• Title/Summary/Keyword: Lost Data Recovery

Search Result 39, Processing Time 0.02 seconds

Kalman filter based Motion Vector Recovery for H.264 (H.264 비디오 표준에서의 칼만 필터 기반의 움직임벡터 복원)

  • Ko, Ki-Hong;Kim, Seong-Whan
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.801-808
    • /
    • 2007
  • Video coding standards such as MPEG-2, MPEG-4, H.263, and H.264 transmit a compressed video data using wired/wireless communication line with limited bandwidth. Because highly compressed bit-streams is likely to fragile to error from channel noise, video is damaged by error. There have been many research works on error concealment techniques, which recover transmission errors at decoder side [1, 2]. We designed an error concealment technique for lost motion vectors of H.264 video coding. In this paper, we propose a Kalman filter based motion vector recovery scheme, and experimented with standard video sequences. The experimental results show that our scheme restores original motion vector with more precision of 0.91 - 1.12 on average over conventional H.264 decoding with no error recovery.

A 2MC-based Framework for Sensor Data Loss Decrease in Wireless Sensor Network Failures (무선센서네트워크 장애에서 센서 데이터 손실 감소를 위한 2MC기반 프레임워크)

  • Shin, DongHyun;Kim, Changhwa
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.2
    • /
    • pp.31-40
    • /
    • 2016
  • Wireless sensor networks have been used in many applications such as marine environment, army installation, etc. The sensor data is very important, because all these applications depend on sensor data. The possibility of communication failures becomes high since the surrounding environment of a wireless sense network has an sensitive effect on its communications. In particular, communication failures in underwater communications occur more frequently because of a narrow bandwidth, slow transmission speed, noises from the surrounding environments and so on. In cases of communication failures, the sensor data can be lost in the sensor data delivery process and these kinds of sensor data losses can make critical huge physical damages on human or environments in applications such as fire surveillance systems. For this reason, although a few of studies for storing and compressing sensor data have been proposed, there are lots of difficulties in actual realization of the studies due to none-existence of the framework using network communications. In this paper, we propose a framework for reducing loss of the sensor data and analyze its performance. The our analyzed results in non-framework application show a decreasing data recovery rate, T/t, as t time passes after a network failure, where T is a time period to fill the storage with sensor data after the network failure. Moreover, all the sensor data generated after a network failure are the errors impossible to recover. But, on the other hand, the analyzed results in framework application show 100% data recovery rate with 2~6% data error rate after data recovery.

Recovery of Lost Wind Data Based-upon the Directional Ground Roughness (방위별 지면조도에 근거한 누락 풍속자료 복원방법)

  • 조경호;허종철;김건훈
    • Journal of Energy Engineering
    • /
    • v.9 no.1
    • /
    • pp.76-81
    • /
    • 2000
  • 풍속자료의 측정이 예기치 못한 원인으로 실패하는 일이 종종발생한다. 풍속자료의 해석을 위해서는 이렇게 망실된 풍속자료의 복원이 필요하다. 이 경우 유용한 측정자료를 바탕으로 적절한 내삽법(혹은 외삽법)으로 망실된 풍속자료를 복원하는 것이 일반적인 방법이다. 이때 해당지역의 지면조도값이 필요하고, 일반적으로는 상수로 추정된 지면조도값을 사용한다. 이에 반하여 , 본 연구에서는 방위별로 변하는 지면조도의 개념을 새로이 제안하였다. 누락 풍속자료의 복원사례에 적용하여 제안된 방법의 신뢰도를 검토한 바 기존의 지면조도를 일정 값으로 하는 것보다 제안된 방법이 풍속자료의 보정 및 복원을 보다 더 정확하게 할 수있음을 확인하였다. 따라서, 방위별 장애물의 편차가 크고 , 계절별 풍향의 변화가 심할 경우에는 제안된 지면조도의 개념은 유용한 접근법이 될 것으로 기대한다.

  • PDF

An Efficient Recovery System for Spatial Main Memory DBMS (공간 메인 메모리 DBMS를 위한 효율적인 회복 시스템)

  • Kim, Joung-Joon;Ju, Sung-Wan;Kang, Hong-Koo;Hong, Dong-Sook;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.8 no.3
    • /
    • pp.1-14
    • /
    • 2006
  • Recently, to efficiently support the real-time requirements of LBS and Telematics services, interest in the spatial main memory DBMS is rising. In the spatial main memory DBMS, because all spatial data can be lost when the system failure happens, the recovery system is very important for the stability of the database. Especially, disk I/O in executing the log and the checkpoint becomes the bottleneck of letting down the total system performance. Therefore, it is urgently necessary to research about the recovery system to reduce disk I/O in the spatial main memory DBMS. In this paper, we study an efficient recovery system for the spatial main memory DBMS. First, the pre-commit log method is used for the decrement of disk I/O and the improvement of transaction concurrency. In addition, we propose the fuzzy-shadow checkpoint method for the recovery system of the spatial main memory DBMS. This method can solve the problem of duplicated disk I/O on the same page of the existing fuzzy-pingpong checkpoint method for the improvement of the whole system performance. Finally, we also report the experimental results confirming the benefit of the proposed recovery system.

