• Title/Summary/Keyword: 블록 기반 방법

Search Result 1,132, Processing Time 0.029 seconds

Well-Structured Inter-Oranizational Workflow Modeling for B2B e-Commerce

  • Li, Xizuo;Kim, Sun-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.4
    • /
    • pp.53-64
    • /
    • 2004
  • Today's enterprises take processes beyond their own organizational boundaries in order to electronically trade goods and services with partners under the concept of B2B e-commerce. In this environment, inter-organizational business processes are required and should be well defined not only in public processes between partners but in private processes within individual partners. For this purpose, we propose the method to represent inter-organizational business processes. First of all, a feasible modeling method for the inter-organizational workflow for B2B e-commerce is developed. This method is proposed based on BPSS in ebXML so that the binary and multiparty collaborations share a common process. In this method, message flows and control flows are separated in order to facilitate the design procedure of the inter-organizational workflow process. Second, a well-structured process modeling algorithm to design a well-structured inter-organizational workflow process is proposed. In the algorithm, a process is transformed to a Petri-net-based process model. This algorithm employs well-behaved modeling blocks, well-behaved control structures, and business transactions to develop well-structured process models by a top-down design.

  • PDF

QoS Guarantee in Partial Failure of Clustered VOD Server (클러스터 VOD 서버의 부분적 장애에서 QoS 보장)

  • Lee, Joa-Hyoung;Jung, In-Bum
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.363-372
    • /
    • 2009
  • For large scale VOD service, cluster servers are spotlighted to their high performance and low cost. A cluster server usually consists of a front-end node and multiple back-end nodes. Though increasing the number of back-end nodes can result in the more QoS streams for clients, the possibility of failures in back-end nodes is proportionally increased. The failure causes not only the stop of all streaming service but also the loss of the current playing positions. In this paper, when a back-end node becomes a failed state, the recovery mechanisms are studied to support the unceasing streaming service. For the actual VOD service environment, we implement a cluster-based VOD servers composed of general PCs and adopt the parallel processing for MPEG movies. From the implemented VOD server, a video block recovery mechanism is designed on parity algorithms. However, without considering the architecture of cluster-based VOD server, the application of the basic technique causes the performance bottleneck of the internal network for recovery and also results in the inefficiency CPU usage of back-end nodes. To address these problems, we propose a new failure recovery mechanism based on the pipeline computing concept.

Smoke Detection Method of Color Image Using Object Block Ternary Pattern (물체 블록의 삼진 패턴을 이용한 컬러 영상의 연기 검출 방법)

  • Lee, Yong-Hun;Kim, Won-Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2014
  • Color image processing based on smoke detection is suitable detecting target to early detection of fire smoke. A method for detecting the smoke is processed in the pre-processing movement and color. And Next, characteristics of smoke such as diffusion, texture, shape, and directionality are used to post-processing. In this paper, propose the detection method of density distribution characteristic in characteristics of smoke. the generate a candidate regions by color thresholding image in Detecting the movement of smoke to the 10Frame interval and accumulated while 1second image. then check whether the pattern of the smoke by candidate regions to applying OBTP(Object Block Ternary Pattern). every processing is Block-based processing, moving detection is decided the candidate regions of the moving object by applying an adaptive threshold to frame difference image. The decided candidate region accumulates one second and apply the threshold condition of the smoke color. make the ternary pattern compare the center block value with block value of 16 position in each candidate region of the smoke, and determine the smoke by compare the candidate ternary pattern and smoke ternary pattern.

Single Image Haze Removal Algorithm using Dual DCP and Adaptive Brightness Correction (Dual DCP 및 적응적 밝기 보정을 통한 단일 영상 기반 안개 제거 알고리즘)

  • Kim, Jongho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.31-37
    • /
    • 2018
  • This paper proposes an effective single-image haze-removal algorithm with low complexity by using a dual dark channel prior (DCP) and an adaptive brightness correction technique. The dark channel of a small patch preserves the edge information of the image, but is sensitive to noise and local brightness variations. On the other hand, the dark channel of a large patch is advantageous in estimation of the exact haze value, but halo effects from block effects deteriorate haze-removal performance. In order to solve this problem, the proposed algorithm builds a dual DCP as a combination of dark channels from patches with different sizes, and this meets low-memory and low-complexity requirements, while the conventional method uses a matting technique, which requires a large amount of memory and heavy computations. Moreover, an adaptive brightness correction technique that is applied to the recovered image preserves the objects in the image more clearly. Experimental results for various hazy images demonstrate that the proposed algorithm removes haze effectively, while requiring much fewer computations and less memory than conventional methods.

