• 제목/요약/키워드: Call Control

Search Result 680, Processing Time 0.027 seconds

ATL 1.0: An Artificial Intelligence Technology Level Definition (ATL 1.0: 인공지능 기술 수준 정의)

  • Min, O.G.;Kim, Y.K.;Park, J.Y.;Park, J.G.;Kim, J.Y.;Lee, Y.K.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.3
    • /
    • pp.1-8
    • /
    • 2020
  • Artificial-intelligence (AI) technology is used in a variety of fields, from robot cleaner motion control to call center counselors, AI speakers, and Mars exploration. Because the technology levels of all applications and services that utilize AI vary widely, it is not possible to view all applications using AI technology at the same level. Nevertheless, there have been no cases in which the level of AI technology was defined. Therefore, the Electronics and Telecommunications Research Institute (ETRI) Artificial Intelligence Research Laboratory has defined the levels of the main technical elements of AI from steps 1 to 6. In this report, the Artificial Intelligence Technology Level 1.0 (ATL 1.0) is presented. It was established by comprehensively referring to the AI technology prospects and technology roadmaps of major countries. It is hoped that it can be used as a measure for determining the levels of AI applications or services or as an indicator for establishing a technology roadmap.

Invader Detection System Using the Morphological Filtering and Difference Images Based on the Max-Valued Edge Detection Algorithm

  • Lee, Jae-Hyun;Kim, Sung-Shin;Kim, Jung-Min
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.36 no.5
    • /
    • pp.645-661
    • /
    • 2012
  • Recently, pirates are infesting on the sea and they have been hijacking the several vessels for example Samho Dream and Samho Jewelry of Korea. One of the items to reduce the risk is to adopt the invader detection system. If the pirates break in to the ship, the detection system can monitor the pirates and then call the security alarm. The crew can gain time to hide to the safe room and the report can be automatically sent to the control room to cope with the situation. For the invader detection, an unmanned observation system was proposed using the image detection algorithm that extracts the invader image from the recording image. To detect the motion area, the difference value was calculated between the current image and the prior image of the invader, and the 'AND' operator was used in calculated image and edge line. The image noise was reduced based on the morphology operation and then the image was transformed into morphological information. Finally, a neural network model was applied to recognize the invader. In the experimental results, it was confirmed that the proposed approach can improve the performance of the recognition in the invader monitoring system.

A new approach to structuring the process based on design structure matrix (DSM) (DSM 기반의 프로세스 구조화 방법론)

  • Seol, Hyeon-Ju;Kim, Chul-Hyun;Lee, Chang-Yong;Park, Yong-Tae
    • Journal of Korean Society for Quality Management
    • /
    • v.37 no.3
    • /
    • pp.39-53
    • /
    • 2009
  • This paper suggests a new process structuring method, which we call process modularization, for decomposing and grouping activities in a process. Above all, we propose the concept of a module that is a group of activities positioned on the same flow before and after control constructs. Since activities in a module are relatively strongly interrelated with one another, it is important to take into consideration of these together. A design structure matrix (DSM) is used to structure the process because it has a lot of advantages in process modeling and analysis. We developed two algorithms: the restricted topological sorting (RTS) algorithm for ordering activities and the module finding (MF) algorithm for detecting modules in a process, which utilize the DSM. The suggested approach enables a firm's manager to design and analyze the process effectively. We also developed a supporting tool to accelerate the progress of process modularization. The supporting tool aids the process manager in finding the module and understanding the process structure easily. An illustrative example is addressed to show operations of the suggested approach.

QoS-enabled Next Generation Local Area Network for IP-based Convergence Services (IP 기반 통합서비스를 위한 QoS 가능 차세대 LAN)

  • Lee, Kyou-Ho;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2166-2172
    • /
    • 2006
  • This paper presents a quality-of-service-enabled next generation local area network architecture which can provide efficiently convergence services over the Internet protocol. The basic concept of the architecture is to combine such three principle technologies as programmable switched network quality-of-service resource management and Internet protocol based network convergence. We discuss system entities and technologies development, which constitute the proposed network. The architecture of the network is then described. Implementation of systems verifies the proposed technologies. The network as a next generation local area network can provide quality-of-service-enabled real-time communication services as well as existing data traffic, and the open programmable interface can facilitates to adopt cost-effectively emerging new services or functionalities.

