• Title/Summary/Keyword: computer center

Search Result 4,829, Processing Time 0.035 seconds

A Study on a Parcel Presentation Technique of Cadastral Map for Enhancing Utilization of National Spatial Data Infrastructure (국가공간정보인프라 활용향상을 위한 지적도 일필지 표현기법 모형 연구)

  • Jang, Yong-Gu;Kim, Jong-Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.4
    • /
    • pp.3-10
    • /
    • 2008
  • Cadastral map is a public book that has been composed by continuous parcel having location, number, classification, boundary and an area based on Cadastral Law. A few years ago, cadastral map had been managed by form drawn on 2 dimension plane paper with 7 regular scales. Recently as computer systems are upgrading, cadastral map was able to have a chance to develope one step. Its type has been remade from raster to vector. In result, the cadastral map of vector type becomes to apply variously. Therefore, digital cadastral map has been ready a system to be use with multi-propose by KLIS(Korean Land Information System). In this research, it concretely want presentation of status using land more than original parcel on basic coordination cadastral map and KLIS(Korean Land Information System). The cadastral map is composed as parcel unit was applied by new presentation technique to "Model Research on One Parcel Presentation Technique for Land Status of Cadastral Map". The function of cadastral map on One Parcel Presentation Technique which is not only location relation of possession right and expression of states using land in 28 classifications demonstrated on the cadastral law but also used as foundation data of GIS construct business is developed by lines and classification of parcel to center around public sites of roads, rails, drains and rivers. especially, this research is composed of technique elevation and development of One Parcel Projection Technique of cadastral map in using object of roads among public sites.

  • PDF

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

Age- and Gender- Specific Reference Levels for Hearing Thresholds of Normal Aging in Korean (한국인의 정상적인 노화에 의한 성별 연령별 순음청력에 의한 기준청력)

  • Kim Sung Hee;Shin Jong Heon;Yeo Chang Ki;Han Young Kyung;Lee Jung Ki;Jarng Soon Suck
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.6
    • /
    • pp.353-357
    • /
    • 2005
  • Declining auditory performance with advanced age is a well known and common problem that is becoming more Prevalent due to the increasing number of elderly people in our society. We introduce a novel ARCISM (Audiogram Result Computer Input. Save & Management software) data management program which enables the assessment of the risk of past history of hearing impairment on the basis of known risk factors. This study investigates the reference levels of pure tone hearing threshold of normal aging in Korean and the difference between fenders. The subjects were carefully selected by questionnaire and absence of any history of otologic infection, noise exposure. and ototoxic drug among 1603 subjects. who visited Health Promotion Center in Daegu Fatima Hospital for one year. The results show (1) hearing sensitivity declines with age. (2) higher frequency shows steeper slope of hearing declines than lower frequency. and (3) there were more hearing loss at 4 and 8 kHz in men than in women. Due to the ARCISM program. it was possible to manage huge data of hearing results and to obtain the reference level of a9e-related hearing declines. Furthermore, we expect that the results of this study can be the fundamental data for hearing rehabilitation for the elderly and for developing suitable hearing aids for Korean.

Combined Image Retrieval System using Clustering and Condensation Method (클러스터링과 차원축약 기법을 통합한 영상 검색 시스템)

  • Lee Se-Han;Cho Jungwon;Choi Byung-Uk
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.1 s.307
    • /
    • pp.53-66
    • /
    • 2006
  • This paper proposes the combined image retrieval system that gives the same relevance as exhaustive search method while its performance can be considerably improved. This system is combined with two different retrieval methods and each gives the same results that full exhaustive search method does. Both of them are two-stage method. One uses condensation of feature vectors, and the other uses binary-tree clustering. These two methods extract the candidate images that always include correct answers at the first stage, and then filter out the incorrect images at the second stage. Inasmuch as these methods use equal algorithm, they can get the same result as full exhaustive search. The first method condenses the dimension of feature vectors, and it uses these condensed feature vectors to compute similarity of query and images in database. It can be found that there is an optimal condensation ratio which minimizes the overall retrieval time. The optimal ratio is applied to first stage of this method. Binary-tree clustering method, searching with recursive 2-means clustering, classifies each cluster dynamically with the same radius. For preserving relevance, its range of query has to be compensated at first stage. After candidate clusters were selected, final results are retrieved by computing similarities again at second stage. The proposed method is combined with above two methods. Because they are not dependent on each other, combined retrieval system can make a remarkable progress in performance.

