International journal of advanced smart convergence
/
v.11
no.1
/
pp.28-35
/
2022
This paper presents a performance evaluation of real-time Linux for industrial real-time platforms. On industrial platforms, multicore processors are popular due to their work distribution efficiency and cost-effectiveness. Multicore processors, however, are not designed for applications with real-time constraints, and their performance capabilities depend on their core configurations. In order to assess the feasibility of a multicore processor for real-time applications, we conduct a performance evaluation of a general processor and a low-power processor to provide an experimental environment of real-time Linux on both Xenomai and RT-preempt considering the multicore configuration. The real-time performance is evaluated through scheduling latency and in an environment with loads on the CPU, memory, and network to consider an actual situation. The results show a difference between a low-power and a general-purpose processor, but from developer's point of view, it shows that the low-power processor is a proper solution to accommodate low power situations.
The paper presents a control architecture aimed at implementing bandwidth optimization combined with call admission control (CAC) over a digital video broadcasting (DVB) return channel satellite terminal (RCST) under quality of service (QoS) constraints. The approach can be applied in all cases where traffic flows, coming from a terrestrial portion of the network, are merged together within a single DVB flow, which is then forwarded over the satellite channel. The paper introduces the architecture of data and control plane of the RCST at layer 2. The data plane is composed of a set of traffic buffers served with a given bandwidth. The control plane proposed in this paper includes a layer 2 resource manager (L2RM), which is structured into decision makers (DM), one for each traffic buffer of the data plane. Each DM contains a virtual queue, which exactly duplicates the corresponding traffic buffer and performs the actions to compute the minimum bandwidth need to assure the QoS constraints. After computing the minimum bandwidth through a given algorithm (in this view the paper reports some schemes taken in the literature which may be applied), each DM communicates this bandwidth value to the L2RM, which allocates bandwidth to traffic buffers at the data plane. Real bandwidth allocations are driven by the information provided by the DMs. Bandwidth control is linked to a CAC scheme, which uses current bandwidth allocations and peak bandwidth of the call entering the network to decide admission. The performance evaluation is dedicated to show the efficiency of the proposed combined bandwidth allocation and CAC.
As the modern society is called the narcissistic society, the narcissism is widespread in the personality of individuals and the society at large. In consideration of this side, this study explored for several characteristics of the narcissistic personality and the job stress, and explored for the relationships between the two things theoretically. The narcissism is an attempt to repair self-esteem weakened by the splitting anxiety, the lack and the pathological fusion of self-structure. The job stress is a factor that a characteristic of the job influenced on the behavioral and affective response of the person on the job directly or indirectly. This study selected organizational justices, organizational constraints, role conflict, role ambiguity, role overload, organizational climate, interpersonal relations and career development as factors of the job stress. This study viewed that the stress is made from an interaction between environmental stimulus and personal particular reaction by defining the stress as an interaction model of stimulus-response and personal reaction is caused by psychological adjustment process, personal differences. On this occasion, this study discussed that the narcissistic personality is easy to get stress and weak in the job stress with regarding the personality as a mediation variation of psychological process. As a result, the narcissists estimated themselves positively and their self-esteem is high, but they excessively showed a self biased cognitive and affective response about the negative feedback to protect themselves. Moreover, this positive estimate on themselves and high self-esteem was vulnerable and weak in the self threat. In this view, the narcissistic personality is easy to get more job stress such as organizational justices, organizational constraints, role conflict, role ambiguity, role overload, organizational climate, interpersonal relations and career development.
Journal of the Korean Institute of Intelligent Systems
/
v.22
no.3
/
pp.386-393
/
2012
Portfolio selection methods based on stochastic receding horizon approach, which were recently reported in the field of financial engineering, can explicitly consider the dynamic characteristics of wealth evolution and various constraints in the process of performing optimal portfolio selection. In view of the theoretical value, versatility, and effectiveness that receding horizon approach has achieved in many engineering problems, dynamic portfolio selection methods based on stochastic receding horizon optimization technique have the possibility of becoming an important breakthrough. This paper observes through theoretical investigations that the SDP(semi-definite program)-based portfolio selection procedure can be simplified, and has obtained meaningful performance on returns from simulation studies applying the simplified version to Korean financial markets.
