• Title/Summary/Keyword: Execution error

Search Result 188, Processing Time 0.025 seconds

Sound Localization Technique for Intelligent Service Robot 'WEVER' (지능형 로봇 '웨버'를 위한 음원 추적 기술)

  • Lee, Ji-Yeoun;Hahn, Min-Soo;Ji, Su-young;Cho, Young-Jo
    • Proceedings of the KSPS conference
    • /
    • 2005.11a
    • /
    • pp.117-120
    • /
    • 2005
  • This paper suggests an algorithm that can estimate the direction of the sound source in realtime. Our intelligent service robot, WEVER, is used to implement the proposed method at the home environment. The algorithm uses the time difference and sound intensity information among the recorded sound source by four microphones. Also, to deal with noise of robot itself, the kalman filter is implemented. The proposed method takes shorter execution time than that of an existing algorithm to fit the real-time service robot. The result shows relatively small error within the range of ${\pm}$ 7 degree.

  • PDF

A Novel Architecture for Mobile Crowd and Cloud computing for Health care

  • kumar, Rethina;Ganapathy, Gopinath;Kang, Jeong-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.226-232
    • /
    • 2018
  • The rapid pace of growth in internet usage and rich mobile applications and with the advantage of incredible usage of internet enabled mobile devices the Green Mobile Crowd Computing will be the suitable area to research combining with cloud services architecture. Our proposed Framework will deploy the eHealth among various health care sectors and pave a way to create a Green Mobile Application to provide a better and secured way to access the Products/ Information/ Knowledge, eHealth services, experts / doctors globally. This green mobile crowd computing and cloud architecture for healthcare information systems are expected to lower costs, improve efficiency and reduce error by also providing better consumer care and service with great transparency to the patient universally in the field of medical health information technology. Here we introduced novel architecture to use of cloud services with crowd sourcing.

A Case Study on the Utilization of Virtual Terminal System (가상화 터미널 시스템 활용 사례 연구)

  • Lee, Hoon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2020.11a
    • /
    • pp.151-152
    • /
    • 2020
  • There is a possibility of failure as a result of field application in the planning and execution process to change the operating policy for operating terminals, so a lot of time and effort are required to reduce trial and error. In the planning stage to change the terminal operation policy, simulation technology can be used to support decision making. This study introduces a case of using a virtual terminal system among simulation technologies.

  • PDF

GUI-based Black Box Test Automation Program Tool in Windows Environment (윈도우 환경에서의 GUI 기반 블랙박스 테스트 자동화 프로그램 도구)

  • Jeong, Beomjin;Lee, Jungwoo;Hong, Changwan;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.2
    • /
    • pp.163-168
    • /
    • 2018
  • In this paper, we propose and develop a test automation program tool that automates GUI based testing using black box testing technique in Windows environment. The main features of the proposed test automation program tool are as follows. First, an error condition is designated as an image, a screen is captured for each test step, and an error message is detected through comparison of image similarity. Second, the proposed system supports various setting options such as event waiting time during execution and coordinate increment value between each test step. Such black box test automation research was common in environments such as Android and Web, but not in Windows environment. The results of performance evaluation show that the proposed system performs GUI test automation as an image comparison module and confirms that the test is performed normally by confirming process status and error image detection.

A Structural Approach to On-line Signature Verification (구조적 접근방식의 온라인 자동 서명 겁증 기법)

  • Kim, Seong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.385-396
    • /
    • 2005
  • In this paper, a new structural approach to on-line signature verification is presented. A primitive pattern is defined as a part segmented by a local minimal position of speed. And a structural description of signature is composed of subpatterns which are defined as such forms as rotation shape, cusp shape and bell shape, acquired by composition of the primitives regarding the directional changes. As the matching method to find identical parts between two signatures, a modified DP(dynamic programming) matching algorithm is presented. And also, variation and complexity of local parts are computed from the training samples, and reference model and decision boundary are derived from these. Error rate, execution time and memory usage are compared among the functional approach, the parametric approach and the proposed structural approach. It is found that the average error rate can be reduced from 14.2% to 4.05% when the local parts of a signature are weighted and the complexity is used as a factor of decision threshold. Though the error rate is similar to that of functional approaches. time consumption and memory usage of the proposed structural approach are shown to be very effective.

  • PDF

Encryption of MPEG using Error Propagation by a Receiver (수신단에서 에러 전파 특성을 이용한 MPEG 암호화)

  • Jeong, Seo-Hyun;Lee, Sung-Ju;Chung, Young-Wha;Kim, Sang-Chun;Min, Byoung-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.183-188
    • /
    • 2011
  • According to increased multimedia data(i.e., MPEG video stream) in mobile application, protecting data becomes an important problem in the multimedia data delivery. SECMPEG is a selective encryption approach for protecting multimedia data. However, the computational overhead of SECMPEG's security level 3 is quite large because it encrypts the whole I-frames whose size is relatively larger than P/B-frames. Therefore, we need to analyze the characteristics of MPEG2 standard and derive an effective encryption of the I-frames. In this paper, we propose a slice-level, selective encryption approach by using the error-propagation characteristics of I-frames by a receiver. Our experimental results show that the proposed approach can reduce the execution time of SECMPEG's security level 3 by a factor of 30 without degradation of the security.

