• Title/Summary/Keyword: And Location Environments

Search Result 775, Processing Time 0.032 seconds

A Cache Hoarding Method Using Collaborative Filtering in Mobile Computing Environments (모바일 컴퓨팅 환경에서 협업추천 모형을 이용한 캐시 적재 기법)

  • Jun, Sung-Hae;Jung, Sung-Won;Oh, Kyung-Whan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.6
    • /
    • pp.687-692
    • /
    • 2004
  • In this paper, we proposed an efficient cache hoarding method in mobile computing environments using collaborative filtering. This method is used for solving the difficult problem of mobile computing, which is the vacuum of information service depending on low bandwidth, long delay, and frequent network disconnection. Many previous researches have been studied a cache hoarding approach for solving these problems of mobile client. But, the research of history information of mobile client did not support all informative requests for mobile clients. In our research, collaborative filtering model using history information and location data of mobile client is proposed. This proposed model supports an efficient service of necessary items for client's requirement. For the performance evaluation of proposed model, we make an experiment of simulation data using SAS enterprise miner. According to objective evaluation using cache hit ratio, we show that our model has a good result.

An Adaptive Block Matching Algorithm Based on Temporal Correlations (시간적 상관성을 이용한 적응적 블록 정합 알고리즘)

  • Yoon, Hyo-Sun;Lee, Guee-Sang
    • The KIPS Transactions:PartB
    • /
    • v.9B no.2
    • /
    • pp.199-204
    • /
    • 2002
  • Since motion estimation and motion compensation methods remove the redundant data to employ the temporal redundancy in images, it plays an important role in digital video compression. Because of its high computational complexity, however, it is difficult to apply to high-resolution applications in real time environments. If we have information about the motion of an image block before the motion estimation, the location of a better starting point for the search of an exact motion vector can be determined to expedite the searching process. In this paper, we present an adaptive motion estimation approach bated on temporal correlations of consecutive image frames that defines the search pattern and determines the location of the initial search point adaptively. Through experiments, compared with DS(Diamond Search) algorithm, the proposed algorithm is about 0.1∼0.5(dB) better than DS in terms of PSNR(Peak Signal to Noise Ratio) and improves as high as 50% compared with DS in terms of average number of search point per motion vector estimation.

Analysis of Vegetation-Environment Telationships of Main Wild Vegetables on Short-term Income Forest Products, in Korea (단기소득임산물 자생지 주요 산채류 식생과 환경의 상관관계 분석)

  • Kim, Hyoun-Sook;Lee, Sang-Myong;Lee, Joongku
    • Korean Journal of Environment and Ecology
    • /
    • v.33 no.4
    • /
    • pp.447-452
    • /
    • 2019
  • This study was conducted in 2016-2017 to provide the basic ecological data needed to establish environmental conditions for the cultivation of wild vegetables. It used TWINSPAN to classify the vegetation structure of natural habitats of wild vegetable nationwide and DCCA ordination to analyze the correlation between the by community structure and environmental factors. We performed TWINSPAN on 100 taxa with high importance values in 91 plots of major habitats of wild vegetables. The vegetation was classified into Cirsium setidens and Synurus deltoides group, Ligularia fischeri and Hemerocallis fulva group, Adenophora divaricata var. manshurica group, Platycodon grandiflorum and Aster scaber group, Aralia elata and Pteridium aquilinum group, and Pimpinella brachycarpa and Osmunda japonica group communities. We then performed DCCA ordination of 11 communities classified by TWINSPAN and 11 environmental factors. The results showed that the altitude had the strongest correlation with the vegetation. The Cirsium setidens, Synurus deltoids, and Lifularia fischeri communities were distributed in areas with similar environmental factors such as high altitude, gentle slope, and nutrient. The Aralia elata and Osmunda japonica communities were distributed in the location environment with low altitude, pH, O.M, T-N, $Ca^{2+}$, and C.E.C. The Hemerocallis fulva community was distributed in the location environment with moderate northeastern and northwestern slope, low altitude and pH, and high $P_2O_5$, whereas the Adenophora divaricata var. manshurica community was distributed in the location environment with gentle southeastern and southwestern slope, high altitude and pH, and low $P_2O_5$, which was the opposite tendency of the location environment from Hemerocallis fulva community. The Platycodon grandiflorum community was distributed in the location environment with gentle southwestern slope, low altitude, pH, O.M, T-N, $P_2O_5$, $Ca^{2+}$, and C.E.C., and high $Mg^{2+}$. The Pteridium aquilinum community was distributed in the location environment with southwestern slope, low altitude, O.M, T-N, C.E.C, $P_2O_5$, $Ca^{2+}$, and $K^+$. The Aster scaber and Pimpinella brachycarpa communities were widely distributed in many plots with various location environments.

