• Title/Summary/Keyword: 협력시스템

Search Result 1,986, Processing Time 0.035 seconds

On-Line music score recognition by DPmatching (DP매칭에 의한 On-Line 악보인식)

  • 구상훈;이병선;김수경;이은주
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.502-511
    • /
    • 2002
  • 컴퓨터의 기술적 발전은 사회 여러 분야에 막대한 영향을 끼쳤다. 그중 악보인식분야에도 커다란 영향을 주었다. 그러나, On-line 상에서 그린 악보를 실시간으로 정형화된 악보형태로 변환하는 처리에 대한 연구가 미흡하여 이에 대한 연구가 필요하다. 본 논문에서는 실시간으로 악보를 인식하고, 사용자의 편의를 도모하기 위해 DP(Dynamic Programming) 매칭 법을 이용한 On-Line 악보인식에 관한 방법을 제안하였다. 본 연구에서는 실시간으로 입력되는 악상기호를 인식하기 위해, 가장 유효한 정보인 악상 기호내의 방향, x, y 좌표를 이용하여 벡터형태로 추출한 후 음표와 비음 표(쉼표, 기타기호)의 두개의 그룹으로 나누어진 표준패턴과의 DP매칭을 통해 인식한다. 먼저 tablet을 통해 실시간으로 악상 기호를 입력할 때 생기는 x, y좌표를 이용하여, 펜의 움직임에 대한 16방향 부호화를 수행한다. 음표와 비 음표를 구분하기 위한 시간을 줄이고자 16방향 부호화를 적용하지 않고 사사분면부호화를 적용한다. 음표를 약식으로 그릴 경우 음표 머리에 해당하는 부분의 좌표는 삼사분면에 분포하고, 폐곡선의 음표일 경우에는 좌표가 사사분면에 고르게 나타난다. 폐곡선을 제외한 음표의 머리는 폐곡선과 같은 조건이면서 입력받은 y좌표 값들 중에서 최소 값과 최대 값을 구한 다음 2로 나눈 값을 지나는 y좌표의 개수가 임의의 임계값 이상이면 음표로 판단한다. 위 조건을 만족하지 않을 경우 비 음표로 취급한다. 음표와 비 음표를 결정한 다음, 입력패턴과 표준패턴과의 DP매칭을 통하여 벌점을 구한다. 그리고 경로탐색을 통해 벌점에 대한 각각의 합계를 구해 최소 값을 악상기호로 인식하였다. 실험결과, 표준패턴을 음표와 비음표의 두개의 그룹으로 나누어 인식함으로써 DP 매칭의 처리 속도를 개선시켰고, 국소적인 변형이 있는 패턴과 특징의 수가 다른 패턴의 경우에도 좋은 인식률을 얻었다.리되고 이원화된 코드체계와 데이터 형태의 이질화를 통일하는 방법으로 데이터웨어하우스 시스템을 제시하였다. 결국 병원에서 데이터웨어하우스 시스템의 구축은 임상, 연구, 교육의 유기적 순환관계를 정립하여 지식의 순환적 고리인 수집, 공유, 확산, 재창출을 지속적 유지할 수 있는 인프라를 구축해 준다. 반면 상이한 정보들간의 충돌과 이에 따른 해석의 오류로 잘못된 의사결정을 위한 정보를 제공할 수 있고 기초정보의 접근 및 추출의 유용성에 의해서 정보유출에 대한 문제가 한계점으로 나타났다.로세스 개선을 위해서 무엇을 정말로 필요로 하는지를 밝힘으로써, 한국 소프트웨어 산업의 현실적인 특수성을 고려한 소프트웨어 프로세스 평가와 개선 모델의 개발을 위한 기초적인 자료를 제공할 것으로 예상된다. 또한, 본 연구 결과는, 우리나라 소프트웨어 조직들이 실제로 무엇을 필요로 하는지를 밝힘으로써, 우리나라의 소프트웨어 산업을 육성하기 위한 실효성 있는 정책 입안을 위한 기초 자료를 제공할 것으로 예상된다.를 검증하려고 한다. 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주고 있다.ble nutrient (TDN) was highest in booting stage (59.7%); however no significant difference was found among other stages. The concentrations of Ca and P were not different among mature stages. According to these results, the yellow ripe period is appropriate to harvest the whole crop rice for forage considering

  • PDF

Adaptive Migration Path Technique of Mobile Agent Using the Metadata of Naming Agent (네이밍 에이전트의 메타데이터를 이용한 이동 에이전트의 적응적 이주 경로 기법)

