• Title/Summary/Keyword: Amount of Information

Search Result 7,026, Processing Time 0.035 seconds

Document Clustering Technique by K-means Algorithm and PCA (주성분 분석과 k 평균 알고리즘을 이용한 문서군집 방법)

  • Kim, Woosaeng;Kim, Sooyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.625-630
    • /
    • 2014
  • The amount of information is increasing rapidly with the development of the internet and the computer. Since these enormous information is managed by the document forms, it is necessary to search and process them efficiently. The document clustering technique which clusters the related documents through the similarity between the documents help to classify, search, and process the large amount of documents automatically. This paper proposes a method to find the initial seed points through principal component analysis when the documents represented by vectors in the feature vector space are clustered by K-means algorithm in order to increase clustering performance. The experiment shows that our method has a better performance than the traditional K-means algorithm.

A Study on Chanel Estimation Method in OFDM for IEEE 802.11a System (IEEE 802.11a시스템을 위한 OFDM의 채널추정기법에 관한 연구)

  • Kim, Dong-Ok;Oh, Chung-Gyun
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.2 no.4
    • /
    • pp.17-27
    • /
    • 2003
  • This paper presents the channel estimation method with STBC applied to IEEE802.11a. Tenacious channel estimation method for OFDM system, that generally uses STTC, has been presented once and massive amount of calculation was needed However, regarding this paper, the amount of calculation can be reduced by using Curve Fitting, and channel tracking performance improvement can be achieved Based on the estimation method, computer simulation was done for the performance analysis and delay spread Doppler frequency and many other group sizes and numbers were considered As a result of the testing, we found out that Doppler frequency deviation effects equally as frequency offset. Also compared to the existing technique, channel estimated performance confirmed that have 0.9dB SNR improvement than old method.

  • PDF

A Dust Detection Sensor System for Improvement of a Robot Vacuum Cleaner (청소 로봇 성능 향상을 위한 먼지 검출 시스템)

  • Kim, Dong-Hoe;Min, Byung-Cheol;Kim, Donghan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.10
    • /
    • pp.896-900
    • /
    • 2013
  • In this paper, we develop a dust detection sensor system capable of identifying types of dust for an improvement of a robot vacuum cleaner. The dust detection sensor system is composed of a set of infra-red sensors: a single transmitter and multiple receivers. Given the fixed amount of light transmitted from the transmitter, the amount of light coming in multiple receiver sensors varies, depending on the type and density of dust that is passing between the transmitter and the receivers. Therefore, the type of dust can be identified by means of observing the change of the amount of light from the receiver sensors. For experiments, we use two types of dust, rice and sesame, and validate the effectiveness of the proposed method.

Study on the Amount of Critical Corrosion Products of Reinforcement inducing Concrete Cover Cracking with Finite Element Analysis (유한 요소법을 이용한 콘크리트 벽체 균열을 발생시키는 철근의 임계 부식량에 대한 연구)

  • 김광웅;장상엽;조용범;김용철;고영태
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2002.05a
    • /
    • pp.361-366
    • /
    • 2002
  • The deterioration of concrete structure due to corrosion of the reinforcement has created big financial losses on the overall industries. The volume expansion of the corrosion products causes internal pressure to concrete wall around reinforcing bar. If the maximum principal stress induced by internal pressure exceeds the tensile strength of the concrete at any point of time, a crack forms at any point of material. Therefore, in terms of life assessment of concrete structure, it is very important to predict the amount of corrosion products which induces initial concrete cracking. With this objective, this paper proposes the critical amount of corrosion products at interface between reinforcement and concrete using finite element analysis. If an actual survey of corrosion rates could be made, the model might supply information for condition assessment of existing concrete structure. As the mechanical properties of corrosion product and instantaneous geometry of corroded steel are considered in the analysis, the value obtained will be more realistic.

