• Title/Summary/Keyword: 이벤트패턴

Search Result 148, Processing Time 0.027 seconds

QoS Guaranteed MAC protocol in Ubiquitous Sensor Networks (USN에서 QoS보장을 위한 MAC 프로토콜)

  • Kim, Seong-Hun;Goh, Sun-Bok;Lee, Seung-Keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.513-516
    • /
    • 2008
  • The sensor node's performance is expected to be improved and the price will be largely decreased. As USN-applied field is expanded, multiple application services are expected to be provided through one USN soon. Multiple applications be required a periodic data reporting, consecutive information monitoring, event-driven data and query-based data as the data pattern that USN is delivered. Accordingly, the mechanism which can assure QoS according to each data characteristic is required. In this paper, A proposed protocol apply the duty cycle of S-MAC protocol variably and flexible according QoS level. This method largely reduces the delay on the delay-sensitive traffic, while keeping the energy efficiency.

  • PDF

Comparison of Audio Event Detection Performance using DNN (DNN을 이용한 오디오 이벤트 검출 성능 비교)

  • Chung, Suk-Hwan;Chung, Yong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.571-578
    • /
    • 2018
  • Recently, deep learning techniques have shown superior performance in various kinds of pattern recognition. However, there have been some arguments whether the DNN performs better than the conventional machine learning techniques when classification experiments are done using a small amount of training data. In this study, we compared the performance of the conventional GMM and SVM with DNN, a kind of deep learning techniques, in audio event detection. When tested on the same data, DNN has shown superior overall performance but SVM was better than DNN in segment-based F-score.

Introduction of Mobile Supporting Functionalities for Promoting the VOD Service of a Digital Cable Broadcasting (디지털케이블방송사의 VOD 서비스 활성화를 위한 모바일 지원 기능 개발 사례)

  • Ko, Kwangil
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.339-346
    • /
    • 2014
  • VOD Service, which has established a solid foothold as a profit model of digital broadcasting companies, is emerging as a key application of the N-screen technologies and services. In the circumstance, broadcasting companies are trying to promoting their VOD services by providing mobile services for improving the VOD service usability. The paper introduces a VOD mobile app (of a domestic digital cable broadcasting), which includes the functions of promoting the VOD programs and events printed on a VOD guide book, directly transmitting the information (e.g., book-marking and remote-control signals) to a set-top box, and watching the video contents stored in the mobile device on TV.

Telemetry Performance Enhancement Based on Spectral Efficient Retransmission (주파수 효율적 재전송 기반 원격측정 성능 향상)

  • Park, Chung-woon;Park, Hyo Sub
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.5
    • /
    • pp.429-436
    • /
    • 2017
  • Since the telemetry performance using the time-delayed data dissipates the wireless channel resources, we propose the spectral efficient retransmission scheme in this paper. In the proposed scheme, the telemetry data is retransmitted based on triggered memory to improve the spectral efficiency. The proposed scheme minimizes the error caused by multipath fading, antenna pattern as well as the error caused by the flight events. In the flight simulation data, we show the proposed scheme improves the telemetry performance based on spectral efficient retransmission.

Location based Service with Temporal Reasoning (시간적 추론이 적용된 위치 기반 서비스)

  • Kim Je-Min;Park Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.3
    • /
    • pp.356-364
    • /
    • 2006
  • 'Ubiquitous Computing' is the most important paradigm of the next generation Information-Communication technology. The one of important problems to develop ubiquitous computing service system get hold of relations between times of transfer objects and events of transfer objects. Another problem is what reason transfer-pattern through location data of transfer objects. In this paper, we propose an approach to offer temporal-relation service in ubiquitous computing environment. The first is temporal reasoning in service viewpoint. The second is temporal reasoning to record user's preference. Users have preferences that are closely connected with time. These preferences are recorded at user profile. Therefore, the user profile-based ubiquitous service system can offer suitable service to users.

Application Examples Applying Extended Data Expression Technique to Classification Problems (패턴 분류 문제에 확장된 데이터 표현 기법을 적용한 응용 사례)

  • Lee, Jong Chan
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.9-15
    • /
    • 2018
  • The main goal of extended data expression is to develop a data structure suitable for common problems in ubiquitous environments. The greatest feature of this method is that the attribute values can be represented with probability. The next feature is that each event in the training data has a weight value that represents its importance. After this data structure has been developed, an algorithm has been devised that can learn it. In the meantime, this algorithm has been applied to various problems in various fields to obtain good results. This paper first introduces the extended data expression technique, UChoo, and rule refinement method, which are the theoretical basis. Next, this paper introduces some examples of application areas such as rule refinement, missing data processing, BEWS problem, and ensemble system.

