• Title/Summary/Keyword: model checking

Search Result 569, Processing Time 0.023 seconds

Floating Point Converter Design Supporting Double/Single Precision of IEEE754 (IEEE754 단정도 배정도를 지원하는 부동 소수점 변환기 설계)

  • Park, Sang-Su;Kim, Hyun-Pil;Lee, Yong-Surk
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.10
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we proposed and designed a novel floating point converter which supports single and double precisions of IEEE754 standard. The proposed convertor supports conversions between floating point number single/double precision and signed fixed point number(32bits/64bits) as well as conversions between signed integer(32bits/64bits) and floating point number single/double precision and conversions between floating point number single and double precisions. We defined a new internal format to convert various input types into one type so that overflow checking could be conducted easily according to range of output types. The internal format is similar to the extended format of floating point double precision defined in IEEE754 2008 standard. This standard specifies that minimum exponent bit-width of the extended format of floating point double precision is 15bits, but 11bits are enough to implement the proposed converting unit. Also, we optimized rounding stage of the convertor unit so that we could make it possible to operate rounding and represent correct negative numbers using an incrementer instead an adder. We designed single cycle data path and 5 cycles data path. After describing the HDL model for two data paths of the convertor, we synthesized them with TSMC 180nm technology library using Synopsys design compiler. Cell area of synthesis result occupies 12,886 gates(2 input NAND gate), and maximum operating frequency is 411MHz.

Content Insertion Technology using Mobile MMT with CMAF (CMAF 기반 Mobile MMT를 활용한 콘텐츠 삽입 기술)

  • Kim, Junsik;Park, Sunghwan;Kim, Doohwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.25 no.4
    • /
    • pp.560-568
    • /
    • 2020
  • In recent years, as network technology develops, the usage of streaming services by users is increasing. However, the complexity of streaming services is also increasing due to various terminal environments. Even when streaming the same content, it is necessary to re-encode the content according to the type of service. In order to solve the complexity and latency of the streaming service, Moving Picture Experts Group (MPEG) has standardized the Common Media Application Format (CMAF). In addition, as content transmission using a communication network becomes possible, the Republic of Korea's Ultra High Definition (UHD) broadcasting standard has been enacted as a hybrid standard using a broadcasting network and a communication network. The hybrid service enables various services such as transmitting additional information of contents or providing user-customized contents through a communication network. The Republic of Korea's UHD transmission standard utilizes MPEG Media Transport (MMT), and Mobile MMT is an extension of MMT to provide mobile network-specific functions. This paper proposes a method of inserting CMAF contents suitable for various streaming services using signaling messages of MMT and Mobile MMT. In addition, this paper proposes a model for content insertion system in heterogeneous network environment using broadcasting and communication networks, and verifies the validity of the proposed technology by checking the result of content insertion.

A study on the self-evaluation of job performance and creativity of dental hygienists (치과위생사 직무와 개인의 창의성에 의한 자기평가 연구)

  • Hong, Sun-Hwa;Goo, Kyong-Mi
    • Journal of Korean society of Dental Hygiene
    • /
    • v.10 no.6
    • /
    • pp.1037-1048
    • /
    • 2010
  • Objectives : The awareness of health care need increasing attention from the public along with changing professional human-resources activity. As there are increasing social demand for the roles and professionalism of dental hygienists, the purpose of this study was to examine the job performance, creativity and organizational climate of dental hygienists by their own self-diagnostic evaluation in an attempt to help enhance their work ability. Methods : According to the data released as August 2008 by the Dental Association and public health centers in Gwangju, 735 dental hygienists worked at 425 dental clinics. The subjects in this study were 156 dental hygienists at 85 dental clinics who were selected by proportionate sampling method from among the dental hygienists. After an interview survey was conducted in person, the answer sheets from 132 respondents were analyzed except 24 incomplete ones. The questionnaire used in this study consisted of 49 items. A five-point Likert scale was used and SPSS 12.0 program was analyzed the data. Results : 1. As a result of checking the types of works, treatment cooperation(54%), and oral health education often(45%), They weren't responsible for preventive treatment(42%). 2. When they made a self-diagnostic evaluation of creativity and organizational climate, they put the highest value on their autonomy(2.21), followed by positive attitude(2.10). Out of seven organizational climate, challenging spirits(2.81) ranked highest, followed by reliability(2.66). 3. Major management eopmubyeol individual creativity compared with three business relationships and a positive attitude in the case of the high group received oral health education and care management services in a group doing the most was General office work and office assistance work in the medical assistance group that was doing business primarily. 4. In the relationship between self-assesment score and three performance duties, Positive difference was noted in the group with positive attitude and elevated autonomy in terms of performing oral health education. Conclusions : As a result, individual creativity and organization of the atmosphere, each detail, through analysis of the self-assessment model, developed guide on the investigation by doing a dental hygienist, a unique business promotion and Enlargement of the study suggested the need to be considered is.

