• Title/Summary/Keyword: 아스키

Search Result 39, Processing Time 0.022 seconds

The Tool Coordinate Adjustment Algorithm for Robot Manipulators with Visual Sensor (시각 센서에 의한 로봇 매니퓰레이터의 툴 좌표계 보정에 관한 연구)

  • 이용중;김학범;이양범
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.8
    • /
    • pp.1453-1463
    • /
    • 1994
  • Recently many robot manipulators are used for various areas of industriesand factories. It has been frequently observed that the robot manipulator fails to complete the function when the object changes its original position, Due to the unexpected impacts and vibrations the center and direction of the object would be shifted in many real application. In this study, a visual sensing algorithm for the robot manipulator is proposed. The algorithm consists of two parts : Detection of the object migration and adjustments of the orobot manipulators Tool Coordinate System. The image filtering technique with visual sensor is applied for the first part of the algorithm. The change of illumination intensity indicates the object migration. Once the object migration is detected, the second part of the algorithm calculates the current position of the object. Then it adjusts the robot manipulators Tool Coordinate System. The robot manipulator and the Visual sensor communicate each other using interrupt technique via proposed algorithm. It has been observed that the proposed algorithm reduces the malfunction of a robot manipulator significantly. Thus it can provide better line balance-up of the manufacturing processes and prevent industrial accidents efficiently.

  • PDF

An Anti-Forensic Technique for Hiding Data in NTFS Index Record with a Unicode Transformation (유니코드 변환이 적용된 NTFS 인덱스 레코드에 데이터를 숨기기 위한 안티포렌식 기법)

  • Cho, Gyu-Sang
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.75-84
    • /
    • 2015
  • In an "NTFS Index Record Data Hiding" method messages are hidden by using file names. Windows NTFS file naming convention has some forbidden ASCII characters for a file name. When inputting Hangul with the Roman alphabet, if the forbidden characters for the file name and binary data are used, the codes are convert to a designated unicode point to avoid a file creation error due to unsuitable characters. In this paper, the problem of a file creation error due to non-admittable characters for the file name is fixed, which is used in the index record data hiding method. Using Hangul with Roman alphabet the characters cause a file creation error are converted to an arbitrary unicode point except Hangul and Roman alphabet area. When it comes to binary data, all 256 codes are converted to designated unicode area except an extended unicode(surrogate pairs) and ASCII code area. The results of the two cases, i.e. the Hangul with Roman alphabet case and the binary case, show the applicability of the proposed method.

The Study of Web Services Adaptation in Ubiquitous Environments (유비쿼터스 환경에서의 웹서비스 적용 기술)

  • Lee, Won-Suk;Lee, Kang-Chan;Jeon, Jong-Hong;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1031-1034
    • /
    • 2005
  • The beginning of Web Services was aware of efficient technology for application integration, thus it was used to integrating the distributed enterprise applications or the applications between business partners. But, recently the usage of Web Services is spreaded out not only internet applications but also wireless network applications. The main reasons are that Web Services is the international standard of W3C, and Web Services is based on XML that has the neutralized characteristics. Currently Major company of Web Services such as MS, IBM, etc. focus on the inte In this paper, we define and explain technical issues for adapting web services to ubiquitous Environment.

