• Title/Summary/Keyword: 통신장애

Search Result 898, Processing Time 0.025 seconds

Correction of Missing Feature Points for 3D Modeling from 2D object images (2차원 객체 영상의 3차원 모델링을 위한 손실 특징점 보정)

  • Koh, Sung-shik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2844-2851
    • /
    • 2015
  • How to recover from the multiple 2D images into 3D object has been widely studied in the field of computer vision. In order to improve the accuracy of the recovered 3D shape, it is more important that noise must be minimized and the number of image frames must be guaranteed. However, potential noise is implied when tracking feature points. And the number of image frames which is consisted of an observation matrix usually decrease because of tracking failure, occlusions, or low image resolution, and so on. Therefore, it is obviously essential that the number of image frames must be secured by recovering the missing feature points under noise. Thus, we propose the analytic approach which can control directly the error distance and orientation of missing feature point by the geometrical properties under noise distribution. The superiority of proposed method is demonstrated through experimental results for synthetic and real object.

Business Continuity and Data Backup in Cloud Computing Service and Architecture Study for Data Availability Zone (비즈니스 연속성을 위한 클라우드 컴퓨팅 서비스에서의 데이터 백업과 데이터 가용영역 아키텍쳐 연구)

  • Park, Young-ho;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2305-2309
    • /
    • 2016
  • Cloud Computing Service should support efficiency and stability. United States of America, for example, provides FedRAMP (Federal Risk and Authorization Management Program) accreditation to certify cloud computing service and hence growth of computing service industry is giving benefits of cost reduction and efficiency to companies. However, the use of computing service brings more risk than ever. Because cloud computing holds all the data of multiple companies, problems such as hacking bring out control loss of service and as a result total data of companies can be lost. Unfortunately, cloud computing certification programs do not have any good solutions for this data loss and companies may lose all the important data without any proper data backup. This paper studies such problems in terms of backup problem and provides Data Availability Zone solution for recovery and safe saving of data so that computing service can offer better efficiency and stability.

Design of a Smart Pillow for Sleep Quality Measurement using Accelerometer (가속도계를 이용한 수면 품질 측정을 위한 스마트 베개 설계)

  • Suwandi, Endang;Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.603-610
    • /
    • 2020
  • The sleep measurement system is important to detect sleep disturbances as early as possible to be diagnosed and treat the diseases quickly. This paper presents design of system to measure the quality of sleep by using nine accelerometer sensors embedded in the pillow to detect the acceleration of limb movement, e.g. head movements. The participants were asked to sleep using a smart pillow for five days. While sleeping, participants are recorded using a camera on a computer. After awakening, participants were asked to fill out a post-sleep questionnaire. Spearman's correlation was performed to test the correlation of gross body movement per minute rate with post-sleep questionnaire questions. Finally, the seven score of sleep quality were tested with gross body movement per minute rate. The result is the higher gross body movement per minute during sleep represented lower sleep quality.

Network-Based Partially-Distributed Mobility Management Mechanism and Performance Evaluation (망기반 부분분산형 이동성 관리 메커니즘 및 성능분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.75-84
    • /
    • 2014
  • In order to solve the problems such as overload, single point of failure, non-optimized data path, and network scalability in conventional central mobility management protocols, distributed mobility management schemes have been continually studied in and around the IETF. In this paper, a network-based partially-distributed mobility management mechanism, pDMMv6, is suggested and the performance comparison with traditional protocols such as PMIPv6 and MIPv6 is made through simulation under the various user traffic environment. The simulation results include UDP packet delivery ratio, end-to-end packet delay, binding delay for registration signaling, CPU utilization in each node, and response delays in several server-client TCP applications such as web browsing, e-mail, telnet remote login, FTP file up/down-load, and database access.

A Study on Elementary School Students' Current State on Harmful Information on the Internet and Educational Plan (인터넷 유해정보에 대한 초등학생 실태 및 교육적 보호방안 연구)

  • Lee, Jae-Woon;Kim, Seong-Sik
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.3
    • /
    • pp.329-337
    • /
    • 2007
  • The rapid growth in areas related to IT is bringing about benefits and dysfunctions of informatization and harmful information on the Internet. It exerts evil effects on adolescents' mind and hampers their development of personality. The present study purposed to analyze the state on harmful information on the Internet, and to propose various educational plans for elementary school students. For these purposes, we analyzed the current state of harmful information by reviewing various literatures and previous researches, suggested the definition and types of harmful information based on previous researches in this study. In addition, we analyzed the state on harmful information of elementary school students by making a comparative analysis various researches about the state of harmful information; and based on this, various educational protective plans were suggested for elementary school students, teachers and parents. The proposed educational plan can be used for organizing education curricula of IT ethics, education programs for teachers and parents.