Design of Key Sequence Generators Based on Symmetric 1-D 5-Neighborhood CA (대칭 1차원 5-이웃 CA 기반의 키 수열 생성기 설계)

  • Choi, Un-Sook;Kim, Han-Doo;Kang, Sung-Won;Cho, Sung-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.3
    • /
    • pp.533-540
    • /
    • 2021
  • To evaluate the performance of a system, one-dimensional 3-neighborhood cellular automata(CA) based pseudo-random generators are widely used in many fields. Although two-dimensional CA and one-dimensional 5-neighborhood CA have been applied for more effective key sequence generation, designing symmetric one-dimensional 5-neighborhood CA corresponding to a given primitive polynomial is a very challenging problem. To solve this problem, studies on one-dimensional 5-neighborhood CA synthesis, such as synthesis method using recurrence relation of characteristic polynomials and synthesis method using Krylov matrix, were conducted. However, there was still a problem with solving nonlinear equations. To solve this problem, a symmetric one-dimensional 5-neighborhood CA synthesis method using a transition matrix of 90/150 CA and a block matrix has recently been proposed. In this paper, we detail the theoretical process of the proposed algorithm and use it to obtain symmetric one-dimensional 5-neighborhood CA corresponding to high-order primitive polynomials.

A Slope Information Based Fast Mask Generation Technique for ROI Coding (관심영역 코딩을 위한 기울기 정보 기반의 빠른 마스크 생성 기법)

  • Park, Sun-Hwa;Seo, Yeong-Geon;Lee, Bu-Kweon;Kang, Ki-Jun;Kim, Ho-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.81-89
    • /
    • 2009
  • To support dynamic Region-of-Interest(ROI) in JPEG2000, a fast ROI mask generation is needed. In the existing methods of ROI coding, after scanning all the pixels in order and discriminating ROI, an ROI mask has been generated. Our method scans 4 pixels of the corners in one code block, and then based on those informations, scans the edges from the corners to get the boundaries of ROI and background. These informations are consisted of a distributed information of ROI and two coordinates of the pixels, which are the points the edges and the boundaries meet. These informations are transmitted to encoder and supported for fast ROI mask generation. There were no great differences between the proposed method and the existing methods in quality, but the proposed method showed superiority in speed.

Development and Validation of Distributed Cognition Theory Based Instructional Strategy in Science Class Using Technology (테크놀로지 활용 과학 수업에서 분산인지 이론 기반 수업 전략의 개발 및 타당화)

  • Ja-Heon Noh;Jun-Ho Son;Jong-Hee Kim
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.17 no.1
    • /
    • pp.1-19
    • /
    • 2024
  • This study is a design and development study that developed instructional strategies based on distributed cognitive theory for science classes using technology according to procedures that ensured reliability and validity. To develop instructional strategies, development study and validation study were conducted according to design and development research methodology procedures. In the development study, an initial instructional strategy was developed through prior literature review and prior expert review. In the validation study, the instructional strategy was validated using internal validation (expert validation, usability evaluation) and external validation (field application evaluation) methods, and the final instructional strategy was developed. The final instructional strategy consisted of 3 instructional principles, 9 instructional strategies, and 38 detailed guidelines. Through this study, the researcher suggested the suitability of instructional strategies for science classes using technology, the usefulness of blocks and teaching and learning processes, the possibility of using technology as a cognitive tool, the need for teachers' efforts to cultivate teaching capabilities using technology, and the needs lesson plan that takes into account conditions affecting the application of instructional strategies.

A Study of the Scene-based NUC Using Image-patch Homogeneity for an Airborne Focal-plane-array IR Camera (영상 패치 균질도를 이용한 항공 탑재 초점면배열 중적외선 카메라 영상 기반 불균일 보정 기법 연구)

  • Kang, Myung-Ho;Yoon, Eun-Suk;Park, Ka-Young;Koh, Yeong Jun
    • Korean Journal of Optics and Photonics
    • /
    • v.33 no.4
    • /
    • pp.146-158
    • /
    • 2022
  • The detector of a focal-plane-array mid-wave infrared (MWIR) camera has different response characteristics for each detector pixel, resulting in nonuniformity between detector pixels. In addition, image nonuniformity occurs due to heat generation inside the camera during operation. To solve this problem, in the process of camera manufacturing it is common to use a gain-and-offset table generated from a blackbody to correct the difference between detector pixels. One method of correcting nonuniformity due to internal heat generation during the operation of the camera generates a new offset value based on input frame images. This paper proposes a technique for dividing an input image into block image patches and generating offset values using only homogeneous patches, to correct the nonuniformity that occurs during camera operation. The proposed technique may not only generate a nonuniformity-correction offset that can prevent motion marks due to camera-gaze movement of the acquired image, but may also improve nonuniformity-correction performance with a small number of input images. Experimental results show that distortion such as flow marks does not occur, and good correction performance can be confirmed even with half the number of input images or fewer, compared to the traditional method.

