• Title/Summary/Keyword: 지연 모델

Search Result 1,476, Processing Time 0.034 seconds

User Modeling based Time-Series Analysis for Context Prediction in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 컨텍스트 예측을 위한 시계열 분석 기반 사용자 모델링)

  • Choi, Young-Hwan;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.5
    • /
    • pp.655-660
    • /
    • 2009
  • The context prediction algorithms are not suitable to provide real-time personalized service for users in context-awareness environment. The algorithms have problems like time delay in training data processing and the difficulties of implementation in real-time environment. In this paper, we propose a prediction algorithm with user modeling to shorten of processing time and to improve the prediction accuracy in the context prediction algorithm. The algorithm uses moving path of user contexts for context prediction and generates user model by time-series analysis of user's moving path. And that predicts the user context with the user model by sequence matching method. We compared our algorithms with the prediction algorithms by processing time and prediction accuracy. As the result, the prediction accuracy of our algorithm is similar to the prediction algorithms, and processing time is reduced by 40% in real time service environment.

Implementation of Autonomous IoT Integrated Development Environment based on AI Component Abstract Model (AI 컴포넌트 추상화 모델 기반 자율형 IoT 통합개발환경 구현)

  • Kim, Seoyeon;Yun, Young-Sun;Eun, Seong-Bae;Cha, Sin;Jung, Jinman
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.71-77
    • /
    • 2021
  • Recently, there is a demand for efficient program development of an IoT application support frameworks considering heterogeneous hardware characteristics. In addition, the scope of hardware support is expanding with the development of neuromorphic architecture that mimics the human brain to learn on their own and enables autonomous computing. However, most existing IoT IDE(Integrated Development Environment), it is difficult to support AI(Artificial Intelligence) or to support services combined with various hardware such as neuromorphic architectures. In this paper, we design an AI component abstract model that supports the second-generation ANN(Artificial Neural Network) and the third-generation SNN(Spiking Neural Network), and implemented an autonomous IoT IDE based on the proposed model. IoT developers can automatically create AI components through the proposed technique without knowledge of AI and SNN. The proposed technique is flexible in code conversion according to runtime, so development productivity is high. Through experimentation of the proposed method, it was confirmed that the conversion delay time due to the VCL(Virtual Component Layer) may occur, but the difference is not significant.

Numerical Investigation of Dual Mode Ramjet Combustor Using Quasi 1-Dimensional Solver (근사 1차원 솔버를 이용한 이중모드 램제트 연소실 해석)

  • Yang, Jaehoon;Nam, Jaehyun;Kang, Sanghun;Yoh, Jai-ick
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.11
    • /
    • pp.909-917
    • /
    • 2021
  • In this work, a one-dimensional combustor solver was constructed for the scramjet control m odel. The governing equations for fluid flow, Arrhenius based combustion kinetics, and the inje ction model were implemented into the solver. In order to validate the solver, the zero-dimensi onal ignition delay problem and one-dimensional scramjet combustion problem were considered and showed that the solver successfully reproduced the results from the literature. Subsequentl y, a ramjet analysis algorithm under subsonic speed conditions was constructed, and a study o n the inlet Mach number of the combustor was carried out through the thermal choking locatio ns at ram conditions. In such conditions, a model for precombustion shock train analysis was i mplemented, and the algorithm for transition section analysis was introduced. In addition, in or der to determine the appropriateness of the ram mode analysis in the code, the occurrence of a n unstart was studied through the length of the pseudo-shock in the isolator. A performance a nalysis study was carried out according to the geometry of the combustor.

Prediction Equation of Setting Time for Mortar Using Super Retarding Agent Using Equivalent Age (등가재령을 이용한 초지연 모르타르의 응결시간 예측식 제안)

  • Han, Min-Cheol;Hyun, Seung-Yong;Kim, Jong
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.10 no.1
    • /
    • pp.80-91
    • /
    • 2022
  • This study is to provide an prediction model of setting time of super retarding mortar based on equivalent age method under various super retarding agent contents, curing temperature, and water-binder ratio (W/B). An equation for predicting setting time using maturity was proposed. Test results indicated that the setting time can be predicted by determining the curing temperature, W/B, and super retarding agent contents and substituting it into the equation proposed in this study. The coefficient of determination of the equation is 0.9 or more, and the reliability was confirmed through the F-test. Finally, using the equation proposed in this paper, reasonable quality control is possible regarding the setting of super retarding concrete in practice.

A Study on Resource Access Anomaly Detection Algorithm in Mobile Cloud (모바일 클라우드 자원 접근 이상행위 분석 알고리즘 연구)