Vehicle Headlight and Taillight Recognition in Nighttime using Low-Exposure Camera and Wavelet-based Random Forest (저노출 카메라와 웨이블릿 기반 랜덤 포레스트를 이용한 야간 자동차 전조등 및 후미등 인식)

  • Heo, Duyoung;Kim, Sang Jun;Kwak, Choong Sub;Nam, Jae-Yeal;Ko, Byoung Chul
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.282-294
    • /
    • 2017
  • In this paper, we propose a novel intelligent headlight control (IHC) system which is durable to various road lights and camera movement caused by vehicle driving. For detecting candidate light blobs, the region of interest (ROI) is decided as front ROI (FROI) and back ROI (BROI) by considering the camera geometry based on perspective range estimation model. Then, light blobs such as headlights, taillights of vehicles, reflection light as well as the surrounding road lighting are segmented using two different adaptive thresholding. From the number of segmented blobs, taillights are first detected using the redness checking and random forest classifier based on Haar-like feature. For the headlight and taillight classification, we use the random forest instead of popular support vector machine or convolutional neural networks for supporting fast learning and testing in real-life applications. Pairing is performed by using the predefined geometric rules, such as vertical coordinate similarity and association check between blobs. The proposed algorithm was successfully applied to various driving sequences in night-time, and the results show that the performance of the proposed algorithms is better than that of recent related works.

Social Identity Threat and Across-Domain Compensatory Consumption Intention (사회적 아이덴티티의 위협과 영역 외 보상소비의도)

  • CHOI, Nak-Hwan
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.11
    • /
    • pp.35-47
    • /
    • 2019
  • Purpose: Current study focused on investigating the effects of the self-dissociation as a thought in which consumers dis-identify or dissociate with the threatened in-group and the escapism as a tendency of consumers' distracting themselves and avoiding their thoughts about the in-group under severe but adoptable criticism by turning their attention elsewhere on across-domain compensatory consumption intention. And It explored not only the positive roles of undesirability thought against the in-group in consumers' forming the self-dissociation and the escapism, but also the effects of negative emotion to the in-group felt at the place of being exposed to the criticism against the in-group on the escapism. Research design, data, and methodology: The experiment was performed with the in-group-threatening single factor within-subject design. Questionnaire data were collected from 196 undergraduate students, and the data were used to testing research hypotheses by structural equation model of Amos 21.0. Results: First, both the self-dissociation of consumers' dis-identifying with the in-group criticized severely by others and the escapism of their deliberately directing their thoughts and distracting their attention away from thinking the in-group positively influenced on the across-domain compensatory consumption intention. Second, the negative emotion positively influenced on the escapism. Third, the undesirability thought to the in-group under the severe criticism positively effected on the self-dissociation as well as the escapism. Putting in the nutshell, the findings of this study are consistent with the idea that consumers can overcome the negative self-discrepancy on one dimension of their social identity by distracting themselves and avoiding thinking about the threatened in-group to find meaning on another dimension which might lead them to the place of doing the across-domain compensatory consumption. Conclusions - Focusing on the results of this study, checking which aspects of consumers' social identity are linked to products or brands is at issue to marketers when the consumers are faced with the criticism against the in-group. The marketers should build the messages about their products or brand not related to the checked aspects, and communicate the messages, to lead the consumers to the place of doing the across-domain compensatory consumption by their products or brands.

Lane Detection in Complex Environment Using Grid-Based Morphology and Directional Edge-link Pairs (복잡한 환경에서 Grid기반 모폴리지와 방향성 에지 연결을 이용한 차선 검출 기법)

  • Lin, Qing;Han, Young-Joon;Hahn, Hern-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.6
    • /
    • pp.786-792
    • /
    • 2010
  • This paper presents a real-time lane detection method which can accurately find the lane-mark boundaries in complex road environment. Unlike many existing methods that pay much attention on the post-processing stage to fit lane-mark position among a great deal of outliers, the proposed method aims at removing those outliers as much as possible at feature extraction stage, so that the searching space at post-processing stage can be greatly reduced. To achieve this goal, a grid-based morphology operation is firstly used to generate the regions of interest (ROI) dynamically, in which a directional edge-linking algorithm with directional edge-gap closing is proposed to link edge-pixels into edge-links which lie in the valid directions, these directional edge-links are then grouped into pairs by checking the valid lane-mark width at certain height of the image. Finally, lane-mark colors are checked inside edge-link pairs in the YUV color space, and lane-mark types are estimated employing a Bayesian probability model. Experimental results show that the proposed method is effective in identifying lane-mark edges among heavy clutter edges in complex road environment, and the whole algorithm can achieve an accuracy rate around 92% at an average speed of 10ms/frame at the image size of $320{\times}240$.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

A Study on the Relationship between Learning Orientation and Creative Thinking Skill - moderated mediating effect of expertise and motivation - (학습지향성과 창의적 사고능력의 관계에 관한 연구 - 전문지식과 동기의 조절된 매개효과 -)

  • Kim, Hyun-Woo;Song, Chan-Sub;Lee, Da-Jung;Shin, Ho-Kyun
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.171-179
    • /
    • 2019
  • This study was to identify the influence of knowledge acquisition on creativity in an organization. We selected the learning orientation among variables related to the acquisition of knowledge and analyzed the moderating effects of motivation in the mediating process of learning orientation, professional knowledge, creative thinking ability, and the relationship between them. To this end, a research model and hypothesis were established through literature studies, and 296 questionnaires were distributed and collected from Daegu and Gyeongbuk to test hypotheses. As a result of the verification through hierarchical regression analysis, it was confirmed that learning orientation has a positive effect on creative thinking skill, and expertise has a mediating effect. And in this mediation relationship, the moderating effect of motivation was confirmed. These findings are suggestive by checking the relationship between the elements in the expression of creativity in detail and identifying the influence of learning orientation. It will be able to provide guidelines for organizational management by explaining the process of creativity through the development of knowledge.

