• Title/Summary/Keyword: Standard of School Library

Search Result 128, Processing Time 0.032 seconds

Fast Convergence GRU Model for Sign Language Recognition

  • Subramanian, Barathi;Olimov, Bekhzod;Kim, Jeonghong
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.9
    • /
    • pp.1257-1265
    • /
    • 2022
  • Recognition of sign language is challenging due to the occlusion of hands, accuracy of hand gestures, and high computational costs. In recent years, deep learning techniques have made significant advances in this field. Although these methods are larger and more complex, they cannot manage long-term sequential data and lack the ability to capture useful information through efficient information processing with faster convergence. In order to overcome these challenges, we propose a word-level sign language recognition (SLR) system that combines a real-time human pose detection library with the minimized version of the gated recurrent unit (GRU) model. Each gate unit is optimized by discarding the depth-weighted reset gate in GRU cells and considering only current input. Furthermore, we use sigmoid rather than hyperbolic tangent activation in standard GRUs due to performance loss associated with the former in deeper networks. Experimental results demonstrate that our pose-based optimized GRU (Pose-OGRU) outperforms the standard GRU model in terms of prediction accuracy, convergency, and information processing capability.

Bibliotherapy for human nature therapy of the juvenile delinquent (비행청소년 인성치료를 위한 독서요법)

  • 변우열
    • Journal of Korean Library and Information Science Society
    • /
    • v.26
    • /
    • pp.131-168
    • /
    • 1997
  • The future of a country is influenced by the youth. Sound fostering of the youth is important for the country's future. Because of mechanization, industrialization and urbanization of our society, many social problems, such as confusion of the sense of value, dehumanization, money worshi n.0, ppings, juvenile delinquency are increasing. For the solution of problems of juvenile crime and dehumanization, bibliotherapy should be practiced in juvenile reformatories, schools and societies. The purpose of this study is to investigate the effectiveness and value of reading. And also the characteristics, brief history, principles and procedures of bibliotherapy are examined. In addition, the book catalog suitable for bibliotherapy is considered. The results of the study are as follows. (1) In order to solve the problem of dehumanization, and the confusion of the sense of value among young adults, we should enrich and cultivate the characters of young adults through the bibliotherapy. So, bibliotherapy for the treatment of human nature of juveniles should be practiced in the juvenile reformatories, schools and societies. (2) The values of reading in the past were inspiration, information and recreation. But, in recent times, the interest in therapeutic value of reading is increasing. (3) Bibliotherapy is a kind of psychotherapy using selected reading materials. A n.0, pplication scopes of bibliotherapy are very wides, including mental medicine, alcoholic poisoning, drug addiction, juvenile delinquency, counselling and education for school life, etc. (4) The principles of bibliotherapy consist of identification, catharsis, insight and it has self therapeutic principles through the reading. The procedures of bibliotherapy is similar to any other kind of psychotherapy: the participant's statement, diagnosis, treatment, continuous recognition of remedial value. (5) The well suited reading materials for bibliotherapy are literature and biography. Literature and biography are familiar to everyone, because they describe the mentalities, emotions and life styles of human beings. (6) The standard reading lists for bibliotherapy for the proper guidance of juvenile delinquency should be prepared for the solution of developmental tasks, such as, drinking, smoking, friendship, family, love, money, marriage, pregnancy, violence, etc. Finally, Bibliotherapy should be introduced to our school settings and corrections institutions for the proper guidance and prevention of the malpractice of the youths. In addition, we should be endeavor to develop the standard reading lists for bibliotherapy and case study.