Effective Real-Time Information Control Algorithm Using Ad Hoc Relaying System for Car Navigation Systems (차량 항법 시스템 환경에서 Ad Hoc Relaying System을 이용한 효과적인 실시간 정보 제어 기법)

  • 변계섭;임성화;김재훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.346-348
    • /
    • 2002
  • 차량 항법 시스템(Car Navigation System)은 요즘 많은 발전을 거듭하여 차량 이용시 사용자가 가고자하는 목적지까지의 길을 쉽게 안내하고 있다. 이런 기술의 발전은 단순한 정적인 길 안내(Static Route Guidance) 뿐만 아니라. 동적인 길 안내(Dynamic Route Guidance)를 함으로써 자동차 운전자가 쉽고 빠른 길을 안내 받을 수 있게 되었다. 그러나 이러한 교통정보는 매우 변화가 심하므로 최초로 경로를 전송 받은 후 그 경로상에 교통정보가 변화하였다면, 이미 전송 받은 경로는 실시간으로 적극적으로 대응할 수 없고 실제 막히는 길로 안내할 수 있다. 목적지까지의 거리가 먼 경우 이런 현상이 더욱 심하게 나타날 수 있다. 이런 경우 운전자는 실제로는 막히는 길로 안내 받을 수 밖에 없다. 이런 문제점을 해결하기 위해 교통정보를 수집하는 기존의 시스템에 Ad Hoc 네트워킹이 가능한 시스템을 탑재한 교통정보 수집 차량(Probe Car)을 이용한다. 정보 수집 차량이 극심한 정체를 발견하면 근처를 지나는 경로를 가진 차량에게 이를 전달하여 새로운 경로를 다운받을 수 있도록 한다. 이런 방법은 Ad Hoc Relaying System〔l〕을 이용하여 가능하며, 센터에 수집되고 가공되는 시간을 최대한 줄일 수 있으며, 센터의 통신 오버헤드를 최소화할 수 있다. 또한 기지국에 호가 집중되어 call blocking이 발생함 경우에 이를 해결할 수 있다.

  • PDF

Improvement and Performance Evaluation of the Traffic Channel Management of the Radio Network Controller in IMT-2000 Network (IMT-2000 망에서 제어국의 트래픽 채널 관리 방식의 개선 및 성능 평가)

  • Ryu, Byung-Han;Ahn, Jee-Hwan;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.16 no.3
    • /
    • pp.311-321
    • /
    • 2003
  • We propose the improved channel assignment and management methods for an efficient use of traffic channel resource for supporting 12.2 Kbps, 64 Kbps, and 384 Kbps traffic with the different quality of service(QoS) in the radio network controller(RNC) in asynchronous IMT-2000 system. We consider two types of traffic channel block assignments for utilizing the traffic channel efficiently; the Completely Shared(CS) channel assignment and the Partially Dedicated and Partially Shared(PDPS) channel assignment. The former is that all traffic channel blocks are completely shared with all traffic types. The latter is that some traffic channel block is independently assigned to each traffic type and the other blocks are completely shared with some traffic type. We also propose the traffic channel management method which consists of the block and task management step, for efficiently assigning, releasing, and managing the channel resource. Finally, we evaluate the performance through various numerical examples when applying our proposed channel block assignment and resource management methods.

Implementation and Evaluation of Multi-level Secure Linux (다중등급 보안 리눅스 구현 및 시험평가)

  • 손형길;박태규;이금석
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.311-321
    • /
    • 2003
  • A current firewall or IDS (intrusion detection system) of the network level suffers from many vulnerabilities in internal computing servers. For a secure Linux implementation using system call hooking, this paper defines two requirements such as the multi-level security function of TCSEC B1 and a prevention of hacking attacks. This paper evaluates the secure Linux implemented in terms of the mandatory access control, anti-hacking and performance overhead, and thus shows the security, stability and availability of the multi-level secure Linux. At the kernel level this system protects various hacking attacks such as using Setuid programs, inserting back-door and via-attacks. The performance degradation is an average 1.18% less than other secure OS product.

