• 제목/요약/키워드: software weakness

검색결과 115건 처리시간 0.023초

Embodiment of living body measure system modelling for rehalititation treatment of simulation for HRV analysis interface of PDA base (PDA기반의 HRV분석 인터페이스에 대한 시뮬레이션의 재활치료용 생체계측 시스템 모델링의 구현)

  • Kim, Whi-Young;Choe, Jin-Yeong;Park, Seong-Jun;Kim, Jin-Yeong;Park, Seong-Jun;Kim, Hui-Je
    • Proceedings of the KIEE Conference
    • /
    • 대한전기학회 2006년도 제37회 하계학술대회 논문집 D
    • /
    • pp.2167-2168
    • /
    • 2006
  • Mobilecomputer of offers more fundamental role than role assistance enemy of modem technology equipment and new Information Technology can reconsider, and reconstruct creatively accuracy of physiological concept. That military register symptoms are developed of disease, before far before rehalibitation, of for possibility that can intervene in process that motive change of military register symptoms after rehalibitation. But, that many parameters become analysis target and mathematical settlement and equalization system of noted data of that is huge, same time collection of all datas can lift difficulty etc.. These main weakness puts in structural relation between elements that compose system. Therefore, dynamics research that time urea of systematic adjustment has selected method code Tuesday nerve dynamics enemy who groping of approach that become analysis point is proper and do with recycling bioelectricity signal. Nature model of do living body signal digital analysis chapter as research result could be developed and scientific foundation groping could apply HSS (Hardware-software system) by rehalibitation purpose. Special quality that isdone radish form Tuesday of bioelectricity signal formation furthermore studied, and by the result, fundamental process of bodysignal in do structure circuit form of analog - digital water supply height modelling do can.

  • PDF

The Roles of Intermediaries in Clusters: The Thai Experiences in High-tech and Community-based Clusters

  • Intarakumnerd, Patarapong
    • Journal of Technology Innovation
    • /
    • 제13권2호
    • /
    • pp.23-43
    • /
    • 2005
  • Industrial clusters are geographical concentrations of interconnected companies, specialised suppliers, service providers, firms in related industries, and associated institutions (for example, universities, standard agencies, and trade associations) that combine to create new products and/or services in specific lines of business. At present, the concept of industrial cluster becomes very popular worldwide, policy makers at national, regional and local levels and business people in both forerunner and latecomer countries are keen to implement the cluster concept as an economic development model. Though understanding of clusters and related promoting policies varies from one place to another, the underlying benefits of clusters from collective learning and knowledge spillovers between participating actors strongly attract the attention of these people. In Thailand, a latecomer country in terms of technological catching up, the cluster concept has been used as a means to rectify weakness and fragmentation of its innovation systems. The present Thai government aspires to apply the concept to promote both high-tech manufacturing clusters, services clusters and community-based clusters at the grass-root level. This paper analyses three very different clusters in terms of technological sophistication and business objectives, i.e., hard disk drive, software and chili paste. It portrays their significant actors, the extent of interaction among them and the evolution of the clusters. Though are very dissimilar, common characteristics attributed to qualified success are found. Main driving forces of the three clusters are cluster intermediaries. Forms of these organizations are different from a government research and technology organization (RTO), an industrial association, to a self-organised community-based organization. However, they perform similar functions of stimulating information and knowledge sharing, and building trust among participating firms/individuals in the clusters. Literature in the cluster studies argues that government policies need to be cluster specific. In this case, the best way to design and implement cluster-specific policies is through working closely with intermediaries and strengthening their institutional especially in linking member firms/individuals to other actors in clusters such as universities, government R&D institutes, and financial institutions.

  • PDF

An Architecture for Securing Digital Documents Using Radio Frequency Identification(RFID) (RFID를 이용한 디지털 문서 보안 아키텍처)

  • Choi, Jae-Hyun;Lee, Woo-Jin;Chon, Ki-Won
    • The KIPS Transactions:PartC
    • /
    • 제12C권7호
    • /
    • pp.965-972
    • /
    • 2005
  • Digital documents have become the mainstay of the paperless office. This is due to the increased usage of computer networks and the widespread digital culture. Along with the increased usage of digital documents comes the problem of securing them. The documents nay have very important information such as confidential business policies and intellectual Property statements. Generally, most of users protect them by using a password or secured flash memory or security software, but it has several weaknesses. Accordingly, we propose a new architecture for securing digital documents. The proposed architecture bases on RFID and several encrypting techniques. It makes up for the weakness of traditional securing architectures, and supports various Policies for digital documents of users.

