• Title/Summary/Keyword: 코드화

Search Result 1,690, Processing Time 0.03 seconds

A Study on the Accessibility Requirements Analysis Model for the Preventive Safety and Disaster Service Information System - Focusing on the Communication Ability (정보시스템을 통한 생활안전 위험의 예방·대응을 위한 안전약자 요구사항 분석모델 연구 : 의사소통기능을 중심으로)

  • Lee, Yong-Jick;Ji, Seok-yeon;Kim, Sang-hwa
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.10 no.3
    • /
    • pp.1-13
    • /
    • 2020
  • Objective : The purpose of this study is to present an analysis model in developing an inclusive response for safety hazards and disaster preventive information system for vulnerable people to the disaster including persons with disabilities, and those with specific needs. Methods : In this study, the persona analysis method is used to analyze fictitious characters that correspond to various characteristics such as age, disability, environment, occupation, etc. in terms of the scenario of some particular disaster subjects. Based on the user's communication problems derived from the persona analysis, focused group interview and ICF based analysis were implemented to identify needs and arbitration methods. Results : The needs from persona analysis and ICF-based communication items analysis identifies the factors that make each fictitious character difficult in terms of communication in obtaining the benefits consistent with the purpose of the service. The study derives service requirements that can provide arbitration or facilitation methods to increase communication ability of the users. Conclusion : Through the persona analysis method, difficulties that could occur when receiving disaster information using communication devices were identified and analyzed in conjunction with communication problems described in the ICF. In building information services for the prevention of safety hazards and disasters, this study presented a model that uses the persona analysis method and the ICF classification system to derive user requirements for accessible information system.

Container BIC-code region extraction and recognition method using multiple thresholding (다중 이진화를 이용한 컨테이너 BIC 부호 영역 추출 및 인식 방법)

  • Song, Jae-wook;Jung, Na-ra;Kang, Hyun-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1462-1470
    • /
    • 2015
  • The container BIC-code is a transport protocol for convenience in international shipping and combined transport environment. It is an identification code of a marine transport container which displays a wide variety of information including country's code. Recently, transportation through aircrafts and ships continues to rise. Thus fast and accurate processes are required in the ports to manage transportation. Accordingly, in this paper, we propose a BIC-code region extraction and recognition method using multiple thresholds. In the code recognition, applying a fixed threshold is not reasonable due to a variety of illumination conditions caused by change of weather, lightening, camera position, color of the container and so on. Thus, the proposed method selects the best recognition result at the final stage after applying multiple thresholds to recognition. For each threshold, we performs binarization, labeling, BIC-code pattern decision (horizontal or vertical pattern) by morphological close operation, and character separation from the BIC-code. Then, each characters is recognized by template matching. Finally we measure recognition confidence scores for all the thresholds and choose the best one. Experimental results show that the proposed method yields accurate recognition for the container BIC-code with robustness to illumination change.

Study on MPI-based parallel sequence similarity search in the LINUX cluster (클러스터 환경에서의 MPI 기반 병렬 서열 유사성 검색에 관한 연구)

  • Hong, Chang-Bum;Cha, Jeoung-Ho;Lee, Sung-Hoon;Shin, Seung-Woo;Park, Keun-Joon;Park, Keun-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.69-78
    • /
    • 2006
  • In the field of the bioinformatics, it plays an important role in predicting functional information or structure information to search similar sequence in biological DB. Biolrgical sequences have been increased dramatically since Human Genome Project. At this point, because the searching speed for the similar sequence is highly regarded as the important factor for predicting function or structure, the SMP(Sysmmetric Multi-Processors) computer or cluster is being used in order to improve the performance of searching time. As the method to improve the searching time of BLAST(Basic Local Alighment Search Tool) being used for the similarity sequence search, We suggest the nBLAST algorithm performing on the cluster environment in this paper. As the nBLAST uses the MPI(Message Passing Interface), the parallel library without modifying the existing BLAST source code, to distribute the query to each node and make it performed in parallel, it is possible to easily make BLAST parallel without complicated procedures such as the configuration. In addition, with the experiment performing the nBLAST in the 28 nodes of LINUX cluster, the enhanced performance according to the increase in the number of the nodes has been confirmed.

