• Title/Summary/Keyword: Additional functions

Search Result 710, Processing Time 0.024 seconds

An Implementation of Image Security System Based oil Web (웹기반 화상 감시 시스템의 구현)

  • 조평기;박영석
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.08a
    • /
    • pp.49-52
    • /
    • 2000
  • In this paper we have developed an image security system based on Internet Web in order to overcome the problem of existing systems that use the dedicated network. The developed system resolves the safety problem of the centralized control model by adapting the distributed control model based on Web, and has the functions of remote control and automatic monitoring for grouped multiple sites on Web browser. And the system can operate various computers or operating system because it's operating software was designed by the concepts of Java Virtual Machine and Virtual Instrument. Also, our system has not need of additional cost for network construction by using Internet and can greatly improve the managemental efficiency of system because the maintenance and publishing of software updates can be performed through Web Server.

  • PDF

Sampling-Based Sensitivity Approach to Electromagnetic Designs Utilizing Surrogate Models Combined with a Local Window

  • Choi, Nak-Sun;Kim, Dong-Wook;Choi, K.K.;Kim, Dong-Hun
    • Journal of Magnetics
    • /
    • v.18 no.1
    • /
    • pp.74-79
    • /
    • 2013
  • This paper proposes a sampling-based optimization method for electromagnetic design problems, where design sensitivities are obtained from the elaborate surrogate models based on the universal Kriging method and a local window concept. After inserting additional sequential samples to satisfy the certain convergence criterion, the elaborate surrogate model for each true performance function is generated within a relatively small area, called a hyper-cubic local window, with the center of a nominal design. From Jacobian matrices of the local models, the accurate design sensitivity values at the design point of interest are extracted, and so they make it possible to use deterministic search algorithms for fast search of an optimum in design space. The proposed method is applied to a mathematical problem and a loudspeaker design with constraint functions and is compared with the sensitivity-based optimization adopting the finite difference method.

Error resilience video coding of DMB video stream using AVC redundant slice (AVC 잉여슬라이스를 이용한 DMB 비디오 스트림의 오류내성부호화)

  • Hong, Sung-Hoon;Baek, Sun-Hye;Na, Nam-Woong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.707-710
    • /
    • 2004
  • In the case of terrestrial DMB(Digital Multimedia Broadcasting) system that offers mobile multimedia broadcasting services, transmission error must be considered. Although DMB transmission system provides the error protection functions of convolution coding and Reed-Solomon (204,188,t=8) coding, additional error resilience video coding methods are needed to satisfy the requirement of BER lower than $10^{-8}$. In this thesis, we propose and evaluate effective error resilience coding schemes using the MPEG-4 redundant slice for MPEG-4 video services in the DMB environment. In this scheme, we analyze the drift error caused by transmission error based on the random noise concept and the redundant slice selection algorithm that selects the most influential slice in the view of the drift error increment.

  • PDF

A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments

  • Choi, Seul-Ki;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1611-1625
    • /
    • 2019
  • The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.

Low-energy interband transition effects on extended Drude model analysis of optical data of correlated electron system

  • Hwang, Jungseek
    • Progress in Superconductivity and Cryogenics
    • /
    • v.21 no.3
    • /
    • pp.6-12
    • /
    • 2019
  • Extended Drude model has been used to obtain information of correlations from measured optical spectra of strongly correlated electron systems. The optical self-energy can be defined by the extended Drude model formalism. One can extract the optical self-energy and the electron-boson spectral density function from measured reflectance spectra using a well-developed usual process, which is consistent with several steps including the extended Drude model and generalized Allen's formulas. Here we used a reverse process of the usual process to investigate the extended Drude analysis when an additional low-energy interband transition is included. We considered two typical electron-boson spectral density model functions for two different (normal and d-wave superconducting) material states. Our results show that the low-energy interband transition might give significant effects on the electron-boson spectral density function obtained using the usual process. However, we expect that the low-energy interband transition can be removed from measured spectra in a proper way if the transition is well-defined or well-known.

