• Title/Summary/Keyword: mapping table

Search Result 227, Processing Time 0.024 seconds

A Text Processing Method for Devanagari Scripts in Andriod (안드로이드에서 힌디어 텍스트 처리 방법)

  • Kim, Jae-Hyeok;Maeng, Seung-Ryol
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.560-569
    • /
    • 2011
  • In this paper, we propose a text processing method for Hindi characters, Devanagari scripts, in the Android. The key points of the text processing are to device automata, which define the combining rules of alphabets into a set of syllables, and to implement a font rendering engine, which retrieves and displays the glyph images corresponding to specific characters. In general, an automaton depends on the type and the number of characters. For the soft-keyboard, we designed the automata with 14 consonants and 34 vowels based on Unicode. Finally, a combined syllable is converted into a glyph index using the mapping table, used as a handle to load its glyph image. According to the multi-lingual framework of Freetype font engine, Dvanagari scripts can be supported in the system level by appending the implementation of our method to the font engine as the Hindi module. The proposed method is verified through a simple message system.

Assembling Disjoint Korean Syllables Using Two-Step Rules (2단계 규칙을 이용한 해체된 한글 음절의 결합)

  • Lee, Joo-Ho;Kim, Hark-Soo
    • Korean Journal of Cognitive Science
    • /
    • v.19 no.3
    • /
    • pp.283-295
    • /
    • 2008
  • With increasing usages of a messenger and a SMS, many young people are habitually using a new-style of sentences with intentionally disjoint Korean syllables. To develop a natural language interface system in these environments, we should first develop a technique that converts a sequence of disjoint Korean syllables to a correct sentence. Therefore, we propose a method to assemble a sequence of disjoint Korean syllables into a correct sentence by using two-step rules. In the first step, the proposed method assembles CVC (consonant-vowel-consonant) forms of simple-disjoint Korean syllables by using manual heuristic rules. In the second step, the proposed method assembles CCVCC forms of double-disjoint Korean syllables by using a mapping table and a transformation-based learning technique. In the experiment, the proposed method showed the perfect precision of 100% in assembling simple-disjoint Korean syllables and the high precision of 99.98% in assembling double-disjoint Korean syllables.

  • PDF

A Method based on Ontology for detecting errors in the Software Design (온톨로지 기반의 소프트웨어 설계에러검출방법)

  • Seo, Jin-Won;Kim, Young-Tae;Kong, Heon-Tag;Lim, Jae-Hyun;Kim, Chi-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2676-2683
    • /
    • 2009
  • The objective of this thesis is to improve the quality of a software product based on the enhancement of a software design quality using a better error detecting method. Also, this thesis is based on a software design method called as MOA(Methodology for Object to Agents) which uses an ontology based ODES(A Method based on Ontology for Detecting Errors in the Software Design) model as a common information model. At this thesis, a new format of error detecting method was defined. The method is implemented during a transformation process from UML model to ODES model using a ODES model, a Inter-View Inconsistency Detection technique and a combination of ontologic property of consistency framework and related rules. Transformation process to ODES model includes lexicon analysis and meaning analysis of a software design using of multiple mapping table at algorithm for the generation of ODES model instance.

A File Recovery Technique for Digital Forensics on NAND Flash Memory (NAND 플래시 메모리에서 디지털 포렌식을 위한 파일 복구기법)

  • Shin, Myung-Sub;Park, Dong-Joo
    • Journal of KIISE:Databases
    • /
    • v.37 no.6
    • /
    • pp.292-299
    • /
    • 2010
  • Recently, as flash memory is used as digital storage devices, necessity for digital forensics is growing in a flash memory area for digital evidence analysis. For this purpose, it is important to recover crashed files stored on flash memory efficiently. However, it is inefficient to apply the hard disk based file recovery techniques to flash memory, since hard disk and flash memory have different characteristics, especially flash memory being unable to in-place update. In this paper, we propose a flash-aware file recovery technique for digital forensics. First, we propose an efficient search technique to find all crashed files. This uses meta-data maintained by FTL(Flash Translation Layer) which is responsible for write operation in flash memory. Second, we advise an efficient recovery technique to recover a crashed file which uses data location information of the mapping table in FTL. Through diverse experiments, we show that our file recovery technique outperforms the hard disk based technique.

Generation of Hot Patent and it's Statistical Analysis (Hot Patent생성과 통계적 분석)

  • Kwon, Oh-Jin;Noh, Kyung-Ran;Lee, Bang-Rae;Hong, Sung-Hwa
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.294-299
    • /
    • 2009
  • The studies were conducted constantly to detect emerging technology, in order to make sustainable growth of business and to make development of future nations. But there were many controversies because definition of emerging technology might be dependent of the subject's viewpoint and because it might be different to a point of time that emerging technology is applied to the present or the future. This paper sets times of emerging technology to the present and defines emerging technology as patents significantly used in developing current technology. US Patents and patent citation data were gathered from 1976 to 2007. We constructed hot patents pools that were utilized actively in developing new technologies regardless of times. We built a mapping table from IPC classification code to WIPO 32 technology category and analysed a half-life cycle according to specific technology groups.

