• 제목/요약/키워드: Communication Process

검색결과 7,439건 처리시간 0.033초

Hard 분산 분할 기반 추론 시스템을 이용한 비선형 공정 모델링 (Nonlinear Process Modeling Using Hard Partition-based Inference System)

  • 박건준;김용갑
    • 한국정보전자통신기술학회논문지
    • /
    • 제7권4호
    • /
    • pp.151-158
    • /
    • 2014
  • 본 논문에서는 Hard 분산 분할 방법을 이용하는 추론 시스템을 소개하고 비선형 공정을 모델링한다. 이를 위해 입력 공간을 분산 형태로 분할하고 소속 정도가 0 또는 1을 갖는 Hard 분할 방법을 이용한다. 제안한 방법은 C-Means 클러스터링 알고리즘에 의해 구현되며, 초기 중심값에 민감한 단점을 보완하기 위해 LBG 알고리즘을 적용하여 이진 분할에 의한 초기 중심값을 이용한다. Hard 분산 분할된 입력 공간은 규칙 기반의 시스템 모델링에서 규칙을 형성한다. 규칙의 전반부 파라미터는 C-Means 클러스터링 알고리즘에 의한 소속행렬로 결정된다. 규칙의 후반부는 다항식 함수의 형태로 표현되며, 각 규칙의 후반부 파라미터들은 표준 최소자승법에 의해 동정된다. 비선형 공정으로는 널리 이용되는 데이터를 이용하여 비선형 공정을 모델링한 후 특성을 평가한다.

서포트 벡터 머신과 공정능력분석을 이용한 군 통신 쉘터의 EMI 차폐효과 안정 포인트 탐색 연구 (A Study on Searching Stabled EMI Shielding Effectiveness Measurement Point for Military Communication Shelter Using Support Vector Machine and Process Capability Analysis)

  • 구기범;권재욱;진홍식
    • 한국산학기술학회논문지
    • /
    • 제20권2호
    • /
    • pp.321-328
    • /
    • 2019
  • 군 통신 쉘터는 내부에 통신 및 환경장비를 탑재하여, 네트워크 중심전에서 다양한 무기체계들의 통합적인 전투력 발휘를 위해 요구되는 정보의 송/수신 기능을 실시간 보장하고 전술환경의 생존성을 극대화시키는 장비이다. 쉘터 내부에 다양한 통신용 장비가 탑재되기 때문에 외부로부터의 전자기 공격에 대한 차페 성능을 반드시 보장해야한다. 본 연구에서는 데이터 마이닝 기법(서포트 벡터 머신)과 통계적 품질관리 기법(공정능력분석)을 이용하여 군 통신용 쉘터에서 차폐성능이 안정된 지점을 탐색하는 연구를 진행하였다. 안정된 지점의 탐색을 위하여 45대 쉘터의 EMI 차폐효과 측정데이터를 활용하였다. 먼저, 차폐효과가 안정되었다고 판단할 수 있는 기준을 세우고 서포트 벡터 머신으로 해당 기준에 부합하는 측정 포인트 집단과 그 외의 집단을 분리, 이 두 집단을 분류할 수 있는 분류 하이퍼플레인을 작성하였다. 그리고 공정능력분석을 이용하여 차폐효과 측정 데이터를 분석, 공정능력지수가 높은 측정 포인트와 서포트 벡터 머신의 하이퍼플레인으로 분류한 측정 포인트를 상호 비교함으로써 분류된 측정 포인트의 타당성과 차폐효과가 안정된 정도를 분석하였다. 분석 결과, 24개의 측정포인트에서 안정된 차폐 성능을 보유하고 있음을 확인하였다.

