• Title/Summary/Keyword: 참조패턴

Search Result 168, Processing Time 0.023 seconds

Abnormal Behavior Analysis Algorithm Development Based on User Profile in Ubiquitous Home Network (유비쿼터스 홈 네트워크에서 사용자 프로파일에 기반한 비정상 행동 분석 알고리즘)

  • Kang, Won-Joon;Shin, Dong-Kyoo;Shin, Dong-Il
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06c
    • /
    • pp.463-468
    • /
    • 2010
  • 본 논문은 본 연구팀이 행동패턴 분석을 위하여 개발한 BPP(Behavior Pattern Prediction)알고리즘의 가중치(weight) 속성을 객관적으로 수식화 하는 방법과 가중치와 행동 프로파일을 이용하여 정상/비정상 행동여부를 판단하는 ABA(Abnormal Behavior Analysis) 알고리즘을 제안한다. 가중치는 거주자의 방과 행동 사이의 연관성을 나타내며 가중치가 제한된 범위 내에서 증가 할수록 행동에 대한 관심이 크다. 구축한 사용자 프로파일의 주요 구성 요소로는 행동이 지속된 시간 과 행동 발생 횟수이다. ABA 알고리즘은 가중치와 행동 발생 횟수, 행동 지속시간과의 상관분석 결과를 참조 하였으며, 이산 가중치 데이터를 분석하여 비정상적인 행동을 탐지한다.

  • PDF

Design and Implementation of a VOD Buffer Scheduler Using Database (Database를 이용한 VOD 버퍼 스케쥴러의 설계 및 구현)

  • Lee, Young-Joo;Lee, Su-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.189-193
    • /
    • 2000
  • VBR로 압축된 멀티미디어 데이터는 비트 변화율이 매우 큰 편차로 변하기 때문에 자원 예약관리가 매우 힘들다. 따라서 MPEG데이터의 참조 패턴을 오프라인으로 분석한 메타 테이블을 근거로 과부하 구간에서 미리 선반입하여 시스템의 활용율을 높이는 선반입 기법을 사용한다. 그러나 기존의 선반입 기법은 상영실패는 발생하지 않으나, 과부하 구간에서 선반입 임계 슬롯의 증가로 인하여 버퍼 점유량이 증가하며 이는 선반입 기법에서 가장 중요한 평가 요소인 최소의 적재시간과 적재비용을 유지할 수 없다. 따라서 본 논문에서는 선반입 구간을 고정적으로 사용하여, 적재비용과 적재시간을 일정한 범위 이하로 유지하면서 시스템 자원의 활용율을 높이는 방법을 제안한다. 아울러 VOD서버에서 수 백편의 영화를 저장하여 다수의 사용자에게 서비스하는 상황에서 선반입 기법을 사용할 경우, 메타 테이블의 관리가 힘들어지는데 본 논문에서는 메타 테이블과 버퍼 스케쥴러를 데이터베이스를 이용함으로써 메타 테이블의 관리를 편리하게 하였다.

  • PDF

Channel Condition Adaptive Error Concealment using Scalability Coding (채널상태에 적응적인 계층 부호화를 이용한 오류 은닉 방법 연구)

  • Han Seung-Gyun;Park Seung-Ho;Suh Doug-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.8-17
    • /
    • 2004
  • In this paper: we propose the adaptive error concealment technique for scalable video coding over wireless network error prove environment. We prove it is very effective that Error concealment techniques proposed in this paper are applied to scalable video data. In this paper, we propose two methods of error concealment. First one is that the en·or is concealed using the motion vector of base layer and previous VOP data. Second one is that according to existence of motion vector in error position, the error is concealed using the same position data of base layer when the motion vector is existing otherwise using the same position data of previous VOP when the motion vector is 0(zero) adaptively. We show that according to various error pattern caused by condition of wireless network and characteristics of sequence, we refer decoder to base layer data or previous enhancement layer data to effective error concealment. Using scalable coding of MPEG-4 In this paper, this error concealment techniques are available to be used every codec based on DCT.

Goods Recommendation Sysrem using a Customer’s Preference Features Information (고객의 선호 특성 정보를 이용한 상품 추천 시스템)

  • Sung, Kyung-Sang;Park, Yeon-Chool;Ahn, Jae-Myung;Oh, Hae-Seok
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1205-1212
    • /
    • 2004
  • As electronic commerce systems have been widely used, the necessity of adaptive e-commerce agent systems has been increased. These kinds of adaptive e-commerce agents can monitor customer's behaviors and cluster thou in similar categories, and include user's preference from each category. In order to implement our adaptive e-commerce agent system, in this paper, we propose an adaptive e-commerce agent systems consider customer's information of interest and goodwill ratio about preference goods. Proposed system build user's profile more accurately to get adaptability for user's behavior of buying and provide useful product information without inefficient searching based on such user's profile. The proposed system composed with three parts , Monitor Agent which grasps user's intension using monitoring, similarity reference Agent which refers to similar group of behavior pattern after teamed behavior pattern of user, Interest Analyzing Agent which personalized behavior DB as a change of user's behavior.

Analysis of Memory Write Reference Patterns in Mobile Applications (모바일 앱의 메모리 쓰기 참조 패턴 분석)

  • Lee, Soyoon;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.65-70
    • /
    • 2021
  • Recently, as the number of mobile apps rapidly increases, the memory size of smartphones keeps increasing. Smartphone memory consists of DRAM and as it is a volatile medium, continuous refresh operations for all cells should be performed to maintain the contents. Thus, the power consumption of memory increases in proportion to the DRAM size of the system. There are attempts to configure the memory system with low-power non-volatile memory instead of DRAM to reduce the power consumption of smartphones. However, non-volatile memory has weaknesses in write operations, so analysis of write behaviors is a prerequisite to realize this in practical systems. In this paper, we extract memory reference traces of mobile apps and analyze their characteristics specially focusing on write operations. The results of this paper will be helpful in the design of memory management systems consisting of non-volatile memory in future smartphones.