  • PDF

A Survey on Enterence Dose by Exposure Factors (X-선촬영 조건에 따른 피폭선량 조사연구)

  • Kim, Sung-Soo;Huh, Joon
    • Journal of radiological science and technology
    • /
    • v.21 no.2
    • /
    • pp.19-25
    • /
    • 1998
  • By analyzing each part of expsure condition and the status of an entrance dose which is exposed to patients, this study reached the following conclusion. Since there is no standard in setting up an exposure condition, the technology practiced in each facility varies tremendously, and the entrance dose increased especially due to the improper selection of screen and grid and the shortage of a total amount of filtration in leaching the standard filtration amount. Entrance dose was, generally, turned out to be $2{\sim}3$ times as much as that of advanced countries, and there was big difference between facilities ; approximately 52 times inlateral of cervical vertebrae, 35 times in A-P of femur, 33 times in chest A-P, and 11 times in lumber A-P. Therefore, to minimize the entrance dose of a patient with thegreatest amount of image information, acquirement of technological know-how necessary for standardization of exposure condition for each part can be an important research task.

  • PDF

Data hiding Scheme based on Syndrome of Hamming(7,4) Code (해밍코드의 신드롬을 이용한 데이터 은폐)

  • Kim, Cheon-Shik;Kim, Hyoung-Joong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.266-267
    • /
    • 2009
  • According to researches [1], good image quality and amount of hiding information is a main point of steganography. In this point of view, [3] is a very good scheme to hide in an image. However, it cannot hide a lot of information. In order to solve this problem, we propose new method to hide more information than that of [3]. In addition, it can be reduced distortion of an image than that of [4]. Thus, our method is a very efficient and novel scheme.

  • PDF

Integration of large-scale databases in various naming schemes (다양한 명명 규칙을 가진 대용량 데이터베이스의 통합 방안)

  • Han, Beom-Soo;Lee, Hyun-Ju
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.693-694
    • /
    • 2008
  • It is of importance to integrate several databases to improve its coverage and usage of large amount of biological information produced by diverse biological experiments. In this paper, we proposed a method to integrate the protein interaction databases with various naming schemes. The identifier (ID) mapping methods in the process of integration was also presented.

  • PDF

Implementation of Human Spine Database System for Realizing e-Spine

  • Roh, Hyun Sook;Choi, Boongki;Bae, Kook-jin;Park, Jinseo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.06a
    • /
    • pp.193-194
    • /
    • 2014
  • This paper provides the market opportunity analysis process and technology providing matching process based on the efficient quantitative analysis of a large amount of papers and network analysis. In the future, it is required to analyze and complement the quantitative analysis result by commercialization experts and to build emerging issue database.

  • PDF

A Comparative Study of Unauthorized Software Copying: Information Systems Faculty Members' VS. Practicing Managers' Perceptions (경영정보 시스템에서 소프트웨어의 무단복제에 관한 비교연구 - MIS 교수와 경영자를 중심으로 -)

  • Shim, Jeong-Pil;Taylor, G. Stephen
    • Asia pacific journal of information systems
    • /
    • v.1 no.1
    • /
    • pp.17-29
    • /
    • 1991
  • The topic of microcoputer sofrware ethics in the field of information systems (IS) has gained an increasing amount of attention from IS researchers and practicing managers. This paper compares the attitudes of IS faculty members with those of IS managers toward microcomputer software pirating. This study also examines professional related ethical attitudes in detail.

  • PDF

Factors Influencing the Knowledge Adoption of Mobile Game Developers in Online Communities: Focusing on the HSM and Data Quality Framework

  • Jong-Won Park;Changsok Yoo;Sung-Byung Yang
    • Asia pacific journal of information systems
    • /
    • v.30 no.2
    • /
    • pp.420-438
    • /
    • 2020
  • Recently, with the advance of the wireless Internet access via mobile devices, a myriad of game development companies have forayed into the mobile game market, leading to intense competition. To survive in this fierce competition, mobile game developers often try to get a grasp of the rapidly changing needs of their customers by operating their own official communities where game users freely leave their requests, suggestions, and ideas relevant to focal games. Based on the heuristic-systematic model (HSM) and the data quality (DQ) framework, this study derives key content, non-content, and hybrid cues that can be utilized when game developers accept suggested postings in these online communities. The results of hierarchical multiple regression analysis show that relevancy, timeliness, amount of writing, and the number of comments are positively associated with mobile game developers' knowledge adoption. In addition, title attractiveness mitigates the relationship between amount of writing/the number of comments and knowledge adoption.