가변 지연 MDCT/IMDCT를 이용한 오디오/음성 코덱 (Audio /Speech Codec Using Variable Delay MDCT/IMDCT)

  • 이상길;이인성
    • 한국정보전자통신기술학회논문지
    • /
    • 제16권2호
    • /
    • pp.69-76
    • /
    • 2023
  • MDCT/IMDCT 과정을 사용하는 고품질 오디오/음성 코덱은 이전 프레임 과의 중첩-합(Overlap-add) 과정을 통해 현재 프레임을 완벽 복원 가능하다. 중첩-합 과정에서 프레임 길이 만큼의 알고리즘 지연이 발생하게 된다. 본 논문에서는 알고리즘 지연을 줄이기 위해 MDCT/IMDCT에 가변적인 위상변이를 사용하여 알고리즘 지연을 줄인 MDCT/IMDCT 과정을 제안한다. 가변 지연 MDCT/IMDCT알고리즘을 ITU-T 표준 코덱 G.729.1 코덱에 적용하여 저지연 오디오/음성 코덱을 제안하였다. MDCT/IMDCT 과정에서의 알고리즘 지연은 기존 20 ms에서 1.25ms 까지 감소시킬 수 있다. 저지연 MDCT/IMDCT를 적용한 오디오/음성 코덱의 복호화된 출력신호는 객관적 음질 시험 방법인 PESQ 시험을 통해 성능 평가하였다. 전송 지연이 감소 됨에도 불구하고 기존 방법과 음질 차이가 없음을 확인할 수 있었다.

L3 Socialization of a Group of Mongolian Students Through the Use of a Written Communication Channel in Korea: A Case Study

  • Kim, Sun-Young
    • 비교문화연구
    • /
    • 제19권
    • /
    • pp.411-444
    • /
    • 2010
  • This paper explored the academic socialization of a group of Mongolian college students, learning Korean as their L3 (Third Language), by focusing on their uses of an electronic communication channel. From a perspective of the continua of bi-literacy, this case study investigated how Mongolian students who had limited exposure to a Korean learning community overcame academic challenges through the use of a written communication channel as a tool in the socialization process. Data were collected mainly through three methods: written products, interviews, and questionnaires. The results from this study were as follows. Interactional opportunities for these minority students were seriously constrained during the classroom practices in a Korean-speaking classroom. They also described the lack of communicative competence in Korean and the limited roles played by L2 (English) communication as key barriers to classroom practices. However, students' ways of engaging in electronic interactions differed widely in that they were able to broaden interactional circles by communicating their expertise and difficulties with their Korean peers through the electronic channel. More importantly, the communication pattern of "L2-L2/L3-L3" (on a L2-L3 continuum) emerging from data demonstrated how these students used a written channel as a socialization tool to mediate their learning process in a new community of learning. This study argues that a written communication channel should be taken as an essential part of teaching practices especially for foreign students who cannot speak Korean fluently in multi-cultural classes.

Secure Communication Schemes over ISO/IEEE 11073-20601 for Smart Healthcare Service

  • Kim, Sang Kon;Kim, Tae Kon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권7호
    • /
    • pp.2225-2238
    • /
    • 2022
  • For advanced healthcare services, a variety of agents should maintain reliable connections with the manager and communicate personal health and medical information. The ISO/IEEE 11073 standards provide convenient interoperability and the optimized exchange protocol (OEP) supports efficient communication for devices. However, the standard does not specify secure communication, and sensitive personal information is easily exposed through attacks. Malicious attacks may lead to the worst results owing to service errors, service suspension, and deliberate delays. All possible attacks on the communication are analyzed in detail, and the damage is specifically identified. In this study, novel secure communication schemes over the 20601 OEP are proposed by introducing an authentication process while maintaining compatibility with existing devices. The agent performs a secure association with the manager for mutual authentication. However, communication with mutual authentication is not completely free from attacks. Message encryption schemes are proposed for concrete security. The authentication process and secure communication schemes between the secure registered agent (SRA) and the secure registered manager (SRM) are implemented and verified. The experimental analysis shows that the complexities of the SRA and SRM are not significantly different from those of the existing agent and manager.

