• Title/Summary/Keyword: Core services

Search Result 1,033, Processing Time 0.031 seconds

Hierarchical Image Processing Method For Context-Awareness On Ubiquitous-Safety(U-Safety) (유비쿼터스 안전관리(U-Safety) 상에서의 상황인지를 위한 계층적 영상 처리 시스템)

  • Lim, Chul-Hoo;Song, Kang-Suk;Jeong, Moo-Il;Lee, Yong-Woog;Moon, SungMo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.553-557
    • /
    • 2009
  • USS(Ubiquitous Smart Space) give services, that fit in with customer's goal, by cognizing various situations that happens in a space and cooperating autonomously objects or services in a space. In USS, U-Safety is a system that cognizes more exact situations with multiple sensors in USS, deals with this and take proper actions. When men reason on situations objectively, it is most ideal that image data among collected data with used various sensors in U-Safety. A senter collects a lot of image data from image input devices equipped in various points and work a multiple situation cognition and inference that are based on this. So, senters spend many resources for processing massive data. This paper proposes hierarchical image processing method that does the first situation cognization in image input devices, blocks only points that situation cognization possibility is high among a total image, and transfers to senters. It improves the efficiency of smooth situation cognization by reducing resources that a senter spends on image processing. So, it reduces proportion of image data in U-Safety.

  • PDF

Traffic Engineering Based on Local States in Internet Protocol-Based Radio Access Networks

  • Barlow David A.;Vassiliou Vasos;Krasser Sven;Owen Henry L.;Grimminger Jochen;Huth Hans-Peter;Sokol Joachim
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.377-384
    • /
    • 2005
  • The purpose of this research is to develop and evaluate a traffic engineering architecture that uses local state information. This architecture is applied to an Internet protocol radio access network (RAN) that uses multi-protocol label switching (MPLS) and differentiated services to support mobile hosts. We assume mobility support is provided by a protocol such as the hierarchical mobile Internet protocol. The traffic engineering architecture is router based-meaning that routers on the edges of the network make the decisions onto which paths to place admitted traffic. We propose an algorithm that supports the architecture and uses local network state in order to function. The goal of the architecture is to provide an inexpensive and fast method to reduce network congestion while increasing the quality of service (QoS) level when compared to traditional routing and traffic engineering techniques. We use a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm. We use the network simulator ns-2 as the core of our simulation environment. Around this core we built a system of pre-simulation, during simulation, and post-processing software that enabled us to simulate our traffic engineering architecture with only very minimal changes to the core ns-2 software. Our simulation environment supports a number of different mobility scenarios and a mix of different types of traffic to evaluate our architecture and algorithm.

Implementation of Data Storage Media Control and Command(DSM-CC) Core User-to-User Interface for MPEG-2 Bit Stream Transport

  • Park, Seong-Jong;Kim, Yong-Han;Kim, Jae-Woo;Lee, Ho-Jang;Shim, Jae-Kyu;Kim, Jae-D.;Koh, Jong-Seong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06b
    • /
    • pp.79-84
    • /
    • 1998
  • This paper describes implementation of the core DSM-CC UU interface. It briefly describes the reference model for the DSM-CC and related standards that should be reviewed for the implementation. The Common Object Request Broker Architechture, Revision 2.0 (CORBA 2.0) is sued as a remote procedure call (RPC) scheme for the UU Interface. Entire system was implemented with C++ on Windows NT platforms. The implementation procedure has been decomposed ito two tasks. The first task is to implement the Naming Service for service navigation. The Naming Service is one of the CORBA Services that extend the core CORBA specification. A client GUI is implemented for easy navigation among various services. The second task is to construct multimedia server and client for a Video-on-Demand (VoD) system. MPEG-2 Transport Stream is transported via ATM AAL5 using the Windows Socket 2.2 ATM extension API. A GUI enables the user to navigate the service domain and select a program. After the selection the user can control the MPEG-2 stream with VCR-like buttons.

  • PDF

Affective Interaction Technologies for Human Care (휴먼 케어를 위한 초실감 감성 상호작용 기술)

  • Kim, J.S.;Park, C.J.;Lee, K.S.;Kim, M.;Yoo, W.Y.;Jee, H.K.;Jeong, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.43-53
    • /
    • 2021
  • Super-realistic content technology has recently attracted attention as a core of the "new normal" that can overcome the spatial constraints caused by pandemics. It is moreover the core that allows users in remote locations to meet and engage in various social, cultural, and economic activities based on a network. Content technology is rapidly spreading beyond the existing entertainment area to various industries as an innovative tool that can be used to overcome space-time constraints and improve the productivity of industrial sites, because reality and virtual reality are now super-connected with ultra-low latency. However, existing services such as teleconferencing and tele-collaboration do not provide a level of realism that replaces face-to-face services, and various technical requirements have been proposed to overcome this. The trends in core technologies such as XR twins, hyper-realistic reproduction, sensory interaction, and emotional recognition technology, which are necessary for interactive realistic content that leads to feelings, from reproduction to experience and emotion, are explained. In this article, our aim is to present the future of realistic content that enables human care and can even overcome psychological difficulties such as the "Corona blues".