Design of Search System Based on Lucene for Minimum Price Products (루씬 기반의 최저가 상품 검색 시스템 설계)

  • Kim, A-Yong;Jeong, Dae-Jin;Gye, Min-Suk;Kim, Chang-Su;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.603-605
    • /
    • 2014
  • Has been switched to the online shopping market in stores of the consumer is from increased utilization and smart devices, the internet popularization. That is why has been converting the user's consumption patterns and consumer culture. Open markets is provides of making a wide variety of events and lowest price policies, safe transactions etc, for attract the consumers of expand distribution channels of the web and via mobile. In this paper, a designs of provides a search system for minimum price product information to the user of Information collect and analyze on sale from open market.

  • PDF

Development of L-THIA sub-daily flow-water quality prediction system (L-THIA 시단위 유량-수질 예측 시스템 개발)

  • Gwanjae Lee;Yonghun Choi;Seoro Lee;Kyoung Jae Lim
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.262-262
    • /
    • 2023
  • 기후변화 및 도시화에 따른 강우 패턴의 변화는 수문 변화를 야기시키며, 이에 따른 영향을 평가하고 예측하기 위해서는 수문학적 모델을 통해 정량화하는 과정이 필요하다. 그러나 기존에 개발되어 사용되고 있는 대부분의 수문학적 모델은 해외에서 개발되어 국내 유역 특성을 반영하지 못하는 한계가 있다. 이러한 한계점을 극복하기 위해서 L-THIA ACN-WQ 2016과 2018 모델이 개발되어 적용성이 평가된 바 있다. 하지만 L-THIA ACN-WQ 모델의 경우 시단위 유량 및 수질 모의가 불가능한 한계점이 있다. 소규모 유역이나 도시화된 지역에서는 하루에 여러 번의 강우 이벤트가 발생하거나 단기간에 많은 양의 강우가 발생하는 경우가 많기 때문에, 이러한 강우-유출을 평가하기 위해서는 시단위 모의가 필요하다. 본 연구에서는 시단위 유량-수질 모의가 가능한 L-THIA sub-daily WQ 모델을 개발하였으며, 갑천 유역과 복하천 유역에서 적용성을 평가하였다. L-THIA sub-daily WQ 모델은 SCS-CN 방법과 Green-Ampt 방법을 함께 고려할 수 있도록 개발하였으며, 국내의 토지이용 및 강우 특성을 고려할 수 있도록 점근 CN과 강우 계급별 EMC를 활용하였다. 갑천 유역과 복하천 유역에서 시단위 유량 예측 결과 R2는 0.61~0.69, NSE는 0.61~0.65, PBIAS는 -4.0~-7.3으로 모의된 시단위 유량이 자연현상을 잘 모의하는 것으로 나타났으며, 수질 예측 결과 T-P와 SS가 자연현상을 잘 모의하는 것으로 나타났다. 따라서, 본 연구에서 개발된 L-THIA sub-daily WQ 모델은 점오염원을 포함하고 있는 도시유역에서 비점오염원에 평가에 활용될 수 있을 것으로 사료된다.

  • PDF

Pattern classification of the synchronized EEG records by an auditory stimulus for human-computer interface (인간-컴퓨터 인터페이스를 위한 청각 동기방식 뇌파신호의 패턴 분류)

  • Lee, Yong-Hee;Choi, Chun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2349-2356
    • /
    • 2008
  • In this paper, we present the method to effectively extract and classify the EEG caused by only brain activity when a normal subject is in a state of mental activity. We measure the synchronous EEG on the auditory event when a subject who is in a normal state thinks of a specific task, and then shift the baseline and reduce the effect of biological artifacts on the measured EEG. Finally we extract only the mental task signal by averaging method, and then perform the recognition of the extracted mental task signal by computing the AR coefficients. In the experiment, the auditory stimulus is used as an event and the EEG was recorded from the three channel $C_3-A_1$, $C_4-A_2$ and $P_Z-A_1$. After averaging 16 times for each channel output, we extracted the features of specific mental tasks by modeling the output as 12th order AR coefficients. We used total 36th order coefficient as an input parameter of the neural network and measured the training data 50 times per each task. With data not used for training, the rate of task recognition is 34-92 percent on the two tasks, and 38-54 percent on the four tasks.

Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process (인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 )

  • Ko, Kwang-Soo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.59-66
    • /
    • 2021
  • In this paper, an improved integrated security control procedure is newly proposed by applying artificial intelligence technology to integrated security control and unifying the existing security control and AI security control response procedures. Current cyber security control is highly dependent on the level of human ability. In other words, it is practically unreasonable to analyze various logs generated by people from different types of equipment and analyze and process all of the security events that are rapidly increasing. And, the signature-based security equipment that detects by matching a string and a pattern has insufficient functions to accurately detect advanced and advanced cyberattacks such as APT (Advanced Persistent Threat). As one way to solve these pending problems, the artificial intelligence technology of supervised and unsupervised learning is applied to the detection and analysis of cyber attacks, and through this, the analysis of logs and events that occur innumerable times is automated and intelligent through this. The level of response has been raised in the overall aspect by making it possible to predict and block the continuous occurrence of cyberattacks. And after applying AI security control technology, an improved integrated security control service model was newly proposed by integrating and solving the problem of overlapping detection of AI and SIEM into a unified breach response process(procedure).