• Title/Summary/Keyword: 연구리소스

Search Result 329, Processing Time 0.025 seconds

A Study on Postproduction Image Synthesis based on Resource Types (리소스 형식 기반의 포스트프로덕션 영상합성에 관한 연구)

  • Jung Eun-Ju;Kim Jae-Joon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.1-8
    • /
    • 2006
  • Study of effective synthesis has been amplified in working-level image process corresponding to one of postproduction synthesis ares. However, it is very role to recognize the overall procedure of image composition and unprepared state on a research on variety and complexity for the specific composition method, it is necessary to materialize the overall pattern that can understand stream of image and standardization. In order to embody, it may be desirable that improve working efficiency of database by form called resources. In this paper, by providing the several values such as matte, key, motion, scale, position, or opacity characteristics, we directed th solving problems through the detailed examples while the user has the difficulty on image synthesis.

  • PDF

Design of Security Method for Network Rendering of Augmented Reality Object (홀로그램 용 증강현실 객체의 네트워크 랜더링을 위한 보안 기법 설계)

  • Kim, Seoksoo;Kim, Donghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.92-98
    • /
    • 2019
  • Due to the development of hologram display technology, various studies are being conducted to provide realistic contents for augmented reality. In the case of the HMD for hologram, since augmented reality objects must be rendered by a small processor, it is necessary to use a low-capacity content. To solve this problem, there is a need for a technique of rendering resources by providing resources through a network. In the case of the existing augmented reality system, there is no problem of contents modulation because the resources are loaded and rendered in the internal storage space. However, when providing resources through the network, security problems such as content tampering and malicious code insertion should be considered. Therefore, in this paper, we propose a network rendering technique applying security techniques to provide augmented reality contents in a holographic HMD device.

Effective Classification Method of Hierarchical CNN for Multi-Class Outlier Detection (다중 클래스 이상치 탐지를 위한 계층 CNN의 효과적인 클래스 분할 방법)

  • Kim, Jee-Hyun;Lee, Seyoung;Kim, Yerim;Ahn, Seo-Yeong;Park, Saerom
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.81-84
    • /
    • 2022
  • 제조 산업에서의 이상치 검출은 생산품의 품질과 운영비용을 절감하기 위한 중요한 요소로 최근 딥러닝을 사용하여 자동화되고 있다. 이상치 검출을 위한 딥러닝 기법에는 CNN이 있으며, CNN을 계층적으로 구성할 경우 단일 CNN 모델에 비해 상대적으로 성능의 향상을 보일 수 있다는 것이 많은 선행 연구에서 나타났다. 이에 MVTec-AD 데이터셋을 이용하여 계층 CNN이 다중 클래스 이상치 판별 문제에 대해 효과적인지를 탐구하고자 하였다. 실험 결과 단일 CNN의 정확도는 0.7715, 계층 CNN의 정확도는 0.7838로 다중 클래스 이상치 판별 문제에 있어 계층 CNN 방식 접근이 다중 클래스 이상치 탐지 문제에서 알고리즘의 성능을 향상할 수 있음을 확인할 수 있었다. 계층 CNN은 모델과 파라미터의 개수와 리소스의 사용이 단일 CNN에 비하여 기하급수적으로 증가한다는 단점이 존재한다. 이에 계층 CNN의 장점을 유지하며 사용 리소스를 절약하고자 하였고 K-means, GMM, 계층적 클러스터링 알고리즘을 통해 제작한 새로운 클래스를 이용해 계층 CNN을 구성하여 각각 정확도 0.7930, 0.7891, 0.7936의 결과를 얻을 수 있었다. 이를 통해 Clustering 알고리즘을 사용하여 적절히 물체를 분류할 경우 물체에 따른 개별 상태 판단 모델을 제작하는 것과 비슷하거나 더 좋은 성능을 내며 리소스 사용을 줄일 수 있음을 확인할 수 있었다.

  • PDF

Computing Resource Sharing and Utilization System for Efficient Research Data Utilization (연구데이터 활용성 극대화 위한 컴퓨팅 리소스 공유활용 체계)

  • Song, Sa-kwang;Cho, Minhee;Lee, Mikyoung;Yim, Hyung-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.430-432
    • /
    • 2022
  • With the recent increase in interest in the open science movement in science and technology fields such as open access, open data, and open source, the movement to share and utilize publicly funded research products is materializing and revitalizing. In line with this trend, many efforts are being made to establish and revitalize a system for sharing and utilizing research data, which is a key resource for research in Korea. These efforts are mainly focused on collecting research data by field and institution, and linking it with DataON, a national research data platform, to search and utilize it. However, developed countries are building a system that can share and utilize not only such research data but also various types of R&D-related computing resources such as IaaS, PaaS, SaaS, and MLaaS. EOSC (European Open Science Cloud), ARDC (Australian Research Data Commons), and CSTCloud (China S&T Cloud) are representative examples. In Korea, the Korea Research Data Commons (KRDC) is designed and a core framework is being developed to facilitate the sharing of these computing resources. In this study, the necessity, concept, composition, and future plans of KRDC are introduced.