  • Kim, Kwang-Jong;Ko, Hyun;Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.165-175
    • /
    • 2007
  • The mobile agent executes a given task by which the agent code moves to the server directly. Therefore, node migration method becomes an important factor which impact on the whole performance of distributed system. In this paper, we propose an adaptive migration path technique of mobile agent using the metadata of naming agent. In this proposed technique, node selection for migration depends on the content of referenced metadata, and the reliability of migrated information is determined by the metadata updating method and cooperative operations of individual agents in multi-agents system. For these, we design the metadata using by the number of hit documents, hit ratio, node processing time and network delay time, and describe the methods for creating, using and updating metadata for which determine the adaptive node migration path of mobile agent according to the cooperation of individual agents and number of hit documents using by designed metadata. And results of evaluated performance for proposed adaptive migration path technique through the proper experiment and analysis gain rate of high effective information earning, because of high hit ratio(72%) about of fathered documents by case of applying metadata move to the 13 nodes. But, in case of non-applying metadata is hit ratio(46%) of gathered documents and rate of effective information earning about of 26 nodes is 36.8%.

  • PDF

An Analysis on the Plan of Revitalizing Investment for Developing Countries on the Development Project Applying System Dynamics (시스템 다이내믹스를 이용한 개발도상국 진출 및 투자개발형 사업 활성화 지원정책 분석)

  • Kim, Jae-Won;Ahn, Byung-Ju;Lee, Yoon-Sun;Kim, Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.513-518
    • /
    • 2007
  • Domestic construction companies are interested in finding a larger market abroad because of declining the amount of orders placed and competing the amount of orders received. Recently, the Development project including the finance offer by builder is becoming more common and broad in the flow of the world market in construction from underdeveloped countries to the advanced countries. If the construction companies revitalized because of being active in the Middle East market don't appropriately cope with the situation, they will be probably depressed. The support policies helped revitalization of the development project are examined in this study. The purpose of this study is basic data how to be influenced by the situation of market abroad, policies revitalized development project and extending market. The policies revitalized development project and the relationship of many variables near the market abroad are analyzed applying the System Dynamics as hopeful market abroad which have a circumstance finding a larger market.

  • PDF

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

Simplified Clearance Formalities of Northeast Asia port (동북아 항만의 입출항 수속 간소화 방안)

  • Choi Hyung-Rim;Park Nam-Kyu;Park Young-Jae;Cho Jae-Hyung
    • Journal of Navigation and Port Research
    • /
    • v.29 no.5 s.101
    • /
    • pp.439-445
    • /
    • 2005
  • Recently, owing to the increasing demand on the simplification of arrival and departure procedures, IMO's (International Maritime Organization) Facilitation Committee (FAL) is carrying out the standardization project of arrival and departure formalities and clearance form. Also, many port authorities of developed countries are making active researches for the smooth flow and efficiency of the information inbound and outbound ships by way of simplifying their formalities or through electronic means. However, this standardization project cannot be done by one country but by mutual cooperation among related nations. And to carry out this task, the first thing to be done is to standardize the formalities and document form, and to integrate information. To this end, this study has reviewed the model cases of advanced ports of developed countries with regard to their simplification and standardization efforts. And also we have analyzed the formalities and clearance form of the three countries Korea, China, and Japan. And then for the solution of common problems of three countries, this paper has suggested an ebXML-based Global Port B2B framework. Through this framework, we can reuse and automate the necessary information on the arrival and departure of ships, consequently realizing simplification, and laying a foundation for the introduction of e-commerce to the port industry.

Importance and Management of the Laboratory Notebooks in the Research Record (연구기록물 중 연구노트의 중요성과 관리 제도화)

  • Kim, Sang-Jnu
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.45-74
    • /
    • 2008
  • The purpose of this study was to promote the understanding of laboratory notebook's record characteristics through getting a line on the importance of the notebooks which have record, information, communication, and proof functions. To improve the research ethics and cultures, this study was examined and investigated by literature references and survey results. This study analyzed the status of the notebooks in part of laboratory information system of the R&D institutes, paper notebooks for laboratory records management, and the introduction of ELN for digital record. For the notebook's institutionalization, more review is needed to the possibility of involvement in the conflict, evidential requisite and signature by inspector, the limitation of autonomous policy for the notebook's operation, the difficulty of preservation for 30 years, the introduction of ELN and utilization for the notebooks. To improve management and institutionalization for the notebooks, it is needed to the notebook's record for knowledge management and evidential values, support and budget for the notebook's management department, researcher's recognition conversion for the notebooks related to the intellectual property and technology transference, the record method train for the notebooks from the university classes, and the introduction of ELN related to the laboratory information management system or project management system.

