• 제목/요약/키워드: state information

검색결과 9,808건 처리시간 0.045초

웨이브렛 변환과 파워 스펙트럼 분석을 이용한 EEG의 안정 상태 인식에 관한 고찰 (Recognition of Stable State of EEG using Wavelet Transform and Power Spectrum Analysis)

  • 김영서;길세기;임선아;민홍기;허웅;홍승홍
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.879-880
    • /
    • 2006
  • The subject of this paper is to recognize the stable state of EEG using wavelet transform and power spectrum analysis. An alpha wave, showed in stable state, is dominant wave for a human EEG and a beta wave displayed excited state. We decomposed EEG signal into an alpha wave and a beta wave in the process of wavelet transform. And we calculated each power spectrum of EEG signal, an alpha wave and a beta wave using Fast Fourier Transform. We recognized the stable state by making a comparison between power spectrum ratios respectively.

  • PDF

Informational and Methodological Approach to Ensuring the Economic Security of the State in the Banking Sphere

  • Shemayeva, Luidmila;Hladkykh, Dmytro;Mihus, Iryna;Onofriichuk, Andrii;Onofriichuk, Vitalii
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.477-482
    • /
    • 2021
  • The existing approaches to ensuring the banking security of the state do not take into account the peculiarities of the banking system in the rapid development of the information economy (increasing uncertainty, imbalance and nonlinearity of processes in the banking system under the influence of innovation, institutions, information asymmetry, etc.). A methodological approach to determining the synergetic effect in the implementation of the regulatory influence of the state on the development of innovation processes related to informatization in the banking system, based on the use of differential equations and modelling the sensitivity of innovation processes related to informatization in the banking system, to the regulatory influence of the state to prevent the deployment of risks and threats to economic security of the state in this area has been suggested in the present article.

링크상태 라우팅 프로토콜의 효율적인 플러딩 (Efficient Flooding in Link-State Routing Protocols)

  • 박무성;이승형
    • 한국통신학회논문지
    • /
    • 제39B권5호
    • /
    • pp.326-328
    • /
    • 2014
  • 본 논문에서는 링크상태 라우팅 프로토콜을 위한효율적인 LSA(Link State Advertisements) 플러딩(flooding) 방식을 제안한다. 링크상태(Link State) 라우팅 프로토콜은 유선 환경에서 널리 사용되고 있는 프로토콜로서, 노드의 링크 상태가 변경이 된 경우에 네트워크의 모든 이웃 노드에게 LSA를 플러딩 한다. 유선 환경과 다르게 무선 환경에서는 링크의 상태 변화가 빈번하게 발생되기 때문에 LSA의 오버헤드가 문제로 발생하게 된다. 본 논문에서는 무선 환경에서 사용 가능한 효율적인 LSA 플러딩 방식을 제안한다.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

Features of Administrative Liability for Offenses in the Informational Sphere

  • Iasechko, Svitlana;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Mota, Andrii;Demchyk, Nadiia;Berizko, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.51-54
    • /
    • 2021
  • The article is devoted to the study of the features of administrative liability for offenses in the informational sphere, the definition of the concept and features. Based on the examples of implementation of instruments of European legislation into the national legal system and examples of national legal practice, the authors have identified the features of informational and legal sanctions aimed at restricting the rights of access of subjects to information, prohibiting them to disseminate certain information, restricting the rights to disseminate certain information, and suspending informational activities. It has been substantiated that the administrative liability for informational offenses as a protective legal institution is created to contribute to the solution of such acute problems of legal support of human and society interests in the new informational dimensions.

Multilayered High-directional Waveguide Grating Antenna Based on Interleaved Etching for Optical Phased Arrays

  • Yang Bo;Qing Wang;Jinyu Wang;Yan, Cai;Wencheng Yue;Shuxiao Wang;Wei Wang;Mingbin Yu
    • Current Optics and Photonics
    • /
    • 제7권2호
    • /
    • pp.157-165
    • /
    • 2023
  • We propose a highly directional waveguide grating antenna for an optical phased array, achieving high directionality of more than 97% by interleaving the trenches with different etching depths in the silicon nitride layer, and adopting a multilayered structure. Meanwhile, the multilayered structure reduces the perturbation strength, which enables a centimeter-scale radiation length. The beam-steering range is 13.2°, with a wavelength bandwidth of 100 nm. The 1-dB bandwidth of the grating is 305 nm. The multilayered grating structure has a large tolerance to the fabrication variation and is compatible with CMOS fabrication techniques.

