• Title/Summary/Keyword: 통신량

Search Result 4,530, Processing Time 0.032 seconds

Comparisons of Growth and Yield Characters between Near-isogenic Lines with Dark and Pale Green Leaves in Rice (수도 농녹색엽과 담녹색엽 Near-isogenic 계통의 생장특성 및 수량형질 비교)

  • Park, Sun-Zik;Im, Byeung-Gi;Lee, Byun-Woo
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.31 no.2
    • /
    • pp.226-230
    • /
    • 1986
  • Two near-isogenic lines with dark and pale green leaves, derived from the F$\_$7/ generation of wxl26 cross were compared on photosynthetic capacity, growth parameters, grain yield and yield-related characters. Dark green-leaved lines contained much greater content of chlorophyll a and b than pale green-leaved ones, but chlorophyll a to b ratio showed no difference between them. The photosynthetic nte per unit leaf area was higher in dark green-leaved lines than in pale green-leaved ones in the flag leaves at heading stage, but that per unit chlorophyll content showed reversed result. The crop growth rate from transplanting to heading was consistantly higher in the dark green-leaved lines, resulting from their greater net assimilation rate. Dark green-leaved lines produced greater number of panicles and spikelets per hill, out yielding pale green-leaved lines, but ripened grain ratio and 1000-grain weight showed no differences between those lines.

  • PDF

Network Traffic Analysis System Based on Data Engineering Methodology (데이터 엔지니어링 방법론을 기반으로한 네트워크 트래픽 분석 시스템)

  • Han, Young-Shin;Kim, Tae-Kyu;Jung, Jason J.;Jung, Chan-Ki;Lee, Chil-Gee
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.1
    • /
    • pp.27-34
    • /
    • 2009
  • Currently network users, especially the number of internet users, increase rapidly. Also, high quality of service is required and this requirement results a sudden network traffic increment. As a result, an efficient management system for huge network traffic becomes an important issue. Ontology/data engineering based context awareness using the System Entity Structure (SES) concepts enables network administrators to access traffic data easily and efficiently. The network traffic analysis system, which is studied in this paper, is designed and implemented based on a model and simulation using data engineering methodology to be avaiable in evaluating large network traffic data. Extensible Markup Language (XML) is used for metadata language in this system. The information which is extracted from the network traffic analysis system could be modeled and simulated in Discrete Event Simulation (DEVS) methodology for further works such as post simulation evaluation, web services, and etc.

Implementation of IoT Application using Geofencing Technology for Mountain Management (산악 관리를 위한 지오펜싱 기술을 이용한 IoT 응용 구현)

  • Hyeok-jun Kweon;Eun-Gyu An;Hoon Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.3
    • /
    • pp.300-305
    • /
    • 2023
  • In this paper, we confirmed that an efficient sensor network can be established at a low cost by applying Geofencing technology to a LoRa-based sensor network and verified its effectiveness in disaster management such as forest fires. We detected changes through GPS, gyro sensors, and combustion detection sensors, and defined the validity size of the Geofencing cell accurately. We proposed a LoRa Payload Frame Structure that has a flexible size according to the size of the sensor information.

Development of Water Supply Technology Using Smart Rainwater Storage (스마트 빗물저류조 활용 용수공급 기술 개발)