Smart monitoring analysis system for tunnels in heterogeneous rock mass

  • Kim, Chang-Yong;Hong, Sung-Wan;Bae, Gyu-Jin;Kim, Kwang-Yeom;Schubert, Wulf
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 한국지구물리탐사학회 2003년도 Proceedings of the international symposium on the fusion technology
    • /
    • pp.255-261
    • /
    • 2003
  • Tunnelling in poor and heterogeneous ground is a difficult task. Even with a good geological investigation, uncertainties with respect to the local rock mass structure will remain. Especially for such conditions, a reliable short-term prediction of the conditions ahead and outside the tunnel profile are of paramount importance for the choice of appropriate excavation and support methods. The information contained in the absolute displacement monitoring data allows a comprehensive evaluation of the displacements and the determination of the behaviour and influence of an anisotropic rock mass. Case histories and with numerical simulations show, that changes in the displacement vector orientation can indicate changing rock mass conditions ahead of the tunnel face (Schubert & Budil 1995, Steindorfer & Schubert 1997). Further research has been conducted to quantify the influence of weak zones on stresses and displacements (Grossauer 2001). Sellner (2000) developed software, which allows predicting displacements (GeoFit$\circledR$). The function parameters describe the time and advance dependent deformation of a tunnel. Routinely applying this method at each measuring section allows determining trends of those parameters. It shows, that the trends of parameter sets indicate changes in the stiffness of the rock mass outside the tunnel in a similar way, as the displacement vector orientation does. Three-dimensional Finite Element simulations of different weakness zone properties, thicknesses, and orientations relative to the tunnel axis were carried out and the function parameters evaluated from the results. The results are compared to monitoring results from alpine tunnels in heterogeneous rock. The good qualitative correlation between trends observed on site and numerical results gives hope that by a routine determination of the function parameters during excavation the prediction of rock mass conditions ahead of the tunnel face can be improved. Implementing the rules developed from experience and simulations into the monitoring data evaluation program allows to automatically issuing information on the expected rock mass quality ahead of the tunnel.

  • PDF

Video Digital Doorlock System for Recognition and Transmission of Approaching Objects (접근객체 인식 및 전송을 위한 영상 디지털 도어락 시스템 설계)

  • Lee, Sang-Rack;Park, Jin-Tae;Woo, Byoung-Hyoun;Choi, Han-Go
    • KIPS Transactions on Software and Data Engineering
    • /
    • 제3권6호
    • /
    • pp.237-242
    • /
    • 2014
  • Current digital door lock systems are mainly designed for users' convenience, so they have weakness in security. Thus, this paper suggests a video digital doorlock system grouped with a relay device, a server, and a digital doorlock with a camera, sensors, and communication modules, which is detecting or recognizing objects approaching to the front of the door lock system and sending images and door-opening information to users' smart devices. Experiments showed that the suggested system has 96~98% recognition rate of approaching objects and requires 17.1~23.9 seconds for transmission on average, depending on network systems. Therefore, the system is thought to have enough capability for real time security response by monitoring the front area of the doorlock system.

Affine Invariant Local Descriptors for Face Recognition (얼굴인식을 위한 어파인 불변 지역 서술자)

  • Gao, Yongbin;Lee, Hyo Jong
    • KIPS Transactions on Software and Data Engineering
    • /
    • 제3권9호
    • /
    • pp.375-380
    • /
    • 2014
  • Under controlled environment, such as fixed viewpoints or consistent illumination, the performance of face recognition is usually high enough to be acceptable nowadays. Face recognition is, however, a still challenging task in real world. SIFT(Scale Invariant Feature Transformation) algorithm is scale and rotation invariant, which is powerful only in the case of small viewpoint changes. However, it often fails when viewpoint of faces changes in wide range. In this paper, we use Affine SIFT (Scale Invariant Feature Transformation; ASIFT) to detect affine invariant local descriptors for face recognition under wide viewpoint changes. The ASIFT is an extension of SIFT algorithm to solve this weakness. In our scheme, ASIFT is applied only to gallery face, while SIFT algorithm is applied to probe face. ASIFT generates a series of different viewpoints using affine transformation. Therefore, the ASIFT allows viewpoint differences between gallery face and probe face. Experiment results showed our framework achieved higher recognition accuracy than the original SIFT algorithm on FERET database.

