• Title/Summary/Keyword: Try-out

Search Result 982, Processing Time 0.025 seconds

An interleaver design of low latency for IEEE 802.11a Wireless LAN (IEEE 802.11a 무선 랜에 적용할 Low Latency 인터리버 설계)

  • Shin, Bo-Young;Lee, Jong-Hoon;Park, June;Won, Dong-Youn;Song, Sang-Seob
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.200-203
    • /
    • 2003
  • By minimizing the burst error of data and correcting the error, we can define the convolution coding and interleaving in IEEE 802.11a wireless tan system. Two step block interleaver was decided by coded bits per OFDM symbol and due to this it comes to the delay time in IEEE 802.11a. This is the point of the question which we must consider. We try to decrease the delay time by all 48-clock from interleavings, and we have proposed a way carried out the interleaving outputs per symbol. So in comparison with the existing interleaver, we can decrease the delay time in reading and writing data, as well as reduce the delay time of bit re-ordering per symbol. Also this scheme is apply in all x-QAM cases.

  • PDF

Research on Institutional and Technical Improvement Regarding on the Collection and Application of Non-Specific Personal Information (비특정 개인정보 수집 및 활용에 관한 정책적·기술적 개선방안 연구)

  • Jeon, Hoimi;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1583-1592
    • /
    • 2016
  • This report explains unspecified private information that have the company of resource value is provided the public with out protection. Let's have a good look at the protection of unspecified private information problems through personal information of law and policy mobile messenger company's TOS(Terms of service) We urgently need for an competition framework to prevent the leaking of Non-specified private informations and need for technical development that is information combined management system. We try verify systems as mentioned above with variety scenarios and suggest improvement plan that is leaking Non-specified private information.

Information subject education course presented for the software education (소프트웨어 교육을 위한 정보교과 교육과정안 제시)

  • Kim, Geun-Ho;Seo, Seong-Won;Kim, Eui-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.308-311
    • /
    • 2015
  • Depending on the sense of increasing interest in the worldwide software education, in the country high and high school education software from junior high school from 2018 fiscal year I was supposed to be carried out in the required courses. As a result, even in education, for students of software education, although some studies have been conducted, in this paper, by comparative analysis of the domestic and international trends in the software of the training, we advance the future, We suggest the direction of software education should. In addition, faculty members for software education through cooperation with existing middle and high school information subject-to try to present how the draft how available through the lesson plan.

  • PDF

A Study on Video Production Method using Camera Tracking Technique (카메라 트래킹 기법을 이용한 모션그래픽 활용방안 연구)

  • Lee, Junsang;Lee, Imgeun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.727-728
    • /
    • 2015
  • Nowadays many videos are created with motiongraphics which has new visual effects and technology. The technique try to find out the image models which maximally stimulate the memories to transfer new visual information. The image will be expressed various ways with combining graphics and real scene with the help of computer. With the advances of VFX, the real and graphic scenes are more naturally combined to make believe its real scene. In this paper the novel motiongraphic technique, which uses tracking data from camera, is proposed.

  • PDF

A Study on Injection Molding Process and Quality Monitoring by Response Surface Analysis (반응표면 분석법에 의한 사출공정 및 품질 모니터링에 관한 연구)

  • Min, Byeong-Hyeon;Lee, Kyeong-Don;Yu, Byung-Kil
    • IE interfaces
    • /
    • v.9 no.1
    • /
    • pp.13-24
    • /
    • 1996
  • Quality of injection molded parts is dependent on both mold design and processing conditions. From the mold design point of view, an optimal shrinkage should be used to compensate the shrinkage of molded parts. From the processing point of view, it is important to analyze the priority of processing conditions because a number processing conditions affect the quality of molded parts. Processing analysis employing the design of experiment was performed, and the shrinkage of molded part was considered as a characteristic parameter to improve the quality. As the result of the analysis of variance on SN ratio of a characteristic value, injection speed and bolding pressure were selected as two effective process parameters. Regression analysis on shrinkage and processing conditions was carried out, and an optimal processing condition was obtained by the response surface analysis. Shrinkage at the optimal condition could be used to reduce the number of try-cut at the step of mold making. The ranges of indirect control parameter, such as maximum cavity pressure or weight, measured at the optimal processing condition were used for monitoring the quality of molded parts in process.

