• Title/Summary/Keyword: 코딩규칙

Search Result 94, Processing Time 0.023 seconds

Analysis and Countermeasure of User Data Elements on 'RFID in Libraries'(ISO/DIS 28560) (`도서관에서의 RFID'(ISO/DIS 28560)에서 사용자 데이터 요소의 분석 및 대응)

  • Choi, Jae-Hwang;Cho, Hyen-Yang
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.3
    • /
    • pp.25-47
    • /
    • 2009
  • The purpose of this study is to analyze ISO/DIS 28560 and to cope with the current developments in library RFID technologies. The user data elements in part 1 and encoding rules in part 2 and part 3 of ISO/DIS 28560 are explored. In addition, a few corresponding cases regarding user data elements on ISO/DIS 28560 are investigated. Based on the corresponding cases, four user data elements are selected. They are , , , and . This study expects to allow fertile ground for discussion on the selection of user data elements in Korea.

  • PDF

A Study on Developing Preservation Metadata Based on PREMIS Focusing on Digital Data in National Library of Korea (PREMIS 기반 보존 메타데이터 요소 개발에 관한 연구 - 국립중앙도서관 디지털 자료를 중심으로 -)

  • Park, Ok-Nam
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.83-113
    • /
    • 2012
  • This research seeks to develop preservation metadata and to provide guidelines to apply PREMIS-METS decisions in a METS profile in the National Library of Korea. The process of developing metadata is divided into three steps, that is, analysis of metadata schema in other digital preservation initiatives, analysis of resources and preservation policies, and interviews with librarians in the National Library of Korea. A metadata schema consists of four main entities - object, event, agent, and rights. The study also provides a cataloging example as well as principles using PREMIS-METS for archiving digital resources. The schema has values to manage digital resources effectively and efficiently in the National Library of Korea.

a study on an Implementation of CAVLC Decoder for H.264/AVC (H.264/AVC용 CAVLC 디코더의 구현 연구)

  • Bong, Jae-Hoon;Kim, One-Sam;Sun, Sung-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.552-555
    • /
    • 2007
  • 지상파 DMB등에서 많이 사용하고 있는 기술은 H.264이다. 이 H.264는 적은 비트율에 비하여 고해상도의 영상을 만들어 낸다. 이런 손실압축을 하기 위해서 인트라와 인터등과 같은 전처리 과정과 DCT(Discrete Cosine Transform), 양자화 등등이 존재하지만 H.264에서 실제로 압축이 되는 부분은 엔트로피코딩이다. H.264에서는 Exp-Golomb과 CAVLC(Context-Adaptive Variable Length Coding), CABAC(Context-Adaptive Binary Arithmetic Coding) 세 가지를 지원하고 있다. 이중 CAVLC는 테이블을 기반으로한 압축기법을 사용한다. 테이블을 이용할 때는 코드워드의 길이와 값을 비교하는 방식을 사용하게 된다. 이는 수 많은 메모리 접속으로 인한 전력소모와 연산지연을 가져온다. 본 논문에서는 전송된 비트스트림에서 데이터를 찾을 때 코드워드의 길이와 값을 테이블에 비교해서 찾지 않고 테이블에 존재하는 규칙을 수식화 하여 찾을 수 있도록 하였다. 이는 최초 '1'이 나올때까지의 '0'의 개수와 그 이후 존재하는 코드의 값을 이용하여서 각 단계에 필요한 데이터를 추출해 낸다. 위와 같은 알고리즘을 이용하여 VHDL언어로 설계하였다.

  • PDF

A Method on Automatically Creating an Ontology by Extracting Various Relationships between Terms (용어 간의 다양한 관계 추출을 통해 온톨로지를 자동으로 생성하는 방법)

  • Young-tae Kim
    • Journal of Practical Engineering Education
    • /
    • v.15 no.2
    • /
    • pp.321-330
    • /
    • 2023
  • In this paper, we propose a method of automatically creating an ontology by extracting various relationships between terms necessary for constructing an ontology of a specific domain. The extracted relationship is constructed as an ontology by encoding it into an axiomatic set in the structure of the ontology. To solve efficiently, we represent the search space of the set as an integer programming problem, and we reduce the matrix by using a simple reduction that eliminates rules that are not very helpful for optimization. In conclusion, this paper proposes a way to generalize patterns using given data, reduce search space while maintaining useful patterns, and automatically generate efficient ontology using extracted relationships by applying algorithms composed of structured ontology.

A Topographical Classifier Development Support System Cooperating with Data Mining Tool WEKA from Airborne LiDAR Data (항공 라이다 데이터로부터 데이터마이닝 도구 WEKA를 이용한 지형 분류기 제작 지원 시스템)

  • Lee, Sung-Gyu;Lee, Ho-Jun;Sung, Chul-Woong;Park, Chang-Hoo;Cho, Woo-Sug;Kim, Yoo-Sung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.1
    • /
    • pp.133-142
    • /
    • 2010
  • To monitor composition and change of the national land, intelligent topographical classifier which enables accurate classification of land-cover types from airborne LiDAR data is highly required. We developed a topographical classifier development support system cooperating with da1a mining tool WEKA to help users to construct accurate topographical classification systems. The topographical classifier development support system has the following functions; superposing LiDAR data upon corresponding aerial images, dividing LiDAR data into tiles for efficient processing, 3D visualization of partial LiDAR data, feature from tiles, automatic WEKA input generation, and automatic C++ program generation from the classification rule set. In addition, with dam mining tool WEKA, we can choose highly distinguishable features by attribute selection function and choose the best classification model as the result topographical classifier. Therefore, users can easily develop intelligent topographical classifier which is well fitted to the developing objectives by using the topographical classifier development support system.

