• Title/Summary/Keyword: Generate Data

Search Result 3,066, Processing Time 0.032 seconds

Hybrid 3DTV Systems Based on the Cross-View SHVC (양안 교차 SHVC 기반 융합형 3DTV 시스템)

  • Kang, Dong Wook;Jung, Kyeong Hoon;Kim, Jin Woo;Kim, Jong Ho
    • Journal of Broadcast Engineering
    • /
    • v.23 no.2
    • /
    • pp.316-319
    • /
    • 2018
  • When a terrestrial UHD broadcasting service and a mobile HD broadcasting service are provided using the PLP function provided by ATSC 3.0 and domestic UHD broadcasting standard, a small amount of data may be additionally transmitted to further provide high quality UHD-3D broadcasting service. The left and right images of the stereoscopic image are input, one view image is encoded by the SHVC method, and the other view images are encoded by the SHVC method of the two-view cross-referencing method. However, since the base layers (BL) of the two encoders are mutually common, the two encoders correspond to encoders that generate one BL stream and two enhancement layer (EL) streams. The average encoding efficiency is 16% more efficient compared to the third independent HEVC encoding for the UHD-3D broadcast service. The proposed scheme reduces the fluctuation of PSNR per image frame and increases the image quality of minimum PSNR frame by 0.6dB.

SPACEBORNE TOPS SAR SYSTEM MODELING AND PERFORMANCE ANALYSIS (TOPS 위성 SAR 모드 시스템 구현 및 성능 평가 연구)

  • Kang, Seo-Li;Song, Jeong-Hwan;Kim, Bum-Seung;Kim, Hyeon-Cheol;Lee, Woo-Kyung
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.74-79
    • /
    • 2014
  • Conventional ScanSAR mode has been adopted in Envisat or Radarsat and played an important role to acquire wide swath SAR images for environmental surveillance. However, it suffers from the undesirable scalloping effect caused by non-homogeneity of antenna pattern while the image resolution is sacrificed. In recent years, TOPS mode has been suggested and put into use to overcome the disadvantages of the conventional scanning mode. Although TOPS mode is able to produce wide-swath SAR image in a short time interval, it demands highly complicated system design knowledge. In this paper, we present the operation principle of TOPS mode and a full SAR simulation is performed to generate TOPS SAR raw data. Azimuth antenna pattern is modified during TOPS mode operation and it is shown that the undesired scalloping effect is suppressed in the generated SAR image.

Algorithmic Generation of Self-Similar Network Traffic Based on SRA (SRA 알고리즘을 이용한 Self-Similar 네트워크 Traffic의 생성)

  • Jeong HaeDuck J.;Lee JongSuk R.
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.281-288
    • /
    • 2005
  • It is generally accepted that self-similar (or fractal) Processes may provide better models for teletraffic in modem computer networks than Poisson processes. f this is not taken into account, it can lead to inaccurate conclusions about performance of computer networks. Thus, an important requirement for conducting simulation studies of telecommunication networks is the ability to generate long synthetic stochastic self-similar sequences. A generator of pseudo-random self similar sequences, based on the SRA (successive random addition) method, is implemented and analysed in this paper. Properties of this generator were experimentally studied in the sense of its statistical accuracy and the time required to produce sequences of a given (long) length. This generator shows acceptable level of accuracy of the output data (in the sense of relative accuracy of the Hurst parameter) and is fast. The theoretical algorithmic complexity is O(n).

A Study of Rapid Prototyping Based on GOMS Model (GOMS 모델을 기반으로 한 Rapid Prototyping에 관한 연구)

  • Cha, Yeon-Joo;Jo, Sung-Sik;Myung, Ro-Hae
    • IE interfaces
    • /
    • v.24 no.1
    • /
    • pp.1-7
    • /
    • 2011
  • The purpose of this research was to develop an integrated interface for the usability test of systems or products in the design process. It is capable of automatically creating GOMS models which can predict human task performances. It can generate GOMS models to be interacted with the prototype interfaces. It can also effectively manage various design information and various usability test results to be implemented into the new product and/or system design. Thus we can perform usability test for products or system prototypes more effectively and also reduce time and effort required for this test. For usability tests, we established an integrated interface based on GOMS model by the LabVIEW program. We constructed the system that the linkage to GOMS model is available. Using this integrated interface, the menu structure of mobile phone can be constructed easily. User can design a depth and a breath that he want. The size of button and the label of the button is changable. The path to the goal can be defined by the user. Using a designed menu structure, the experiment could be performed. The results of GOMS model and the actual time are presented. Besides, values of operators of GOMS model can be defined as the value that user wants. Using the integrated interface that we developed, the optimal menu structure deducted. The menu structure that user wants can be established easily. The optimal layout and button size can be decided by comparison of numerous menu structures. User can choose the method of usability test among GOMS model and empirical data. Using this integrated interface, the time and costs can be saved and the optimal menu structure can be found easily.

A Study of Real Time Security Cooperation System Regarding Hacker's Attack (해커의 공격에 대한 실시간 보안공조시스템 연구)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.285-288
    • /
    • 2010
  • Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.