  • PDF

A Study on Intelligent Bus Management System using Beacon-based BIS (비콘을 활용한 BIS 연동 지능형 버스관리 시스템 연구)

  • Nam, Kang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.47-52
    • /
    • 2017
  • This study is BIT(: Bus Information Terminal) features that take advantage of KEPCO eIoT(: energy Internet of Thing) platform, and it's Network configuration is composed of display terminal device, gateway, platform, and the service server. The key features are parts for processing protocol data between the gateway and the device using LoRa(: Long Range) technology, Intelligent applications and SIP(: Session Initiation Protocol) data handling connected to the Taxi reservation system. And the resource tree provided BIT for the service, which commonly used in the application server and the device.

Study on Smart Office Functionality Utilizing KEPCO Gateway (한전 Gateway를 활용한 Smart Office 기능 연구)

  • Nam, Kang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1107-1112
    • /
    • 2016
  • This study is the Smart Office features that take advantage of KEPCO eIoT(: energy Internet of Thing) platform, and it's Network configuration is composed of sensing device, gateway, platform, and the service server. The key features are parts for processing protocol data between the gateway and the device using LoRa(: Long Range) technology, Intelligent applications and public safety data connected to the PS-LTE(: Public Safety-Long-Term Evolution) system. And the resource tree provided Smart Office for the service, which commonly used in the application server and the device.

Design and Implementation of Tag Clustering System for Efficient Image Retrieval in Web2.0 Environment (Web2.0 환경에서의 효율적인 이미지 검색을 위한 태그 클러스터링 시스템의 설계 및 구현)

  • Lee, Si-Hwa;Lee, Man-Hyoung;Hwang, Dae-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1169-1178
    • /
    • 2008
  • Most of information in Web2.0 is constructed by users and can be classified by tags which are also constructed and added by users. However, as we known, referring by the related works such as automatic tagging techniques and tag cloud's construction techniques, the research to be classified information and resources by tags effectively is to be given users which is still up to the mark. In this paper, we propose and implement a clustering system that does mapping each other according to relationships of the resource's tags collected from Web and then makes the mapping result into clusters to retrieve images. Tn addition, we analyze our system's efficiency by comparing our proposed system's image retrieval result with the image retrieval results searched by Flickr website.

  • PDF

A Study on The Personal Wallet Management System Using Beacon Signal Processing (비콘 신호 처리를 활용한 개인소지품 지갑 관리 시스템에 대한 연구)

  • Kim, Dong-Ik;Nam, Kang-Hyun;Lee, Hyeon-Yeong;Ahn, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1109-1116
    • /
    • 2018
  • The purpose of this study is to solve the loss of personal belongings by utilizing monitoring function of IoT platform. The beacon to combined with personal belongings are registered with the application server, the trigger processing function according to the occurrence of the lost event is performed intelligently through the device, the app, the IoT network, and the application server.

저사양 장치에서의 격자 기반 양자내성암호 구현

  • DongHyun Shin;YoungBeom Kim;Seog Chung Seo
    • Review of KIISC
    • /
    • v.34 no.2
    • /
    • pp.13-19
    • /
    • 2024
  • 양자내성암호는 기존 공개키 암호 스킴과 비교하여 일반적으로 많은 연산량과 높은 메모리 사용량을 요구한다. 양자내성암호 마이그레이션을 위한 최적화 연구들이 활발하게 이루어지고 있다. PQM4 프로젝트를 시작으로 하여, ARM 환경에서 다양한 연구 결과들이 존재하지만, 저사양 장치에서의 연구 결과는 미진하다. 따라서, 본 논문에서는 현재까지 격자 기반암호의 최적화 연구를 리소스 자원이 제한된 저사양 장치 관점으로 살펴본다.

Distributed and Virtual Network Operations and Contents Management Based on Hybrid Research Networks (하이브리드 연구망 기반의 분산 가상형 네트워크 운영 및 리소스 정보 관리 기술 연구)

  • Kim, Dong-Kyun;Lee, Myung-Sun;Byeon, Ok-Hwan;Kim, Seung-Hae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.11-21
    • /
    • 2012
  • Hybrid network infrastructure has been deployed as the most important technology for the advanced research networking community such as Internet2, SURFnet, etc. However, further research needs to be performed in terms of feasible design and implementation of architecture for inter-domain collaborative network infrastructure, which is essential to end-to-end collaborative research based on high-end applications. In this paper, we suggest a framework for distributed and virtual network operations based on hybrid research networks and efficient cooperation between multi-domain hybrid networks, which aims to provide collaborative network environment for high-end applications. Suggested framework is designed to adopt decentralized model of multi-domain hybrid research network management. A collaborative and distributed virtual model that is characterized by cooperation among hybrid research networks that insist on maintaining their autonomy and control, can also contribute for researchers and other end-users to manage and operate their own virtual networks.