• Title/Summary/Keyword: 변환 규칙

Search Result 449, Processing Time 0.03 seconds

CMOS Integrated Fingerprint Sensor Based on a Ridge Resistivity (CMOS공정으로 집적화된 저항형 지문센서)

  • Jung, Seung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.571-574
    • /
    • 2008
  • In this paper, we propose $256{\times}256$ pixel array fingerprint sensor with an advanced circuits for detecting. The pixel level simple detection circuit converts from a small and variable sensing current to binary voltage out effectively. We minimizes an electrostatic discharge(ESD) influence by applying an effective isolation structure. The sensor circuit blocks were designed and simulated in standard CMOS $0.35{\mu}m$ process. Full custom layout is performed in the unit sensor pixel and auto placement and routing is performed in the full chip.

  • PDF

Design of Fuzzy System for Decision of Arrhythmia using Wavelet Coefficients (웨이브렛 계수를 이용한 부정맥 판정용 퍼지시스템 설계)

  • Kim, Min-Soo;Seo, Hee-Don
    • Journal of Sensor Science and Technology
    • /
    • v.11 no.4
    • /
    • pp.230-238
    • /
    • 2002
  • In this paper, we designed a fuzzy system using the wavelet coefficients to detection the PVCs effectively and to increase the accuracy of decision of the arrhythmia. In the proposed Fuzzy system, the QRS complex of ECG signal is divided into 6th level frequence bands by wavelet transform using Haar wavelet. The MIT/BIH database for the source of input signal is used in order to evaluate the performance of the proposed system. From the simulation results, the decision of membership functions for PVCs and heart rates by using Fuzzy rules, we detected the abnormal values effectively by application of leaned from neural network and we also found results in classification ratio of 95% the decision of arrhythmia.

A CAD/CAM System for Blanking or Piercing of Irregular Shaped-Sheet Metal Products (불규칙형상 박판제품의 블랭킹 및 피어싱용 CAD/CAM 시스템)

  • 최재찬;김철;박상봉
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.15 no.8
    • /
    • pp.174-182
    • /
    • 1998
  • This paper describes a research work of developing a computer-aided design and machining of irregular shaped-sheet metal product for blanking or piercing operation. An approach to the CAD/CAM system is based on the knowledge-based rules. Knowledge for the CAD/CAM system is formulated from plasticity theories, experimental results and the empirical knowledge of field experts. The system has been written in AutoLISP on the AutoCAD and in customer tool kit on the SmartCAM with a personal computer and is composed of nine modules, which are input and shape treatment, flat pattern-layout, production feasibility check, blank-layout, strip-layout, die-layout, data conversion, modelling, and post-processor module. Based on knowledge-based rules, the system is designed by considering several factors, such as material and thickness of product, complexities of blank geometry and punch profile, diameter and material of a wire, and availability of press. This system is capable of generating NC data automatically according to drawings of die-layout module. Results which are carried out in each module will provide efficiencies to the designer and the manufacturer of blanking or piercing die in this field.

  • PDF

A study on integration of semantic topic based Knowledge model (의미적 토픽 기반 지식모델의 통합에 관한 연구)

  • Chun, Seung-Su;Lee, Sang-Jin;Bae, Sang-Tea
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.181-183
    • /
    • 2012
  • 최근 자연어 및 정형언어 처리, 인공지능 알고리즘 등을 활용한 효율적인 의미 기반 지식모델의 생성과 분석 방법이 제시되고 있다. 이러한 의미 기반 지식모델은 효율적 의사결정트리(Decision Making Tree)와 특정 상황에 대한 체계적인 문제해결(Problem Solving) 경로 분석에 활용된다. 특히 다양한 복잡계 및 사회 연계망 분석에 있어 정적 지표 생성과 회귀 분석, 행위적 모델을 통한 추이분석, 거시예측을 지원하는 모의실험(Simulation) 모형의 기반이 된다. 본 연구에서는 이러한 의미 기반 지식모델을 통합에 있어 텍스트 마이닝을 통해 도출된 토픽(Topic) 모델 간 통합 방법과 정형적 알고리즘을 제시한다. 이를 위해 먼저, 텍스트 마이닝을 통해 도출되는 키워드 맵을 동치적 지식맵으로 변환하고 이를 의미적 지식모델로 통합하는 방법을 설명한다. 또한 키워드 맵으로부터 유의미한 토픽 맵을 투영하는 방법과 의미적 동치 모델을 유도하는 알고리즘을 제안한다. 통합된 의미 기반 지식모델은 토픽 간의 구조적 규칙과 정도 중심성, 근접 중심성, 매개 중심성 등 관계적 의미분석이 가능하며 대규모 비정형 문서의 의미 분석과 활용에 실질적인 기반 연구가 될 수 있다.

