• Title/Summary/Keyword: String

Search Result 1,090, Processing Time 0.028 seconds

Development on Improved of LZW Compression Algorithm by Mixed Text File for Embedded System (임베디드시스템을 위한 혼용텍스트 파일의 개선된 LZW 압축 알고리즘 구현)

  • Cho, Mi-Nam;Ji, Yoo-Kang
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.70-76
    • /
    • 2010
  • This paper Extended ELZW(EBCDIC Lempel Ziv Welch) algorithm uses 2 byte prefix field for pointer of a table and 1 byte suffix field for repeat counter. where, a prefix field uses a pointer(index) of compression table and a suffix field uses a counter of overlapping or recursion text data in compression table. To increase compression ratio, after construction of compression table, table data are properly packed as different bit string in accordance with a alphabet, Hangeul, and pointer respectively. Therefore, proposed ELZW algorithm is superior to 1byte LZW algorithm as 5.22 percent and superior to 2byte LZW algorithm as 8.96 percent.

Aerosol Deposition and Behavior on Leaves in Cool-temperate Deciduous Forests. Part 3: Estimation of Fog Deposition onto Cool-temperate Deciduous Forest by the Inferential Method

  • Katata, Genki;Yamaguchi, Takashi;Sato, Haruna;Watanabe, Yoko;Noguchi, Izumi;Hara, Hiroshi;Nagai, Haruyasu
    • Asian Journal of Atmospheric Environment
    • /
    • v.7 no.1
    • /
    • pp.17-24
    • /
    • 2013
  • Fog deposition onto the cool-temperate deciduous forest around Lake Mashu in northern Japan was estimated by the inferential method using the parameterizations of deposition velocity and liquid water content of fog (LWC). Two parameterizations of fog deposition velocity derived from field experiments in Europe and numerical simulations using a detailed multi-layer atmosphere-vegetation-soil model were tested. The empirical function between horizontal visibility (VIS) and LWC was applied to produce hourly LWC as an input data for the inferential method. Weekly mean LWC computed from VIS had a good correlation with LWC sampled by an active string-fog collector. By considering the enhancement of fog deposition due to the edge effect, fog deposition calculated by the inferential method using two parameterizations of deposition velocity agreed with that computed from throughfall data. The results indicated that the inferential method using the current parameterizations of deposition velocity and LWC can provide a rough estimation of water input due to fog deposition onto cool-temperature deciduous forests. Limitations of current parameterizations of deposition velocity related to wind speed, evaporation loss of rain and fog droplets intercepted by tree canopies, and leaf area index were discussed.

Aerosol Deposition and Behavior on Leaves in Cool-temperate Deciduous Forests. Part 2: Characteristics of Fog Water Chemistry and Fog Deposition in Northern Japan

  • Yamaguchi, Takashi;Noguchi, Izumi;Watanabe, Yoko;Katata, Genki;Sato, Haruna;Hara, Hiroshi
    • Asian Journal of Atmospheric Environment
    • /
    • v.7 no.1
    • /
    • pp.8-16
    • /
    • 2013
  • The fog water chemistry and deposition in northern Japan were investigated by fog water and throughfall measurements in 2010. Fog water was sampled weekly by an active-string fog sampler at Lake Mashu from May to November. Throughfall measurements were conducted using rain gauges under three deciduous trees along the somma of the lake from August to October. The mean fog deposition rate (flux) was calculated using throughfall data to estimate the total fog water deposition amount for the entire sampling period. $NH_4{^+}$ and $SO{_4}^{2-}$ were the most abundant cation and anion, respectively, in the fog water samples. A mean pH of 5.08 in the fog water, which is higher than those in rural areas in Japan, was observed. The [$NH_4{^+}$]/[$SO{_4}^{2-}$] equivalent ratio in fog water was larger than 1.0 throughout the study period, indicating that $NH_3$ gas was the primary neutralizing agent for fog water acidity. The mean rate and total amount of fog water deposition were estimated as 0.15 mm $h^{-1}$ and 164 mm, respectively. The amounts of nitrogen and sulfate deposition via fog water deposition were corresponded to those reported values of the annual deposition amounts via rainfall.

Festival Character Creation Guidelines for the Region's Unique Cultural Forms (독창적인 지역문화 형성을 위한 축제캐릭터 제작 가이드라인)

  • Choi, Jung-Youn
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.208-222
    • /
    • 2015
  • Competition among local governments in a competitive global festival and the festival is going to become the intensify regional strategies as enabled by the improved local image production and has been a symbol of the festival and each municipality is competitive. Is required as a symbol for the symbol can be passed to the consumer in this situation differentiated festive images efficient communication studies on the character. When viewed as a symbolic sign for the character representation of activities for the festival, Can provide a logical framework that is distinct from the idea of a character who relies on intuition and the creative semiotics. In this research paper a semiotic analysis of the character and the character string to enhance communication efficiency concept, Festival effect, we analyzed the correlation of the local culture. Empirical analysis of consumer images, Shared on the basis of empirical results to the consumer means, the paper shows that the influence of each of the other factors is reflected in the character according to the signifier local cultural characteristics and a character region on the concept of a character form culture semiotics interpretation element influences the guidelines of the characters that may be produced.