  • PDF

The New Design Methodology Considering Transistor Layout Variation (트랜지스터 레이아웃 산포를 고려한 새로운 설계 기법)

  • Doh, Ji Seong;Cho, Jun Dong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.234-241
    • /
    • 2012
  • This paper proposes a novel design methodology considering transistor layout variation. The proposed design technique is to improve the transistor's electrical characteristics without performing a circuit simulation to extract transistor layout variation. There are three advantages in the proposed method. Firstly, there is no need to change the normal design flow used in layout designs. Secondly, there is no need to perform simulation in order to extract the transistor layout variation. Thirdly, early warnings in layout design lead to decreasing the number of post layout simulations. Less post layout simulations will decrease the number of iterations in the design cycle and shorten design period. The number of bad transistors in the early design phase were reduced from 17.8% to 2.9% by applying eDRC environment for layout designers to develop Standard Cell Library.

Development and verification of a novel system for computed tomography scanner model construction in Monte Carlo simulations

  • Ying Liu;Ting Meng ;Haowei Zhang ;Qi Su;Hao Yan ;Heqing Lu
    • Nuclear Engineering and Technology
    • /
    • v.54 no.11
    • /
    • pp.4244-4252
    • /
    • 2022
  • The accuracy of Monte Carlo (MC) simulations in estimating the computed tomography radiation dose is highly dependent on the accuracy of CT scanner model. A system was developed to observe the 3D model intuitively and to calculate the X-ray energy spectrum and the bowtie (BT) filter model more accurately in Monte Carlo N-particle (MCNP). Labview's built-in Open Graphics Library (OpenGL) was used to display basic surfaces, and constructive solid geometry (CSG) method was used to realize Boolean operations. The energy spectrum was calculated by simulating the process of electronic shooting and the BT filter model was accurately modeled based on the calculated shape curve. Physical data from a study was used as an example to illustrate the accuracy of the constructed model. RMSE between the simulation and the measurement results were 0.97% and 0.74% for two filters of different shapes. It can be seen from the comparison results that to obtain an accurate CT scanner model, physical measurements should be taken as the standard. The energy spectrum library should be established based on Monte Carlo simulations with modifiable input files. It is necessary to use the three-segment splicing modeling method to construct the bowtie filter model.

A VLSI Design for Digital Pre-distortion with Pipelined CORDIC Processors

  • Park, Jong Kang;Moon, Jun Young;Kim, Kyunghoon;Yang, Youngoo;Kim, Jong Tae
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.14 no.6
    • /
    • pp.718-727
    • /
    • 2014
  • In a wireless communications system, a predistorter is often used to compensate for the nonlinear distortions that result from operating a power amplifier near the saturation region, thereby improving system performance and increasing the spectral efficiency for the communication channels. This paper presents a new VLSI design for the polynomial digital predistorter (DPD). The proposed DPD uses a Coordinate Rotation Digital Computing (CORDIC) processor and a PD process with a fully-pipelined architecture. Due to its simple and regular structure, it can be a competitive design when compared to existing polynomial-type and approximated DPDs. Implementing a fifth-order distorter with the proposed design requires only 43,000 logic gates in a $0.35{\mu}m$ CMOS standard cell library.

A DSP Architecture for High-Speed FFT in OFDM Systems

  • Lee, Jae-Sung;Lee, Jeong-Hoo;SunWoo, Myung-H.;Moh, Sang-Man;Oh, Seong-Keun
    • ETRI Journal
    • /
    • v.24 no.5
    • /
    • pp.391-397
    • /
    • 2002
  • This paper presents digital signal processor (DSP) instructions and their data processing unit (DPU) architecture for high-speed fast Fourier transforms (FFTs) in orthogonal frequency division multiplexing (OFDM) systems. The proposed instructions jointly perform new operation flows that are more efficient than the operation flow of the multiply and accumulate (MAC) instruction on which existing DSP chips heavily depend. We further propose a DPU architecture that fully supports the instructions and show that the architecture is two times faster than existing DSP chips for FFTs. We simulated the proposed model with a Verilog HDL, performed a logic synthesis using the 0.35 ${\mu}m$ standard cell library, and then verified the functions thoroughly.