Design and Implementation of a Geographic Information Encoding Service System based on GML (GML 기반 지리공간 정보 엔코딩 서비스 시스템의 설계 및 구현)

  • Son, Hoon-Soo;Kim, Dong-O;Lee, Yong-Soo;Han, Ki-Joon
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.91-97
    • /
    • 2003
  • 지리공간 정보가 사용되는 분야나 환경에 따라 사용되는 표준 데이타 포맷이 다르므로 다른 환경의 지리공간 정보를 활용하기 위해서는 자신의 환경에 맞는 데이타 포맷으로 변환하는 작업이 필요하게 되었다 또한, 다양한 분야의 지리공간 정보를 상호 운용이 가능하도록 지리공간 정보를 엔코딩해 주는 지리공간 정보 엔코딩 서비스 시스템이 요구되게 되었다. 이에 본 논문에서는 지리공간 정보를 OGC의 GML 3.0으로 엔코딩해 주는 GML 기반 지리공간 정보 엔코딩 서비스 시스템을 설계 및 구현하였다. 특히, 지리공간 정보를 간편하고 효율적으로 엔코딩하기 위해 엔코딩 방법을 정의하는 매핑 규칙을 활용하였다. 본 논문에서 구현한 GML 기반 지리공간 정보 엔코딩 서비스 시스템을 활용해 공간 데이타베이스 시스템인 ZEUS에 구축된 지리공간 정보를 GML 3.0으로 엔코딩 하거나, 역으로 GML 3.0을 ZEUS의 지리공간 정보로 엔코딩하여 상호 운용할 수 있다.

  • PDF

Detection Of Unknown Malicious Scripts using Code Insertion Technique (코드 삽입 기법을 이용한 알려지지 않은 악성 스크립트 탐지)

  • 이성욱;방효찬;홍만표
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.663-673
    • /
    • 2002
  • Server-side anti-viruses are useful to protect their domains, because they can detect malicious codes at the gateway of their domains. In prevailing local network, all clients cannot be perfectly controlled by domain administrators, so server-side inspection, for example in e-mail server, is used as an efficient technique of detecting mobile malicious codes. However, current server-side anti-virus systems perform only signature-based detection for known malicious codes, simple filtering, and file name modification. One of the main reasons that they don't have detection features, for unknown malicious codes, is that activity monitoring technique is unavailable for server machines. In this paper, we propose a detection technique that is executed at the server, but it can monitor activities at the clients without any anti-virus features. we describe its implementation.

Modeling of XPDL Meta-Model for Workflow Process Definition Interchange (워크플로우 프로세스 정의 교환을 위한 XPDL 메타모델의 모델링)

  • Kim, Jin-Sung;Yoo, Chun-Sik;Kim, Yong-Sung
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.6
    • /
    • pp.486-501
    • /
    • 2005
  • XPDL is a XML-based language for process definition exchange that is proposed by WfMC. This paper propose a model which model XPDL document structure (Schema) using UML in order to define and to exchange workflow process, and make business flow understanding ease for inter-business cooperation. So, we define mapping rules in which map XPDL documents into UML class diagram and UML activity diagram. By these mapping rules, elements composing XPDL process meta-model are mapped into UML class diagram, and process activities are mapped into UML activity diagram. Also, we apply proposed mapping technique to model a workflow of (')Credit card state check system.(')

Generation of Real Sea Waves based on Spectral Method and Wave Direction Analysis (스펙트럴 방법에 의한 실해역파 재현 및 파 방향 해석)

  • Lee, Jin-Ho;Choi, Jae-Woong;Kang, Yun-Tae;Ha, Mun-Keun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.42 no.3
    • /
    • pp.212-219
    • /
    • 2005
  • Real sea waves in a towing wave basin have been generated using random periodic motion of the segmented wave makers and the wave reflections of sidewalls. Theoretically, the real sea waves can be described by the superposition of many random oblique waves. This paper introduces numerical real sea wave generation in a rectangular wave basin using spectral method that uses a superposition of orthogonal functions which have to satisfy the Laplace equation. Oblique regular waves, long crested irregular waves and real sea waves were simulated and met the requirement of sidewall wave reflection and wave absorption. MLM (Maximum Likelihood Method) and Spatial Fourier Transform were used in order to obtain propagated wave direction characteristics. The estimated results proved the usefulness of the method and the performances showed reasonable directional patterns comparing with generating patterns.

Discrete Application of Wave Board Transfer Function in Time Domain (시간영성에서 조파판 전달함수의 이산적 적용)

  • 전인식;박우선;오영민
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.5 no.2
    • /
    • pp.133-142
    • /
    • 1993
  • In a computer-controlling wave generating system. it is sometimes necessary to incorporate the discrete transfer operation of wave board into control circuit in order to control the system in a more delicate way. A numerical filter simulating the transfer operation of wave board in time domain is designed in the form of a discrete recursive filter. The filter was applied to some example board inputs f3r either regular or irregular wave conditions in order to evaluate the filter performance. The filter outputs were compared with the results of theoretical analysis or the discrete convolution method. showing their excellent agreements. The discrete realization of the filter presented hen is in fact of the bilinear transformation. It was shown that the transformation always avoids the aliasing errors, being surely applicable with a sufficient accuracy even for the band-unlimited transfer function of wave board.

  • PDF

Formulations of the Law of Demeter in the Object Oriented Programming (객체지향 프로그래밍에서의 Demeter 법칙의 정식화)

  • Hwang, Seok-Hyeong;Lee, Yong-Geun;Yang, Hae-Sul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.1
    • /
    • pp.63-72
    • /
    • 1994
  • In the last years, several articles have been devoted to the study of the Law of Demeter in the object oriented programming. The Law of Demeter is a style rule that aims at eliminating unnecessary coupling among classes. Although a large number of studies have been made on the informal definitions, little is known about the formulation of the Law of Demeter. In this article, we define three relationships among classes i.e. inheritance, aggregation and association, and formulate the Law of Demeter. We also propose the algorithms to decide whether a given program satisfies the law and to transform an unfulfilled program into a fulfilled one.

  • PDF