Classification of Gravitational Waves from Black Hole-Neutron Star Mergers with Machine Learning

  • Nurzhan Ussipov;Zeinulla Zhanabaev;Almat, Akhmetali;Marat Zaidyn;Dana Turlykozhayeva;Aigerim Akniyazova;Timur Namazbayev
    • Journal of Astronomy and Space Sciences
    • /
    • 제41권3호
    • /
    • pp.149-158
    • /
    • 2024
  • This study developed a machine learning-based methodology to classify gravitational wave (GW) signals from black hol-eneutron star (BH-NS) mergers by combining convolutional neural network (CNN) with conditional information for feature extraction. The model was trained and validated on a dataset of simulated GW signals injected to Gaussian noise to mimic real world signals. We considered all three types of merger: binary black hole (BBH), binary neutron star (BNS) and neutron starblack hole (NSBH). We achieved up to 96% correct classification of GW signals sources. Incorporating our novel conditional information approach improved classification accuracy by 10% compared to standard time series training. Additionally, to show the effectiveness of our method, we tested the model with real GW data from the Gravitational Wave Transient Catalog (GWTC-3) and successfully classified ~90% of signals. These results are an important step towards low-latency real-time GW detection.

Cross-speaker anaphora in dynamic semantics

  • Yeom, Jae-Il
    • 한국언어정보학회지:언어와정보
    • /
    • 제14권2호
    • /
    • pp.103-129
    • /
    • 2010
  • In this paper, I show that anaphora across speakers shows both dynamic and static sides. To capture them all formally, I will adopt semantics based on the assumption that variables range over individual concepts that connect epistemic alternatives. As information increases, a variable can take a different range of possible individual concepts. This is captured by the notion of virtual individual (= vi), a set of individual concepts which are indistinguishable in an information state. The use of a pronoun involves two information states, one for the antecedent, which is always part of the common ground, and the other for the pronoun. Information increase changes vis for variables in the common ground. A pronoun can be used felicitously if there is a unique virtual individual in the information state for the antecedent which does not split in two or more distinctive virtual individuals in the information state for the pronoun. The felicity condition for cross-speaker anaphora can be satisfied in declaratives involving modality, interrogatives and imperatives in a rather less demanding way, because in these cases the utterance does not necessarily require non-trivial personal information for proper use of a pronoun.

  • PDF

채널상태정보를 이용하는 블록터보 부호화된 OFDM 시스템의 성능 분석 (Performance Analysis of Block Turbo Coded OFDM System Using Channel State Information)

  • 김한종
    • 한국산학기술학회논문지
    • /
    • 제12권2호
    • /
    • pp.872-877
    • /
    • 2011
  • 본 본 논문에서는 블록터보코드를 사용하는 OFDM 시스템에서 오류정정 능력을 향상시키기 위하여 블록터보코드를 디코딩하는데 있어 채널상태정보(CSI)를 이용하는 새로운 알고리듬을 제안한다. 새로운 디코딩 알고리듬은 레일레이 페이딩 환경에서 채널정보를 사용하지 않는 기존의 디코딩 알고리듬과 비교를 하였으며 실험결과 새롭게 제안된 시스템의 경우 1회의 같은 반복 횟수를 가지는 경우에 BER 성능이 신호의 변조방식에 따라 5.0dB~9.0dB 정도의 뛰어난 성능 향상을 보였다. 또한 CSI 값을 적용하고 1회 반복 복호한 시스템이 CSI값을 적용하지 않은 기존의 복호 시스템의 4회 반복 복호한 경우보다도 3.5dB~5dB의 성능 향상을 보임을 알 수 있었다. 따라서 블록터보코드를 반복 복호하는 경우에 CSI 값을 적용한 시스템이 뛰어난 성능 향상과 더불어 반복 복호 시간을 줄임을 알 수 있었다.

인터넷 유해정보에 대한 초등학생 실태 및 교육적 보호방안 연구 (A Study on Elementary School Students' Current State on Harmful Information on the Internet and Educational Plan)

  • 이재운;김성식
    • 정보교육학회논문지
    • /
    • 제11권3호
    • /
    • pp.329-337
    • /
    • 2007
  • IT 분야의 급속한 성장은 편리성과 더불어 역기능과 유해정보를 초래했으며, 이로 인해 많은 청소년들이 정신적, 인성적 발달에 심각한 장애를 받고 있다. 본 연구는 유해정보에 대한 초등학생들의 실태를 분석하고, 초등학생들을 보호하기 위한 다양한 교육적 방안을 마련하는데 목적이 있다. 이를 위해 각종 문헌과 사전 연구물을 통해 유해정보의 현황을 분석하고 유해정보의 정의와 유형을 제시하였다. 또한 다양한 유해정보 실태 보고서를 비교분석하여 초등학생의 유해정보 실태를 분석하였으며, 이를 통해 학생, 교사, 학부모에 대한 교육적 보호 방안을 제시하였다. 본 연구에서 제안한 교육적 방안은 정보통신윤리 교육과정 구성과 교사, 학부모 교육 등에 활용될 수 있을 것이다.

  • PDF