• 제목/요약/키워드: Language Power

검색결과 562건 처리시간 0.023초

병렬유전알고리즘을 응용한 대규모 전력계통의 최적 부하배분 (Optimal Economic Load Dispatch using Parallel Genetic Algorithms in Large Scale Power Systems)

  • 김태균;김규호;유석구
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제48권4호
    • /
    • pp.388-394
    • /
    • 1999
  • This paper is concerned with an application of Parallel Genetic Algorithms(PGA) to optimal econmic load dispatch(ELD) in power systems. The ELD problem is to minimize the total generation fuel cost of power outputs for all generating units while satisfying load balancing constraints. Genetic Algorithms(GA) is a good candidate for effective parallelization because of their inherent principle of evolving in parallel a population of individuals. Each individual of a population evaluates the fitness function without data exchanges between individuals. In application of the parallel processing to GA, it is possible to use Single Instruction stream, Multiple Data stream(SIMD), a kind of parallel system. The architecture of SIMD system need not data communications between processors assigned. The proposed ELD problem with C code is implemented by SIMSCRIPT language for parallel processing which is a powerfrul, free-from and versatile computer simulation programming language. The proposed algorithms has been tested for 38 units system and has been compared with Sequential Quadratic programming(SQP).

  • PDF

초급 일본인 한국어 학습자의 거절 화행 연구 : 시간차에 따른 전략 사용 양상을 중심으로 (Study on the Refusal Speech Act of Japanese Korean Learners of Beginner Level : Focusing on the aspect of strategy use by time)

  • 이복자
    • 한국어교육
    • /
    • 제25권1호
    • /
    • pp.83-113
    • /
    • 2014
  • This study aims to examine the change of strategy use by analyzing the refusal sequence of beginner Japanese Korean learners by time difference of 10 weeks. The results of the study are as follows; First, in the solidarity system of politeness(power-, distance-), learners showed similar ability as native Koreans after 10 weeks. Second, in the deference system(power-, distance+), there was a difference according to the situational burden when using strategies. In the invitational setting, the learners sought justification for their refusal or tried to negotiate by explaining in detail as time passed. However, in the request setting, they showed no will to compromise by refusing directly and leading the listener to give up. Third, similar difference was found in the use of strategies depending on the situational burden in the hierarchical system(power+, distance+). While learners could present their justification for refusal by showing their interest in the invitation as time passed in the invitation setting, they expressed straight refusal and were not willing to negotiate in the request setting.

Questions of Social Order in Herman Melville's "Benito Cereno": The Conflict Between Babo's Plot and Delano's Abject Fear

  • Kim, Hyejin
    • 영어영문학
    • /
    • 제55권6호
    • /
    • pp.1123-1137
    • /
    • 2009
  • Revisiting the horror of slave mutiny in nineteenth century America via Julia Kristeva's concept of abject, this essay examines abject fear in Amasa Delano and Babo's subversive act to deceive Delano in Herman Melville's "Benito Cereno." Babo, the slave, exercises subversive power, thereby reversing racial hierarchy aboard the slave ship-the San Dominick. Babo's ability to mimic and control racial stereotypes exposes how nineteenth-century racial hierarchy was only a social fiction, which becomes the very source of Delano's fear. Delano's dread belies upon the possible disruption of social order triggered by Babo'sblack rebellion. In order to repress his fear, Delano consciously and unconsciously attempts to re-inscribe white dominion and reaffirm black inferiority and stereotypes by means of rationalizing the disturbing signs he witnesses on the San Dominick. When Delano discovers the realsituation of the ship, he must relinquish the abject resonance that disturbs the previous racial order. Employing a legal document, Delano re-inscribes the official position of the blacks as slaves, defining them as violent savages, and thereby silences Babo. However, Melville's text is not a testament to white power. "Benito Cereno" actually endorses abject instability to challenge racial hierarchies through the poignant image of Babo's dead gaze in the last scene of the novella. Thus, "Benito Cereno" exemplifies the recurring power of abject as a threat to social hierarchy and as a constant reminder of the falsity and insecurity of a social order.

