http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
설회소성용 Rotary kiln에서 필요 연류량의 설정값 산정용 Fuzzy 판단자의 설계
이해영,백기남,김철,Lee, H.Y.,Peak, K.N.,Kim, C. 대한전자공학회 1993 전자공학회논문지-B Vol.b30 No.12
This paper presents a design of the fuzzy decision maker which infers set value for fuel rate in the rotary kiln of making CaO. The fuzzy decision maker proposed are divided into two groups whose functions are different each other. The one operates when production demand is constant. The other deals with the status of varying production demand. We have chosen several variables used for composing condition and action part by investigating ingerent features of the rotary kiln and skilled operators`manual method of inferring fuel rate. Membership function of each variable was designed by analyzing experimental data and field data collected during two months. On-line operation with fuzzy rules suggested was done safely like human operators' action.
이해영,전재호,전인걸,김원태,Lee, H.Y.,Jeon, J.H.,Chun, I.G.,Kim, W.T. 한국전자통신연구원 2013 전자통신동향분석 Vol.28 No.2
최근 임베디드 제어 시스템의 규모와 복잡도가 폭발적으로 증가함에 따라, 단일 시스템을 대상으로 하는 기존 M&S(Modeling & Simulation) 기반의 SW 개발 기술은 한계에 부딪히게 되었다. 이에 본고에서는 네트워크 기반 복합 임베디드 제어 시스템의 고신뢰 SW 개발을 위한 M&S 기술 동향을 소개한다. 먼저 모델링 단계에서 복합 시스템의 이종성을 다루기 위한 모델링 기술과 대표적인 도구를 소개하고, 다음으로 대규모 하이브리드 시스템 모델의 검증을 위한 시뮬레이션 및 정형 검증 기술과 관련 도구를 소개한다.
이해영,Lee Dong-Ju,서종모,임상현,김광일,Cho Eun Joo,김현창,신진호,박성하,손일석,Chung Wook-Jin,유승기,성기철,김주한,김대희,편욱범 대한고혈압학회 2021 Clinical Hypertension Vol.27 No.2
Smartphone technology has spread rapidly around the globe. According to a report released by the Korea Information Society Development Institute, about 95% of Koreans aged more than 30 years old owned smartphones. Recently, blood pressure (BP) measurement using a photoplethysmography-based smartphone algorithm paired with the smartwatch is continuously evolving. In this document, the Korean Society of Hypertension intends to remark the current results of smartphone / smartwatch-based BP measurement and recommend optimal BP measurement methods using a smartphone device. We aim to increase the likelihood of success in implementing these new technologies into improved hypertension awareness, diagnosis, and control. Smartphone technology has spread rapidly around the globe. According to a report released by the Korea Information Society Development Institute, about 95% of Koreans aged more than 30 years old owned smartphones. Recently, blood pressure (BP) measurement using a photoplethysmography-based smartphone algorithm paired with the smartwatch is continuously evolving. In this document, the Korean Society of Hypertension intends to remark the current results of smartphone / smartwatch-based BP measurement and recommend optimal BP measurement methods using a smartphone device. We aim to increase the likelihood of success in implementing these new technologies into improved hypertension awareness, diagnosis, and control.
이해영,조대호,Lee, Hae-Young,Cho, Tae-Ho 한국시뮬레이션학회 2009 한국시뮬레이션학회 논문지 Vol.18 No.3
Since wireless sensor networks are deployed in open environments, an attacker can physically capture some sensor nodes. Using information of compromised nodes, an attacker can launch false data injection attacks that report nonexistent events. False data can cause false alarms and draining the limited energy resources of the forwarding nodes. In order to detect and discard such false data during the forwarding process, various security solutions have been proposed. But since they are prevention-based solutions that involve additional operations, they would be energy-inefficient if the corresponding attacks are not launched. In this paper, we propose a detection method that can detect false data injection attacks without extra overheads. The proposed method is designed based on the signature of false data injection attacks that has been derived through simulation. The proposed method detects the attacks based on the number of reporting nodes, the correctness of the reports, and the variation in the number of the nodes for each event. We show the proposed method can detect a large portion of attacks through simulation.