http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이해영,Lee Dong-Ju,서종모,임상현,김광일,Cho Eun Joo,김현창,신진호,박성하,손일석,Chung Wook-Jin,유승기,성기철,김주한,김대희,편욱범 대한고혈압학회 2021 Clinical Hypertension Vol.27 No.2
Smartphone technology has spread rapidly around the globe. According to a report released by the Korea Information Society Development Institute, about 95% of Koreans aged more than 30 years old owned smartphones. Recently, blood pressure (BP) measurement using a photoplethysmography-based smartphone algorithm paired with the smartwatch is continuously evolving. In this document, the Korean Society of Hypertension intends to remark the current results of smartphone / smartwatch-based BP measurement and recommend optimal BP measurement methods using a smartphone device. We aim to increase the likelihood of success in implementing these new technologies into improved hypertension awareness, diagnosis, and control. Smartphone technology has spread rapidly around the globe. According to a report released by the Korea Information Society Development Institute, about 95% of Koreans aged more than 30 years old owned smartphones. Recently, blood pressure (BP) measurement using a photoplethysmography-based smartphone algorithm paired with the smartwatch is continuously evolving. In this document, the Korean Society of Hypertension intends to remark the current results of smartphone / smartwatch-based BP measurement and recommend optimal BP measurement methods using a smartphone device. We aim to increase the likelihood of success in implementing these new technologies into improved hypertension awareness, diagnosis, and control.
Taylor 다항식에 의한 선형 시변 시스템의 효과적인 해석
이해영,변증남,Lee, Hai-Young,Bien, Zeung-Nam 대한전자공학회 1988 전자공학회논문지 Vol. No.
본 논문의 Taylor 다항식에 의해 선형 시변 시스템을 해석하는 한 효과적인 방법을 제안한다. Sparis와 Mouroutsos에 의한 방법은 구해야 할 상태 벡타가 닫혀진 형태(closed form)로 구해지지 않고 또한 사용하는 항이 증가할 때 큰 차원의 선형 대수 방정식을 출어야 하는 문제점을 가지고 있다. 반면에 본 논문에서 제안된 방법은 상태 벡타가 닫혀진 형태로 구해지며 선형 대수 방정식을 풀 필요가 없다. This paper presents an efficient method of analyzing linear time-varying systems via Taylor polynomials. While the approach suggested by Sparis and Mouroutsos gives an implicit form for unknown state vector and requires to solve a linear algebraic equation with large dimension when the number of terms increases, the method proposed in this paper shows an explicit form and has no need to solve any linear algebraic equation.
설회소성용 Rotary kiln에서 필요 연류량의 설정값 산정용 Fuzzy 판단자의 설계
이해영,백기남,김철,Lee, H.Y.,Peak, K.N.,Kim, C. 대한전자공학회 1993 전자공학회논문지-B Vol.b30 No.12
This paper presents a design of the fuzzy decision maker which infers set value for fuel rate in the rotary kiln of making CaO. The fuzzy decision maker proposed are divided into two groups whose functions are different each other. The one operates when production demand is constant. The other deals with the status of varying production demand. We have chosen several variables used for composing condition and action part by investigating ingerent features of the rotary kiln and skilled operators`manual method of inferring fuel rate. Membership function of each variable was designed by analyzing experimental data and field data collected during two months. On-line operation with fuzzy rules suggested was done safely like human operators' action.
이해영,조대호,Lee, Hae-Young,Cho, Tae-Ho 한국시뮬레이션학회 2009 한국시뮬레이션학회 논문지 Vol.18 No.3
Since wireless sensor networks are deployed in open environments, an attacker can physically capture some sensor nodes. Using information of compromised nodes, an attacker can launch false data injection attacks that report nonexistent events. False data can cause false alarms and draining the limited energy resources of the forwarding nodes. In order to detect and discard such false data during the forwarding process, various security solutions have been proposed. But since they are prevention-based solutions that involve additional operations, they would be energy-inefficient if the corresponding attacks are not launched. In this paper, we propose a detection method that can detect false data injection attacks without extra overheads. The proposed method is designed based on the signature of false data injection attacks that has been derived through simulation. The proposed method detects the attacks based on the number of reporting nodes, the correctness of the reports, and the variation in the number of the nodes for each event. We show the proposed method can detect a large portion of attacks through simulation.