  • PDF

Visualization of Malwares for Classification Through Deep Learning (딥러닝 기술을 활용한 멀웨어 분류를 위한 이미지화 기법)

  • Kim, Hyeonggyeom;Han, Seokmin;Lee, Suchul;Lee, Jun-Rak
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.67-75
    • /
    • 2018
  • According to Symantec's Internet Security Threat Report(2018), Internet security threats such as Cryptojackings, Ransomwares, and Mobile malwares are rapidly increasing and diversifying. It means that detection of malwares requires not only the detection accuracy but also versatility. In the past, malware detection technology focused on qualitative performance due to the problems such as encryption and obfuscation. However, nowadays, considering the diversity of malware, versatility is required in detecting various malwares. Additionally the optimization is required in terms of computing power for detecting malware. In this paper, we present Stream Order(SO)-CNN and Incremental Coordinate(IC)-CNN, which are malware detection schemes using CNN(Convolutional Neural Network) that effectively detect intelligent and diversified malwares. The proposed methods visualize each malware binary file onto a fixed sized image. The visualized malware binaries are learned through GoogLeNet to form a deep learning model. Our model detects and classifies malwares. The proposed method reveals better performance than the conventional method.

A Quantization-adaptive Watermarking Algorithm to Protect MPEG Moving Picture Contents (MPEG 동영상 컨텐츠 보호를 위한 양자화-적응적 워터마킹 알고리즘)

  • Kim Joo-Hyuk;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.149-158
    • /
    • 2005
  • This paper proposed a blind watermarking method for video contents which satisfies both the invisibility and the robustness to attacks to prohibit counterfeiting, modification, illegal usage and illegal re-production of video contents. This watermarking algorithm targets MPEG compression system and was designed to control the amount of watermarking to be inserted according to the adaptive quantization scale code to follow the adaptive quantization of the compression system. The inserting positions of the watermark were chosen by considering the frequency property of an image and horizontal, vertical and diagonal property of a $8{\times}8$ image block. Also the amount of watermarking for each watermark bit was decided by considering the quantization step. This algorithm was implemented by C++ and experimented for invisibility and robustness with MPEG-2 system. The experiment results showed that the method satisfied enough the invisibility of the inserted watermark and robustness against attacks. For the general attacks, the error rate of the extracted watermark was less than $10\%$, which is enough in robustness against the attacks. Therefore, this algorithm is expected to be used effectively as a part in many MPEG systems for real-time watermarking, especially in the sensitive applications to the network environments.

Application of MPI Technique for Distributed Rainfall-Runoff Model (분포형 강우유출모형 병렬화 처리기법 적용)

  • Chung, Sung-Young;Park, Jin-Hyeog;Hur, Young-Teck;Jung, Kwan-Sue
    • Journal of Korea Water Resources Association
    • /
    • v.43 no.8
    • /
    • pp.747-755
    • /
    • 2010
  • Distributed Models have relative weak points due to the amount of computer memory and calculation time required for calculating water flow using a numerical analysis based on kinematic wave theory when compared to the conceptual models used so far. Typically, the distributed models have been mainly applied to small basins. It was necessary to decrease the resolution of the grid to make it applicable for large scale watersheds, and because it would take up too much time to calculate using a higher resolution. That has been one of the more difficult factors in applying the model for actual work. In this paper, MPI (Message Passing Interface) technique was applied to solve the problem of calculation time as it is one of the demerits of the distributed model for performing physical and complicated numerical calculations for large scale watersheds. The comparison studies were performed a single domain and a divided small domain in Yongdam Dam watershed in case of typoon 'Ewiniar' at 2006. They were compared to analyze the application effects of parallelization technique. As a result, a maximum of 10 times the amount of calculation time was saved but keeping the level of quality for discharge by using parallelization code rather than a single processor.

An Information Management Strategy Over Entire Life Cycles of Hazardous Waste Streams (유해폐기물 생애 전주기 흐름 기반 정보 관리 전략)

  • Lee, Sang-hun;Kim, Jungeun
    • Clean Technology
    • /
    • v.26 no.3
    • /
    • pp.228-236
    • /
    • 2020
  • Korea has an economy based on manufacturing industrial fields, which produce high amounts of hazardous wastes, in spite of few landfill candidates, and a significant concern for fine airborne particulates; therefore, traditional waste management is difficult to apply in this country. Moreover, waste collection and accumulation have recently been intensified by the waste import prohibitions or regulations in developing nations, the universalization of delivery services in Korea, and the global COVID-19 crisis. This study thus presents a domestic waste management strategy that aims to address the recent issues on waste. The contents of the strategy as the main results of the study include the (1) improvement of the compatibility of the classification codes between the domestic hazardous waste and the international ones such as those of the Basel Convention; (2) consideration of the mixed hazard indices to represent toxicity from low-content components such as rare earth metals often contained in electrical and electronic equipment waste; (3) management application based on risks throughout the life cycles of waste; (4) establishment of detailed material flow information of waste by integrating the Albaro system, Pollutant Release and Transfer Register (PRTR) system, and online trade databases; (5) real-time monitoring and prediction of the waste movement or discharge using positional sensors and geographic information systems, among others; and (6) selection and implementation of optimal treatment or recycling practices through Life Cycle Assessment (LCA) and clean technologies.

