• Title/Summary/Keyword: Implementation Methods

Search Result 3,486, Processing Time 0.032 seconds

A Study on Improvement Scheme for Korea's Motor Vehicle Safety Standards Implementation Rules System (자동차 안전기준 시행세칙 체계 정비방안 연구)

  • Kim, Gyuhyun
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.3
    • /
    • pp.77-82
    • /
    • 2022
  • The Korea's automobile safety standards consist of standards for automobiles, automated vehicles, two-wheeled vehicles and auto parts, and there are 157 articles. In connection with the safety standards, the implementation rules stipulated for detailed test methods and procedures are composed of the main body, asterisks and annexes, and have a rather complicated structure. In addition, the test items in the asterisk are specified with the same or similar name as the test items in other asterisks. In this study, the structure of these implementation rules is simplified and the same test items are integrated. This is expected to increase the user's understanding of laws and regulations and efficiency.

Features of the Implementation of Public Authority in the Context of Modern International Security Challenges: Information Component

  • Borysenko, Olha;Kitsak, Taras;Pasichnyi, Roman;Akimova, Liudmyla;Karpa, Marta;Akimov, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.123-128
    • /
    • 2022
  • The main purpose of the study is to determine the features of the implementation of public authority in the context of modern international security challenges. The fact that public authority is a necessary regulator of the life of society ensures its development, unity, and manageability, which is an important factor in the organization and orderliness of society adds to the actualization of the research topic. The research methodology includes a set of theoretical methods of analysis. Based on the results of the study, key aspects of the implementation of public authority in the context of modern international security challenges were identified. The study has limitations, and they relate to the practical aspect of the implementation of public authority in the context of modern international security challenges.

Clinical Implementation of Deep Learning in Thoracic Radiology: Potential Applications and Challenges

  • Eui Jin Hwang;Chang Min Park
    • Korean Journal of Radiology
    • /
    • v.21 no.5
    • /
    • pp.511-525
    • /
    • 2020
  • Chest X-ray radiography and computed tomography, the two mainstay modalities in thoracic radiology, are under active investigation with deep learning technology, which has shown promising performance in various tasks, including detection, classification, segmentation, and image synthesis, outperforming conventional methods and suggesting its potential for clinical implementation. However, the implementation of deep learning in daily clinical practice is in its infancy and facing several challenges, such as its limited ability to explain the output results, uncertain benefits regarding patient outcomes, and incomplete integration in daily workflow. In this review article, we will introduce the potential clinical applications of deep learning technology in thoracic radiology and discuss several challenges for its implementation in daily clinical practice.

Computational Methods of Average Wind Speed and Direction

  • Lee, Chee-Cheong;Park, Soo-Hong
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.29-34
    • /
    • 2010
  • Wind speed and wind direction are usually taken using two parameters: wind speed and wind direction. This paper studies the average wind speed and direction calculation methods. The paper first introduces to basic wind's knowledge, and then presents several methods in calculating average wind speed and direction. Lastly some graphs are plotted base on these computational methods and the implementation of these methods in an actual buoy system.

Routing in Computer Networks: A Survey of Algorithms (컴퓨터 네트웍에서의 경로선정 :알고리즘의 개관)

  • 차동완;정남기;장석권
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.9 no.2
    • /
    • pp.46-55
    • /
    • 1984
  • The purpose of this parer is to provide a survey of the state of the art of routing methods in store-and-forward computer networks. The survey is carried out in line with a new taxonomy: heuristic methods, user-optimization methods, and system-optimization methods. This taxonomy on routing algorithms is based on two viewpoints: the level of optimization and the relative difficulty for the implementation in real computer networks. Some actual methods implemented in real computer networks are surveyed as well as the theoretical studies in the literature. This paper concludes with some points in need of further researches.

  • PDF

Implementation of a Network Design and Analysis Tool Supporting VoIP Simulations (VoIP 시뮬레이션을 지원하는 네트워크 설계 및 분석 도구의 구현)

  • Choi Jae-Won;Lee Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.81-89
    • /
    • 2005
  • In this paper, we have described the implementation of a practical simulation tool to design and analyze communication networks. Especially, this study is focused on the implementation and application methods of a simulator supporting VoIP The key characteristics of this particular system are its easy and intuitive usage, the real behaviors implementation of equipment and protocols, the actual generation and transmission of traffic for simulation, supporting of VoIP and so forth. Our system is distinguished from the existing tools which define only the nature of voice traffic, process those packets in the same way as general data, and analyze only the quality of packet transmission such as delay. Our tool presented in this paper generates and processes packets in different way according to the types of traffic distinguishing call signal from voice information traffic. Also, we equipped this system with the various devices such as VoIP gateway and gatekeeper, which enabled this system to analyze the performance of devices and the quality of voice traffic transmission between PSTN and Internet. By presenting the implementation methods and application of this system, we managed to propose the utilization scheme of a simulation tool.

