 나타나지 않은 것들 사이에 어떠한 틈도 없음을 말한다. [成中英] (8) 공통의 규범의 공통성 속에 규범적인 측면이 벌써 있다. 공통성에서 개인적이 아닌 공적인 규범으로의 전이는 규범, 가치, 규칙, 과정, 제도로의 전이라고 본다. [C. Morrison] (9) 우리의 언어사용에 신비적인 요소를 부인할 수가 없다. 넓은 의미의 발화의미(utterance meaning) 속에 신비적인 요소나 애정표시도 수용된다. 의미분석은 지금 한글을 연구하고, 그 결과에 의존하여서 우리의 실제의 생활에 사용하는 $\boxDr$한국어사전$\boxUl$등을 만드는 과정에서, 어떤 의미에서 실험되었다고 말할 수가 있는 언어과학의 연구의 결과에 의존하여서 수행되는 철학적인 작업이다. 여기에서는 하나의 철학적인 연구의 시작으로 받아들여지는 이 의미분석의 문제를 반성하여 본다.

  • PDF

A Molecular Dynamics Study on the Liquid-Glass-Crystalline Transition of Lennard-Jones System (한 Lennard-jones 시스템의 액체-유리-결정 전이에 관한 분자동역학 연구)

  • Chang, Hyeon-Gu;Lee, Jong-Gil;Kim, Sun-Gwang
    • Korean Journal of Materials Research
    • /
    • v.8 no.8
    • /
    • pp.678-684
    • /
    • 1998
  • By means of constant- pressure molecular dynamics simulations, we studied the liquid- glass- crystalline transition of a system composed of Lennard- Jones particles with periodic boundary conditions. Atomic volume and enthalpy were calculated as functions of temperature during heating and cooling processes. The Wendt- Abraham ratio derived from radial distribution function and the angular distribution function characterizing short range order were analyzed to distinguish between liquid, glass and crystalline states. A liquid phase resulting from a slow heating of an initial fee crystal amorphized on fast quench, but it crystallized on slow quench. When slowly heated, the amorphous phase from fast quench crystallized into an fee structure. A system with free surface was shown to melt from the surface inward at a lower temperature than bulk system and to have a strong tendency for crystallization even during a fast quench from a liquid state.

  • PDF

Synthesis Of Asymmetric One-Dimensional 5-Neighbor Linear MLCA (비대칭 1차원 5-이웃 선형 MLCA의 합성)

  • Choi, Un-Sook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.333-342
    • /
    • 2022
  • Cellular Automata (CA) is a discrete and abstract computational model that is being applied in various fields. Applicable as an excellent pseudo-random sequence generator, CA has recently developed into a basic element of cryptographic systems. Several studies on CA-based stream ciphers have been conducted and it has been observed that the encryption strength increases when the radius of a CA's neighbor is increased when appropriate CA rules are used. In this paper, among CAs that can be applied as a one-dimensional pseudo-random number sequence generator (PRNG), one-dimensional 5-neighbor CAs are classified according to the connection state of their neighbors, and the ignition relationship of the characteristic polynomial is obtained. Also this paper propose a synthesis algorithm for an asymmetric 1-D linear 5-neighbor MLCA in which the radius of the neighbor is increased by 2 using the one-dimensional 3-neighbor 90/150 CA state transition matrix.

Korean Coreference Resolution using the Multi-pass Sieve (Multi-pass Sieve를 이용한 한국어 상호참조해결)

  • Park, Cheon-Eum;Choi, Kyoung-Ho;Lee, Changki
    • Journal of KIISE
    • /
    • v.41 no.11
    • /
    • pp.992-1005
    • /
    • 2014
  • Coreference resolution finds all expressions that refer to the same entity in a document. Coreference resolution is important for information extraction, document classification, document summary, and question answering system. In this paper, we adapt Stanford's Multi-pass sieve system, the one of the best model of rule based coreference resolution to Korean. In this paper, all noun phrases are considered to mentions. Also, unlike Stanford's Multi-pass sieve system, the dependency parse tree is used for mention extraction, a Korean acronym list is built 'dynamically'. In addition, we propose a method that calculates weights by applying transitive properties of centers of the centering theory when refer Korean pronoun. The experiments show that our system obtains MUC 59.0%, $B_3$ 59.5%, Ceafe 63.5%, and CoNLL(Mean) 60.7%.

