• Title/Summary/Keyword: IE method

Search Result 584, Processing Time 0.027 seconds

A Study of Systematization for Train Control Technique (열차제어기술 체계화 방안에 대한 연구)

  • Lee, Jae-Ho;Shin, Duc-Ko;Lee, Kang-Mi
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.2010-2016
    • /
    • 2009
  • Before introducing high speed train, train signal system was operated passively depending on a driver by signal lamp display. Now it is changing to onboard signaling system because of train speed increased(conventional track is 230km/h, high speed track is 380km/h), high speed. low speed freight train operation mixed, operation for high speed train in conventional track and dense operation. ie. ETCS(European Train Control System) Level 1 is introducing. Also, in case of high speed train, the train control system of France was introduced and has operated from 2004, now we have a difficulty for rising speed more than 300km/h because of commercial operation speed limited as 300km/h. Therefore, it need to establish the train control technique according to trackside surroundings and develope standard system like European ERTMS/ETCS, China CTCS(Chinese Train Control System), Japan D-ATC(Digital Automatic Train Control). In this paper, we derive the systematization method for Korea train technique by network-oriented, information-oriented, intelligence-oriented and combination-oriented corresponding train development direction. Proposed method has a merit to prevent cross by mixed operation with existing system and improvement after validity demonstration and system development and supply train system to meet user requirement in exporting.

  • PDF

Design of Fire Emergency Evacuation System using Potential Field (퍼텐셜 필드를 이용한 화재 응급 대피 시스템 설계)

  • Lee, Min-Goo;Jung, Kyung-Kwon;Lee, Won-Seok
    • 전자공학회논문지 IE
    • /
    • v.48 no.3
    • /
    • pp.26-32
    • /
    • 2011
  • This paper proposed that the method be searched for optimal route of evacuation by algorithm using potential field in specific situation, fire. When robot met an obstacle to be indicated it to ignition point, the installed sensor could be detected the point in restricted area. In according as the data of a fire detection sensor and a sensor complex in a building, the information was transmitted to server which computed optimal route of evacuation by algorithm using potential field. After that, it was able to blow a siren and mark the safe-path with using wireless device such as smart-phone. It was confirmed that the proposed method in functional test, fire emergency evacuation algorithm using potential field, was advanced in circumstance of simulation.

Machine Learning Based Malware Detection Using API Call Time Interval (API Call Time Interval을 활용한 머신러닝 기반의 악성코드 탐지)

  • Cho, Young Min;Kwon, Hun Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.51-58
    • /
    • 2020
  • The use of malware in cyber threats continues to be used in all ages, and will continue to be a major attack method even if IT technology advances. Therefore, researches for detecting such malicious codes are constantly tried in various ways. Recently, with the development of AI-related technology, many researches related to machine learning have been conducted to detect malware. In this paper, we propose a method to detect malware using machine learning. For machine learning detection, we create a feature around each call interval, ie Time Interval, in which API calls occur among dynamic analysis data, and then apply the result to machine learning techniques.

Development of an Emotion Recognition Robot using a Vision Method (비전 방식을 이용한 감정인식 로봇 개발)

  • Shin, Young-Geun;Park, Sang-Sung;Kim, Jung-Nyun;Seo, Kwang-Kyu;Jang, Dong-Sik
    • IE interfaces
    • /
    • v.19 no.3
    • /
    • pp.174-180
    • /
    • 2006
  • This paper deals with the robot system of recognizing human's expression from a detected human's face and then showing human's emotion. A face detection method is as follows. First, change RGB color space to CIElab color space. Second, extract skin candidate territory. Third, detect a face through facial geometrical interrelation by face filter. Then, the position of eyes, a nose and a mouth which are used as the preliminary data of expression, he uses eyebrows, eyes and a mouth. In this paper, the change of eyebrows and are sent to a robot through serial communication. Then the robot operates a motor that is installed and shows human's expression. Experimental results on 10 Persons show 78.15% accuracy.

Skin Region Extraction Using Color Information and Skin-Color Model (컬러 정보와 피부색 모델을 이용한 피부 영역 검출)

  • Park, Sung-Wook;Park, Jong-Kwan;Park, Jong-Wook
    • 전자공학회논문지 IE
    • /
    • v.45 no.4
    • /
    • pp.60-67
    • /
    • 2008
  • Skin color is a very important information for an automatic face recognition. In this paper, we proposed a skin region extraction method using color information and skin color model. We use the adaptive lighting compensation technique for improved performance of skin region extraction. Also, using an preprocessing filter, normally large areas of easily distinct non skin pixels, are eliminated from further processing. And we use the modified ST color space, where undesired effects are reduced and the skin color distribution fits better than others color space. Experimental results show that the proposed method has better performance than the conventional methods, and reduces processing time by $35{\sim}40%$ on average.

