• 제목/요약/키워드: 각도 매핑

Search Result 271, Processing Time 0.028 seconds

A Traffic Model based on the Differentiated Service Routing Protocol (차별화된 서비스제공을 위한 트래픽 모델)

  • 인치형
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.947-956
    • /
    • 2003
  • The current IP Routing Protocolspacket networks also need to provide the network QoS based of DiffServ, RSVP, MPLStraffic model which is standardized as IETF reference model for NGN. The first topic of this paper is to propose Traffic-Balanced Routing Protocol(TBRP) to process existing best effort traffic. TBRP will process low priority interactive data and background data which is not sensitive to dealy. Secondly Hierarchical Traffic-Traffic-Scheduling Routing Protocol(HTSRP) is also proposed. HTSRP is the hierarchical routing algorithm for backbone and access networkin case of fixed-wireless convergence network. Finally, HTSRP_Q is proposed to meet the QoS requirement when user want interactive or streaming packet service. This protocol will maximize the usage of resources of access layer based on the QoS parameters and process delay-sensitive traffic. Service classes are categorized into 5 types by the user request, such as conversational, streaming, high priority interactive, low priority interactive, and background class. It could be processed efficiently by the routing protocolstraffic model proposed in this paper. The proposed routing protocolstraffic model provides the increase of efficiency and stability of the next generation network thanks to the routing according to the characteristic of the specialized service categories.

Real-Time Simulation of Single and Multiple Scattering of Light (빛의 단일 산란과 다중 산란의 실시간 시뮬레이션 기법)

  • Ki, Hyun-Woo;Lyu, Ji-Hye;Oh, Kyoung-Su
    • Journal of Korea Game Society
    • /
    • v.7 no.2
    • /
    • pp.21-32
    • /
    • 2007
  • It is significant to simulate scattering of light within media for realistic image synthesis; however, this requires costly computation. This paper introduces a practical image-space approximation technique for interactive subsurface scattering. We use a general two-pass approach, which creates transmitted irradiance samples onto shadow maps and computes illumination using the shadow maps. We estimate single scattering efficiently using a method similar to common shadow mapping with adaptive deterministic sampling. A hierarchical technique is applied to evaluate multiple scattering, based on a diffusion theory. We further accelerate rendering speed by tabulating complex functions and utilizing level of detail. We demonstrate that our technique produces high-quality images of animated scenes with blurred shadow at hundreds frames per second on graphics hardware. It can be integrated into existing interactive systems easily.

  • PDF

An Efficient Technique for Evaluating Queries with Multiple Regular Path Expressions (다중 정규 경로 질의 처리를 위한 효율적 기법)

  • Chung, Tae-Sun;Kim, Hyoung-Joo
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.449-457
    • /
    • 2001
  • As XML has become an emerging standard for information exchange on the World Wide Web, it has gained attention in database communities to extract information from XML seen as a database model. XML queries are based on regular path queries, which find objects reachable by given regular expressions. To answer many kinds of user queries, it is necessary to evaluate queries that have multiple regular path expressions. However, previous work such as query rewriting and query optimization in the frame work of semistructured data has dealt with a single regular expression. For queries that have multiple regular expressions we suggest a two phase optimizing technique: 1. query rewriting using views by finding the mappings from the view's body to the query's body and 2. for rewritten queries, evaluating each query conjunct and combining them. We show that our rewriting algorithm is sound and our query evaluation technique is more efficient than the previous work on optimizing semistructured queries.

  • PDF

Improved recognition of 3D objects using nonlinear correlator based on direct pixel mapping in curving-effective integral imaging (커브형 집적 영상에서 DPM 기반의 비선형 상관기를 이용한 3D 물체 인식 향상)

  • Lee, Joon-Jae;Shin, Donghak;Lee, Byung-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.190-196
    • /
    • 2013
  • Curved integral imaging is a simple method to display 3D images in space using lens array and provides wide viewing angle. In this paper, we propose a nonlinear 3D correlator based on the direct pixel-mapping (DPM) method in order to improve the recognition performance of 3D target object in curving-effective integral imaging. With this scheme, the elemental image array (EIA) originally picked up from a partially occluded 3-D target object can be converted into a resolution enhanced new EIA by using DPM method. Then, through nonlinear cross-correlations between the reconstructed reference and the target plane images, the improved pattern recognition can be performed from the correlation outputs. To show the feasibility of the proposed method, some preliminary experiments are carried out and results are presented by comparing the conventional method.

