• Title/Summary/Keyword: Classification of Scheme

Search Result 839, Processing Time 0.028 seconds

Efficient of The Data Value Predictor in Superscalar Processors (슈퍼스칼라 프로세서에서 데이터 값 예측기의 성능효과)

  • 박희룡;전병찬;이상정
    • Proceedings of the IEEK Conference
    • /
    • 2000.06c
    • /
    • pp.55-58
    • /
    • 2000
  • To achieve high performance by exploiting instruction level parallelism(ILP) aggressively in superscalar processors, value prediction is used. Value prediction is a technique that breaks data dependences by predicting the outcome of an instruction and executes speculatively it's data dependent instruction based on the predicted outcome. In this paper, the performance of a hybrid value prediction scheme with dynamic classification mechanism is measured and analyzed by using execution-driven simulator for SPECint95 benchmark set.

  • PDF

Korean telecommunication industry : where we are now and how to go from here (우리나라 정보통신산업의 기술수준 측정과 예측에 의한 기술개발전략의 수립)

  • 황규승;박명섭;한재민;정종석
    • Korean Management Science Review
    • /
    • v.10 no.1
    • /
    • pp.41-58
    • /
    • 1993
  • This research analyzes the level of technological growth in Korean telecommunication industry and suggests a technology development strategy. Comparative analysis of technological growth with the advanced countries was performed based on a new technology classification scheme. Technology indices were calculated by applying Analytical Hierarchy Process(AHP). The result of the AHP was put into forecasting models to have a glimse of future growth pattern and to suggest a long-term development strategy for telecommunication technology.

  • PDF

Development of a neural network with fuzzy preprocessor (퍼지 전처리기를 가진 신경회로망 모델의 개발)

  • 조성원;최경삼;황인호
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10a
    • /
    • pp.718-723
    • /
    • 1993
  • In this paper, we propose a neural network with fuzzy preprocessor not only for improving the classification accuracy but also for being able to classify objects whose attribute values do not have clear boundaries. The fuzzy input signal representation scheme is included as a preprocessing module. It transforms imprecise input in linguistic form and precisely stated numerical input into multidimensional numerical values. The transformed input is processed in the postprocessing module. The experimental results indicate the superiority of the backpropagation network with fuzzy preprocessor in comparison to the conventional backpropagation network.

  • PDF

A Segment Space Recycling Scheme for Optimizing Write Performance of LFS (LFS의 쓰기 성능 최적화를 위한 세그먼트 공간 재활용 기법)

  • Oh, Yong-Seok;Kim, Eun-Sam;Choi, Jong-Moo;Lee, Dong-Hee;Noh, Sam-H.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.963-967
    • /
    • 2009
  • The Log-structured File System (LFS) collects all modified data into a memory buffer and writes them sequentially to a segment on disk. Therefore, it has the potential to utilize the maximum bandwidth of storage devices where sequential writes are much faster than random writes. However, as disk space is finite, LFS has to conduct cleaning to produce free segments. This cleaning operation is the main reason LFS performance deteriorates when file system utilization is high. To overcome painful cleaning and reduced performance of LFS, we propose the segment space recycling (SSR) scheme that directly writes modified data to invalid areas of the segments and describe the classification method of data and segment to consider locality of reference for optimizing SSR scheme. We implement U-LFS, which employs our segment space recycling scheme in LFS, and experimental results show that SSR scheme increases performance of WOLF by up to 1.9 times in HDD and 1.6 times in SSD when file system utilization is high.

A Study on the Classification Scheme of e-Book Contents (전자책(e-Book) 컨텐츠 분류체계에 관한 연구)

  • 김진아
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2002.08a
    • /
    • pp.11-18
    • /
    • 2002
  • 디지털 전자출판의 대표적인 형태인 전자책은 다양한 분야에서 급성장을 하고 있으며 그 분야와 시장은 더욱 넓어지고 있다. 국내에서도 전자책을 제공하는 업체들이 생겨났으며, 이용자들도 증가하고 있다. 책을 검색하여 원하는 도서를 찾아 읽는다는 의미에서 도서관의 기능도 하고 있으며 따라서 합리적인 분류체계가 수반되어져야 할 것이다. 이에 본 논문에서는 국내 전자책 컨텐츠 업체 5곳과 국외 4곳을 선정한 후 이곳에서 제공하고 있는 전자책의 분류체계를 국내는 KDC와 국외는 DDC와 비교분석하여 보고자 한다.