Scenario-Driven Verification Method for Completeness and Consistency Checking of UML Object-Oriented Analysis Model (UML 객체지향 분석모델의 완전성 및 일관성 진단을 위한 시나리오기반 검증기법)

  • Jo, Jin-Hyeong;Bae, Du-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.3
    • /
    • pp.211-223
    • /
    • 2001
  • 본 논문에서 제안하는 시나리오기반 검증기법의 목적은 UML로 작성된 객체지향 분석모델의 완전성 및 일관성을 진단하는 것이다. 검증기법의 전체 절차는 요구분석을 위한 Use Case 모델링 과정에서 생성되는 Use Case 시나리오와 UML 분석모델로부터 역공학적 방법으로 도출된 객체행위 시나리오와의 상호참조과정 및 시나리오 정보트리 추적과정을 이용하여 단계적으로 수행된다. 본 검증절차를 위하여 우선, UML로 작성된 객체지향 분석모델들은 우선 정형명세언어를 사용하여 Use Case 정형명세로 변환하다. 그 다음에, Use Case 정형명세로부터 해당 Use Case 내의 객체의 정적구조를 표현하는 시나리오 정보트리를 구축하고, Use Case 정형명세 내에 포함되어 있는 객체 동적행위 정보인 메시지 순차에 따라 개별 시나리오흐름을 시나리오 정보트리에 표현한다. 마지막으로 시나리오 정보트리 추적과 시나리오 정보 테이블 참조과정을 중심으로 완전성 및 일관성 검증작업을 수행한다. 즉, 검증하고자 하는 해당 Use Case의 시나리오 정보트리를 이용한 시나리오 추적과정을 통해 생성되는 객체행위 시나리오와 요구분석 과정에서 도출되는 Use Case 시나리오와의 일치여부를 조사하여 분석모델과 사용자 요구사양과의 완전성을 검사한다. 그리고, 시나리오 추적과정을 통해 수집되는 시나리오 관련종보들을 가지고 시나리오 정보 테이블을 작성한 후, 분석과정에서 작성된 클래스 관련정보들의 시나리오 포함 여부를 확인하여 분석모델의 일관성을 검사한다. 한편, 본 논문에서 제안하는 검증기법의 효용성을 증명하기 위해 대학의 수강등록시스템 개발을 위해 UML을 이용해 작성된 분석모델을 특정한 사례로써 적용하여 보았다. 프로세싱 오버헤드 및 메모리와 대역폭 요구량 측면에서 MARS 모델보다 유리함을 알 수 있었다.과는 본 논문에서 제안된 프리페칭 기법이 효율적으로 peak bandwidth를 줄일 수 있다는 것을 나타낸다.ore complicate such a prediction. Although these overestimation sources have been attacked in many existing analysis techniques, we cannot find in the literature any description about questions like which one is most important. Thus, in this paper, we quantitatively analyze the impacts of overestimation sources on the accuracy of the worst case timing analysis. Using the results, we can identify dominant overestimation sources that should be analyzed more accurately to get tighter WCET estimations. To make our method independent of any existing analysis techniques, we use simulation based methodology. We have implemented a MIPS R3000 simulator equipped with several switches, each of which determines the accuracy level of the

  • PDF

A Study on Automated Fake News Detection Using Verification Articles (검증 자료를 활용한 가짜뉴스 탐지 자동화 연구)

  • Han, Yoon-Jin;Kim, Geun-Hyung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.569-578
    • /
    • 2021
  • Thanks to web development today, we can easily access online news via various media. As much as it is easy to access online news, we often face fake news pretending to be true. As fake news items have become a global problem, fact-checking services are provided domestically, too. However, these are based on expert-based manual detection, and research to provide technologies that automate the detection of fake news is being actively conducted. As for the existing research, detection is made available based on contextual characteristics of an article and the comparison of a title and the main article. However, there is a limit to such an attempt making detection difficult when manipulation precision has become high. Therefore, this study suggests using a verifying article to decide whether a news item is genuine or not to be affected by article manipulation. Also, to improve the precision of fake news detection, the study added a process to summarize a subject article and a verifying article through the summarization model. In order to verify the suggested algorithm, this study conducted verification for summarization method of documents, verification for search method of verification articles, and verification for the precision of fake news detection in the finally suggested algorithm. The algorithm suggested in this study can be helpful to identify the truth of an article before it is applied to media sources and made available online via various media sources.