A Study on the Perception of University Librarians on Resource Description and Access (RDA에 대한 대학도서관 사서의 인식에 관한 연구)

  • Lee, Sung-Sook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.455-477
    • /
    • 2022
  • The purpose of this study is to examine the perception of RDA by university library librarians and the level of perception of emotions, familiarity, understanding, introduction, obstacles, and education, and to secure basic data to improve awareness. The data needed for the study were obtained through a survey of 76 librarians in 4-year university libraries. As a result of the survey, 67.1% of librarians had listened to RDA, and school classes were the highest at 51.0% of cognitive means. Second, librarians perceived that they were more positive emotions than negative emotions about RDA, and that they were not familiar with RDA-related principles or concepts. In particular, it was recognized that the RDA itself and FRAD were not more familiar. The librarian recognized that they understood RDA-related principles or concepts at a normal level, and in particular, recognized that they did not further understand the authority and encoding. Third, librarians recognized the introduction of RDA at a slightly higher level than usual, but among the questions, 'RDA replaces AACR2' was recognized at a normal level. The librarian recognized the obstacles to the introduction of RDA at a higher level than usual, and in particular, the lack of education related to RDA was highly recognized. Fourth, librarians recognized the need for RDA-related education at a high level, especially the use of RDA Toolkit, changes in RDA records, differences between RDA and AACR2, and the need for RDA and MARC21-related education. In this study, based on the research results, a plan to improve librarian awareness of RDA was proposed.

Conformer with lexicon transducer for Korean end-to-end speech recognition (Lexicon transducer를 적용한 conformer 기반 한국어 end-to-end 음성인식)

  • Son, Hyunsoo;Park, Hosung;Kim, Gyujin;Cho, Eunsoo;Kim, Ji-Hwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.5
    • /
    • pp.530-536
    • /
    • 2021
  • Recently, due to the development of deep learning, end-to-end speech recognition, which directly maps graphemes to speech signals, shows good performance. Especially, among the end-to-end models, conformer shows the best performance. However end-to-end models only focuses on the probability of which grapheme will appear at the time. The decoding process uses a greedy search or beam search. This decoding method is easily affected by the final probability output by the model. In addition, the end-to-end models cannot use external pronunciation and language information due to structual problem. Therefore, in this paper conformer with lexicon transducer is proposed. We compare phoneme-based model with lexicon transducer and grapheme-based model with beam search. Test set is consist of words that do not appear in training data. The grapheme-based conformer with beam search shows 3.8 % of CER. The phoneme-based conformer with lexicon transducer shows 3.4 % of CER.

A Qualitative Study of Early School-age Children's Experiences on Social Skills Training Program (사회성 훈련 프로그램에 참가한 학령 초기 아동의 사회적 행동 변화에 대한 질적 연구)

  • Song, Seung Min;Doh, Hyun Sim;Kim, Min Jung;Kim, Soo Jee;Shin, Nana;Kim, A Youn
    • Korean Journal of Childcare and Education
    • /
    • v.11 no.1
    • /
    • pp.329-354
    • /
    • 2015
  • The purpose of this qualitative study was to develop a social skills training program for improving early school-age children's social behaviors and to investigate its effectiveness by observing their experiences on the program with a qualitative method. Data were collected from 7 children using observer's descriptive notes and reflective notes, compliment notes by assistant leader, program leader's weekly journals, children's weekly journals, and video recordings. Four theme categories and 11 sub-lower categories emerged. Theme categories were (1) relationship building, (2) changes in emotional expressions, (3) changes in prosociality, and (4) changes in social skills. This study observed early school-age children's positive changes in social behaviors and emotional expressions through the social skills program.

The Experimental Comparison of Fault Detection Efficiency of Static Code Analysis Tools for Software RAMS (소프트웨어 RAMS를 위한 정적기법을 이용한 코드 결함 검출 효율성에 관한 실험적 비교)

  • Jang, Jeong-Hoon;Yun, Cha-Jung;Jang, Ju-Su;Lee, Won-Taek;Lee, Eun-Kyu
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2493-2502
    • /
    • 2011
  • For Static analysis of software code, an experienced tester prefer detecting defects with using selective static technique. Many cases of static method have been reported such as coding rules, software metrics, defect data, etc. However, many of analysis case only present effectiveness of static analysis, not enough description for how the tester judged to classify code defects used in code analysis and removed them properly for ensure high quality. Occasionally, there are materials to show the effect of through some examples through some examples. But difficult to gain trust, because of not enough detail for application process. In this paper, introduced the static technique commonly used in railway and applied to the real development challenges. And the each of results were compared and analyzed. It is hard to generalize the results of this parer. But can be used and referenced as a case of study.

  • PDF

A Real-Time Intrusion Detection based on Monitoring in Network Security (네트워크 보안에서 모니터링 기반 실시간 침입 탐지)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.9-15
    • /
    • 2013
  • Recently, Intrusion detection system is an important technology in computer network system because of has seen a dramatic increase in the number of attacks. The most of intrusion detection methods do not detect intrusion on real-time because difficult to analyze an auditing data for intrusions. A network intrusion detection system is used to monitors the activities of individual users, groups, remote hosts and entire systems, and detects suspected security violations, by both insider and outsiders, as they occur. It is learns user's behavior patterns over time and detects behavior that deviates from these patterns. In this paper has rule-based component that can be used to encode information about known system vulnerabilities and intrusion scenarios. Integrating the two approaches makes Intrusion Detection System a comprehensive system for detecting intrusions as well as misuse by authorized users or Anomaly users (unauthorized users) using RFM analysis methodology and monitoring collect data from sensor Intrusion Detection System(IDS).