• Title/Summary/Keyword: Dynamic Environments

Search Result 1,026, Processing Time 0.026 seconds

Functional Requirements to Develop the Marine Navigation Supporting System for Northern Sea Route (북극해 안전운항 지원시스템 구축을 위한 기능적 요구조건 도출)

  • Hong, Sung Chul;Kim, Sun Hwa;Yang, Chan Su
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.19-26
    • /
    • 2014
  • International attention on the Northern Sea Route has been increased as the decreased sea-ice extents in Northern Sea raise the possibility to develop new sea routes and natural resources. However, to protect ships' safety and pristine environments in polar waters, International Maritime Organization(IMO) has been developing the Polar Code to regulate polar shipping. The marine navigation supporting system is essential for ships traveling long distance in the Northern Sea as they are affected by ocean weather and sea-ice. Therefore, to cope with the IMO Polar Code, this research proposes the functional requirements to develop the marine navigation supporting system for the Northern Sea Route. The functional requirements derived from the IMO Polar code consist of arctic voyage risk map, arctic voyage planning and MSI(Marine Safety Information) methods, based on which the navigation supporting system is able to provide dynamic and safe-economical sea route service using the sea-ice observation and prediction technologies. Also, a requirement of the system application is derived to apply the marine navigation supporting system for authorizing ships operating in the Northern Sea. To reflect the proposed system in the Polar Code, continual international exchange and policy proposals are necessary along with the development of sea-ice observation and prediction technologies.

A Study on the Effect of Core Employee Policy and Core Employee Management System on Competitiveness of Human Resource and Organizational Commitment in SMEs (중소기업의 핵심인재우대정책과 관리제도가 인적자원의 경쟁력과 조직몰입에 미치는 영향에 관한 연구)

  • Jung, Hyun-Woo
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.153-172
    • /
    • 2013
  • Small and medium-sized enterprises(SMEs) have limited human and material resources than large firms. SMEs are characterized by high risk and dynamic working environments. Thus human resources having knowledge and technologies are very important factor for survival and performance in SMEs. Recently, as core employee group is a key asset to firm competitiveness, many SMEs attend to set up core employee policy and system. The purposes of this research are to examine the effect of core employee policy and core employee management system on competitiveness of human resource and organizational commitment in SMEs. The major findings of the research are core employee policy have non-significant influence core employee management system, core employee policy have positive influence competitiveness of human resource, core employee management system have non-significant influence competitiveness of human resource, and competitiveness of human resource have positive influence organizational commitment in SMEs.

  • PDF

A 12b 1kS/s 65uA 0.35um CMOS Algorithmic ADC for Sensor Interface in Ubiquitous Environments (유비쿼터스 환경에서의 센서 인터페이스를 위한 12비트 1kS/s 65uA 0.35um CMOS 알고리즈믹 A/D 변환기)

  • Lee, Myung-Hwan;Kim, Yong-Woo;Lee, Seung-Hoon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.3
    • /
    • pp.69-76
    • /
    • 2008
  • This work proposes a 12b 1kS/s 65uA 0.35um CMOS algorithmic ADC for sensor interface applications such as accelerometers and gyro sensors requiring high resolution, ultra-low power, and small size simultaneously. The proposed ADC is based on an algorithmic architecture with recycling techniques to optimize sampling rate, resolution, chip area, and power consumption. Two versions of ADCs are fabricated with a conventional open-loop sampling scheme and a closed-loop sampling scheme to investigate the effects of offset and 1/f noise during dynamic operation. Switched bias power-reduction techniques and bias circuit sharing reduce the power consumption of amplifiers in the SHA and MDAC. The current and voltage references are implemented on chip with optional of-chip voltage references for low-power SoC applications. The prototype ADC in a 0.35um 2P4M CMOS technology demonstrates a measured DNL and INL within 0.78LSB and 2.24LSB, and shows a maximum SNDR and SFDR of 60dB and 70dB in versionl, and 63dB and 75dB in version2 at 1kS/s. The versionl and version2 ADCs with an active die area of $0.78mm^2$ and $0.81mm^2$ consume 0.163mW and 0.176mW at 1kS/s and 2.5V, respectively.

