• Title/Summary/Keyword: Digital IF

Search Result 2,200, Processing Time 0.034 seconds

Dynamic Critical Path Selection Algorithm (DYSAC) for VLSI Logic Circuits (VLSI 논리회로의 동적 임계경로 선택 알고리듬 (DYSAC))

  • 김동욱;조원일;김종현
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.9
    • /
    • pp.1-10
    • /
    • 1998
  • This paper is to propose an algorithm named as DYSAC to find the critical path(the longest sensitizable path) in a large digital circuit, whose purpose is to reduce the time to find critical path and to find critical paths of the circuits for which the previous methods could not find one. Also a set of path sensitization criteria named as DYPSEC is proposed, which is used to select a path from input to the output inside the DYSAC. The DYSAC consists of two sub-algorithms; the level assignment algorithm to assign a level to each node and the critical path selection algorithm to select the sensitizable path. The proposed algorithm was implemented with C-language on SUN Sparc and applied to the ISCAS'85 benchmark circuits to make sure if it works correctly and finds the correct critical path. Also, the results from the experiments were compared to the results from the previous works. The comparison items were the ability to find the critical path and the speed, in both of which the proposed algorithm in this paper shows better results than others.

  • PDF

Driver Assistance System By the Image Based Behavior Pattern Recognition (영상기반 행동패턴 인식에 의한 운전자 보조시스템)

  • Kim, Sangwon;Kim, Jungkyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.123-129
    • /
    • 2014
  • In accordance with the development of various convergence devices, cameras are being used in many types of the systems such as security system, driver assistance device and so on, and a lot of people are exposed to these system. Therefore the system should be able to recognize the human behavior and support some useful functions with the information that is obtained from detected human behavior. In this paper we use a machine learning approach based on 2D image and propose the human behavior pattern recognition methods. The proposed methods can provide valuable information to support some useful function to user based on the recognized human behavior. First proposed one is "phone call behavior" recognition. If a camera of the black box, which is focused on driver in a car, recognize phone call pose, it can give a warning to driver for safe driving. The second one is "looking ahead" recognition for driving safety where we propose the decision rule and method to decide whether the driver is looking ahead or not. This paper also shows usefulness of proposed recognition methods with some experiment results in real time.

Security Standardization for Social Welfare in the Presence of Unverifiable Control (규제할 수 없는 보안통제가 존재하는 경우 보안 규제 설정)

  • Lee, Chul Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.99-121
    • /
    • 2017
  • Standard makers in both private and public sectors have been increasingly mandating security standards upon organizations to protect organizational digital assets. A major issue in security standardization is that standards often cannot regulate all possible security efforts by the standard maker because some efforts are unverifiable by nature. This paper studies from an analytical perspective how a standard maker should design the standard using a verifiable security control in the presence of another related unverifiable one. We compare it with two benchmark standards; $na{\ddot{i}}ve$-standard which refers to the standard maker who ignores the existence of the unverifiable control, and complete-information standard which refers to the maker sets standards on both controls. Optimal standard and benchmark standard depend critically on how the two controls are configured. Under parallel configuration, the existence of the unverifiable control induces the policy maker to set a higher standard (the complete-information standard is optimal); under serial configuration, a lower standard is applied (neither benchmark works). Under best-shot configuration and if the verifiable control is more cost-efficient, the existence of the unverifiable control has no impact on the optimal standard (the $na{\ddot{i}}ve$ standard is optimal).

An Anti-Forensic Technique for Hiding Data in NTFS Index Record with a Unicode Transformation (유니코드 변환이 적용된 NTFS 인덱스 레코드에 데이터를 숨기기 위한 안티포렌식 기법)

  • Cho, Gyu-Sang
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.75-84
    • /
    • 2015
  • In an "NTFS Index Record Data Hiding" method messages are hidden by using file names. Windows NTFS file naming convention has some forbidden ASCII characters for a file name. When inputting Hangul with the Roman alphabet, if the forbidden characters for the file name and binary data are used, the codes are convert to a designated unicode point to avoid a file creation error due to unsuitable characters. In this paper, the problem of a file creation error due to non-admittable characters for the file name is fixed, which is used in the index record data hiding method. Using Hangul with Roman alphabet the characters cause a file creation error are converted to an arbitrary unicode point except Hangul and Roman alphabet area. When it comes to binary data, all 256 codes are converted to designated unicode area except an extended unicode(surrogate pairs) and ASCII code area. The results of the two cases, i.e. the Hangul with Roman alphabet case and the binary case, show the applicability of the proposed method.