Gene Expression of Glutathione Peroxidase in $Saccharomyces$ $cerevisiae$ Treated with $N$-acetyl-L-cysteine and Gamma-rays ($Saccharomyces$ $cerevisiae$에서 $N$-acetyl-L-cysteine 처리와 감마선 조사에 따른 Glutathione Peroxidase 유전자 발현)

  • Park, Ji-Young;Baek, Dong-Won;Nili, Mohammad;Kim, Jin-Kyu
    • Korean Journal of Environmental Biology
    • /
    • v.29 no.4
    • /
    • pp.258-264
    • /
    • 2011
  • Glutathione (GSH) has important roles in cellular defense against oxidative stress, 1) direct scavenging of reactive oxygen species (ROS), and 2) coenzyme of ROS scavenging enzyme like glutathione peroxidases (GPx). GSH peroxidase reduces free hydrogen peroxide to water using 2GSH. $N$-acetyl-L-cysteine (NAC), one of the antioxidants, is used as a precursor for intracellular GSH. In this study, relation of GSH, NAC, and GSH peroxidase was investigated through transcriptional expression of $GPX1$ and $GPX2$, which are GSH peroxidase encoding genes, in yeast cells treated with 0 mM to 20 mM of NAC or in combination with 100 Gy gamma-rays. The transcriptional expression of $GPX1$ and $GPX2$ was induced by NAC and 100 Gy gamma-rays. The gene expression of both GSH peroxidases was decreased with increasing concentrations of NAC in irradiated yeast cells. These results suggest that elevation of intracellular GSH by NAC and oxidative stress and ROS generated from gamma-rays induces expression of GSH peroxidase genes, and that NAC can protect the yeast cells against ROS generated from gamma-rays through direct scavenging of ROS and transcriptional activation of GSH peroxidase.

A Study on Neutron Shielding Capability Assessment of Metallic Hydride using Cf-252 Neutron Source (Cf-252 중성자 선원을 이용한 수소화금속의 중성자 방사선 차폐능 평가)

  • Yoo, Beong-Gyu;Kim, Keung-Sik;Kim, Yong-Soo
    • Journal of radiological science and technology
    • /
    • v.26 no.3
    • /
    • pp.51-57
    • /
    • 2003
  • Mitigation of fast neutron irradiation damage on reactor vessel and improvement of mechanical integrity are desired for the successful plant life-time extension. In this study, the performance of metallic hydride for this application is reviewed and compared. First, selected prospective metallic hydrides are evaluated by MCNP code and put into the attenuation test using Cf-252 neutron source. Since for the reactor application high moderation and reflection with no absorption are favored, Z factor is introduced for the evaluation. According to the Z value estimation $ZrD_2$ and $TiD_2$ are turned out to be the most favorable fast neutron shielding materials. More thorough evaluation by computer simulation and experimentally, will be followed.

  • PDF

A Study on Performance Comparison of Multipurpose Function Electronic Measurement Reference Station Prototype System using LED and Gyro Sensor (LED 및 자이로센서를 이용한 다기능 전자측량기준점 프로토타입 시스템의 성능비교에 관한 연구)

  • Park, Sung-Kyun;Jung, Se-Hoon;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.8
    • /
    • pp.1247-1255
    • /
    • 2013
  • In this paper, We proposes multipurpose function electronic measurement reference station prototype system based on LED and Gyro Sensor. This system have developed to possible with real time data collection and landscape illumination and surrounding diastrophism monitoring for that analyze problems of existing planted reference station. Hardware for the proposed system consists of a gyro sensor module to detect diastrophism, GPS module to process location information, environment sensor module to process surrounding environmental data and CDMA wireless data communication to send the collected data to server. In addition, this paper intends to enhance system management and future usability in a way that applies LED, QR-code, RFID and Solar cell module to outer side of electronic measurement reference station to improve usability of H/W for electronic measurement reference station. Lastly, this paper conducted current amount evaluation to supply stabilized electricity with its various functions in the proposed multipurpose function electronic measurement reference station and it's proved that this system can be stably operated with its electricity loss factor of 2.29% loss factor. And this paper conducted a qualitative comparison with existing electronic measurement reference station system in order to evaluate superiority of the proposed electronic measurement reference station.