Minor mergers leave behind long lived, but extremely faint and extended tidal features including tails, streams, loops and plumes. These act as a fossil record for the host galaxy's past interactions, allowing us to infer recent accretion histories and place constraints on the properties and nature of a galaxy's dark matter halo. However, shallow imaging or small homogeneous samples of past surveys have resulted in weak observational constraints on the role of galaxy mergers and interactions in galaxy assembly. The Rubin Observatory, which is optimised to deliver fast, wide field-of-view imaging, will enable deep and unbiased observations over the 18,000 square degrees of the Legacy Survey of Space and Time (LSST), resulting in samples of potentially of millions of objects undergoing tidal interactions. Using realistic mock images produced with state-of-the-art cosmological simulations we perform a comprehensive theoretical investigation of the extended diffuse light around galaxies and galaxy groups down to low stellar mass densities. We consider the nature, frequency and visibility of tidal features and debris across a range of environments and stellar masses as well as their reliability as an indicator of galaxy accretion histories. We consider how observational biases such as projection effects, the point-spread-function and survey depth may effect the proper characterisation and measurement of tidal features, finding that LSST will be capable of recovering much of the flux found in the outskirts of L* galaxies at redshifts beyond local volume. In our simulated sample, tidal features are ubiquitous In L* galaxies and remain common even at significantly lower masses (M*>10^10 Msun). The fraction of stellar mass found in tidal features increases towards higher masses, rising to 5-10% for the most massive objects in our sample (M*~10^11.5 Msun). Such objects frequently exhibit many distinct tidal features often with complex morphologies, becoming increasingly numerous with increased depth. The interpretation and characterisation of such features can vary significantly with orientation and imaging depth. Our findings demonstrate the importance of accounting for the biases that arise from projection effects and surface-brightness limits and suggest that, even after the LSST is complete, much of the discovery space in low surface-brightness Universe will remain to be explored.
Ensuring swift on-site access to fire engines is crucial in preserving the golden time and minimizing damage. However, various mobility constraints in alleyways hinder the timely entry of fire engines to the fire scene, significantly impairing their initial response capabilities. Therefore, this study analyzed the significant mobility constraints of fire engines, focusing on Seoul, which has many old town areas. By leveraging survey responses from firefighting experts and actual observations, this study quantitatively assessed the frequency and severity of mobility constraint factors affecting the disaster responses of fire engines. Survey results revealed a consistent set of top five factors regarding the frequency and disturbance level, including illegally parked cars, narrow paths, motorcycles, poles, and awnings/banners. A comparison with actual road-view images showed notable consistency between the survey and observational results regarding the appearance frequency of mobility constraint factors in vulnerable areas in Seoul. Furthermore, the study emphasized the importance of tailored management strategies for each mobility constraint factor, considering its characteristics, such as dynamic or static. The findings of this study can serve as foundational data for creating more detailed fire safety maps and advancing technologies that monitor the mobility of fire engines through efficient vision-based inference using CCTVs in the future.
In this paper, we propose a novel algorithm that generates multi-view images by using various image features obtained from the given stereoscopic images. In the proposed algorithm, we first create an intensity gradient saliency map from the given stereo images. And then we calculate a block-based optical flow that represents the relative movement(disparity) of each block with certain size between left and right images. And we also obtain the disparities of feature points that are extracted by SIFT(scale-invariant We then create a disparity saliency map by combining these extracted disparity features. Disparity saliency map is refined through the occlusion detection and removal of false disparities. Thirdly, we extract straight line segments in order to minimize the distortion of straight lines during the image warping. Finally, we generate multi-view images by grid mesh-based image warping algorithm. Extracted image features are used as constraints during grid mesh-based image warping. The experimental results show that the proposed algorithm performs better than the conventional DIBR algorithm in terms of visual quality.
