• Title/Summary/Keyword: 패턴 지도 방안

Search Result 373, Processing Time 0.025 seconds

Modeling and Simulation for Evaluating the Submarine Detection Capability of ASW Missions for an Anti Submarine Helicopter (잠수함 탐지 효과도 증대를 위한 대잠 헬기 임무 할당 방안 연구)

  • Yu, Chan-Woo;Kim, Jae-Ick;Kim, Cheol-Ho;Jung, Young-Ran;Park, Sung-Woon
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.2
    • /
    • pp.59-66
    • /
    • 2011
  • In this paper, a method to allocate a submarine search mission to an ASW(Anti-Submarine Warfare) helicopter is proposed. The aim of the proposed method is to increase the submarine detection capability. For this purpose, we modeled the behaviors that the ASW helicopter conduct during the search mission, and the relations between the behaviors are also modeled. To measure quantitatively the effectiveness of ASW search mission, the measure of effectiveness(MOP) is defined. Scenarios are designed to analyze the effectiveness utilizing the ASW mission model. We conducted simulations applying the designed scenarios and some parameters concerned with the friendly ship and the enemy submarine interacting each other in the ASW missions. We analyzed the result of simulation depending on the dipping interval and the pattern of dipping positions in the situation that the helicopter operates for a long time and should resupply several times on the friendly ship. From the analyzed data, we suggested the practical value of ratio between the detectable range of the sonar and the dipping interval to improve the effectiveness of ASW mission.

An Approach to implement Virtual 3D-Touch using 2D-Touch based Smart Device through User Force Input Behavior Pattern (2D-Touch 스마트 디바이스에서 사용자 행동 패턴 분석을 통한 가상 3D-Touch 구현을 위한 방법)

  • Nam, ChoonSung
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.41-51
    • /
    • 2016
  • The appearance of 3D-Touch interface provided the basis of a new interaction method between the users and the mob ile interface. However, only a few smartphones provide 3D-Touch features, and most of the 2D-Touch devices does not provide any means of applying the 3D-Touch interactions. This results in different user experiences between the two interaction methods. Thus, this research proposes the Virtual Force Touch method, which allows the users to utilize the 3D-Touch Interface on 2D-Touch based smart devices. This paper propose the suitable virtual force touch mechanism that is possible to realize users' inputs by calculating and analysis the force touch area of users' finger. This proposal is designed on customized smartphone device which has 2D-Touch sensors.

Prediction Accuracy Enhancement Based on Adaptive Reporting Schemes of Mobile's Mobility Status Information (적응형 이동정보 보고 알고리즘에 기반한 무선 단말의 이동성 예측 정확도 향상 방안)

  • Ko, Yong-Chae;Bae, Jung-Hwa;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7A
    • /
    • pp.778-784
    • /
    • 2007
  • Predictive channel reservation techniques have widely been studied in mobile cellular networks in order to meet the desired quality-of-service requirements. Those efforts are mostly concentrated on predicting the target cell that a mobile will move to and reserving the channel before the actual handoff, and subsequently reducing handoff-dropping probability and improving bandwidth utilization. In this paper, we propose adaptive reporting schemes that a mobile reports its mobility status information such as position, speed, and direction in an appropriate moment based on the user's mobility pattern characteristics and, hence the network can make a more-accurate prediction on the user's mobility. We show from the simulations that the proposed scheme is capable of keeping target cell prediction more accurate and required number of reporting through the wireless up-link channel lower.

Fast Non-Adjacent Form (NAF) Conversion through a Bit-Stream Scan (비트열 스캔을 통한 고속의 Non-Adjacent Form (NAF) 변환)

  • Hwang, Doo-Hee;Shin, Jin-Myeong;Choi, Yoon-Ho
    • Journal of KIISE
    • /
    • v.44 no.5
    • /
    • pp.537-544
    • /
    • 2017
  • As a special form of the signed-digit representation, the NAF(non-adjacent form) minimizes the hamming weight by reducing the average density of the non-zero bits from the binary representation of the positive integer k. Due to this advantage, the NAF is used in various fields; in particular, it is actively used in cryptology. The existing NAF-conversion algorithm, however, is problematic because the conversion speed decreases when the LSB(least significant bit) frequently becomes "1" during the binary positive integer conversion process. This paper suggests a method for the improvement of the NAF-conversion speed for which the problems that occur in the existing NAF-conversion process are solved. To verify the performance improvement of the algorithm, the CPU cycle for the various inputs were measured on the ATmega128, a low-performance 8-bit microprocessor. The results of this study show that, compared with the existing algorithm, the suggested algorithm not only improved the processing speed of the major patterns by 20% or more on average, but it also reduced the NAF-conversion time by 13% or more.

Study and Adaptation of FM CP-Ring Antenna Radiation Pattern Transmission Facility (철탑의 반사 효과에 따른 FM CP-Ring 안테나의 방사 패턴 고찰 및 현장 적용 방안)

  • Choi, Soocheol;Cho, Kiryang
    • Journal of Broadcast Engineering
    • /
    • v.21 no.3
    • /
    • pp.404-411
    • /
    • 2016
  • In this paper, we investigate the radio wave radiation pattern to measure the actual field strength for the transmission antenna dipole antenna and the CP-ring antenna being used in our country as FM station, and the comparison was for field application. Compare results, If the transmitting station and the relay station which is located in the middle of a service area has been a useful CP-dipole antenna (four directions). CP-ring antenna having a directivity because the reflection effect of the tower was able to adjust the orientation to prevent the spread of menstrual another service area in the main direction was able to radiate high propagation 5~9dB. Especially, If the transmitting station and the relay station is located on one side of the service area for radiating radio waves in three directions by using the CP-ring antennas focus the orientation of the antenna in populated areas and road area can improve the broadcast reception environment.