  • PDF

공항의 대 항공사 마케팅 전략-인천국제공항의 국제 허브화를 위하여-

  • 김용범
    • Proceedings of the KOR-KST Conference
    • /
    • 1999.10a
    • /
    • pp.15-20
    • /
    • 1999
  • 아시아지역은 경제적 침체기에서 서서히 회복되어가면서 항공교통수요 또한 경제적 위기 이전의 수준으로 회복해가고 있고 21세기의 새로운 출발과 동북아지역 국가들의 경제활동 활성화로 새로운 항공교통수요가 증대되어가고 있는 시점이다. 동북아 국가들은 자국의 경제 활성화를 위해 공항의 새로운 건설과 확장 등을 계획$.$실행해오고 있으며, 이를 통하여 동북아지역에서의 항공산업의 우위성을 확보하려하고 있다. 중국, 일본 등 우리나라와 경쟁관계에 있는 나라들이 기존 공항의 확장과 신설을 통해 경쟁력을 높이려하고 있으며, 공항의 경쟁력을 높이는데 필수적 요소 중의 하나인 외국 항공사의 유치를 위한 對항공사 마케팅을 다양하고 구체적인 방법으로 실행하고 있다. 우리나라도 2001년 동북아의 중추적인 공항의 건설과 개항을 맞이하여 이들 경쟁공항과의 경쟁에서 우위성을 확보하기 위한 하나의 방안으로서 자국 및 외국항공사의 비행편 유치에 대한 공항마케팅 측면에서의 접근이 필요하게 되었다. 본 연구는 우리나라와 지리적인 국토면적 여건이 비슷한 암스테르담 스키폴공항, 히드로공항 등의 공항들이 취하고 있는 대항공사마케팅 정책과 대항공사 유치를 위해 현재 실행하고 있는 방법들을 통해 앞으로 인천국제공항이 공항마케팅에서의 대항공사 마케팅 전략 수립시 고려 방안들을 제시하고자한다. 이에 공항마케팅의 일반적인 고찰과 외국 선진공항들의 대항공사마케팅전략을 고찰하고, 현재 인천국제공항의 경쟁공항인 동북아지역의 중국 및 일본 공항들의 현황등을 살펴보고자 한다. 마지막으로는 계량적 방법과 문헌들을 통해 여러 가지 방안들을 고려하여 인천국제공항이 실행하여야하는 대항공사마케팅전략방안을 제시하여 본 연구의 목적을 달성하려한다. 및 화물교통량의 증가를 예상하여 5%, 10%, 20%의 증가에 대한 민감도 분석을 실시한 결과 대안1의 경우 교통량의 변화 및 화물통행의 시간가치의 증가시 사회적 편익이 오히려 감소하였고, 대안2와 3의 경우 사회적 편익이 증가하는 것을 알 수 있었다. 이는 경부고속도로의 화물차량의 구성비에 따라 대안 1의 경우 오히려 화물차의 통행시간이 증가함에 그 원인이 있다 할 것이다. 이상과 같은 결론을 통하여 경부고속도로상의 화물전용차선의 설치시는 수답렬 교통량의 구성비와 구간 평균교통량에 의하여 그 효과가 다르게 나타남을 알 수 있었다. 따라서 물류비용 절감차원에서의 화물전용차선의 설치는 본 연구에서 나타낸 방법과 같이 수단간의 경제적 편익을 고려한 구간별 시간대별 효과분석을 통하여 정책의 시행여부가 결정되어야 할 것이다. 한편, 화물전용차선의 설치로 인한 물류비용의 절감을 보다 효과적으로 달성하기 위해서는 종합류류 전산망의 시급한 구축과 함께 화물차의 적재율을 높이고 공차율을 낮출 수 있는 운송체계의 수립이 필요한 것으로 판단된다. 그라나 이러한 화물전용차선의 효과는 단기적인 치유책일 수밖에 없기 때문에 물류유통 시설의 확충을 위한 사회간접자본의 구축을 서둘러 시행하여야 할 것이다.으로 처리한 Machine oil, Phenthoate EC 및 Trichlorfon WP는 비교적 약효가 낮았다.>$^{\circ}$E/$\leq$30$^{\circ}$NW 단열군이 연구지역 내에서 지하수 유동성이 가장 높은 단열군으로 추정된다. 이러한 사실은 3개 시추공을 대상으로 실시한 시추공 내 물리검층과 정압주입시험에서도 확인된다.. It was resulted

  • PDF

A Study on Graffiti Expressions of Fashion Illustration (패션 일러스트레이션의 그라피티적 표현에 관한 연구)

  • Kim, Mi-Hyun
    • Journal of the Korean Society of Costume
    • /
    • v.61 no.9
    • /
    • pp.74-83
    • /
    • 2011
  • In the sense that it performs a function of communication with public, fashion illustration, which visualizes fashion information in an illustrated way, shares similar characteristics with graffiti, which represents the society of its time while having a value as a modern art itself. Therefore, the study aims to seek possibility of graffiti expression of fashion illustration, and to establish theoretical research systems for reestablishment of practical development methods of the graffiti expressions. The concrete contents of this study include followings: First, it examines the methods and characteristics of the graffiti expressions by analyzing the works of graffiti artists in order to understand the concept of graffiti and to find out the theoretical approach to it. Second, it investigates the characteristics of graffiti, and proposes concepts associated with graffiti after analyzing examples of fashion illustration which graffiti expressions are reflected. Third, it draws meanings that the use of graffiti expressions has in fashion illustration. In conclusion, graffiti expressions in fashion illustration are used in brand logos and text, human body deformation and omissions, autonomous expressions of variety of materials, symbolism, amusement, and autonomy as they are characterized by strong colors to express significance.

