• Title/Summary/Keyword: 쓰기 패턴

Search Result 48, Processing Time 0.028 seconds

The input method of the Hangul and Alphanumeric characters for the PDAs (휴대형 정보기기의 한글 및 영숫자 필기 입력 방안)

  • 홍성민;국일호;조원경
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.3
    • /
    • pp.53-60
    • /
    • 1998
  • In this paper, we proposed a set of ANSI-Korean character patterns for handwriting recognition that can be used as an input method of mobile computers like PDA (Personal Digital Assistant). In the case of bilinguals, two kinds of alphabets are written alternatively So the method of input character mode change must be provided, and this cause discomfort of writing. Our proposed written character patterns have some constraint but permit ANSI-Korean mixed writing without mode change keeping original form of alphabets and can be recognized with simple algorithm relatively. For ANSI character we analysis Graffiti and propose new writing pattern, which is more similar to original form. There are many researches about input method of unpacking Korean character and writing patterns. But they are not widely used because it's excessively contrary to original form of Korean characters. To show our proposed writing patterns usefulness, we studied the satisfaction and easiness of writing and the recognition rates. Writers are divided into two groups; PDA users, familiar to Graffiti, and others. The results satisfy usefulness in the both groups.

  • PDF

Adaptive Garbage Collection Technique for Hybrid Flash Memory (하이브리드 플래시 메모리를 위한 적응적 가비지 컬렉션 기법)

  • Im, Soo-Jun;Shin, Dong-Kun
    • The KIPS Transactions:PartA
    • /
    • v.15A no.6
    • /
    • pp.335-344
    • /
    • 2008
  • We propose an adaptive garbage collection technique for hybrid flash memory which has both SLC and MLC. Since SLC area is fast and MLC area has low cost, the proposed scheme utilizes the SLC area as log buffer and the MLC area as data block. Considering the high write cost of MLC flash, the garbage collection for the SLC log buffer moves a page into the MLC data block only when the page is cold or the page migration invokes a small cost. The other pages are moved within the SLC log buffer. Also it adjusts the parameter values which determine the operation of garbage collection adaptively considering I/O pattern. From the experiments, we can know that the proposed scheme provides better performance compared with the previous flash management schemes for the hybrid flash and finds the parameter values of garbage collection close to the optimal values.

A Tool for On-the-fly Repairing of Atomicity Violation in GPU Program Execution

  • Lee, Keonpyo;Lee, Seongjin;Jun, Yong-Kee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.1-12
    • /
    • 2021
  • In this paper, we propose a tool called ARCAV (Atomatic Recovery of CUDA Atomicity violation) to automatically repair atomicity violations in GPU (Graphics Processing Unit) program. ARCAV monitors information of every barrier and memory to make actual memory writes occur at the end of the barrier region or to make the program execute barrier region again. Existing methods do not repair atomicity violations but only detect the atomicity violations in GPU programs because GPU programs generally do not support lock and sleep instructions which are necessary for repairing the atomicity violations. Proposed ARCAV is designed for GPU execution model. ARCAV detects and repairs four patterns of atomicity violations which represent real-world cases. Moreover, ARCAV is independent of memory hierarchy and thread configuration. Our experiments show that the performance of ARCAV is stable regardless of the number of threads or blocks. The overhead of ARCAV is evaluated using four real-world kernels, and its slowdown is 2.1x, in average, of native execution time.

A Safety IO Throttling Method Inducting Differential End of Life to Improving the Reliability of Big Data Maintenance in the SSD based RAID (SSD기반 RAID 시스템에서 빅데이터 유지 보수의 신뢰성을 향상시키기 위한 차등 수명 마감을 유도하는 안전한 IO 조절 기법)

  • Lee, Hyun-Seob
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.593-598
    • /
    • 2022
  • Recently, data production has seen explosive growth, and the storage systems to store these big data safely and quickly is evolving in various ways. A typical configuration of storage systems is the use of SSDs with fast data processing speed as a RAID group that can maintain reliable data. However, since NAND flash memory, which composes SSD, has the feature that deterioration if writes more than a certain number of times are repeated, can increase the likelihood of simultaneous failure on multiple SSDs in a RAID group. And this can result in serious reliability problems that data cannot be recovered. Thus, in order to solve this problem, we propose a method of throttling IOs so that each SSD within a RAID group leads to a different life-end. The technique proposed in this paper utilizes SMART to control the state of each SSD and the number of IOs allocated according to the data pattern used step by step. In addition, this method has the advantage of preventing large amounts of concurrency defects in RAID because it induces differential lifetime finishes of SSDs.

