지식월드 - 지식오픈마켓 지식월드

홈으로 가기

사이트 메뉴

자료 검색

검색 영역

확장 검색

메인 메뉴

전문지식 List

[논문] 3차원 데이터를 활용한 고령 여성의 보디스 원형 비교
The purpose of this study was to investigate the bodice prototype method suitable for the upper body shape of old-old aged women using the 3D anthropometric data. And it was to provide the basic data for the upper body garments of old-old aged women. In the overall appearance evaluation, the B pattern was rated as 4.00, and it was evaluated as the most suitable for...
[태그] Bodice pattern|Old-old aged women|3D simulation|Bodice pattern Old-old aged women|3차원 데이터
[논문] The study of a full cycle semi-automated business process re-engineering
This paper presents an idea and framework to automate a full cycle business process management and re-engineering by integrating traditional business process management systems, process mining, data mining, machine learning, and simulation. We build our framework on the cloud-based platform such that various data sources can be incorporated. We design our syst...
[태그] distributed computing Business process re-engineering|business process management systems process mining|The study of
[논문] 대대급 이하 부대에서 효율적인 아군 위치 공유 연구
In this paper, we propose an efficient friendly forces location data sharing algorithm in a troops using a low bandwidth radio. The future battlefield is a ‘Network Centric Warfare’ with a concept of identifying the position and power of the enemy and friendly forces and leading the battlefield to victory through proper links at the time of our need. One of the...
[태그] location data Sharing B2CS|Tactical Terminal Network Centric Warfare|대대급 이하
[논문] 문서 구조 및 스트림 오브젝트 분석을 통한 문서형 악성코드 탐지
In recent years, there has been an increasing number of ways to distribute document-based malicious code using vulnerabilities in document files. Because document type malware is not an executable file itself, it is easy to bypass existing security programs, so research on a model to detect it is necessary. In this study, we extract main features from the document...
[태그] PDF machine learning|malware java script|문서 구조 및
[논문] 보안 위험 평가를 위한 사회공학 공격 그래프 : Social Engineering Attack Graph framework(SEAG)
Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. ...
[태그] Attack graph Network security|Social engineering Risk assessment|보안 위험 평
[논문] 전원장치의 HALT 신뢰성시험을 통한 설계 한계마진 검증
The verification for the design limit margin of the power device for the information communication and surveillance systems using HALT(Highly Accelerated Life Test) reliability test is described. The HALT reliability test performs with a step stress method which change condition until the marginal step in a design and development phase. The HALT test methods...
[태그] Reliability test HALT(Highly Accelerated Life Test)|Design limit margin Power device|전원장치의 H
[논문] 효율적인 데이터 송수신을 위한 DDS 미들웨어 사용 방법에 관한 연구
Data Distribution Service(DDS) provides the communications service programmers need to distribute time-critical data between embedded and/or enterprise devices or nodes. In this paper, I propose efficient methods for transmitting and receiving messages of various characteristics in real-time using DDS middleware. For high-frequency characteristic data, I ...
[태그] Large-Capacity Quality of Service|Data Distribution Service High-Frequency|효율적인 데
[논문] 정지 물체를 고려한 다중 가우시안 분포 기반 적응적 배경모델링 및 물체탐지 기법
In this paper, we studied about the extraction of the parameter and implementation of speechreading system to recognize the Korean 8 vowel. Face features are detected by amplifying, reducing the image value and making a comparison between the image value which is represented for various value in various color space. The eyes position, the nose position, the inner...
[태그] Background Modeling Gaussian Multiple Model(GMM)|Video Surveillance System Foreground Detection|정지 물체를
[논문] Convolutional LSTM 모델을 이용한 인장편 특성 추정 방법
In this paper, we propose a displacement measurement method based on deep learning using image data obtained from tensile tests of a material specimen. We focus on the fact that the sequential images during the tension are generated and the displacement of the specimen is represented in the image data. So, we designed sample generation model which makes sequential...
[태그] Deep learning Sequential images|Displacement measurement Regression model|Convolution
[논문] 딥러닝 기반 기사단위 및 문단 단위별 분류
Text classification has been studied for a long time in the Natural Language Processing field. In this paper, we propose an article- and paragraph-level genre classification system using Word2Vec-based LSTM, GRU, and CNN models for large-scale English corpora. Both article- and paragraph-level classification performed best in accuracy with LSTM, which was...
[태그] Convolutional Neural Networks (CNN) Genre Classification|Word embedding Deep Learning|딥러닝 기반
[논문] 특징영향평가 기반 패턴분류시스템
Pattern classification system is often an important component of intelligent systems. In this paper, we present a pattern classification system consisted of the feature selection module, knowledge base construction module and decision module. We introduce a feature impact evaluation selection method based on fuzzy cluster analysis considering computational app...
[태그] unsupervised learning feature impact evaluation|pattern classification feature selection|특징영향평가
[논문] 스파크 분산 환경 기반 효율적인 K-익명화 기법 연구
Today, we are living in the era of data and information. With the advent of Internet of Things (IoT), the popularity of social networking sites, and the development of mobile devices, a large amount of data is being produced in diverse areas. The collection of such data generated in various area is called big data. As the importance of big data grows, there has bee...
[태그] K-anonymity Hadoop|Data privacy Spark|스파크 분산
[논문] 가상화를 적용한 고효율 함정 전투체계 설계 및 성능 분석
The Ministry of National Defense announced ‘Defense Reform 2.0’ that aims to strengthen the country’s security for decrease of regional uncertainties, growing requirements for advanced technologies, and a need for more efficiency in the Republic of Korea(RoK) Armed Forces this year. It said RoK Armed Forces have to change efficiently in preparation for r...
[태그] High efficiency Virtualization|Naval combat management system Performance analysis|가상화를 적
[논문] 적외선 카메라에서 두 온도의 영상 반응도 차이를 통한 불량화소 검출 기법
In this paper, we propose soft dead pixels detection method by analysing different response at hot and cold images. Abnormal pixels are able to effect detecting a small target. It also makes confusing real target or not cause of changing target size. Almost exist abnormal pixels after image signal processing even if dead pixels are removed by dead pixel compensati...
[태그] Dead Pixel Detection Infrared Camera|Dead Pixel Response Soft Dead||적외선 카메
[논문] A Study on Efficient Software Education Donation Ecosystem
In this paper, we propose a software education ecosystem model for activating software education donation. First, in order to investigate current software education donation status, we will conduct a survey on software education donors and analyze the results. 39.6% of the software education donors responded that they were introduced to software education donati...
[태그] Computational thinking Social enterprise|Software education donation Ecosystem|A Study on E

하단링크

서비스이용약관  |   책임한계와법적고지  |   저작권침해신고  |   개인정보취급방침  |   이메일무단수집거부

회사소개

(주)지커뮤니케이션 대표이사:권혁일 주소: 충북 청주시 서원구 분평로 32, 502 (분평동, 리치플러스) (주)지커뮤니케이션
사업자등록번호:301-81-59005 통신판매업신고번호:2003-충북청주-0089 TEL:1600-6632
Copyright 2006-2018 / 개인정보관리책임자: 장병진 이메일 : cs@jisikworld.com