• Title/Summary/Keyword: 프레임 분류

Search Result 552, Processing Time 0.035 seconds

A Scheme to Reduce the Transmission Delay for Real-Time Applications in Sensor Networks (센서 네트워크에서 실시간 응용을 위한 전송 지연 개선 기법)

  • Bin, Bong-Uk;Lee, Jong-Hyup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1493-1499
    • /
    • 2007
  • Real-time applications in a wireless sensor network environment require real-time transmissions from sensing nodes to sink nodes. Existing congestion control mechanisms have treated congestion problems in sensor networks, but they only adjust the reporting frequency or the sending rate in intermediate nodes. They were not suitable for real-time applications from the transmission delays point of view. In this paper, we suggest a new mechanism that can reduce the transmission delay and can increase the throughput for real-time applications in sensor network. This mechanism classifies data on the real-time characteristics, processes the data maintaining the real-time characteristics prior to the other data such as the non real-time data or the data lost the real-time characteristics. A modified frame format is also proposed in order to apply the mechanism to IEEE 802.15.4 MAC layer. The simulation based on ns-2 is accomplished in order to verify the performance of the suggested scheme from transmission delay and throughput standpoints. The simulation results show that the proposed algorithm has a better performance specifically when It applies to the real-time applications in sensor networks.

Selection of Hydrologic Factors of NASA LIS for Water Hazrd Information Platform (수재해 정보 플랫폼에 활용 가능한 NASA LIS의 수문인자 선정)

  • PARK, Gwang-Ha;BAECK, Seung Hyub;CHAE, Hyo-Sok;HWANG, Eui-Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.471-471
    • /
    • 2017
  • 최근 기상 이변으로 인해 홍수, 가뭄 등과 같은 수재해가 빈번히 발생되고 있다. 이에 수재해예방 등의 안전 기술과 관련된 관심이 증가되고 있다. 수재해 예방을 위해서는 먼저 홍수, 가뭄 등과 같은 수재해 감시가 필요하며, 이를 위해 위성, 레이더 등으로 관측된 자료를 활용한 수문인자 정보는 매우 중요하다. 미국 NASA의 LIS(Land Information System)는 위성 및 지상관측 자료를 활용하여 홍수, 가뭄, 기상, 산사태, 농업 등의 정보를 생산할 수 있는 프레임워크이다. LIS는 크게 지표면 모델 및 자료동화를 위한 변수들의 전처리 과정(LDT), 지표면 모델을 활용한 분석 및 자료동화 과정(LDAS) 및 분석된 자료의 검보정(LVT) 과정으로 구성되어 있다. LIS에서 산출 가능한 인자는 Energy Balance, Water Balance, Surface/Subsurface State, Evaporation, Hydrologic, Cold Season Processes, Compared Data, Carbon 등 9개로 분류되며 약 78개의 인자를 산출한다. 홍수, 가뭄 등과 같은 수재해 감시를 위한 수문인자는 강수량, 증발산량, 토양수분, 지표면 온도 등을 비롯한 여러 가지 인자들이 필요하다. LIS는 주로 미국, 캐나다 등 평활한 지역에 활용되어 공간해상도는 약 10km(0.1deg) 이하로 자료를 산출한다. 산악 지형이 대부분인 한국 지형에 적용하기에는 자료의 정확성이 낮아 10km 이상의 공간해상도 자료가 필요하며, 한국형 수재해정보 플랫폼에서 홍수, 가뭄 등의 기초자료로 사용하기 위한 수문인자의 선정이 필요하다. 이에 본 연구에서 NASA LIS를 통해 산출 가능한 인자를 정리하고 한국형 수재해 정보플랫폼에 활용 가능한 수문인자의 항목을 조사하였다. 홍수, 가뭄 등 수재해 분석에 필요한 기초자료는 강우량, 유출량, 잠재적 증발산량, 식생의 증산량, 토양수분, 표면온도, 알베도 등의 수문인자이며, NASA LIS에서 이와 같은 수문인자 산출이 가능하다. NASA와 국제공동 연구중인 한국형 물순환분석 프레임워크(K-LIS(안)) 개발을 통해 한국 지형에 적합한 홍수 및 가뭄 등의 수재해 감시 평가 예측이 가능할 것이며, K-LIS에서 산출되는 고해상도의 수문인자들을 수재해 정보 웹 포털의 정보 제공 서비스를 통하여 손쉽게 접근 가능할 것으로 사료된다.

