• Title/Summary/Keyword: computer-based technology

Search Result 8,958, Processing Time 0.042 seconds

A Method to Forecast the Computer Technology Trends based on Computer Languages (컴퓨터 언어를 기반으로 한 컴퓨터기술의 발전방향 예측)

  • Choi, Se Ill
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.88-92
    • /
    • 2016
  • This paper proposes a method of forecasting the computer technology development direction. Most computer technology researches in Korea are developed from hot research issues. This approach to take research topics mostly produces less valuable results. In order to choose more valuable research topics, researchers should company with the technology development trends. This paper proposes a way to forecast the computer technologies on the way to the future. It analyzes the development history of programming languages, and forecasts future directions as extensions of the history.

Wearless IoT Device Controller based on Deep Neural Network and Hand Tracking (딥 뉴럴 네트워크 및 손 추적 기반의 웨어리스 IoT 장치 컨트롤러)

  • Choi, Seung-June;Kim, Eun-Yeol;Kim, Jung-Hwa;Hwang, Chae-Eun;Choi, Tae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.924-927
    • /
    • 2018
  • 본 논문에서는 거동이 불편한 환자나 장애인들을 위해 신체에 착용하는 부가적인 장비 없이 멀리 있는 가전을 직접 움직이지 않고 편리하게 제어할 수 있는 RGB-D 카메라를 활용한 손 인식과 딥러닝 기반 IoT 장치 컨트롤 시스템을 제안한다. 특히, 제어하고자 하는 장치의 위치를 알기 위하여 YOLO 알고리즘을 이용하여 장치를 인식한다. 또한 그와 동시에 RGB-D 카메라의 라이브러리를 이용하여 사용자의 손을 인식, 현재 사용자 손의 위치와 사용자가 취하는 손동작을 통하여 해당 위치의 장치를 제어한다.

Recommand Movie Based on Scenario in Movie Characters' Social Networks (영화 등장인물의 사회관계망에서 시나리오를 기반으로 하는 영화 추천 기법)

  • Heo, Joo-Seong;Kim, Tae-Hyeong;Seo, Jang-Won;Lee, Ye-Young;Han, Youn-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1134-1137
    • /
    • 2015
  • '영화 시나리오를 기반으로 영화를 어떻게 추천할 수 있는가'에서 본 논문에서는 전통적인 사회관계망 분석 지표 중 그래프의 평균 길이와 평균 군집도 그리고 밀도를 이용하여 3차원의 데이터 집합을 산출했고, 산출한 데이터 집합을 기반으로 k-means 군집화 알고리즘을 활용하여 각 k 값에 따른 영화를 추천해보았다. 그 결과 기타 여느 추천들과 다른 추천결과를 도출해냈다.

Leading Characters Determation Based on Centrality in Movie Characters' Social Networks (영화 등장인물의 사회관계망에서 중요도를 기반으로 하는 주연 등장인물 검출 기법)

  • Heo, Jooseong;Seo, Jangwon;Kim, Taehyeong;Lee, Yeyoung;Han, Youn-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.716-719
    • /
    • 2015
  • '영화 속에 등장하는 주연들은 어떤 기준으로 선정되는가'에서 본 논문에서는 두 가지 방법을 활용하여 주연들을 추출해보았다. 그 결과 가중치 연결 중심도를 이용한 검출 방법이 공식적인 주연급 등장인물과 일치한다는 것을 도출해냄.

Smart Rectification on Satellite images

  • Seo, Ji-Hun;Jeong, Soo;Kim, Kyoung-Ok
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.75-80
    • /
    • 2002
  • The mainly used technique to rectify satellite images with distortion is to develop a mathematical relationship between the pixel coordinates on the image and the corresponding points on the ground. By defining the relationship between two coordinate systems, a polynomial model is designed and various linear transformations are used. These GCP based geometric correction has performed overall plane to plane mapping. In the overall plane mapping, overall structure of a scene is considered, but local variation is discarded. The highly variant height of region is resampled with distortion in the rectified image. To solve this problem this paper proposed the TIN-based rectification on a satellite image. The TIN based rectification is good to correct local distortion, but insufficient to reflect overall structure of one scene. So, this paper shows the experimental result and the analysis of each rectification model. It also describes the relationship GCP distribution and rectification model. We can choose a geometric correction model as the structural characteristic of a satellite image and the acquired GCP distribution.

  • PDF

A Study on Development of High Strength Al-Zn Based Alloy for Die Casting II: Evaluation of Fluidity and Gravity Casting (고강도 Al-Zn기 다이캐스팅 합금개발에 관한 연구 II: 중력주조, 유동성평가)

  • Shin, Sang-Soo;Lim, Young-Hoon;Kim, Eok-Soo;Lim, Kyung-Mook
    • Korean Journal of Metals and Materials
    • /
    • v.50 no.7
    • /
    • pp.531-538
    • /
    • 2012
  • In this study, we evaluated the fluidity of the Al-Zn based alloys which exhibit excellent mechanical properties. We conducted computer simulations of fluid flow using the results of DSC, DTA analysis and Java-based Materials Properties software (J. Mat. Pro). Such computer simulations were then compared with the results obtained from experimental observations. The computer simulation results and the experimental results were very similar in fluidity length. It was found that the fluidity length of Al-Zn alloys is improved by increasing the Zn content while decreasing the solidus temperature of an alloy. In addition, we elucidate the effect of Zn addition on variations in different mechanical properties and the microstructure characteristics of (Al-xZn3Cu0.4Si0.3Fe) x=20, 30, 40, and 45 wt% alloys fabricated by gravity casting.