Call-Site Tracing-based Shared Memory Allocator for False Sharing Reduction in DSM Systems (분산 공유 메모리 시스템에서 거짓 공유를 줄이는 호출지 추적 기반 공유 메모리 할당 기법)

  • Lee, Jong-Woo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.349-358
    • /
    • 2005
  • False sharing is a result of co-location of unrelated data in the same unit of memory coherency, and is one source of unnecessary overhead being of no help to keep the memory coherency in multiprocessor systems. Moreover. the damage caused by false sharing becomes large in proportion to the granularity of memory coherency. To reduce false sharing in a page-based DSM system, it is necessary to allocate unrelated data objects that have different access patterns into the separate shared pages. In this paper we propose call-site tracing-based shared memory allocator. shortly CSTallocator. CSTallocator expects that the data objects requested from the different call-sites may have different access patterns in the future. So CSTailocator places each data object requested from the different call-sites into the separate shared pages, and consequently data objects that have the same call-site are likely to get together into the same shared pages. We use execution-driven simulation of real parallel applications to evaluate the effectiveness of our CSTallocator. Our observations show that by using CSTallocator a considerable amount of false sharing misses can be additionally reduced in comparison with the existing techniques.

Image-based Water Level Measurement Method Adapting to Ruler's Surface Condition (목자판 표면 상태에 적응적인 영상 기반 수위 계측 기법)

  • Kim, Jae-Do;Han, Young-Joon;Hahn, Hern-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.67-76
    • /
    • 2010
  • This paper proposes a image-based water level measurement method, which adapt to the ruler's surface condition. When the surface of a ruler is deteriorated by mud, drifts, or strong light reflection, the proposed method judges the pollution of ruler by comparing distance between two levels: the first one is the end position of horizontal edge region which keeps the pattern of ruler's marking, and the second one is the position where the sharpest drop occurs in the histogram which is construct using image density based on the axis of image height. If the ruler is polluted, the water level is a position of local valley of the section having a maximum difference between the local peak and valley around the second level. If the ruler is not polluted, the water level is detected as the position having horizontal edges more than 30% of histogram's maximum value around the first level. The detected water level is converted to the actual water level by using the mapping table which is construct based on the making of ruler in the image. The proposed method is compared to the ultrasonic based method to evaluate its accuracy and efficiency on the real situation.

An Effect of Aggregation of Point Features to Areal Units on K-Index (점사상의 지역단위 집계가 K-지표에 미치는 영향)

  • Lee Byoung-Kil
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.24 no.1
    • /
    • pp.131-138
    • /
    • 2006
  • Recently, data gathering and algorithm developing are in progress for the GIS application using point feature. Several researches prove that verification of the spatial clustering and evaluation of inter-dependencies between event and control are possible. On the other hand, most of the point features as GIS data are gathered by indirect method, such as address geo-coding, rather than by direct method, such as field surveying. Futhermore, lots of statistics by administrative district based on the point features have no coordinates information of the points. In this study, calculating the K-index in GIS environment, to evaluate the effect of aggregation of raw data on K-index, K-indices estimated from raw data (parcel unit), topographically aggregated data (block unit), administratively aggregated data (administrative district unit) are compared and evaluated. As a result, point feature, highly clustered in local area, is largely distorted when aggregated administratively. But, the K-indices of topographically aggregated data is very similar to the K-indices of raw data.

Application Behavior-oriented Adaptive Remote Access Cache in Ring based NUMA System (링 구조 NUMA 시스템에서 적응형 다중 그레인 원격 캐쉬 설계)

  • 곽종욱;장성태;전주식
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.9
    • /
    • pp.461-476
    • /
    • 2003
  • Due to the implementation ease and alleviation of memory bottleneck effect, NUMA architecture has dominated in the multiprocessor systems for the past several years. However, because the NUMA system distributes memory in each node, frequent remote memory access is a key factor of performance degradation. Therefore, efficient design of RAC(Remote Access Cache) in NUMA system is critical for performance improvement. In this paper, we suggest Multi-Grain RAC which can adaptively control the RAC line size, with respect to each application behavior Then we simulate NUMA system with multi-grain RAC using MINT, event-driven memory hierarchy simulator. and analyze the performance results. At first, with profile-based determination method, we verify the optimal RAC line size for each application and, then, we compare and analyze the performance differences among NUMA systems with normal RAC, with optimal line size RAC, and with multi-grain RAC. The simulation shows that the worst case can be always avoided and results are very close to optimal case with any combination of application and RAC format.

Input Data Synchronization Scheme Based on Redundancy for IMA System (이중화 IMA 시스템의 입력 데이터 동기화 방안)

  • Park, Hong-Youl;Kim, Ki-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2891-2898
    • /
    • 2014
  • It is feasible to develop a fault tolerant system through module level redundancy on the Integrated Modular Avionics (IMA). However, its great implementation complexity is one of important challenges when asynchronous hardware environment is naturally assumed. To solve this problem, Physically Asynchronous Logically Synchronous (PALS) on IMA has been proposed. But, it has adaptation problem by not addressing specific architecture for IMA system. In the paper, we propose how to synchronize the input data on the IMA system under primary/secondary redundancy architecture by referring to existing PALS. In the proposed scheme, we introduce window frame by considering rate monotonic scheduling and analyze the adequate the synchronization time. Finally, we verify the feasibility of the proposed design pattern through the systematic experiments.