Deriving and Applying on SW Quality Characteristics of AIS based on ISO/IEC 25023 (ISO/IEC 25023 기반 AIS 품질특성별 SW 평가항목 도출 및 적용 연구)

  • Kim, Min-Woo;Park, Ji-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1956-1959
    • /
    • 2021
  • AIS(Automatic Identification System) provides navigational information including identification, position, a ship's course and status to ground and other vessels. To obtain AIS Marine Equipment Approval Service, various requirements are required and meet the requirements International Standards. However, most of the requirements are to identify essential functions, response time, hardware requirements, and communication protocols of AIS. The requirements for the quality of SW are not sufficient or detailed, and the weight is relatively low. As role of SW grows and types become more diverse, AIS SW quality inspection is essential. In this paper, We apply eight-quality characteristics of ISO/IEC 25023 standard to improve SW coverage quality of AIS. Suggest additional AIS SW requirements based on the eight quality characteristics of ISO/IEC 25023 standard.

Analysis on Trends of No-Code Machine Learning Tools

  • Yo-Seob, Lee;Phil-Joo, Moon
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.412-419
    • /
    • 2022
  • The amount of digital text data is growing exponentially, and many machine learning solutions are being used to monitor and manage this data. Artificial intelligence and machine learning are used in many areas of our daily lives, but the underlying processes and concepts are not easy for most people to understand. At a time when many experts are needed to run a machine learning solution, no-code machine learning tools are a good solution. No-code machine learning tools is a platform that enables machine learning functions to be performed without engineers or developers. The latest No-Code machine learning tools run in your browser, so you don't need to install any additional software, and the simple GUI interface makes them easy to use. Using these platforms can save you a lot of money and time because there is less skill and less code to write. No-Code machine learning tools make it easy to understand artificial intelligence and machine learning. In this paper, we examine No-Code machine learning tools and compare their features.

Optimal Siting of UPFC for Reducing Congestion Cost by using Shadow Prices

  • Lee, Kwang-Ho;Moon, Jun-Mo
    • KIEE International Transactions on Power Engineering
    • /
    • v.11A no.4
    • /
    • pp.21-26
    • /
    • 2001
  • As competition is introduced in the electricity supply industry, congestion becomes a more important issue. Congestion in a transmission network occurs due to an operating condition that causes limit violations on the transmission capacities. Congestion leads to inefficient use of the system, or causes additional costs (Congestion cost). One way to reduce this inefficiency or congestion cost is to control the transmission flow through the installation of UPFC (Unified Power Flow Controller). This paper also deals with an optimal siting of the UPFC for reducing congestion cost by using shadow prices. A performance index for an optimal siting is defined as a combination of line flow sensitivities and shadow prices. The proposed algorithm is applied to the sample system with a condition, which is concerning the quadratic cost functions. Test results show that the siting of the UPFC is optimal to minimize the congestion cost by the proposed algorithm.

  • PDF

Design of Asynchronous Nonvolatile Memory Module with Self-diagnosis and Clock Function (자기진단과 시계 기능을 갖는 비동기용 불휘발성 메모리 모듈의 설계)

  • Woohyeon Shin;Kang Won Lee;Oh Yang
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.43-48
    • /
    • 2023
  • This paper discusses the design of 32Mbyte asynchronous nonvolatile memory modules, which includes self-diagnosis and RTC (Real Time Clock) functions to enhance their data stability and reliability. Nonvolatile memory modules can maintain data even in a power-off state, thereby improving the stability and reliability of a system or device. However, due to the possibility of data error due to electrical or physical reasons, additional data loss prevention methods are required. To minimize data error in asynchronous nonvolatile memory modules, this paper proposes the use of voltage monitoring circuits, self-diagnosis, BBT (Bad Block Table), ECC (Error Correction Code), CRC (Cyclic Redundancy Check)32, and data check sum, data recording method using RTC. Prototypes have been produced to confirm correct operation and suggest the possibility of commercialization.

  • PDF

HIGHER ORDER GALERKIN FINITE ELEMENT METHOD FOR THE GENERALIZED DIFFUSION PDE WITH DELAY

  • LUBO, GEMEDA TOLESSA;DURESSA, GEMECHIS FILE
    • Journal of applied mathematics & informatics
    • /
    • v.40 no.3_4
    • /
    • pp.603-618
    • /
    • 2022
  • In this paper, a numerical solution of the generalized diffusion equation with a delay has been obtained by a numerical technique based on the Galerkin finite element method by applying the cubic B-spline basis functions. The time discretization process is carried out using the forward Euler method. The numerical scheme is required to preserve the delay-independent asymptotic stability with an additional restriction on time and spatial step sizes. Both the theoretical and computational rates of convergence of the numerical method have been examined and found to be in agreement. As it can be observed from the numerical results given in tables and graphs, the proposed method approximates the exact solution very well. The accuracy of the numerical scheme is confirmed by computing L2 and L error norms.