Bus-only Lane and Traveling Vehicle's License Plate Number Recognition for Realizing V2I in C-ITS Environments (C-ITS 환경에서 V2I 실현을 위한 버스 전용 차선 및 주행 차량 번호판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.87-104
    • /
    • 2015
  • Currently the IoT (Internet of Things) environments and related technologies are being developed rapidly through the networks for connecting many intelligent objects. The IoT is providing artificial intelligent services combined with context recognition based knowledge and communication methods between human and objects and objects to objects. With the help of IoT technology, many research works are being developed using the C-ITS (Cooperative Intelligent Transport System) which uses road infrastructure and traveling vehicles as traffic control infrastructures and resources for improving and increasing driver's convenience and safety through two way communication such as bus-only lane and license plate recognition and road accidents, works ahead reports, which are eventually for advancing traffic effectiveness. In this paper, a system for deciding whether the traveling vehicle is possible or not to drive on bus-only lane in highway is researched using the lane and number plate recognition on the road in C-ITS traffic infrastructure environments. The number plates of vehicles on the straight ahead and sides are identified after the location of bus-only lane is discovered through the lane recognition method. Research results and experimental outcomes are presented which are supposed to be used by traffic management infrastructure and controlling system in future.

The Experimental Analysis of Integrated (Name/Property) Dynamic Binding Service Model for Wide-Area Objects Computing (광역 객체 컴퓨팅에서 통합(이름/속성) 기반의 동적 바인딩 서비스 모델의 실험분석)

  • Jeong, Chang-Won;Joo, Su-Chong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.10
    • /
    • pp.746-758
    • /
    • 2006
  • Many objects existing on wide area environments have the replication characteristics according to how to categorize using their own names or properties. From the clients' requests, the existing naming and trading services have not supported with the binding service for replicated solver object with the same service type. For this reason, we present an integrated model that can support the selection of replicated object and dynamic binding services on wide-area computing environments. This model suggests provides not only location management of replicated objects but also active binding service which enables to select a least-loaded object on the system to keep the balance of load between systems. In this purpose, constructing both the service plan and model for support solver object's binding with replication property on wide area computing environments has been researched. In this paper, we showed the test environment and analyzed the performance evaluation of client/server binding procedures via integrated binding service in federation model and verified our model under the condition to see whether load balance can be applied to our model. For the performance evaluation of suggested wide area integrated binding service federation model, evaluated the integrated binding service of each domain and analyzed the performance evaluation of process for non-replication object's under federation model environment. Also, we analyzed the performance evaluation of the federation model between domains for wide area environment. From the execution results, we showed the federation model provides lowers search-cost on the physical tree structure of network.

IoT data processing techniques based on machine learning optimized for AIoT environments (AIoT 환경에 최적화된 머신러닝 기반의 IoT 데이터 처리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Industrial Convergence
    • /
    • v.20 no.3
    • /
    • pp.33-40
    • /
    • 2022
  • Recently, IoT-linked services have been used in various environments, and IoT and artificial intelligence technologies are being fused. However, since technologies that process IoT data stably are not fully supported, research is needed for this. In this paper, we propose a processing technique that can optimize IoT data after generating embedded vectors based on machine learning for IoT data. In the proposed technique, for processing efficiency, embedded vectorization is performed based on QR such as index of IoT data, collection location (binary values of X and Y axis coordinates), group index, type, and type. In addition, data generated by various IoT devices are integrated and managed so that load balancing can be performed in the IoT data collection process to asymmetrically link IoT data. The proposed technique processes IoT data to be orthogonalized based on hash so that IoT data can be asymmetrically grouped. In addition, interference between IoT data may be minimized because it is periodically generated and grouped according to IoT data types and characteristics. Future research plans to compare and evaluate proposed techniques in various environments that provide IoT services.

