• Title/Summary/Keyword: Moving Sequence

Search Result 290, Processing Time 0.037 seconds

TCP Performance Improvement Scheme in Network Mobility Environment (네트워크 이동 환경에서의 TCP 성능 향상 기법)

  • Kim Myung-Sup;Choi Myung-Whan
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.345-352
    • /
    • 2006
  • In the integrated wired/wireless network which consists of the Internet and moving networks, multiple wireless links are used to connect a fixed host(FH) in the Internet to a mobile host(MH) in the moving network. For use in such an environment, we propose a scheme to overcome the TCP performance degradation due to the packet losses over the wireless links without losing the end-to-end TCP semantics. The proposed scheme in each mobile router(MR) allows to obtain the information regarding packet losses over the upstream wireless links based on the received packet sequence number and the ACK number. This information is delivered to the upstream router, which enables the upstream access router(AR) or MR to quickly retransmit the lost packets. The proposed scheme has the feature to quickly recover the packet losses incurred over the upstream wireless links and the performance of the proposed scheme is evaluated through simulation. It is shown that the significant performance gain can be obtained using the proposed scheme compared with the snoop mechanism which maintains end-to-end TCP semantics and does not require any additional features at the source and/or destination nodes.

User Modeling based Time-Series Analysis for Context Prediction in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 컨텍스트 예측을 위한 시계열 분석 기반 사용자 모델링)

  • Choi, Young-Hwan;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.5
    • /
    • pp.655-660
    • /
    • 2009
  • The context prediction algorithms are not suitable to provide real-time personalized service for users in context-awareness environment. The algorithms have problems like time delay in training data processing and the difficulties of implementation in real-time environment. In this paper, we propose a prediction algorithm with user modeling to shorten of processing time and to improve the prediction accuracy in the context prediction algorithm. The algorithm uses moving path of user contexts for context prediction and generates user model by time-series analysis of user's moving path. And that predicts the user context with the user model by sequence matching method. We compared our algorithms with the prediction algorithms by processing time and prediction accuracy. As the result, the prediction accuracy of our algorithm is similar to the prediction algorithms, and processing time is reduced by 40% in real time service environment.

Real time detection and recognition of traffic lights using component subtraction and detection masks (성분차 색분할과 검출마스크를 통한 실시간 교통신호등 검출과 인식)

  • Jeong Jun-Ik;Rho Do-Whan
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.2 s.308
    • /
    • pp.65-72
    • /
    • 2006
  • The traffic lights detection and recognition system is an essential module of the driver warning and assistance system. A method which is a color vision-based real time detection and recognition of traffic lights is presented in this paper This method has four main modules : traffic signals lights detection module, traffic lights boundary candidate determination module, boundary detection module and recognition module. In traffic signals lights detection module and boundary detection module, the color thresholding and the subtraction value of saturation and intensity in HSI color space and detection probability mask for lights detection are used to segment the image. In traffic lights boundary candidate determination module, the detection mask of traffic lights boundary is proposed. For the recognition module, the AND operator is applied to the results of two detection modules. The input data for this method is the color image sequence taken from a moving vehicle by a color video camera. The recorded image data was transformed by zooming function of the camera. And traffic lights detection and recognition experimental results was presented in this zoomed image sequence.

An Efficient Syntax Rule for Selective Coding (선택적 부호화를 위한 효율적인 구문 표현)

  • 이종배
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.3
    • /
    • pp.347-354
    • /
    • 1999
  • Image sequence is compressed and stored as the unit of frame in computer, and reconstructed with desired quality according to several applications. In some cases specific parts are more important than other parts within a frame and these important parts must be reconstructed with high quality compared with the other parts and several schemes are suggested for such application and these schemes need to separate the important parts from a given frame, and also the syntax of shape, texture, and motion information must be defined for important parts and the other parts. But syntax rule in H.261, MPEG1 or MPEG2 is not suitable for our application because the syntax rules in the existing scheme can not express shape information for separating the important regions from each frame. So we propose a new syntax rule which represents the shape, texture and motion information in the circumstances where specific important parts exist in a frame.

  • PDF

A Study on Correcting Virtual Camera Tracking Data for Digital Compositing (디지털영상 합성을 위한 가상카메라의 트래킹 데이터 보정에 관한 연구)

  • Lee, Junsang;Lee, Imgeun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.39-46
    • /
    • 2012
  • The development of the computer widens the expressive ways for the nature objects and the scenes. The cutting edge computer graphics technologies effectively create any images we can imagine. Although the computer graphics plays an important role in filming and video production, the status of the domestic contents production industry is not favorable for producing and research all at the same time. In digital composition, the match moving stage, which composites the captured real sequence with computer graphics image, goes through many complicating processes. The camera tracking process is the most important issue in this stage. This comprises the estimation of the 3D trajectory and the optical parameter of the real camera. Because the estimating process is based only on the captured sequence, there are many errors which make the process more difficult. In this paper we propose the method for correcting the tracking data. The proposed method can alleviate the unwanted camera shaking and object bouncing effect in the composited scene.

