• Title/Summary/Keyword: 프레임워크 개발

Search Result 1,730, Processing Time 0.03 seconds

Specification and Synthesis of Speed-independent Circuit using VHDL (VHDL을 이용한 속도 독립 회로의 기술과 합성)

  • Jeong, Seong-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1919-1928
    • /
    • 1999
  • There are no standard language for the specification of speed-independent circuits because existing specification methods are designed appropriately to each synthesis methodology. This paper suggests a method of using VHDL, a standard hardware description language, for the specification and synthesis of speed-independent circuits. Because VHDL is a multi-purpose language, we define a subset of VHDL which can be used for the synthesis. We transform the VHDL description into a signal transition graph and then synthesize speed-independent circuits by using a previous synthesis algorithm which uses a signal transition graph as the specification method. We suggest a systematic transformation method which transforms each VHDL statement into a partial signal transition graph and then merges them into a signal transition graph. This work is a step towards to the development of an integrated framework in which we can utilizes the existing CAD tools based on VHDL. Also, this work will enable a easier migration of the current circuit designers into asynchronous circuit design.

  • PDF

On Fuzzy Methods to Classify Quality Attributes in Kano Model (카노모델에서 품질요소 분류를 위한 퍼지기법 연구)

  • Kim, Seong-Jun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.6
    • /
    • pp.439-444
    • /
    • 2016
  • The definition of quality continues to evolve. In recent years, there has been growing interest in how to satisfy customers' potential needs with an emphasis on customer-oriented quality. Two-dimensional quality proposed by Kano provides a useful framework for discovering quality attributes critical to customer satisfaction and it is widely employed for product and service development. In Kano model, quality attributes are classified into attractive, one-dimensional, must-be, indifferent, and reverse ones. Finding attractive elements among them is important for achieving customer satisfaction effectively. However, Kano's classification method has limitations in dealing with customers' ambiguous and complex ideas. The customer response itself includes uncertainty and incompleteness. To overcome this problem, fuzzy methods are incorporated with Kano's classification in this paper. According to numerical comparisons, it is shown that the fuzzy Kano method is useful for accommodating various response of customer and is helpful to identify potential needs.

A Study on the Vulnerable Ranking of Hydrological Safety on Existing Dams (기존댐 수문학적 안전성 취약 순위 도출에 관한 연구)

  • Park, Jiyeon;Kim, Tae Hyung;Kwon, Ji-Hye
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.322-322
    • /
    • 2016
  • 국내 1, 2종 댐 시설물은 "시설물의 안전관리에 관한 특별법(이하 시특법)" 제7조에 의해 주기적으로 정밀안전진단을 실시하여 상태평가 및 안전성평가에 의한 종합평가 등급을 부여하고 있다. 정밀안전진단 중 안전성 평가의 수문학적 안전성 평가는 댐의 구조형식과 현장진단 결과에 의한 댐의 상태평가에 따라 1차적으로 수행된다. 여유고 부족 또는 월류 발생 등의 1차적인 조건을 만족시키지 못할 경우 그에 따른 댐체의 구조적 안전을 검토(콘크리트댐)하고, 최종적으로 댐 붕괴 발생 시 하류에 미치는 인적, 경제적 위험요인 등을 기준으로 평가하는 3단계 평가가 수행된다. 본 논문에서는 위 단계적 평가가 수행된 기존댐의 수문학적 안전성 평가 및 상태평가 결과를 사용하여, 1종 기존댐에 대한 수문학적 안전성 취약 순위를 선정하고자 한다. 취약 순위를 선정하기 위하여 다기준의사결정기법(Multi-Criteria Decision Making: 이하 MCDM)을 적용하였고, MC DM의 Payoff Matrix 설정을 위하여 수문학적 안전성 평가 지표를 기준으로 설정하였으며, 이 외의 기준으로는 대상 댐의 연최대 강수량 값을 사용하였다. 연최대강수량값을 산정하기 위하여 기상관측소별 연최대 강수량 30년치의 평균값을 kriging 기법에 적용하여 대상댐에 대한 연최대강수량 값을 도출하여 수문학적 안전성 평가 지표 및 기존댐의 기상 관측값에 따른 댐별 수문학적 안전성 취약 순위 선정에 관한 연구를 수행하였다. 위 결과를 활용하여 수문학적 안전성 평가등급에 대한 검토 및 기후변화 적응 댐 수문학적 안전성 평가 프레임워크 개발을 위한 기초 자료로 활용될 것으로 기대된다.

  • PDF

The Design of Package Contents Authoring and Consuming Tools for Open IPTV Service (개방형 IPTV 서비스를 위한 패키지 콘텐츠 저작 및 소비 도구 설계)

  • Lee, Young-Il;Kim, Kwang-Yong;Yoo, Jeong-Ju;Lyu, Won;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.827-830
    • /
    • 2009
  • Feature of current IPTV services is that the IPTV Provider buys the rights of contents from contents author and provides consumers monopolistically with those. In this environment, IPTV is indistinguishable from the way of existing broadcasting services. To shift away from this structure, it is necessary to guarantee the common user's participation and provide the Open IPTV services for customers to be allowed to have be defined for more opportunities to select the contents. However, there are some problems to conduct Open IPTV service due to a variety of rights protection solutions designed by previous digital broadcast providers. Therefore, a new framework is needed to overall Open IPTV environment. This paper provides the design can packaging contents authoring and consuming tool for IPTV application service based on Open IPTV.