Security Threats Analysis for Network-based Mobile IPv6 (네트워크 기반 Mobile IPv6 보안 취약점 분석)

  • Kim, Hyun-Gon;Seo, Jae-Hyeon;Oh, Byeong-Kyun;Ahn, Tae-Nam;Kim, Jin-Hyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.137-147
    • /
    • 2007
  • In the host-based Mobile IPv6, a mobile node is responsible for doing the signaling to its home agent to enable session continuity as it moves between subnets. To remove the mobile node's signalling processing load, the network-based Mobile IPv6 has been proposed recently. It allows session continuity for a mobile node without its involvement in mobility management. The proxy mobility agent in the network performs the signaling and does the mobility management on behalf of the mobile node. However, to make secure communications for a mobile node, security mechanisms against diverse attacks should be adopted. To do this, first of all security threats to the network-based Mobile IPv6 should be also identified and analyzed. Potential attack objectives may be to consume network services at the cost of a legitimate mobile node and, eavesdropping and fabrication of user traffic through interception of a mobile node's communications. This paper identifies and discusses security threats to the network-based Mobile IPv6 in details. The results of threats analysis are limited to threats that are peculiar to the network-based Mobile IPv6 except threats to IPv6 in general.

Influences of Cognitive Conflict and Non-cognitive Variables Induced by Discrepant Event and Alternative Hypothesis on Conceptual Change (변칙사례 및 대안가설에 의해 유발된 인지갈등과 비인지적 변인이 개념변화에 미치는 영향)

  • Kang, Hun-Sik;Kwack, Jin-Ha;Kim, You-Jung;Noh, Tae-Hee
    • Journal of the Korean Chemical Society
    • /
    • v.51 no.1
    • /
    • pp.56-64
    • /
    • 2007
  • This study examined the influences of cognitive conflict and anxiety induced by a discrepant event and an alternative hypothesis, attention, and effort on conceptual change. Two hundred three students having misconceptions about density were selected from 462 seventh graders based on the results of a preconception test. Tests of cognitive responses and anxiety to a discrepant event were administered before and after presenting an alternative hypothesis. Computer-assisted instruction (CAI) was then provided to students as a conceptual change intervention. Tests assessing attention and effort allocated to the CAI, and conceptual understanding were administered as posttests. Cognitive conflict induced by a discrepant event was found to increase after presenting an alternative hypothesis. Pre-cognitive conflict induced by only a discrepant event exerted a direct effect on post-cognitive conflict induced by a discrepant event and an alternative hypothesis. Post-cognitive conflict had a direct effect on conceptual change. Pre-anxiety decreased after presenting an alternative hypothesis. Pre-anxiety influenced post-anxiety, and this influenced on conceptual change via effort negatively. Attention had a direct effect as well as an indirect effect on conceptual change via effort. These results suggest that the strategy presenting both a discrepant event and an alternative hypothesis to students in concept learning could facilitate conceptual change by inducing more cognitive conflict or active participation of students through the decrease of anxiety than that presenting a discrepant event only.

Bayesian Image Restoration Using a Continuation Method (연속방법을 사용한 Bayesian 영상복원)

  • Lee, Soo-Jin
    • The Journal of Engineering Research
    • /
    • v.3 no.1
    • /
    • pp.65-73
    • /
    • 1998
  • One approach to improved image restoration methods has been the incorporation of additional source information via Gibbs priors that assume a source that is piecewise smooth. A natural Gibbs prior for expressing such constraints is an energy function defined on binary valued line processes as well as source intensities. However, the estimation of both continuous variables and binary variables is known to be a difficult problem. In this work, we consider the application of the deterministic annealing method. Unlike other methods, the deterministic annealing method offers a principled and efficient means of handling the problems associated with mixed continuous and binary variable objectives. The application of the deterministic annealing method results in a sequence of objective functions (defined only on the continuous variables) whose sequence of solutions approaches that of the original mixed variable objective function. The sequence is indexed by a control parameter (the temperature). The energy functions at high temperatures are smooth approximations of the energy functions at lower temperatures. Consequently, it is easier to minimize the energy functions at high temperatures and then track the minimum through the variation of the temperature. This is the essence of a continuation method. We show experimental results, which demonstrate the efficacy of the continuation method applied to a Bayesian restoration model.