Optimization of Warp-wide CUDA Implementation for Parallel Shifted Sort Algorithm (병렬 Shifted Sort 알고리즘의 Warp 단위 CUDA 구현 최적화)

  • Park, Taejung
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.739-745
    • /
    • 2017
  • This paper presents and discusses an implementation of the GPU shifted sorting method to find approximate k nearest neighbors which executes within "warp", the minimum execution unit in GPU parallel architecture. Also, this paper presents the comparison results with other two common nearest neighbor searching methods, GPU-based kd-tree and ANN (Approximate Nearest Neighbor) library. The proposed implementation focuses on the cases when k is small, i.e. 2, 4, 8, and 16, which are handled efficiently within warp to consider it is very common for applications to handle small k's. Also, this paper discusses optimization ways to implementation by improving memory management in a loop for the CUB open library and adopting CUDA commands which are supported by GPU hardware. The proposed implementation shows more than 16-fold speed-up against GPU-based other methods in the tests, implying that the improvement would become higher for more larger input data.

A Study on the Implementation Methods of MLP Neural Networks for the Recognition of Handwritten Numerals and the Rejection of Non-Numerals (필기체 숫자의 인식과 비숫자의 기각을 위한 MLP 신경망의 구현 방법에 관한 연구)

  • Lim Kil-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1607-1615
    • /
    • 2005
  • This Paper describes the implementation methods of MLP (mulilayer perceptrons) neural networks to recognize or reject handwritten numerals and non-nummerals. The MLP has known to be a very efficient classifier to recognize handwritten numerals in terms of recognition accuracy, speed, and memory requirements. In the previous researches, however, researchers have focused on the only numeral inputs and have not payed attention to the non-numeral inputs with respect to recognition accuracy, rejection rates, and other characteristics. In this paper, we present some implementation methods of the MLP in the environments that numeral and non-numerals are mixed. The MLPs have been developed by three methods, and investigated with three error types introduced. The experiments have been conducted on a total of 66,701 images of numerals and non-numerals. The promising method to recognize numerals and reject non-numerals has been described in terms of the three error types.

A Study on the Implementation Methods of the MLP Recognizer for Handwritten Numerals and Non-Numerals (필기체 숫자와 비숫자의 인식을 위한 MLP 인식기의 구현 방법에 관한 연구)

  • Lim, Kil-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1119-1122
    • /
    • 2005
  • This paper describes the implementation methods of the MLP (mulilayer perteptrons) recognizers for numerals and non-nummerals. The MLP has known to be a very efficient classifier to recognize handwritten numerals in terms of recognition accuracy, speed, and memory requirements. The MLP in the previous researches, however, focuses on the only numeral inputs and does not pay attention to non-numeral inputs with respect to recognition accuracy, rejection rates, and other characteristics. In this paper, we present some implementation methods of the MLP in the environments that numeral and non-numerals are mixed. The MLP had been developed by three methods, and investigated with three error types introduced. The experiments had been conducted on a total of about 63,000 numerals and non-numerals. The promising method to recognize numeral and non-numerals is described in terms of the three error types.

  • PDF

Climate Change Vulnerability Assessment in Rural Areas - Case study in Seocheon - (농촌지역 기후변화 취약성 평가에 관한 연구 - 서천군을 대상으로 -)

  • Lee, Gyeongjin;Cha, Jungwoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.4
    • /
    • pp.145-155
    • /
    • 2014
  • Since greenhouse gas emissions increase continuously, the authorities have needed climate change countermeasure for adapting the acceleration of climate change damages. According to "Framework Act on Low Carbon, Green Growth", Korean local governments should have established the implementation plan of climate change adaptation. These guidelines which is the implementation plan of climate change adaptation should be established countermeasure in 7 fields such as Health, Digester/Catastrophe, Agriculture, Forest, Ecosystem, Water Management and Marine/Fisheries. Basically the Korean local governments expose vulnerable financial condition, therefore the authorities might be assessed the vulnerability by local regions and fields, in order to establish an efficient implementation plan of climate change adaptation. Based on this concepts, this research used 3 methods which are LCCGIS, questionnaire survey analysis and analysis of existing data for the multiphasic vulnerable assessment. This study was verified the correlation among 7 elements of climate change vulnerability by 3 analysis methods, in order to respond climate change vulnerability in rural areas, Seocheon-gun. If the regions were evaluated as a vulnerable area by two or more evaluation methods in the results of 3 methods' comparison and evaluation, those areas were selected by vulnerable area. As a result, the vulnerable area of heavy rain and flood was Janghang-eup and Maseo-myeon, the vulnerable area of typhoon was Janghang-eup, Masan-myeon and Seo-myeon. 3 regions (i.e. Janghang-eup, Biin-myeon, Seo-myeon) were vulnerable to coastal flooding, moreover Masan-myeon, Pangyo-myeon and Biin-myeon exposed to vulnerability of landslide. In addition, Pangyo-myeon, Biin-myeon and Masan-myeon was evaluated vulnerable to forest fire, as well as the 3 sites; Masan-myeon, Masan-myeon and Pangyo-myeon was identified vulnerable to ecosystem. Lastly, 3 regions (i.e. Janghang-eup, Masan-myeon and Masan-myeon) showed vulnerable to flood control, additionally Janghang-eup and Seo-myeon was vulnerable to water supply. However, all region was evaluated vulnerable to water quality separately. In a nutshell this paper aims at deriving regions which expose climate change vulnerabilities by multiphasic vulnerable assessment of climate change, and comparing-evaluating the assessments.