  • PDF

A study on the classification scheme of the Internet search engine (인터넷 탐색엔진의 분류체계에 관한 연구)

  • 김영보
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 1997.08a
    • /
    • pp.99-102
    • /
    • 1997
  • 인터넷 도구 중의 하나인 탐색엔진은 월드 와이드 웹의 보편화와 함께 중요한 매개체로 자리잡고 있다. 탐색엔진은 서비스 제공형태에 의해 크게 분류체계 제공형과 주제어 검색 제공형으로 나뉘어 지는데, 분류체계 제공형 엔진에 대한 연구는 그 이용빈도에 비해 부족한 편이다. 따라서, 인터넷 이용자의 탐색노력을 줄이는데 보다 유용한 분류체계 제공형 엔진에 대한 연구가 필요하다. 본 연구에서는 분류체계 제공에 중점을 두고 있는 국내외의 대표적인 탐색엔진 6종과 문헌 분류이론인 KDC와 DDC를 선정하여 그 분류체계를 비교ㆍ분석하여 적합한 형태의 탐색엔진 분류체계의 모형을 구축하고자 한다.

  • PDF

A Foundational Study for Development of Standardized Classification Scheme on Dance-Related Occupations (무용 직업유형 및 분류체계 개발을 위한 기초연구)

  • Kim, Eun Hye;Kim, Ji Young;Kim, Hyung Nam
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2018.05a
    • /
    • pp.529-530
    • /
    • 2018
  • 본 연구의 목적은 무용전공자를 위한 체계적이고 내실 있는 진로개입을 위한 무용직업군 유형 및 분류체계를 개발하는 것이다. 이를 위하여 문헌조사와 전문가회의를 거쳐 최종적인 무용직업군 유형과 분류체계를 개발하였다. 개발된 무용직업군 유형 및 분류체계를 바탕으로 무용진로개입 발전 방안을 도출하였다.

  • PDF

Load Fidelity Improvement of Piecewise Integrated Composite Beam by Construction Training Data of k-NN Classification Model (k-NN 분류 모델의 학습 데이터 구성에 따른 PIC 보의 하중 충실도 향상에 관한 연구)

  • Ham, Seok Woo;Cheon, Seong S.
    • Composites Research
    • /
    • v.33 no.3
    • /
    • pp.108-114
    • /
    • 2020
  • Piecewise Integrated Composite (PIC) beam is composed of different stacking against loading type depending upon location. The aim of current study is to assign robust stacking sequences against external loading to every corresponding part of the PIC beam based on the value of stress triaxiality at generated reference points using the k-NN (k-Nearest Neighbor) classification, which is one of representative machine learning techniques, in order to excellent superior bending characteristics. The stress triaxiality at reference points is obtained by three-point bending analysis of the Al beam with training data categorizing the type of external loading, i.e., tension, compression or shear. Loading types of each plane of the beam were classified by independent plane scheme as well as total beam scheme. Also, loading fidelities were calibrated for each case with the variation of hyper-parameters. Most effective stacking sequences were mapped into the PIC beam based on the k-NN classification model with the highest loading fidelity. FE analysis result shows the PIC beam has superior external loading resistance and energy absorption compared to conventional beam.

Personalized Speech Classification Scheme for the Smart Speaker Accessibility Improvement of the Speech-Impaired people (언어장애인의 스마트스피커 접근성 향상을 위한 개인화된 음성 분류 기법)

  • SeungKwon Lee;U-Jin Choe;Gwangil Jeon
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.17-24
    • /
    • 2022
  • With the spread of smart speakers based on voice recognition technology and deep learning technology, not only non-disabled people, but also the blind or physically handicapped can easily control home appliances such as lights and TVs through voice by linking home network services. This has greatly improved the quality of life. However, in the case of speech-impaired people, it is impossible to use the useful services of the smart speaker because they have inaccurate pronunciation due to articulation or speech disorders. In this paper, we propose a personalized voice classification technique for the speech-impaired to use for some of the functions provided by the smart speaker. The goal of this paper is to increase the recognition rate and accuracy of sentences spoken by speech-impaired people even with a small amount of data and a short learning time so that the service provided by the smart speaker can be actually used. In this paper, data augmentation and one cycle learning rate optimization technique were applied while fine-tuning ResNet18 model. Through an experiment, after recording 10 times for each 30 smart speaker commands, and learning within 3 minutes, the speech classification recognition rate was about 95.2%.

A Scheme for Identifying Malicious Applications Based on API Characteristics (API 특성 정보기반 악성 애플리케이션 식별 기법)

  • Cho, Taejoo;Kim, Hyunki;Lee, Junghwan;Jung, Moongyu;Yi, Jeong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.187-196
    • /
    • 2016
  • Android applications are inherently vulnerable to a repackaging attack such that malicious codes are easily inserted into an application and then resigned by the attacker. These days, it occurs often that such private or individual information is leaked. In principle, all Android applications are composed of user defined methods and APIs. As well as accessing to resources on platform, APIs play a role as a practical functional feature, and user defined methods play a role as a feature by using APIs. In this paper we propose a scheme to analyze sensitive APIs mostly used in malicious applications in terms of how malicious applications operate and which API they use. Based on the characteristics of target APIs, we accumulate the knowledge on such APIs using a machine learning scheme based on Naive Bayes algorithm. Resulting from the learned results, we are able to provide fine-grained numeric score on the degree of vulnerabilities of mobile applications. In doing so, we expect the proposed scheme will help mobile application developers identify the security level of applications in advance.