Forecasting Demand for the PCS Resale Service with Survey Data in Korea (설문자료를 이용한 국내 PCS 재판매 서비스 수요예측)

  • Jun, Duk-Bin;Park, Myoung-Hwan;Ahn, Jae-Hyeon;Kim, Gye-Hong;Kim, Seon-Kyoung;Park, Dae-Keun;Park, Yoon-Seo;Cha, Kyung-Cheon;Lee, Jung-Jin
    • IE interfaces
    • /
    • v.13 no.4
    • /
    • pp.619-626
    • /
    • 2000
  • In this paper, we place the focus on suggesting a method of forecasting demand for PCS resale service with survey data in Korea. It is important for the service provider to forecast the diffusion process when designing marketing strategies and analyzing the costs and benefits. For the reason, we conduct a survey of three groups composed of non-subscribers, cellular subscribers, and PCS subscribers in order to forecast the demand according to several possible scenarios and business strategies. We consider the survey item that is measured by multiple point scales in response to a question if he would subscribe to the mobile telephone service in the future. We propose a method to forecast the size of market potential by classifying each individual into the two extreme groups, that is, yes or no. Then, by integrating survey data and historical data, we forecast the demand for PCS resale service that varies according to scenarios and strategies. From the results, we can find several implications for the provider of PCS resale service.

  • PDF

Knowledge Engineering Method Ie Estimation of Snow Accretion on Power lines and Decision of Deicing Countermeasures (지식공학에 의한 전선 착설 예측 및 대책 결정 기법)

  • 최규형
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.17 no.3
    • /
    • pp.95-102
    • /
    • 2003
  • To Prevent the damage of power system facilities by snow accretion on transmission lines, a prototype expert system has been developed. The system has the basic functions of forecasting snow accretion on transmission lines and making a list of all feasible and effective deicing countermeasures to assist power system operators. As estimating of snow accretion on power lines and making countermeasure plans are very difficult to solve analytically, knowledge engineering can be an effective method for this problem. The heuristics about the effect of weather conditions on the snow accretion process on power lines and power system operation for the deicing constitutes main nile base. Simulation results based on past snow accretion accident data show that the proposed system is very premising.

Confidentiality Service Scheme Extending the DAA on HTTP Environment (HTTP환경에서 DAA를 이용한 비밀성 보안서비스 지원 방안)

  • 조인준;정희경;송기평;이준섭;구경철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.305-311
    • /
    • 1999
  • IETF(Internet Engineering Task Force) RFC 2069 recommend to accept the DAA(Digest Access Authentication) scheme ill the HTTP 1.1(Hype. Text Transfer Protocol 1.1). When the client want to access the protected URI resources with Web Server, the BAA scheme is not considered to be a secure method of user authentication, as the user name and password are passed over the network as clear text. But, The DAA scheme is proposed to create a access authentication method which avoids the serious flaws of BAA(ie, passed over the network as clear text). The flaw of DAA is not supported the confidentiality services between client and server. This paper is proposed a confidentiality service scheme for HTTP environment, as an extension to DAA

  • PDF

A study on Korean language processing using TF-IDF (TF-IDF를 활용한 한글 자연어 처리 연구)

  • Lee, Jong-Hwa;Lee, MoonBong;Kim, Jong-Weon
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.105-121
    • /
    • 2019
  • Purpose One of the reasons for the expansion of information systems in the enterprise is the increased efficiency of data analysis. In particular, the rapidly increasing data types which are complex and unstructured such as video, voice, images, and conversations in and out of social networks. The purpose of this study is the customer needs analysis from customer voices, ie, text data, in the web environment.. Design/methodology/approach As previous study results, the word frequency of the sentence is extracted as a word that interprets the sentence has better affects than frequency analysis. In this study, we applied the TF-IDF method, which extracts important keywords in real sentences, not the TF method, which is a word extraction technique that expresses sentences with simple frequency only, in Korean language research. We visualized the two techniques by cluster analysis and describe the difference. Findings TF technique and TF-IDF technique are applied for Korean natural language processing, the research showed the value from frequency analysis technique to semantic analysis and it is expected to change the technique by Korean language processing researcher.

Additional degree of freedom in phased-MIMO radar signal design using space-time codes

  • Vahdani, Roholah;Bizaki, Hossein Khaleghi;Joshaghani, Mohsen Fallah
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.640-649
    • /
    • 2021
  • In this paper, an additional degree of freedom in phased multi-input multi-output (phased-MIMO) radar with any arbitrary desired covariance matrix is proposed using space-time codes. By using the proposed method, any desired transmit covariance matrix in MIMO radar (phased-MIMO radars) can be realized by employing fully correlated base waveforms such as phased-array radars and simply extending them to different time slots with predesigned phases and amplitudes. In the proposed method, the transmit covariance matrix depends on the base waveform and space-time codes. For simplicity, a base waveform can be selected arbitrarily (ie, all base waveforms can be fully correlated, similar to phased-array radars). Therefore, any desired covariance matrix can be achieved by using a very simple phased-array structure and space-time code in the transmitter. The main advantage of the proposed scheme is that it does not require diverse uncorrelated waveforms. This considerably reduces transmitter hardware and software complexity and cost. One the receiver side, multiple signals can be analyzed jointly in the time and space domains to improve the signal-to-interference-plus-noise ratio.