MS Office Malicious Document Detection Based on CNN (CNN 기반 MS Office 악성 문서 탐지)

  • Park, Hyun-su;Kang, Ah Reum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.439-446
    • /
    • 2022
  • Document-type malicious codes are being actively distributed using attachments on websites or e-mails. Document-type malicious code is relatively easy to bypass security programs because the executable file is not executed directly. Therefore, document-type malicious code should be detected and prevented in advance. To detect document-type malicious code, we identified the document structure and selected keywords suspected of being malicious. We then created a dataset by converting the stream data in the document to ASCII code values. We specified the location of malicious keywords in the document stream data, and classified the stream as malicious by recognizing the adjacent information of the malicious keywords. As a result of detecting malicious codes by applying the CNN model, we derived accuracies of 0.97 and 0.92 in stream units and file units, respectively.

External Beam Radiotherapy in the Management of Low Grade Astrocytoma of the Brain (뇌 성상세포종 환자의 외부 방사선치료)

  • Chun, Ha-Chung
    • Radiation Oncology Journal
    • /
    • v.27 no.1
    • /
    • pp.23-28
    • /
    • 2009
  • Purpose: This study was designed to evaluate the effectiveness of postoperative radiotherapy for patients with low-grade astrocytomas and to define an optimal radiotherapeutic regimen and prognostic factors. Materials and Methods: A total of 69 patients with low-grade astrocytomas underwent surgery and postoperative radiotherapy immediately following surgery at our institution between October 1989 and September 2006. The median patient age was 36 years. Forty-one patients were 40 years or younger and 28 patients were 41 years or older. Fourteen patients underwent a biopsy alone and the remaining 55 patients underwent a subtotal resection. Thirty-nine patients had a Karnofsky performance status of less than 80% and 30 patients had a Karnofsky performance status greater than 80%. Two patients were treated with whole brain irradiation followed by a coned down boost field to the localized area. The remaining 67 patients were treated with a localized field with an appropriate margin. Most of the patients received a dose of $50\sim55$ Gy and majority of the patients were treated with a dose of 54 Gy. Results: The overall 5-year and 7-year survival rates for all of the 69 patients were 49% and 44%, respectively. Corresponding disease free survival rates were 45% and 40%, respectively. Patients who underwent a subtotal resection showed better survival than patients who underwent a biopsy alone. The overall 5-year survival rates for patients who underwent a subtotal resection and patients who underwent a biopsy alone were 57% and 38%, respectively (p<0.05). Forty-one patients who were 40 years or younger showed a better overall 5-year survival rate as compared with 28 patients who were 41 years or older (56% versus 40%, p<0.05). The overall 5-year survival rates for 30 patients with a Karnofsky performance status greater than 80% and 39 patients with a Karnofsky performance status less than 80% were 51% and 47%, respectively. This finding was not statistically significant. Although one patient was not able to complete the treatment because of neurological deterioration, there were no significant treatment related toxicities. Conclusion: Postoperative radiotherapy following surgery is a safe and effective treatment for patients with low-grade astrocytomas. The extent of surgery and age were noted as significant prognostic factors in this study. However, further effective treatment might be necessary in the future to improve long-term survival rates.

Development of KBIMS Architectural and Structural Element Library and IFC Property Name Conversion Methodology (KBIMS 건축 및 구조 부재 라이브러리 및 IFC 속성명 변환 방법 개발)

  • Kim, Seonwoo;Kim, Sunjung;Kim, Honghyun;Bae, Kiwoo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.6
    • /
    • pp.505-514
    • /
    • 2020
  • This research introduces the method of developing Korea BIM standard (KBIMS) architectural and structural element library and the methodology of converting KBIMS IFC property names with special characters. Diverse BIM tools are utilizing in project, however BIM library researches lack diversity on BIM tool selection. This research described the method to generate twelve categories and seven hundred and ninety-three elements library containing geometrical and numerical data in CATIA V6. KBIMS has its special property data naming systems which was the challenge inputting to ENOVIA IFC database. Three mapping methods for special naming characters had been developed and the ASCII code method was applied. In addition, the convertor prototype had been developed for searching and replacing the ASCII codes into the original KBIMS IFC property names. The methodology was verified by exporting 2,443 entities without data loss in the sample model conversion test. This research would provide a wider choice of BIM tool selection for applying KBIMS. Furthermore, the research would help on the reduction of data interoperability issues in projects. The developed library would be open to the public, however the continuous update and maintenance would be necessary.