  • PDF

Implementation of Loop Peeling in CTOC (CTOC에서 루프 벗기기 구현)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.27-35
    • /
    • 2008
  • The CTOC framework was implemented to efficiently perform analysis and optimization of the Java bytecode that is often being used lately. In order to analyze and optimize the bytecode from the CTOC, the eCFG was first generated. Due to the bytecode characteristics of difficult analysis, the existing bytecode was expanded to be suitable for control flow analysis. and the control flow graph was drawn. We called eCFG(extended Control Flow Graph). Furthermore, the eCFG was converted into the SSA Form for a static analysis. Many loops were found in the conversion program. The previous CTOC performed conversion directly into the SSA Form without processing the loops. However, processing the loops prior to the SSA Form conversion allows more efficient generation of the SSA Form. This paper examines the process of finding the loops prior to converting the eCFG into the SSA Form In order to efficiently process the loops, and exhibits the procedures for generating the loop tree.

  • PDF

Cleaning Noises from Time Series Data with Memory Effects

  • Cho, Jae-Han;Lee, Lee-Sub
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.37-45
    • /
    • 2020
  • The development process of deep learning is an iterative task that requires a lot of manual work. Among the steps in the development process, pre-processing of learning data is a very costly task, and is a step that significantly affects the learning results. In the early days of AI's algorithm research, learning data in the form of public DB provided mainly by data scientists were used. The learning data collected in the real environment is mostly the operational data of the sensors and inevitably contains various noises. Accordingly, various data cleaning frameworks and methods for removing noises have been studied. In this paper, we proposed a method for detecting and removing noises from time-series data, such as sensor data, that can occur in the IoT environment. In this method, the linear regression method is used so that the system repeatedly finds noises and provides data that can replace them to clean the learning data. In order to verify the effectiveness of the proposed method, a simulation method was proposed, and a method of determining factors for obtaining optimal cleaning results was proposed.

A Study for Implementation of System for protecting Privacy data from IoT Things (IoT 장치의 개인정보 데이터 보호 시스템 구현에 관한 연구)

  • Kim, Seon Uk;Hong, Seong Eun;Bang, Jun Il;Kim, Hwa Jong
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.84-91
    • /
    • 2021
  • In the EU GDPR, when collecting personal information, the right of the information subject(user) to consent or refuse is given the highest priority. Therefore, the information subject must be able to withdraw consent and be forgotten and claim the right at any time. Especially, restricted IoT devices(Constrained Node) implement the function of consent of the data subject regarding the collection and processing of privacy data, and it is very difficult to post the utilization content of the collected information. In this paper, we designed and implemented a management system that allows data subjects to monitor data collected and processed from IoT devices, recognize information leakage problems, connect, and control devices. Taking into account the common information of the standard OCF(Open Connectivity Foundation) of IoT devices and AllJoyn, a device connection framework, 10 meta-data for information protection were defined, and this was named DPD (Data Protection Descriptor). we developed DPM (Data Protection Manager), a software that allows information subjects to manage information based on DPD.

Implementation of Management of Cafe Staying Time (블록체인을 활용한 카페 이용시간 관리 시스템 구현)

  • Park, Jae-hoon;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.946-954
    • /
    • 2021
  • Since COVID19 virus has been occured, variety steps of the quarantine guidelines were enacted. In step 2.5, eating in a cafe was prohibited and only takeout was permitted, but the government has changed several rules. So now people can have a dissert or coffee in the cafe. Though the government adviced available staying time as 1 hour, it is not obeyed often except superstore, and even the management depends on handwriting. In this paper, we implemented a blockchain system to use for this case. This system is implemented with using hyperledger fabric, the blockchain framework which is made by IBM. For a test, 1 organization is in the system and chaincode is installed to the organization to run the system. We expect the certain effect to the quarantine via this system. Moreover, we will develop an application by using this system as a backend.

Analysis of Tensor Processing Unit and Simulation Using Python (텐서 처리부의 분석 및 파이썬을 이용한 모의실행)

  • Lee, Jongbok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.165-171
    • /
    • 2019
  • The study of the computer architecture has shown that major improvements in price-to-energy performance stems from domain-specific hardware development. This paper analyzes the tensor processing unit (TPU) ASIC which can accelerate the reasoning of the artificial neural network (NN). The core device of the TPU is a MAC matrix multiplier capable of high-speed operation and software-managed on-chip memory. The execution model of the TPU can meet the reaction time requirements of the artificial neural network better than the existing CPU and the GPU execution models, with the small area and the low power consumption even though it has many MAC and large memory. Utilizing the TPU for the tensor flow benchmark framework, it can achieve higher performance and better power efficiency than the CPU or CPU. In this paper, we analyze TPU, simulate the Python modeled OpenTPU, and synthesize the matrix multiplication unit, which is the key hardware.

A Study on the Standard Link-based Travel Speed Calculation System Using GPS Tracking Information (GPS 운행궤적정보를 이용한 표준링크기반 통행속도 산출 시스템 연구)

  • Song, Gil jong;Hwang, Jae Seon;Lim, Jae Jung;Jung, Eui Yong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.142-155
    • /
    • 2019
  • This study was conducted with the aim of developing a system to collect taxi GPS probe information to prevent link defects and to improve the accuracy of the standard link-based travel speed by determining when to go into and come out the link. For this purpose, a framework and algorithm consisting of a five-step process for standard link-based map matching and individual vehicle travel speed are presented and used it to calculate the average travel speed of the service link. Two on-site surveys of Teheran and Hakdong-ro were conducted to verify the results by the methods proposed in this paper. On the basis of the overall time of the field survey, the deviation in the travel speed was 0.2 km/h and 0.6 km/h, the accuracy was 99% and 96%, and the MAPE(Mean Absolute Percentage Error) was 1% and 4% in Teheran and Hakdong-ro, respectively. These results were more accurate thand those obtained using conventional methodologies without standard links.