• Title/Summary/Keyword: 에지 컴퓨팅

Search Result 64, Processing Time 0.025 seconds

Algorithm for Measuring Traffic Congestion using DCT (DCT를 이용한 교통 혼잡도 측정 알고리즘)

  • Cheong, Seong-Il;Ahn, Cheol-Woong;Choi, Byung-Geol;Kim, Sung-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.196-205
    • /
    • 2000
  • As the number of cars is suddenly increasing, the number of cars on road exceeds the capacity of the road. In order to disperse the stream of traffic, there are many approaches for calculating the degree of congestion using traffic monitoring camera, and analyzing the velocity or the number of moving objects. Since those methods use background image, it is necessary to prepare the proper background image. In this paper, we proposed the algorithm to calculate the degree of congestion without background image. We perform DCT to the road image to obtain the edge information of cars, and then use it for calculating the degree of congestion.

  • PDF

Development of vehicle traffic statistics system using deep learning (딥러닝 영상인식을 이용한 출입 차량 통계 시스템 개발)

  • Mun, Dong-Ho;Hwang, Seung-Hyuk;Jeon, Han-Gyeol;Hwang, Su-Min;Yun, Tae-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.701-702
    • /
    • 2020
  • 본 논문에서는 Jetson-Nano와 데스크탑에서 OpenCV와 YOLOv3 실시간 객체 인식 알고리즘을 이용하여 웹캠을 통해 주차장 등의 출입 차량 인식 통계 시스템을 개발하였다. 최근 에지컴퓨팅에 관심이 증가하고 있는 시점에서 Nvidia사에서 개발하여 보급하고 있는 Jetson-Nano에 YOLOv3 tiny와 OpenCV를 이용하여 차량인식을 수행하고, 구글에서 개발한 오픈 소스 Tesseract-OCR을 이용해 차량번호인식하여 입출차 혹은 주차시 차량정보를 확인할 수 있다. 딥러닝 학습 알고리즘에서 전기차 번호판의 특징점을 인식하여 전기차를 판별하여 일반차량이 전기차 주차구역에 불법주차하는 것을 모니터링할 수도 있다. 출입한 차량 데이터 베이스에서 입출차 시각, 차량번호, 전기차여부등이 확인 가능하다.

  • PDF

Real-time ECG Data Bayesian Optimization Analysis for Rehabilitation Robots (재활 로봇을 위한 심전도(ECG) 실시간 데이터 베이지안 최적화 분석 기술)

  • Choi, Jin-Tak;Kang, Kyung-Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.53-56
    • /
    • 2022
  • 본 논문에서는 심전도(ECG) 센서와 에지 컴퓨팅(Edge computing)을 활용하여 실시간 데이터와 Bayesian optimization을 통한 기계학습 알고리즘으로 재활 로봇에서 발목을 제어할 수 있는 Parameter(외골격 관련) 최적값을 출력한다. 심전도 센서 적용을 기반으로 하는 바이오 데이터 기술, 기계 학습(Bayesian optimization) 모델 접근 방식과 하드웨어 결합으로 재활 로봇 모터를 제어할 수 있는 Parameter 제공과 실시간 모터 제어 운영할 수 있도록 분석 플랫폼을 구축한다. 이 플랫폼을 이용해보다 효과적인 이동형 로봇설계 및 처리 방법을 연결할 수 있는 발판을 마련하였고, 로봇제어에 많이 사용하고 있는 매트랩 시뮬링크(Matlab simulink)를 연결할 수 있는 범용 통신 지원한다. 센서-전처리-인공지능 알고리즘-모터 제어 Parameter로 연계되는 데이터 가공과 처리 방법으로 최근 분석 기법을 적용하여 바이오 데이터 연구 활동과 이동형 재활 로봇 관련 데이터 분석 분야를 쉽게 접근할 수 있도록 한다.

  • PDF

A Forwarding Engine based on the Packet Processor for MPLS LER (MPLS LER을 위한 패킷 프로세서 기반의 포워딩 엔진)

  • 박재형;김미희;정민영;이유경
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.447-454
    • /
    • 2003
  • The forwarding enging, which handles the incoming frames and forwards them to the appropriate outgoing interface, is the crucial factor of the router´s performance. As the MPLS label edge router provides the facility that it is capable of interworking with various kinds of networks, the forwarding engine should have the flexibility processing the corresponding types of frames from such network interfaces. In order to support the flexibility, we implement the forwarding engine for the MPLS LER with ATM interfaces based on the programmable Ethernet packet processor. By exploiting instinct loop-back functionality of Ethernet packet processor, our forwarding engine handles and forwards the frames from/to ATM interfaces. The performance of our forwarding engine is evaluated by experiments on the effect of looping frames back and the number of Ethernet packet processor´s instructions.