A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini (악의적 지니 프록시로부터 비밀 정보 보호를 위한 암호학적 모델)

  • Yang Jong-Phil;Rhee Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.27-34
    • /
    • 2006
  • In the near future, people will wish to access many kinds of heterogeneous networks to use their services anytime and anywhere. Owing to the heterogeneity of networks, there must be many kinds of protocols to guarantee secure services. The mobile device can depend in a middleware for accessing services in the heterogeneous networks and the middleware helps the mobile device to communicate with services without blowing concrete protocols. If a secure channel is necessary, the middleware may access a private key in the mobile device to perform a security protocol. In this paper, we focus on the security of a private key in the mobile device against malicious middlewares. To do so, we introduce two models for a user to protect his/her private key against malicious middlewares by generating authentication data(e.g., digital signatures) without keeping the private key in the mobile device.

Study on the Reconstruction of KSTAR Plasma Density Profiles Using Microwave Reflectometry (마이크로파 레플렉토메터리를 이용한 KSIAR 플라즈마 밀도분포 재구성에 관한 연구)

  • Roh Young-Su
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.54 no.8
    • /
    • pp.365-370
    • /
    • 2005
  • Microwave diagnostics have been widely utilized to measure the important parameters of high temperature and high density plasmas. Reflectometry is known as a promising microwave diagnostic which has a number of merits to measure electron density profiles. In the KSTAR device, X-mode FM reflectometry is planned to measure the plasma density profiles. FM reflectometry is required to extract phase information on raw mixer IF signals, thereby obtaining time-of-flight of reflectometry signals. It is known that the data analysis method is crucial to determine the performance of FM reflectometry In fact, there are several analysis programs which have been utilized in various FM systems. Since each program was developed for a specific device, however, it is difficult to directly apply it to a different reactor like the KSTAR device. It is necessary, therefore, to develop a data analysis program for the KSTAR FM reflectometry. In this paper, complex digital demodulation (CDM) and wavelet transformation are examined in terms of the performance of density profile reconstruction. For the comparison of both methods, FM reflectometry signals are generated on the basis of assumed profiles and the interaction of the X-mode wave and the plasma. In order to see how well both methods work under various conditions, three types of profiles are assumed and noise effects are included. As a result, both methods work well under the condition of gentle density gradient and small noise level. As density gradient becomes steeper and noise level gets higher. the reconstruction performance of wavelet is better than that of CDM.

Heritabilities of Facial Measurements and Their Latent Factors in Korean Families

  • Kim, Hyun-Jin;Im, Sun-Wha;Jargal, Ganchimeg;Lee, Siwoo;Yi, Jae-Hyuk;Park, Jeong-Yeon;Sung, Joohon;Cho, Sung-Il;Kim, Jong-Yeol;Kim, Jong-Il;Seo, Jeong-Sun
    • Genomics & Informatics
    • /
    • v.11 no.2
    • /
    • pp.83-92
    • /
    • 2013
  • Genetic studies on facial morphology targeting healthy populations are fundamental in understanding the specific genetic influences involved; yet, most studies to date, if not all, have been focused on congenital diseases accompanied by facial anomalies. To study the specific genetic cues determining facial morphology, we estimated familial correlations and heritabilities of 14 facial measurements and 3 latent factors inferred from a factor analysis in a subset of the Korean population. The study included a total of 229 individuals from 38 families. We evaluated a total of 14 facial measurements using 2D digital photographs. We performed factor analysis to infer common latent variables. The heritabilities of 13 facial measurements were statistically significant (p < 0.05) and ranged from 0.25 to 0.61. Of these, the heritability of intercanthal width in the orbital region was found to be the highest ($h^2$ = 0.61, SE = 0.14). Three factors (lower face portion, orbital region, and vertical length) were obtained through factor analysis, where the heritability values ranged from 0.45 to 0.55. The heritability values for each factor were higher than the mean heritability value of individual original measurements. We have confirmed the genetic influence on facial anthropometric traits and suggest a potential way to categorize and analyze the facial portions into different groups.

