• Title/Summary/Keyword: Function Block

Search Result 1,105, Processing Time 0.027 seconds

An Analysis of the Association Between Upper Extremity Function and the Wolf Motor Function Test in Chronic Hemiparetic Stroke (뇌졸중 환자의 상지기능과 Wolf 운동기능검사의 관련성 분석)

  • Song, Chang-Soon;Lee, Hye-Sun;Yeom, Hee-Young
    • PNF and Movement
    • /
    • v.18 no.3
    • /
    • pp.445-452
    • /
    • 2020
  • Purpose: The purpose of this study was to evaluate the analysis of the association between upper extremity function and the Wolf Motor Function Test (WMFT) for chronic hemiparetic stroke patients and investigate the evidence of the WMFT as a clinical tool of upper extremity function in individuals with chronic hemiparetic stroke. Methods: This study applied an observational, cross-sectional design in outpatients at three local rehabilitation units in Seoul. Forty-nine individuals who had a diagnosis of first stroke participated in this study. All participants were analyzed for four clinical measures, including the Box and Block Test (BBT), the WMFT, grip strength, and the Canadian Occupational Performance Measure (COPM). Results: Upon analysis, a significant relationship was found between the WMFT scores and BBT scores as well as the grip strength. The WMFT score was statistically and positively associated with the COPM satisfaction score; however, it was not related to the COPM performance score. Conclusion: The results of this study suggest that the WMFT is positively related to simple tasks, such as hand muscle strength and manual dexterity. However, the WMFT does not have a relationship with complex tasks, which are measured by COPM performance abilities.

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

Estimation Method of Key Block Size on a Large Scale Rock Slope by Simulation of 3-D Rock Joint System (3차원 절리계 모사를 통한 대규모 암반비탈면 파괴블록크기 추정방법)

  • Kim, Dong-Hee;Jung, Hyuk-Il;Kim, Seok-Ki;Lee, Woo-Jin;Ryu, Dong-Woo
    • Journal of the Korean Geotechnical Society
    • /
    • v.23 no.10
    • /
    • pp.97-107
    • /
    • 2007
  • Accurate evaluation of the slope stability by assuming failure block as the entire slope is considered to be apposite for the small scale slope, whereas it is not the case for the large scale slope. Hence, appropriate estimation of a failure block size is required since the safety factor and the joint strength parameters are the function of the failure block size. In this paper, the size of failure block was investigated by generating 3-dimensional rock joint system based on statistical data of joints obtained from research slope, such as joint orientation, spacing and 3-dimensional joint intensity. The result indicates that 33 potential failure blocks exist in research slope, as large as 1.4 meters at least and 38.7 meters at most, and average block height is 15.2 meters. In addition, the data obtained from 3 dimensional joint system were directly applicable to the probability analysis and 2 and 3 dimensional discontinuity analysis.

Methods for Improving the Function of Habitat and Eco-friendly Use In Urban Area Mountain Parks - Ogeum Neighborhood Park, Seoul - (도섬 산지형공원의 생물서식 기능 및 친자연적 이용을 위한 개선방안 연구 - 서울시 송파구 오금공원을 사례로 -)

  • Hur, Ji-Yeon;Lee, Kyong-Jae;Han, Bong-Ho
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.39 no.4
    • /
    • pp.83-97
    • /
    • 2011
  • In this study, space allocation with an assessment system for improving the function of the ecological use and function of each space was undertaken to suggest appropriate goals and directions. Ogeum Park, used as the study site, is a stronghold green zone located in the fan-shaped area of the Songpa-gu green zone on a 22ha area site. The assessment system for this study consisted of a total of 3 steps: Step 1 includes the division of the spatial block, Step 2 assesses the proper functioning of each spatial block, while Step 3 includes space allocation and presents improvements for function by space. This study performed a basin analysis with the consideration that Ogeum Park is a forest area and divided the site into a total of 8 areas according to how the sections of land are used. The function of wildlife habitat included an analysis of plant ecology(vegetation type, vegetation layer, potential vegetation), animal ecology(wild birds), and waterways. The function of leisure and use included an analysis of gradients, noise, paths, status of use, and status of facilities. The evaluation of the function of habitat sorted items into native vegetation, vegetation diversification, vegetation potential, animal diversification and potential of animal habitats. The results of grading the evaluation scores by space in the function of habitat showed that the Areas IV and VII, which were 90% of the maximum point, were Grade A, Areas II and V were Grade B at 70% and Area I and VI were Grade C at 50%. Areas III and VIII, which were not found to be beyond the standard of 50%, were excluded. The evaluation of the functions of leisure and use classified items into use potential, use preference, use concentration, use diversification and use convenience. The results of the graded evaluation scores by space in use function, showed areas V and VI as Grade A, or 90% of the maximum score. Grade B, 70% of the maximum score, was given to Areas I and VII. Grade C, 50% of the maximum score, included Areas II, IV and VIII. Area III, graded lower the standard of 50%, was excluded. The study evaluated areas according to a common standard, classified spaces by proper functions into ecological spaces, environmentally-friendly use spaces and use spaces according to the standard of spatial distribution on the basis of the above results through a synthesis of grades of habitat function, leisure function and use. This offers ideas for the improvement of wildlife habitat and environment-friendly use functions by space.