Analysis of Nonlinear CA Using CLT (CLT를 활용한 비선형 CA의 분석)

  • Kwon, Min-jeong;Cho, Sung-jin;Kim, Han-doo;Choi, Un-sook;Lee, Kue-jin;Kong, Gil-tak
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2968-2974
    • /
    • 2015
  • Method for finding the attractors is the important object to investigate in the linear/additive CA because it is a primary interest in applications like pattern recognition, pattern classification, design of associative memory and query processing etc. But the research has been so far mostly concentrated around linear/additive CA and it is not enough to modelize the complex real life problem. So nonlinear CA is demanded to devise effective models of the problem and solutions around CA model. In this paper we introduce CLT as an upgraded version of RMT and provide the process for finding the attractors and nonreachable states effectively through the CLT.

An Analysis of Intrusion Pattern Based on Backpropagation Algorithm (역전파 알고리즘 기반의 침입 패턴 분석)

  • Woo Chong-Woo;Kim Sang-Young
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.93-103
    • /
    • 2004
  • The main function of the intrusion Detection System (IDS) usee to be more or less passive detection of the intrusion evidences, but recently it is developed with more diverse types and methodologies. Especially, it is required that the IDS should process large system audit data fast enough. Therefore the data mining or neural net algorithm is being focused on, since they could satisfy those situations. In this study, we first surveyed and analyzed the several recent intrusion trends and types. And then we designed and implemented an IDS using back-propagation algorithm of the neural net, which could provide more effective solution. The distinctive feature of our study could be stated as follows. First, we designed the system that allows both the Anomaly dection and the Misuse detection. Second, we carried out the intrusion analysis experiment by using the reliable KDD Cup ‘99 data, which would provide us similar results compared to the real data. Finally, we designed the system based on the object-oriented concept, which could adapt to the other algorithms easily.

  • PDF

An Application of Data Mining Techniques in the Driving Pattern Analysis (데이터마이닝을 이용한 운행패턴 분석방법에 대한 연구)

  • Kim, Hyun-Suk;Choi, Jong-Woo;Kim, Dae-Woo;Park, Ho-Sung;Noh, Sung-Kee;Park, Cheong-Hee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.6
    • /
    • pp.1-12
    • /
    • 2009
  • Recently, as the importance of Economical Driving has been gradually growing up, the needs for research on automatic analysis of driving patterns that will ultimately provide drivers the methods for Economical Driving have been increasingly risen. Based on this purpose, we have executed two things in this paper. First, we have collected overall driving information such as date, distance, driving time, speed, idle time, sudden acceleration/deceleration count, and the amount of fuel consumption. Second, we have analyzed the influences of driving patterns on economical driving by employing the data mining techniques. These results can be applied in preventing bad driving patterns which will have consequently bad effects on Economical Driving in two aspects: by presenting some information on the terminal of the vehicles such as idle time, over-speed time, sudden acceleration/deceleration count continuously and by providing the drivers with alert information when the idle time ratio and the over-speed time ratio are excessive.

  • PDF

Dynamic Location Area Management Scheme Based on Mobile Subscribers in Cellular Mobile System (셀룰라 이동 통신 시스템에서 가입자 중심의 동적 위치 영역 할당 기법)

  • Kim, Sang-O;Lee, Jae-Yong;Ryu, Dae-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1179-1186
    • /
    • 1996
  • A previous location area scheme was proposed for cellular network, in which the size of location area of a user is dynamically determined by is current mobility and call arrival rate as the burden of system reaches the minimum. This scheme, however, doesn't consider other individual's movement pattern respectively because of allocating location area with a system's fixed pattern. When mobile subscribers move fast, this scheme allocates especially so large location area to reduce the number of location registration that it makes much paging cost. In this paper, we suggest new dynamic location area management which allocates location area according to each subscriber's mobility regarding its current location as center point. This new scheme allocates fast subscriber larger location area, which resulted in reducing the number of location registration. And small area paging reduces paging cost.

  • PDF

Noise Reduction in Real-time Context Aware using Wearable Device (웨어러블 기기를 이용한 실시간 상황인식에서의 잡음제거)

  • Kim, Tae Ho;Suh, Dong Hyeok;Yoon, Shin Sook;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • v.19 no.9
    • /
    • pp.1803-1810
    • /
    • 2018
  • Recently, many researches related to IoT (Internet of Things) have been actively conducted. In order to improve the context aware function of smart wearable devices using the IoT, we proposed a noise reduction method for the event data of the sensor part. In thisstudy, the adoption of the low - pass filter induces the attenuation of the abnormally measured value, and the benefit was obtained from the situation recognition using the event data of the sensor. As a result, we have validated attenuation for abnormal or excessive noise using event data detected and reported by 3-axis acceleration sensors on some devices, such as smartphones and smart watches. In addition, various pattern data necessary for real - time context aware were obtained through noise pattern analysis.