• Title/Summary/Keyword: Dual Attention

Search Result 190, Processing Time 0.029 seconds

Analysis On Security and Dependability for IED System in SAS (변전소 IED의 보안과 신뢰성에 관한 고찰)

  • Guan, Qiang;Han, Seung-Soo;Lee, Seung-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2006.11a
    • /
    • pp.21-23
    • /
    • 2006
  • As a general rule for evaluating dependability of a system, reliability is commonly considered which barely rays attention to the system behavior, however the estimation is based on the assumption of a fault-frost system, which may be impracticable and inaccurate especially for complicated system. This paper introduces a security and dependability integrated approach to analyze the availability of a fault-active system both from dependability and security points of view. Two fault modes involved are discussed about the impairment to the system reliance. The approach can be well applied to estimate and quantify the attribute of system robustness with the help of Markov chain process, which is good at solving status related problem. The comparison result between dual system and IEC61850-based almighty backup system is shown to sup-port the suggested approach.

  • PDF

Error Analysis: What Problems do Learners Face in the Production of the English Passive Voice?

  • Jung, Woo-Hyun
    • English Language & Literature Teaching
    • /
    • v.12 no.2
    • /
    • pp.19-40
    • /
    • 2006
  • This paper deals with a part-specific analysis of grammatical errors in the production of the English passive in writing. The purpose of the study is dual: to explore common error types in forming the passive; and to provide plausible sources of the errors, with special attention to the role of the native language. To this end, this study obtained a large amount of data from Korean EFL university students using an essay writing task. The results show that in forming the passive sentence, errors were made in various ways and that the most common problem was the formation of the be-auxiliary, in particular, the proper use of tense and S-V agreement. Another important finding was that the global errors found in this study were not necessarily those with the greatest frequency. Also corroborated was the general claim that many factors work together to account for errors. In many cases, interlingual and intralingual factors were shown to interact with each other to explain the passive errors made by Korean students. On the basis of the results, suggestions are made for effective and well-formed use of the passive sentence.

  • PDF

Characteristics of Dielectric Breakdown in Liquid Nitrogen (액체질소의 절연파괴특성)

  • 추영배;류경우;류강식;김상현
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.37 no.12
    • /
    • pp.872-878
    • /
    • 1988
  • During the past few years, a great deal of attention has been directed to the application of superconductivity to the electrical systems such as superconducting power transmission lines, superconducting magnet energy storage and so on. Yet in order to develop the practical model of these electrical equiqments utilizing suprconductivety and other phenomena at cryogenic temperautre, it is necessary to know the dielectric behaviour of insulating materials at cryogenic temperature in view of reliability, safety and economy of these machines. Investigation of dielectric properties of cryogenic liquids is very important due to the dual role of those as the dielectric and cooling medium. In this study, we investigated results measured over several kinds of dielectric characteristics of liquid nitrogen taking into consideration for application of high Tc superconductor. Dependence of breakdown voltage of gap width, polarity and pressure is reported in this paper and time delay characteristics of breakdown is also the subject of this discussion.

  • PDF

The Vocalization for Korean Traditional Song "Pansori" (국악(판소리) 발성법)

  • Hong, Ki-Hwan
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.22 no.2
    • /
    • pp.111-114
    • /
    • 2011
  • All singers can often develop voice trouble secondary to vocal abuse and overuse, but it is well known that traditional Korean singer (pansori) develop voice disorders more frequently than western style sunger. While laryngological concern for voice disorders arising in professional singers has received some attention, empirically motivated investigations of the underlying acoustic features of the singing voice have been relatively limited. Since all singers have a good knowledge of the voice and voice training, they would hardly give consent for treatment to a doctor unless he understood their desire to maximize their voice quality. The components of this report are composed of breathing, basic ekement, and vocalization, essencial fact, for getting a perfect voice for pansori. The breathing is based on hypogastric breathing. The main functions of breathing are energy and power of utterence, tempo of rhythm and seperating paragraph and controlling feelings according to dramatic situation. Vocalization is based on general vocalization. Main uses of it are maintaining singer's tone and harmony of cosmetic dual force.

