• Title/Summary/Keyword: Application deployment

Search Result 303, Processing Time 0.025 seconds

Trend of AI Neuromorphic Semiconductor Technology (인공지능 뉴로모픽 반도체 기술 동향)

  • Oh, K.I.;Kim, S.E.;Bae, Y.H.;Park, K.H.;Kwon, Y.S.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.3
    • /
    • pp.76-84
    • /
    • 2020
  • Neuromorphic hardware refers to brain-inspired computers or components that model an artificial neural network comprising densely connected parallel neurons and synapses. The major element in the widespread deployment of neural networks in embedded devices are efficient architecture for neuromorphic hardware with regard to performance, power consumption, and chip area. Spiking neural networks (SiNNs) are brain-inspired in which the communication among neurons is modeled in the form of spikes. Owing to brainlike operating modes, SNNs can be power efficient. However, issues still exist with research and actual application of SNNs. In this issue, we focus on the technology development cases and market trends of two typical tracks, which are listed above, from the point of view of artificial intelligence neuromorphic circuits and subsequently describe their future development prospects.

A DESIGN OF INTERSECTION COLLISION AVOIDANCE SYSTEM BASED ON UBIQUITOUS SENSOR NETWORKS

  • Kim, Min-Soo;Lee, Eun-Kyu;Jang, Byung-Tae
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.749-752
    • /
    • 2005
  • In this paper, we introduce an Intersection Collision Avoidance (ICA) system as a convergence example of Telematics and USN technology and show several requirements for the ICA system. Also, we propose a system design that satisfies the requirements of reliable vehicular data acquisition, real-time data transmission, and effective intersection collision prediction. The ICA system consists of vehicles, sensor nodes and a base station that can provide drivers with a reliable ICA service. Then, we propose several technological solutions needed when implementing the ICA system. Those are about sensor nodes deployment, vehicular information transmission, vehicular location data acquisition, and intersection collision prediction methods. We expect this system will be a good case study applied to real Telematics application based on USN technology.

  • PDF

Data Mining in Marketing: Framework and Application to Supply Chain Management

  • Kim, Steven H.;Min, Sung-Hwan
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.03a
    • /
    • pp.125-133
    • /
    • 1999
  • The objective of knowledge discovery and data mining lies in the generation of useful insights from a store of data. This paper presents a framework for knowledge mining to provide a systematic approach to the selection and deployment of tools for automated learning. Every methodology has its strengths and limitations. Consequently, a multistrategy approach may be required to take advantage of the strengths of disparate technique while circumventing their individual limitations. For concreteness, the general framework for data mining in marketing is examined in the context of developing agents for optimizing a supply chain network.

  • PDF

Pedestrian Detection using HOG Feature and Multi-Frame Operation (HOG 특징과 다중 프레임 연산을 이용한 보행자 탐지)

  • Seo, Chang-jin;Ji, Hong-il
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.64 no.3
    • /
    • pp.193-198
    • /
    • 2015
  • A large number of vision applications rely on matching keypoints across images. Pedestrian detection is under constant pressure to increase both its quality and speed. Such progress allows for new application. A higher speed enables its inclusion into large systems with extensive subsequent processing, and its deployment in computationally constrained scenarios. In this paper, we focus on improving the speed of pedestrian detection using HOG(histogram of oriented gradient) and multi frame operation which is robust to illumination changes in cluttering images. The result of our simulation indicates that the detection rate and speed of the proposed method is much faster than that of conventional HOG and differential images.

A Study on Multi Target Tracking using HOG and Kalman Filter (HOG와 칼만필터를 이용한 다중 표적 추적에 관한 연구)

  • Seo, Chang-Jin
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.64 no.3
    • /
    • pp.187-192
    • /
    • 2015
  • Detecting human in images is a challenging task owing to their variable appearance and the wide range of poses the they can adopt. The first need is a robust feature set that allows the human form to be discriminated cleanly, even in cluttered background under difficult illumination. A large number of vision application rely on matching keypoints across images. These days, the deployment of vision algorithms on smart phones and embedded device with low memory and computation complexity has even upped the ante: the goal is to make descriptors faster compute, more compact while remaining robust scale, rotation and noise. In this paper we focus on improving the speed of pedestrian(walking person) detection using Histogram of Oriented Gradient(HOG) descriptors provide excellent performance and tracking using kalman filter.

