• Title/Summary/Keyword: Convergence Map

Search Result 580, Processing Time 0.024 seconds

Mobile Vector Map Generalization Methods for Location Information Search

  • Choi, Jin-Oh
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.187-191
    • /
    • 2008
  • In the mobile environments for the vector map services, a map simplification work through the map generalization steps helps improve the readability of the map on a large scale. The generalization operations are various such as selection, aggregation, simplification, displacement, and so on, the formal operation algorithms have not been built yet. Because the algorithms require deep special knowledge and heuristic, which make it hard to automate the processes. This thesis proposes some map generalization algorithms specialized in mobile vector map services, based on previous works. This thesis will show the detail to adapt the approaches on the mobile environment, to display complex spatial objects efficiently on the mobile devices which have restriction on the resources.

Map Detection using Deep Learning

  • Oh, Byoung-Woo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.61-72
    • /
    • 2020
  • Recently, researches that are using deep learning technology in various fields are being conducted. The fields include geographic map processing. In this paper, I propose a method to infer where the map area included in the image is. The proposed method generates and learns images including a map, detects map areas from input images, extracts character strings belonging to those map areas, and converts the extracted character strings into coordinates through geocoding to infer the coordinates of the input image. Faster R-CNN was used for learning and map detection. In the experiment, the difference between the center coordinate of the map on the test image and the center coordinate of the detected map is calculated. The median value of the results of the experiment is 0.00158 for longitude and 0.00090 for latitude. In terms of distance, the difference is 141m in the east-west direction and 100m in the north-south direction.

THE N-TH PRETOPOLOGICAL MODIFICATION OF CONVERGENCE SPACES

  • Park, Sang-Ho
    • Communications of the Korean Mathematical Society
    • /
    • v.11 no.4
    • /
    • pp.1087-1094
    • /
    • 1996
  • In this paper, we introduce the notion of the n-th pretopological modification. Also, we find some properties which hold between convergence quotient maps and n-th pretopological modifications.

  • PDF

Construction Method of ECVAM using Land Cover Map and KOMPSAT-3A Image (토지피복지도와 KOMPSAT-3A위성영상을 활용한 환경성평가지도의 구축)

  • Kwon, Hee Sung;Song, Ah Ram;Jung, Se Jung;Lee, Won Hee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.5
    • /
    • pp.367-380
    • /
    • 2022
  • In this study, the periodic and simplified update and production way of the ECVAM (Environmental Conservation Value Assessment Map) was presented through the classification of environmental values using KOMPSAT-3A satellite imagery and land cover map. ECVAM is a map that evaluates the environmental value of the country in five stages based on 62 legal evaluation items and 8 environmental and ecological evaluation items, and is provided on two scales: 1:25000 and 1:5000. However, the 1:5000 scale environmental assessment map is being produced and serviced with a slow renewal cycle of one year due to various constraints such as the absence of reference materials and different production years. Therefore, in this study, one of the deep learning techniques, KOMPSAT-3A satellite image, SI (Spectral Indices), and land cover map were used to conduct this study to confirm the possibility of establishing an environmental assessment map. As a result, the accuracy was calculated to be 87.25% and 85.88%, respectively. Through the results of the study, it was possible to confirm the possibility of constructing an environmental assessment map using satellite imagery, optical index, and land cover classification.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

Vector Map Data compression based on Douglas Peucker Simplification Algorithm and Bin Classification (Douglas Peucker 근사화 알고리즘과 빈 분류 기반 벡터 맵 데이터 압축)

  • Park, Jin-Hyeok;Jang, Bong Joo;Kwon, Oh Jun;Jeong, Jae-Jin;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.298-311
    • /
    • 2015
  • Vector data represents a map by its coordinate and Raster data represents a map by its pixel. Since these data types have very large data size, data compression procedure is a compulsory process. This paper compare the results from three different methodologies; GIS (Geographic Information System) vector map data compression using DP(Douglas-Peucker) Simplification algorithm, vector data compression based on Bin classification and the combination between two previous methods. The results shows that the combination between the two methods have the best performance among the three tested methods. The proposed method can achieve 4-9% compression ratio while the other methods show a lower performance.