임베디드 프로세서를 이용한 계통 보호 IED 설계 (Power system protection IED design using an embedded processor)

  • 윤기돈;손영익;김갑일
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.711-713
    • /
    • 2004
  • In the past time, the protection relay did only a protection function. Currently, its upgraded device i.e. IED(Intelligent Electric Device) has been designed to protect, control, and monitor the whole power system automatically. Also the device is desired to successfully measure important elements of the power system. This paper considers design method of a digital protection IED with a function of measuring various elements and a communication function. The protection IED is composed of the specific function modules that are signal process module, communication module, input/output module and main control module. A signal process module use a DSP processor for analysis of input signal. Main control module use a embedded processor, Xscale, that has an ARM Core. The communication protocol uses IEC61850 protocol that becomes standard in the future. The protection IED is able to process mass information with high-performance processor. As each function module is designed individually, the reliability of the device can be enhanced.

  • PDF

Morphological Operations to Segment a Tumor from a Magnetic Resonance Image

  • Thapaliya, Kiran;Kwon, Goo-Rak
    • Journal of information and communication convergence engineering
    • /
    • 제12권1호
    • /
    • pp.60-65
    • /
    • 2014
  • This paper describes an efficient framework for the extraction of a brain tumor from magnetic resonance (MR) images. Before the segmentation process, a median filter is used to filter the image. Then, the morphological gradient is computed and added to the filtered image for intensity enhancement. After the enhancement process, the thresholding value is calculated using the mean and the standard deviation of the image. This thresholding value is used to binarize the image followed by the morphological operations. Moreover, the combination of these morphological operations allows to compute the local thresholding image supported by a flood-fill algorithm and a pixel replacement process to extract the tumor from the brain. Thus, this framework provides a new source of evidence in the field of segmentation that the specialist can aggregate with the segmentation results in order to soften his/her own decision.

CNG 암호 라이브러리에서의 SSL 통신과정 분석 (Analysis of SSL Communication Process in CNG Crypto Library)

  • 이경률;오인수;이선영;임강빈
    • 한국통신학회논문지
    • /
    • 제42권5호
    • /
    • pp.1027-1037
    • /
    • 2017
  • CNG가 활용되는 환경이 증가함에 따라, CNG 암호 라이브러리에서의 보안 취약점 분석에 대한 연구가 요구되는 실정이다. 이에 본 논문에서는 CNG 암호 라이브러리에서의 SSL 통신과정을 분석함으로써 SSL 통신을 활용하는 응용에서 발생 가능한 보안 취약점을 도출하기 위한 자료 및 보안성을 향상시키는데 기여할 것으로 사료된다.

이동통신기술과의 연관성을 고려한 차세대 이동통신서비스의 수요예측에 관한 연구 (A Study on a Forecasting the Demand for the Future Mobile Communication Service by Integrating the Mobile Communication Technology)

  • 주영진;김선재
    • 한국경영과학회지
    • /
    • 제29권1호
    • /
    • pp.87-99
    • /
    • 2004
  • In this paper, we have developed a technology-service relationship model which describes the diffusion process of a group of services and relevant technologies, and have applied the developed model to the prediction of the number of subscribers to the next generation mobile service. The technology-service relationship model developed in this paper incorporates the developing process of relevant technologies, a supply-side factor, into the diffusion process of specific services, while many diffusion models and multi-generation diffusion models in previous researches are mainly reflect the demand-side factors. So, the proposed model could effectively applied to the telecommunication services where the developing of the relevant technologies are very essential to the service Penetration. In our application, the Proposed model provides a competitive substitution between the next generation mobile service and the traditional mobile service.

A Study of the Effects on Applying Test Design to Information Communication Authority Module

  • Jang, Jinwook
    • 한국정보기술학회 영문논문지
    • /
    • 제8권2호
    • /
    • pp.111-118
    • /
    • 2018
  • Information communication authority module software contains various functions and services. A software test is the only acceptance test step. Recently, however, all development steps have become important. In particular, the software acceptance step is very high, and a study of the effective use of limited time and resources on acceptance step is needed. This study examined the efficiency of the Test Design Technique for Software Test. The proposed Test Design process was applied to the domain systems of info-communication and the degree of improvement was measured. This paper establishes Software Test design process Infrastructure based on the developed software.