Patient Classification Scheme for Patient Information Management in Hospital U-Healthcare System (병원 의료시설 내 U-Healthcare 환경에서 환자 정보 관리를 위한 환자 세분화 기법)

  • Lee, Ki-Jeong;Park, Sung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • UMSN (Ubiquitous Medical Sensor Network) is being used in u-Healthcare system of various medical facilities to identify objects and get information from sensors in real-time. RFID using radio frequency determines objects using Reader, which reads Tags attached to patients. However, there is a security vulnerability wherein Tag send its ID to illegal Reader because Tags always response to Readers request regarding of its Tag ID. In this paper, we propose Tag ID Classification Scheme to reduce Back-end Server traffic that caused by requests to authenticate between Readers and Tags that are attached to medical devices, patients, and sensors; To reduce security threats like eavesdropping and spoofing that sometimes occurred during authentication procedure. The proposed scheme specifies the patient category as a group based on patients Tag ID string. Only allowed Reader can perform authentication procedure with Back-end Server. As a result, we can reduce Back-end Server traffic and security threats.

Development of a Web-based Adaptive System for Learning Pumping Lemma (펌핑 정리 학습을 위한 웹기반 적응형 시스템 개발)

  • Jung, Hyosook;Min, Kyungsil;Park, Seongbin
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.87-94
    • /
    • 2009
  • This paper presents a Web-based interactive and adaptive learning system that helps students learn the pumping lemma for the family of regular languages. Our system allows the students to proceed with their learning according to their individual differences through Web-Based Instruction and gives them opportunities for the interaction so that they can practice exercise related to the learning and gain feedbacks on the results of the exercises immediately. Especially, the system provides adaptive scaffolding that helps learners understand each step for the proof of the pumping lemma. Unlike existing systems that support learning the pumping lemma, the proposed system defines possible errors in advance and provides appropriate messages for corresponding errors. In addition, the system allows the learners to decompose a string into three parts so that they can understand the pumping lemma precisely.

  • PDF

Generation of Pattern Classifier using LFSRs (LFSR을 이용한 패턴분류기의 생성)

  • Kwon, Sook-Hee;Cho, Sung-Jin;Choi, Un-Sook;Kim, Han-Doo;Kim, Na-Roung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.673-679
    • /
    • 2014
  • The important requirements of designing a pattern classifier are high throughput and low memory requirements, and low cost hardware implementation. A pattern classifier by using Multiple Attractor Cellular Automata(MACA) proposed by Maji et al. reduced the complexity of the classification algorithm from $O(n^3)$ to O(n) by using Dependency Vector(DV) and Dependency String(DS). In this paper, we generate a pattern classifier using LFSR to improve efficiently the space and time complexity and we propose a method for finding DV by using the 0-basic path. Also we investigate DV and the attractor of the generated pattern classifier. We can divide an n-bit DS by m number of $DV_i$ s and generate various pattern classifiers.

Self-Recognition Algorithm of Artificial Immune System (인공면역계의 자기-인식 알고리즘)

  • 심귀보;선상준
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.9
    • /
    • pp.801-806
    • /
    • 2001
  • According as many people use a computer newly, damage of computer virus and hacking is rapidly increasing by the crucial users A computer virus is one of program in computer and has abilities of self reproduction ad destruction like a virus of biology. And hacking is to rob a person's data in a intruded computer and to delete data in a person s computer from the outside. To block hacking that is intrusion of a person s computer and the computer virus that destroys data, a study for intrusion-detection of system and virus detection using a biological immune system is in progress. In this paper, we make a model of positive selection and negative selection of self-recognition process that is ability of T-cytotoxic cell that plays an important part in biological immune system. So we embody a self-nonself distinction algorithm in computer, which is an important part when we detect an infected data by computer virus and a modified data by intrusion from the outside. The composed self-recognition process distinguishes self-file from the changed files. To prove the efficacy of self-recognition algorithm, we use simulation by a cell change and a string change of self file.

  • PDF

A Study on the Shape-Decision Technique of Membrane Structures According to the Design Process and Shape Analysis (건축 설계프로세스와 형상해석을 통한 막 구조물의 형상결정 방안에 관한 연구)

  • Park, Sun-Woo;Kim, Seung-Deog;Shon, Su-Deok;Jeong, Eul-Seok
    • Journal of Korean Association for Spatial Structures
    • /
    • v.7 no.2 s.24
    • /
    • pp.115-124
    • /
    • 2007
  • The initial shape is arrived at by a self-formation process, which accomplishes a form in the natural world, or is determined analytically by considering the equilibrium of initial stress only. Therefore, the self-formation process, which accomplishes a form in the natural world is grasped and the types of modeling techniques available to find the shapes of soft structures are well investigated and classified. To establish a form-finding modeling techniques, the models of string, soap film, fabric, rubber, plaster, and etc. are used. These modeling techniques can be used as a method of understanding the characteristics of structures when the material of model shows similar characteristics. Generally, the model test confirms the structure based on numerical analysis, at the same time it is important preceding process to develop such a program. With the above process, the relationship between model test and numerical analysis becomes a feedback process. Therefore, in this study, two examples which have been accomplished from such a technique are investigated and considered according to modeling process.

  • PDF

Implementation of Portable Visible Light Receiver using USB OTG (USB OTG를 활용한 휴대용 가시광 수신기 구현)

  • Lee, Dae-Hee;Lee, Jong-Sung;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.741-743
    • /
    • 2017
  • The visible light communication is a communication method of outputting binary data based on the illumination threshold value at the light receiving diode of the receiving unit, when the LED of the transmitting unit transmits light. However, separate receiver is necessary to receive the optical signal, there is a problem that a device not equipped with such a receiver can not utilize visible light communication. To solve this problem, this paper proposes a portable visible light receiver applicable to devices using USB OTG. Implemented portable visible light receiver converts the binary data received from the LED into a character string of ASCII code and transmits it to another device. Through data transmission experiments using smart phone confirmed that it is possible to transmit ASCII codes in the proposed method.

  • PDF