Deriving a Strategy for Resolving the Inter-and Intra-generational Digital Divide based on the Continuous Core-periphery Network Model (연속형 중심-주변 네트워크 모형을 통한 세대 간 세대 내 디지털 격차 해소를 위한 전략 도출)

  • Yoo, In Jin;Ha, Sang Jip;Park, Do Hyung
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.115-146
    • /
    • 2022
  • Purpose The purpose of this study is to find meaningful insights using regression analysis to resolve the digital divide between generations. In the analysis process of this study, social network analysis was applied to approach it with a perspective differentiated from the existing statistical techniques. Design/methodology/approach This study used a social network analysis methodology that transforms and analyzes government-led survey data into relational data. First, the cross-sectional data were converted into relational data, and a continuous core-periphery model and multidimensional scaling method were applied. Afterwards, the relationship between various factors affecting the digital divide and the difference in influence were analyzed by generation. Findings According to the network analysis results, it can be seen that all generations commonly use 'information and news search' and 'living information service'. However, it can be seen that the centrally used services of each generation are clearly different from each other, and the degree of linkage between the services is also clearly different. In addition, it can be seen that the relationship between factors influencing the digital divide by generation is also different.

High Performance QoS Traffic Transmission Scheme for Real-Time Multimedia Services in Wireless Networks

  • Kang, Moonsik
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.3
    • /
    • pp.182-191
    • /
    • 2012
  • This paper proposes a high performance QoS (Quality of Service) traffic transmission scheme to provide real-time multimedia services in wireless networks. This scheme is based on both a traffic estimation of the mean rate and a header compression method by dividing this network model into two parts, core RTP/UDP/IP network and wireless access parts, using the IEEE 802.11 WLAN. The improvement achieved by the scheme means that it can be designed to include a means of provisioning the high performance QoS strategy according to the requirements of each particular traffic flow by adapting the header compression for real-time multimedia data. A performance evaluation was carried out to show the effectiveness of the proposed traffic transmission scheme.

  • PDF

OPTIMAL ROUTE DETERMINATION TECHNOLOGY BASED ON TRAJECTORY QUERYING MOVING OBJECT DATABASE

  • Min Kyoung-Wook;Kim Ju-Wan;Park Jong-Hyun
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.317-320
    • /
    • 2005
  • The LBS (Location-Based Services) are valuable information services combined the location of moving object with various contents such as map, POI (point of Interest), route and so on. The must general service of LBS is route determination service and its applicable parts are FMS (Fleet Management System), travel advisory system and mobile navigation system. The core function of route determination service is determination of optimal route from source to destination in various environments. The MODB (Moving Object Database) system, core part of LBS composition systems, is able to manage current or past location information of moving object and massive trajectory information stored in MODB is value-added data in CRM, ERP and data mining part. Also this past trajectory information can be helpful to determine optimal route. In this paper, we suggest methods to determine optimal route by querying past trajectory information in MODB system and verify the effectiveness of suggested method.

  • PDF

Detection and Recovery of Policy Conflicts in Policy-based Network Management Systems (정책기반 네트워크 관리 시스템의 정책 충돌 탐지 및 복구)

  • Lee, Kyu-Woong
    • Journal of Information Technology Services
    • /
    • v.6 no.2
    • /
    • pp.177-188
    • /
    • 2007
  • Policy-based Network Management (PBNM) has been presented as a paradigm for efficient and customizable management systems. The approach chosen is based on PBNM systems, which are a promising and novel approach to network management. These systems have the potential to improve the automation of network management processes. The Internet Engineering Task Force (IETF) has also used policy concepts and provided a framework to describe the concept as the Policy Core Information Model (PCIM) and its extensions. There are policy conflicts among the policies that are defined as the policy information model and they are not easily and effectively detected and resolved. In this paper, we present the brief description of PBNM and illustrate the concepts of policy core information model and its policy implementation for a network security. Especially we describe our framework for detecting and resolving the policy conflicts for network security.

An Approach for Error Detection in Ontologies Using Concept Lattices (개념격자를 이용한 온톨로지 오류검출기법)

  • Hwang, Suk-Hyung
    • Journal of Information Technology Services
    • /
    • v.7 no.3
    • /
    • pp.271-286
    • /
    • 2008
  • The core of the semantic web is ontology, which supports interoperability among semantic web applications and enables developer to reuse and share domain knowledge. It used a variety of fields such as Information Retrieval, E-commerce, Software Engineering, Artificial Intelligence and Bio-informatics. However, the reality is that various errors might be included in conceptual hierarchy when developing ontologies. Therefore, methodologies and supporting tools are essential to help the developer construct suitable ontologies for the given purposes and to detect and analyze errors in order to verify the inconsistency in the ontologies. In this paper we propose a new approach for ontology error detection based on the Concept Lattices of Formal Concept Analysis. By using the tool that we developed in this research, we can extract core elements from the source code of Ontology and then detect some structural errors based on the concept lattices. The results of this research can be helpful for ontology engineers to support error detection and construction of "well-defined" and "good" ontologies.

A Study on the Strategic Alliance of Domestic Internet Businesses (국내 인터넷 비즈니스의 전략적 제휴의 특성)

  • Choi, Moo-Jin;Ha, Il-Hak
    • Asia pacific journal of information systems
    • /
    • v.13 no.3
    • /
    • pp.41-62
    • /
    • 2003
  • This study investigated the current status and characteristics of strategic alliances attempted by domestic internet businesses. Specifically, this study surveyed competitive environmental characteristics of partner companies involved, alliance period, types of partner companies, motives of alliances, types of alliances, success and failure factors and satisfaction toward the alliances. Major findings were: first, alliances between portal companies and content producers; portal companies and internet services; e-commercial sites and internet services were the most frequent partnerships engaged. Second, the most important motive for and type of the strategic alliance were: 'the commercialization and marketing of new product' and 'joint distribution and marketing agreement' respectively. Third, the most important factor for the successful alliance was 'a close examination of partners' core business value and competence'; and the factor most hindering the successful alliance was 'a discrepancy on capabilities of partners' core personnel. Finally types of internet business were significantly related to perceived satisfaction toward strategic alliance.