摘要:
There is provided a method of tracking an object in a three-dimensional (3-D) space by using particle filter-based acoustic sensors, the method comprising selecting two planes in the 3-D space; executing two-dimensional (2-D) particle filtering on the two selected planes, respectively; and associating results of the 2-D particle filtering on the respective planes.
摘要:
The present invention provides a community computing method and system comprising a step of community formation forming a community by defining a goal, policies, members, operations among the members, an operation situation of the community and an idle situation of the community, a step of community standby both waiting for an operation starting timing and organizing an actual community member, after the step of community formation, a step of community activation both being self activated and starting an operation, when the community operation situation is ready while the community monitors a context information, after the step of community standby, a step of community deactivation both temporarily stopping an operation for itself and waiting for a next community operation, when the community satisfies the goal of the community, or a situation to deactivate comes in, after the step of community activation; and, a step of community termination terminating all operations for itself in case the community does not need to operate any more.
摘要:
The present invention relates to a method for detecting malicious code patterns in consideration of control and data flows. In the method of the present invention, a malicious code pattern is detected by determining whether values of tokens (variables or constants) included in two sentences to be examined will be identical to each other during execution of the sentences, and the determination on whether the values of the tokens will be identical to each other during the execution is made through classification into four cases: a case where both tokens in two sentences are constants, a case where one of tokens of two sentences is a constant and the other token is a variable, a case where both tokens of two sentences are variables and have the same name and range, and a case where both tokens of two sentences are variables but do not have the same name and range. According to the present invention, it is possible to exclude a false positive error that may occur in conventional comparison of variable names and to lower a false negative error rate, thereby improving the accuracy of detection of malicious behaviors.
摘要:
Provided are a composition for the treatment or prevention of an endometrial cancer including a nuclear acid molecule inducing RNA interference against human syndecan-1 gene expression and a pharmaceutically acceptable carrier, and a method of treating or preventing an endometrial cancer including administering the composition to an individual.
摘要:
Provided is a method of fabricating a low temperature ZnO polycrystalline film and a thin film transistor (TFT) adopting the low temperature ZnO polycrystalline film. The method includes growing ZnO on a substrate at a first temperature for a first time using Metal Organic Chemical Vapor Deposition (MOCVD) to form a ZnO buffer layer, and heating the substrate at a temperature lower than the first temperature to grow ZnO on the ZnO buffer layer for a second time longer than the first time so as to form a ZnO film.
摘要:
An FFT (Fast Fourier Transform) processor is disclosed which is a core block of an OFDM (Orthogonal Frequency Division Multiplexing) or DMT (Discrete Multi-tone) MODEM. The FFT processor simultaneously performs sequential input and output by applying an in-place algorithm for a mixed-radix multi-bank memory, thereby realizing continuous processing with only a 2N-word memory having 4 banks. The FFT processor minimizes its complexity while satisfying a high-speed calculation requirement.
摘要:
The present invention relates to a directional flooding method in a wireless sensor network. Transfer of a packet between respective sensor nodes and a sink node in a wireless sensor network is made with the directivity. To this end, when the packet is transmitted from the sensor nodes to the sink node, only the sensor nodes having a minimum hop count for the sink node are involved in transmission of the packet. Meanwhile, if the packet is sent from the sink node to the sensor nodes within a given destination area, after the packet reaches a corresponding destination area, only sensor nodes located within the destination area transmit the packet. The present invention has an effect that it can improve energy consumed on average and a total number of packets transmitted when transmitting the packets in a wireless sensor network compared to a conventional simple flooding method.