A Study on the Reliable Video Transmission Through Source/Channel Combined Optimal Quantizer for EREC Based Bitstream (EREC 기반 비트열을 위한 Source-Channel 결합 최적 양자화기 설계 및 이를 통한 안정적 영상 전송에 관한 연구)

  • 김용구;송진규;최윤식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.12B
    • /
    • pp.2094-2108
    • /
    • 2000
  • 오류를 수반하는 통신망을 통한 멀티미디어 데이터의 응용은 최근 그 수요가 급증하고 있다. 하지만 그 구현은 많은 문제점들을 야기하는데, 전송된 비디오 데이터에 발생한 오류를 처리하는 문제가 그 중 하나이다. 이는 압축된 비트열에 발생한 오류가 영상의 시-공간 방향으로 심각한 전파 현상을 수반하기 때문이다. 이러한 심각한 오류 전파를 완화하기 위해 본 논문에서는 EREC라 알려진 오류 제한 기법을 적용하고, 적용된 EREC의 오류 전파 특성을 분석하였다. 이를 통해, 압축 부호화된 하나의 기본 블록 (매크로 블록)이 복호시 오류가 생길 확률을 추정하였으며, 추정된 확률의 근사를 통해 양 끝단(전송단과 수신단)에서의 비디오 화질 열화를 예측하였다. 추정 확률의 근사는 매 기본 블록에서 발생된 비트수에 대한 그 기본 블록이 복호시 오류가 생길 확률을 간단한 1차식을 통한 선형 회귀법으로 모델링 되었으며, 따라서 간단한 방법을 통해 양 끝단의 화질 열화를 효과적으로 예측할 수 있었다. 부호화된 비트열이 전송 오류에 보다 강인하게 되도록 하기 위해, 본 논문에서 개발된 화질 열화 모델을 양자화기 선택에 적용함으로써, 새로운 최적 양자화 기법을 제시하였다. 본 논문에서 제안된 최적 양자화 기법은, 기존의 양자기 최적화 기법들과는 달리, 복호단에서의 복원 영상 화질이 주어진 비트율에서 최적이 되도록 양자화를 수행한다. H.263 비디오 압축 규격에 적용한 제안 양자화 기법의 실험 결과를 통해, 제안 기법이 매우 적은 계산상의 부하를 비용으로 객관적 화질은 물론 주관적 화질까지 크게 개선할 수 있음을 확인할 수 있었다.내었다.Lc. lacti ssp. lactis의 젖산과 초산의 생성량은 각각 0.089, 0.003과 0.189, 0.003M이었다. 따라서 corn steep liquor는 L. fermentum와 Lc. lactis ssp, lactis 의 생장을 위해 질소 또는 탄소 공급원으로서 배지에 첨가 될 수 있는 우수한 농업 부산물로 판단되었다.징하며 WLWQ에 적용되는 몇 가지 제약을 관찰하고 이를 일반적인 언어원리로 설명한다. 첫째, XP는 주어로만 해석되는데 그 이유는 XP가 목적어 혹은 부가어 등 다른 기능을 할 경우 생략 부위가 생략의 복원 가능선 원리 (the deletion-up-to recoverability principle)를 위배하기 때문이다. 둘째, WLWQ가 내용 의문문으로만 해석되는데 그 이유는 양의 공리(the maxim of quantity: Grice 1975) 때문이다. 평서문으로 해석될 경우 WP에 들어갈 부분이 XP의 자질의 부분집합에 불과하므로 명제가 아무런 정보제공을 하지 못한다. 반면 의문문 자체는 정보제공을 추구하지 않으므로 앞에서 언급한 양의 공리로부터 자유롭다. 셋째, WLWQ의 XP는 주제어 표지 ‘는/-은’을 취하나 주어표지 ‘가/-이’는 취하지 못한다(XP-는/-은 vs. XP-가/-이). 이는 IP내부 에 비공범주의 존재 여부에 따라 C의 음운형태(PF)가 시성이 정해진다는 가설로 설명하고자 했다. WLWQ에 대한 우리의 논의가 옳다면, 본 논문은 다음과 같은 이론적 함의를 기닌다. 첫째, WLWQ의 존재는 생략에 대한 두 이론 즉 LF 복사 이론과 PF 삭제 이론

  • PDF

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.