• Title/Summary/Keyword: 데이터 확장 기법

Search Result 828, Processing Time 0.022 seconds

An Efficient Protocol for Causal Message Delivery in Distributed Mobile Systems (분산 이동 시스템에서 인과적 메시지 전달을 위한 효율적인 프로토콜)

  • 노성주;정광식;이화민;유헌창;황종선
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.143-154
    • /
    • 2003
  • There is a growing trend in developing system for distributed mobile system that supports services - job flow management, video conference, replicated data management and resource allocation. Supporting these services, applications have to use causally ordered message delivery. Previous proposals that provide causally ordered message delivery have problems such as communication overhead, message delaying, scalability, computing overload of mobile host. In this paper, we proposed efficient protocol for causally ordered message delivery using the methods that MSS maintains dependency information matrix between MSS and MH, Piggybacking dependency information about each immediate predecessor message. Proposed algorithm, when compared with previous proposals, provides a low message overhead, and low probability of unnecessary inhibition in delivering messages. Also, it consider resource restriction of MH and low bandwidth of wireless communication by computing most of algorithm at MSS, and reduce processing delay by executing causally ordered message delivery a unit of MH.

Multi-Document Summarization Method Based on Semantic Relationship using VAE (VAE를 이용한 의미적 연결 관계 기반 다중 문서 요약 기법)

  • Baek, Su-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.341-347
    • /
    • 2017
  • As the amount of document data increases, the user needs summarized information to understand the document. However, existing document summary research methods rely on overly simple statistics, so there is insufficient research on multiple document summaries for ambiguity of sentences and meaningful sentence generation. In this paper, we investigate semantic connection and preprocessing process to process unnecessary information. Based on the vocabulary semantic pattern information, we propose a multi-document summarization method that enhances semantic connectivity between sentences using VAE. Using sentence word vectors, we reconstruct sentences after learning from compressed information and attribute discriminators generated as latent variables, and semantic connection processing generates a natural summary sentence. Comparing the proposed method with other document summarization methods showed a fine but improved performance, which proved that semantic sentence generation and connectivity can be increased. In the future, we will study how to extend semantic connections by experimenting with various attribute settings.

Performance Analysis of Virtual Conference System in the IPv6 Multicast Network (IPv6 멀티캐스트 네트워크에서 가상 학술회의 시스템의 성능 분석)

  • Eom, Tai-Rang;Do, Jin-Sook;Lee, Kyung-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.45-54
    • /
    • 2003
  • In the Protocol-Independent Multicast Sparse Mode(PIM-SM), we need a careful selection scheme for the Rendezvous Point(RP) which influences much on the QoS due to the delay among multicast group members and packet loss The QoS based RP selection schemes choose RPs which satisfy the restriction conditions such as bandwidth, delay, and other QoS parameters In this paper, we propose a new RP selection scheme which is a variation of the group-based RP selection scheme The new algorithm, MCT(Maximum Cross Tree), is implemented by taking advantages of the topology-based selection scheme and the group-based selection scheme as well In order to verify the proposed algorithm, we first measure the multicast traffic data of the Virtual Conference System implemented on the IPv6 network via KOREN, then expand the results to two types of network models and analyze the performance by computer simulation.

Schema management skills for semantic web construction (시멘틱웹 구축을 위한 스키마 관리 기법 연구)

  • Kim, Byung-Gon;Oh, Sung-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.9-15
    • /
    • 2007
  • As the information of the internet increased, importance of sematic web for collecting and integration of these informations to support decision making of some group or ordinary people are growing as well. Basis structure that composes semantic web is ontology and languages like XML, RDF/RDF schema and OWL are basis means that compose ontology schema. When composes and manages Ontology schema, one of the important consideration point is that schema is changed as times go by. Therefore, change of domain of schema, change of data concept or change of relation between resource etc. are reflected in the ontology system. In this study, we suggest semantic web schema management skill in terms of version management. We categorized version change forms and created version graph for checking of version transition. With created version graph, we define transitivity rule and propose schema tag for detail application which enables extending of applicable version schema.

  • PDF

Transforming an Entity - Relationship Model into an Object - Oriented Database Model Depending on the Role of Relationship (관계 역할에 따른 개체 - 관계 모델의 객체지향 데이타베이스 모델로 변환)

  • Kim, Sam-Nam;Lee, Hong-Ro;Ryu, Keun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1665-1680
    • /
    • 1997
  • The Entity-Relationship (E-R) model is widely used not only to increase understanding between user and designer, but also to model the relationship of real world data appropriately when designing database system in many application areas. It should be then transformed into an Object-Oriented database model which gives good merits to represent and manipulate data efficiently. Therefore, a method of transforming an E-R model into an Object-Oriented database model should be studied, but without losing any semantics of concept for the E-R model. This paper not only deals with transformation rules taking as input the elements of E-R model and delivering the elements of an Object-Oriented database model, but also improves the concept of generalization and aggregation inheritance. The paper also presents a method of transformation of relationship depending on these rules. The proposed method that obtains Object-Oriented database schema from an E-R model with preserving the properties of the E-R model is shown with examples. The method presented is able to be used to the logical database design.

