• Title/Summary/Keyword: structured

Search Result 8,156, Processing Time 0.029 seconds

A Survey on the characteristics of the Elderly Persons for Product Safety (제품 안전을 위한 노인의 특성에 대한 기초 조사)

  • 정광태;송복희;이용희
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2001.06a
    • /
    • pp.385-387
    • /
    • 2001
  • This is a brief report oil the characteristics of elderly persons in Korea for product liability and product safety. Recently. the elderly persons rapidly go on increasing in number. So, the considerations of their characteristics in product design become more and more important not only for product safety but for the commercial target. We describe a result from the survey on some of the characteristics such as Stereotypical or common expectations in type, size, motion characteristics, and direction of control operation(i.e., population stereotypes), depth perception, and tracking performance through a structured interview and experiments. This basic study will go on.

  • PDF

Robust control of reheat-fan engine

  • Watanabe, R.;Kurosaki, M.;Uchida, K.;Shimemura, E.;Fujita, M.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10b
    • /
    • pp.351-354
    • /
    • 1993
  • In this paper, reheat-fan engine is described as class of models constructed from nominal and uncertainty model for robust control. In this class of models, uncertainty model consists of structured and unstructured uncertainty, and each model is identified from nonlinear simulation using FFT and ML technique. Then, control requirements and augmented plant are specified. H$_{\infty}$ controller satisfying the control requirements is designed by using constant scaling matrix. Finally, efficacy of the H$_{\infty}$ controller is showed by computer simulation.n.

  • PDF

Effect On-line Automatic Signature Verification by Improved DTW (개선된 DTW를 통한 효과적인 서명인식 시스템의 제안)

  • Dong-uk Cho;Gun-hee Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.4 no.2
    • /
    • pp.87-95
    • /
    • 2003
  • Dynamic Programming Matching (DPM) is a mathematical optimization technique for sequentially structured problems, which has, over the years, played a major role in providing primary algorithms in pattern recognition fields. Most practical applications of this method in signature verification have been based on the practical implementational version proposed by Sakoe and Chiba [9], and il usually applied as a case of slope constraint p = 0. We found, in this case, a modified version of DPM by applying a heuristic (forward seeking) implementation is more efficient, offering significantly reduced processing complexity as well as slightly improved verification performance.

  • PDF

THRESHOLD MODELING FOR BIFURCATING AUTOREGRESSION AND LARGE SAMPLE ESTIMATION

  • Hwang, S.Y.;Lee, Sung-Duck
    • Journal of the Korean Statistical Society
    • /
    • v.35 no.4
    • /
    • pp.409-417
    • /
    • 2006
  • This article is concerned with threshold modeling of the bifurcating autoregressive model (BAR) originally suggested by Cowan and Staudte (1986) for tree structured data of cell lineage study where each individual $(X_t)$ gives rise to two off-spring $(X_{2t},\;X_{2t+1})$ in the next generation. The triplet $(X_t,\;X_{2t},\;X_{2t+1})$ refers to mother-daughter relationship. In this paper we propose a threshold model incorporating the difference of 'fertility' of the mother for the first and second off-springs, and thereby extending BAR to threshold-BAR (TBAR, for short). We derive a sufficient condition of stationarity for the suggested TBAR model. Also various inferential methods such as least squares (LS), maximum likelihood (ML) and quasi-likelihood (QL) methods are discussed and relevant limiting distributions are obtained.

The Design and Implementation of a Structured Document Author/Editor (구조화 문서 작성/편집 시스템의 설계 및 구현)

  • Jang, Myung-Gil;Lee, He-Ran;Lee, Jea-Sung;Zhoo, Zong-Cheol;Park, Dong-In
    • Annual Conference on Human and Language Technology
    • /
    • 1995.10a
    • /
    • pp.80-85
    • /
    • 1995
  • 본 논문은 문서 작성시 해당 문서의 구조적 제한 조건을 명시한 DTD(Document Type Definition) 문법 및 SGML 태깅 방법에 익숙치 않은 사용자가 문서 템플리트를 통해 오류없는 SGML문서를 작성할 수 있도록 하는 구조화 문서 작성/편집 시스템을 소개한다. 본 시스템은 크게 DTD 해석기와 문서편집기로 구성되며 현재 오브젝트 지향 방법론에 따라 구현 중이다.