COGNITIVE CHARACTERISTICS OF ADHD CHILDREN ASSESSED BY KEDI-WISC (주의력결핍과잉활동장애 아동의 인지적특성)

  • Shin, Min-Sup;Oh, Kyung-Ja;Hong, Kang-E
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.1 no.1
    • /
    • pp.55-64
    • /
    • 1990
  • The purpose of the present study is to investigate cognitive characteristics of ADHD children by comparing their performances on KEDI-WISC according to age and EEG variables. Subjects were 56 ADHD children who visited Seoul National University Children's Hospital during the period from January, 1988 to March, 1989. Group differences on age and EEG variables were tested by ANOVA, and Hierarchical Cluster Analysis was performed to investigate how ADHD children were classified based on their performances on KEDI-WISC. The results Indicated that ADHD children showed low scores on Coding, Digit Span, and Comprehension subtests, suggesting their attention deficits and impulsivity. ADHD children were clustered Into three groups based on only FSIQ. In post-hoc tests three groups showed different cognitive strengths and weaknesses on KEDI-WISC. Group differences on age were not significant, and abnormal EEG group showed lower PIQ than normal EEG group, suggesting the possibility that their attention deficits were related to neurological factors.

  • PDF

Study on Guidelines for Selecting Traditional Games in Relation to Multiple Intelligence Development (다중지능발달을 위한 민속놀이 선정기준 연구)

  • Kim, Eun Kyung;Kwon, Dae Won
    • Korean Journal of Childcare and Education
    • /
    • v.10 no.5
    • /
    • pp.229-248
    • /
    • 2014
  • The purpose of this study is to draw guidelines on how to select traditional games that would efficiently help and develop multiple intelligences in children. Guidelines standard of section inquiries were prepared through a Delphi survey targeting twenty experts in early childhood education and traditional games. As a result, linguistic intelligence questions regarding writing, listening, speaking and vocabulary acquisition were selected. logical-mathematical intelligence questions regarding strategy, counting, patterns, hypothesis, verification, and comparing, contrasting, calculating ability were selected. Spatial intelligence questions regarding drawing, coloring, representation activities, operating and creating were selected, physical performance intelligence questions regarding global muscles, eye-hand coordination, flexibility, accommodation force, balance, agility and muscular strength were selected. Musical intelligence included questions about singing, and playing musical instruments. Interpersonal intelligence included perspective-taking, role-sharing, cooperation and discussion. For intrapersonal intelligence questions regarding personal significance-ties, planning-decision making, emotional expression and problem solving were selected. Finally, in relation to naturalist intelligence, questions regarding living organisms, inanimate objects and seasons were selected. In addition, traditional games were analyzed based on the finalized guidelines, and the results showed that each of the traditional games would not only work with one intelligence at a time but with other different intelligence as well. In the light of that, the study confirmed the validity of the guidelines on how to select traditional games that would develop multiple intelligences in children.

A Ukulele Playing Intervention for Improving the Hand Function of Patients With Central Nervous System Damage: A TIMP Case Study (중추신경계 손상 성인 대상 손 기능 향상을 위한 우쿨렐레 활용 치료적 악기연주(TIMP) 사례)

  • Joo, Ye-Eun;Park, Jin-Kyoung
    • Journal of Music and Human Behavior
    • /
    • v.19 no.2
    • /
    • pp.81-103
    • /
    • 2022
  • The effects of therapeutic instrumental music performance (TIMP) using a ukulele were examined in adults with central nervous system damage and impaired hand functions. The participants were three adults with neurological damage who participated in 30-min sessions twice a week over 6 weeks. Changes in hand function was measured by the Box and Block Test (BBT), the 9-Hole Peg Test (9-HPT), and the Jebsen-Taylor Hand Function Test (JTHFT). Following the intervention, all three participants showed increases in the BBT and 9-HPT scores, indicating positive changes in fine motor coordination and dexterity. In terms of the JTHFT, all three participants showed increases in the "writing" and "card flipping" subtask scores, indicating that the intervention was effective in improving more coordinated finger movements. All participants reported the satisfaction with the intervention. They also pointed out that they were motivated to play the ukulele and that following the intervention used their affected hand more frequently in daily activities. These findings suggest that TIMP with a ukulele for patients with central nervous system damage can have positive effects on their functional hand movements and motivate these patients to practice their rehabilitation exercises.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.