• Title/Summary/Keyword: the methods of connection

Search Result 1,367, Processing Time 0.029 seconds

A Character Shape Encoding Method to Input Chinese Characters in Old Documents (고문헌 벽자(僻字) 입력을 위한 한자 자형 부호화 방법)

  • Kim, Kiwang
    • Journal of Korean Medical classics
    • /
    • v.32 no.1
    • /
    • pp.105-116
    • /
    • 2019
  • Objectives : There are many secluded Chinese characters - so called Byeokja (僻字) in ancient classic literature, and Chinese characters that are not registered in Unicode and Variant characters (heterogeneous characters) that cannot be found in the current font sets often appear. In order to register all possible Chinese characters including such characters as units of information exchange, this study attempts to propose a method to encode the morphological information of Chinese characters according to certain rules. Methods : This study suggests the methods to encode the connection between the nodules constituting the Chinese character and the coordinates of the nodules. In addition to that, rules for expressing information about curves, expressions of aspect ratios of characters, rules for minimizing coordinate lines, and rules for expressing aggregation status of character components are added. Results : Through the proposed method, it is possible to generate codes of a certain length by extracting only information expressing the morphological configuration of characters. Conclusions : The method of character encoding proposed in this study can be used to distinguish variant characters with small variations in Byeokja, new Chinese characters and character strokes and to store and search them.

Heat Demand Forecasting for Local District Heating (지역 난방을 위한 열 수요예측)

  • Song, Ki-Burm;Park, Jin-Soo;Kim, Yun-Bae;Jung, Chul-Woo;Park, Chan-Min
    • IE interfaces
    • /
    • v.24 no.4
    • /
    • pp.373-378
    • /
    • 2011
  • High level of accuracy in forecasting heat demand of each district is required for operating and managing the district heating efficiently. Heat demand has a close connection with the demands of the previous days and the temperature, general demand forecasting methods may be used forecast. However, there are some exceptional situations to apply general methods such as the exceptional low demand in weekends or vacation period. We introduce a new method to forecast the heat demand to overcome these situations, using the linearities between the demand and some other factors. Our method uses the temperature and the past 7 days' demands as the factors which determine the future demand. The model consists of daily and hourly models which are multiple linear regression models. Appling these two models to historical data, we confirmed that our method can forecast the heat demand correctly with reasonable errors.

A Self-Reconfigurable System of Contents among Smart Devices

  • Ren, Hao;Kim, Paul;Kim, Sangwook
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.223-232
    • /
    • 2015
  • In this system, mobile devices are not independent, they can communicate with each other, one device's change can affect the whole system or other devices. To achieve the above mentioned A Self-Reconfigurable System of Contents, through discover the device and connect process, to establish the connection between the mobile devices. After user assigns two dimension display type, the user can select content to input the system, contents are portioning and broadcast to devices. The system can self-reconfigure contents rapidly and exactly. This technique supports contents self-reconfiguration for devices remove, addition and position exchange. In this paper, when the user uses the hand contacts device, the device sends a signal to assist the system to detection device's position. The system does not need to get accurate devices moving direction, just according to all changed devices position to judge where the devices destination is. This research develops an application according to this technique, and the real machine tests the application using Android platform. Some communication protocols and mathematical modeling methods are proposed. These methods can also be used in other Internet of Things (IoT) fields, such as Drones Navigation, Smart Home, and Informational City management.

Predicting Urban Tourism Flow with Tourism Digital Footprints Based on Deep Learning

  • Fangfang Gu;Keshen Jiang;Yu Ding;Xuexiu Fan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1162-1181
    • /
    • 2023
  • Tourism flow is not only the manifestation of tourists' special displacement change, but also an important driving mode of regional connection. It has been considered as one of significantly topics in many applications. The existing research on tourism flow prediction based on tourist number or statistical model is not in-depth enough or ignores the nonlinearity and complexity of tourism flow. In this paper, taking Nanjing as an example, we propose a prediction method of urban tourism flow based on deep learning methods using travel diaries of domestic tourists. Our proposed method can extract the spatio-temporal dependence relationship of tourism flow and further forecast the tourism flow to attractions for every day of the year or for every time period of the day. Experimental results show that our proposed method is slightly better than other benchmark models in terms of prediction accuracy, especially in predicting seasonal trends. The proposed method has practical significance in preventing tourists unnecessary crowding and saving a lot of queuing time.