Complemented Maximum-Length Cellular Automata Applied on Video Encryption (비디오 암호화를 위한 여원 최대길이 셀룰라 오토마타)

  • Li, Gao-Yong;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.13-18
    • /
    • 2017
  • With the advancement of internet technology, the importance of data protection is gaining more attention. As a possible data protection solution, we propose a novel video encryption method using complemented maximum-length cellular automata (C-MLCA). The first step for encryption is to use 90/150 CA rule to generate a transition matrix T of a C-MLCA state followed by a 2D C-MLCA basis image. Then, we divide the video into multiple frames. Once, we perform exclusive-OR operation with the split frames and the 2D basis image, the final encrypted video can be obtained. By altering values of pixel, the fundamental information in visualizing image data, the proposed method provides improved security. Moreover, we carry out some computational experiments to further evaluate our method where the results confirm its feasibility.

Higher Harmonic Generation by Nonlinear Interaction between Monochromatic Waves and a Horizontal Plate (규칙파와 수평판의 비선형 상호작용에 의한 고차 조화항 발생)

  • Koh, Hyeok-Jun;Cho, Il-Hyoung
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.19 no.5
    • /
    • pp.484-491
    • /
    • 2007
  • Numerical experiments using a numerical wave tank have been performed to verier the nonlinear interaction between monochromatic waves and a submerged horizontal plate. As a model for numerical wave tank, we used a higher-order Boundary Element Method(BEM) based on fully nonlinear potential flow theory and CADMAS-SURF for solving Navier Stokes equations and exact free surface conditions. Both nonlinear models are able to predict the higher harmonic generation in the shallow water region over a submerged horizontal plate. CADMAS-SURF, which involves the viscous effect, can evaluate the higher harmonic generation by flow separation and vortices at the each ends of plate. The comparison of reflection and transmission coefficients with experimental results(Patarapanich and Cheong, 1989) at different lengths and submergence depths of a horizontal plate are presented with a good agreement. It is found that the transfer of energy from the incident fundamental waves to higher harmonics becomes larger as the submergence depth ratio decreases and the length ratio increases.

Improving the Classification of Population and Housing Census with AI: An Industry and Job Code Study

  • Byung-Il Yun;Dahye Kim;Young-Jin Kim;Medard Edmund Mswahili;Young-Seob Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.21-29
    • /
    • 2023
  • In this paper, we propose an AI-based system for automatically classifying industry and occupation codes in the population census. The accurate classification of industry and occupation codes is crucial for informing policy decisions, allocating resources, and conducting research. However, this task has traditionally been performed by human coders, which is time-consuming, resource-intensive, and prone to errors. Our system represents a significant improvement over the existing rule-based system used by the statistics agency, which relies on user-entered data for code classification. In this paper, we trained and evaluated several models, and developed an ensemble model that achieved an 86.76% match accuracy in industry and 81.84% in occupation, outperforming the best individual model. Additionally, we propose process improvement work based on the classification probability results of the model. Our proposed method utilizes an ensemble model that combines transfer learning techniques with pre-trained models. In this paper, we demonstrate the potential for AI-based systems to improve the accuracy and efficiency of population census data classification. By automating this process with AI, we can achieve more accurate and consistent results while reducing the workload on agency staff.

Image Encryption Scheme using Complemented MLCA and Special Chaos Map (여원 MLCA와 특수 혼돈 함수를 이용한 영상 암호화 기법)

  • Jeong, Hyun-Soo;Park, Kyu-Chil;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.873-880
    • /
    • 2020
  • The proposed encryption algorithm strengthens its security by converting pixel-specific values and changing pixel positions. The state transition matrix created by Wolfram's rule creates a complemented CA sequence with the maximum length. Then, we convert the sequence into a 2D basis image and go through a XOR operation with the original image. The final encrypted image is created by shear stressing and rearranging. The image stability analysis verified that the proposed encryption method has high security.