• Title/Summary/Keyword: Computer science and engineering

Search Result 16,209, Processing Time 0.048 seconds

A model on git GUI tool development Using mouse for command input (마우스를 이용한 Command 입력 git GUI tool 개발을 위한 모델)

  • Park, Seonghyuk;Kang, Juho;Ju, Hyeonseok;Hwang, Seongjin;Lee, Changhoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.665-668
    • /
    • 2014
  • git에 대한 관심이 증가하고 있는 요즘 각종 업계에서 Version Control System을 사용하는 인원들은 git을 svn보다 복잡하다고 생각한다. 물론, 전문적인 소프트웨어 개발자라면 컴퓨터 시스템에 대한 이해가 높기 때문에 이에 별로 구애받지 않을 수도 있다. 하지만, 그 외 디자이너, 학생과 같이 전문 개발자가 아닌 인원들은 git을 이해하기 어려워하고 있다. git을 처음 접하는 인원들이 어려움을 느끼는 이유는 개념의 이해와 명령어 사용이었는데, 이들에게 git 사용을 보다 편안하게하기 위한 git GUI tool 개발을 위한 모델을 제안을 한다.

Fabrication and Characterization of $0.2\mu\textrm{m}$ InAlAs/InGaAs Metamorphic HEMT's with Inverse Step-Graded InAlAs Buffer on GaAs Substrate

  • Kim, Dae-Hyun;Kim, Sung-Won;Hong, Seong-Chul;Paek, Seung-Won;Lee, Jae-Hak;Chung, Ki-Woong;Seo, Kwang-Seok
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.1 no.2
    • /
    • pp.111-115
    • /
    • 2001
  • Metamorphic InAlAs/InGaAs HEMT are successfully demonstrated, exhibiting several advantages over conventional P-HEMT on GaAs and LM-HEMT on InP substrate. The strain-relaxed metamorphic structure is grown by MBE on the GaAs substrate with the inverse-step graded InAlAs metamorphic buffer. The device with 40% indium content shows the better characteristics than the device with 53% indium content. The fabricated metamorphic HEMT with $0.2\mu\textrm{m}$T-gate and 40% indium content shows the excellent DC and microwave characteristics of $V_{th}-0.65V,{\;}g_{m,max}=620{\;}mS/mm,{\;}f_T120GHZ{\;}and{\;}f_{max}=210GHZ$.

  • PDF

Detection of Worm Generated by Polymorphic Engine (다형성 엔진으로 생성된 웜의 탐지 기법)

  • Lee, Ki-Hun;Lee, Seung-Ick;Choi, Hong-Jun;Kim, Yu-Na;Hong, Sung-Je;Kim, Jong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.515-520
    • /
    • 2006
  • 다형성 웜은 새로운 감염시도 때마다. 그 형태가 계속 변형되기 때문에 시그너처 기반의 탐지 기법으로는 탐지될 수 없다. 또한 이러한 다형성 웜은 주로 공개된 다형성 엔진을 이용하여 쉽게 자동적으로 생성할 수 있다. 본 연구에서는 네트워크 트래픽에 포함된 실행코드의 명령어 분포를 분석하여, 다형성 웜을 포함한 트래픽을 탐지하는 기법을 제시한다. 또한 제안하는 시스템의 성능을 모의 실험을 통해 평가한 결과, 다형성 엔진으로 생성된 웜은 전부 탐지되고 약 0.0286%의 낮은 오탐지율을 보인다.

  • PDF

A Micromachined Tunable Bandpass Filter Using Tunable Series Inductors For WLAN Applications (가변 직렬 인덕터를 이용한 무선랜 응용 MEMS 가변 대역 통과 필터)

  • Kim, Jong-Man;Park, Jae-Hyoung;Kim, Jung-Mu;Lee, Sang-Hyoung;Baek, Chang-Wook;Kwon, Young-Woo;Kim, Yong-Kweon
    • Proceedings of the KIEE Conference
    • /
    • 2004.07c
    • /
    • pp.2108-2110
    • /
    • 2004
  • In this paper, a novel tunable bandpass filter using tunable series inductors and MEMS switches for wireless LAN applications was proposed. The proposed tunable filter was fabricated using a micromachining technology and performances of the fabricated filter were estimated. The filter consists of spiral inductors, MIM capacitors and direct-contact type MEMS switches, and its frequency tunability is achieved by changing the inductance that is induced by ON/OFF actuations of the MEMS switches. The actuation voltage of the MEMS switches was 58 V, and the measured center frequencies were 2.55 GHz and 5.1 GHz, respectively. The passband insertion loss and 3-dB bandwidth were 4.2 dB and 22.5 % at 2.55 GHz, and 5.2 dB and 23.5 % at 5.1 GHz, respectively.