The Parallel ANN(Artificial Neural Network) Simulator using Mobile Agent (이동 에이전트를 이용한 병렬 인공신경망 시뮬레이터)

  • Cho, Yong-Man;Kang, Tae-Won
    • The KIPS Transactions:PartB
    • /
    • v.13B no.6 s.109
    • /
    • pp.615-624
    • /
    • 2006
  • The objective of this paper is to implement parallel multi-layer ANN(Artificial Neural Network) simulator based on the mobile agent system which is executed in parallel in the virtual parallel distributed computing environment. The Multi-Layer Neural Network is classified by training session, training data layer, node, md weight in the parallelization-level. In this study, We have developed and evaluated the simulator with which it is feasible to parallel the ANN in the training session and training data parallelization because these have relatively few network traffic. In this results, we have verified that the performance of parallelization is high about 3.3 times in the training session and training data. The great significance of this paper is that the performance of ANN's execution on virtual parallel computer is similar to that of ANN's execution on existing super-computer. Therefore, we think that the virtual parallel computer can be considerably helpful in developing the neural network because it decreases the training time which needs extra-time.

Method for Analysis of C3 System of Systems Using Transformation of Federation Based on an Extended DEVS Formalism (확장된 DEVS 형식론 기반 페더레이션의 변환을 통한 C3 복합 체계의 분석 방법)

  • Kang, Bong Gu;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.13-21
    • /
    • 2018
  • The system of systems (SoS) based analysis method for the C3 system consisting of the communication system and the command and control (C2) system has the advantage that detailed analysis is possible, but it requires long execution time per one trial, which makes the analysis of various scenarios difficult. To solve this problem, this paper proposes a method for analysis of C3 SoS using a transformation of a federation into an integrated simulation. This transformation technique reduces the execution time while maintaining accuracy by abstracting the system other than the one to be analyzed, consisting of model hypothesis and function identification. The former can construct an abstracted model for the simulation through the proposed extended Discrete Event Systems Specification (DEVS) formalism and the latter can express the characteristics of the model influenced by other systems. From the case study on C and C2 analysis, the experimental results show that this method shortened the time considerably while maintaining the accuracy within an acceptable error range and we expect that this method will enable the exploratory analysis of the complex systems other than C3.

Analytical Models and their Performance Analysis of Superscalar Processors (수퍼스칼라 프로세서의 해석적 모델 및 성능 분석)

  • Kim, Hak-Jun;Kim, Seon-Mo;Choe, Sang-Bang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.847-862
    • /
    • 1999
  • 본 논문에서는 유한버퍼의(finite-buffered) 동기화된(synchronous) 큐잉모델(queueing model)을 이용하여 명령어들간의 병렬성, 분기명령의 빈도수, 분기예측(branch prediction)의 정확도, 캐쉬미스 등의 파라미터들을 고려하여 프로세서의 명령어 실행율을 예측하며 캐쉬의 성능과 파이프라인 성능간의 관계를 분석할 수 있는 새로운 해석적 모델을 제안하였다. 해석적 모델은 모델의 타당성을 검증하기 위해서 시뮬레이션을 수행하여 얻은 결과와 비교하였다. 해석적 모델과 시뮬레이션을 비교한 결과 대부분 10% 오차 내에서 일치하였다. 본 연구를 통하여 얻은 해석적 모델을 사용하면 시뮬레이션에서는 드러나지 않는 성능제약의 원인에 대한 명확한 규명이 가능하기 때문에 성능향상을 위한 설계자료를 얻을 수 있으며, 시스템 성능 밸런스를 위한 캐쉬와 비순차이슈 파이프라인 성능간의 관계에 대한 정확한 분석이 가능하다.Abstract This research presents a novel analytic model to predict the instruction execution rate of superscalar processors using the queuing model with finite-buffer size and synchronous operation mode. The proposed model is also able to analyze the performance relationship between cache and pipeline. The proposed model takes into account various kinds of architectural parameters such as instruction-level parallelism, branch probability, the accuracy of branch prediction, cache miss, and etc.. To prove the correctness of the model, we performed extensive simulations and compared the results with the analytic model. Simulation results showed that the proposed model can estimate the average execution rate accurately within 10% error compared to simulation results. The proposed model can explain the causes of performance bottleneck which cannot be uncovered by the simulation method only. The model is also able to show the effect of the cache miss on the performance of out-of-order issue superscalar processors, which can provide an valuable information in designing a balanced system.

Convergence study on the change of cognitive function through the intentional finger movement (의식적 손가락 움직임이 인지기능 변화에 미치는 융합연구)

  • Kim, Kyung-Yoon;Bae, Seahyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.5
    • /
    • pp.95-102
    • /
    • 2019
  • This study was to investigate the effect of eye movement and intentional finger movement on cognitive ability. Normal adult subjects were randomly divided into two groups: saccadic eye movement(SEM) and intentional finger movement(IFM). After 2 weeks of intervention, Digit span was used for short-term memory test and N-back was used for working memory test. As a result, the short-term memory of the IFM group increased significantly over time, and the follow-up test showed difference between group. The IFM group's the execution time, the error count and the accuracy rate of n-back item showed significant effects over time. The SEM group's the execution time and the accuracy of n-back item showed significant effects over time. In conclusion, the IFM method, which is a multiple stimulus that can activate the cerebral cortex more extensively than the single stimulus SEM, may be more useful as an intervention method of cognitive function improvement.