  • Kim, Ji-Yeon;Choi, Ju-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Jeong-Wook;Jeong, Hyun-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.941-944
    • /
    • 2011
  • 모바일 클라우드 서비스는 사용자가 모바일 단말에 자원을 가지고 있지 않더라도 인터넷을 통해 외부의 다양한 IT 자원을 제공하는 서비스로서 모바일 단말이 가지는 성능적 한계를 극복시킬 수 있다는 장점과 함께 이용자 수가 증가하고 있다. 그러나 클라우드 컴퓨팅 환경에 존재하는 개인 및 기업의 정보 유출과 같은 문제들은 모바일 클라우드 컴퓨팅 환경에도 그대로 상속되기 때문에 이러한 문제에 대응하기 위해서는 모바일 클라우드 컴퓨팅 환경에서 정보유출을 탐지할 수 있는 이상행위 탐지 알고리즘이 마련되어야 한다. 여기서 이상행위란, 모바일 클라우드 자원에 접근하는 방법에 있어 기존에 인지하고 있던 정상적인 행위에서 벗어나는 행위를 의미하며 이상행위로 판단되는 상황이 발생되는 경우, 이를 정보유출이 발생할 수 있는 상황으로 인지함으로써 적절한 대응을 할 수 있게 된다. 따라서 본 논문에서는 모바일 클라우드 자원의 정보유출을 방지하기 위한 목적으로 자원 접근에 대한 이상행위 탐지 알고리즘 개발 모델을 제시한다. 이상행위 탐지 알고리즘을 개발하고 이를 검증하기 위해서는 이상행위를 일으키는 공격 모델 및 대응 모델이 개발되어야 한다. 따라서 본 논문에서는 인증 및 권한관리의 취약점을 이용하여 위협을 일으키는 공격 모델을 개발하는 방법을 제시하고, 사용자의 접속환경 및 클라우드 자원의 정보 흐름을 분석함으로써 이상행위를 탐지하는 알고리즘을 제시한다.

Implementation of High-Throughput SHA-1 Hash Algorithm using Multiple Unfolding Technique (다중 언폴딩 기법을 이용한 SHA-1 해쉬 알고리즘 고속 구현)

  • Lee, Eun-Hee;Lee, Je-Hoon;Jang, Young-Jo;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • This paper proposes a new high speed SHA-1 architecture using multiple unfolding and pre-computation techniques. We unfolds iterative hash operations to 2 continuos hash stage and reschedules computation timing. Then, the part of critical path is computed at the previous hash operation round and the rest is performed in the present round. These techniques reduce 3 additions to 2 additions on the critical path. It makes the maximum clock frequency of 118 MHz which provides throughput rate of 5.9 Gbps. The proposed architecture shows 26% higher throughput with a 32% smaller hardware size compared to other counterparts. This paper also introduces a analytical model of multiple SHA-1 architecture at the system level that maps a large input data on SHA-1 block in parallel. The model gives us the required number of SHA-1 blocks for a large multimedia data processing that it helps to make decision hardware configuration. The hs fospeed SHA-1 is useful to generate a condensed message and may strengthen the security of mobile communication and internet service.

Empirical study on BlenderBot 2.0's errors analysis in terms of model, data and dialogue (모델, 데이터, 대화 관점에서의 BlendorBot 2.0 오류 분석 연구)

  • Lee, Jungseob;Son, Suhyune;Shim, Midan;Kim, Yujin;Park, Chanjun;So, Aram;Park, Jeongbae;Lim, Heuiseok
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.93-106
    • /
    • 2021
  • Blenderbot 2.0 is a dialogue model representing open domain chatbots by reflecting real-time information and remembering user information for a long time through an internet search module and multi-session. Nevertheless, the model still has many improvements. Therefore, this paper analyzes the limitations and errors of BlenderBot 2.0 from three perspectives: model, data, and dialogue. From the data point of view, we point out errors that the guidelines provided to workers during the crowdsourcing process were not clear, and the process of refining hate speech in the collected data and verifying the accuracy of internet-based information was lacking. Finally, from the viewpoint of dialogue, nine types of problems found during conversation and their causes are thoroughly analyzed. Furthermore, practical improvement methods are proposed for each point of view, and we discuss several potential future research directions.

On the Effects of Multi Path Fading in B-CDMA Systems (광대역 CDMA 시스템에서 다경로 페이딩현상의 영향)

  • 류상진;김희규;김철성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.7
    • /
    • pp.1044-1049
    • /
    • 1993
  • In this paper, it is shown that B-CDMA systems inherently reduce the effects of Multi Path fading phenomena which causes to degrade the performance of mobile communication systems. B-COMA systems use PN codes of high chip rates ( > 10 Mbps) and evaluate autocorrelation with the same code in the receiver. Therefore, it is possible that multipath signals, whose delay time is longer than one chip duration compared to the first signal, are removed. We model the wideband fading channel as a suitable linear filter, and perform computer simulation of signal transmission and reception. Graphic comparison of eye diagrams between the narrowband and wideband systems is shown.

  • PDF

A Study of a Game User Oriented Load Balancing Scheme on MMORPG (MMORPG 서버를 위한 게임 사용자 중심의 부하 분산 기법에 관한 연구)

  • Choi, Jong-Gwan;Kim, Hye-Young;Woo, Won-Sik
    • Journal of Korea Game Society
    • /
    • v.12 no.3
    • /
    • pp.69-76
    • /
    • 2012
  • At MMORPGs that has the numerous game users with many interactions at the same virtual world, massive loading that results in delays, resource shortages, and other such problems occur. To solve this, many developers devote research to load-balancing servers, yet due to steady and dynamic map divisions, such research is unreliable. This paper proposes a game user-oriented load balancing scheme for the load balancing of MMORPG servers. This scheme shows effectiveness at dealing with hot-spots and other gatherings of game users at specific servers compared to previous methods.

Proposed of Intrusion detection model using the Mobile agent (이동에이전트를 이용한 침입탐지 모델의 제안)

  • 황인선;박경우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served.

  • PDF