  • PDF

Desirable Suggestions for Korean Geo-technology R&D through Analysis of the Global Grand Challenges and Moonshot Projects (글로벌 과학난제 도전연구프로젝트 분석을 통한 우리나라 지질자원기술에의 바람직한 제언)

  • Kim, Seong-Yong;Sung, Changmo
    • Economic and Environmental Geology
    • /
    • v.53 no.1
    • /
    • pp.111-120
    • /
    • 2020
  • Remarkable scientific and technological achievements are mainly shown in the 'super-convergence' or 'convergence of convergence' among cross- disciplinary fields, and advanced countries are promoting the 'high-risk, high-return research' ecosystem. Google LLC is carrying out numerous new challenges in terms of a non-failure perspective. Innovative research by the US Defense Advanced Research Projects Agency (DARPA) has produced such breakthroughs as the Internet, GPS, semiconductors, the computer mouse, autonomous vehicles, and drones. China is pioneering a 'Moon Village' and planning the world's largest nuclear fusion energy and ultra-large particle accelerator project. Japan has also launched 'the moonshot technology development research system' to promote disruptive innovation. In Korea, the government is preparing a new research program to tackle the global scientific challenges. Therefore, it is necessary to determine the reasonable geoscientific challenges to be addressed and to conduct a preliminary study on these topics. For this purpose, it is necessary to conduct long-term creative research projects centered on young researchers, select outstanding principal investigators, extract innovative topics without prior research or reference, simplify research proposal procedures, innovate the selection solely based on key ideas, and evaluate results by collective intelligence in the form of conferences.

Virtual Reality in Cognitive Rehabilitation (인지재활 영역에서 가상현실)

  • Park, Inn-Jee;Park, Heung-Seok;Kim, Tae-Hoon
    • Therapeutic Science for Rehabilitation
    • /
    • v.1 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Introduction : This study reviews the main areas of cognitive rehabilitation including executive dysfunction, memory dysfunction, perceptual dysfunction, attention deficit, and dysfunctions in activities of daily living in order to apply to the adaptation of occupational therapy. Body : Cognition programs based on the virtual reality are being used not only to evaluate but to train the overall components of human's cognition. Because the cognitive program is concentrating on the real environment, it is known to bring a remarkable transitional effect to the actual environment, compared to the basic computer-based evaluation and training. Applying virtual reality to the rehabilitation program can develop and advance the high technology and can result in a major effect on the innovative treatment technology. Conclusions : In this process, virtual reality is expected to be researched more in the near future. Particularly in the cognitive realm, it is imperative for researchers to pay attention to the improved transitional effect of the virtual reality toward the actual environment, rather than the already existing method of evaluations. Therefore, application of the virtual reality for the cognitive training should be researched for various types of subjects in the diverse aspects of congnitive function. Application of the virtual reality in the cognitive function has its unlimited potential, thus the rehabilitation program integrated with not only evaluation but training and education is expected extensively in the future.

Development of the Automated Ultrasonic Testing System for Inspection of the flaw in the Socket Weldment (소켓 용접부 결함 검사용 초음파 자동 검사 장비 개발)

  • Lee, Jeong-Ki;Park, Moon-Ho;Park, Ki-Sung;Lee, Jae-Ho;Lim, Sung-Jin
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.3
    • /
    • pp.275-281
    • /
    • 2004
  • Socket weldment used to change the flow direction of fluid nay have flaws such as lack of fusion and cracks. Liquid penetrant testing or Radiography testing have been applied as NDT methods for flaw detection of the socket weldment. But it is difficult to detect the flaw inside of the socket weldment with these methods. In order to inspect the flaws inside the socket weldment, a ultrasonic testing method is established and a ultrasonic transducer and automated ultrasonic testing system are developed for the inspection. The automated ultrasonic testing system is based on the portable personal computer and operated by the program based Windows 98 or 2000. The system has a pulser/receiver, 100MHz high speed A/D board, and basic functions of ultrasonic flaw detector using the program. For the automated testing, motion controller board of ISA interface type is developed to control the 4-axis scanner and a real time iC-scan image of the automated testing is displayed on the monitor. A flaws with the size of less than 1mm in depth are evaluated smaller than its actual site in the testing, but the flaws larger than 1mm appear larger than its actual size on the contrary. This tendency is shown to be increasing as the flaw size increases. h reliable and objective testing results are obtained with the developed system, so that it is expected that it can contribute to safety management and detection of repair position of pipe lines of nuclear power plants and chemical plants.