LTCC-based Packaging Method using Au/Sn Eutectic Bonding for RF MEMS Applications (RF MEMS 소자 실장을 위한 LTCC 및 금/주석 공융 접합 기술 기반의 실장 방법)

  • Bang, Yong-Seung;Kim, Jong-Man;Kim, Yong-Sung;Kim, Jung-Mu;Kwon, Ki-Hwan;Moon, Chang-Youl;Kim, Yong-Kweon
    • Proceedings of the KIEE Conference
    • /
    • 2005.11a
    • /
    • pp.30-32
    • /
    • 2005
  • This paper reports on an LTCC-based packaging method using Au/Sn eutectic bonding process for RF MEMS applications. The proposed packaging structure was realized by a micromachining technology. An LTCC substrate consists of metal filled vertical via feedthroughs for electrical interconnection and Au/Sn sealing rim for eutectic bonding. The LTCC capping substrate and the glass bottom substrate were aligned and bonded together by a flip-chip bonding technology. From now on, shear strength and He leak rate will be measured then the fabricated package will be compared with the LTCC package using BCB adhesive bonding method which has been researched in our previous work.

  • PDF

Control Flow Checking at Virtual Edges

  • Liu, LiPing;Ci, LinLin;Liu, Wei;Yang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.396-413
    • /
    • 2017
  • Dynamically checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. Control-flow integrity is a basic and important safety property of software integrity. Many classic and emerging security attacks who introduce illegal control-flow to applications can cause unpredictable behaviors of computer-based systems. In this paper, we present a software-based approach to checking violation of control flow integrity at run-time. This paper proposes a high-performance and low-overhead software control flow checking solution, control flow checking at virtual edges (CFCVE). CFCVE assigns a unique signature to each basic block and then inserts a virtual vertex into each edge at compile time. This together with insertion of signature updating instructions and checking instructions into corresponding vertexes and virtual vertexes. Control flow faults can be detected by comparing the run-time signature with the saved one at compile time. Our experimental results show that CFCVE incurs only 10.61% performance overhead on average for several C benchmark programs and the average undetected error rate is only 9.29%. Compared with previous techniques, CFCVE has the characteristics of both high fault coverage and low memory and performance overhead.

Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy

  • Zheng, Qiumei;Liu, Nan;Cao, Baoqin;Wang, Fenghua;Yang, Yanan
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1391-1406
    • /
    • 2020
  • A zero-watermarking algorithm in transform domain based on RGB channel and voting strategy is proposed. The registration and identification of ownership have achieved copyright protection for color images. In the ownership registration, discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conducive to improving the robustness of the proposed algorithm. In order to take full advantage of the characteristics of the image, we use three channels of R, G, and B of a color image to construct three master shares, instead of using data from only one channel. Then, in order to improve security, the master share is superimposed with the copyright watermark encrypted by the owner's key to generate an ownership share. When the ownership is authenticated, copyright watermarks are extracted from the three channels of the disputed image. Then using voting decisions, the final copyright information is determined by comparing the extracted three watermarks bit by bit. Experimental results show that the proposed zero watermarking scheme is robust to conventional attacks such as JPEG compression, noise addition, filtering and tampering, and has higher stability in various common color images.

Path-Based Computation Encoder for Neural Architecture Search

  • Yang, Ying;Zhang, Xu;Pan, Hu
    • Journal of Information Processing Systems
    • /
    • v.18 no.2
    • /
    • pp.188-196
    • /
    • 2022
  • Recently, neural architecture search (NAS) has received increasing attention as it can replace human experts in designing the architecture of neural networks for different tasks and has achieved remarkable results in many challenging tasks. In this study, a path-based computation neural architecture encoder (PCE) was proposed. Our PCE first encodes the computation of information on each path in a neural network, and then aggregates the encodings on all paths together through an attention mechanism, simulating the process of information computation along paths in a neural network and encoding the computation on the neural network instead of the structure of the graph, which is more consistent with the computational properties of neural networks. We performed an extensive comparison with eight encoding methods on two commonly used NAS search spaces (NAS-Bench-101 and NAS-Bench-201), which included a comparison of the predictive capabilities of performance predictors and search capabilities based on two search strategies (reinforcement learning-based and Bayesian optimization-based) when equipped with different encoders. Experimental evaluation shows that PCE is an efficient encoding method that effectively ranks and predicts neural architecture performance, thereby improving the search efficiency of neural architectures.