• Title/Summary/Keyword: Search Speed

Search Result 793, Processing Time 0.031 seconds

Study of real-time OS structure that use OSEK/VDX (OSEK/VDX이용한 실시간 OS 구조에 관한 연구)

  • Oh, Chang-Yeon;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.861-865
    • /
    • 2009
  • Technical development in car has utilized electronic controls (ECU, Electronic Control Unit) recently if was achieved machine such as engine performance in priority and electronic side technical development that improve safety, convenience, expense etc. is proceeded vigorously. Also, preference of consumers for car is various model's number according to change at the fast speed and complexity of software required from vanguard service development was increased greatly. Software development expense dominated considerable weight in car manufacture expense by such change and automakers established OSEK/VDX that is standard of automobile embeded system to reuse application software by module to respond this and transplant easily to other control device. Do when search about all item that is necessary in real-time OS structure that examines OSEK/VDX standard that is presented as the alternative to respond environment that change rapidly that refer in dignified mien after it is original, and uses actuality OSEK/VDX.

  • PDF

Effectiveness Analysis for Survival Probability of a Surface Warship Considering Static and Mobile Decoys (부유식 및 자항식 기만기의 혼합 운용을 고려한 수상함의 생존율에 대한 효과도 분석)

  • Shin, MyoungIn;Cho, Hyunjin;Lee, Jinho;Lim, Jun-Seok;Lee, Seokjin;Kim, Wan-Jin;Kim, Woo Shik;Hong, Wooyoung
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.3
    • /
    • pp.53-63
    • /
    • 2016
  • We consider simulation study combining static and mobile decoys for survivability of a surface warship against torpedo attack. It is assumed that an enemy torpedo is a passive acoustic homing torpedo and detects a target within its maximum target detection range and search beam angle by computing signal excess via passive sonar equation, and a warship conducts an evasive maneuvering with deploying static and mobile decoys simultaneously to counteract a torpedo attack. Suggesting the four different decoy deployment plans to achieve the best plan, we analyze an effectiveness for a warship's survival probability through Monte Carlo simulation, given a certain experimental environment. Furthermore, changing the speed and the source level of decoys, the maximum torpedo detection range of warship, and the maximum target detection range of torpedo, we observe the corresponding survival probabilities, which can provide the operational capabilities of an underwater defense system.

The Fastest Path Search and Defect Inspection of Type (sLa-pRc) ((sLa-pRc)타입의 가장 빠른 경로 탐색과 결함 검사)

  • Kim, Soon Ho;Lee, Eun Ser;Kim, Chi Su
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.385-390
    • /
    • 2021
  • The gantry is a device that moves fine chips from the feeder to the PCB. While the gantry is moving the part, the camera checks the condition of the part. The purpose of this paper is to find the path with the shortest travel time of the gantry and calculate the travel time according to the path. stop_motion is a way to check the status of the parts currently in use. This paper presents the moving_motion method and the fly_motion method with maximum speed in front of the camera. In addition the signature method was used to inspect the condition of the parts. When comparing the moving time of the three types of gantry, the moving_motion method improved by 9.42% and the fly_motion method by 17.73% compared to stop_motion. When the fly_motion method proposed in this paper is used for the gantry movement path, it is expected that productivity will be improved.

Growth Strategy and Privatization of Chinese Airports: Implications for IIAC (중국공항들의 성장전략과 민영화: 인천국제공항에 대한 시사점)

  • Choi, Gyoung-Gyu
    • International Area Studies Review
    • /
    • v.13 no.3
    • /
    • pp.551-581
    • /
    • 2009
  • This case study explores the stock sale, the resulting governance structures, and the airport management and development in Beijing Capital International Airport and Shanghai International Airport at Pudong. It is imperative for Incheon International Airport Corporation (IIAC) to change the management paradigm to survive in the changing environment and to become hubs in the relevant regions. And IIAC needs to search for the new ownership and governance structure to cope with the internal and external demands for innovation. In this study, along with the recent trends of the global airport industry, we suggest the implications for the IIAC's major decisions, especially, for the stock sale, the resulting governance structure, and the airport development and management. It is suggested that Korean government retain the majority control in the process of privatization to keep IIAC as a government-owned enterprise to provide the public goods to the citizen. Furthermore, to maximize the value of stock sale, IIAC needs to decide strategically the time and speed in the hybrid form of stock selling using trade sale and IPOs.

Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification (공격 메일 식별을 위한 비정형 데이터를 사용한 유전자 알고리즘 기반의 특징선택 알고리즘)

  • Hong, Sung-Sam;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • Since big-data text mining extracts many features and data, clustering and classification can result in high computational complexity and low reliability of the analysis results. In particular, a term document matrix obtained through text mining represents term-document features, but produces a sparse matrix. We designed an advanced genetic algorithm (GA) to extract features in text mining for detection model. Term frequency inverse document frequency (TF-IDF) is used to reflect the document-term relationships in feature extraction. Through a repetitive process, a predetermined number of features are selected. And, we used the sparsity score to improve the performance of detection model. If a spam mail data set has the high sparsity, detection model have low performance and is difficult to search the optimization detection model. In addition, we find a low sparsity model that have also high TF-IDF score by using s(F) where the numerator in fitness function. We also verified its performance by applying the proposed algorithm to text classification. As a result, we have found that our algorithm shows higher performance (speed and accuracy) in attack mail classification.