A Design Technique of Configurable Framework for Home Network Systems (홈 네트워크 시스템을 위한 재구성 프레임워크 설계 기법)

  • Kim, Chul-Jin;Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1844-1866
    • /
    • 2011
  • In a home network system, each customer electronic device has the control data format chosen by its manufacturing company and there are various types of digital devices and protocols. Besides the mutual operating environments among the various devices are dissimilar. Affected by the characteristics explained above, home network systems can hardly support the crucial functions, such as data compatibility, concurrency control, and dynamic plug-in. Thus, the home network system shows relatively poor reusability. In this paper, we suggest design technique of configurable framework, which can widely support the variability, to increase the reusability of the home network system. We extract the different parts of the home network system as variation points, and define them as the variability types. We design a structure of configurable framework, and suggest customization technique of configurable framework through selection technique and plug-in technique. Also, we prove the reusability by applying the proposed framework and it methods to real-world home network systems and analyzing the measurement results of these case studies using software metrics. We can expect the proposed approach provides better reusability than the existing them by analyzing those measurement results.

An Extended Negotiation Agent Using Multi-Issues under Time-Constraint Environment (시간제약 환경에서 다중 속성을 이용한 확장된 협상 에이전트)

  • 김현식;양성봉
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1208-1219
    • /
    • 2003
  • The Internet has become a part of our life and has changed our living environments dramatically. However, Electronic Commerce (EC) stays currently at a level that a buyer deals only with an one-sided condition (price) proposed by a seller or compares the proposed condition to find a better one. As the agent technology makes progress, EC requires negotiation that is not one-sided but is a way to maximize profits of both seller and buyer. Moreover, negotiation in EC should consider multiple issues rather than a single issue to replace the traditional commerce. In this paper we propose a negotiation model, which guarantees balanced profits between two agents through negotiation using multi-issues, and makes a deal successfully under time-constraint environment. The proposed negotiation model suggests strategies(alternative and simultaneous strategy) that change the value of issues with each agent has time for negotiation. In this paper, we also suggest a strategy that proposes an offer to each other. We compare the proposed negotiation model with another negotiation model. The experimental results show that dynamic conceder tactic and linear tactic showed balanced profits and a high percentage of deals for negotiation between two agents, and the sum of utilities of two agents is high, when the alternative strategy is used.

Design of an Arm Gesture Recognition System Using Feature Transformation and Hidden Markov Models (특징 변환과 은닉 마코프 모델을 이용한 팔 제스처 인식 시스템의 설계)

  • Heo, Se-Kyeong;Shin, Ye-Seul;Kim, Hye-Suk;Kim, In-Cheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.10
    • /
    • pp.723-730
    • /
    • 2013
  • This paper presents the design of an arm gesture recognition system using Kinect sensor. A variety of methods have been proposed for gesture recognition, ranging from the use of Dynamic Time Warping(DTW) to Hidden Markov Models(HMM). Our system learns a unique HMM corresponding to each arm gesture from a set of sequential skeleton data. Whenever the same gesture is performed, the trajectory of each joint captured by Kinect sensor may much differ from the previous, depending on the length and/or the orientation of the subject's arm. In order to obtain the robust performance independent of these conditions, the proposed system executes the feature transformation, in which the feature vectors of joint positions are transformed into those of angles between joints. To improve the computational efficiency for learning and using HMMs, our system also performs the k-means clustering to get one-dimensional integer sequences as inputs for discrete HMMs from high-dimensional real-number observation vectors. The dimension reduction and discretization can help our system use HMMs efficiently to recognize gestures in real-time environments. Finally, we demonstrate the recognition performance of our system through some experiments using two different datasets.