PDA-based Text Extraction System using Client/Server Architecture (Client/Server구조를 이용한 PDA기반의 문자 추출 시스템)

  • Park Anjin;Jung Keechul
    • Journal of KIISE:Software and Applications
    • /
    • 제32권2호
    • /
    • pp.85-98
    • /
    • 2005
  • Recently, a lot of researches about mobile vision using Personal Digital Assistant(PDA) has been attempted. Many CPUs for PDA are integer CPUs, which have no floating-computation component. It results in slow computation of the algorithms peformed by vision system or image processing, which have much floating-computation. In this paper, in order to resolve this weakness, we propose the Client(PDA)/server(PC) architecture which is connected to each other with a wireless LAN, and we construct the system with pipelining processing using two CPUs of the Client(PDA) and the Server(PC) in image sequence. The Client(PDA) extracts tentative text regions using Edge Density(ED). The Server(PC) uses both the Multi-1.aver Perceptron(MLP)-based texture classifier and Connected Component(CC)-based filtering for a definite text extraction based on the Client(PDA)'s tentativel99-y extracted results. The proposed method leads to not only efficient text extraction by using both the MLP and the CC, but also fast running time using Client(PDA)/server(PC) architecture with the pipelining processing.

Agent Based Process Management Environment (에이전트 기반의 프로세스 관리 환경에 관한 연구)

  • Kim, Jeong-Ah;Choi, Seung-Young;Choi, Sung-Woon
    • The KIPS Transactions:PartD
    • /
    • 제13D권5호
    • /
    • pp.691-698
    • /
    • 2006
  • The companies need the enterprise-wide support environment to build the competency to gather VOM(Voice of Market) in the process of preparing and implementing the strategy and to help establishing and managing the business process in order to secure the continuous competitive edge The enterprise-wide support environment to establish, operate, improve and evaluate the business process must be carried out. In this paper we define the method to define process and business rule in order to enable accurate execution of the process. Furthermore, collection and refection of accurate data concerning the competency of individuals, the subjects of the process execution, allows prevention of weakness of the process execution result and is the basis for identifying the areas of improvement. Therefore, high visibility can be attained through the work knowledge and processes presented in rules, and it can help firmly establish the process centered work culture (or system) in the organization by process improvement strictly based on data.

Automatic Extraction of Canine Cataract Area with Fuzzy Clustering (퍼지 클러스터링을 이용한 반려견의 백내장 영역 자동 추출)

  • Kim, Kwang Baek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제22권11호
    • /
    • pp.1428-1434
    • /
    • 2018
  • Canine cataract is developed with aging and can cause the blindness or surgical treatment if not treated timely. In this paper, we propose a method for extracting cataract suspicious areas automatically with FCM(Fuzzy C_Means) algorithm to overcome the weakness of previously attempted ART2 based method. The proposed method applies the fuzzy stretching technique and the Max-Min based average binarization technique to the dog eye images photographed by simple devices such as mobile phones. After applying the FCM algorithm in quantization, we apply the brightness average binarization method in the quantized region. The two binarization images - Max-Min basis and brightness average binarization - are ANDed, and small noises are removed to extract the final cataract suspicious areas. In the experiment with 45 dog eye images with canine cataract, the proposed method shows better performance in correct extraction rate than the ART2 based method.

UML 2.0 Statechart based Modeling and Analysis of Finite State Model for Cryptographic Module Validation (암호모듈 검증을 위한 UML 2.0 상태도 기반의 유한상태모델 명세 및 분석)

  • Lee, Gang-soo;Jeong, Jae-Goo;Kou, Kab-seung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제19권4호
    • /
    • pp.91-103
    • /
    • 2009
  • A cryptographic module (CM) is an implementation of various cryptographic algorithms and functions by means of hardware or software, When a CM is validated or certified under the CM validation program(CMVP), a finite state model(FSM) of the CM should be developed and provided, However, guides or methods of modeling and analysis of a FSM is not well-known, because the guide is occasionally regarded as a proprietary know-how by developers as well as verifiers of the CM. In this paper, we propose a set of guides on modeling and analysis of a FSM, which is needed for validation of a CM under CMVP, and a transition test path generation algorithm, as well as implement a simple modeling tool (CM-Statecharter). A FSM of a CM is modeled by using the Statechart of UML 2.0, Statechart, overcoming weakness of a FSM, is a formal and easy specification model for finite state modeling of a CM.