A Study on the Framework of Mission Assurance for SE (시스템엔지니어링 강화를 위한 임무보증 Framework 연구)

  • Kim, Kwang Hae;Cho, Chul hoon;Ko, Jeong Hwan;Chung, Eui Seung
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.10 no.2
    • /
    • pp.89-95
    • /
    • 2014
  • In recent years, the United States have been several major failures of launch. As a result of these failures, activity of mission assurance valued. Mission assurance is defined as the application of systems engineering process towards the goal of achieving mission success. Therefore, mission assurance perform independent technical assessments throughout the concept and requirements definition, design, development, production, test, deployment, and operations phases. Space system program was emphasized the importance of the system engineering for that required huge cost and long term development. For this reason, independent review and verification of mission assurance is essential. Mission assurance gives us confidence to proceed with launch and best opportunity for mission success. In this study, framework of mission assurance is proposed by foreign case analysis.

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

Member Framework for Community Computing in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 커뮤니티 컴퓨팅을 위한 멤버 프레임워크)

  • Kim, Han-Wook;Song, Se-Heon;Lee, Jung-Tae;Kim, Min-Koo
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.796-801
    • /
    • 2007
  • 유비쿼터스 지능 공간(Ubiquitous Smart Space)에서 동적으로 발생하는 다양한 문제를 협업을 통하여 해결할 수 있는 방법론으로 제안된 커뮤니티 컴퓨팅 (Community Computing) 모델을 기반으로 하는 개발 도구(Community Computing Development Tool Kit : CDTK)를 사용하면 특정 문제를 해결할 수 있는 커뮤니티 컴퓨팅 어플리케이션이 생성된다. 이 커뮤니티 컴퓨팅 어플리케이션이 실제로 유비쿼터스 지능 공간에 존재하는 uT-entity에 이식되어 동작하기 위해서 uT-entity의 종류에 상관없이 커뮤니티 컴퓨팅 어플리케이션이 배포될 수 있는 환경을 필요로 한다. 본 연구에서는 CDTK를 이용하여 생성된 커뮤니티 컴퓨팅 어플리케이션이 uT-entity에 배포(Deployment)되어 각 uT-entity가 커뮤니티의 멤버로 참여하여 멤버간의 협업을 통해 목적(Goal)을 달성할 수 있도록 지원하는 어플리케이션 프레임워크인 멤버 프레임워크(Member Framework)를 제안하고, 이를 이클립스 리치클라이언트 플랫폼(Rich Client Platform) 기반의 플러그인(Plug-In)으로 설계하고자 한다.

  • PDF

A Case Study of Supporting Six Sigma Innovation Activity of Suppliers (협력업체의 6시그마 혁신활동 지원 사례)

  • Sung, Su-Gyeong;Kim, Joon-Seok;Byun, Jai-Hyun
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2010.04a
    • /
    • pp.483-490
    • /
    • 2010
  • For the success of total six sigma innovation, it is necessary to involve the suppliers In the six sigma activities. This paper presents the deployment and support system of six sigma innovation for suppliers, with the application to an aerospace production company. The process of project selection, project implementation, financial effect verification, benefit sharing is presented. This paper will benefit the companies which are going to enhance all the companies in the supply chain via six sigma activities.

  • PDF

A Conceptual Model of Knowledge Management System by using "4+1" views of UML (UML의 "4+1" 뷰를 이용한 지식 관리 시스템의 개념적 모델)

  • Sung Wook Ahn;Nam Yong Lee;Sung Yul Rhew
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.1
    • /
    • pp.123-134
    • /
    • 2000
  • Over the past several decades, several architectural approaches have been applied to develop Information Systems, The software architectural model has been recognized as one of the most important methods for improving productivity. Most conceptual models are difficult to understand and interpret at various system models. As a consequence, conceptual models of many Information Systems fail to represent, exploit, and apply to various aspects, which is needed for reducing development step of the architecture. In this paper, we will explain the architectural model as the 4+1 View of UML. This model integrates the Knowledge Management System into five views: the Logical View, the Process View, the Deployment View, Implementation View, and the Use-Case View. Moreover, this paper will not only provide information on the application of the software architectural model by stakeholders, but also ultimately improve productivity.

  • PDF