  • PDF

Performance Measurement Framework for Efficient Virtualization System Profiling (효율적인 가상화 시스템 프로파일링을 위한 성능측정 프레임워크)

  • Jang, Eun-Tae;Choi, Sang-Hoon;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.3
    • /
    • pp.31-39
    • /
    • 2019
  • Virtualization technology is one of the technologies that have been attracting attention as cloud computing spreads recently. When a system is constructed using virtualization technology, mutiple operation systems can be operated in a single host operating system, thereby facilitating efficient management of computing resources. As more and more operating systems are running on the hypervisor, it is important to measure the overall performance of the virtualization system and this is becoming an important technology. In this paper, we analyze the main functions of the existing profiling tools to measure the performance of the virtualization system, and measure and classify the profiling coverage that the monitoring tools can perform for events that may occur in the virtualization system. In addition, we have studied a framework that enables performance measurement by loading appropriate profiling tools into the guest system when performance measurement is required for the virtualization system according to the information received from the remote system performing the monitoring.

Face Detection Using Shapes and Colors in Various Backgrounds

  • Lee, Chang-Hyun;Lee, Hyun-Ji;Lee, Seung-Hyun;Oh, Joon-Taek;Park, Seung-Bo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.19-27
    • /
    • 2021
  • In this paper, we propose a method for detecting characters in images and detecting facial regions, which consists of two tasks. First, we separate two different characters to detect the face position of the characters in the frame. For fast detection, we use You Only Look Once (YOLO), which finds faces in the image in real time, to extract the location of the face and mark them as object detection boxes. Second, we present three image processing methods to detect accurate face area based on object detection boxes. Each method uses HSV values extracted from the region estimated by the detection figure to detect the face region of the characters, and changes the size and shape of the detection figure to compare the accuracy of each method. Each face detection method is compared and analyzed with comparative data and image processing data for reliability verification. As a result, we achieved the highest accuracy of 87% when using the split rectangular method among circular, rectangular, and split rectangular methods.

Design of Distributed Hadoop Full Stack Platform for Big Data Collection and Processing (빅데이터 수집 처리를 위한 분산 하둡 풀스택 플랫폼의 설계)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.7
    • /
    • pp.45-51
    • /
    • 2021
  • In accordance with the rapid non-face-to-face environment and mobile first strategy, the explosive increase and creation of many structured/unstructured data every year demands new decision making and services using big data in all fields. However, there have been few reference cases of using the Hadoop Ecosystem, which uses the rapidly increasing big data every year to collect and load big data into a standard platform that can be applied in a practical environment, and then store and process well-established big data in a relational database. Therefore, in this study, after collecting unstructured data searched by keywords from social network services based on Hadoop 2.0 through three virtual machine servers in the Spring Framework environment, the collected unstructured data is loaded into Hadoop Distributed File System and HBase based on the loaded unstructured data, it was designed and implemented to store standardized big data in a relational database using a morpheme analyzer. In the future, research on clustering and classification and analysis using machine learning using Hive or Mahout for deep data analysis should be continued.

Analysis of Seafarers' Behavioral Error on Collision Accidents (충돌사고에 대한 해기사의 행동오류 분석)

  • Yim, Jeong-Bin
    • Journal of Navigation and Port Research
    • /
    • v.43 no.4
    • /
    • pp.237-242
    • /
    • 2019
  • Behavioral errors of the seafarers are one of the major causes of collisions and are usually corrected through education and training. To correct this behavioral error, the structure in which the behavioral error occurs needs to be identified and analyzed. For this purpose, behavior observation data were obtained through ship maneuvering simulation for collision encounters. The 9-state behavior classification frame proposed by Reason was used for the behavior observation and 50 university students were involved in the experiment. Behavioral analysis used the behavioral model of collision avoidance success and failure, which was developed from the 9-state Left-to-Right Hidden Markov modeling technique. As a result of the experiment, the difference between behaviors of success and failure of collision avoidance was clearly identified, and the linkage between 9-state behaviors, required to prevent collision, was derived.