그래픽 객체 질의어에서 집합 속성과 메소드를 포함한 경로식의 시각화 (Visualization of Path Expressions with Set Attributes and Methods in Graphical Object Query Languages)

  • 조완섭
    • 한국정보과학회논문지:데이타베이스
    • /
    • 제30권2호
    • /
    • pp.109-124
    • /
    • 2003
  • 대부분의 상용 관계 DBMS(Database Management System)에서는 사용자 편의성을 위하여 SQL과 함께 그래픽 질의어를 제공하고 있으나, 객체 DBMS의 경우에는 그래픽 질의어에 관한 연구와 개발이 미흡한 실정이다. 그래픽 질의어에서는 복잡한 질의 조건을 간결하고도 직관적인 방법으로 표현하는 것이 중요한 이슈이다. 특히, 객체 DBMS는 관계 DBMS 보다 복잡한 데이타 모델과 객체 질의어를 제공하므로 그래픽 객체 질의어를 설계하고 구현할 때 간결성과 직관성을 유지하는 것이 더욱 중요하다. 본 논문에서는 인터넷 환경에서 원격지 객체 데이타베이스에 접근하여 자료를 검색하고 관리하는 그래픽 객체 질의어인 GOQL(Graphical Object Query Language)을 제안한다. GOQL은 그래픽 관계 질의어에서 다루지 않은 집합값 속성과 한정어 및 메소드를 포함한 길이가 2 이상인 경로를 간단한 그래픽 요소들로 시각화함으로써 간결성과 직관성을 높인다. 그리고 대표적인 객체 질의어인 XSQL(1,2)에서 사용하는 경로는 GOQL에서 제공하는 간단한 시각적 도구로 표현할 수 있음을 보인다. 또한, 논문에서는 GOQL의 그래픽 질의어를 텍스트 객체 질의어로 변환하는 알고리즘을 제안하고, 실제로 인터넷 환경에서 동작하도록 구현한 결과를 소개한다.

라즈베리 파이와 립 모션을 이용한 지화 번역 시스템 설계 및 구현 (Design and Implementation of Finger Language Translation System using Raspberry Pi and Leap Motion)

  • 정필성;조양현
    • 한국정보통신학회논문지
    • /
    • 제19권9호
    • /
    • pp.2006-2013
    • /
    • 2015
  • 청각 장애인은 소리를 듣고 음성으로 표현하는 의사소통에 어려움이 있기 때문에 주로, 구화, 수화, 필담 등을 이용하여 의사소통을 진행한다. 청각 장애인과 건청인과의 의사소통을 위해서는 수화가 가장 좋은 방법이지만 수화 사용방법을 이해해야만 하는 어려움이 따른다. 본 논문은 청각 장애인과 건청인간의 의사소통을 위한 수단으로 지화 번역 시스템을 설계 및 구현하였다. 지화 입력 수단으로 손가락 모양과 손동작을 추적할 수 있는 립 모션을 사용하였다. 입력된 정보를 처리하고 번역하기 위해서 저전력 싱글 보드 컴퓨터인 라즈베리 파이를 활용하였다. 시스템 개발을 위하여 Node.js와 MongoDB를 활용하여 플랫폼에 구애받지 않고 다양한 환경에서 사용할 수 있도록 구현하였다. 클라이언트용 애플리케이션은 HTML5를 기반으로 구현하여 웹 브라우징이 가능한 스마트 디바이스를 지원한다.