SINR Maximizing Collaborative Beamforming with Enhanced Robustness Against Antenna Correlation (안테나 간 상관도에 강건한 SINR 최대화 협력적 빔포밍 기법)

  • Kim, Jae-Won;Sung, Won-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.4
    • /
    • pp.95-103
    • /
    • 2009
  • In this paper, a generation method of transmit and receive beamforming vectors based on base station cooperation is proposed which maximizes the user SINR in mobile cellular multi-user MIMO systems. There are two main sources of interference which deteriorate the performance of the system, i.e. the inter-user interference caused by the usage of the same radio resource for multiple users in the system, and the inter-cluster interference from neighboring base stations which are not participating in cooperative transmission. The proposed scheme cancels out the inter-user interference by using the block diagonalization(BD) method, and mitigate the inter-cluster interference by using optimal transmit and receive beamforming vectors based on optimal combining(OC) with the statistic information of inter-cluster interference. We perform computer simulations to verify the performance of the proposed scheme, and compare the result to the conventional performance obtained from utilizing the receiver side information only or utilizing the information from neither sides. The performance evaluations are conducted not only over the independent MIMO channels, but over correlated MIMO channels to demonstrate the robustness of the proposed scheme over the channels with correlation among antennas.

A Study on Inspection Status of Port State Control and Improvement Measures in Korea (우리나라 항만국통제 점검 실태와 문제점 개선에 관한 연구)

  • Kim, Sun-Tai;Gang, Sang-Geun;Jeong, Jae-Yong;Kim, Deug-Bong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.6
    • /
    • pp.671-676
    • /
    • 2014
  • Based on the data of PSC information management system of MOF(Ministry of oceans and fisheries) and APCIS(Asia-Pacific Computerized Information System) of Tokyo-MOU information system, the result of the evaluation on the reality of PSC was done, and base on 2009, it showed a trend of decrease in every DFR(Deficiency Rate) and DTR(Detention Rate). But for vessels built for more than 30 years, flags of convenience vessels, RO-RO ferry and general cargo vessel, small size vessels with gross tonnage less than 1,000 ton showed a high DFR and DTR. Each harbours is classified by the total harbours' average DFR which was 82.5 % and the average DTR was 5.1 %, excluding the Jeju harbour, showing a hugh deviation for classification of each harbour. Classification of each harbour has to be inspected by PSC and it showed a great unbalance of the number of vessels for each territory for inspection. the biggest problem with our country's PSC, where it was pointed out by the PSCO was lack of workers and independent inspection by just one worker. To strength the substantiality of the inspection of our country is to have concentrated inspection on the high risk cautious vessels, forming a human network each classified by four different sectors of the area, recalculating the amount of assignment of inspection classified by each harbour and securing workforce the PSCO improvements are necessary.

The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry (데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로)

  • Kim, Eun-Chan;Kim, Eun-Young;Lee, Hyo-Chan;Yoo, Byung-Joon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.49-72
    • /
    • 2021
  • This study analyzes the major content, significances, and future outlook of Three Data Acts amendment enacted in August 2020 in South Korea, with the focus on their impact on the financial and data industries. It seems that the revision of the Credit Information Act will enable the specification of a business which had previously only been regulated as the business of credit inquiry, and also enable the domestic data industry to activate the MyData industry, data trading and platforms, and specify data pseudonymization and trading procedures. For the rational and efficient implementation of the amendments to the Three Data Acts, the Personal Information Protection Committee must be as transparent and lawful in its activities as possible, and fairness must be guaranteed. Even in the utilization of personal information, the development or complementation of the related data processing technologies is essential, and clear data processing methods and areas must be regulated. Furthermore, the amendments must be supported with guarantees and the systematization of a fair competitive system in the data market, stricter regulations on penalties for illegal acts related to data, establishment and strengthening of the related security systems, and reinforcement of the system of cooperation for data transfer.

Average Data Rate Analysis for Data Exchanging Nodes via Relay by Concurrent Transmission (데이타 교환 노드의 동시 전송 릴레이 이용을 위한 평균 데이터 전송률 분석)

  • Kwon, Taehoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.638-644
    • /
    • 2018
  • Relay systems have recently gained attentions because of its capability of cell coverage extension and the power gain as the one of key technologies for 5G. Relays can be exploited for small-cell base stations and the autonomous network, where communication devices communicate with each other cooperatively. Therefore, the relay technology is expected to enable the low power and large capacity communication. In order to maximize the benefits of using a limited number of relays, the efficient relay selection method is required. Especially, when two nodes exchange their data with each other via relay, the relay selection can maximize the average data rate by the spatial location of the relay. For this purpose, the average data rate is analyzed first according to the relay selection. In this paper, we analyzed the average data rate when two nodes exchange their data via dual-hop decode and forward relaying considering the interference by the concurrent transmission under Nakagami-m fading channel. The correctness of the analysis is verified by the Monte Carlo simulation. The results show that the concurrent transmission is superior to the non-concurrent transmission in the high required data rate region rather than in the low required data rate region.