Detection of Frame Deletion Using Convolutional Neural Network (CNN 기반 동영상의 프레임 삭제 검출 기법)

  • Hong, Jin Hyung;Yang, Yoonmo;Oh, Byung Tae
    • Journal of Broadcast Engineering
    • /
    • v.23 no.6
    • /
    • pp.886-895
    • /
    • 2018
  • In this paper, we introduce a technique to detect the video forgery by using the regularity that occurs in the video compression process. The proposed method uses the hierarchical regularity lost by the video double compression and the frame deletion. In order to extract such irregularities, the depth information of CU and TU, which are basic units of HEVC, is used. For improving performance, we make a depth map of CU and TU using local information, and then create input data by grouping them in GoP units. We made a decision whether or not the video is double-compressed and forged by using a general three-dimensional convolutional neural network. Experimental results show that it is more effective to detect whether or not the video is forged compared with the results using the existing machine learning algorithm.

A Standardized BIM Framework for Supporting Life-cycle Business Process for Port & Harbour Facilities (항만시설의 생애주기 업무 지원을 위한 BIM 표준 프레임워크 구축)

  • Moon, Hyoun-Seok;Won, Ji-Sun;Shin, Jae-Young
    • Journal of KIBIM
    • /
    • v.8 no.4
    • /
    • pp.49-59
    • /
    • 2018
  • Recently, the application of BIM for port & harbour facilities has been increasing, as it is widely applied to the infrastructure field both at domestic and abroad. However, the port and harbour projects still have very poor facilities information management system and the application level of BIM is very low compared to other facilities. Even if BIM is applied for those project, it is very difficult to determine in advance what information is needed without an accurate understanding of the business process. The purpose of this study is to develop a BIM framework for port & harbour facilities and to examine its applicability. To do this, we structured the classification of the port & harbour facilities and constructed object-based classification system based on ISO12006-3 standard. We also derived the BIM framework requirements from the viewpoint of process, standard, interface, and information, and confirmed the linkage of the BIM object classification system in the framework item. The applicability of the BIM framework for inspection process cases of port & harbour was examined. Accordingly, this study can solve requirement setting method, which is the non - procedural and non - systematic project information, in the BIM application process of the port & harbour project with the BIM framework. In addition, the framework is expected to be integrated into the system to play a key role in the selection of project objectives, and the ability to clearly identify the information requirements required by the BIM manager to perform the project.

An Automatically Extracting Formal Information from Unstructured Security Intelligence Report (비정형 Security Intelligence Report의 정형 정보 자동 추출)

  • Hur, Yuna;Lee, Chanhee;Kim, Gyeongmin;Jo, Jaechoon;Lim, Heuiseok
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.233-240
    • /
    • 2019
  • In order to predict and respond to cyber attacks, a number of security companies quickly identify the methods, types and characteristics of attack techniques and are publishing Security Intelligence Reports(SIRs) on them. However, the SIRs distributed by each company are huge and unstructured. In this paper, we propose a framework that uses five analytic techniques to formulate a report and extract key information in order to reduce the time required to extract information on large unstructured SIRs efficiently. Since the SIRs data do not have the correct answer label, we propose four analysis techniques, Keyword Extraction, Topic Modeling, Summarization, and Document Similarity, through Unsupervised Learning. Finally, has built the data to extract threat information from SIRs, analysis applies to the Named Entity Recognition (NER) technology to recognize the words belonging to the IP, Domain/URL, Hash, Malware and determine if the word belongs to which type We propose a framework that applies a total of five analysis techniques, including technology.

A Study on the Customer Experience Design through analyzing Smart Hotels in China (중국 스마트 호텔의 사례 연구를 통한 사용자 경험 연구)

  • Luo, Xuan;Pan, Yonghwan
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.115-124
    • /
    • 2021
  • The outbreak of covid-19 has brought the characteristics and advantages of non-contact services to increased prominence, and the development of smart hotels"has accelerated. This study aims to identify, categorize and define the smart service experience at different touch points of the customer experience. The concept and characteristics of the smart hotel were examined based on existing research and literature. An analytical framework was designed using smart experience factors and customer touch points of smart hotels. Selected Chinese smart hotels were then examined under this framework. The case analysis results show that the customer experience design of smart hotels has developed to different degrees, in terms of interactivity, personalization, accessibility, information and privacy security. Based on the above findings, this article suggests that the design of smart hotels should use integrated data to further enhance personalized service experience.