To analyze mobility patterns, this study used three Constraint (Capability Constraint, Coupling Constraint, Authority Constraint) models which were proposed in Dr. Hagerstrand's Time-space theory. This paper shows that three constraint models have some effects upon mobility by age. In this study, Capability Constraint means a certain special constraint that is what we can't do during proceeding basic natural urges like sleep, fare, etc. Coupling constraint is a physical one. Each person limits the action range for staying on a special place in special time. For instance, students have to stay in school so that they have mobility constraints. Authority Constraint is a social one. When we use urban facilities or traffic, we may be controlled by mobility sphere by an agreement or a social position. It is social agreement that the opening hour of a store, the time table of mass-transportation and a social positional control that the personal income, the standard of education. In this study it has been in a process of determination of the cluster number that degree of influences a social constraint to mobility. Considering the mobility constraint of characteristics of space divides urban and rural, people in urban area have higher mobility rate than in rural area. Resuets of determination of the cluster, show similar mobility pattern. People in urban area are connected verity of mobility which related to urban space structures with determination of cluste-number. That is to say, mobility patterns can be changed by space charactcristics. Constraints by sex and age are also social constraints and they are influenced by mobility patterns. For instance, females at the age of twenties have similar mobility pattern to the same age male but they have sudden changes after thirty's age. Male entertains a similar pattern without restriction of age. That is to say, management by sex as a social constraint affects mobility. To establish more realistic traffie policy, mobility formation should be reflected to the space in a view of social-behavioral science. To embody this, some problems should be investigated as follows. 1. As a problem of methodology, if sufficient samples ensured, we could subdivide clusters and could open up a new method of analyzing the mobility clusters by using the neuro-network. 2. Extracting actions connected with mobility and finding life cycle which is classified by daily cluste-characteristics, suitable counterproposal could be presented to the traific policy.
Comic book readers have respectively different reading speed and this means that time in comics is translated by readers' view. The authors arrange panels and gutters to control time, but time recognition in comics depends on the readers and generally it is the readers' role. On the contrary, the phenomenon having occurred by infinite canvas varied the authority of timing. Infinite canvas can give the comic book authors more authority of controlling timing than the readers by intervening in readers' relative time as an agents and transforming their fictive time into absolute time. Following to the concept of "Agency" in games, agency is the power which satisfies the players by reemergence of their intentions. Since some of digital comics absorbed the properties of other media such as animation and sound, we can see that the reader's timing agency is shifted to the author's timing agency. The purpose of this study is to analyse this phenomenon and to remind that agency motivated by the balance between material constraints and formal constraints becomes a condition of readability of digital comics but excessive timing constraints given to the readers causes a decrease of the readers' timing agency. This also can be a considerable matter when we produce digital comics.
With the growth of the Internet, multimedia streaming becomes an important means to deliver video contents over the Internet and the amount of the streaming multimedia contents is also getting increased. However, it becomes difficult to guarantee the quality of service in real-time over the IP network environment with instantaneously varying bandwidth. In this paper, we propose an optimal adaptation framework for streaming contents over the Internet in the sense that the perceptual quality of the multi-angie content with multiple visual objects is maximized given the constraints such as available bandwidth and transcoding cost. In the multi-angle video service framework, the user can select his/her preferred alternate views among the given multiple video streams captured at different view angles for a same event. This enhanced experience often entails streaming problems in real-time over the network, such as instantaneous bandwidth changes in the Internet. In order to cope with this problem, we assume that multi-angle video contents are encoded at different bitrates and the appropriate video streams are then selected or transcoded for delivery to meet such bandwidth constraints. For the user selective consumption of the various bitstreams in the multi-angle video service, the bitstream in each angle can be encoded in various bitrate, and the user can select a sub-bitrstream in the given bitrstreams or transcode the corresponding content in order to deliver the optimally adapted video contents to the instantaneously changing network condition. Therefore, we define the transcoding cost which means the time taken for transcoding the video stream and formulate a unified optimization framework which maximizes the perceptual quality of the multiple video objects in the given constraints such as the transcoding cost and the network bandwidth. Finally, we present plenty of the experimental results to show the effectiveness of the proposed method.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.