• Title/Summary/Keyword: 기술트리

Search Result 970, Processing Time 0.039 seconds

User Adaptation Using User Model in Intelligent Image Retrieval System (지능형 화상 검색 시스템에서의 사용자 모델을 이용한 사용자 적응)

  • Kim, Yong-Hwan;Rhee, Phill-Kyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3559-3568
    • /
    • 1999
  • The information overload with many information resources is an inevitable problem in modern electronic life. It is more difficult to search some information with user's information needs from an uncontrolled flood of many digital information resources, such as the internet which has been rapidly increased. So, many information retrieval systems have been researched and appeared. In text retrieval systems, they have met with user's information needs. While, in image retrieval systems, they have not properly dealt with user's information needs. In this paper, for resolving this problem, we proposed the intelligent user interface for image retrieval. It is based on HCOS(Human-Computer Symmetry) model which is a layed interaction model between a human and computer. Its' methodology is employed to reduce user's information overhead and semantic gap between user and systems. It is implemented with machine learning algorithms, decision tree and backpropagation neural network, for user adaptation capabilities of intelligent image retrieval system(IIRS).

  • PDF

Power and Location Information based Routing Protocol Design in Wireless Sensor Networks (무선 센서 네트워크에서 전력과 위치정보 기반 라우팅 프로토콜 디자인)

  • Son Byung-Rak;Kim Jung-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.2
    • /
    • pp.48-62
    • /
    • 2006
  • In recent years, wireless sensor networks(WSNs) have emerged as a new fast-growing application domain for wireless distributed computing and embedded systems. Recent Progress in computer and communication technology has made it possible to organize wireless sensor networks composed tiny sensor nodes. Furthermore, ad-hoc network protocols do not consider the characteristics of wireless sensor nodes, making existing ad-hoc network protocols unsuitable for the wireless sensor networks. First, we propose power-aware routing protocols based on energy-centered routing metrics. Second, we describe power management techniques for wireless sensor nodes using the spatial locality of sensed data. Many nodes can go into a power-down mode without sacrificing the accuracy of sensed data. Finally, combining the proposed techniques, we describe an overall energy-efficient protocol for data collection. Experimental results show that the proposed routing protocol can extend the routing path lifetime more than twice. The average energy consumption per sensing period is reduced by up to 30%.

  • PDF

Implementation of Prototype for a Protein Motif Prediction and Update (단백질 모티프 예측 및 갱신 프로토 타입 구현)

  • Noh, Gi-Young;Kim, Wuon-Shik;Lee, Bum-Ju;Lee, Sang-Tae;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.845-854
    • /
    • 2004
  • Motif databases are used in the function and structure prediction of proteins. The frequency of use about these databases increases continuously because of protein sequence data growth. Recently, many researches about motif resource integration are proceeding. However, existing motif databases were developed independently, thus these databases have a heterogeneous search result problem. Database intnegration for this problem resolution has a periodic update problem, a complex query process problem, a duplicate database entry handling problem and BML support problem. Therefore, in this paper, we suppose a database resource integration method for these problem resolution, describe periodically integrated database update method and XML transformation. finally, we estimate the implementation of our prototype and a case database.

Analytical Study on Strength Safety of LPG Mini Tank with Column for Level Gauge (레벨게이지용 컬럼을 설치한 LPG 미니탱크의 강도안전성에 관한 해석적 연구)

  • Kim, Chung Kyun
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.3
    • /
    • pp.46-50
    • /
    • 2019
  • In this study, the strength stability of an LPG mini tank with a storage capacity of about 250 kg was analyzed by FEM. According to the results of the FEM analysis, it is preferable that the corner radius of the LPG mini tank having a storage capacity of 250 kg is designed to be 175 to 205 mm. Generally, the larger the corner radius of the end plate of the gas storage tank, the higher the safety of the strength, but the volume or capacity of the tank is reduced. Therefore, it is important to derive the optimum design data. Further, in order to securely design the strength of the gas tank, the thickness of the tank is designed to be thick. However, when the thick steel sheet is used, the material and the transportation costs are increased. The result shows that it is preferable to select the optimum thickness of the steel sheet from 4.5 to 5.5 mm. Using the level gauge type of column on the central axis of the gas tank, the safety strength of the LPG tank can be enhanced as much as twice, compared with the tank of the existing level gauge to measure the liquid level by piercing the side wall of the tank.

A Study on the Power Generation Compared to the Capacity of Power Generation Facilities by Energy Sources in Summer Season (하절기의 에너지원별 발전설비용량 대비 발전량에 관한 연구)

  • Kim, Chung Kyun
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.1
    • /
    • pp.36-40
    • /
    • 2019
  • In this study, we compared the operational rates of natural gas, coal, nuclear power and renewable energy based on the data of power generation and power generation facilities produced in summer season(from June to August) during the last four years(2015~2018). Nuclear power and coal power, which are responsible for basic power generation, were guaranteed to be economical as the actual generation capacity remained 60% higher than the cost of power generation. On the other hand, natural gas generation and new renewable energy generation have a very low actual operation rate of 29.5% and 27.3% compared to investments in power generation facilities, making it difficult to lower the cost of power generation. However, coal generation has structural problems in terms of greenhouse gas, fine dust. On the other hand, natural gas generation is relatively low and even though it is safe, it is difficult to secure economic feasibility as it is bound by a peak power system. Therefore, it is only possible to achieve balanced development of energy sources when there is a change in the development policy.