Electro-Acupuncture on Aphasia after Stroke: A Systemic Review of Randomized Controlled Trials (뇌졸중 환자의 실어증에 대한 전침 치료 : 체계적 문헌 고찰)

  • Ha, Jeong-been;Lee, Su-jung;Yang, Ji-soo;Lew, Jae-hwan
    • The Journal of Internal Korean Medicine
    • /
    • v.42 no.3
    • /
    • pp.323-339
    • /
    • 2021
  • Objectives: This study investigates the effect of electro-acupuncture on aphasia after stroke. Methods: A search of OASIS, NDSL, PubMed, Cochrane, and CNKI was executed between 4 January 2021 and 4 February 2021, with no limitation on publication year. Extraction and selection from the studies were made by 3 authors. The quality of the studies was evaluated using Cochrane's risk of bias (RoB) tool. Results: 10 studies met the selection criteria. As the treatment site for electro-acupuncture, GV20 (Baihui) was used the most. In all studies, the region located on the head was used for treatment without distinguishing between acupoints and areas of scalp acupuncture, and the stimulation was organized into 3 conditions: speed, intensity, and time. The outcome indicators used before and after treatment focused on the evaluation of language function and the degree of aphasia. The results showed that using electro-acupuncture with speech rehabilitation therapy for aphasia after stroke was more effective than using speech rehabilitation therapy alone. Conclusions: In this review, electro-acupuncture for aphasia after stroke was found to have a significant effect compared to the previous treatment alone. However, because of limitations, information was not reliable enough. Additional research is needed to produce more objective evidence.

Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault (지문 퍼지볼트의 빠른 다항식 복원 방법)

  • Choi, Woo-Yong;Lee, Sung-Ju;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.33-38
    • /
    • 2008
  • Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics stores a non - invertible transformed version of the biometric data. Thus, even if the storage is compromised, the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. In this paper, we proposed the fast polynomial reconstruction algorithm for fuzzy fingerprint vault. The proposed method needs (k+1) real points to reconstruct the polynomial of degree (k-1). It enhances the speed, however, by $300{\sim}1500$ times according to the degree of polynomial compared with the exhaust search.

A Systematic Review of the Application Dual Task Assessment for Screening Mild Cognitive Impairment (경도 인지장애 선별에 적용된 이중과제 평가에 대한 체계적 고찰)

  • Kim, Sunho;Kwak, Hosoung
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.8 no.4
    • /
    • pp.107-115
    • /
    • 2020
  • Purpose: This study aims to systematically review the dual-task evaluation applied to the screening of mild cognitive impairment. It also aims to present various evaluation items and results analysis methods for dual tasks applied to patients with mild cognitive impairment. Methods: We conducted a systematic search of published studies in PubMed databases and KISS from January 2000 to August 2020 using the main keywords such as "Dual task," "Mild Cognitive impairment," "Elderly," and "Screening." We selected a total of 10 studies for the analysis from 1314 searched articles. Results: We analyzed the qualitative level of 10 studies that were nonrandomized two-group studies with evidence level II (100.0%). These results suggest that the evidence level of the studies was high. We analyzed 10 studies and identified 12 motor tasks and 19 cognitive tasks. Walking was the most commonly used evaluation motor task and counting backward by ones and naming animals were the most commonly used evaluation cognitive tasks. Moreover, the velocity speed was the most used result analysis method. The results indicate that there were significant differences in dual-task performance between patients with normal and mild cognitive impairment. Conclusion: The results of this study can be used as a basis for the selection of dual-task evaluation items and methods of analyzing the results for screening mild cognitive impairment. Furthermore, they are expected to be used for research on the development of dual-task evaluation tools. It is necessary to compare and analyze the usage trends of dual-task evaluation by cultural differences in future studies.

Design and Implementation of Reinforcement Learning Agent Using PPO Algorithim for Match 3 Gameplay (매치 3 게임 플레이를 위한 PPO 알고리즘을 이용한 강화학습 에이전트의 설계 및 구현)

  • Park, Dae-Geun;Lee, Wan-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.1-6
    • /
    • 2021
  • Most of the match-3 puzzle games supports automatic play using the MCTS algorithm. However, implementing reinforcement learning agents is not an easy job because it requires both the knowledge of machine learning and the way of complex interactions within the development environment. This study proposes a method in which we can easily design reinforcement learning agents and implement game play agents by applying PPO(Proximal Policy Optimization) algorithms. And we could identify the performance was increased about 44% than the conventional method. The tools we used are the Unity 3D game engine and Unity ML SDK. The experimental result shows that agents became to learn game rules and make better strategic decisions as experiments go on. On average, the puzzle gameplay agents implemented in this study played puzzle games better than normal people. It is expected that the designed agent could be used to speed up the game level design process.

Hazelcast Vs. Ignite: Opportunities for Java Programmers

  • Maxim, Bartkov;Tetiana, Katkova;S., Kruglyk Vladyslav;G., Murtaziev Ernest;V., Kotova Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.406-412
    • /
    • 2022
  • Storing large amounts of data has always been a big problem from the beginning of computing history. Big Data has made huge advancements in improving business processes by finding the customers' needs using prediction models based on web and social media search. The main purpose of big data stream processing frameworks is to allow programmers to directly query the continuous stream without dealing with the lower-level mechanisms. In other words, programmers write the code to process streams using these runtime libraries (also called Stream Processing Engines). This is achieved by taking large volumes of data and analyzing them using Big Data frameworks. Streaming platforms are an emerging technology that deals with continuous streams of data. There are several streaming platforms of Big Data freely available on the Internet. However, selecting the most appropriate one is not easy for programmers. In this paper, we present a detailed description of two of the state-of-the-art and most popular streaming frameworks: Apache Ignite and Hazelcast. In addition, the performance of these frameworks is compared using selected attributes. Different types of databases are used in common to store the data. To process the data in real-time continuously, data streaming technologies are developed. With the development of today's large-scale distributed applications handling tons of data, these databases are not viable. Consequently, Big Data is introduced to store, process, and analyze data at a fast speed and also to deal with big users and data growth day by day.