  • PDF

Hybrid 3DTV Systems Based on the Cross-View SHVC (양안 교차 SHVC 기반 융합형 3DTV 시스템)

  • Kang, Dong Wook;Jung, Kyeong Hoon;Kim, Jin Woo;Kim, Jong Ho
    • Journal of Broadcast Engineering
    • /
    • v.23 no.2
    • /
    • pp.316-319
    • /
    • 2018
  • When a terrestrial UHD broadcasting service and a mobile HD broadcasting service are provided using the PLP function provided by ATSC 3.0 and domestic UHD broadcasting standard, a small amount of data may be additionally transmitted to further provide high quality UHD-3D broadcasting service. The left and right images of the stereoscopic image are input, one view image is encoded by the SHVC method, and the other view images are encoded by the SHVC method of the two-view cross-referencing method. However, since the base layers (BL) of the two encoders are mutually common, the two encoders correspond to encoders that generate one BL stream and two enhancement layer (EL) streams. The average encoding efficiency is 16% more efficient compared to the third independent HEVC encoding for the UHD-3D broadcast service. The proposed scheme reduces the fluctuation of PSNR per image frame and increases the image quality of minimum PSNR frame by 0.6dB.

Anomaly behavior detection using Negative Selection algorithm based anomaly detector (Negative Selection 알고리즘 기반 이상탐지기를 이용한 이상행 위 탐지)

  • 김미선;서재현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.391-394
    • /
    • 2004
  • Change of paradigm of network attack technique was begun by fast extension of the latest Internet and new attack form is appearing. But, Most intrusion detection systems detect informed attack type because is doing based on misuse detection, and active correspondence is difficult in new attack. Therefore, to heighten detection rate for new attack pattern, visibilitys to apply human immunity mechanism are appearing. In this paper, we create self-file from normal behavior profile about network packet and embody self recognition algorithm to use self-nonself discrimination in the human immune system to detect anomaly behavior. Sense change because monitors self-file creating anomaly detector based on Negative Selection Algorithm that is self recognition algorithm's one and detects anomaly behavior. And we achieve simulation to use DARPA Network Dataset and verify effectiveness of algorithm through the anomaly detection rate.

  • PDF

An Service oriented XL-BPMN Metamodel and Business Modeling Process (서비스 지향 XL-BPMN 메타모델과 비즈니스 모델링 프로세스)

  • Song, Chee-Yang;Cho, Eun-Sook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.4
    • /
    • pp.227-238
    • /
    • 2013
  • The business based existing BPMN model is a lack of service oriented modeling techniques. Therefore, it requires a layered technique of service oriented business modeling so that can meet the design for a complex application system, developing a system based on SOA. In order to enhance reusability and modularity of BPMN business model, this paper proposes a metamodel and business modeling process based on this metamodel that can hierarchically build a BPMN model. Towards this end, the XL-BPMN metamodel hierarchically established based on MDA and MVS styles are first defined. Then a BPMN service modeling process is constructed based on modeling elements of this metamodel according to the modeling phases. Finally, the result of a case study in which the proposed method is applied to an online shopping mall system is discussed. With the use of well-defined metamodel and modeling process, it is hoped that it can be shown that a service dominated and layered BPMN business model can be established, and that the modularity and reusability of the constructed BPMN business model can be maximized.

Image Segmentation of Adjoining Pigs Using Spatio-Temporal Information (시공간 정보를 이용한 근접 돼지의 영상 분할)

  • Sa, Jaewon;Han, Seoungyup;Lee, Sangjin;Kim, Heegon;Lee, Sungju;Chung, Yongwha;Park, Daihee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.10
    • /
    • pp.473-478
    • /
    • 2015
  • Recently, automatic video monitoring of individual pigs is emerging as an important issue in the management of group-housed pigs. Although a rich variety of studies have been reported on video monitoring techniques in intensive pig farming, it still requires further elaboration. In particular, when there exist adjoining pigs in a crowd pig room, it is necessary to have a way of separating adjoining pigs from the perspective of an image processing technique. In this paper, we propose an efficient image segmentation solution using both spatio-temporal information and region growing method for the identification of individual pigs in video surveillance systems. The experimental results with the videos obtained from a pig farm located in Sejong illustrated the efficiency of the proposed method.

Efficient Image Stitching Using Fast Feature Descriptor Extraction and Matching (빠른 특징점 기술자 추출 및 정합을 이용한 효율적인 이미지 스티칭 기법)

  • Rhee, Sang-Burm
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.1
    • /
    • pp.65-70
    • /
    • 2013
  • Recently, the field of computer vision has been actively researched through digital image which can be easily generated as the development and expansion of digital camera technology. Especially, research that extracts and utilizes the feature in image has been actively carried out. The image stitching is a method that creates the high resolution image using features extract and match. Image stitching can be widely used in military and medical purposes as well as in variety fields of real life. In this paper, we have proposed efficient image stitching method using fast feature descriptor extraction and matching based on SURF algorithm. It can be accurately, and quickly found matching point by reduction of dimension of feature descriptor. The feature descriptor is generated by classifying of unnecessary minutiae in extracted features. To reduce the computational time and efficient match feature, we have reduced dimension of the descriptor and expanded orientation window. In our results, the processing time of feature matching and image stitching are faster than previous algorithms, and also that method can make natural-looking stitched image.