  • PDF

Segmentation and 3-Dimensional Reconstruction of Liver using MeVisLab (MeVisLab을 이용한 간 영역 분할 및 3차원 재구성)

  • Shin, Min-Jun;Kim, Do-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1765-1772
    • /
    • 2012
  • Success rate of transplantation of body organs improved due to development of medical equipment and diagnostic technology. In particular, a liver transplant due to liver dysfunction has increased. With the development of image processing and analysis to obtain the volume for liver transplantation have increased the accuracy and efficiency. In this thesis, we try to reconstruct the regions of the liver within three dimensional images using the mevislab tool, which is effective in quick comparison and analysis of various algorithms, and in expedient development of prototypes. Liver is divided by applying threshold values and region growing method to the original image, and by removing noise and unnecessary entities through morphology and region filling, and setting of areas of interest. It is deemed that high temporal efficiency, and presentation of diverse range of comparison and analysis module application methods through usage of MeVisLab would make contribution towards expanding of baseline of medical image processing researches.

Design of the Mobile Aptitude Test System for People with Disabilities (장애인 직업평가를 위한 모바일 적성검사 시스템의 설계)

  • Ban, Chae-Hoon;Park, Hye-Jeon;Cho, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.248-251
    • /
    • 2011
  • Vocational rehabilitation is defined as a process which helps people with disabilities to maintain life of non-disabled people and vocational assessment is a part of it. Traditionally, vocational assessment is performed through using of assessment tools or vocational counseling, but assessment tools are very expensive and we should move to the facilities for the disabled. It is very efficient to apply vocational assessment to people with disabilities using the smart phones which users are expected to surpass ten million in 2011, because it enables them to access anytime and anywhere. In this paper, we design and implement the mobile aptitude test system on android smart phone OS for people with disabilities. We develop the mobile aptitude test system using the Holland Test which is the assessment tool of career guidance and counseling.

  • PDF

Discrimination system using weight distribution patten (체중 분포 패턴을 이용한 자세 판별 시스템)

  • Kim, Hyeon-Woo;Ahn, Byeung-Gu;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.374-375
    • /
    • 2015
  • Modern people is generated as musculoskeletal diseases due to incorrect posture and habit. In the case of persistent abnormal posture outbreak inconvenient to musculoskeletal diseases in daily life. musculoskeletal diseases, which began as fatigue, pain, sensory paralysis, convulsions are developed symptoms of movement disorders, depression, deformities, etc. In this paper, the unrestrained abnormal posture and habit of occurring in the seat life, have implemented a system which can be determined in less unconscious way. By placing eight pressure sensors in the seat part, determines the posture over the distribution of the weight, it is possible to determine one normal posture and eight abnormal posture that occurs frequently in daily life. To evaluate the performance of the implemented system, the attitude determination experiment was performed. The results confirmed the high performance of 97%.

  • PDF

Resource Share Mechanism for the Balanced Backcup Path Establishment in Optical Networks (광 통신망에서 보호 패스 설정을 위한 분산 자원 공유 메카니즘)

  • Park Hyeon;Lee Dong-Hun;Yae Byung-Ho;Kim Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12A
    • /
    • pp.1111-1119
    • /
    • 2005
  • A single fiber cut can potentially influence a total of 1.6 Tbps of traffic and is surprisingly frequent and results in significant loss of traffic. The survivability as we as the resource utilization of the connection in optical networks is important. Existing protection mechanisms to rapidly recover the failures allocate the backup path just SRLG-disjointed with working path. Those did not consider the unbalanced resource share of backup paths. The backup paths can be centralized on the specific link so that the idle resource is not used. As a result, as those do not efficiently use the resource the whole resource utilization is not so good. So we propose the mechanism to enhance the resources utilization as settling down the unbalanced resource share. Our purpose is to improve the link utilization as distributing the maximum link load.

Modeling and Network Simulator Implementation for analyzing Slammer Worm Propagation Process (슬래머 웜 전파과정 분석을 위한 네트워크 모델링 및 시뮬레이터 구현)

  • Lim, Jae-Myung;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we present a simulation model of Slammer worm propagation process which caused serious disruptions on Internet in the you of 2003 and analyze the process of Slammer by using NS-2. Recently introduced NS-2 modeling called "Detailed Network-Abstract Network Model" had enabled packet level analysis. However, it had deficiency of accommodating only small sized network. By extending the NS-2 DN-AN model to AN-AN model (Abstract Network-Abstract Network model), it is effectively simulated that the whole process from the initial infection to the total network congestion on hourly basis not only for the Korean network but also for the rest of the world networks. Furthermore, the progress of the propagation from Korean network to the other country was also simulated through the AN-AN model. 8,848 hosts in Korean network were infected in 290 second and 66,152 overseas hosts were infected in 308 second. Moreover, the scanning traffics of the worm at the Korean international gateway saturated the total bandwidth in 154 seconds for the inbound traffic and in 135 seconds for the outbound one.