Effect of MgO addition in glass composition on the strength of zirconia-glass composites (지르코니아-유리복합체용 글래스의 조성에서 MgO의 함량 변화가 강도에 미치는 영향)

  • Lee, Kyu-Sun;Lee, Chang-Wan;Lee, Chae-Hyun
    • Journal of Technologic Dentistry
    • /
    • v.29 no.1
    • /
    • pp.23-34
    • /
    • 2007
  • The quantity of MgO in the Zirconia of 20wt% Frit has been varied and the sintering temperature has been differentiated to monitor the changes in the mechanical features. The rise of sintering temperature from 1100$^{\circ}C$ to 1300$^{\circ}C$ was followed by higher sintering density. And, at a sintering temperature, the increase of the quantity of MgO was followed by lower sintering density. The bending strength has been lowered as the quantity of MgO increases in the Zirconia of 20wt% Frit, which seems to be because the MgO functions as impurities degrading the mechanical features. In terms of micro-structure analysis, the pore has been greatly enlarged, while the density varied very little, when the MgO of 3wt% was added. The size of pore became smaller as the added quantity of MgO increased larger in the sequence of 5wt% and 7wt%. But, the pore-generating rate became higher as the added quantity of MgO increased in the sequence of 3wt%, 5wt% and 7wt%. Thus, it is possible to summarize that the small quantity of MgO, say, of 3wt%, promotes the grain growth, and the large quantity of MgO, say, of 7wt%, hinders the grain growth. Also, if the quantity of MgO exceeds some level, the MgO hinders substances from moving, which, ultimately, keeps blowholes from becoming enlarged or extinct, and makes pores small and dispersed in broad area. In conclusion, the study on the change in the size of pore shows that the larger the quantity of MgO is, the more the micro pores are, thereby degrading the mechanical features.

  • PDF

A Relative Nodal Displacement Method for Element Nonlinear Analysis (상대 절점 변위를 이용한 비선형 유한 요소 해석법)

  • Kim Wan Goo;Bae Dae sung
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.29 no.4 s.235
    • /
    • pp.534-539
    • /
    • 2005
  • Nodal displacements are referred to the initial configuration in the total Lagrangian formulation and to the last converged configuration in the updated Lagrangian furmulation. This research proposes a relative nodal displacement method to represent the position and orientation for a node in truss structures. Since the proposed method measures the relative nodal displacements relative to its adjacent nodal reference frame, they are still small for a truss structure undergoing large deformations for the small size elements. As a consequence, element formulations developed under the small deformation assumption are still valid for structures undergoing large deformations, which significantly simplifies the equations of equilibrium. A structural system is represented by a graph to systematically develop the governing equations of equilibrium for general systems. A node and an element are represented by a node and an edge in graph representation, respectively. Closed loops are opened to form a spanning tree by cutting edges. Two computational sequences are defined in the graph representation. One is the forward path sequence that is used to recover the Cartesian nodal displacements from relative nodal displacement sand traverses a graph from the base node towards the terminal nodes. The other is the backward path sequence that is used to recover the nodal forces in the relative coordinate system from the known nodal forces in the absolute coordinate system and traverses from the terminal nodes towards the base node. One open loop and one closed loop structure undergoing large deformations are analyzed to demonstrate the efficiency and validity of the proposed method.

Security Analysis of MAC Algorithm using Block Cipher (블록 암호 알고리즘을 애용한 MAC 분석)

  • Seo Chang-Ho;Yun Bo-Hyun;Maeng Sung-Reol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.39-47
    • /
    • 2005
  • This paper proposes and analyzes the MAC(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message. The MAC algorithm uses the DES algorithm which has 64-bit block and 56-bit key and we compare the security according to 64-bit and 32-bit length of MAC value. Moreover, we use the SEED algorithm which has 128-bit block and 128-bit key and compare the security according to 128-bit and 64-bit length of MAC value. We analyze the security the forgery attack according to length of message and length of MAC value. this paper, a coarse-to-fine optical flow detection method is proposed. Provided that optical flow gives reliable approximation to two-dimensional image motion, it can be used to recover the three-dimensional motion. but usually to get the reliable optical flows are difficult. The proposed algorithm uses Horn's algorithm (or detecting initial optical flow, then Thin Plate Spline is introduced to warp a image frame of the initial optical flow to the next image frame. The optical flow for the warped image frame is again used iteratively until the mean square error between two image sequence frames is lowered. The proposed method is experimented for the real moving Picture image sequence. The proposed algorithm gives dense optical flow vectors.

  • PDF

Performance Comparison of Brain Wave Transmission Network Protocol using Multi-Robot Communication Network of Medical Center (의료센터의 다중로봇통신망을 이용한 뇌파전송망 프로토콜의 성능비교)

  • Jo, Jun-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.40-47
    • /
    • 2013
  • To verify the condition of patients moving in the medical center like hospital needs to be consider the various wireless communication network protocols and network components. Wireless communication protocols such as the 802.11a, 802.11g, and direct sequence has their specific characteristics, and the various components such as the number of mobile nodes or the distance of transmission range could affects the performance of the network. Especially, the network topologies are considered the characteristic of the brain wave(EEG) since the condition of patient is detected from it. Therefore, in this paper, various wireless communication networks are designed and simulated with Opnet simulator, then evaluated the performance to verify the wireless network that transmits the patient's EEG data efficiently. Overall, the 802.11g had the best performance for the wireless network environment that transmits the EEG data. However, there were minor difference on the performance result depends on the components of the topologies.

Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C (Rustock B형과 C형의 감염절차 분석 및 은닉파일 추출)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.41-53
    • /
    • 2012
  • The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.