The Classification of Foot Types of Junior High School Boys for the Development of Shoes' Easy-Order Prototype (신발류 이지오더 Prototype 개발을 위한 청소년의 발의 형태 분류)

  • Lim, Ji-Young;Choi, Sung-Won
    • Fashion & Textile Research Journal
    • /
    • v.7 no.5
    • /
    • pp.535-541
    • /
    • 2005
  • The health of feet is connected with individual's health and affects a man's activity. Shoes need to be designed to protect feet and to absorb the impact of land. In order to choose suitable shoes for feet, the foot size and shape must be considered, so it is essential to grasp the exact size and shape of the foot. This study aims to present fundamental data on shoes' easy order prototype development for choosing shoes of good wearing comfort, by classifying feet size and shape junior high school boys in the early adolescent period. The subject were 234 Korean junior high school boys age from 14 to 16 years old. The subjects were directly measured anthropometrically and indirectly analyzed photographically. 6 factors were extracted through factor analysis and those factors comprised 79.42% of total variance. The factors characterizing foot girth and width, foot length, foot height, foot shape around the fifth toes, angle of foot breadth and foot shape around the first toes. 3 clusters as their foot shape were categorized using 6 factor scores by cluster analysis. Type 1 was characterized by long large foot with deformed first toe. Type 2 had smaller in foot girth, width and length than other types and with deformed fifth toe. Type 3 had average size and high foot shape. Shoes prototype which is to be developed later on will be able to generate 2D flattening in the foot sole form. Therefore, it would be a great support in producing and choosing appropriate shoes if forms are classified by subdividing foot form classification and extract a factor which shows only the foot sole shape.

Analysis of Shadows Effect in Seoul Area for the Estimation of Roof-type PV Power Calculation (지붕형 태양광 발전량 산정을 위한 서울지역 그림자 효과 분석)

  • Yun, ChangYeol;Jung, BoRin;Kim, ShinYoung;Kim, ChangKi;Kim, JinYoung;Kim, HyunGoo;Kang, YongHeack;Kim, YongIl
    • Journal of the Korean Solar Energy Society
    • /
    • v.38 no.2
    • /
    • pp.45-53
    • /
    • 2018
  • For the preliminary step for estimating the performance of roof-type photovoltaic system in urban areas, we analyzed the solar radiation reduction ratio by shadow effect by buildings using DSM (Digital Surface Model) and GIS (Geographical Information System) tools. An average loss by the shadow is about 19% in Seoul. The result was related to the building density and distribution. Monthly results show that the winter season (December and January) was more affected by the shading than during the summer season (June and July). It is expected that useful empirical formulas can be made if more detailed correlation studies are performed.

Affective Metaphor of Dimensional Perception (물리적 차원 지각에 대한 감성 메타포)

  • Mun, Sung-Chul;Whang, Min-Cheol;Lee, Jung-Nyun;Kim, Jong-Hwa;Kim, Ji-Hye
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.1
    • /
    • pp.187-193
    • /
    • 2011
  • Objective: The aim of this study was to investigate the association between conceptual metaphors of affect and physical dimensions. Background: The evidence that affect is unconsciously linked to physical dimensions(e.g., position and color) has been obtained in western cultures. However, in eastern cultures, especially, in Korea, it has been seldom tested. It is indispensable to examine whether or not cultural differences exist for better understanding of the conceptual metaphors. Method: 50 positive and 50 negative words were adopted from previous studies in order to determine the relationship between physical domains and abstract affect. Three hypotheses were tested in this study: (1) Good is up. (2) Good is bright. (3) Good is right(for right-handers). The automatic association between valence(positive vs. negative) and vertical position (up vs. down) was investigated in experiment 1, in which 100 words were randomly presented on either the top or the bottom of a LCD screen and the evaluation time of the presented word was recorded. The unconscious association between valence and color(white and black) was examined in experiment 2, where each word was randomly presented in either white or black. Lastly, we tested whether right-handers tend to associate rightward space with positive ideas and leftward space with negative ideas. Results: Reaction time was faster when words were presented in metaphor congruent domains(e.g., 'positive words on the top, in bright color, and on right space vs. negative words on the bottom, in dark color, and on left region) than when they were shown in metaphor incongruent domains. Conclusion: The results might give the groundwork for various directions in further understanding perception, emotion, and behavior. Application: This study may provide useful points to GUI designers and service developers if further studies enhanced in validity and reliability are followed.