Service Self-Organization Method in LTE-Advanced Heterogeneous Networks (LTE-Advanced 융합 망에서 서비스 자기-조직화 방법)

  • Lee, Gi-Sung;Lee, Jong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6260-6268
    • /
    • 2015
  • In LTE-Advanced that different networks coexist, it is considered that it is actually difficult to provide service continuity with a procedural and static control method applied to the existing voice service. This paper suggests Service Self-Organization to support the service continuity effectively based on SON. It means a method in which a subscriber's terminal collects information about its current condition and base station around, and a base station, through the data collected by monitoring inner or adjacent base station, shares related data and converges, controlling service continuity on its own. In other words, as context information of mobile terminal and base station changes, set-up of related functions such as ISHO, cell selection, source allocation, load control, and QoS mapping is adapted; each function fits into the change, exchanges the process of reorganization, and interacts; these actions go toward to satisfy service continuity. Simulation results show that it provides better performances than the conventional one with the measure of resource utilization rate and outage probability.

Reconstruction of a 3D Model using the Midpoints of Line Segments in a Single Image (한 장의 영상으로부터 선분의 중점 정보를 이용한 3차원 모델의 재구성)

  • Park Young Sup;Ryoo Seung Taek;Cho Sung Dong;Yoon Kyung Hyun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.4
    • /
    • pp.168-176
    • /
    • 2005
  • We propose a method for 3-dimensionally reconstructing an object using a line that includes the midpoint information from a single image. A pre-defined polygon is used as the primitive and the recovery is processed from a single image. The 3D reconstruction is processed by mapping the correspondence point of the primitive model onto the photo. In the recent work, the reconstructions of camera parameters or error minimizing methods through iterations were used for model-based 3D reconstruction. However, we proposed a method for the 3D reconstruction of primitive that consists of the segments and the center points of the segments for the reconstruction process. This method enables the reconstruction of the primitive model to be processed using only the focal length of various camera parameters during the segment reconstruction process.

Efficient Radix-4 Systolic VLSI Architecture for RSA Public-key Cryptosystem (RSA 공개키 암호화시스템의 효율적인 Radix-4 시스톨릭 VLSI 구조)

  • Park Tae geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1739-1747
    • /
    • 2004
  • In this paper, an efficient radix-4 systolic VLSI architecture for RSA public-key cryptosystem is proposed. Due to the simple operation of iterations and the efficient systolic mapping, the proposed architecture computes an n-bit modular exponentiation in n$^{2}$ clock cycles since two modular multiplications for M$_{i}$ and P$_{i}$ in each exponentiation process are interleaved, so that the hardware is fully utilized. We encode the exponent using Radix-4. SD (Signed Digit) number system to reduce the number of modular multiplications for RSA cryptography. Therefore about 20% of NZ (non-zero) digits in the exponent are reduced. Compared to conventional approaches, the proposed architecture shows shorter period to complete the RSA while requiring relatively less hardware resources. The proposed RSA architecture based on the modified Montgomery algorithm has locality, regularity, and scalability suitable for VLSI implementation.

A Study of Dynamic Web Ontology for Comparison-shopping Agent based on Semantic Web (시멘틱 웹 기반의 비교구매 에이전트를 위한 동적 웹 온톨로지에 대한 연구)

  • Kim, Su-Kyoung;Ahn, Ki-Hong
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.31-45
    • /
    • 2005
  • In this paper, convert in RDF triple and a RDF document through RDF document converters and design metadata schema about a digital camcorder after use Wrapper technology, and acquiring commodity information of a HTML page about the digital camcorder which these papers are defined so as to be different by electronic commerce stores, and is expressed. Save in digital camcorder domain ontology storage that implemented to relational database to DCC knowledge base ontology as convert to OWL Web ontology based on designed metadata schema. Through compare with rdf and DCCKBO, mapping, and inference process, provide to buyers by DCC information of the store that had the commodity purchasing information which is the best, and proposed a dynamic Web ontology guessed to contents of the best commodity purchasing information, and to define domain ontology saved in DCCKBO.

  • PDF

Adaptive Concurrency Control Approach on Shared Object Manipulation in Mixed Reality

  • Lee, Jun;Park, Sung-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.75-84
    • /
    • 2021
  • In this paper, we propose an adaptive concurrency control scheme to reduce conflicts and working time in the cooperative work in mixed reality. To this ends, we first classified the goals, tasks and ownerships of the cooperative work. Then, the classified relationships are mapped according to their temporal and hierarchical relationships of shared object manipulation in the cooperative work. The proposed system provides adaptive concurrency controls of the shared object according to temporal orders of the sub-goals. With the proposed scheme, a participant is enable to move and rotate a shared object although another already has an ownership of the shared object in a specific order of the sub-goal. Thus, the proposed system provides adaptive and realistic cooperative working environment. We conducted a user study of the proposed scheme. The proposed system could reduce conflicts and working times comparing to conventional approaches.

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.