An MDA-Based Adaptive Context-Aware Service Using PARLAY X in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 PARLAY X를 이용하는 MDA기반의 적응성 있는 문맥인식 서비스)

  • Hong Sung June
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.457-464
    • /
    • 2005
  • This paper describes an Adaptive Context-aware Service (ACS) using Model Driven Architecture (MDA)-based Service Creation Environment (SCE) on PARLAY X based service delivery platform in ubiquitous computing environments. It can be expected that both the context-awareness and adaptation in ubiquitous computing environments will be deployed. But the existing context-aware middleware lacks in considering adaptation. Therefore, the object of this paper is to support the architecture and the Application Programming Interface (API) of the network service for both the context-awareness and adaptation in ubiquitous computing environment. ACS is to provide users with the adaptive network service to the changing context constraints as well as detecting the changing context. For instance, ACS can provide users with QoS in network according to the detected context, after detecting the context such as location and speed. The architecture of ACS is comprised of a Service Creation Environment (SCE), Adaptive Context Broker and PARLAY gateway. SCE is to use Context-based Constraint Language (CCL) for an expression of context-awareness and adaptation. Adaptive Context Broker is to make a role of the broker between SCE and PARLAY G/W. PARLAY G/W is to support API for PARLAY X-based service delivery platform.

Quasi real-time and continuous non-stationary strain estimation in bottom-fixed offshore structures by multimetric data fusion

  • Palanisamy, Rajendra P.;Jung, Byung-Jin;Sim, Sung-Han;Yi, Jin-Hak
    • Smart Structures and Systems
    • /
    • v.23 no.1
    • /
    • pp.61-69
    • /
    • 2019
  • Offshore structures are generally exposed to harsh environments such as strong tidal currents and wind loadings. Monitoring the structural soundness and integrity of offshore structures is crucial to prevent catastrophic collapses and to prolong their lifetime; however, it is intrinsically challenging because of the difficulties in accessing the critical structural members that are located under water for installing and repairing sensors and data acquisition systems. Virtual sensing technologies have the potential to alleviate such difficulties by estimating the unmeasured structural responses at the desired locations using other measured responses. Despite the usefulness of virtual sensing, its performance and applicability to the structural health monitoring of offshore structures have not been fully studied to date. This study investigates the use of virtual sensing of offshore structures. A Kalman filter based virtual sensing algorithm is developed to estimate responses at the location of interest. Further, this algorithm performs a multi-sensor data fusion to improve the estimation accuracy under non-stationary tidal loading. Numerical analysis and laboratory experiments are conducted to verify the performance of the virtual sensing strategy using a bottom-fixed offshore structural model. Numerical and experimental results show that the unmeasured responses can be reasonably recovered from the measured responses.

The content based standard data search technology under CALS integrated data environment (국방 CALS 통합 데이터 환경을 위한 내용 기반의 표준 데이터 검색 기술 개발)

  • Jeong, Seung-Uk;U, Hun-Sik
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.261-283
    • /
    • 2004
  • To build up the military strength based on information oriented armed forces, the Korean ministry of national defense (MND) promotes the defense CALS (Continuous Acquisition and Life cycle Support) initiative for the reductions of acquisition times, improvements of system qualities, and reductions of costs. These defense CALS activities are the major component of the underlying mid and long term defense digitization program and the ultimate goal of program is to bring a quick victory by providing real-time battlefield intelligence and the economical operations of the military. The concept of defense CALS is to automate the acquisition and disposition of defense systems throughout their life cycle. For implementing defense CALS, the technology for exchange and sharing CALS standard data that is created once and used many times should be considered. In order to develop an efficient CALS information exchange and sharing system, it is required to integrate distributed and heterogeneous data sources and provide systematic search tools for those data. In this study, we developed a content based search engine technology which is essential for the construction of integrated data environments. The developed technology provides the environment of sharing the CALS standard data such as SGML(Standard Generalized Markup Language) and STEP(Standard for The Exchange of Product model data). Utilizing this technology, users can find and access distributed and heterogeneous data sources without knowing its actual location.

  • PDF

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.