A JCML and a GUI-based Editor for Specifying Job Control Flow on Grid (그리드에서 작업 흐름을 효과적으로 제어하기 위한 JCML과 GUI 기반의 편집기)

  • 황석찬;최재영;이상산
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.3_4
    • /
    • pp.152-159
    • /
    • 2004
  • The Grid system is an emerging computing infrastructure that will substitute for existing distributed systems. However end users have a difficulty in using the Grid because of its complicated usage, which is an inherent characteristic from the heterogeneous mechanism of the Grid. In this paper, we present the JCML(Job Control Markup Language) and its GUI-based editor, which not only provide users with ease of use, improved working environment, but assist users to execute their jobs efficiently The JCML is a job control language that improves the RSL of Globus, which defines global services in Grid. The JCML is designed to support flexibility among various Grid services using standard XML. And it makes use of a graph representation method, GXL(Graph eXchange Language), to specify detailed job properties and dependencies among jobs using nodes and edges. The JCML editor provides users with GUI-based interface. With the JCML editor, a complicated job order can be easily completed using very simple manipulations with a mouse, such as a drag-and-drop.

Two-Tree Collective Communication in Grid Computing Systems (그리드 컴퓨팅 시스템에서의 두 개의 트리를 이용한 집합 통신)

  • 차광호;이정희;한동수;유찬수
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.450-459
    • /
    • 2004
  • This paper studies the collective communication in the grid computing environment, which is characterized by the combination of heterogeneous networks as well as uneven, long communication delay. Efficient collective communication requires communication schedule, which in turn requires network information. When the network information is not accurate or network faults occur, the performance of collective communication can be markedly degraded. This paper proposes TTCC(Two-Tree Collective Communication) for scheduling collective communication in the grid. It Provides an efficient and reliable schedule even In this unfavorable network condition by maintaining two disjoint communication trees. Benefits of the proposed method are manifested via simulation, where the performance degradation with TTCC is much slower than those using conventional scheduling algorithms.

Non-Photorealistic Rendering Using CUDA-Based Image Segmentation (CUDA 기반 영상 분할을 사용한 비사실적 렌더링)

  • Yoon, Hyun-Cheol;Park, Jong-Seung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.11
    • /
    • pp.529-536
    • /
    • 2015
  • When rendering both three-dimensional objects and photo images together, the non-photorealistic rendering results are in visual discord since the two contents have their own independent color distributions. This paper proposes a non-photorealistic rendering technique which renders both three-dimensional objects and photo images such as cartoons and sketches. The proposed technique computes the color distribution property of the photo images and reduces the number of colors of both photo images and 3D objects. NPR is performed based on the reduced colormaps and edge features. To enhance the natural scene presentation, the image region segmentation process is preferred when extracting and applying colormaps. However, the image segmentation technique needs a lot of computational operations. It takes a long time for non-photorealistic rendering for large size frames. To speed up the time-consuming segmentation procedure, we use GPGPU for the parallel computing using the GPU. As a result, we significantly improve the execution speed of the algorithm.

Privilege Management Technique for Unreliable Network Environments based on Tree Structure (신뢰도가 낮은 네트워크 환경을 위한 트리 구조 기반의 권한 관리 기법)

  • Yang, Soo-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.83-91
    • /
    • 2008
  • IISO/IEC 9594-8 defines the public key framework and attribute certificate framework. Attribute certificate framework deals with privilege management infrastructure(PMI). In PMI, for privilege management using attribute certificates, role assignment certificates and role specification certificates are used to assign and specify privileges independently. Role specification certificates includes privilege specifications and the details far privilege management of network environments. Privilege management of unreliable network environment tries to enhance the reliability and efficiency of privilege information transmission forwarding over unreliable routes in the presence of potentially faulty nodes and edges. Each node forms a role specification tree based on role specification relationship data collected from the network. In this paper privilege management cost with the role specification certificates tree structure is evaluated trying to reduce the overhead incurred by role creation and modification of privileges. The multicasting of packets are used for scalability. We establish management cost model taking into account the packet loss and node reliability which continuously join and leave for network. We present quantitative results which demonstrate the effectiveness of the proposed privilege management scheme.

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.

An Effective Error-Concealment Approach for Video Data Transmission over Internet (인터넷상의 비디오 데이타 전송에 효과적인 오류 은닉 기법)

  • 김진옥
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.736-745
    • /
    • 2002
  • In network delivery of compressed video, packets may be lost if the channel is unreliable like Internet. Such losses tend to of cur in burst like continuous bit-stream error. In this paper, we propose an effective error-concealment approach to which an error resilient video encoding approach is applied against burst errors and which reduces a complexity of error concealment at the decoder using data hiding. To improve the performance of error concealment, a temporal and spatial error resilient video encoding approach at encoder is developed to be robust against burst errors. For spatial area of error concealment, block shuffling scheme is introduced to isolate erroneous blocks caused by packet losses. For temporal area of error concealment, we embed parity bits in content data for motion vectors between intra frames or continuous inter frames and recovery loss packet with it at decoder after transmission While error concealment is performed on error blocks of video data at decoder, it is computationally costly to interpolate error video block using neighboring information. So, in this paper, a set of feature are extracted at the encoder and embedded imperceptibly into the original media. If some part of the media data is damaged during transmission, the embedded features can be extracted and used for recovery of lost data with bi-direction interpolation. The use of data hiding leads to reduced complexity at the decoder. Experimental results suggest that our approach can achieve a reasonable quality for packet loss up to 30% over a wide range of video materials.