Performance Analysis of Base Station Controller using Queueing Model for Mobile Communication Systems (이동통신 시스템에서 큐잉 모델을 이용한 제어국의 성능 분석)

  • Won, Jong-Kwon;Park, Woo-Goo;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.39-47
    • /
    • 2000
  • This paper is to propose an efficient and reliable control procedure of Base Station Controller of mobile communication system for bulk input messages which was delivered instantaneously. We divided the input messages that are processed by the base station controller of the mobile communication system into two things ; they are messages related to call connection and o&m(operation and maintenance). In addition, we analyzed the properties of the input messages and then performed computer simulation on each input message by using M/M/1/K queueing model in term of the following viewpoints : the loss probability of input messages, the average queue length, the utilization of process controller(server),the average waiting time in queue. And we compared the performance of the two input messages in the overload controlling which was caused by the congested input messages.

  • PDF

The Design of Master Station for Intelligent Distribution Automation System (배전지능화시스템 개발을 위한 중앙제어장치 설계)

  • Park, Shin-Yeol;Ha, Bok-Nam;Shin, Chang-Hoon;Kwon, Seong-Chul;Park, So-Young
    • Proceedings of the KIEE Conference
    • /
    • 2006.11a
    • /
    • pp.261-263
    • /
    • 2006
  • 전력 계통은 발전설비, 송전설비, 변전설비, 배전설비 등으로 크게 나눌 수 있다. 전력계통을 구성하는 이런 설비들을 원격 감시하고 제어하는 시스템을 전력자동화 시스템이라고 한다. 이런 전력자동화 시스템은 국내 전체 에너지의 수요, 공급, 수송을 제어하는 에너지 관리시스템(EMS : Energy Management System), 송전 및 변전설비의 감시제어를 담당하는 송변전소 감시제어 시스템(SCADA : Supervisory Control And Data Acquisition), 배전계통의 실비관리 및 운영을 담당하는 배전자동화시스템(DAS : Distribution Automation System), 수용가의 계량기를 원격으로 읽어오는 원격검침시스템 (AMR : Automatic Meter Reading) 통으로 구성되어 있다. 국내에서 운용중인 배전자동화 시스템은 배전선로에 설치되어 있는 개폐기만을 원격 감시 및 제어 하는 보편적인 시스템이다. 한편, 2005년도 전력IT 국가 전략과제로 수행하고 있는 배전지능화 시스템 개발 과제에서는 변전소부터 배전계통과 수용가까지의 모든 전력 설비에 대한 원격감시제어가 가능한 시스템을 배전지능화 시스템이라고 정의하고 이의 개발을 추진하고 있다. 본 논문에서는 ABB, SIEMENS, GE와 같은 국외의 배전 자동화 시스템들을 소개하고, 배전지능화 시스템에서 목표로 하고 있는 GIS 기반 위에서 고 저압 배전설비를 관리하고, SCADA, DAS, GIS(Geographic Information System), AMR, TCS(Trouble Call System) 등 배전지능화 시스템의 중앙제어장치가 갖추어야 하는 주요 기능들에 대해 기술하고자 한다.

  • PDF

Accomplishments of Rayleigh's Experimental Research: Improvement of Instruments and Enhancement of Precision (레일리의 실험 음향학 연구의 성과: 도구의 개선과 정밀성의 증진)

  • 구자현
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.2
    • /
    • pp.113-120
    • /
    • 2003
  • Rayleigh was an excellent experimenter as well as a theorist. Rayleigh improved Rijke's sounding device by heat and the singing flame into sources of pure tones. Above all, his making of the artificial bird whistle was a critical achievement in the improvement of experimental sound sources. This source made supersonic waves available in the laboratory and thus paved the way to confirmable observations of reflection, refraction, diffraction and interference of sound in the laboratory Furthermore, Rayleigh augmented the sensitivity of sensitive flames as detectors for sound wave. Besides, he devised a phonic wheel which could precisely control the angular velocity of some acoustical instruments and made the Rayleigh-disk that enabled experimenters to measure the absolute value of the sound intensity. These devices enhanced the exactness of acoustical experiments.