  • PDF

VR Threat Analysis for Information Assurance of VR Device and Game System (VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석)

  • Kang, Tae Un;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.437-447
    • /
    • 2018
  • Virtual Reality (VR) is becoming a new standard in the game industry. PokeMon GO is a representative example of VR technology. The day after the launch of PokeMon Go in the U.S, It has achieved the highest number of iOS App Store downloads. This is an example of the power of VR. VR comprises gyroscopes, acceleration, tactile sensors, and so on. This allow users could be immersed in the game. As new technologies emerge, new and different threats are created. So we need to research the security of VR technology and game system. In this paper, we conduct a threat analysis for information assurance of VR device (Oculus Rift) and game system (Quake). We systematically analyze the threats (STRIDE, attack library, and attack tree). We propose security measures through DREAD. In addition, we use Visual Code Grepper (VCG) tool to find out logic errors and vulnerable functions in source code, and propose a method to solve them.

A Study of Analysis on the Noise Aspect of School District -A Case Study of Wonju City- (학교주변 소음실태 분석에 관한 연구 -원주지역 학교를 중심으로-)

  • 가종길;이준대
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.3
    • /
    • pp.140-145
    • /
    • 1999
  • In this study, noise analyses were performed toward ten school and one library-building adjacent to road. In particular, noise levels measured in the case-study city were compared to those from environmental noise standard as well as to encouraged noise level. In the analyses, the following conclusions are emphasized in order to make comfortable educational learning environment. 1) When windows were open, the measured noise level of 9 schools exceeded the encouraged noise level. In order to mitigate the exceeded level, it is necessary to plant trees or lawn and install soundproofing wall. 2) When windows were closed, the measured noise level of the most schools showed lower than that of encouraged level. For sound insulation, installing both double window and casement window are required. 3) Schoolhouse's vertical arrangement from the road in order to minimize the expected noise effect, and provision of green space by which visual hiding as well as psychological comfort are presumably achieved.

  • PDF

Automatic Extraction of Dependencies between Web Components and Database Resources in Java Web Applications

  • Oh, Jaewon;Ahn, Woo Hyun;Kim, Taegong
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.2
    • /
    • pp.149-160
    • /
    • 2019
  • Web applications typically interact with databases. Therefore, it is very crucial to understand which web components access which database resources when maintaining web apps. Existing research identifies interactions between Java web components, such as JavaServer Pages and servlets but does not extract dependencies between the web components and database resources, such as tables and attributes. This paper proposes a dynamic analysis of Java web apps, which extracts such dependencies from a Java web app and represents them as a graph. The key responsibility of our analysis method is to identify when web components access database resources. To fulfill this responsibility, our method dynamically observes the database-related objects provided in the Java standard library using the proxy pattern, which can be applied to control access to a desired object. This study also experiments with open source web apps to verify the feasibility of the proposed method.

An Efficient Interpolation Hardware Architecture for HEVC Inter-Prediction Decoding

  • Jin, Xianzhe;Ryoo, Kwangki
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.2
    • /
    • pp.118-123
    • /
    • 2013
  • This paper proposes an efficient hardware architecture for high efficiency video coding (HEVC), which is the next generation video compression standard. It adopts several new coding techniques to reduce the bit rate by about 50% compared with the previous one. Unlike the previous H.264/AVC 6-tap interpolation filter, in HEVC, a one-dimensional seven-tap and eight-tap filter is adopted for luma interpolation, but it also increases the complexity and gate area in hardware implementation. In this paper, we propose a parallel architecture to boost the interpolation performance, achieving a luma $4{\times}4$ block interpolation in 2-4 cycles. The proposed architecture contains shared operations reducing the gate count increased due to the parallel architecture. This makes the area efficiency better than the previous design, in the best case, with the performance improved by about 75.15%. It is synthesized with the MagnaChip $0.18{\mu}m$ library and can reach the maximum frequency of 200 MHz.