Feature Analysis of Metadata Schemas for Records Management and Archives from the Viewpoint of Records Lifecycle (기록 생애주기 관점에서 본 기록관리 메타데이터 표준의 특징 분석)

  • Baek, Jae-Eun;Sugimoto, Shigeo
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.10 no.2
    • /
    • pp.75-99
    • /
    • 2010
  • Digital resources are widely used in our modern society. However, we are facing fundamental problems to maintain and preserve digital resources over time. Several standard methods for preserving digital resources have been developed and are in use. It is widely recognized that metadata is one of the most important components for digital archiving and preservation. There are many metadata standards for archiving and preservation of digital resources, where each standard has its own feature in accordance with its primary application. This means that each schema has to be appropriately selected and tailored in accordance with a particular application. And, in some cases, those schemas are combined in a larger frame work and container metadata such as the DCMI application framework and METS. There are many metadata standards for archives of digital resources. We used the following metadata standards in this study for the feature analysis me metadata standards - AGLS Metadata which is defined to improve search of both digital resources and non-digital resources, ISAD(G) which is a commonly used standard for archives, EAD which is well used for digital archives, OAIS which defines a metadata framework for preserving digital objects, and PREMIS which is designed primarily for preservation of digital resources. In addition, we extracted attributes from the decision tree defined for digital preservation process by Digital Preservation Coalition (DPC) and compared the set of attributes with these metadata standards. This paper shows the features of these metadata standards obtained through the feature analysis based on the records lifecycle model. The features are shown in a single frame work which makes it easy to relate the tasks in the lifecycle to metadata elements of these standards. As a result of the detailed analysis of the metadata elements, we clarified the features of the standards from the viewpoint of relationships between the elements and the lifecycle stages. Mapping between metadata schemas is often required in the long-term preservation process because different schemes are used in the records lifecycle. Therefore, it is crucial to build a unified framework to enhance interoperability of these schemes. This study presents a basis for the interoperability of different metadata schemas used in digital archiving and preservation.

Thinking in Terms of East-West Contacts through Spreading Process of Sarmathia-Pattened Scabbard on Tillya-Tepe Site in Afghanistan (아프가니스탄 틸랴 테페의 사르마티아(Sarmathia)식 검집 패용 방식의 전개 과정으로 본 동서교섭)

  • Lee, Song Ran
    • Korean Journal of Heritage: History & Science
    • /
    • v.45 no.4
    • /
    • pp.54-73
    • /
    • 2012
  • In this article, we examined the patterns of activities of the Sarmathians though in a humble measure, with a focus on the regions where the Sarmathian sheaths spreaded. One of the main weapons the mounted nomads like the Scythias, the Sarmathians, and the Alans used at war was a spear. Though complementary, a sword was the most convenient and appropriate weapon when fighting at a near distance, fallen from the horse to the ground. The Sarmathian swords continued the tradition of the Akinakes which the Scythias or the Persians used, but those of the Sarmathians showed some advances in terms of the easiness with which a sword was drawn out from a sheath, and the way the sheaths were worn to parts of a human body. It turns out that the Sarmathian sheaths, which were designed for the people to draw swords easily, having the sheaths attached to thighs through 4 bumps, spread extensively from Pazyryk, Altai, to South Siberia, Bactria, Parthia and Rome. The most noteworthy out of all the Sarmathian sheaths were the ones that were excavated from the 4th tomb in Tillatepe, Afghanistan which belonged to the region of Bactria. The owner of the fourth tomb of Tilla-tepe whose region was under the control of Kushan Dynasty at that time, was buried wearing Sarmathian swords, and regarded as a big shot in the region of Bactria which was also under the governance of Kushan Dynasty. The fact that the owner of the tomb wore two swords suggests that there had been active exchange between Bactria and Sarmathia. It seemed that the reason why the Sarmathians could play an important role in the exchange between the East and the West might have something to do with their role of supplying Chinese goods to Silk Road. That's why we are interested in how the copper mirrors of Han Dynasty, decoration beads like melon-type beads, crystal beads and goldring articulated beads, and the artifacts of South China which produced silks were excavated in the northern steppe route where the Sarmathians actively worked. Our study have established that the eye beads discovered in Sarmathian tomb estimated to have been built around the 1st century B.C. were reprocessed in China, and then imported to Sarmathia again. We should note the Huns as a medium between the Sarmathians and the South China which were far apart from each other. Thus gold-ring articulated beads which were spread out mainly across the South China has been discovered in the Huns' remains. On the other hand, between 2nd century B.C. and 2nd century A.D. which were main periods of the Sarmathians, it was considered that the traffic route connecting the steppe route and the South China might be West-South silk road which started from Yunnan, passed through Myanmar, Pakistan, and Afghanistan, and then went into the east of India. The West-south Silk road is presumed to have been used by nomadic tribes who wanted to get the goods from South China before the Oasis route was activated by the Han Dynasty's policy of managing the countries bordering on Western China.