Optimization Algorithm of Gantry Route Problem for Odd-type Surface Mount Device (이형 부품 표면실장기에 대한 겐트리 경로 문제의 최적 알고리즘)

  • Jeong, Jaewook;Tae, Hyunchul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.67-75
    • /
    • 2020
  • This paper proposes a methodology for gantry route optimization in order to maximize the productivity of a odd-type surface mount device (SMD). A odd-type SMD is a machine that uses a gantry to mount electronic components on the placement point of a printed circuit board (PCB). The gantry needs a nozzle to move its electronic components. There is a suitability between the nozzle and the electronic component, and the mounting speed varies depending on the suitability. When it is difficult for the nozzle to adsorb electronic components, nozzle exchange is performed, and nozzle exchange takes a certain amount of time. The gantry route optimization problem is divided into the mounting order on PCB and the allocation of nozzles and electronic components to the gantry. Nozzle and electronic component allocation minimized the time incurred by nozzle exchange and nozzle-to-electronic component compatibility by using an mixed integer programming method. Sequence of mounting points on PCB minimizes travel time by using the branch-and-price method. Experimental data was made by randomly picking the location of the mounting point on a PCB of 800mm in width and 800mm in length. The number of mounting points is divided into 25, 50, 75, and 100, and experiments are conducted according to the number of types of electronic components, number of nozzle types, and suitability between nozzles and electronic components, respectively. Because the experimental data are random, the calculation time is not constant, but it is confirmed that the gantry route is found within a reasonable time.

Asymmetric Temporal Privilege Management on Untrusted Storage Server (네트워크 스토리지에서 비대칭키 방식의 시 분할 권한 권리 (ATPM))

  • Kim, Euh-Mi;Yoon, Hyo-Jin;Cheon, Jung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.31-42
    • /
    • 2005
  • We consider a network storage model whose administrator can not be fully trusted. In this model, we assume that all data stored are encrypted for data confidentiality and one owner distributes the decryption key for each time period to users. In this paper, we propose three privilege management schemes. In the first scheme, called Temporal Privilege Management (TPM), we use a symmetric encryption based on one-way function chains for key encapsulation. In the second scheme, called Asymmetric Temporal Privilege Management (ATPM), anyone can encrypt the data using the public key of owner, but only privileged users can decrypt the encrypted data. Finally, we present a scheme to restrict writers' privilege using ID-based signatures in ATPM. In our schemes, the privilege managements are based on the time and the addition of users is efficient. Specially, applying TPM and ATPM, we can solve the back-issue problem.

A Study on Scalable Bluetooth Piconet for Secure Ubiquitous (안전한 유비쿼터스를 위한 확장성 있는 블루투스 피코넷에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.13-24
    • /
    • 2005
  • Due to the changes in the wireless information environment, there has been an increased demand for various types of information. Accordingly, many wireless communication technologies have been studied and developed. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new wars of using it. Thus, this research analyzed the vulnerability on the limited number of slaves in a piconet configuration through the current Bluetooth communication and proposed an expanded Bluetooth piconet formation method, regardless of the number of slaves inside the piconet even if it is not configured in a scatternet. In the proposed method, we applied a security service and resolved the vulnerabilities of the current piconet by configuring an expanded form of the current tree-shaped structure.

A Study of Path-based Retrieval for JSON Data Using Suffix Arrays (접미사 배열을 이용한 JSON 데이터의 경로 기반 검색에 대한 연구)

  • Kim, Sung Wan
    • Journal of Creative Information Culture
    • /
    • v.7 no.3
    • /
    • pp.157-165
    • /
    • 2021
  • As the use of various application services utilizing Web and IoT and the need for large amounts of data management expand accordingly, the importance of efficient data expression and exchange scheme and data query processing is increasing. JSON, characterized by its simplicity, is being used in various fields as a format for data exchange and data storage instead of XML, which is a standard data expression and exchange language on the Web. This means that it is important to develop indexing and query processing techniques to effectively access and search large amounts of data expressed in JSON. Therefore, in this paper, we modeled JSON data with a hierarchical structure in a tree form, and proposed indexing and query processing using the path concept. In particular, we designed an index structure using a suffix array widely used in text search and introduced simple and complex path-based JSON data query processing methods.

Design and Implementation of a Blockchain System for Storing BIM Files in a Distributed Network Environment

  • Seo, Jungwon;Ko, Deokyoon;Park, Sooyong;Kim, Seong-jin;Kim, Bum-Soo;Kim, Do Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.159-168
    • /
    • 2021
  • Building Information Modeling (BIM) data is a digitized construction design by worldwide construction design stands rules. Some research are being conducted to utilize blockchain for safe sharing and trade of BIM data, but there is no way to store BIM data directly in the blockchain due to the size of BIM data and technical limitation of the blockchain. In this paper, we propose a method of storing BIM data by combining a distributed file system and a blockchain. We propose two network overlays for storing BIM data, and we also propose generating the Level of Detail (LOD)-based merkle tree for efficient verification of BIM data. In addition, this paper proposes a system design for distributed storage of BIM data by using blockchain besu client and IPFS client. Our system design has a result that the processing speed stably increased despite the increase in data size.