  • Maeng, Seung Jin;Kim, Da Ye;Park, In Sung;Park, Hyung Keun;Seo, Sung Chul
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.336-336
    • /
    • 2022
  • 빗물자원의 대부분은 바다로 유입되어 소모되거나, 하수로 유입되어 불필요한 고도처리 공정이 진행되고, 하수처리장 용량에 과부하를 발생시키는 등 막대한 예산이 투입되고 있는 실정이다. 갈수기시 농가에서 용수를 확보하기 위한 용수 운반장치 등 기반구축이 쉽지 않으며, 인력 부족으로 정상적인 용수공급에 어려움을 겪고 있다. 이에 빗물자원을 용수로서 효율적으로 활용하기 위한 시스템의 구축이 필요하다. 본 연구는 빗물저류조에 스마트 관수제어 시스템을 적용한 것으로 지중에 설치된 토양수분 센서와 저류조 내부의 수위 센서에서 관측된 데이터를 토대로 자동으로 지중에 수분을 공급하는 시설이다. 지중에 수분이 부족할 경우 밸브를 열어 자동으로 펌프를 가동시켜 저류조 내부의 물을 지중으로 공급시키며 지중의 수분이 충분하거나 저류조 내부의 물이 부족해질 경우 밸브를 닫아 공급을 중단하도록 한다. 또한 저류조의 수위와 토양의 수분량, 펌프의 작동여부 등은 앱을 이용하여 실시간으로 확인이 가능하며, 스마트폰 앱을 이용한 수동조작 또한 가능하다. 본 기술은 집수, 저류, 공급, 통신, 제어, 센서 총 6종의 모듈로 구성되어 있으며, 사용자의 환경 및 예산의 따라 집수, 저류, 공급 모듈 등 맞춤형 제품 구성이 가능하도록 개발하였다. 저류조의 물공급을 관리, 제어하는 시스템으로 센서로부터 전송받은 데이터를 기준으로 펌프를 작동시켜 수분공급을 제어할 수 있으며 해당 기록을 서버에 저장하여 데이터의 통계를 구할 수 있도록 하였다. 사용자가 앱을 통하여 직접적인 제어 및 가동환경에 대한 설정을 할 수 있어 사용자가 직접 현장에 오지 않아도 토지의 현황과 저류조의 수위, 수분 공급상황 등을 직접 제어할 수 있도록 개발하였다.

  • PDF

Research on Data-Flow Optimization and Advanced Application Research on KREONET (국가과학기술연구망에서의 첨단연구 적용과 데이터흐름 최적화모델 연구)

  • Noh, Minki;Lee, Chankyun;Jang, Minseok;Seok, Woojin
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.1-11
    • /
    • 2019
  • The paradigm of science and technology and R&D system changes from the existing form of independent research to community research which transmits and stores large-capacity data generated from observation and experiment to the research site through a high-speed network. Network-dependent advanced research is improves form of collaboration, sharing, globalization. For this purpose, not only the integration of science and IT technology, but also the optimized network infrastructure and technology for real-time sharing of the enormous data is necessary. This paper explains the direction of change through the case of KREONET's network-dependent advanced research and analyzes the technology and network resources supported in each research field. Through this, we propose a network optimization model for each advanced research field with the main data flow and satisfy the network required performance by advanced applications on KREONET.

Research on Science DMZ scalability for the high performance research data networking (연구데이터의 고성능 네트워킹을 위한 Science DMZ 확장성 연구)

  • Lee, Chankyun;Jang, Minseok;Noh, Minki;Seok, Woojin
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.22-28
    • /
    • 2019
  • A Science DeMilitarized Zone (DMZ) is an optimized network technology tailored to research data nature. The Science DMZ guarantees end-to-end network performance by forming a closed research network without redundant networking and security devices for the authorized researchers. Data Transfer Node (DTN) is an essential component for the high performance and security of the Science DMZ, since only transfer functions of research data are allowed to the DTN without any security- and performance-threatening functions such as commercial internet service. Current Science DMZ requires per-user DTN server installation which turns out a scalability limitation of the networks in terms of management overhead, entry barrier of the user, and networks-wise CAPEX. In order to relax the aforementioned scalability issues, this paper suggests a centralized DTN design where end users in a group can share the centralized DTN. We evaluate the effectiveness of the suggested sharable DTN design by comparing CAPEX against to that of current design with respect to the diverse network load and the state-of-the-art computing machine.