  • PDF

Design of Backward Parking System using Fuzzy Logic (퍼지논리에 의한 후방주차 시스템 설계)

  • Hao, Yang-Hua;Kim, Tae-Kyun;Choi, Byung-Jae;Yoo, Seog-Hwan
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.04a
    • /
    • pp.337-340
    • /
    • 2007
  • Recently, autonomous parking problems have attracted a great deal of attention and have been examined in many papers in the literature. In this paper we design a fuzzy logic based garage parking system which is a important part for designing a autonomous parking system. We first analysis the existed papers and design a single-input fuzzy logic control for the parking algorithm and illustrate the effectiveness of the new method via the simulation results.

  • PDF

An Intelligent Intrusion Detection Model

  • Han, Myung-Mook
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.224-227
    • /
    • 2003
  • The Intrsuion Detecion Systems(IDS) are required the accuracy, the adaptability, and the expansion in the information society to be changed quickly. Also, it is required the more structured, and intelligent IDS to protect the resource which is important and maintains a secret in the complicated network environment. The research has the purpose to build the model for the intelligent IDS, which creates the intrusion patterns. The intrusion pattern has extracted from the vast amount of data. To manage the large size of data accurately and efficiently, the link analysis and sequence analysis among the data mining techniqes are used to build the model creating the intrusion patterns. The model is consist of "Time based Traffic Model", "Host based Traffic Model", and "Content Model", which is produced the different intrusion patterns with each model. The model can be created the stable patterns efficiently. That is, we can build the intrusion detection model based on the intelligent systems. The rules prodeuced by the model become the rule to be represented the intrusion data, and classify the normal and abnormal users. The data to be used are KDD audit data.

  • PDF

A Study on Mobile Robot Navigation Using a New Sensor Fusion

  • Tack, Han-Ho;Jin, Tae-Seok;Lee, Sang-Bae
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.471-475
    • /
    • 2003
  • This paper proposes a sensor-fusion technique where the data sets for the previous moments are properly transformed and fused into the current data sets to enable accurate measurement, such as, distance to an obstacle and location of the service robot itself. In the conventional fusion schemes, the measurement is dependent on the current data sets. As the results, more of sensors are required to measure a certain physical parameter or to improve the accuracy of the measurement. However, in this approach, instead of adding more sensors to the system, the temporal sequence of the data sets are stored and utilized for the measurement improvement. Theoretical basis is illustrated by examples and the effectiveness is proved through the simulations. Finally, the new space and time sensor fusion (STSF) scheme is applied to the control of a mobile robot in an unstructured environment as well as structured environment.

  • PDF

A Study on the Analysis and Design of IT Cost Model Using an Ethnographic Research (Ethnographic Research를 이용한 IT Cost 모델 분석 및 설계)

  • Lee Jae-Beom;Jeong Seung-Ryul;Lee Hak-Seon
    • The Journal of Information Systems
    • /
    • v.15 no.3
    • /
    • pp.107-129
    • /
    • 2006
  • The purpose of this study is to provide and validate an IT cost model hi which we link among cost center, cost object and flexible cost driver. in order to accomplish this purpose, this study utilizes ethnographic research methodology. At first we develop the cost model where the flexible cost driver is the distribution basis of overhead cost. For each cost driver, unit cost management model is also proposed. Then we employ the structured design methodology to validate the model. Based on the IT Cost requirements of a case company, the IT cost system was designed and developed for its test. The result shows the model we developed in this study is appropriate for managing IT resources and further, can be used as a reference model for calculating chargeback rates of other departments and IT budget of IT department.

  • PDF

Effects of San-Yin-Jiao(SP6) Acupressure on Labor Pain, Delivery Time in Women during Labor (삼음교(SP6)지압이 산부의 분만통증, 분만소요시간에 미치는 효과)

  • 이미경
    • Journal of Korean Academy of Nursing
    • /
    • v.33 no.6
    • /
    • pp.753-761
    • /
    • 2003
  • Purpose: The study was done to examine the effects of San- Yin-Jiao(SP6) acupressure treatment on subjective labor pain, length of delivery time in women during labor. Method: The study design was a randomized controlled clinical trial study using a double-blinded method. Data were collected using a structured questionnaire, a subjective labor pain scale and measurement of delivery time. The experimental group(n=29) was received SP6 acupressure and control group(n=29), SP6 touch for the duration of each uterine contraction, during 30 minutes after 3cm dilatation of cervical os. Result: The subjective labor pain scores was significantly different between the two groups(p=0.042). The total length of delivery time in the group which had the SP6 acupressure was shorter than SP6 touch group (p=0.036). Conclusion: These findings showed that SP6 acupressure was effective related to labor pain, length of time for delivery. SP6 acupressure during labor could be applied as an effective nursing treatment.