  • PDF

A Review of Facial Expression Recognition Issues, Challenges, and Future Research Direction

  • Yan, Bowen;Azween, Abdullah;Lorita, Angeline;S.H., Kok
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.125-139
    • /
    • 2023
  • Facial expression recognition, a topical problem in the field of computer vision and pattern recognition, is a direct means of recognizing human emotions and behaviors. This paper first summarizes the datasets commonly used for expression recognition and their associated characteristics and presents traditional machine learning algorithms and their benefits and drawbacks from three key techniques of face expression; image pre-processing, feature extraction, and expression classification. Deep learning-oriented expression recognition methods and various algorithmic framework performances are also analyzed and compared. Finally, the current barriers to facial expression recognition and potential developments are highlighted.

Improving Utilization of GPS Data for Urban Traffic Applications

  • Nguyen, Duc Hai;Nguyen, Tan Phuc;Doan, Khue;Ta, Ho Thai Hai;Pham, Tran Vu;Huynh, Nam;Le, Thanh Van
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.6-9
    • /
    • 2015
  • The use of Intelligent Transportation System (ITS) is promising to bring better solutions for managing and handling the city traffic. This system combines many fields in advanced technology such as Global Positioning System (GPS), Geographic Information System (GIS) and so on. The basement of applications in ITS is the effective collections and data integration tools. The purpose of our research is to propose solutions which involve the use of GPS time series data collected from GPS devices in order to improve the quality of output traffic data. In this study, GPS data is collected from devices attached to vehicles travelling on routes in Ho Chi Minh City (HCMC). Then, GPS data is stored in database system to serve in many transportation applications. The proposed method combines the data usage level and data coverage to improve the quality of traffic data.

Hybrid ASR Error Correction Using Word Sequence Pattern and Recurrent Neural Network (단어열 패턴 매칭과 Recurrent Neural Network를 이용한 하이브리드 음성 인식 오류 수정 방법)

  • Choi, Junhwi;Ryu, Seonghan;Lee, Kyusong;Park, Seonyeong;Yu, Hwanjo;Lee, Gary Geunbae
    • Annual Conference on Human and Language Technology
    • /
    • 2015.10a
    • /
    • pp.129-132
    • /
    • 2015
  • 본 논문에서는 단어열 패턴과 리커런트 신경망을 이용한 하이브리드 음성 인식 오류 수정 방법을 제안한다. 음성 인식 결과 문장에서 음성 인식 오류 단어가 발견되었을 경우에 첫째로 단어열 패턴과 그 패턴의 발음열 점수를 통해 1차적 수정을 하고 적절한 패턴을 찾지 못하였을 경우 음절단위로 구성된 Recurrent Neural Network를 통해 단어를 음절단위로 생성하여 2차적으로 오류를 수정한다. 해당 방법론을 한국어로 된 음성 인식 오류와 그 정답 문장으로 구성된 TV 가이드 영역 말뭉치를 바탕으로 성능을 평가하였고, 기존의 단순 단어열 패턴 기반의 음성 인식 오류 수정보다 성능이 향상되었음을 볼 수 있었다. 이 방법론은 음성 인식 오류와 정답의 말뭉치가 필요 없이 옳은 문장으로만 구성된 일반 말뭉치만으로 훈련이 가능하여, 음성 인식 엔진에 의존적이지 않는 강점이 있다.

  • PDF

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.427-442
    • /
    • 2022
  • MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.

A Study on Implementation Methods of the Right to be Forgotten in SNS Environments (SNS 환경에서의 잊혀질 권리 구현 방안에 대한 고찰)

  • Sin, Cheol Ho;Kim, Nam A;Go, Byeong Woo;Kim, Seong Min;Lee, Jae Dong;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.894-896
    • /
    • 2013
  • 오늘날 전세계의 사람이 이용하는 SNS 상에 존재하는 보안 위협은 정보주체의 개인정보를 유출하고 스팸, 피싱 등의 2 차 피해를 야기하는 등 치명적인 결과를 초래한다. 본 논문에서는 잊혀질 권리와 SNS의 개념을 파악하고 SNS 상에 존재하는 보안 위협에 대해 논의하며 보안 위협을 해소하고 SNS 환경에서의 잊혀질 권리를 실현할 수 있는 UPP, Dual Watermarking Scheme, FaceCloak 등 기술적 방안을 제시한다.

Program Efficiency of Nonvolatile Memory Device Based on SOI(Silicon-on-Insulator) under Partial and Full Depletion Conditions (SOI (Silicon-on-Insulator) 기반의 비휘발성 메모리 소자의 부분공핍 및 완전공핍 상태에서의 프로그램 효율)

  • Cho, Seong-Jae;Park, Il-Han;Lee, Jung-Hoon;Son, Young-Hwan;Lee, Jong-Duk;Shin, Hyung-Cheol;Park, Byung-Gook
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.395-396
    • /
    • 2008
  • There is difficulty in predicting the program efficiency of NOR type nonvolatile memory device adopting channel hot electron injection (CHEI) as program operation mechanism accurately since MOSFET on SOI has floating body. In this study, the dependence of program efficiency for SOI nonvolatile memory device of 200 nm channel length on SOI depletion conditions, partial depletion and full depletion, was quantitatively investigated with the aid of numerical device simulation [1].

  • PDF