지화인식 기반의 음성 및 SNS 공유 시스템 구현 (System implementation share of voice and sign language)

  • 강정훈;양대식;오민석;서정욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 추계학술대회
    • /
    • pp.644-646
    • /
    • 2016
  • 본 논문에서는 청각 장애인은 소리를 듣고 음성으로 표현하는 의사소통에 어려움이 있기 때문에 주로, 구화, 수화, 필담 등을 이용하여 의사소통을 진행한다. 청각 장애인과 건청인과의 의사소통을 위해서는 수화가 가장 좋은 방법이지만 수화 사용방법을 이해해야만 하는 어려움이 따른다. 청각 장애인과 건청인간의 의사소통을 위한 수단으로 지화번역 시스템을 설계 및 구현 하였다. 지화 입력 수단 으로는 손가락 모양과 손동작을 추적 할 수 있는 립 모션을 사용하였다. 입력된 정보를 처리하고 번역하기 위해서 저전력 싱글 보드 컴퓨터인 라즈베리 파이를 활용 하였다.

  • PDF

Reflecting Critical Pedagogy: Its Application to EFL Contexts and Criticism

  • Jeon, Ji-Hyun
    • 영어어문교육
    • /
    • 제15권3호
    • /
    • pp.59-81
    • /
    • 2009
  • The primary goal of this paper was to develop a critical point of view to critical pedagogy when applied to EFL contexts. Critical pedagogy is more concerned about how language can affect personal and social change of teachers and students than it is with how to teach language effectively or in ways that encourage critical thinking on the part of teacher and students. For this goal, this paper introduces the definition, emergence and major constructs of critical pedagogy in a broad way at first. Then, this paper presents how critical pedagogy has an impact on ELT, focusing on how critical pedagogy is applied in ELT contexts and why the application of critical pedagogy in EFL can be criticized, through the review of empirical studies. Reflection of Korean English teaching situation and applicational difficulties of critical pedagogy in Korean ELT are followed.

  • PDF

A Study on the Development of Korean Curriculum for Multicultural Students Using AI Technology

  • GiNam, CHO;Yong, KIM
    • 4차산업연구
    • /
    • 제3권1호
    • /
    • pp.21-32
    • /
    • 2023
  • Purpose - This study focused on the development of a Korean language curriculum to solve the problem of Korean literacy among students from multicultural families. Research design, data, and methodology - A case study was conducted on Sim(2018)'s learner-centered learning model to develop an educational plan including AI technology, which will help students from multicultural families to effectively improve their communication and learning skills by improving their reading, writing, and speaking of Korean. Result - Total of six educational plans using AI technology (Microsoft PowerPoint's drawing function, AutoDraw, and Google's Four-cut cartoons) were developed. Conclusion - The curriculum using AI is expected to greatly contribute to the recovery of language learning ability and confidence in studies necessary to improve learners' language education.

DLMS와 LwM2M 프로토콜 간 데이터 연동 모델 연구 (Data Interworking Model Between DLMS and LwM2M Protocol)

  • 명노길;박명혜;김영현;강동훈;은창수
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제6권1호
    • /
    • pp.29-33
    • /
    • 2020
  • Advanced Metering Infrastructure (AMI)와 Internet of Things (IoT)는 동일한 구성방식과 동작원리에도 불구하고, 현장 단말인 스마트미터와 센서에서 사용하는 객체 모델링과 통신 프로토콜 차이로 인하여 이질적인 시스템으로 인식되고 있다. 그러나 향후에는 IoT 기술 확장과 시장지배력 강화에 따른 상호 간 연계 및 연동은 불가피할 것으로 예상된다. 따라서 본 논문에서는 Device Language Message Specification(DLMS) 및 Lightweight Machine to Machine (LwM2M) 표준의 객체 모델링 방식과 자원관리 특징을 분석하여 상호 간 연동 모델을 제안한다. 제안하는 연동 모델은 DLMS와 LwM2M 간 1 대 1 변환 방식을 제공하며, LwM2M의 캡슐화(Encapsulation) 전송방식 대비 최대 46.5%로 패킷 크기를 감소시킬 수 있는 장점이 있다.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • 시스템엔지니어링학술지
    • /
    • 제14권2호
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.