  • PDF

Fabrication of a 1.3/l.55$\mu\textrm{M}$InGaAlAs/InP Dual Wavelength Demultiplexer Based on Multimode Interference(MMI) (다중모드 간섭효과를 이용한 1.3/1.55$\mu\textrm{M}$ InGaAlAs/InP 파장분배기의 제작)

  • Moon, Jeong-Yi;Yu, Jae-Su;Dong, Song-Jin;Kim, Jong-Min;Lee, Yong-Tik
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2001.02a
    • /
    • pp.34-35
    • /
    • 2001
  • The wavelength demultiplexer is an essential component in optical transmission systems using wavelength-division multiplexing(WDM), which can increase the number of channels and information capacity of optical fibers. For optical telecommunication, much attention has been given to demultiplexing two wavelengths in the 1.3${\mu}{\textrm}{m}$ of low dispersion band and 1.55${\mu}{\textrm}{m}$ of low loss window. Various integrated-optical devices have been proposed to perform this function, including conventional directional couplers, asymmetric Y-branching devices, asymmetric Mach-Zehnder interferometers and two-mode interference devices. (omitted)

  • PDF

An Implementation of Preprocessing for Interior Point Methods for Linear Programming (내부점 방법을 위한 사전처리의 구현)

  • 성명기;임성묵;박순달
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.24 no.1
    • /
    • pp.1-11
    • /
    • 1999
  • We classified preprocessing methods into (1) analytic methods, (2) methods for removing implied free variables, (3) methods using pivot or elementary row operations, (4) methods for removing linearly dependent rows and columns and (5) methods for dense columns. We noted some considerations to which should be paid attention when preprocessing methods are applied to interior point methods for linear programming. We proposed an efficient order of preprocessing methods and data structures. We also noted the recovery process for dual solutions. We implemented the proposed preprocessing methods. and tested it with 28 large scale problems of NETLIB. We compared the results of it with those of preprocessing routines of HOPDM, BPDPM and CPLEX.

  • PDF

Combination-mode BLE Device Profile for Connection & Non-connection Methods

  • Jiang, Guangqiu;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.897-899
    • /
    • 2016
  • In recent years, BLE technology has received extensive attention and has been applied to all aspects of life. The existing BLE device has two methods, one is the connection method, and the other is a non-connection method. The representative profile of the connection method is the proximity file. The most typical example of Non-connection method BLE device is a beacon. However, they are both independent and have their own shortcomings. Connection method device can provide service for only one user, others can't use. Security performance of Non-connection method BLE device is poor and the device can't be controlled by the user. In this paper, a combination-mode BLE device profile design scheme is presented, which combines with the previous two methods, and solves the defaults. And We define a dual purpose advertising package that can be used in a normal environment as well as in a disaster environment. Finally, a unidirectional Control idea is proposed. Through performance evaluation, we found that the device has strong stability and low power consumption.

Context-Sensitive Spelling Error Correction Techniques in Korean Documents using Generative Adversarial Network (생성적 적대 신경망(GAN)을 이용한 한국어 문서에서의 문맥의존 철자오류 교정)

  • Lee, Jung-Hun;Kwon, Hyuk-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.10
    • /
    • pp.1391-1402
    • /
    • 2021
  • This paper focuses use context-sensitive spelling error correction using generative adversarial network. Generative adversarial network[1] are attracting attention as they solve data generation problems that have been a challenge in the field of deep learning. In this paper, sentences are generated using word embedding information and reflected in word distribution representation. We experiment with DCGAN[2] used for the stability of learning in the existing image processing and D2GAN[3] with double discriminator. In this paper, we experimented with how the composition of generative adversarial networks and the change of learning corpus influence the context-sensitive spelling error correction In the experiment, we correction the generated word embedding information and compare the performance with the actual word embedding information.

A School Guide System Using NFC Tag (NFC를 이용한 학교안내 시스템)

  • Lee, Dong-ho;Jung, Won-young;Sim, Yu-jin;Hwang, Soyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.124-126
    • /
    • 2014
  • The NFC technology is contactless communication technology that one of the RFID/USN technology. NFC is available dual function that read and write without specified reader, and it is received attention because of high security and low price. This paper proposes design of a school guide system using NFC tag. First School visitants such as delivery man or the other person are confused about the location of building, so this system will be helpful in this situation.

  • PDF

INVERTIBILITY OF GENERALIZED BESSEL MULTIPLIERS IN HILBERT C-MODULES

  • Tabadkan, Gholamreza Abbaspour;Hosseinnezhad, Hessam
    • Bulletin of the Korean Mathematical Society
    • /
    • v.58 no.2
    • /
    • pp.461-479
    • /
    • 2021
  • This paper includes a general version of Bessel multipliers in Hilbert C∗-modules. In fact, by combining analysis, an operator on the standard Hilbert C∗-module and synthesis, we reach so-called generalized Bessel multipliers. Because of their importance for applications, we are interested to determine cases when generalized multipliers are invertible. We investigate some necessary or sufficient conditions for the invertibility of such operators and also we look at which perturbation of parameters preserve the invertibility of them. Subsequently, our attention is on how to express the inverse of an invertible generalized frame multiplier as a multiplier. In fact, we show that for all frames, the inverse of any invertible frame multiplier with an invertible symbol can always be represented as a multiplier with an invertible symbol and appropriate dual frames of the given ones.