  • PDF

Browser fuzzing and analysis using known vulnerability (파이썬 모듈과 정규표현식을 활용한 웹 취약점 탐색 자동화 봇)

  • Kim, Nam-gue;Kim, Ki Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.749-751
    • /
    • 2016
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

Hydraulic behaviour of dune sand-bentonite mixtures under confining stress

  • Gueddouda, M.K.;Lamara, M.;Abou-bekr, N.;Taibi, S.
    • Geomechanics and Engineering
    • /
    • v.2 no.3
    • /
    • pp.213-227
    • /
    • 2010
  • Compacted layers of sand-bentonite mixtures have been proposed and used in a variety of geotechnical projects as engineered barriers for the enhancement of impervious landfill liners, cores of zoned earth dams and radioactive waste repository systems. This paper presents a study on the valorization of local materiel such as dune sand from Laghouat region and mine bentonite intended for the realization of liner base layers in the conception of insulation barriers for hazardous waste centers. In the practice we try to get an economical mixture that satisfies the hydraulic and mechanical properties specified by regulation rules. The effect of the bentonite additions on the mixture is reflected by its capability of clogging the matrix pores upon swelling. In order to get an adequate dune sand-bentonite mixture, an investigation on hydraulic and mechanical behaviours is carried out in this study for different mixtures. Using oedometer test, the adequate bentonite addition to the mixture, which satisfies the conditions on permeability, is found to be around 12% to 15%. These results are also confirmed by direct measurement using triaxial cell.

Coincidence Analysis of Keywords of the Journal of Korean Academy of Nursing with MeSH (대한간호학회지 게재 논문 주요어 분석(2003-2005년))

  • Jeong Geum-Hee;Ahn Young-Mee;Cho Dong-Sook
    • Journal of Korean Academy of Nursing
    • /
    • v.35 no.7
    • /
    • pp.1420-1425
    • /
    • 2005
  • Purpose: We try to disclose how much the keywords of the papers from the Journal of the Korean Academy of Nursing coincide with MeSH terminologies and to understand the major subjects of the recent nursing research in Korea from keywords. Methods: Keywords of journals were extracted and compared with MeSH terms. The frequency of the appearance of each keyword was sorted by a descending order. Results: Coincidence rate of 1,235 keywords with MeSH terms was $51.6\%$. Out of them, depression, elderly, stress, self efficacy, quality of life, exercise, middle-aged women, and women appeared most frequently in descending order. Conclusion: Coincidence rate of the keywords with MeSH terms was at an acceptable level, however to improve it, the education of submitters and editorial board members are required, as well as the copy editor, to take a role in checking keywords. To infer the subjects of the research from keywords might well represent the recent topics of research work.

A Music Recommendation Method Using Emotional States by Contextual Information

  • Kim, Dong-Joo;Lim, Kwon-Mook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.69-76
    • /
    • 2015
  • User's selection of music is largely influenced by private tastes as well as emotional states, and it is the unconsciousness projection of user's emotion. Therefore, we think user's emotional states to be music itself. In this paper, we try to grasp user's emotional states from music selected by users at a specific context, and we analyze the correlation between its context and user's emotional state. To get emotional states out of music, the proposed method extracts emotional words as the representative of music from lyrics of user-selected music through morphological analysis, and learns weights of linear classifier for each emotional features of extracted words. Regularities learned by classifier are utilized to calculate predictive weights of virtual music using weights of music chosen by other users in context similar to active user's context. Finally, we propose a method to recommend some pieces of music relative to user's contexts and emotional states. Experimental results shows that the proposed method is more accurate than the traditional collaborative filtering method.

A Qualitative Study on the Full-Time Housewife′s Employment (′가사노동 전담자′인 전업주부에게 취업은 대안인가 아닌가\ulcorner)

  • 김선미
    • Journal of Families and Better Life
    • /
    • v.22 no.5
    • /
    • pp.29-45
    • /
    • 2004
  • This ethnographic case-study explores the interpretation and behavior in job considering among full-time housewives. The participants of this study are eleven middle class full-time housewives in their thirties and forties. In-depth interviews based on an unstructured Questionnaire were conducted for this study. Findings are as follows: Six full-time housewives tend to think their full-time housewife-lives more convenient, something unable to substitute and more profitable compared to the counter partner's lives. But they are classified into two groups according to the satisfaction for full-time housewife life. One group has found out more positive meaning in their life but the other group has not yet and they are doubtful about real life and other opportunity. In Contrast, other five full-time housewives tend to interpret employment as a more productive source to secure family resource for their children's education and repay the loan used to buy larger apartment. And the job is considered to confirm her own individuality and the feeling for the social entity as a competent social entity. But two of them who have never been employed do not try to get a job as a new identity alternative. And the various elements like household income, job experience, health, children's age and husband's attitude to his wife's employment etc. are defined to influence the interpretation and the job considering behavior among full-time housewives.