On p-ary Bent Functions Defined on Finite Fields (유한체 상에서 정의된 p진 Bent 함수)

  • 김영식;장지웅;노종선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6C
    • /
    • pp.763-769
    • /
    • 2004
  • It is known that a bent function corresponds to a perfect nonlinear function, which makes it difficult to do the differential cryptanalysis in DES and in many other block ciphers. In this paper, for an odd prime p, quadratic p-ary bent functions defined on finite fields are given from the families of p-ary sequences with optimal correlation properly. And quadratic p-ary bent functions, that is, perfect nonlinear functions from the finite field F $_{p^{m}}$ to its prime field $F_{p}$ are constructed by using the trace functions. trace functions.

A Study on the characteristics of Philippe Starck's furniture design (필립 스탁의 가구디자인 특성에 관한 연구)

  • Park, So-La
    • Korean Institute of Interior Design Journal
    • /
    • v.17 no.1
    • /
    • pp.162-169
    • /
    • 2008
  • Philippe Starck is a famous french designer known for his creative works in all aspects of life from architectural space to product design. Especially, in regard to furniture, he designed more than 250 works with various design characteristics. This study therefore aims to examinate the characteristics of furniture designed by Philippe Starck through assessment of his design background and philosophy, evaluation of fifty or so of his works in terms of their function, form, material, and emotions, and lastly through a chronological analysis. As a result from this study, following various results are drawn as design characteristic through forty six representative cases: 1) possibility of fabrication and transformation 2) multi-function or optional function for user 3) pursuit of simplicity using the characteristic of singular material or mono block and immateriality 4) emotional approach in design 5) non-design method such as use of archetype or historical form.

Automatic Log-in System by the Speaker Certification

  • Sohn, Young-Sun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.2
    • /
    • pp.176-181
    • /
    • 2004
  • This paper introduces a Web site login system that uses user's native voice to improve the bother of remembering the ID and password in order to login the Web site. The DTW method that applies fuzzy inference is used as the speaker recognition algorithm. We get the ACC(Average Cepstrum Coefficient) membership function by each degree, by using the LPC that models the vocal chords, to block the recorded voice that is problem for the speaker recognition. We infer the existence of the recorded voice by setting on the basis of the number of zeros that is the value of the ACC membership function, and on the basis of the average value of the ACC membership function. We experiment the six Web sites for the six subjects and get the result that protects the recorded voice about 98% that is recorded by the digital recorder.

Effects of Model Complexity, Structure and Objective Function on Calibration Process (모형의 복잡성, 구조 및 목적함수가 모형 검정에 미치는 영향)

  • Choi, Kyung Sook
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.45 no.4
    • /
    • pp.89-97
    • /
    • 2003
  • Using inference models developed for estimation of the parameters necessary to implement the Runoff Block of the Stormwater Management Model (SWMM), a number of alternative inference scenarios were developed to assess the influence of inference model complexity and structure on the calibration of the catchment modelling system. These inference models varied from the assumption of a spatially invariant value (catchment average) to spatially variable with each subcatchment having its own unique values. Fur-thermore, the influence of different measures of deviation between the recorded information and simulation predictions were considered. The results of these investigations indicate that the model performance is more influenced by model structure than complexity, and control parameter values are very much dependent on objective function selected as this factor was the most influential for both the initial estimates and the final results.

Image encryption through the chaos function and elementary row column operations (카오스 함수와 기본 행렬변환을 통한 영상의 암호화)

  • Kim, Tae-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.269-272
    • /
    • 2005
  • For the efficient image encryption, we proposed the encryption algorithm using the chaotic function and elementary matrix operation defined on the bit plane decomposition. Though the chaotic encryption algorithm is faster than block encryption, it uses a real number computation. In this sense, we use the row and column operations on the bit-plane decomposed images combined with logistic function for the recursive rounding number, too.

  • PDF

Nano-Resolution Connectomics Using Large-Volume Electron Microscopy

  • Kim, Gyu Hyun;Gim, Ja Won;Lee, Kea Joo
    • Applied Microscopy
    • /
    • v.46 no.4
    • /
    • pp.171-175
    • /
    • 2016
  • A distinctive neuronal network in the brain is believed to make us unique individuals. Electron microscopy is a valuable tool for examining ultrastructural characteristics of neurons, synapses, and subcellular organelles. A recent technological breakthrough in volume electron microscopy allows large-scale circuit reconstruction of the nervous system with unprecedented detail. Serial-section electron microscopy-previously the domain of specialists-became automated with the advent of innovative systems such as the focused ion beam and serial block-face scanning electron microscopes and the automated tape-collecting ultramicrotome. Further advances in microscopic design and instrumentation are also available, which allow the reconstruction of unprecedentedly large volumes of brain tissue at high speed. The recent introduction of correlative light and electron microscopy will help to identify specific neural circuits associated with behavioral characteristics and revolutionize our understanding of how the brain works.