A Service Architecture to support IP Multicast Service over UNI 4.0 based ATM Networks (UNI 4.0 기반 ATM 망에서의 IP 멀티캐스트 지원 방안을 위한 서비스 구조)

  • Lee, Mee-Jeong;Jung, Sun;Kim, Ye-kyung
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.3
    • /
    • pp.348-359
    • /
    • 2000
  • Most of the important real time multimedia applications require multipoint transmissions. To support these applications in ATM based Intermet environments, it is important to provide efficient IP multicast transportations over ATM networks. IETF proposed MARS(Multicast Address Resolution Server) as the service architecture to transport connectionless IP multicast flows over connection oriented ATM VCs. MARS assumes UNI3.0/3.1 signalling. Since UNI3.0/3.1 does not provide any means for receivers to request a join for a multicast ATM VC, MARS provides overlay service to relay join request from IP multicast group members to the sources of the multicast group. Later on, ATM Forum standardized UNI4.0 signalling which is provisioned with a new signalling mechanism called LIJ(Leaf Initiated Join). LIJ enables receivers to directly signal the source of an ATM VC to join. In this paper, we propose a new service architecture providing IP multicast flow transportation over ATM networks deploying UNI4.0 signalling. The proposed architecture is named UNI4MARS. It comprises service components same as those of the MARS. The main functionality provided by the UNI4MARS is to provide source information to the receivers so that the receivers may exploit LIJ to join multicast ATM VCs dynamically. The implementation overhead of UNI4MARS and that of MARS are compared by a course of simulations. The simulation results show that the UNI4MARS supports the dynamic IP multicast group changes more efficiently with respect to processing, memory and bandwidth overhead.

  • PDF

The Custom of Bride Wealth in Africa: The Context of Change and Reconstruction (아프리카의 신부대(bride wealth) 관습: 변화와 재구성의 맥락)

  • Seol, Byung-Soo
    • Cross-Cultural Studies
    • /
    • v.50
    • /
    • pp.131-172
    • /
    • 2018
  • It is noted that nowadays, the bride wealth custom takes an extremely distorted form in African society. Such a phenomenon is a result that the male-dominant culture, Western religions, and capitalist economic system have been negatively combined into dynamic factors seen as bride wealth. This means that the concept of bride wealth has been incessantly reconstructed in the middle of clash and conflict of tradition and modernity. There is also little doubt that the practice is inextricably tangled with the common and current ways of livelihood, early marriage, polygyny, kinship/family structure, poverty, and migration labor. Bride wealth has become an increasingly commercialized element under a capitalist economic system. Accordingly, its traditional symbolism is seen to be subsequently weakening, whereas a tendency towards the reification of women is strengthening more in modern society that embraces modern customs bent on the protection of women's human rights. Its commercialization has produced a result, which instigates the noted violations of women's basic human rights, gender inequality, and promotion of domestic violence. The ways that people perceive bride wealth vary according to their own sex, generation, stratification, and ethnic background. Those people who negatively recognize bride wealth will increase with the deepening of its commercialization due to the influence of capitalism. Its color and effect will deepen and depend on how its agents correspond to socioeconomic changes. They will constantly reinterpret and reconstruct it within their own environments, but the basic human rights efforts are constantly under review by concerned individuals seeking to promote equality for women as a global effort.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Data augmentation in voice spoofing problem (데이터 증강기법을 이용한 음성 위조 공격 탐지모형의 성능 향상에 대한 연구)

  • Choi, Hyo-Jung;Kwak, Il-Youp
    • The Korean Journal of Applied Statistics
    • /
    • v.34 no.3
    • /
    • pp.449-460
    • /
    • 2021
  • ASVspoof 2017 deals with detection of replay attacks and aims to classify real human voices and fake voices. The spoofed voice refers to the voice that reproduces the original voice by different types of microphones and speakers. data augmentation research on image data has been actively conducted, and several studies have been conducted to attempt data augmentation on voice. However, there are not many attempts to augment data for voice replay attacks, so this paper explores how audio modification through data augmentation techniques affects the detection of replay attacks. A total of 7 data augmentation techniques were applied, and among them, dynamic value change (DVC) and pitch techniques helped improve performance. DVC and pitch showed an improvement of about 8% of the base model EER, and DVC in particular showed noticeable improvement in accuracy in some environments among 57 replay configurations. The greatest increase was achieved in RC53, and DVC led to an approximately 45% improvement in base model accuracy. The high-end recording and playback devices that were previously difficult to detect were well identified. Based on this study, we found that the DVC and pitch data augmentation techniques are helpful in improving performance in the voice spoofing detection problem.