A Study on the Inference of Detailed Protocol Structure in Protocol Reverse Engineering (상세한 프로토콜 구조를 추론하는 프로토콜 리버스 엔지니어링 방법에 대한 연구)

  • Chae, Byeong-Min;Moon, Ho-Won;Goo, Young-Hoon;Shim, Kyu-Seok;Lee, Min-Seob;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.42-51
    • /
    • 2019
  • Recently, the amount of internet traffic is increasing due to the increase in speed and capacity of the network environment, and protocol data is increasing due to mobile, IoT, application, and malicious behavior. Most of these private protocols are unknown in structure. For efficient network management and security, analysis of the structure of private protocols must be performed. Many protocol reverse engineering methodologies have been proposed for this purpose, but there are disadvantages to applying them. In this paper, we propose a methodology for inferring a detailed protocol structure based on network trace analysis by hierarchically combining CSP (Contiguous Sequential Pattern) and SP (Sequential Pattern) Algorithm. The proposed methodology is designed and implemented in a way that improves the preceeding study, A2PRE, We describe performance index for comparing methodologies and demonstrate the superiority of the proposed methodology through the example of HTTP, DNS protocol.

Low-power Filter Cache Design Technique for Multicore Processors (멀티 코어 프로세서를 위한 저전력 필터 캐쉬 설계 기법)

  • Park, Young-Jin;Kim, Jong-Myon;Kim, Cheol-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.9-16
    • /
    • 2009
  • Energy consumption as well as performance should be considered when designing up-to-date multicore processors. In this paper, we propose new design technique to reduce the energy consumption in the instruction cache for multicore processors by using modified filter cache. The filter cache has been recognized as one of the most energy-efficient design techniques for singlecore processors. The energy consumed in the instruction cache accounts for a significant portion of total processor energy consumption. Therefore, energy-aware instruction cache design techniques are essential to reduce the energy consumption in a multicore processor. The proposed technique reduces the energy consumption in the instruction cache for multicore processors by reducing the number of accesses to the level-1 instruction cache. We evaluate the proposed design using a simulation infrastructure based on SimpleScalar and CACTI. Simulation results show that the proposed architecture reduces the energy consumption in the instruction cache for multicore processors by up to 3.4% compared to the conventional filter cache architecture. Moreover, the proposed architecture shows better performance over the conventional filter cache architecture.

Multi-Region based Radial GCN algorithm for Human action Recognition (행동인식을 위한 다중 영역 기반 방사형 GCN 알고리즘)

  • Jang, Han Byul;Lee, Chil Woo
    • Smart Media Journal
    • /
    • v.11 no.1
    • /
    • pp.46-57
    • /
    • 2022
  • In this paper, multi-region based Radial Graph Convolutional Network (MRGCN) algorithm which can perform end-to-end action recognition using the optical flow and gradient of input image is described. Because this method does not use information of skeleton that is difficult to acquire and complicated to estimate, it can be used in general CCTV environment in which only video camera is used. The novelty of MRGCN is that it expresses the optical flow and gradient of the input image as directional histograms and then converts it into six feature vectors to reduce the amount of computational load and uses a newly developed radial type network model to hierarchically propagate the deformation and shape change of the human body in spatio-temporal space. Another important feature is that the data input areas are arranged being overlapped each other, so that information is not spatially disconnected among input nodes. As a result of performing MRGCN's action recognition performance evaluation experiment for 30 actions, it was possible to obtain Top-1 accuracy of 84.78%, which is superior to the existing GCN-based action recognition method using skeleton data as an input.

Efficient video matching method for illegal video detection (불법 동영상 검출을 위한 효율적인 동영상 정합 방법)

  • Choi, Minseok
    • Journal of Digital Convergence
    • /
    • v.20 no.1
    • /
    • pp.179-184
    • /
    • 2022
  • With the development of information and communication technology, the production and distribution of digital contents is rapidly increasing, and the distribution of illegally copied contents also increases, causing various problems. In order to prevent illegal distribution of contents, a DRM (Digital Rights Management)-based approach can be used, but in a situation where the contents are already copied and distributed, a method of searching and detecting the duplicated contents is required. In this paper, a duplication detection method based on the contents of video content is proposed. The proposed method divides the video into scene units using the visual rhythm extracted from the video, and hierarchically applies the playback time and color feature values of each divided scene to quickly and efficiently detect duplicate videos in a large database. Through experiments, it was shown that the proposed method can reliably detect various replication modifications.