  • PDF

The Mitigation Model Development for Minimizing IT Operational Risks (IT운영리스크 최소화를 위한 피해저감모델 구현에 관한 연구)

  • Lee, Young-Jai;Hwang, Myung-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.95-113
    • /
    • 2007
  • To minimize IT operational risks and the opportunity cost for lost business hours. it is necessary to have preparedness in advance and mitigation activities for minimization of a loss due to the business discontinuity. There are few cases that banks have a policy on systematic management, system recovery and protection activities against system failure. and most developers and system administrators response based on their experience and the instinct. This article focuses on the mitigation model development for minimizing the incidents of disk unit in IT operational risks. The model will be represented by a network model which is composed of the three items as following: (1) the risk factors(causes, attributes and indicators) of IT operational risk. (2) a periodic time interval through an analysis of historical data. (3) an index or an operational regulations related to the examination of causes of an operational risk. This article will be helpful when enterprise needs to hierarchically analyze risk factors from various fields of IT(information security, information telecommunication, web application servers and so on) and develop a mitigation model. and it will also contribute to the reduction of operational risks on information systems.

  • PDF

A Spatial Error Concealment Using Pixelwise Fine Directional Interpolation (픽셀 단위의 정밀한 방향성 보간을 이용한 공간적 에러 은닉 기법)

  • Kim, Won-Ki;Koo, Ja-Sung;Jin, Soon-Jong;Jeong, Je-Chang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2C
    • /
    • pp.124-131
    • /
    • 2007
  • This paper presents a block loss recovery technique for the image block data corrupted by transmission losses through the employment of fine directional interpolation (FDI). The proposed algorithm introduces a spatial direction vector (SDV). The SDVs are extracted from the edge information of the neighboring image data. Subsequently, the SDVs are adaptively applied to interpolate lost pixels on a pixel-by-pixel basis. This approach improves the capability to more reliably recover high-detailed contents in the corrupted block. Experimental results demonstrate that the FDI method performs better as compared to previous techniques.

Business Continuity and Data Backup in Cloud Computing Service and Architecture Study for Data Availability Zone (비즈니스 연속성을 위한 클라우드 컴퓨팅 서비스에서의 데이터 백업과 데이터 가용영역 아키텍쳐 연구)

  • Park, Young-ho;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2305-2309
    • /
    • 2016
  • Cloud Computing Service should support efficiency and stability. United States of America, for example, provides FedRAMP (Federal Risk and Authorization Management Program) accreditation to certify cloud computing service and hence growth of computing service industry is giving benefits of cost reduction and efficiency to companies. However, the use of computing service brings more risk than ever. Because cloud computing holds all the data of multiple companies, problems such as hacking bring out control loss of service and as a result total data of companies can be lost. Unfortunately, cloud computing certification programs do not have any good solutions for this data loss and companies may lose all the important data without any proper data backup. This paper studies such problems in terms of backup problem and provides Data Availability Zone solution for recovery and safe saving of data so that computing service can offer better efficiency and stability.

Distributed Archiving Protocol between the Medical Sensor Nodes for the Home Health Service (홈 헬스를 위한 메디컬 센서노드의 분산보관 프로토콜)

  • Lee, Young-Ho;Jang, Hee-Tae;Lee, Byung-Mun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.80-90
    • /
    • 2012
  • Medical data sampled through medical sensor nodes can provide services properly only when the data are not lost even during the fault of a home health gateway. The loss of medical data can be minimized if a sensor node, in which it is expected that there are the most saving spaces, is selected after medical sensor nodes tentatively conduct local save or communicate with each other during a fault when data cannot received. Furthermore, efficient saving techniques are necessary since the cycle for sampling information is different according to the type of medical data and a space for distributed saving is different for each apparatus. So, this research suggests an efficient distributed archiving protocol (DAP) for medical data sensor nodes, each of which has a diverse sampling cycle. In order to confirm the usefulness of DAP, DAP between sensor node and gateway was designed and materialized. An experiment was conducted using the materialized program and earned a high level of recovery rate (99.3%) and of accuracy rate, which confirms that sensor nodes can play their role during a temporary fault.

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

  • Li, Guojia;You, Lin;Hu, Gengran;Hu, Liqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2865-2878
    • /
    • 2021
  • As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.

A Study on the Prevention of Appropriate Store and Gentrification to Restore the Function of the Commercial District in the Original City

  • RYU, Tae-Chang
    • Journal of Distribution Science
    • /
    • v.20 no.11
    • /
    • pp.109-120
    • /
    • 2022
  • Purpose: We would like to identify the appropriate size of stores in the commercial district suitable for the era of low growth. In addition, it is intended to present alternatives to prevent gentrification along with measures to revitalize commercial districts according to the selection of appropriate stores. Research design, data and methodology: The importance and commercial district usage patterns were identified through surveys by consumers and sellers. the demand and size of the commercial area were calculated based on the floating population and resident registration population. In addition, based on this, through metric analysis, the importance of the business district activation plan and what important matters can prevent gentrification were analyzed. Result: In this the study, 555 stores are currently operating in the target area, but it is seen as a commercial district with a scale that can operate 136 stores and 938 stores. In addition, it was analyzed that the Commercial Lease Protection Act needs to be strengthened to prevent gentrification. Conclusions: Due to the nature of small and medium-sized cities in Korea, commercial districts that have once lost their resilience must take much effort to find vitality. It is believed that local commercial districts will have resilience when diagnosis and recovery measures are adequately presented.