  • PDF

Study on the New Re-identification Process of Health Information Applying ISO TS 25237 (ISO TS 25237을 적용한 보건의료정보의 새로운 재식별 처리에 관한 연구)

  • Kim, Soon Seok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.25-36
    • /
    • 2019
  • With the development of information and communication technology, hospitals that electronically process and manage medical information of patients are increasing. However, if medical information is processed electronically, there is still room for infringing personal information of the patient or medical staff. Accordingly, in 2017, the International Organization for Standardization (ISO) published ISO TS 25237 Health Information - Pseudonymization[1]. In this paper, we examine the re - identification process based on ISO TS 25237, the procedure and the problems of our proposed method. In addition, we propose a new processing scheme that adds a re-identification procedure to our secure differential privacy method [2] by keeping a mapping table between de-identified data sets and original data as ciphertext. The proposed method has proved to satisfy the requirements of ISO TS 25237 trust service providers except for some policy matters.

DNA Information Hiding Method for DNA Data Storage (DNA 데이터 저장을 위한 DNA 정보 은닉 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.118-127
    • /
    • 2014
  • DNA data storage refers to any technique for storing massive digital data in base sequence of DNA and has been recognized as the future storage medium recently. This paper presents an information hiding method for DNA data storage that the massive data is hidden in non-coding strand based on DNA steganography. Our method maps the encrypted data to the data base sequence using the numerical mapping table and then hides it in the non-coding strand using the key that consists of the seed and sector length. Therefore, our method can preserve the protein, extract the hidden data without the knowledge of host DNA sequence, and detect the position of mutation error. Experimental results verify that our method has more high data capacity than conventional methods and also detects the positions of mutation errors by the parity bases.

Development of Landslide Hazard Map Using Environmental Information System: Case on the Gyeongsangbuk-do Province (환경정보시스템을 이용한 산사태 발생위험 예측도 작성: 경상북도를 중심으로)

  • Bae, Min-Ki;Jung, Kyu-Won;Park, Sang-Jun
    • Journal of Environmental Science International
    • /
    • v.18 no.11
    • /
    • pp.1189-1197
    • /
    • 2009
  • The purpose of this research was develop tailored landslide hazard assessment table (LHAT) in Gyeongsangbuk-do Province and propose building strategies on environmental information system to estimate landslide hazard area according to LHAT. To accomplish this purpose, this research investigated factors occurring landslide at 172 landslide occurred sites in 23 city and county of Gyeongsangbuk-do Province and analyzed what factors effected landslide occurrence quantity using the multiple statistics of quantification method(I). The results of analysis, factors affecting landslide occurrence quantity were shown in order of slope position, slope length, bedrock, aspect, forest age, slope form and slope. And results of the development of LHAT for predict mapping of landslide-susceptible area in Gyeongsangbuk-do Province, total score range was divided that 107 under is stable area(IV class), 107~176 is area with little susceptibility to landslide(III class), 177~246 is area with moderate susceptibility to landslide(II class), above 247 area with severe susceptibility to landslide(I class). According to LHAT, this research built landslide attribute database and made 7 digital theme maps at mountainous area located in Goryeong Gun, Seongju-Gun, and Kimcheon-City. The results of prediction on degree of landslide hazard using environmental information system, area with little susceptibility to landslide(III class) occupied 65.56% and severe susceptibility to landslide(I class) occupied 0.51%.

Production of A Plane Figure of Campus with RTK GPS and TS (RTK GPS측량과 토탈스테이션에 의한 교내 평면도 제작)

  • Lee, In-Su;Lee, Kee-Boo;Park, Woon-Yong
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.10 no.4 s.22
    • /
    • pp.69-76
    • /
    • 2002
  • Nowadays information is very important for Civil Engineering. This information is acquiredmostly via Surveying & Geo-spatial Information System. Also this information is close to the ITS(Intelligent Transformation System), Navigation, Facility Management, and Digital Mapping, etc and applicable to versatile fields from now on. And in surveying fields, GPS satellites are introduced newly and play a great rules. In this study, RTK(Real-Time Kinematic GPS), one of the positioning technology with GPS satellites, is used for the production of Plane Figure of Campus. The results shows that it is possible to extract the information for some part of a flowerbed and road, but not so for the buildings surrounded. Therefore this give occasion to the a lowering of work effectiveness over the total work-flow. So at such a time, it will be expected that the supplementary systems such TS(Total Station), Plane-table, and theodolite, etc have to be used.

  • PDF

Design and Implementation of Conversion System Between ISO/IEC 10646 and Multi-Byte Code Set (ISO/IEC 10646과 멀티바이트 코드 세트간의 변환시스템의 설계 및 구현)

  • Kim, Chul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.319-324
    • /
    • 2018
  • In this paper, we designed and implemented a code conversion method between ISO/IEC 10646 and the multi-byte code set. The Universal Multiple-Octet Coded Character Set(UCS) provides codes for more than 65,000 characters, huge increase over ASCII's code capacity of 128 characters. It is applicable to the representation, transmission, interchange, processing, storage, input and presentation of the written form of the language throughout the world. Therefore, it is so important to guide on code conversion methods to their customers during customer systems are migrated to the environment which the UCS code system is used and/or the current code systems, i.e., ASCII PC code and EBCDIC host code, are used with the UCS together. Code conversion utility including the mapping table between the UCS and IBM new host code is shown for the purpose of the explanation of code conversion algorithm and its implementation in the system. The programs are successfully executed in the real system environments and so can be delivered to the customer during its migration stage from the UCS to the current IBM code system and vice versa.