A Study on the Expression by Anamorphose Phenomenon (아나모르포즈(anamorphose)지각현상에 의한 공간 표현 연구)

  • Lee, Jeong-Yoon;Kim, Kai-Chun
    • Korean Institute of Interior Design Journal
    • /
    • v.23 no.4
    • /
    • pp.63-71
    • /
    • 2014
  • Anamorphosis is highly favored in modern days as the atmosphere of pursuing unusual manners is growing while transformation and distortion of images are freely available. This research is to understand the affect of these distorted images on space designs and the close connection between anamorphosis and visual perceptions, and to identify the new perceptual phenomenon created through it, and the methods of expressing those. Four expressional methods were defined through the process of studying Anamorphosis based on its definition by Niceron, examining artworks such as paintings and photographs, and case-studying example spaces of visual perception experiments. Expressing anamorphosis through visual perceptions are broadly categorized to directional, dimensional, flatness, and optical. The analysis of 10 case projects suggests that the experimental spaces offer joys of finding and interpreting metaphorical forms and meanings caused by the four characteristic categories above. Also, they artificially show the boundaries between reality and virtual spaces in 2-dimensional or 3-dimensional spaces, and form hyper-boundaries, new experience, and an internal mechanism that is vague and chaotic. Therefore, this research concludes that anamorphosis which is a distorted perspective, is not only a simple measure to overcome perspectival errors, but is an existence suitable to the current era, that will extend its potential and value in spatial design.

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

A Study on Cause-and-Effect Analysis between the Environmental Factors of Residential Area at the University Dormitory and the User Satisfaction (대학 기숙사 주거기능영역의 환경인자와 사용자 만족도의 인과분석 연구)

  • Park, Hang-Ja;No, Young-Ran;Park, Sung-Jin
    • Korean Institute of Interior Design Journal
    • /
    • v.17 no.5
    • /
    • pp.141-149
    • /
    • 2008
  • This study aims to understand functional spaces within university dormitory, examine the influences of residential environment factors and personal characteristics on users' satisfaction through what parameters and probability among these parameters and seek improvement methods for dormitory users to live at dormitory as the best residential space through causal analysis of residential space uses at university dormitory based on such a probability. Research methods include theoretical research of architectural space characteristics of university dormitory facilities through literature survey, analysis of satisfaction with spaces and their uses through questionnaire and causal analysis of each residential environment factor after making route model using data obtained from the results of analysis. The results of this study are as follows. Factors affecting residents' satisfaction with cultural activities of residential environment factors are safety, territoriality, interior finishing and complexity and those affecting residents' educational activities are safety and amenity of space. Residential function space of university dormitory must have spatial planning that social activities including individual and small group culture and educational activities from the view of spatial territoriality and flexibility based on safety and amenity and facilities related to continuity and connection of common space and unit residential space should be decentralized rather than centralized.

Analysis of Secure Remote Access to Virtual Private Home Network with L2TP Tunneling methods (L2TP tunneling 방법을 기반으로 한 가설 사설망의 보안 원격 접속분석)

  • Basukala, Roja Kiran;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2188-2194
    • /
    • 2008
  • Home network is the connection and communication of several electronic and electrical devices at hone with the integration of several technologies like Ethernet, wireless, phone line and power-line at the residential gateway to the internet. This internet based home network can be accessed from any part of the world through any device by any poison via internet. Since home network is developed for comfortable and safe life of home users, the information flow to/from home network needs to be private. Hence the remote access of the home network must be secured. This paper analyses two secure tunneling methods, voluntary and compulsory for L2TP(Layer Two Tunneling Protocol) based VPN(Virtual Private Network) for secure remote access of the home network.

Performance analysis of cache strategy for signaling traffic management in wireless ATM network (무선 ATM망에서 신호 트래픽 관리를 위한 기억공간 적재기법의 성능분석)

  • 최기무;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.7
    • /
    • pp.1639-1649
    • /
    • 1998
  • For mobile multimedia services, wireless ATM(Asynchronous transfer Mode) network is studied actively. In wireless ATM network, the existing signaling protocols generate heavy traffics for HLR due to the centralized structure that all signaling loads mush be handled in HLR(Home Location Register). Also, centralized structure causes critical connection setup delays. Thus, it is important that wireless ATM reduces the connection setup delays occurred due to high traffic loads of signaling based on distributed processing. In this thesis, we propose a cache strategy for call delivery as well as the cache updates of registration based on ATM multicasting and compares the cost of cache scheme with that of conventional scheme. Our study shows that cache scheme has better performance than the conventional methods in the case that the portable mobility is low and traffic density is large.

  • PDF

Computer Programming Curriculum and Teaching Method in Connection with Mathematics Education System in the Elementary and Secondary Schools (초.중등학교에서 수학교육체계와 연계된 컴퓨터 프로그래밍 교육과정과 교수방법)

  • Park, Young-Mi;Yoo, Kwan-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.116-127
    • /
    • 2008
  • In the $7^{th}$ education curriculum, computer education curriculum in the elementary and secondary schools is composited into the contents for the use of computers so that there are some limitations in teaching students the abilities for solving various problems of several areas using computers. Recently, the research has done to change the computer education curriculum for enhancing creativity and problem solving ability required by the future education. The contents of the main subject for enhancing them is of computer programming, however, there was not enough research on systematic programming education curriculum for leading to motivating learners and enhanced knowledge transfer to those learners. In this paper, we analysis the contents mathematics education curriculum with consecutive contents and in tight connection with computer education and then extract its programming related elements. Based on those, we propose a programming education curriculum with which we can teach systematically computer programing according to continual and systematic guidance in the elementary and secondary schools. And we develop a teaching model and learning guidance for teaching students programming methods with the computer programming education curriculum proposed in this paper.