  • PDF

A Three-Layered Ontology View Security Model for Access Control of RDF Ontology (RDF 온톨로지 접근 제어를 위한 3 계층 온톨로지 뷰 보안 모델)

  • Jeong, Dong-Won;Jing, Yixin;Baik, Dook-Kwon
    • Journal of KIISE:Databases
    • /
    • v.35 no.1
    • /
    • pp.29-43
    • /
    • 2008
  • Although RDF ontologies might be expressed in XML tree model, existing methods for protection of XML documents are not suitable for securing RDF ontologies. The graph style and inference feature of RDF demands a new security model development. Driven by this goal, this paper proposes a new query-oriented model for the RDF ontology access control. The proposed model rewrites a user query using a three-layered ontology view. The proposal resolves the problem that the existing approaches should generate inference models depending on inference rules. Accessible ontology concepts and instances which a user can visit are defined as ontology views, and the inference view defined for controling an inference query enables a controlled inference capability for the user. This paper defines the three-layered view and describes algorithms for query rewriting according to the views. An implemented prototype with its system architecture is shown. Finally, the experiment and comparative evaluation result of the proposal and the previous approach is described.

Determinants of Adoption and Use of Open Access Publishing by Academic Staff in Nigeria Universities

  • Bashorun, Musediq Tunji;Jain, Priti;Sebina, Peter M.;Kalusopa, Trywell
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.4
    • /
    • pp.49-63
    • /
    • 2016
  • The emergence of the World Wide Web (WWW) has changed the scholarly publishing system. Today, Open Access (OA) scholarly publishing offers free access and wide dissemination for research findings anytime and anywhere as an additional value for scholarly content. Despite the potentials of OA publishing, its adoption and use is still low.This paper determines factors influencing the adoption and use of OA publishing by academic staff in universities in Nigeria using an adapted Unified Theory of Acceptance and Use Technology (UTAUT). The study applies methodological triangulation by combining quantitative and qualitative approaches. The empirical data were collected from 317 academic staff in universities in southwest Nigeria. The questionnaire forms were analyzed using the Statistical Package for Social Sciences (IBM-SPSS) 19.0 version to generate descriptive statistics, Analysis of Variance, and Hierarchical Multiple Regression. Thematically, analysis also applies to the interviews. The results show that awareness, attitude, performance expectancy, Internet self-efficacy, and facilitating conditions significantly influenced the adoption and use of OA publishing. The study also reveals that due to lack of OA policy, most of the respondents did not know about OA. The findings further establish that all predictors and moderating variables jointly contributed 64.4% total variance towards the adoption and use of OA publishing. One of the implications of this study is that there is a need for adequate facilities to support adoption and use of OA publishing. The findings inform the proposed framework for improving and evaluating the adoption and use of OA publishing. The findings also have theoretical, societal, and methodological significance to all stakeholders.

An Automatic Test Case Generation Method from Checklist (한글 체크리스트로부터 테스트 케이스 자동 생성 방안)

  • Kim, Hyun Dong;Kim, Dae Joon;Chung, Ki Hyun;Choi, Kyung Hee;Park, Ho Joon;Lee, Yong Yoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.8
    • /
    • pp.401-410
    • /
    • 2017
  • This paper proposes a method to generate test cases in an automatic manner, based on checklist containing test cases used for testing embedded systems. In general, the items to be tested are defined in a checklist. However, most test case generation strategies recommend to test a system with not only the defined test items but also various mutated test conditions. The proposed method parses checklist in Korean file and figures out the system inputs and outputs, and operation information. With the found information and the user defined test case generation strategy, the test cases are automatically generated. With the proposed method, the errors introduced during manual test case generation may be reduced and various test cases not defined in checklist can be generated. The proposed method is implemented and the experiment is performed with the checklist for an medical embedded system. The feasibility of the proposed method is shown through the test cases generated from the checklist. The test cases are adequate to the coverages and their statistics are correct.

Design and Implementation of Generation System for Storing Core Components (핵심 컴포넌트 저장을 위한 시스템 설계 및 구현)

  • Hwang, Jeong-Hee;Kim, Young-Gyun;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.361-370
    • /
    • 2004
  • ebXML(Electronic Business using extensible Markup Language) is an XML based new international standard framework of the electronic business. Interoperability among mutually different industry fields can be realized by reusing core component, as a infrastructure of data. For this interoperability, it is needed to define the concrete concept of core component, through analyzing the role and applicability of the core component in business process which defines the interoperability among different companies. Therefore, in this paper, we Inquire the role of the core component in the ebXML, and implement the core component storage system which generates core component to register in registry/repository. The designed system for storing the core component generates suitable core component structure to register in registry/repositor), which can be used to generate new business information entity in a modeling step of business process.

Selective Segmentation of 3-D Objects Using Surface Detection and Volume Growing (표면 검출과 볼륨 확장을 이용한 삼차원 물체의 선택 분할)

  • Bae, So-Young;Choi, Soo-Mi;Choi, Yoo-Joo;Kim, Myoung-Hee
    • The KIPS Transactions:PartA
    • /
    • v.9A no.1
    • /
    • pp.83-92
    • /
    • 2002
  • The segmentation of target objects from three dimensional volume images is an essential step for visualization and volume measurement. In this paper, we present a method to detect the surface of objects by improving the widely used levoy filtering for volume visualization. Using morphological operators we generate completely closed surfaces and selectively segment objects using the volume growing algorithm. The presented method was applied to 3-D artificial sphere images and angiocardiograms. We quantitatively compared this method with the conventional levoy filtering using artificial sphereimages, and the results showed that our method is better in the aspect of voxel errors. The results of visual comparison using angiocardiograms also showed that our method is more accurate. The presented method in this paper is very effective for segmentation of volume data because segmentation, visualization and measurement are frequently used together for 3-D image processing and they can be easily related in our method.