A Study on Humanity Convergence Map using space metaphor and POI (point of interest) of Big Data (빅데이터 중 POI와 공간 메타포를 활용한 인문 융합 지도 연구)

  • Lee, Won-Tae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.43-50
    • /
    • 2015
  • Google, Yahoo, Daum and Naver has the POI(point of interest) service. And POI on the map is expending to social commerce, SNS, social game and social shopping. At the same time the uses's position on the map is the starting point of the Humanities Story. That means our current position is the place for stories of tales, children's song, fictional characters, the film background, lyrics and the birth of great people. This study points out that service has the limited to cafe, restaurant and hospital, and suggests the Humanities fusion Map Service which is combined with the POI information.

Turbo Trellis Coded Modulation with Multiple Symbol Detection (다중심벌 검파를 사용한 터보 트렐리스 부호화 변조)

  • Kim Chong Il
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.2
    • /
    • pp.105-114
    • /
    • 2000
  • In this paper, we propose a bandwidth-efficient channel coding scheme using the turbo trellis-coded modulation with multiple symbol detection. The turbo code can achieve good bit error rates (BER) at low SNR. That comprises two binary component codes and an interleaver. TCM codes combine modulation and coding by optimizing the euclidean distance between codewords. This can be decoded with the Viterbi or the symbol-by- symbol MAP algorithm. But we present the MAP algorithm with branch metrics of the Euclidean distance of the first phase difference as well as the Lth phase difference. The study shows that the turbo trellis-coded modulation with multiple symbol detection can improve the BER performance at the same SNR.

  • PDF

A Watermarking Scheme for Shapefile-Based GIS Digital Map Using Polyline Perimeter Distribution

  • Huo, Xiao-Jiao;Lee, Suk-Hwan;Kwon, Seong-Geun;Moon, Kwan-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.595-606
    • /
    • 2011
  • This paper proposes a robust watermarking scheme for GIS digital map by using the geometric properties of polyline and polygon, which are the fundamental components in vector data structure. In the proposed scheme, we calculate the lengths and the perimeters of all polylines and polygons in a map and cluster them to a number of groups. Then we embed the binary watermark by changing the mean of lengths and perimeters in an embedding group. For improving the safety and robustness, we permute the binary watermark through PRNS(pseudo-random number sequence) processing and embed it repeatedly in a model. Experimental results verified that our scheme has a good invisibility, safety and robustness to various geometric attacks and also our scheme needs not the original map in the extracting process of watermark.

Evaluation of Utilization through Various Accuracy Analysis of Drone Photogrammetry (드론사진측량의 다양한 정확도 분석을 통한 활용성 평가)

  • Doo-Pyo Kim;Hye-Won Choi;Jae-Ha Kwak
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.1
    • /
    • pp.121-131
    • /
    • 2023
  • Although the utilization of drone photogrammetry that can generate spatial information using ultra-high-resolution images is increasing in the civil engineering and construction fields, analysis of areas that can be used is insufficient. Therefore, this study attempted to determine how far drone photogrammetry can be used in the civil engineering and construction fields by applying a detailed analysis method. The status map and cross-sectional map were actually vectorized using drone photogrammetry outcomes, compared and analyzed with the results acquired in the field, and the qualitative aspects of traffic safety facilities were analyzed to determine their usability. As a result, the accuracy of the plane position using drone photogrammetry was reliable, but the height accuracy was difficult to trust. Accordingly, although there is a possibility of preparing a status map, the use of it in areas requiring high accuracy such as cross-sectional plans was limited, and it is believed that it can be used in the construction management field where qualitative analysis is conducted.